Volume 17, No 2, 2020


Secure Message Broadcasting in VANET Using RSU based Authentication and Cascade Encryption

T. Kirthiga Devi, R. Mohanakrishnan and T. Karthick

Pages: 706-716

DOI: 10.14704/WEB/V17I2/WEB17062

Full Text


Epileptic Seizures Prediction Using Deep Learning Methods on EEG Recordings

G. Maragatham, T. Kirthiga Devi, P. Savaridassan and Sachin Garg

Pages: 717-734

DOI: 10.14704/WEB/V17I2/WEB17063

Full Text


Self - Adaptive Load Balancing Using Live Migration of Virtual Machines in Cloud Environment

V. Lavanya, M. Saravanan and E.P. Sudhakar

Pages: 735-745

DOI: 10.14704/WEB/V17I2/WEB17064

Full Text


A Low Computational Complexity Algorithm of PTS Technique for PAPR Reduction in the 4G and 5G Systems

Raghda Abdulbaqi Mugher

Pages: 746-775

DOI: 10.14704/WEB/V17I2/WEB17065

Full Text


Comparative Analysis of Machine Learning Techniques for Splitting Identifiers within Source Code

Abeer Abdulsalam and Nazre Abdul Rashid

Pages: 776-787

DOI: 10.14704/WEB/V17I2/WEB17066

Full Text


A Robot Obstacle Avoidance Method based on Random Forest HTM Cortical Learning Algorithm

Ahmed Mahdi Abdulkadium

Pages: 788-803

DOI: 10.14704/WEB/V17I2/WEB17067

Full Text


Blurred Facial Expression Recognition System by Using Convolution Neural Network

Elaf J. Al Taee and Qasim Mohammed Jasim

Pages: 804-816

DOI: 10.14704/WEB/V17I2/WEB17068

Full Text


A Novel Approach by Using a New Algorithm: Wolf Algorithm as a New Technique in Cryptography

Basim Najim Al-din, Ahmad M. Manasrah and Salam Abdulkhaleq Noaman

Pages: 817-826

DOI: 10.14704/WEB/V17I2/WEB17069

Full Text


A Multiple Handover Method by Using the Guide of Mobile Node

Radhwan Mohamed Abdullah, Radhwan Basher and Ayad Hussain Abdulqader

Pages: 827-847

DOI: 10.14704/WEB/V17I2/WEB17070

Full Text


Design and Implementation of Healthcare Patient based General Packet Radio Service

Ahmed A. Radhi

Pages: 848-861

DOI: 10.14704/WEB/V17I2/WEB17071

Full Text


An Effective Blind Detection Technique for Medical Images Forgery

Dr. Sahab Dheyaa Mohammed, Taha Mohammed Hasan and Jumana Waleed

Pages: 862-873

DOI: 10.14704/WEB/V17I2/WEB17072

Full Text


Property Inheritance Management: Issues Unclaimed Property

Azizi Abu Bakar, Muhammad Ashraf Aliff Mohamad Rapi and Mohd Rashdan Sallehuddin

Pages: 874-881

DOI: 10.14704/WEB/V17I2/WEB17073

Full Text


Basic Model of Work-life Balance for Married Women Working in Public Sector in Penang, Malaysia

Kalthum Hassan

Pages: 882-895

DOI: 10.14704/WEB/V17I2/WEB17074

Full Text


Hibah As A Way of Islamic Wealth Management

Azizi Abu Bakar, Nur Syahira Md Fauzi and Hydzulkifli Hashim

Pages: 896-903

DOI: 10.14704/WEB/V17I2/WEB17075

Full Text


The Implications of Audio/Video Conference Systems on the Administration of Justice at the Malaysian Courts

Ani Munirah Mohamad, Zaiton Hamin, Mohd Zakhiri Md Nor, Saslina Kamaruddin and Mohd Shahril Nizam Md Radzi

Pages: 904-921

DOI: 10.14704/WEB/V17I2/WEB17076

Full Text


Exploratory Data Analysis for Social Big Data Using Regression and Recurrent Neural Networks

R.S. Aswini, B. Muruganantham, S. Ganesh Kumar and A. Murugan

Pages: 922-936

DOI: 10.14704/WEB/V17I2/WEB17077

Full Text


Electricity Optimization in a Community Using OpenCV and Machine Learning with Mobile Application

Arun Kumar Porchelvan, S. Ganesh Kumar, B. Muruganantham and A. Murugan

Pages: 937-944

DOI: 10.14704/WEB/V17I2/WEB17078

Full Text


Insurance Customer Authentication Using SVM and Financial Time Series Analysis for Mobile Applications

R. Harikrishnan, R. Jebakumar, S. Ganesh Kumar and Amutha

Pages: 945-956

DOI: 10.14704/WEB/V17I2/WEB17079

Full Text


Context Aware Data Fusion on Massive IOT Data in Dynamic IOT Analytics

S.S. Saranya and Dr.N. Sabiyath Fatima

Pages: 957-970

DOI: 10.14704/WEB/V17I2/WEB17080

Full Text


Conceptual Framework of Customer Value Management (CVM) in Indian Banking Sector

P. Mary Jeyanthi, A. Mansurali, V. Harish and V.D. Krishnaveni

Pages: 971-980

DOI: 10.14704/WEB/V17I2/WEB17081

Full Text




Prev123Next