Abstract: Group recommendation, which provides a group of users with information items, has become increasingly important in both the workspace and people’s social activities. Be...
----------------------------------------------------------------------------------------------------------------------------------The need for achieving optimal performance for da...
: In this paper, we present two contributions for Arabic Word Sense Disambiguation. In the first one, we propose to use both two external resources AWN and WN based on Term to Term...
: In this paper, we present a new technique of representing the player’s strategies by adaptive automata, which can handle complex strategies in large populations effectively. Th...
: Online Social Networks (OSNs) have been proliferating in the past decade as general-purpose public networks. Billions of user’s are currently subscribing by uploading, download...
: Principal Component Analysis (PCA) is one of the feature extraction techniques, commonly used in human facial recognition systems. PCA yields high accuracy rates when requiring l...
: The use of Information Technology (IT) in organizations is subject to various kinds of potential risks. Risk management is a key component of project management enables an organi...
: Failures are usual rather exceptional in cloud computing environment. To access from the nearby site, the often used data should get replicated to multiple locations to compose t...
: A considerable amount of fuzzy spatial data emerged in various applications leads to investigation of fuzzy spatial data and their fuzzy relations. Because of complex requirement...
: In the current paper, we have presented a novel watermarking scheme with making watermark as robust while keeping the image fragile using Residue Number System (RNS) and Chaos. R...
Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Muham...