Browsing Issue 03 by Title

Sort by: Order: Results:

  • Khan,Salman A. (2015)
    Playfair cipher is an interesting data encryption technique with a medium level of complexity, and therefore, is suitable for security of wireless and mobile systems. Different sizes of the matrices used for key have been ...
  • Al-Naima, Fawzi M.; Hasan, Mohannad M. (2015)
    This paper presents a fuel dispensing system based on RFID technology. The system can improve the fueling process in order to make it much easier, secure and reliable. It prevents unauthorized fueling by assigning a specified ...
  • Jumaah, Alaa K.; Al-Janabi, Sufyan; Ali, Nazar Abedlqader (2015)
    Many privacy preserving data mining algorithms attempt to hide what database owners consider as sensitive. Specifically, in the association rules domain, many of these algorithms are based on item restriction methods; that ...
  • Al-Emran,Mostafa (2015)
    Q-learning is a one of the well-known Reinforcement Learning algorithms that has been widely used in various problems. The main contribution of this work is how to speed up the learning in a single agent environment (e.g. ...

All Journals

Advanced Search


Administrator Account