Original Research Article
Privacy Preserving in Social Networks Using Combining Cuckoo Optimization Algorithm and Graph Clustering for Anonymization
Page:
1-12
Abstract View: 1241 times | Full Article - PDF: 636 times | Review History: 0 times |
Design and Implementation of Students’ File Encryption and Decryption System Using One Time Pad Algorithm for Computer Science Department, Adsu Mubi
Page:
1-17
Abstract View: 879 times | Full Article - PDF: 793 times | Review History: 0 times |
Securing Computer Based Testing (CBT) System for Tertiary Institutions in Nigeria
Page:
1-16
Abstract View: 1179 times | Full Article PDF: 709 times | Review History: 0 times |
The First Integrals of a Second Order Ordinary Differential Equation and Application
Page:
1-15
Abstract View: 1486 times | Full Article - PDF: 686 times | Review History: 0 times |
A Chinese Remainder Theorem Based Enhancements of Lempel-ziv-welch and Huffman Coding Image Compression
Page:
1-9
Abstract View: 1448 times | Full Article PDF: 740 times | Review History: 0 times |