Pub Date : 2019-11-06DOI: 10.1163/9789004409750_010
{"title":"Plutarco La virtù delle donne (Mulierum virtutes)","authors":"","doi":"10.1163/9789004409750_010","DOIUrl":"https://doi.org/10.1163/9789004409750_010","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81099284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-06DOI: 10.1163/9789004409750_009
{"title":"Editores et commentatores qui in apparatu citantur","authors":"","doi":"10.1163/9789004409750_009","DOIUrl":"https://doi.org/10.1163/9789004409750_009","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72845934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-06DOI: 10.1163/9789004409750_004
{"title":"Il titolo dell’opera","authors":"","doi":"10.1163/9789004409750_004","DOIUrl":"https://doi.org/10.1163/9789004409750_004","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91384909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-06DOI: 10.1163/9789004409750_006
{"title":"Plutarco e le donne nel Mulierum Virtutes","authors":"","doi":"10.1163/9789004409750_006","DOIUrl":"https://doi.org/10.1163/9789004409750_006","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83105823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-06DOI: 10.1163/9789004398801_006
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: Second Hebrew Translation (Anonymous)","authors":"G. Bos","doi":"10.1163/9789004398801_006","DOIUrl":"https://doi.org/10.1163/9789004398801_006","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84123541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-06DOI: 10.1163/9789004398801_004
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: Arabic Text with English Translation","authors":"G. Bos","doi":"10.1163/9789004398801_004","DOIUrl":"https://doi.org/10.1163/9789004398801_004","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84767212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-06DOI: 10.1163/9789004398801_005
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: First Hebrew Translation (Anonymous)","authors":"G. Bos","doi":"10.1163/9789004398801_005","DOIUrl":"https://doi.org/10.1163/9789004398801_005","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79096039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653720
K. Uma, E. S. Blessie
Mobile devices have become very popular these days due to its portability and high performance. Android occupies a majority share in the mobile market and it becomes trendy nowadays. The reason for user ignoring is that the installation and usage of apps. The user must have the concern about the security and the malicious attacks. Like every operating systems mobile devices are also prone to malware attacks. Several data mining algorithms are used in the malware detection based on the permissions enabled in each apps. This paper gives a n attempt to study about the performance of data mining algorithms such as Naive Bayes, J48, Multiclass Classifier, Random Tree, SVM, Decision Tree. Each and every algorithm is assessed by various criteria to identify which one is suitable to detect malicious software. The result is that Naive Bayes if far better than the other algorithms as of in time concern and also in detection process.
{"title":"Survey on Android Malware Detection and Protection using Data Mining Algorithms","authors":"K. Uma, E. S. Blessie","doi":"10.1109/I-SMAC.2018.8653720","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653720","url":null,"abstract":"Mobile devices have become very popular these days due to its portability and high performance. Android occupies a majority share in the mobile market and it becomes trendy nowadays. The reason for user ignoring is that the installation and usage of apps. The user must have the concern about the security and the malicious attacks. Like every operating systems mobile devices are also prone to malware attacks. Several data mining algorithms are used in the malware detection based on the permissions enabled in each apps. This paper gives a n attempt to study about the performance of data mining algorithms such as Naive Bayes, J48, Multiclass Classifier, Random Tree, SVM, Decision Tree. Each and every algorithm is assessed by various criteria to identify which one is suitable to detect malicious software. The result is that Naive Bayes if far better than the other algorithms as of in time concern and also in detection process.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"25 1","pages":"209-212"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78229413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653794
J. Stephy, V. Subramaniyaswamy
The technique which is used to conceal private image into a cover image is called data hiding techniques. Different techniques have been discovered for data hiding with its limitations and merits. Data hiding can be done in any form of information such as video, audio, text, and image. Based on the application type many techniques are used. One of the problems with sending data over networks is security. Protecting information during transfer of data is important. Data hiding provides security and authentication. Data hiding will not recover the original image whereas, Reversible Data Hiding restores the original cover image. Data hiding techniques are used for different approaches such as the robustness of the hiding process in a digital image, digital image security, and imperceptibility of the digital image. Data hiding techniques fulfill maximum requirements such as security, undetectability, imperceptibility, robustness etc which can be used in various applications.
{"title":"Analysis of digital image data hiding techniques","authors":"J. Stephy, V. Subramaniyaswamy","doi":"10.1109/I-SMAC.2018.8653794","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653794","url":null,"abstract":"The technique which is used to conceal private image into a cover image is called data hiding techniques. Different techniques have been discovered for data hiding with its limitations and merits. Data hiding can be done in any form of information such as video, audio, text, and image. Based on the application type many techniques are used. One of the problems with sending data over networks is security. Protecting information during transfer of data is important. Data hiding provides security and authentication. Data hiding will not recover the original image whereas, Reversible Data Hiding restores the original cover image. Data hiding techniques are used for different approaches such as the robustness of the hiding process in a digital image, digital image security, and imperceptibility of the digital image. Data hiding techniques fulfill maximum requirements such as security, undetectability, imperceptibility, robustness etc which can be used in various applications.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"27 1","pages":"140-144"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80081965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}