default search action
Webology, Volume 17
Volume 17, Number 1, 2020
- Reza Ramzanzadeh Rostami:
Detecting Fake Accounts on Twitter Social Network Using Multi-Objective Hybrid Feature Selection Approach. 1-18 - Anaam Abdulzahra Meteab:
Effect of Continuous Improvement of Information Technology Applications on E-Costumer Behavior in Social Media. 19-29 - Manar Joundy Hazar:
Using Received Strength Signal Indication for Indoor Mobile Localization Based on Machine Learning Technique. 30-42 - Khudhair Abed Thamer:
Method of Artificial Neural Networks Teaching. 43-64 - Hamid Keshavarz:
Web Self-efficacy: A Psychological Prerequisite for Web Literacy. 81-98 - Mohammadhiwa Abdekhoda:
Presenting a Conceptual Model of Adopting Micro-Blogging in Learning. 99-108 - Ambar Yoganingrum:
How To Make Biodiversity Articles Highly Cited? 109-129 - Bahram Heshmati:
Global Research Trends of Public Libraries from 1968 to 2017: A Bibliometric and Visualization Analysis. 140-157 - Masoume Kiani:
Information Ecology of Bioinformatic in Web of Science with Emphasizing on Articles Thematic Interaction. 171-190 - Roghayeh Ershad Sarabi:
Environmental Literacy and Accountability of Undergraduate Students of Medical Sciences. 191-201 - Atefeh Farzin:
Effect of Green Marketing Instruments and Behavior Processes of Consumers on Purchase and Use of E-books. 202-215 - Zakieh Piri:
Information Visualization to Support the Decision-Making Process in the Context of Academic Management. 216-226 - Arun Kumar Singh:
Digital Era in the Kingdom of Saudi Arabia: Novel Strategies of the Telecom Service Providers Companies. 227-245 - Aruna S:
A Web service recommendation system based on QoS attribute based collaborative filtering. 246-254 - Suresh Chandra Akula:
Software planning and scheduling in software management. 255-259 - Krithiga R:
A Novel Hybrid Algorithm to Classify Spam Profiles in Twitter. 260-279 - Kavitha R:
Nouveau Shoppers Buying Behavior Pattern and Perception Towards Luxury Brands. 280-296 - Vinothini C:
Hybrid of Meta Heuristic Firefly and Genetic Algorithm for Optimization Approach in the Cloud Environment. 297-305 - Pozdeeva Svetlana Nikolaevna, Prodanova Natalia Alekseevna, Dimitrov Irina Leonidovna, Kucher Oksana Vladimirovna:
Forecasting as an Element the Activity Development of a Sports Organization. 306-314 - Almagul Kairgalievna Oteshova, Prodanova Natalia Alekseevna, Tatiana Leonidovna Melekhina, Nadezhda Konstantinovna Gavrilieva:
Trends in the Development of the Commercial Banking System in a Market Economy. 315-332 - Garnov Andrey Petrovich, Prodanova Natalia Alekseevna, Malakhova Elena Vladimirovna, Tishkina Nadezhda Pavlovna, Saadoon H. Chatheer Al Rabeawi, Amirova Elmira Faylovna:
The Eurasian Economic Union in the Context of Digital Transformation: Main Directions in the Development of Industrial Cooperation. 333-340 - Akhram Khasanovich Nishanov, Bakhtiyorjon Bakirovich Akbaraliev, Samandarov Batirbek Satimovich, Akhmedov Oybek Kamarbekovich, Tajibaev Shukhrat Khudaybergenovich:
An Algorithm for Classification, Localization and Selection of Informative Features in the Space of Politypic Data. 341-364 - Gafurova Dilshoda Ramazanovna:
Methodology for Evaluating the Management of Innovative Processes in the Field of Information and Communication Technologies. 365-376 - Shailja Gupta, Manpreet Kaur, Sachin Lakra, Yogesh Dixit:
A Comparative Theoretical and Empirical Analysis of Machine Learning Algorithms. 377-397
Volume 17, Number 2, 2020
- Yaser Issam Hamodi, Ruaa Riyadh Hussein, Naeem Th. Yousir:
Development of a Unifying Theory for Data Mining Using Clustering Techniques. 1-14 - Anand Pandey, Pankaj Singh, Prashant Mani, Saptarshi Gupta, Jay Prakash Narayan Verma:
Message Ferry Route Calculation through K-means Clustering Algorithm for Partially-Connected MANET. 15-30 - Vandna Dahiya, Sandeep Dalal:
Parallel Approaches of Utility Mining for Big Data. 31-43 - Abed Alsttar Mustafa Assayah:
Export Determinants: A Function for Competitive Advantages An Applied Study in Jordanian Medicament Companies. 44-64 - T. Ambika, K. Senthilvel:
Cyber Crimes against the State: A Study on Cyber Terrorism in India. 65-72 - Andrian, Supardi, Jumawan, Hadita, Christophorus Indra Wahyu Putra:
The Effect of Service Quality, Brand Image and Word of Mouth Communication towards the Continuing Study Interest. 73-87 - Cris Kuntadi:
Investor Reaction on the Implementation of Good Corporate Governance in Banking Companies in Asean. 88-102 - Anita Trisiana, Arif Sutikno, Anggit Grahito Wicaksono:
Digital Media-based Character Education Model As A Learning Innovation in the Midst of A Corona Pandemic. 103-117 - Frederick Sidney Correa, Pawan Kumar Chand, Amit Mittal, Ruchi Mittal:
Proximal and Distal Influences on Fresh Management Graduate's Employability: A Review of Literature and Orientations. 118-127 - M. Balakrishna, K. Siddaraju:
Energy Efficient Dynamic Particle Swarm Optimization (EEDPSO) Resource Allocation in Cloud Computing. 128-149 - Prima Naomi, Iqbal Akbar, Firmanzah:
A Bird's Eye View of Researches on Good Governance: Navigating through the Changing Environment. 150-171 - Mohammed K. Kadhim, Alia K. Hassan:
Towards Intelligent E-Learning Systems: A Hybrid Model for Predicatingthe Learning Continuity in Iraqi Higher Education. 172-188 - Zahraa Faisal, Esraa H. Abdul Ameer:
Encryption Image by Using RC6 and Hybrid Chaotic Map. 189-199 - Faisal G. Beshaw, Intisar K. Saleh:
Enhancement in PI Parameter Prediction Using Segmented Mutation based Genetic Algorithm. 200-217 - K. Punitha:
A Novel Mixed Wide and PSO-Bi-LSTM-CNN Model for the Effective Web Services Classification. 218-237 - N. Sooryah, K. R. Soundarya:
Live Captioning for Live Lectures - An Initiative to Enhance Language Acquisition in Second Language Learners, through Mobile Learning. 238-243 - Sihabud in, Dedi Mulyadi:
Effect of Interpersonal Communication and Motivation on Employee Work Effectiveness in BAPPEDA, Karawang Regency. 244-261 - Bhopendra Singh, P. Kavitha, Rajan Regin, K. Praghash, S. Sujatha, S. Suman Rajest:
Optimized Node Clustering based on Received Signal Strength with Particle Ordered-filter Routing Used in VANET. 262-277 - Rana Ali Salim:
The Effect of Pyramid Method Digital Processing to Enhance the Ground Goals Images for Masscrafts. 278-288 - Mohammed I. Alghamdi:
A Strategic Vision to Reduce Cybercrime to Enhance Cyber Security. 289-295 - Bilal Majeed Abdulridha Al-Latteef:
Analyze Digital Images by Improving the Methods of Advanced Intelligence by the Image Processing Program Developing Process. 296-307 - Albertus Wahyurudhanto:
Critical Reorientation of Bureaucratic Reform and Good Governance in Public Sector Administration in Indonesia. 308-316 - P. Ashik Sheik, M. M. Sulphey:
Enterprise Resource Planning (ERP) As a Potential Tool for Organizational Effectiveness. 317-327 - Chairuddin Ismail:
Strengthening Policies for Economic and Ecological Sustainability through the Enforcement of Environmental Crimes in Third World. 328-335 - Tarmizi:
The Principle of Consensualism and Freedom of Contract as a Reflection of Morality and Legal Certainty of Contract Laws in Indonesia. 336-347 - Syamsul Amar, Ali Anis, Ariusni, Alpon Satrianto:
Determinants of Job Seekers' Decision for Migration; A Study in Big Cities in Indonesia. 348-362 - Avijit Mondal, Arnab Kumar Das, Sayan Nath, Radha Tamal Goswami:
Review Study on Different Attack Strategies of Worm in a Network. 363-375 - Nuha Abd, Khattab M. Ali Alheeti, Salah Sleibi Al-Rawi:
Intelligent Intrusion Detection System in Internal Communication Systems for Driverless Cars. 376-393 - Ali Retha Hasoon Khayeat, Ashwan Abdulmunem, Rafeef Fauzi Najim Al-Shammari, Xianfang Sun:
Traffic Sign Detection and Classification based on Combination of MSER Features and Multi-language OCR. 394-403 - Victor Chukwunweike Ehiedu, Anthony Ogormegbunan Odita, Anthony Anyibuofu Kifordu:
Financial Integration and Growth Volatility Nexus: The Nigeria Experience. 404-415 - Anthony Anyibuofu Kifordu, Florence Konye Igweh, Judith Ifeanyi Aloamaka:
The Impact of Taxation and the Quest for Good Governance: Evidence from Nigeria. 416-429 - Sachin Arun Thanekar, Kodukula Subrahmanyam, A. B. Bagwan:
Effective Job Execution in Hadoop Over Authorized Deduplicated Data. 430-444 - Ibini Emueje, Henry Odigwe Olannye, A. P. Olanye:
Entrepreneurial Resilience and Performance of an Organization: A Survey of Small and Medium Enterprises in Asaba, Delta State, Nigeria. 445-461 - Victor Chukwunweike Ehiedu, Anthony Ogormegbunan Odita, Anthony Anyibuofu Kifordu:
Estimators and Economic Growth Nexus in Financial Deepening: Perspectives from a Small Open Economy. 462-474 - Saling, Zakaria, Rismawati, Made Setini:
Improvement of Satisfaction with the Quality of Customer Service at the Four Start Hotel in Jayapura Papua Indonesia. 475-486 - Pompong B. Setiadi, Ratna Ursula, Rismawati, Made Setini:
Labour Productivity, Work Experience, Age and Education: The Case of Lurik Weaving Industry in Klaten, Indonesia. 487-502 - Maha A. Sayal, M. H. Alameady, Salah A. Albermany:
The Use of SSL and TLS Protocols in Providing a Secure Environment for e-commerce Sites. 503-523 - Robbi Rahim, S. Murugan, Reham R. Mostafa, Anil Kumar Dubey, Regin Rajan, Vikram Kulkarni, K. S. Dhanalakshmi:
Detecting the Phishing Attack Using Collaborative Approach and Secure Login through Dynamic Virtual Passwords. 524-535 - Ulung Napitu, Corry, Resna Napitu, Anwar Soleh Purba, Bakhrul Khair Amal:
The Impact of Modernization on the Batak Toba General System. 536-550 - Cindy Prilyana, Deasy Aseanty:
The Effect of Training Satisfaction to Turnover Intention Mediated by Organizational Citizenship Behavior and Job Satisfaction in Employees of Bank Syariah in Jakarta. 551-567 - Erike Anggraeni, Muslim Marpaung, Ersi Sisdianto, Bayu Tri Cahya, Muhammad Kurniawan:
The Influence's Analysis of Deferred Tax Expense, Current Tax and Discretionary Accrual towards Earnings Management (Survey in Manufactured Company Registered at Indonesia Stock Exchange in the Period of 2014 - 2018. 568-586 - M. Murugesan, P. Balamurugan, J. Santhosh, G. Arulkumaran:
Threats and Emerging Developments in Cyber Security. 587-598 - Nagarjuna Valeti, Victor Ceronmani Sharmila:
Fault Detection based Connected Dominating Set (FDCDS) in Fog Computing. 599-606 - Andries Lionardo:
The Quality Effect of Digital-Based Signature Services on the Performance of the District Government. 607-620 - S. Vaithyasubramanian, M. John Paul, R. Delhi Babu, C. K. Kirubhashankar:
Job Morale - Employees Energy Driven Tool for Better Productivity in Automotive Industry. 621-630 - S. Venkatesh, M. Jeyakarthic:
Adagrad Optimizer with Elephant Herding Optimization based Hyper Parameter Tuned Bidirectional LSTM for Customer Churn Prediction in IoT Enabled Cloud Environment. 631-651 - Guntha Venkata Dhanush Kumar, Mamatha V. Jadhav, Anvesh Tadisetti, Kiran:
A Deep Model on Hoax Detection Using Feed Forward Neural Network and LSTM. 652-662 - Tapas Guha, K. G. Mohan:
A Hybrid Deep Learning Model for Long-Term Sentiment Classification. 663-676 - T. Karthick, T. Kirthiga Devi, M. Ramprasath:
Effective Use of Big Data Planning and Analytics in Crop Planting. 677-693 - T. Kirthiga Devi, Akshat Srivatsava, Kritesh Kumar Mudgal, Ranjnish Raj Jayanti, T. Karthick:
Behaviour Cloning for Autonomous Driving. 694-705 - T. Kirthiga Devi, R. Mohanakrishnan, T. Karthick:
Secure Message Broadcasting in VANET Using RSU based Authentication and Cascade Encryption. 706-716 - G. Maragatham, T. Kirthiga Devi, P. Savaridassan, Sachin Garg:
Epileptic Seizures Prediction Using Deep Learning Methods on EEG Recordings. 717-734 - V. Lavanya, M. Saravanan, E. P. Sudhakar:
Self - Adaptive Load Balancing Using Live Migration of Virtual Machines in Cloud Environment. 735-745 - Raghda Abdulbaqi Mugher:
A Low Computational Complexity Algorithm of PTS Technique for PAPR Reduction in the 4G and 5G Systems. 746-775 - Abeer Abdulsalam, Nazre Abdul Rashid:
Comparative Analysis of Machine Learning Techniques for Splitting Identifiers within Source Code. 776-787 - Ahmed Mahdi Abdulkadium:
A Robot Obstacle Avoidance Method based on Random Forest HTM Cortical Learning Algorithm. 788-803 - Elaf J. Al Taee, Qasim Mohammed Jasim:
Blurred Facial Expression Recognition System by Using Convolution Neural Network. 804-816 - Basim Najim Al-Din, Ahmad M. Manasrah, Salam Abdulkhaleq Noaman:
A Novel Approach by Using a New Algorithm: Wolf Algorithm as a New Technique in Cryptography. 817-826 - Radhwan Mohamed Abdullah, Radhwan Basher, Ayad Hussain Abdulqader:
A Multiple Handover Method by Using the Guide of Mobile Node. 827-847 - Ahmed A. Radhi:
Design and Implementation of Healthcare Patient based General Packet Radio Service. 848-861 - Sahab Dheyaa Mohammed, Taha Mohammed Hasan, Jumana Waleed:
An Effective Blind Detection Technique for Medical Images Forgery. 862-873 - Azizi Abu Bakar, Muhammad Ashraf Aliff Mohamad Rapi, Mohd Rashdan Sallehuddin:
Property Inheritance Management: Issues Unclaimed Property. 874-881 - Kalthum Hassan:
Basic Model of Work-life Balance for Married Women Working in Public Sector in Penang, Malaysia. 882-895 - Azizi Abu Bakar, Nur Syahira Md Fauzi, Hydzulkifli Hashim:
Hibah As A Way of Islamic Wealth Management. 896-903 - Ani Munirah Mohamad, Zaiton Hamin, Mohd Zakhiri Md Nor, Saslina Kamaruddin, Mohd Shahril Nizam Md Radzi:
The Implications of Audio/Video Conference Systems on the Administration of Justice at the Malaysian Courts. 904-921 - R. S. Aswini, B. Muruganantham, S. Ganesh Kumar, Murugan A:
Exploratory Data Analysis for Social Big Data Using Regression and Recurrent Neural Networks. 922-936 - Arun Kumar Porchelvan, S. Ganesh Kumar, B. Muruganantham, Murugan A:
Electricity Optimization in a Community Using OpenCV and Machine Learning with Mobile Application. 937-944 - R. Harikrishnan, R. Jebakumar, S. Ganesh Kumar, Amutha:
Insurance Customer Authentication Using SVM and Financial Time Series Analysis for Mobile Applications. 945-956 - S. S. Saranya, N. Sabiyath Fatima:
Context Aware Data Fusion on Massive IOT Data in Dynamic IOT Analytics. 957-970 - P. Mary Jeyanthi, A. Mansurali, V. Harish, V. D. Krishnaveni:
Conceptual Framework of Customer Value Management (CVM) in Indian Banking Sector. 971-980
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.