Academic Journals Database
Disseminating quality controlled scientific knowledge

World of Computer Science and Information Technology Journal

ISSN: 2221--0741
Publisher: World of Computer Science and Information Technology Journal


ADD TO MY LIST
 
Cache Discovery Policies of MANET PDF available

Author(s): Amer O. Abu Salem | Tareq Alhmiedat | Ghassan Samara
Volume: 3
Issue: 8
Year: 2013
Design and Analysis of Adaptive Neuro Fuzzy Logic Controlled Wireless Intelligent Telemetry System PDF available

Author(s): Rajwinder Kaur | Kanwalvir Singh Dhindsa
Volume: 3
Issue: 7
Year: 2013
Apple IOS Devices for Network Administrators PDF available

Author(s): Timur Mirzoev | Gerard Gingo | Mike Stawchansky | Tracy White
Volume: 3
Issue: 6
Year: 2013
Adapting the Ant Colony Optimization Algorithm to the Printed Circuit Board Drilling Problem PDF available

Author(s): Taisir Eldos | Aws Kanan | Abdullah Aljumah
Volume: 3
Issue: 5
Year: 2013
An Efficient Incremental Clustering Algorithm PDF available

Volume: 3
Issue: 5
Year: 2013
Image Inpainting by Kriging Interpolation Technique PDF available

Author(s): Firas A. Jassim
Volume: 3
Issue: 5
Year: 2013
Improving Performance of a Group of Classification Algorithms Using Resampling and Feature Selection PDF available

Author(s): Mehdi Naseriparsa | Amir-masoud Bidgoli | Touraj Varaee
Volume: 3
Issue: 4
Year: 2013
A Conceptual Nigeria Stock Exchange Prediction: Implementation Using Support Vector Machines-SMO Model PDF available

Author(s): Abubakar S. Magaji | Victor Onomza Waziri | Audu Isah | Adeboye K.R.
Volume: 3
Issue: 4
Year: 2013
Simulation of Improved Academic Achievement for a Mathematical Topic Using Neural Networks Modeling PDF available

Author(s): Saeed A. Al-Ghamdi | Abdel Aziz M. Al-Bassiouni | Hassan M. H. Mustafa | Ayoub Al-Hamadi
Volume: 3
Issue: 4
Year: 2013
Datacenter Changes vs. Employment Rates for Datacenter Managers In the Cloud Computing Era PDF available

Author(s): Timur Mirzoev | David Hillhouse | Bruce Benson | Mickey Lewis
Volume: 3
Issue: 3
Year: 2013
A Negative Selection Algorithm Based on Email Classification Techniques PDF available

Author(s): Victor. Onomza Waziri | Ismaila Idris | Mohammed Bashir Abdullahi | Hahimi Danladi | Audu Isah
Volume: 3
Issue: 3
Year: 2013
Analysis on Backlinks and PageRank of Automotive Company Websites Using Crawler Tool PDF available

Author(s): Dina Agusten, ST., MMSI | Winarti, SKom., MMSI
Volume: 3
Issue: 2
Year: 2013
Cloud Computing in Higher Education in Jordan PDF available

Author(s): Samah A. Massadeh | Muhammad A. Mesleh
Volume: 3
Issue: 2
Year: 2013
Effect of Social Media on Website Popularity: Differences between Public and Private Universities in Indonesia PDF available

Author(s): Hanum Putri Permatasari | Donny Erlangga | Silvia Harlena | Reza Chandra
Volume: 3
Issue: 2
Year: 2013
Mobile Application for Diabetes Risk Diagnosis and Information Based on Android PDF available

Author(s): Remi Senjaya | Anindito Yoga Pratama | Dewi Agushinta R.
Volume: 3
Issue: 2
Year: 2013
An Optimized PID Control Strategy For Active Suspensions Applied To A Half Car Model PDF available

Author(s): Mohammed H. AbuShaban | Mahir B. Sabra | Iyad M. Abuhadrous
Volume: 3
Issue: 2
Year: 2013
Kriging Interpolation Filter to Reduce High Density Salt and Pepper Noise PDF available

Author(s): Firas Ajil Jassim
Volume: 3
Issue: 1
Year: 2013
Real-Time System: Fire and Smoking Control System (Case Study) PDF available

Author(s): Muhammed Ali Suliman Mesleh | Mohammed Ashraf Zoghoul
Volume: 3
Issue: 1
Year: 2013
Exploring the Educational Benefits of Blogs to Help Non-Malay Pupils in Malay Language Learning PDF available

Author(s): Nor Hasbiah Ubaidullah | Norhayati Mahadi | Lee Hooi Ching
Volume: 3
Issue: 1
Year: 2013
S-Scrum: a Secure Methodology for Agile Development of Web Services PDF available

Author(s): Davoud Mougouei | Nor Fazlida Mohd Sani | Mohammad Moein Almasi
Volume: 3
Issue: 1
Year: 2013
Framework Environment for Understanding Object Oriented Techniques PDF available

Author(s): Hamed J. Al-Fawareh
Volume: 3
Issue: 1
Year: 2013
A Comparison of Support Vector Machine and Multi-Level Support Vector Machine on Intrusion Detection PDF available

Author(s): Milad Aghamohammadi | Morteza Analoui
Volume: 2
Issue: 7
Year: 2012
A New Approach for Flexible Matching of Grid Resources PDF available

Author(s): Mehdi Bayat | Morteza Analoui
Volume: 2
Issue: 7
Year: 2012
An Analytical Comparison of Rough Set Theorybased Grid Resource Matching Algorithms PDF available

Author(s): Mehdi Bayat | Morteza Analoui
Volume: 2
Issue: 7
Year: 2012
Arabic Content Classification System Using statistical Bayes classifier With Words Detection and Correction PDF available

Author(s): Abdullah Mamoun Hattab | Abdulameer Khalaf Hussein
Volume: 2
Issue: 6
Year: 2012
Cournot and Bertrand Game Models for a Simple Spectrum Sharing Framework in Cognitive Radio Networks PDF available

Author(s): Hadi Malekpour | Reza Berangi
Volume: 2
Issue: 6
Year: 2012
Color Image Enhancement Using Steady State Genetic Algorithm PDF available

Author(s): Reyadh Naoum | Ala'a Al-Sabbah
Volume: 2
Issue: 6
Year: 2012
Framework Model for Strategic Plan Using Dynamic Workflow PDF available

Author(s): Reyadh Shaker Naoum | Abdulameer Khalf Hussain | Ziad Mohammad Abu-Hamour
Volume: 2
Issue: 5
Year: 2012
Evaluation and Comparison of Security Issues on Cloud Computing Environment PDF available

Author(s): Priyanka Arora | Arun Singh | Himanshu Tyagi
Volume: 2
Issue: 5
Year: 2012
Robust Digital Image Watermarking Technique Based on Histogram Analysis PDF available

Author(s): Hamza A. Ali | Sama’a A. K. khamis
Volume: 2
Issue: 5
Year: 2012
Multi-Level Support Vector Machine PDF available

Author(s): Milad Aghamohammadi | Morteza Analoui
Volume: 2
Issue: 5
Year: 2012
Electronic Payment Fraud Detection Techniques PDF available

Author(s): Adnan M. Al-Khatib
Volume: 2
Issue: 4
Year: 2012
A Biometric Model for Examination Screening and Attendance Monitoring in Yaba College of Technology PDF available

Author(s): Rufai M.M | Adigun J. O, N. A. Yekini
Volume: 2
Issue: 4
Year: 2012
A Generator of MVC-based Web Applications PDF available

Author(s): Strahinja Lazetic | Dusan Savic | Sinisa Vlajic | Sasa Lazarevic
Volume: 2
Issue: 4
Year: 2012
Hybridization Between Iterative Simulated Annealing and Modified Great Deluge for Medical Clustering Problems PDF available

Author(s): Anmar Abuhamdah | Bassam M. El-Zaghmouri | Anas Quteishat | Rawnaq Kittaneh
Volume: 2
Issue: 4
Year: 2012
Swap Training: A Genetic Algorithm Based Feature Selection Method Applied on Face Recognition System PDF available

Author(s): Ashkan Parsi | Mehrdad Salehi | Ali Doostmohammadi
Volume: 2
Issue: 4
Year: 2012
Leader Election Algorithm in 3D Torus Networks with the Presence of One Link Failure PDF available

Author(s): Mohammed Refai | Ibrahim AL-Oqily | Abed Alhamori
Volume: 2
Issue: 3
Year: 2012
Learning Vector Quantization (LVQ) and k-Nearest Neighbor for Intrusion Classification PDF available

Author(s): Reyadh Shaker Naoum | Zainab Namh Al-Sultani
Volume: 2
Issue: 3
Year: 2012
Performance Evaluation for VOIP over IP and MPLS PDF available

Author(s): Reyadh Shaker Naoum | Mohanand Maswady
Volume: 2
Issue: 3
Year: 2012
Performance Comparison of Face Recognition using Transform Domain Techniques PDF available

Author(s): Jossy P. George | Saleem S Tevaramani | K B Raja
Volume: 2
Issue: 3
Year: 2012
A Three Stages Segmentation Model for a Higher Accurate off-line Arabic Handwriting Recognition

Author(s): Said Elaiwat | Marwan AL-abed Abu-zanona | Farah Hanna AL-Zawaideh
Volume: 2
Issue: 3
Year: 2012
A Novel Approach for Energy Optimization of Wireless Sensors Network by Adaptive Clustering PDF available

Author(s): Rufaida Muhammad Shamroukh | Aryaf Abdullah Aladwan | Ana’am Abdullah Aladwan
Volume: 2
Issue: 2
Year: 2012
A Novel Study of Biometric Speaker Identification Using Neural Networks and Multi-Level Wavelet Decomposition PDF available

Author(s): Aryaf Abdullah Aladwan | Rufaida Muhammad Shamroukh | Ana’am Abdullah Aladwan
Volume: 2
Issue: 2
Year: 2012
An Investigation into privacy and Security in Online Social Networking Sites among IIUM Students PDF available

Author(s): Husein Osman Abdullahi | Abdirizaq said
Volume: 2
Issue: 2
Year: 2012
Arabic Text Summerization Model Using Clustering Techniques PDF available

Author(s): Ahmad Haboush | Ahmad Momani | Maryam Al-Zoubi | Motassem Tarazi
Volume: 2
Issue: 2
Year: 2012
RPA Switzerland

RPA Switzerland

Robotic process automation

    

Tango Jona
Tangokurs Rapperswil-Jona