{"title":"Risk Evaluation of Information Exchange among Nodes under P2P Network Environment","authors":"Han Ying-jun, Wang Xiaoyang","doi":"10.6025/jnt/2019/10/3/79-86","DOIUrl":"https://doi.org/10.6025/jnt/2019/10/3/79-86","url":null,"abstract":"","PeriodicalId":125016,"journal":{"name":"Journal of Networking Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126639256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Credit based Distributed Trust Management Model for P2P Network","authors":"Han Ying-jun, Li Hongjun","doi":"10.6025/jnt/2019/10/3/71-78","DOIUrl":"https://doi.org/10.6025/jnt/2019/10/3/71-78","url":null,"abstract":"","PeriodicalId":125016,"journal":{"name":"Journal of Networking Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124072421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application of Database Technology in the Network Management System","authors":"Yong-qiang He, Xue-rui Wang","doi":"10.6025/jnt/2019/10/3/87-91","DOIUrl":"https://doi.org/10.6025/jnt/2019/10/3/87-91","url":null,"abstract":"","PeriodicalId":125016,"journal":{"name":"Journal of Networking Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Online Marketing and 10cs for Internet Marketers","authors":"Vinay Raj Ramachandran","doi":"10.6025/JNT/2019/10/2/54-60","DOIUrl":"https://doi.org/10.6025/JNT/2019/10/2/54-60","url":null,"abstract":"","PeriodicalId":125016,"journal":{"name":"Journal of Networking Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130068909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards the Improvement of Object-Oriented Languages","authors":"R. Dahiya, Aman Thakur, S. Verma","doi":"10.6025/JNT/2019/10/2/33-39","DOIUrl":"https://doi.org/10.6025/JNT/2019/10/2/33-39","url":null,"abstract":"","PeriodicalId":125016,"journal":{"name":"Journal of Networking Technology","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116437409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BlobSeer Scalability: A Multi-version Managers Approach","authors":"B. Chalabi, Y. Slimani","doi":"10.6025/JNT/2019/10/2/40-53","DOIUrl":"https://doi.org/10.6025/JNT/2019/10/2/40-53","url":null,"abstract":"","PeriodicalId":125016,"journal":{"name":"Journal of Networking Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116271492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex Decision Rules in DEX Methodology: jRule Algorithm and Performance Analysis","authors":"A. Kikaj, M. Bohanec","doi":"10.6025/jnt/2019/10/1/9-17","DOIUrl":"https://doi.org/10.6025/jnt/2019/10/1/9-17","url":null,"abstract":"","PeriodicalId":125016,"journal":{"name":"Journal of Networking Technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124768012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensitivity Analysis of Computational Models for solving Paradox","authors":"Jurij Nastran, Beno Šircelj, M. Gams, D. Bokal","doi":"10.6025/JNT/2019/10/1/18-24","DOIUrl":"https://doi.org/10.6025/JNT/2019/10/1/18-24","url":null,"abstract":"","PeriodicalId":125016,"journal":{"name":"Journal of Networking Technology","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115620339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of Wireless Communications Systems based on Multiple Correspondence Analysis","authors":"Samira Achki, F. Gharnati","doi":"10.6025/JNT/2019/10/1/1-8","DOIUrl":"https://doi.org/10.6025/JNT/2019/10/1/1-8","url":null,"abstract":"","PeriodicalId":125016,"journal":{"name":"Journal of Networking Technology","volume":"416 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116043689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Fault-Prediction using Combination of Neural Network and Naive Bayes Algorithm","authors":"Bahman Arasteh","doi":"10.6025/JNT/2018/9/3/94-101","DOIUrl":"https://doi.org/10.6025/JNT/2018/9/3/94-101","url":null,"abstract":"Nowadays, the role of software has becoming increasingly important in many safety-critical applications and the reliability is a key issue in the software systems. One of the ways for improving software Reliability is predicting its faults before tasting phase. Ability of predicting fault–proneness software modules can reduce software testing cost and consequently overall software project cost. In this paper, a combined method includes Neural Network and Naive Bayes algorithm are used to build a software fault prediction-model. Five traditional fault-datasets are used to construct and evaluate the prediction model using proposed method. The results of experiments indicate that the constructed model by the proposed method have higher prediction accuracy and precision than the other methods.","PeriodicalId":125016,"journal":{"name":"Journal of Networking Technology","volume":"97 S4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132478275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}