Name | Title of Research Paper | Venue of Conference /Proceedings or journal name | Date |
---|---|---|---|
Ram | A novel approach for optimizing Governance, Risk management and Compliance for enterprise information security by Integrating DEMATEL and FoM Methods | Accepted for Publication in Computers & Security Journal , Elsevier Publications | Article in press |
Mohammed Waleed | "Machining Process Workpiece Classification based on Texture Feature Analysis and the Support Vector Machine" | Accepted for Publication in the International Journal of Software Engineering and Its Applications | Article in Press |
Mohammed Waleed | "Classification of Machining Processes using Gray-level Histogram and Edge Detection Features" |
ISER- 13th International Conference on Recent Trends in Engineering and Technology (ICRTET), San Francisco, USA |
Article in Press |
Albert A. Tayong | Number Systems and Its Conversions | Journal of Computer Science & Systems Biology | Article is Under Review |
Albert A. Tayong |
Number Systems and Its Conversions |
Oman, Issuu [ONLINE] | Sep 2015 |
Albert A. Tayong |
Matrices and its Applications |
Oman, Issuu [ONLINE] | Sep 2015 |
Ram | Conference paper titled “Performance Optimization of a Datacentre Using Virtualization Technology: A case study | Presented in the International Symposium on Intercloud and IoT (ICI-2015), conducted by IEEE computer Society in August 2015, Rome, Italy. | August 2015 |
Mohammed Waleed | "Machining Process Classification using PCA-Reduced Histogram Features and the Support Vector Machine" |
Accepted for presentation in |
August 2015 |
Mohammed Waleed | "Artificial Neural Network-Based Texture Classification Using Reduced Multi-directional Gabor Features" | International Review on Computers and Software (IRECOS), Volume (9), Issue (6), 2014. | July 2014 |
Ms. Jacintha Menezes | Segmentation and Classification of Oil Spill Data from Hyperspectral Images | ICAICT 2014 Conference, Middle East College Oman | 29th April, 2014 |
Ms. Shajeea Khan |
A Decision tree based approach to correlate students’ progress and the acquired skills: A case study" | Majan International Conference , Muscat | April 8,9, 2014 |
Mr. Ram |
Information Security Governance using COBIT: Focusing on Critical Success Factors |
International Journal of Internet Technology and Secured Transactions, ISSN (Online): 1748-5703 - ISSN (Print): 1748-569X (Article Communicated in 2012, published in Sep 2013) | Sep 2013 |
Mohammed Waleed | "Supervised ANN Classification for Engineering Machined Textures Based on Enhanced Features Extraction and Reduction Scheme" | E-Journal of Artificial Intelligence & Computer Science (AICS), Volume(1), Issue(1), 2013 | August 2013 |
Mr.Asad | IEEE Conference, SERE 2014, USA | USA | 29, June to 2, July 2014 |
Mr Asad | Securing Internet Information Services (IIS) Configuration Files |
Springer LNCS Volume 7996, 2013, pp 551-560 |
July 2013 |
Mr. Ram |
Information Security Audit in Virtual Environment |
The Research Bulletin of Jordan ACM, Volume II(III)pp. 132-136 | April 2013 |
Mr. Asad | A Boundary Node Detection Based Solution for Minimizing the Effects of Nodes Distribution Over Key Exchange in Group Based WSN |
The 15th International Conference on Network-Based Information Systems (NBiS-2012), Australia, September 26-28, 2012 |
September 2012 |
Ms. Jacintha Menezes |
A Novel Segmentation Technique for Clustering Oil Spill Data from Hyperspectral Images |
Second International Conference on Advances in Communication and Information Technology - CIT 2012 in Frankfurt, Germany. | August 2012 |
Mr Asad | Securing Internet Information Services (IIS) Configuration Files | 7th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2012), London UK ISBN : 978-1-4673-5325-0 | Dec 2012 |
Ms. Reja E J | Project ZISE | UAE | April 2011 |
Mr. D. Ram | Effective server virtualization with enhanced security strategy for large organizations | World CIS 2011, IEEE conference , London | Feb 21-23, 2011 |
Published in
About Majan