Journal: Computer and Information Science

Volume 5, Issue 6

1 -- 5Nabil Arman. A Materialized View for the Same Generation Query in Deductive Databases
6 -- 12D. N. T. Kumar, Qufu Wei. A General Computational Framework and Simulations of Branching Programs of Boolean Circuits Using Higher Order Logic (HOL) Software - An Insight into ECAD Tool Design Paradigm
13 -- 24Arindam Chaudhuri. Forecasting Financial Time Series Using Multiple Regression, Multi Layer Perception, Radial Basis Function and Adaptive Neuro Fuzzy Inference System Models: A Comparative Analysis
25 -- 32Ahmed S. Rashad, Rowayda A. Sadek, Sherif Abdel Aziz El-Sherif. An Efficient Hybrid Detection System for Abnormal Masses in Digital and Analog Mammogram
33 -- 42Eisa Alanazi, Malek Mouhoub, Bandar Mohammed. A Preference-Aware Interactive System for Online Shopping
43 -- 49Hongmei Ge, Chao Xu, Qian Shi. A Protection Method of Target Codes
50 -- 57Rusli Abdullah, Amir Mohamed Talib. Towards a Personal Knowledge Model (PKM) in Collaborative Environment of School Teachers' Community
58 -- 72Jésus Antonio Motta, Laurence Capus, Nicole Tourigny. Evaluation of Efficiency of Linear Techniques to Optimize Attribute Space in Machine Learning: Relevant Results for Extractive Methods of Summarizing
73 -- 87Hend S. Al-Khalifa. WCAG 2.0 Semi-automatic Accessibility Evaluation System: Design and Implementation
88 -- 97Marios Poulos, Ioannis Deliyannis, Andreas Floros. Audio Fingerprint Extraction Using an Adapted Computational Geometry Algorithm

Volume 5, Issue 5

1 -- 0Mingtao Shi. Incorporating Information Security in Analysis of Business Strategy: A Conceptual Framework
17 -- 24Maged Bouchahma, Wanglin Yan. Automatic Measurement of Shoreline Change on Djerba Island of Tunisia
25 -- 34Abbass S. Abbass, Aliaa A. A. Youssif, Atef Z. Ghalwash. Hybrid-Based Compressed Domain Video Fingerprinting Technique
35 -- 44Mohd Afzan Othman, Norlaili Mat Safri, Ismawati Abdul Ghani, Fauzan Khairi Che Harun. Characterization of Ventricular Tachycardia and Fibrillation Using Semantic Mining
50 -- 54Jian-Bo Wang, Chong-jun Fan, Lei Bai. Air Traffic Forecast Empirical Research Based on the MCMC Method
55 -- 68Pradip Kumar Biswas, Alberto Moreira Baptista. Growth of ICT Capital and Deceleration of Labour Productivity in the EU Countries: The Missing Links
81 -- 87Jianhao Tan, Jing Zhang 0014, Ya Wang. A Kind of CTA Bone Removal Technology Based on the Improved Watershed Algorithm
88 -- 92Dawletbay Utebaev. Finite Element Method for Internal Wave Equation for Stratified Fluid
93 -- 0Manuel Alberto M. Ferreira, Marina Andrade, José António Filipe. The Age or Excess of the M|G|inf Queue Busy Cycle Mean Value

Volume 5, Issue 4

1 -- 24Vahid Garousi, Tan Varma. A Bibliometrics Analysis of Canadian Electrical and Computer Engineering Institutions (1996-2006) Based on IEEE Journal Publications
25 -- 52Athanasios Margaris. Simulation and Visualization of Chaotic Systems
53 -- 0Mohamed A. El-Zawawy, Hamada A. Nayel. Type Systems Based Data Race Detector
61 -- 67Latifa Oubedda, Brahim Erraha, Mohamed Khalfaoui. Data Intelligent Analysis for Decision-Making at Universities
68 -- 76Ahmed Roumane, Kechar Bouabdellah, Kouninef Belkacem. Energy Efficient Fault Tolerant Routing Mechanism for Wireless Sensor Network
77 -- 82Chao Xu, Hongmei Ge. Research and Implementation of the Cloud Platform Based on the B-learning
83 -- 101Moses Ekpenyong, Emem Obong Udoh. Morpho-Syntactic Analysis Framework for Tone Language Text-to-Speech Systems
110 -- 115Zhisheng Wang, Xiaobing Xu. Improved SOM-Based High-Dimensional Data Visualization Algorithm
116 -- 131Waldo Hasperué, Laura Armando De Giusti. Rule Extraction on Numeric Datasets Using Hyper-rectangles
132 -- 0Davood Kheyri, Mojtaba Karami. A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET

Volume 5, Issue 3

2 -- 19Olabode Olatubosun, Oluwole Charles Akinyokun. Modeling and Simulation of a Decision Support System for Population Census in Nigerian
27 -- 36Majed Bouchahma, Wanglin Yan, Mohammed Ouessar. Island Coastline Change Detection Based on Image Processing and Remote Sensing
37 -- 48Youssef Bassil, Mohammad Alwani. Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information
49 -- 55Jing Xu, Wei Zhao, Peng Liu, Xianglong Tang. An Improved Guidance Image Based Method to Remove Rain and Snow in a Single Image
56 -- 66Noreen Sarai, Godfrey Sithole. Analysis of the Process and Outcomes of Eportfolio Development to Recognise Formal Learning in Zimbabwe
67 -- 75Mohamed A. El-Zawawy, Nagwan Moustafa Daoud. New Error-recovery Techniques for Faulty-Calls of Functions
76 -- 82Chao Xu, Hongmei Ge. An Application Research on Configuration Software System Platform Based on Component Technology
83 -- 89Ahmad Khader Haboush, Mohammad Al Nabhan, Motassem Al-Tarazi, Mohammad Al-Rawajbeh. Load Balancing Using Multiple Node Disjoint Paths
90 -- 96Iraky Khalifa, Hala Mohamed Abbas. Mobility Prediction in Dynamic Grids
97 -- 109Mina Elmaallam, Abdelaziz Kriouile. A Model of Maturity for IS Risk Management Case Study
110 -- 121Rafiqul Zaman Khan, Noor Adnan Ibraheem. Survey on Gesture Recognition for Hand Image Postures
122 -- 0Jingchun Feng, Fujie Zhang, Dandan Zhu, Fei Zhang. Function Point Estimation and Demonstration on Website Projects

Volume 5, Issue 2

2 -- 10Jeff Butterfield, Thad Crews. Casting a Wider Net: A Longitudinal Study Exploring Gender Differences, Influences and Attitudes Impacting Academic Major Selection in Computing
11 -- 21Abdallah Alashqur. Using a Lattice Intension Structure to Facilitate User-Guided Association Rule Mining
22 -- 28Mingqiu Li. Study on the Simulation of the APT Rough Tracing System Based on the Predictive Control Technology
29 -- 38Gary Cantrell, David A. Dampier, Yoginder S. Dandass, Nan Niu, A. Chris Bogen. Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model
39 -- 48Ali Salih Mahmoud Saudi, Aliaa A. A. Youssif, Atef Z. Ghalwash. Computer Aided Recognition of Vocal Folds Disorders by Means of RASTA-PLP
49 -- 54Kaige Chen, Xiaojun Han, Tenghao Huang. Target Detection Algorithm Based on the Movement of Codebook Model
55 -- 68Justice G. Djokoto. The Use of Farm Information Systems among Grasscutter Farmers in Ga-South Municipality and Awutu-Senya District in Ghana
69 -- 74Yahya S. H. Khraisat. Analysis of the Parameters of Symmetrical Multi - Fed Full - Wave Dipole Antenna
75 -- 78Chunsheng Zhang. The Intelligent Decision Supporting Technology of Cloud-Based Public Data Warehouse
79 -- 87Marwa M. A. Elfattah, Aliaa A. A. Youssif, Ebada Sarhan Ahmed. Handset Malwares Threats Feature Extraction Based on Behavior Analysis
88 -- 93Sami M. Alhomod, Mohd Mudasir Shafi. Privacy Policy in E Government Websites: A Case Study of Saudi Arabia
94 -- 97Ying Zheng. Analysis and Design of GRB System Based on WSRF Web Service
98 -- 104Siti Zobidah Omar, Hayrol Azril Mohamed Shaffril, Jusang Bolong, Jeffrey Lawrence D'Silva. Investigating Rural Library Usage among Rural Youth in Malaysia: Its Corresponding Determinants and Impacts
105 -- 110Mostafa Elhachloufi, Ahmed El Oirrak, Driss Aboutajdine, Kaddioui Mohamed Najib. 3D Recognition Using Neural Networks
111 -- 0Youyun Ao. An Empirical Analysis of Fitness Assignment and Diversity-Preserving in Evolutionary Multi-Objective Optimization

Volume 5, Issue 1

2 -- 12Raymond Aschheim, Smain Femmam, M. Faouzi Zerarka. New "Graphiton" Model: a Computational Discrete Space, Self-Encoded as a Trivalent Graph
13 -- 19Dayong Wu, Yu Zhang, Ting Liu. Unsupervised Query Segmentation Using Monolingual Word Alignment Method
20 -- 31Ahmed H. Gabr, Sherif Keshk, Aliaa A. A. Youssif. Effect of Sensor Mobility and Channel Fading on Wireless Sensor Network Clustering Algorithms
32 -- 37Huigang Fu, Chongjun Fan, Jianbai Wang, Ding Fang, Lu Yu, Xianglai Ran. Research and Planning of Application Blueprint for Shanghai Airport Business Intelligence System
38 -- 48Thomas J. B. Kropmans, Barry G. G. O'Donovan, David Cunningham, Andrew W. Murphy, Gerard Flaherty, Debra Nestel, Fidelma P. Dunne. An Online Management Information System for Objective Structured Clinical Examinations
49 -- 54Zhi Wu, Yuedao Jiang, Genzhu Bai. Segmented Optimal Multi-Degree Reduction Approximation of Bézier Curve
55 -- 61Belkacem Athamena, Zina Houhamdi. Structured Acceptance Test Suite Generation Process for Multi-Agent System
62 -- 76Azizol Abdullah, Rohaya Latip, Wan Mohd Azraei Wan Mustapha. Evaluation of an Economy-Based File Replication Strategy for Malaysian Research and Education Network (MYREN) Data Grid Model
77 -- 86Mahdi Hariri, Shahriar B. Shokouhi. Robustness of Multi Biometric Authentication Systems against Spoofing
87 -- 96Yahya S. H. Khraisat. Design a Wireless Meteorological Station in Jordan
107 -- 112Guohua Zhang. Study on Compound Model of Forest-Pulp Enterprise Production Logistics Intelligent Distribution System
113 -- 122Asim M. Murshid, S. N. Ahmad. VLSI Architecture for Fuzzy Inference Processor using Triangular-Shaped Membership Function
123 -- 0Mingqiu Li. Research on the Simulation of Time-Delay System