| Issue | Title | |
| Volume 2, Issue 2, May 2013 | A Multi Hop Clustering Algorithm For Reduce Energy Consumption in Wireless Sensor Networks | Abstract PDF |
| Mohammad Ahmadi, Mahdi Darvishi | ||
| Volume 4, Issue 1, January 2015 | A National Model to Supervise on Virtual Banking Systems through the Bank 2.0 Approach | Abstract PDF |
| Mehrpooya Ahmadalinejad, Seyyed Mohsen Hashemi | ||
| Volume 4, Issue 6, November 2015 | A new algorithm to create a profile for users of web site benefiting from web usage mining | Abstract PDF |
| masomeh khabazfazli, ali harounabadi, shahram jamali | ||
| Volume 2, Issue 3, July 2013 | A New Approach for Labeling Images Using CAPTCHA in Image Semantic Search Engines | Abstract PDF |
| Amir Golchini, Abolfazl Toroghi Haghighat, Hasan Rashidi | ||
| Volume 2, Issue 3, July 2013 | A New Approach To Focused Crawling: Combination of Text summarizing With Neural Networks and Vector Space Model | Abstract PDF |
| Fahim Mohammadi | ||
| Volume 3, Issue 5, September 2014 | A new centrality measure for probabilistic diffusion in network | Abstract PDF |
| Kiyotaka Ide, Akira Namatame, Loganathan Ponnambalam, Fu Xiuju, Rick Siow Mong Goh | ||
| Volume 2, Issue 3, July 2013 | A New Heuristic Constructing Minimal Steiner Trees inside Simple Polygons | Abstract PDF |
| Alireza Khosravinejad, Alireza Bagheri, Vahid Khosravinejad | ||
| Volume 2, Issue 5, November 2013 | A New Image Steganography Method Based on Pixel Neighbors and 6 Most Significant Bit(MSB) Compare | Abstract PDF |
| Mashallah Abbasi Dezfouli, Sajad Nikseresht, Seyed.Enayatallah Alavi | ||
| Volume 3, Issue 2, March 2014 | A New Robust Audio Signal Steganography Based On Multiple Chaotic Algorithms With Edge Detection Technique | Abstract PDF |
| Amir Houshang Arab Avval, Shahram Mohanna | ||
| Volume 2, Issue 3, July 2013 | A novel and robust method for automatic license plate recognition system based on pattern recognition | Abstract PDF |
| Reza Azad, Fatemeh Davami, Babak Azad | ||
| Volume 2, Issue 5, November 2013 | A Novel Approach for Regenerating a Secure and Reliable Password using Iris and Fingerprint | Abstract PDF |
| SOROUSH SHIEKHALHOKAMAII, MOHAMMAD AMIN PIRBONYEH | ||
| Volume 2, Issue 4, September 2013 | A Novel Feature Cloud Visualization for Depiction of Product Features Extracted from Customer Reviews | Abstract PDF |
| Tanvir Ahmad | ||
| Volume 5, Issue 2, March 2016 | A Novel Method for Iris Recognition Using BP Neural Network and Parallel Computing | Abstract PDF |
| Hamid Reza Sahebi, S. Askari | ||
| Volume 5, Issue 1, January 2016 | A Novel Performance Evaluation Approach for the College Teachers Based on Individual Contribution | Abstract PDF |
| XING Lining | ||
| Volume 3, Issue 6, November 2014 | A Novel Vernier-based Time to Digital Converter for Low-power RFID Sensor Tags | Abstract PDF |
| Seyed Hossein Shahrokhi, Mehdi Hosseinzadeh | ||
| Volume 3, Issue 2, March 2014 | A Quantum Optimization Model for Dynamic Resource Allocation in Networks | Abstract PDF |
| Yu QingPing, You XiaoMing, Liu Sheng | ||
| Volume 3, Issue 3, May 2014 | A Reliable and Hybrid Scheduling Algorithm based on Cost and Time Balancing for Computational Grid | Abstract PDF |
| Vahid GhaedRahmati, Seyed.Enayatallah Alavi, Iman Attarzadeh | ||
| Volume 2, Issue 5, November 2013 | A Review of Data Mining Techniques for Result Prediction in Sports | Abstract PDF |
| Maral Haghighat, Hamid Rastegari, Nasim Nourafza | ||
| Volume 3, Issue 5, September 2014 | A Review of Distributed Multi-Agent Systems Approach to Solve University Course Timetabling Problem | Abstract PDF |
| Hamed Babaei, Amin Hadidi | ||
| Volume 3, Issue 1, January 2014 | A Robust and Energy-Efficient DVFS Control Algorithm for GALS-ANoC MPSoC in Advanced Technology under Process Variability Constraints | Abstract PDF |
| Sylvain Durand, Hatem Zakaria, Laurent Fesquet, Nicolas Marchand | ||
| Volume 4, Issue 6, November 2015 | A Secure and Efficient Routing Protocol with Genetic Algorithm in Mobile Ad-hoc Networks | Abstract PDF |
| Atieh Moghaddam, Ali Payandeh | ||
| Volume 3, Issue 5, September 2014 | A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania | Abstract PDF |
| Mohamed D. Waziri, Zaipuna O. Yonah | ||
| Volume 3, Issue 4, July 2014 | A Secure Model for Remote Electronic Voting: A Case of Tanzania | Abstract PDF |
| Sylvester Kimbi, Irina Zlotnikova | ||
| Volume 5, Issue 1, January 2016 | A Simple Study on Search Engine Text Classification for Retails Store | Abstract PDF |
| Renien John Joseph, Samith Sandanayake, Thanuja Perera | ||
| Volume 4, Issue 3, May 2015 | A Strengthened Version of a Hash-based RFID Server-less Security Scheme | Abstract PDF |
| Shahab Abdolmaleky, Shahla Atapoor, Mohammad Hajighasemlou, Hamid Sharini | ||
| 26 - 50 of 346 Items | << < 1 2 3 4 5 6 7 8 9 10 > >> | |
|
Advances in Computer Science : an International Journal






