{"title":"Comparison of SDLC Models Based on Software Estimation Techniques","authors":"","doi":"10.2174/9789814998451121010011","DOIUrl":"https://doi.org/10.2174/9789814998451121010011","url":null,"abstract":"","PeriodicalId":413864,"journal":{"name":"Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130819241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Privacy Concerns and Social Awareness","authors":"","doi":"10.2174/9789814998451121010012","DOIUrl":"https://doi.org/10.2174/9789814998451121010012","url":null,"abstract":"","PeriodicalId":413864,"journal":{"name":"Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128178976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Respite for Customer’s Privacy Issues using Privacy Preserving Data Mining","authors":"","doi":"10.2174/9789814998451121010004","DOIUrl":"https://doi.org/10.2174/9789814998451121010004","url":null,"abstract":"","PeriodicalId":413864,"journal":{"name":"Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132839073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Machine Learning APP for Prediction of Pandemic such as COVID-19","authors":"","doi":"10.2174/9789814998451121010006","DOIUrl":"https://doi.org/10.2174/9789814998451121010006","url":null,"abstract":"","PeriodicalId":413864,"journal":{"name":"Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133759857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring Academics’ Intentions to use a Project Management System (PMS): A Case Study of the College of Computing and Information Technology, Shaqra University","authors":"","doi":"10.2174/9789814998451121010009","DOIUrl":"https://doi.org/10.2174/9789814998451121010009","url":null,"abstract":"","PeriodicalId":413864,"journal":{"name":"Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129254189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Swift Approach for Malware Detection","authors":"","doi":"10.2174/9789814998451121010008","DOIUrl":"https://doi.org/10.2174/9789814998451121010008","url":null,"abstract":"","PeriodicalId":413864,"journal":{"name":"Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121407817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}