KoomeshPub Date : 2019-11-06DOI: 10.1163/9789004409750_010
{"title":"Plutarco La virtù delle donne (Mulierum virtutes)","authors":"","doi":"10.1163/9789004409750_010","DOIUrl":"https://doi.org/10.1163/9789004409750_010","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81099284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2019-11-06DOI: 10.1163/9789004409750_009
{"title":"Editores et commentatores qui in apparatu citantur","authors":"","doi":"10.1163/9789004409750_009","DOIUrl":"https://doi.org/10.1163/9789004409750_009","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72845934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2019-11-06DOI: 10.1163/9789004409750_004
{"title":"Il titolo dell’opera","authors":"","doi":"10.1163/9789004409750_004","DOIUrl":"https://doi.org/10.1163/9789004409750_004","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91384909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2019-11-06DOI: 10.1163/9789004409750_006
{"title":"Plutarco e le donne nel Mulierum Virtutes","authors":"","doi":"10.1163/9789004409750_006","DOIUrl":"https://doi.org/10.1163/9789004409750_006","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83105823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2019-05-06DOI: 10.1163/9789004398801_006
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: Second Hebrew Translation (Anonymous)","authors":"G. Bos","doi":"10.1163/9789004398801_006","DOIUrl":"https://doi.org/10.1163/9789004398801_006","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84123541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2019-05-06DOI: 10.1163/9789004398801_004
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: Arabic Text with English Translation","authors":"G. Bos","doi":"10.1163/9789004398801_004","DOIUrl":"https://doi.org/10.1163/9789004398801_004","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84767212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2019-05-06DOI: 10.1163/9789004398801_005
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: First Hebrew Translation (Anonymous)","authors":"G. Bos","doi":"10.1163/9789004398801_005","DOIUrl":"https://doi.org/10.1163/9789004398801_005","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79096039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653720
K. Uma, E. S. Blessie
{"title":"Survey on Android Malware Detection and Protection using Data Mining Algorithms","authors":"K. Uma, E. S. Blessie","doi":"10.1109/I-SMAC.2018.8653720","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653720","url":null,"abstract":"Mobile devices have become very popular these days due to its portability and high performance. Android occupies a majority share in the mobile market and it becomes trendy nowadays. The reason for user ignoring is that the installation and usage of apps. The user must have the concern about the security and the malicious attacks. Like every operating systems mobile devices are also prone to malware attacks. Several data mining algorithms are used in the malware detection based on the permissions enabled in each apps. This paper gives a n attempt to study about the performance of data mining algorithms such as Naive Bayes, J48, Multiclass Classifier, Random Tree, SVM, Decision Tree. Each and every algorithm is assessed by various criteria to identify which one is suitable to detect malicious software. The result is that Naive Bayes if far better than the other algorithms as of in time concern and also in detection process.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"25 1","pages":"209-212"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78229413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KoomeshPub Date : 2018-08-01DOI: 10.1109/I-SMAC.2018.8653794
J. Stephy, V. Subramaniyaswamy
{"title":"Analysis of digital image data hiding techniques","authors":"J. Stephy, V. Subramaniyaswamy","doi":"10.1109/I-SMAC.2018.8653794","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653794","url":null,"abstract":"The technique which is used to conceal private image into a cover image is called data hiding techniques. Different techniques have been discovered for data hiding with its limitations and merits. Data hiding can be done in any form of information such as video, audio, text, and image. Based on the application type many techniques are used. One of the problems with sending data over networks is security. Protecting information during transfer of data is important. Data hiding provides security and authentication. Data hiding will not recover the original image whereas, Reversible Data Hiding restores the original cover image. Data hiding techniques are used for different approaches such as the robustness of the hiding process in a digital image, digital image security, and imperceptibility of the digital image. Data hiding techniques fulfill maximum requirements such as security, undetectability, imperceptibility, robustness etc which can be used in various applications.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"27 1","pages":"140-144"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80081965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}