Information Sciences Letters
Volume 2, Issue 2 (2013) May 2013
A Real-Time Anomaly Network Intrusion Detection System with High Accuracy
Ahmed A. Elngar, Dowlat A. El A. Mohamed, and Fayed F. M. Ghaleb
Soft Ideals Of BCC-algebras
R. Ameri, et al
Some Ad Hoc Network Characteristics Effects on the Performance of On-Demand Routing Protocols
A. A. A. Radwan, Marghny H. Mohamed, Mahmoud A. Mofaddel, and H El-Sayed
A Study of Critical Transmission Range for Connectivity in Ad Hoc Network
A. A. A. Radwan, Marghny H. Mohamed, Mahmoud A. Mofaddel, and H. El-Sayed
Ontology Algorithm Based on Semi-supervised Eigenmap Learning
Bo Peng, Tian-wei Xu, Zhen Li, and Wei Gao
On Tikhonov regularization method in calibration of volatility term-structure
Ahmad Reza Yazdanian
Semihypergroups characterized by (∈,∈∨q_{k})-fuzzy hyperideals
Muhammad Shabir and Tariq Mahmood
Improved (G′/G) -expansion method for elliptic-like equation and general traveling wave solutions of some class of NLPDEs
E. Osman, M. Khalfallah, and H. Sapoor