| Issue | Title | |
| Volume 2, Issue 5, November 2013 | The use of a Comprehensive Identification Infrastructure in Enhancing the lifetime of Sensor Networks | Abstract PDF |
| Payam Salehi, Mohammad Ebrahim Shiri Ahmad Abadi | ||
| Volume 3, Issue 1, January 2014 | Theoretical Factors underlying Data Mining Techniques in Developing Countries: a case of Tanzania | Abstract PDF |
| Salim Amour Diwani, Anael Sam | ||
| Volume 5, Issue 4, July 2016 | Timely diagnosis of the heart disease using data mining algorithm | Abstract PDF |
| Hamid Reza Sahebi, Mohammad Azimimehr | ||
| Volume 4, Issue 3, May 2015 | To Go or Not To Go: N-hop Congestion Notice with Experience Support for Dynamic Detouring | Abstract PDF |
| Kuen-Liang Sue, Chih-Yi Kao | ||
| Volume 3, Issue 6, November 2014 | Towards a Secure Maturity Model for Protecting e-Government Services in Tanzania: A Stakeholders View | Abstract PDF |
| Mohamed D. Waziri, Zaipuna O. Yonah | ||
| Volume 3, Issue 5, September 2014 | Towards A Secure Remote Electronic Voting in Tanzania Organizational Challenges | Abstract PDF |
| Sylvester Kimbi, Yaw Nkansah-Gyekye, Kisangiri Michael | ||
| Volume 5, Issue 2, March 2016 | Towards An Algorithms Ontology Cluster: for Modular Code Reuse and Polyglot Programming | Abstract PDF |
| Karabo Selaolo, Hlomani Hlomani | ||
| Volume 3, Issue 2, March 2014 | Traditional Host based Intrusion Detection Systems’ Challenges in Cloud Computing | Abstract PDF |
| Masoudeh Keshavarzi | ||
| Volume 2, Issue 4, September 2013 | Traffic-Aware Selection Strategy for Application-Specific 3D NoC | Abstract PDF |
| Sanaz Azampanah, Azadeh Eskandari, Ahmad Khademzadeh, Fathollah Karimi | ||
| Volume 2, Issue 3, July 2013 | USE OF E-LEARNING TOOLS TO SOLVE GROUP WORK PROBLEMS IN HIGHER EDUCATION: A CASE STUDY OF GULF COUNTRY | Abstract PDF |
| HABIB ULLAH KHAN | ||
| Volume 2, Issue 5, November 2013 | Using Contourlet Transform and Discrete Cosine Transform and SVD for Digital Watermarking | Abstract PDF |
| S. A. Hosseini, S. Ghofrani | ||
| Volume 3, Issue 6, November 2014 | Using generalised Łukasiewicz’s t-norm to represent and improve fuzzy rough approximations | Abstract PDF |
| Iwan Tabakow | ||
| Volume 4, Issue 3, May 2015 | Using GIS data and satellite images to manage hazard zone in earthquake | Abstract PDF |
| Hamoon Fathi, Mohammad Salman Ghavami | ||
| Volume 5, Issue 1, January 2016 | Using k-means clustering algorithm for common lecturers timetabling among departments | Abstract PDF |
| hamed babaei, Jaber Karimpour, Sajjad Mavizi | ||
| Volume 4, Issue 5, September 2015 | Variability management challenges in small and medium sized enterprises (SMEs) | Abstract PDF |
| Tuomas Ihme, Päivi Parviainen, Susanna Teppola | ||
| Volume 4, Issue 3, May 2015 | VCS-RSCBAODV: Vehicular Cloud Storage Concepts for RSCBAODV Protocol to Reduce Connection Breakage in VANET | Abstract PDF |
| N. Arul Kumar, Dr. E. George Dharma Prakash Raj | ||
| Volume 3, Issue 6, November 2014 | Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol | Abstract PDF |
| Seyed Mohammad Alavi, Behzad Abdolmaleki, Karim Baghery | ||
| Volume 2, Issue 3, July 2013 | Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks | Abstract PDF |
| Mohammad Reza Rohbanian, Mohammad Rafi Kharazmi, Alireza Keshavarz-Haddad, Manije Keshtgary | ||
| Volume 3, Issue 2, March 2014 | Weighted Twin Support Vector Machine with Universum | Abstract PDF |
| Shuxia Lu, Le Tong | ||
| Volume 4, Issue 6, November 2015 | Writer Identity Recognition and Confirmation Using Persian Handwritten Texts | Abstract PDF |
| aida sheikh, Hassan Khotanlou | ||
| Volume 4, Issue 4, July 2015 | « ACASYA »: a knowledge-based system for aid in the storage, classification, assessment and generation of accident scenarios. Application to the safety of rail transport systems | Abstract PDF |
| Dr. Habib HADJ-MABROUK, Dr. Hinda MEJRI | ||
| 326 - 346 of 346 Items | << < 9 10 11 12 13 14 | |
|
Advances in Computer Science : an International Journal






