Journal: Computer and Information Science

Volume 12, Issue 4

1 -- 0Sulaf Elshaar, Samira Sadaoui. Building High-Quality Auction Fraud Dataset
11 -- 19Jamilah Alokluk. Archiving and Document Management at Taibah University: A Case Study
20 -- 39E. M. Lavrischeva. The Theory Graph Modeling and Programming Systems from Module Elements to the Application Areas
40 -- 55Otmane Azeroual, Joachim Schöpfel. Research Intelligence (CRIS) and the Cloud: A Review
56 -- 71Asma El Hamzaoui, Hicham Bensaid, Abdeslam En-Nouaary. Model Checking of WebRTC Peer to Peer System
72 -- 83Sara Alomari, Salha Abdullah. Improving an AI-Based Algorithm to Automatically Generate Concept Maps
84 -- 95Otmane Azeroual. A Text and Data Analytics Approach to Enrich the Quality of Unstructured Research Information
96 -- 110Oni Omoyemi Abimbola, Akinyemi Bodunde Odunola, Aladesanmi Adegboye Temitope, Ganiyu Adesola Aderounmu, Kamagaté Beman Hamidja. An Improved Stochastic Model for Cybersecurity Risk Assessment
111 -- 122Adil Iguider, Kaouthar Bousselam, Oussama Elissati, Mouhcine Chami, Abdeslam En-Nouaary. GO Game Inspired Algorithm for Hardware Software Partitioning in Multiprocessor Embedded Systems

Volume 12, Issue 3

1 -- 20Soumaya Amraoui, Mina Elmaallam, Hicham Bensaid, Abdelaziz Kriouile. Information Systems Risk Management: Litterature Review
21 -- 26Yijian Liu, Ming Chen, Jihong Chen. Practical Nozzle Temperature Control Method for Robot FDM Printing System
27 -- 41Sara Moazzezi Eftekhar, Witold Suryn. A Proposition of Modifications and Extensions of Cloud Computing Standards for Trust Characteristics Measures
42 -- 57Driss El Hannach, Rabia Marghoubi, Zineb E. L. Akkaoui, Mohamed Dahchour. Analysis and Design of a Project Portfolio Management System
58 -- 71Javaid Syed, Ruth M. Tappin. IT Professionals' Personality, Personal Characteristics, and Commitment: Evidence from a National Survey
72 -- 80Jason Earl Thomas, Ryan P. Galligher, Macalah L. Thomas, Gordon C. Galligher. Enterprise Cybersecurity: Investigating and Detecting Ransomware Infections Using Digital Forensic Techniques
81 -- 91Amadou Chaibou, Ousmane Moussa Tessa, Oumarou Sié. Modeling the Parallelization of the Edmonds-Karp Algorithm and Application
92 -- 103Asmae Rhanizar, Zineb El Akkaoui. A Predictive Framework of Speed Camera Locations for Road Safety
104 -- 116Casper van der Kerk, Attila Csala, Aeilko H. Zwinderman. Quantum Computing in the Biomedical Sciences; A Brief Introduction into Concepts and Applications

Volume 12, Issue 2

1 -- 13Chongyi Yang, Wanyu Huang, Ruoqi Zhang, Rui Kong. Portrait Extraction Algorithm Based on Face Detection and Image Segmentation
14 -- 34Muhammad Adeel Talib, Muhammad Nabeel Talib, Madiha Akhtar. Service Packaging: A Pattern Based Approach Towards Service Delivery
35 -- 45Yanlign Li, Chuansheng Wang, Qi Wang, Jieling Dai, Yushan Zhao. Secure Multi-User k-Means Clustering Based on Encrypted IoT Data
46 -- 57Mona Alghamdi, Khalid Alomar. Developing a Web Credibility Evaluation Tool Using PROMETHEE Method
58 -- 70Chongyi Yang, Chanpin Chen, Zhenhao Wu, Jiashun Jiang, Sicheng Su, Xue Kang, Qingping Dou. Multi-Channel Digital Oscilloscope Implementation over Android Device
71 -- 86Imeh J. Umoren, Daniel Asuquo, Onukwugha Gilean, Mfon Esang. Performability of Retransmission of Loss Packets in Wireless Sensor Networks
87 -- 0Yuanchao Liu, Bo Pang. Opinion Spam Detection based on Annotation Extension and Neural Networks
103 -- 116Udoinyang G. Inyang, Uduak A. Umoh, Ifeoma C. Nnaemeka, Samuel A. Robinson. Unsupervised Characterization and Visualization of Students' Academic Performance Features
117 -- 125Hend K. Alkahtani. Safeguarding the Information Systems in an Organization through Different Technologies, Policies, and Actions
126 -- 137Marwan Abo Zanona, Anmar Abuhamdah, Bassam Mohammed El-Zaghmouri. Arabic Hand Written Character Recognition Based on Contour Matching and Neural Network
138 -- 145Zineb Mcharfi, Bouchra El Asri. Towards Efficient Tracing in Software Product Lines: Research Methodology
146 -- 0Marwan Abo Zanona. Image Processing & Neural Network Based Breast Cancer Detection

Volume 12, Issue 1

1 -- 11Houda Kriouile, Bouchra El Asri. Theoretical and Pragmatic Cases of a Rich-Variant Approach for a User-Aware Multi-Tenant SaaS Applications
12 -- 22Hussain Mohammad Abu-Dalbouh. Developing Mobile Tracking Applications for Patient Treatment
23 -- 32Alissar Nasser. Measuring the Performance of Hospitals in Lebanese qadas Using PCA- DEA Model
33 -- 43Zhi Li, Xiaozhu Zou. A Review on Personalized Academic Paper Recommendation
44 -- 48Fengchun Yin, Jun Yin. Research on an Economic Localization Approach
49 -- 52Guohua Zhang, Kangting Zhao, Yi Li. Research and Improvement Method Based on k-mean Clustering Algorithm
53 -- 58Saleem Issa Al Zoubi, Ahmad Issa Al Zoubi, Mohmmad Al Zoubi. Factor That Influence To Acceptance M-Learning among Jordanian Students
59 -- 71Ikram Dehmouch, Bouchra El Asri, Maryem Rhanoui, Mina Elmaallam. Feature Models Preconfiguration Based on User Profiling
72 -- 81Sergey Voronin. Multi-Stage Image Restoration in High Noise and Blur Settings
82 -- 92Ahmad Habboush. Ant Colony Optimization (ACO) Based MANET Routing Protocols: A Comprehensive Review
93 -- 97Yin Sheng Zhang. Applicability Analysis of Semi-Network Operating System
98 -- 0Mina Elmaallam, Hicham Bensaid, Abdelaziz Kriouile. A Maturity Model for Assessing IS Risk Management Activity Considering the Dependencies Between Its Elements