


default search action
Computer and Information Science, Volume 11
Volume 11, Number 1, 2018
- Laiali Almazaydeh, Jun Zhang, Peiqiao Wu, Ruoqi Wei, Yisheng Cheng, Khaled M. Elleithy:

Bad USB MITM: A Network Attack Based on Physical Access and Its Practical Security Solutions. 1-7 - Yahia Alemami, Laiali Almazaydeh:

Pathological Voice Signal Analysis Using Machine Learning Based Approaches. 8-13 - Jason Earl Thomas, Gordon C. Galligher:

Improving Backup System Evaluations in Information Security Risk Assessments to Combat Ransomware. 14-25 - Mahdi Bidar, Samira Sadaoui, Malek Mouhoub, Mohsen Bidar:

Enhanced Firefly Algorithm Using Fuzzy Parameter Tuner. 26-51 - Ghaith Abdulsattar A. Jabbar Alkubaisi, Siti Sakira Kamaruddin, Husniza Binti Husni:

Stock Market Classification Model Using Sentiment Analysis on Twitter Based on Hybrid Naive Bayes Classifiers. 52-64 - Yuridiana Alemán, María J. Somodevilla, Darnes Vilariño:

A Class Validation Proposal of a Pedagogic Domain Ontology based on Clustering Analysis. 65-77 - Yasmin Mahmoud Amin

, Amr Talaat Abdel-Hamid:
A Simulation Model of IEEE 802.15.4 GTS Mechanism and GTS Attacks in OMNeT++ / MiXiM + NETA. 78-89 - Sara Alomari, Mona Alghamdi, Fahd Saleh Alotaibi:

Enhancing Big Data Auditing. 90-97 - Liu Xiang Wei:

The Analysis and Implementation of the K - Means Algorithm Based on Hadoop Platform. 98-103 - Guohua Zhang, Ting Xie, Min Liu, Yang Liu:

Vehicle Scheduling Model Based on Data Mining. 104-107
Volume 11, Number 2, May 2018
- Mohamed Hussein Abdi, George Onyango Okeyo

, Ronald Waweru Mwangi:
Matrix Factorization Techniques for Context-Aware Collaborative Filtering Recommender Systems: A Survey. 1-10 - Sadia Yeasmin, Muhammad Abrar Hussain, Noor Yazdani Sikder, Rashedur M. Rahman:

Finding Nutritional Deficiency and Disease Pattern of Rural People Using Fuzzy Logic and Big Data Techniques on Hadoop. 11-33 - Xiaozhu Zou, Siyi Xiong, Zhi Li, Ping Jiang:

Constructing Metadata Schema of Scientific and Technical Report Based on FRBR. 34-39 - Sameer Alshetewi, Fahad Alturise

, Faten Karim:
Factors Influencing Interoperability Level Required for the Implementation of T-Government in Saudi Arabia. 40-63 - Ahmad Habboush

, Mahmoud AlShugran:
An Enhanced Queue Management Approach for Greedy Routing in MANETs. 64-75 - Hana Almagrabi

, Areej Malibari, John McNaught:
Corpus Analysis and Annotation for Helpful Sentences in Product Reviews. 76-87 - Tarik Fissaa, Hatim Guermah, Mahmoud El Hamlaoui, Hatim Hafiddi, Mahmoud Nassar:

A Synergy of Semantic and Context Awareness for Service Composition in Ubiquitous Environment. 88-98 - Arwa A. Jamjoom:

The Impact of Mobile Application Support on the Quality of Care of Kidney Patients. 99-107
Volume 11, Number 3, 2018
- Lian Gaofeng:

A Bayesian NetworkBased MethodforService Quality Optimization. 1-9 - Jean-Paul Kone

, Xinyu Zhang, Yuying Yan, Stephen Adegbite:
An Open-Source Toolbox for Multiphase Flow Simulation in a PEM Fuel Cell. 10-34 - Yijian Liu, King-Chi Fung, Wenqian Ding, Hongfei Guo, Ting Qu, Cong Xiao:

Novel Smart Waste Sorting System based on Image Processing Algorithms: SURF-BoW and Multi-class SVM. 35-49 - Yongjie Huang, Xiaofeng Huang, Qiakai Cai:

Music Generation Based on Convolution-LSTM. 50-56 - Xiao-Yan Cao, Bing-Qian Liu, Bao-Ru Pan, Yuan-Biao Zhang:

The Feasibility of Opening Communities - Based on the Wiedemann Car-Following Model. 57-66 - D. Sudaroli Vijayakumar

, Sannasi Ganapathy:
Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System. 67-81 - Maram Meccawy:

The Brilliant Scheduler: Automated Scheduling System for Video Conferencing Courses. 82-88 - Liu Xiang Wei:

Design and Implementation of China HowNet Knowledge Map Generation Module Literature. 89-94 - Yunxia Zhou, Xiaozhu Zou:

Strategy to Promote Professional Reading in University Libraries. 95-101 - Hasnae L'Amrani, Younès El Bouzekri El Idrissi, Rachida Ajhoun:

Identity Management Systems: Techno-Semantic Interoperability for Heterogeneous Federated Systems. 102-111 - Maria El Haiba, Lamyaa Elbassiti, Rachida Ajhoun:

A Semantic Recommender Engine for Idea Generation Improvement. 112-122
Volume 11, Number 4, 2018
- Jiang Li, Lei Zhang:

3D Localization Algorithm Based on Linear Regression and Least Squares in NLOS Environments. 1-8 - Sultan Ahmed, Malek Mouhoub:

Representation and Reasoning with Probabilistic TCP-nets. 9-28 - Xun Li, Ze-liang Xie:

Location Fingerprint Database Filter Algorithm Based on Multi-Mapping Data Structure. 29-35 - Kaoutar Hafdi, Abderahman Kriouile, Abdelaziz Kriouile:

IoT ReDy Architecture for Smart Grid Management. 36-44 - Salma El Koutbi, Ali Idri:

Software Effort Estimation Risk Management over Projects Portfolio. 45-76 - Malek Mouhoub, Mustakim Al Helal:

Topic Modelling in Bangla Language: An LDA Approach to Optimize Topics and News Classification. 77-83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














