Content
November 2024, Volume 17, Issue 2
- 1-1 Opportunities for Using Machine Learning and Artificial Intelligence in Business Analytics
by Conrad Onesime Oboulhas Tsahat & Ngoulou-A -Ndzeli & Charmolavy Goslavy Lionel Nkouka Moukengue - 1-7 Study of the Simulation and Application of the PEEC Method for Modeling the Prediction of Emissions Radiated by the Onboard Electronic Wiring System
by Anthony Bassesuka Sandoka Nzao - 1-28 Proactively Defending Enterprise Computer Systems Against Threats and Vulnerabilities
by Faris Sharaf & Abdullah Alhayajneh & Thaier Hayajneh - 1-39 Generative AI Increases Cybersecurity Risks for Seniors
by Zahm Siyed - 1-52 Application and Innovation of Artificial Intelligence in Forensic Medicine
by Minni Qi & Dan Zhou & Xiaojun Yu - 1-60 Reviewer Acknowledgements for Computer and Information Science, Vol. 17, No. 2
by Chris Lee
May 2024, Volume 17, Issue 1
- 1-1 Expanding the Breadth of Ability in Artificial Intelligence Systems with Decision Trees
by Andrew McInnis Jr & Mohammad Alshibli & Ahmad Alzaghal & Samir Hamada - 1-9 On Preventing and Mitigating Cache Based Side-Channel Attacks on AES System in Virtualized Environments
by Abdullah Albalawi - 1-18 A Model for Total Cost Determination in Open-Source Software Ownership: Case of Kenyan Universities’ Learning Management System
by Duncan Kereu Kodhek & John Wachira Kamau & Faith Mueni Musyoka - 1-36 Principal Components and Assortativity-based Assessment of the Similarity of Crime Metrics across Coterminous Wards in the City of Chicago
by Natarajan Meghanathan - 1-49 Ethical Implication of Artificial Intelligence (AI) Adoption in Financial Decision Making
by Omoshola S. Owolabi & Prince C. Uche & Nathaniel T. Adeniken & Christopher Ihejirika & Riyad Bin Islam & Bishal Jung Thapa Chhetri - 1-57 Reviewer Acknowledgements for Computer and Information Science, Vol. 17, No. 1
by Chris Lee
November 2023, Volume 16, Issue 4
- 1-1 The Evolution of Information Security Strategies: A Comprehensive Investigation of INFOSEC Risk Assessment in the Contemporary Information Era
by Abdullah Al Hayajneh & Hasnain Nizam Thakur & Kutub Thakur - 1-21 Electronic Health System Integration Framework for Secure M-Health Services: A Case of University of Nairobi Hospital
by Samuel Nandasaba & Gregory Wanyembi & Geoffrey Mariga Wambugu - 1-47 Malware Investigation and Analysis for Cyber Threat Intelligence: A Case Study of Flubot Malware
by Uchenna J. Nzenwata & Frank Uchendu & Haruna Ismail & Eluwa M. Jumoke & Himikaiye O. Johnson - 1-65 Proposal of a Visualization System for a Hierarchical Clustering Algorithm: The Visualize Proximity Matrix
by Sulaiman Abdullah Alateyah - 1-78 Applying AI in the Healthcare Sector: Difficulties
by Abdussalam Garba & Muhammad Baballe Ahmad & Mukhtar Ibrahim Bello - 1-84 Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 4
by Chris Lee
August 2023, Volume 16, Issue 3
- 1-1 Identifying and Navigating the Current Trends in Business Librarianship and Data Librarianship
by Renee Pistone - 1-7 The Effect of the Educational Robot on the Motor Reaction on Some Karate Skills
by Mohammed Asim Ghazi - 1-15 On the Convergence of Hypergeometric to Binomial Distributions
by Upul Rupassara & Bishnu Sedai - 1-22 Improving the Classification Ability of Delegating Classifiers Using Different Supervised Machine Learning Algorithms
by Basra Farooq Dar & Malik Sajjad Ahmed Nadeem & Samina Khalid & Farzana Riaz & Yasir Mahmood & Ghias Hameed - 1-30 Drawbacks of Traditional Environmental Monitoring Systems
by Sadiku Aminu Sani & Amina Ibrahim & Abuhuraira Ado Musa & Muntaka Dahiru & Muhammad Ahmad Baballe - 1-36 Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 3
by Chris Lee
May 2023, Volume 16, Issue 2
- 1-1 Studying the Effects of Being Einstein: An Experiment in Social Virtual Reality
by Ian Cummins & Damian Schofield - 1-20 The Role of Machine Learning in the Detection and Classification of Brain Tumors: A Literature Review of the Past Two Years
by Jianyi Wang - 1-29 From Zero to Infinity: Research on the Development Process of Intelligent Manufacturing
by Chen Peng - 1-36 Suhail: A Deep Learning-Based System for Identifying Missing People
by Wareef K. Aljohani & Reem A. Alshehri & Abrar A. Alghamdi & Mashael M. Aljuhani & Dareen A. Alrefaei & Rahaf S. Aljohani & Abdulqader M. Almars - 1-51 Automation-Based User Input Sql Injection Detection and Prevention Framework
by Fredrick Ochieng Okello & Dennis Kaburu & Ndia G. John - 1-63 Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 2
by Chris Lee
February 2023, Volume 16, Issue 1
- 1-1 A Reference Framework for Variability Management of Software Product Lines
by Saiqa Aleem & Luiz Fernando Capretz & Faheem Ahmed - 1-25 Analysis of the Influence of the Earthing Resistance of Pylones on the Performance of the HVAC Line Facing Electromagnetic Transitories Lightning
by Anthony Bassesuka Sandoka Nzao - 1-39 CNN Model for Sleep Apnea Detection Based on SpO2 Signal
by Maryah Abdullah Albuhayri - 1-49 The Role of Digital Technologies in Combating Cyber-Trafficking in Persons Crimes
by Sami Saad Alsemairi - 1-65 Simulation and Analysis of Fully Adiabatic Circuit Designing with Single Power Clock for High-Frequency Low-Power VLSI Circuits
by Yashu Swami - 1-73 Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 1
by Chris Lee
November 2022, Volume 15, Issue 4
- 1-1 Uni-CARE: Universal Interface via Cloud Archive Repository Express
by Sheldon Liang - 1-19 Analysis of Current Trends in Software Aging: A Literature Survey
by Tajmilur Rahman & Joshua Nwokeji & Tejas Veeraganti Manjunath - 1-46 Objects Movement Detection Based on Impulsed Neural Network of the Analogue of the Biological Retinal Model
by Ihar Yeuseyenka & Ihar Melnikau - 1-57 Analysis of Engineering Students Acceptance and Usage of 5G Technology: A Case Study of Gannon University
by Jay Shah & Joshua Nwokeji & Tejas Veeraganti Manjunath & Tajmilur Rahman - 1-66 Security and Performance through Operating System Services; Development of an Anti-Hacking System
by Sahar Badri & Daniyal Alghazzawi - 1-80 Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 4
by Chris Lee
August 2022, Volume 15, Issue 3
- 1-1 Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
by Laura Pryor & Jacob Mallet & Rushit Dave & Naeem Seliya & Mounika Vanamala & Evelyn Sowells-Boone - 1-18 Social Media Behaviour Analysis in Disaster-Response Messages of Floods and Heat Waves via Artificial Intelligence
by VÃctor Ponce-López & Catalina Spataru - 1-37 Integration of AI Supported Risk Management in ERP Implementation
by Petya Biolcheva & Miglena Molhova - 1-47 Homogenous Multiple Classifier System for Software Quality Assessment Based on Support Vector Machine
by Udoinyang G. Inyang & Olufemi S. Adeoye & Edward N. Udo & Edidiong F. Bassey & Enefiok A. Etuk & Fidelia N. Ugwoke & Emmanuel B. Usoro - 1-61 Using a Modified Technology Acceptance Model for a Learning Management System Platform: A Questionnaire Design for Evaluating the Blackboard Learning Management System
by Hussain Mohammad Abu-Dalbouh - 1-72 Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 3
by Chris Lee
May 2022, Volume 15, Issue 2
- 1-1 Darwinism & Other Crumbling Theories in Science
by Nikolaos E Myridis - 1-2 A Brief Presentation of the Knowledge Paths for Semiotics (KPS) Project: Creating Digital Research Tools
by Dimitra Sarakatsianou - 1-6 Out of the Box Artificial Intelligence (OBAI): The Beginning of a New Era in Artificial Intelligence
by Satish Gajawada & Hassan M. H. Mustafa - 1-15 Transcendental Logic-Based Formalism for Semantic Representation of Software Project Requirements Architecture
by Oleg V. Moroz & Oleksii O. Pysarchuk & Tetiana I. Konrad - 1-38 A Geometry Consisting of Singularities Containing Only Integers
by Qing Li - 1-43 A Survey of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University
by Boniface Mwangi Wambui & Joyce W Gikandi & Geoffrey Mariga Wambugu - 1-58 Efficient and Traceable Anonymous Credentials on Smart Cards
by Wei Wu - 1-68 Multi-Issuer Attribute-based Anonymous Credential with Traceability and Revocation
by Ye Yang - 1-78 Anomaly Detection Methodology of In-vehicle Network Based on Graph Pattern Matching
by Mengsi Sun & Jiarun Wu - 1-89 Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 2
by Chris Lee
February 2022, Volume 15, Issue 1
- 1-1 A Decision Support System for Undecided and Exploratory Students
by Sobitha Samaranayake & Athula D. A. Gunawardena & Robert Meyer - 1-13 A New Method for Calculating Energy of Matter
by Qing Li - 1-20 A Review of Factors Affecting the Effectiveness of Phishing
by Robert Karamagi - 1-32 Divergence and Curl of COVID19 Spreading in the Lower Peninsula of Michigan
by Yanshuo Wang - 1-47 VR Users Are More Relaxed and Optimistic during COVID Lockdown than Others
by Erik Geslin & Erik Hammer - 1-57 MiniWarner: An Novel and Automatic Malicious Phishing Mini-apps Detection Approach
by Junhan Chen - 1-66 Dual Fine-Grained Public-Key Searchable Encryption from Lattices
by Zike Jiang & Shixin Chen - 1-81 Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 1
by Chris Lee
November 2021, Volume 14, Issue 4
- 1-1 The Role of e-Government in Enhancing Postgraduate Employment Transparency in Saudi Arabia
by Mohammed Al-Saif & Ahmed Abdel-Whab - 1-11 Real-time Automated Detection and Recognition of Nigerian License Plates via Deep Learning Single Shot Detection and Optical Character Recognition
by Kayode David Adedayo & Ayomide Oluwaseyi Agunloye - 1-20 Non-Delay Tolerant Non-Overlay Routing Protocols Performance Evaluation for VANET
by Mahmoud Ali Al Shugran - 1-32 E-commerce Web App in Azure Cloud: Considerations, Components of Implementation and Schematic Design
by Rasha Al-Mahrouqi & Khalsa Al Siyabi & Amani Al Nabhani & Salma Al-Hashemi & Shoukath Ali Muhammed - 1-36 Video Game Escapism During Quarantine
by Eian Prinsen & Damian Schofield - 1-47 Six-in-a-Row Artificial Intelligence Design and Its Implementation Based on Java
by Liujue Zhang - 1-57 Automatic Identification and Filtration of COVID-19 Misinformation
by Paras Gulati & Abiodun Adeyinka. O. & Saritha Ramkumar - 1-65 Simulation Research on the Complexity of Life Game
by Jiacheng Huang - 1-79 Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 4
by Chris Lee
August 2021, Volume 14, Issue 3
- 1-1 Exploring Public Attitudes toward E-Government Health Applications Used During the COVID-19 Pandemic: Evidence from Saudi Arabia
by Dalal Bamufleh & Amani Saud Alshamari & Asrar Saud Alsobhi & Hanan Hisham Ezzi & Waad Sultan Alruhaili - 1-25 Verifying the Audio Evidence to Assist Forensic Investigation
by Hasan Fayyad-Kazan & Ale Hejase & Imad Moukadem & Sondos Kassem-Moussa - 1-38 A Novel Approach for Robust Perceptual Image Hashing
by Azhar Hadmi & Awatif Rouijel - 1-49 Using E-learning System in Jordanian Universities during the COVID-19 Pandemic: Benefits and Challenges
by Ahmad Abu-Al-Aish - 1-63 Targeting Reputation: A New Vector for Attacks to Critical Infrastructures
by Giampiero Giacomello & Oltion Preka - 1-78 On Bi-gram Graph Attributes
by Thomas Konstantinovsky & Matan Mizrachi - 1-87 Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 3
by Chris Lee
May 2021, Volume 14, Issue 2
- 1-1 Universal Transcendental Logic-Based Ontology
by Oleg V. Moroz - 1-10 Cyber Security amid COVID-19
by Hussin J. Hejase & Hasan F. Fayyad-Kazan & Ale J. Hejase & Imad A. Moukadem - 1-26 Efficient and Privacy-Preserving Multi-User Outsourced K-Means Clustering
by Na Li & Lianguan Huang & Yanling Li & Meng Sun - 1-42 Monitor Potential Attack Locations in a Specific Area within DTN Network
by Iyas Alodat - 1-50 The Impact of Augmented Reality on E-learning Systems in Saudi Arabia Universities
by Asma Alsayyar & Riyad Almakki - 1-63 Research on Entity Label Value Assignment Method in Knowledge Graph
by Linqing Yang & Bo Liu & Youpei Huang & Xiaozhuo Li - 1-75 A Nonuniform Reference Voltage Optimization Based on Relative-Precision-Loss Ratios in MLC NAND Flash Memory
by Caifeng Lv & Xiujie Huang & Shancheng Zhao - 1-87 Game Playing: Proposing and Developing Queen Challenge Puzzle Game from 1 to 25 Levels
by Hussain Mohammad Abu-Dalbouh & Fahad Almansour & Nehal Aldowighri - 109-109 Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 2
by Chris Lee
February 2021, Volume 14, Issue 1
- 1-1 Brick and Mortar Education vs. SCORM-based Education in Computer-programming Courses: A Comparative Study
by Mohammed Abu Shquier - 1-8 An O(nlogn/logw) Time Algorithm for Ridesharing
by Yijie Han & Chen Sun - 1-14 Blind Electronic Mail System
by Maham Imtiaz & Samina Khalid & Saleema Khadam & Sumaira Arshad & Ali Raza & Tehmina Khalil - 1-44 Personality and Employees’ Information Security Behavior among Generational Cohorts
by Cartmell Warrington & Javaid Syed & Ruth M. Tappin - 1-45 Efficient Object Detection Model for Real-time UAV Application
by Subrahmanyam Vaddi & Dongyoun Kim & Chandan Kumar & Shafqat Shad & Ali Jannesari - 1-54 Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 1
by Chris Lee
November 2020, Volume 13, Issue 4
- 1-1 Arabic-to-Malay Machine Translation Using Transfer Approach
by Mohammed M. Abu Shquier - 1-12 A New Trend of Digital Healthcare in 3D Printed Medicines
by Itimad Raheem Ali & Jwan K. Alwan & Dhulfiqar Saad Jaafar & Hoshang Kolivand - 1-23 GMSM: A Design Method for Misinformation-Aware Social Media
by Malik Almaliki & H. Hashim & A. Alzighaibi & E. Atlam - 1-32 AHP Method to Support Decision Making for Sustainability
by Wail El hilali & Abdellah El manouar & Mohammed Abdou Janati Idrissi - 1-42 Securing and Improving the Internet Architecture
by Austin Liu - 1-48 Reviewer Acknowledgements for Computer and Information Science, Vol. 13, No. 4
by Chris Lee
August 2020, Volume 13, Issue 3
- 1-1 Traffic Analysis of a Congested and Uncongested Network in a Sequential Server Model
by Afsana Ahamed & Hamid Vakilzadian - 1-16 Enhancing Software Evolution Requirements Engineering Based on User Feedback
by M.Redwan aljannan & Manal A. Ismail & Akram Salah - 1-30 Digital Transformation for Sustainability: A Qualitative Analysis
by Wail El hilali & Abdellah El Manouar & Mohammed Abdou Janati Idrissi - 1-40 Bidirectional Residual LSTM-based Human Activity Recognition
by Zohair Malki & Elsayed Atlam & Guesh Dagnew & Ahmad Reda Alzighaibi & Elmarhomy Ghada & Ibrahim Gad - 1-49 Experimental Instructional Design of Code Slicing and Data Verification by Artificial Interruption
by Guoguan WEN & Mingliang ZHANG & Qingping DOU - 1-57 Topic Subject Creation Using Unsupervised Learning for Topic Modeling
by Rashid Mehdiyev & Jean Nava & Karan Sodhi & Saurav Acharya & Annie Ibrahim Rana - 1-66 Improvements of Automatic Extraction of FA Words Tendency using Non_linear Approach
by Talal H. Noor & El-Sayed Atlam & Ghada Elmarhomy & Ahmed Abd Elwahab & Rawda Draz & Mahmoud Elmarhoumy - 1-73 Integrating Radiology into an AI System for Physician Decision Making
by Venkata A. Paruchuri & Bobby C. Granville - 1-82 A Mobile QR Code Application for an Article: QR-ticle
by Esra Eroğlu & Esma Ergüner Özkoç - 1-89 Main Scientific and Technological Problems in the Field of Architectural Solutions for Supercomputers
by Andrey Molyakov - 1-93 Riemannian Proximal Policy Optimization
by Shijun Wang & Baocheng Zhu & Chen Li & Mingzhe Wu & James Zhang & Wei Chu & Yuan Qi - 103-103 Reviewer Acknowledgements for Computer and Information Science, Vol. 13, No. 3
by Chris Lee
May 2020, Volume 13, Issue 2
- 1-1 Software Based Programmable IGBT IPM Dead-Time Insertion Module Using 16-bit Micro Controller for BLDC Motor Control Application with 3-Phase Sinusoidal and Trapezoidal Drive
by Hastanto SM Widodo & Suryadi Harmanto & Sarifuddin Madenda & Lingga Hermanto - 1-13 Security of Broadcast Authentication for Cloud-Enabled Wireless Medical Sensor Devices in 5G Networks
by Abdullah Al Hayajneh & Md Zakirul Alam Bhuiyan & Ian McAndrew - 1-27 Using Deep Learning to Block Web Tracking
by Jianyi Wang - 1-32 Control Design for Attitude and Position Based on Real Time Color Tracking System with Image Processing Technique
by Hsu Myat Tin Swe & Hla Myo Tun & Maung Maung Latt - 1-43 Elemental Design Base of Chinese Supercomputer Technologies
by Andrey Molyakov - 1-46 Multi-Agent System for Post-Stroke Medical Monitoring in Web-Based Platform
by Eduardo S. Rios-Ramos & Roberto A. Melendez-Armenta & Jose A. Vazquez-Lopez & Luis A. Morales-Rosales - 1-54 Increasing Student Engagement with Personalized Emails
by Bshaer Alwagdani & Khalid Alomar - 1-75 An Efficient Acceleration of Solving Heat and Mass Transfer Equations with the Second Kind Boundary Conditions in Capillary Porous Radially Composite Cylinder Using Programmable Graphics Hardware
by Hira Narang & Fan Wu & Abdul Rafae Mohammed - 1-87 Reviewer Acknowledgements for Computer and Information Science, Vol. 13, No. 2
by Chris Lee
February 2020, Volume 13, Issue 1
- 1-1 Performance Evaluation of a Classification Model for Oral Tumor Diagnosis
by Awoyelu I. O. & Ojo B. R. & Aregbesola S. B. & Soyele O. O. - 1-10 A Context-Aware and Self-Adaptation Strategy for Cloud Service Selection and Configuration in Run-Time
by Asmae Benali & Bouchra El Asri - 1-20 Service Broker-Based Architecture Using Multi-Criteria Decision Making for Service Level Agreement
by Imane Haddar & Brahim Raouyane & Mostafa Bellafkih - 1-34 Evaluation of Scientific Research Based on Key Performance Indicators (KPIs): A Case Study in Al-Imam Mohammad Ibn Saud Islamic University
by Fahad Omar Alomary - 1-41 Artificial God Optimization - A Creation
by Satish Gajawada & Hassan M. H. Mustafa - 1-51 Sort Integers into a Linked List
by Yijie Han & Hemasree Koganti & Nikita Goyal - 1-58 A Formalization of Group Decision Making in Multi-Viewpoints Design
by Saloua Bennani & Iliass Ait El Kouch & Mahmoud El Hamlaoui & Sophie Ebersold & Bernard Coulette & Mahmoud Nassar - 1-72 Quantum Cryptography for Nuclear Command and Control
by Derek Hall & Timothy Sands - 1-80 Multi-Channel Similarity Based Compression
by Sergey Voronin - 1-90 The Impact of Information Technology on Information System Effectiveness in Jordanian Telecommunication Companies
by Majd Al-Hawamdeh & Shaker Alkshali - 1-99 Reviewer Acknowledgements for Computer and Information Science, Vol. 13, No. 1
by Chris Lee