Journal: Computer and Information Science

Volume 8, Issue 4

1 -- 11Olivier Rukundo. Effects of Improved-Floor Function on the Accuracy of Bilinear Interpolation Algorithm
12 -- 0Kadir Alpaslan Demir. Multi-View Software Architecture Design: Case Study of a Mission-Critical Defense System
32 -- 39Sabarish Sridhar. A Comprehensive Approach to Image Watermarking, Encryption and Steganography
40 -- 50Aleksandar Karadimce. Model of Cloud-Based Services for Data Mining Analysis
51 -- 55Rafeeq Al-Hashemi, Moha'med Al-Jaafreh, Tahseen Al-Ramadin, Ayman Al-Dmour. A Smart Algorithm for USE-Cases Production Based on Name Entity Recognition
56 -- 63Eman Fares Al Mashagba. Human Identification by Gait Using Time Delay Neural Networks
64 -- 76Anas A. Hadi, Jonathan Cazalas. Improved Recommender for Location Privacy Preferences
77 -- 92Suvir P. Mirchandani. Fuzzy Logic Based Eye-Brain Controlled Web Access System
93 -- 104Muhammad Aqib, Jonathan Cazalas. Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services
105 -- 0Chris Lee. Reviewer Acknowledgements for Computer and Information Science, Vol. 8, No. 4

Volume 8, Issue 3

13 -- 0Fawaz Alassery, Walid K. M. Ahmed, Mohsen Sarraf, Victor Lawrence. Collision Detection in Wireless Sensor Networks Through Pseudo-Coded ON-OFF Pilot Periods per Packet: A Novel Low-Complexity and Low-Power Design Technique
51 -- 63Wala'a M. AlOmari, Hesham Abusaimeh. Modified USB Security Token for User Authentication
64 -- 70H. M. Hijawi, M. H. Saheb. Sequence Pattern Mining in Data Streams
71 -- 82Itimad Raheem Ali, Ghazali Sulong, Hoshang Kolivand. Realistic Lip Syncing for Virtual Character Using Common Viseme Set
83 -- 102Ahmad A. Rabaa'i. An Empirical Investigation on the Adoption of e-Government in Developing Countries: The Case of Jordan
103 -- 118Sanjay Ahuja. Hadoop Based Data Intensive Computation on IaaS Cloud Platforms
119 -- 133Nermin Abdel-Hakim Othman, Ahmed Sharaf Eldin, Doaa Saad El Zanfaly. Handling Uncertainty in Database: An Introduction and Brief Survey
134 -- 144Issam Jebreen. Requirements Determination as a Social Practice: Perceptions and Preferences of Novice Analysts
145 -- 154Jianyu Zheng. The research on Repeater Coordination Based on band plan
155 -- 179Sarah N. Abdulkader, Ayman Atia, Mostafa-Sami M. Mostafa. Authentication systems: principles and threats
180 -- 185David Salb. Using Technology to Retain Baby Boomers in the Workforce
186 -- 194Baydaa Al-Hamadani, Thikra Shubita. A Novel Hyper-Active Algorithm to Estimate Missing Microarray Attributes
195 -- 291Baback Khodadoost. The Computed Scripture: Exponentially Based Fourier Regulated Construct of Quran and its Fundamentally Important Consequences
292 -- 0Chris Lee. Reviewer Acknowledgements for Computer and Information Science, Volume 8, Number 3

Volume 8, Issue 2

1 -- 8Chengwen Jiao, Suixiang Gao, Wenguo Yang. Comparing Algorithms for Minimizing Congestion and Cost in the Multi-Commodity k-Splittable Flow
15 -- 23Natarajan Meghanathan, Tiffani Gardner, Justin Lewis. An Energy-Efficient Tracking Algorithm to Trace a Radioactive Mobile Target in a Wireless Sensor Network
24 -- 36Kazi Mamun. Combating Shill Bidding in Real Time: Prevention, Detection and Response
37 -- 42Mohammad-Hossein Nadimi-Shahraki, Zahra S. Torabi, Akbar Nabiollahi. Using J48 Tree Partitioning for scalable SVM in Spam Detection
43 -- 57Daniel Jovan Sooknanan, Ajay Joshi. Using GUI Design Theory to Develop an Open Source Touchscreen Smartphone GUI
58 -- 63Sanjay Ahuja. System Level Benchmarks for the Cloud
64 -- 72Dongdong Fei, Chen Deng. Novel Method for More Precise Determination of Oscillometric Pulse Amplitude Envelopes
73 -- 88Ashraf A. Shahin. Memetic Elitist Pareto Evolutionary Algorithm for Virtual Network Embedding
89 -- 101Olusegun Folorunso. Knowledge Sharing Trust Level Measurement Adoption Model Based On Fuzzy Expert System
102 -- 112Muhammad Tanvir Alam, Haozhang Li, Atul Patidar. Smart Trading in Smart Grid Using Bitcoin

Volume 8, Issue 1

1 -- 9Zi-Cheng Lan, Yuan-Biao Zhang, Jing Zhang, Xin-Guang Lv. Short-Term Wind Power Forecasting Model based on ICA-BP Neural Network
10 -- 24Somayeh Danafar, Kenji Fukumizu, Faustino Gomez. Kernel-Based Information Criterion
25 -- 35Nidal Yousef, Hassan Altarwaneh, Aysh Alhroob. Best Test Cases Selection Approach Using Genetic Algorithm
36 -- 0Sarah Naiem, Mahmoud M. Abdellatif, Salama S. E. Evaluation of Computer Science and Software Engineering Undergraduate's Soft Skills in Egypt from Student's Perspective
54 -- 61Longfei Dai, Wenguo Yang, Suixiang Gao, Yinben Xia, Mingming Zhu, Zhigang Ji. Non-Real-Time Network Traffic in Software-Defined Networking: A Link Bandwidth Prediction-Based Algorithm
62 -- 73Ashraf A. Shahin. Virtual Network Embedding Algorithms Based on Best-Fit Subgraph Detection
74 -- 94Ken Kin-Kiu Fong, Stanley Kam Sing Wong. Hong Kong Wi-Fi Adoption and Security Survey 2014
95 -- 107Yassine El Hafid, Abdessamad Elrharras, Karim Guennoun, Abdelkader Amri, Mohammed Wahbi. Accelerating the Detection of Spectral Bands by ANN-ED on a GPU
108 -- 118A. Elrharras, S. El Moukhlis, Rachid Saadane, Mohamed Wahbi, A. Hamdoun. FPGA-Based Fully Parallel PCA-ANN for Spectrum Sensing
119 -- 127Abraham Tesso Nedjo, Degen Huang. Augmenting Performance of SMT Models by Deploying Fine Tokenization of the Text and Part-of-Speech Tag
128 -- 134Qian Cao, Xiaoxia Tian. The Structural Characteristics of Tourism Economic Network in Xinjiang Province
135 -- 150Tijane Fatima Zohra Badri, Rachid Saadane, Samir Mbarki, Mohammed Wahbi. Call Admission Control Scheme and Handover Management in LTE Femtocell-Macrocell Integrated Networks
151 -- 162Shu Zhang, Samira Sadaoui, Malek Mouhoub. An Empirical Analysis of Imbalanced Data Classification