default search action
Computer and Information Science, Volume 12
Volume 12, Number 1, 2019
- Houda Kriouile, Bouchra El Asri:
Theoretical and Pragmatic Cases of a Rich-Variant Approach for a User-Aware Multi-Tenant SaaS Applications. 1-11 - Hussain Mohammad Abu-Dalbouh:
Developing Mobile Tracking Applications for Patient Treatment. 12-22 - Alissar Nasser:
Measuring the Performance of Hospitals in Lebanese qadas Using PCA- DEA Model. 23-32 - Zhi Li, Xiaozhu Zou:
A Review on Personalized Academic Paper Recommendation. 33-43 - Fengchun Yin, Jun Yin:
Research on an Economic Localization Approach. 44-48 - Guohua Zhang, Kangting Zhao, Yi Li:
Research and Improvement Method Based on k-mean Clustering Algorithm. 49-52 - Saleem Issa Al Zoubi, Ahmad Issa Al Zoubi, Mohmmad Al Zoubi:
Factor That Influence To Acceptance M-Learning among Jordanian Students. 53-58 - Ikram Dehmouch, Bouchra El Asri, Maryem Rhanoui, Mina Elmaallam:
Feature Models Preconfiguration Based on User Profiling. 59-71 - Sergey Voronin:
Multi-Stage Image Restoration in High Noise and Blur Settings. 72-81 - Ahmad Habboush:
Ant Colony Optimization (ACO) Based MANET Routing Protocols: A Comprehensive Review. 82-92 - Yin Sheng Zhang:
Applicability Analysis of Semi-Network Operating System. 93-97 - Mina Elmaallam, Hicham Bensaid, Abdelaziz Kriouile:
A Maturity Model for Assessing IS Risk Management Activity Considering the Dependencies Between Its Elements. 98-111
Volume 12, Number 2, 2019
- Chongyi Yang, Wanyu Huang, Ruoqi Zhang, Rui Kong:
Portrait Extraction Algorithm Based on Face Detection and Image Segmentation. 1-13 - Muhammad Adeel Talib, Muhammad Nabeel Talib, Madiha Akhtar:
Service Packaging: A Pattern Based Approach Towards Service Delivery. 14-34 - Yanling Li, Chuansheng Wang, Qi Wang, Jieling Dai, Yushan Zhao:
Secure Multi-User k-Means Clustering Based on Encrypted IoT Data. 35-45 - Mona Alghamdi, Khalid Alomar:
Developing a Web Credibility Evaluation Tool Using PROMETHEE Method. 46-57 - Chongyi Yang, Chanpin Chen, Zhenhao Wu, Jiashun Jiang, Sicheng Su, Xue Kang, Qingping Dou:
Multi-Channel Digital Oscilloscope Implementation over Android Device. 58-70 - Imeh J. Umoren, Daniel E. Asuquo, Onukwugha Gilean, Mfon Esang:
Performability of Retransmission of Loss Packets in Wireless Sensor Networks. 71-86 - Yuanchao Liu, Bo Pang:
Opinion Spam Detection based on Annotation Extension and Neural Networks. 87- - Udoinyang G. Inyang, Uduak Augustine Umoh, Ifeoma C. Nnaemeka, Samuel A. Robinson:
Unsupervised Characterization and Visualization of Students' Academic Performance Features. 103-116 - Hend Khalid Alkahtani:
Safeguarding the Information Systems in an Organization through Different Technologies, Policies, and Actions. 117-125 - Marwan Abo Zanona, Anmar Abuhamdah, Bassam Mohammed El-Zaghmouri:
Arabic Hand Written Character Recognition Based on Contour Matching and Neural Network. 126-137 - Zineb Mcharfi, Bouchra El Asri:
Towards Efficient Tracing in Software Product Lines: Research Methodology. 138-145 - Marwan Abo Zanona:
Image Processing & Neural Network Based Breast Cancer Detection. 146-
Volume 12, Number 3, 2019
- Soumaya Amraoui, Mina Elmaallam, Hicham Bensaid, Abdelaziz Kriouile:
Information Systems Risk Management: Litterature Review. 1-20 - Yijian Liu, Ming Chen, Jihong Chen:
Practical Nozzle Temperature Control Method for Robot FDM Printing System. 21-26 - Sara Moazzezi Eftekhar, Witold Suryn:
A Proposition of Modifications and Extensions of Cloud Computing Standards for Trust Characteristics Measures. 27-41 - Driss El Hannach, Rabia Marghoubi, Zineb El Akkaoui, Mohamed Dahchour:
Analysis and Design of a Project Portfolio Management System. 42-57 - Javaid Syed, Ruth M. Tappin:
IT Professionals' Personality, Personal Characteristics, and Commitment: Evidence from a National Survey. 58-71 - Jason Earl Thomas, Ryan P. Galligher, Macalah L. Thomas, Gordon C. Galligher:
Enterprise Cybersecurity: Investigating and Detecting Ransomware Infections Using Digital Forensic Techniques. 72-80 - Amadou Chaibou, Ousmane Moussa Tessa, Oumarou Sié:
Modeling the Parallelization of the Edmonds-Karp Algorithm and Application. 81-91 - Asmae Rhanizar, Zineb El Akkaoui:
A Predictive Framework of Speed Camera Locations for Road Safety. 92-103 - Casper van der Kerk, Attila Csala, Aeilko H. Zwinderman:
Quantum Computing in the Biomedical Sciences; A Brief Introduction into Concepts and Applications. 104-116
Volume 12, Number 4, 2019
- Sulaf Elshaar, Samira Sadaoui:
Building High-Quality Auction Fraud Dataset. 1- - Jamilah Alokluk:
Archiving and Document Management at Taibah University: A Case Study. 11-19 - E. M. Lavrischeva:
The Theory Graph Modeling and Programming Systems from Module Elements to the Application Areas. 20-39 - Otmane Azeroual, Joachim Schöpfel:
Research Intelligence (CRIS) and the Cloud: A Review. 40-55 - Asma El Hamzaoui, Hicham Bensaid, Abdeslam En-Nouaary:
Model Checking of WebRTC Peer to Peer System. 56-71 - Sara Alomari, Salha Abdullah:
Improving an AI-Based Algorithm to Automatically Generate Concept Maps. 72-83 - Otmane Azeroual:
A Text and Data Analytics Approach to Enrich the Quality of Unstructured Research Information. 84-95 - Oni Omoyemi Abimbola, Akinyemi Bodunde Odunola, Aladesanmi Adegboye Temitope, Ganiyu Adesola Aderounmu, Kamagaté Beman Hamidja:
An Improved Stochastic Model for Cybersecurity Risk Assessment. 96-110 - Adil Iguider, Kaouthar Bousselam, Oussama Elissati, Mouhcine Chami, Abdeslam En-Nouaary:
GO Game Inspired Algorithm for Hardware Software Partitioning in Multiprocessor Embedded Systems. 111-122
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.