


default search action
Computer and Information Science, Volume 12
Volume 12, Number 1, 2019
- Houda Kriouile, Bouchra El Asri:

Theoretical and Pragmatic Cases of a Rich-Variant Approach for a User-Aware Multi-Tenant SaaS Applications. 1-11 - Hussain Mohammad Abu-Dalbouh:

Developing Mobile Tracking Applications for Patient Treatment. 12-22 - Alissar Nasser:

Measuring the Performance of Hospitals in Lebanese qadas Using PCA- DEA Model. 23-32 - Zhi Li, Xiaozhu Zou:

A Review on Personalized Academic Paper Recommendation. 33-43 - Fengchun Yin, Jun Yin:

Research on an Economic Localization Approach. 44-48 - Guohua Zhang, Kangting Zhao, Yi Li:

Research and Improvement Method Based on k-mean Clustering Algorithm. 49-52 - Saleem Issa Al Zoubi, Ahmad Issa Al Zoubi, Mohmmad Al Zoubi:

Factor That Influence To Acceptance M-Learning among Jordanian Students. 53-58 - Ikram Dehmouch, Bouchra El Asri, Maryem Rhanoui, Mina Elmaallam:

Feature Models Preconfiguration Based on User Profiling. 59-71 - Sergey Voronin:

Multi-Stage Image Restoration in High Noise and Blur Settings. 72-81 - Ahmad Habboush

:
Ant Colony Optimization (ACO) Based MANET Routing Protocols: A Comprehensive Review. 82-92 - Yin Sheng Zhang:

Applicability Analysis of Semi-Network Operating System. 93-97 - Mina Elmaallam, Hicham Bensaid, Abdelaziz Kriouile:

A Maturity Model for Assessing IS Risk Management Activity Considering the Dependencies Between Its Elements. 98-111
Volume 12, Number 2, 2019
- Chongyi Yang, Wanyu Huang, Ruoqi Zhang, Rui Kong:

Portrait Extraction Algorithm Based on Face Detection and Image Segmentation. 1-13 - Muhammad Adeel Talib, Muhammad Nabeel Talib, Madiha Akhtar:

Service Packaging: A Pattern Based Approach Towards Service Delivery. 14-34 - Yanling Li, Chuansheng Wang, Qi Wang, Jieling Dai, Yushan Zhao:

Secure Multi-User k-Means Clustering Based on Encrypted IoT Data. 35-45 - Mona Alghamdi, Khalid Alomar:

Developing a Web Credibility Evaluation Tool Using PROMETHEE Method. 46-57 - Chongyi Yang, Chanpin Chen, Zhenhao Wu, Jiashun Jiang, Sicheng Su, Xue Kang, Qingping Dou:

Multi-Channel Digital Oscilloscope Implementation over Android Device. 58-70 - Imeh J. Umoren, Daniel E. Asuquo, Onukwugha Gilean, Mfon Esang:

Performability of Retransmission of Loss Packets in Wireless Sensor Networks. 71-86 - Yuanchao Liu, Bo Pang:

Opinion Spam Detection based on Annotation Extension and Neural Networks. 87- - Udoinyang G. Inyang

, Uduak Augustine Umoh, Ifeoma C. Nnaemeka, Samuel A. Robinson
:
Unsupervised Characterization and Visualization of Students' Academic Performance Features. 103-116 - Hend Khalid Alkahtani:

Safeguarding the Information Systems in an Organization through Different Technologies, Policies, and Actions. 117-125 - Marwan Abo Zanona, Anmar Abuhamdah, Bassam Mohammed El-Zaghmouri:

Arabic Hand Written Character Recognition Based on Contour Matching and Neural Network. 126-137 - Zineb Mcharfi, Bouchra El Asri:

Towards Efficient Tracing in Software Product Lines: Research Methodology. 138-145 - Marwan Abo Zanona:

Image Processing & Neural Network Based Breast Cancer Detection. 146-
Volume 12, Number 3, 2019
- Soumaya Amraoui, Mina Elmaallam, Hicham Bensaid, Abdelaziz Kriouile:

Information Systems Risk Management: Litterature Review. 1-20 - Yijian Liu, Ming Chen, Jihong Chen:

Practical Nozzle Temperature Control Method for Robot FDM Printing System. 21-26 - Sara Moazzezi Eftekhar, Witold Suryn:

A Proposition of Modifications and Extensions of Cloud Computing Standards for Trust Characteristics Measures. 27-41 - Driss El Hannach, Rabia Marghoubi

, Zineb El Akkaoui, Mohamed Dahchour:
Analysis and Design of a Project Portfolio Management System. 42-57 - Javaid Syed, Ruth M. Tappin:

IT Professionals' Personality, Personal Characteristics, and Commitment: Evidence from a National Survey. 58-71 - Jason Earl Thomas, Ryan P. Galligher, Macalah L. Thomas, Gordon C. Galligher:

Enterprise Cybersecurity: Investigating and Detecting Ransomware Infections Using Digital Forensic Techniques. 72-80 - Amadou Chaibou, Ousmane Moussa Tessa, Oumarou Sié:

Modeling the Parallelization of the Edmonds-Karp Algorithm and Application. 81-91 - Asmae Rhanizar

, Zineb El Akkaoui:
A Predictive Framework of Speed Camera Locations for Road Safety. 92-103 - Casper van der Kerk, Attila Csala, Aeilko H. Zwinderman:

Quantum Computing in the Biomedical Sciences; A Brief Introduction into Concepts and Applications. 104-116
Volume 12, Number 4, 2019
- Sulaf Elshaar

, Samira Sadaoui:
Building High-Quality Auction Fraud Dataset. 1- - Jamilah Alokluk:

Archiving and Document Management at Taibah University: A Case Study. 11-19 - E. M. Lavrischeva:

The Theory Graph Modeling and Programming Systems from Module Elements to the Application Areas. 20-39 - Otmane Azeroual

, Joachim Schöpfel
:
Research Intelligence (CRIS) and the Cloud: A Review. 40-55 - Asma El Hamzaoui, Hicham Bensaid, Abdeslam En-Nouaary:

Model Checking of WebRTC Peer to Peer System. 56-71 - Sara Alomari, Salha Abdullah:

Improving an AI-Based Algorithm to Automatically Generate Concept Maps. 72-83 - Otmane Azeroual

:
A Text and Data Analytics Approach to Enrich the Quality of Unstructured Research Information. 84-95 - Oni Omoyemi Abimbola, Akinyemi Bodunde Odunola, Aladesanmi Adegboye Temitope, Ganiyu Adesola Aderounmu, Kamagaté Beman Hamidja:

An Improved Stochastic Model for Cybersecurity Risk Assessment. 96-110 - Adil Iguider, Kaouthar Bousselam, Oussama Elissati, Mouhcine Chami, Abdeslam En-Nouaary:

GO Game Inspired Algorithm for Hardware Software Partitioning in Multiprocessor Embedded Systems. 111-122

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














