EconPapers    
Economics at your fingertips  
 

Computer and Information Science

2020 - 2025

From Canadian Center of Science and Education
Contact information at EDIRC.

Bibliographic data for series maintained by Canadian Center of Science and Education ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 15, issue 4, 2022

Uni-CARE: Universal Interface via Cloud Archive Repository Express pp. 1 Downloads
Sheldon Liang
Analysis of Current Trends in Software Aging: A Literature Survey pp. 19 Downloads
Tajmilur Rahman, Joshua Nwokeji and Tejas Veeraganti Manjunath
Objects Movement Detection Based on Impulsed Neural Network of the Analogue of the Biological Retinal Model pp. 46 Downloads
Ihar Yeuseyenka and Ihar Melnikau
Analysis of Engineering Students Acceptance and Usage of 5G Technology: A Case Study of Gannon University pp. 57 Downloads
Jay Shah, Joshua Nwokeji, Tejas Veeraganti Manjunath and Tajmilur Rahman
Security and Performance through Operating System Services; Development of an Anti-Hacking System pp. 66 Downloads
Sahar Badri and Daniyal Alghazzawi
Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 4 pp. 80 Downloads
Chris Lee

Volume 15, issue 3, 2022

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning pp. 1 Downloads
Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala and Evelyn Sowells-Boone
Social Media Behaviour Analysis in Disaster-Response Messages of Floods and Heat Waves via Artificial Intelligence pp. 18 Downloads
Víctor Ponce-López and Catalina Spataru
Integration of AI Supported Risk Management in ERP Implementation pp. 37 Downloads
Petya Biolcheva and Miglena Molhova
Homogenous Multiple Classifier System for Software Quality Assessment Based on Support Vector Machine pp. 47 Downloads
Udoinyang G. Inyang, Olufemi S. Adeoye, Edward N. Udo, Edidiong F. Bassey, Enefiok A. Etuk, Fidelia N. Ugwoke and Emmanuel B. Usoro
Using a Modified Technology Acceptance Model for a Learning Management System Platform: A Questionnaire Design for Evaluating the Blackboard Learning Management System pp. 61 Downloads
Hussain Mohammad Abu-Dalbouh
Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 3 pp. 72 Downloads
Chris Lee

Volume 15, issue 2, 2022

Darwinism & Other Crumbling Theories in Science pp. 1 Downloads
Nikolaos E Myridis
A Brief Presentation of the Knowledge Paths for Semiotics (KPS) Project: Creating Digital Research Tools pp. 2 Downloads
Dimitra Sarakatsianou
Out of the Box Artificial Intelligence (OBAI): The Beginning of a New Era in Artificial Intelligence pp. 6 Downloads
Satish Gajawada and Hassan M. H. Mustafa
Transcendental Logic-Based Formalism for Semantic Representation of Software Project Requirements Architecture pp. 15 Downloads
Oleg V. Moroz, Oleksii O. Pysarchuk and Tetiana I. Konrad
A Geometry Consisting of Singularities Containing Only Integers pp. 38 Downloads
Qing Li
A Survey of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University pp. 43 Downloads
Boniface Mwangi Wambui, Joyce W Gikandi and Geoffrey Mariga Wambugu
Efficient and Traceable Anonymous Credentials on Smart Cards pp. 58 Downloads
Wei Wu
Multi-Issuer Attribute-based Anonymous Credential with Traceability and Revocation pp. 68 Downloads
Ye Yang
Anomaly Detection Methodology of In-vehicle Network Based on Graph Pattern Matching pp. 78 Downloads
Mengsi Sun and Jiarun Wu
Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 2 pp. 89 Downloads
Chris Lee

Volume 15, issue 1, 2022

A Decision Support System for Undecided and Exploratory Students pp. 1 Downloads
Sobitha Samaranayake, Athula D. A. Gunawardena and Robert Meyer
A New Method for Calculating Energy of Matter pp. 13 Downloads
Qing Li
A Review of Factors Affecting the Effectiveness of Phishing pp. 20 Downloads
Robert Karamagi
Divergence and Curl of COVID19 Spreading in the Lower Peninsula of Michigan pp. 32 Downloads
Yanshuo Wang
VR Users Are More Relaxed and Optimistic during COVID Lockdown than Others pp. 47 Downloads
Erik Geslin and Erik Hammer
MiniWarner: An Novel and Automatic Malicious Phishing Mini-apps Detection Approach pp. 57 Downloads
Junhan Chen
Dual Fine-Grained Public-Key Searchable Encryption from Lattices pp. 66 Downloads
Zike Jiang and Shixin Chen
Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 1 pp. 81 Downloads
Chris Lee

Volume 14, issue 4, 2021

The Role of e-Government in Enhancing Postgraduate Employment Transparency in Saudi Arabia pp. 1 Downloads
Mohammed Al-Saif and Ahmed Abdel-Whab
Real-time Automated Detection and Recognition of Nigerian License Plates via Deep Learning Single Shot Detection and Optical Character Recognition pp. 11 Downloads
Kayode David Adedayo and Ayomide Oluwaseyi Agunloye
Non-Delay Tolerant Non-Overlay Routing Protocols Performance Evaluation for VANET pp. 20 Downloads
Mahmoud Ali Al Shugran
E-commerce Web App in Azure Cloud: Considerations, Components of Implementation and Schematic Design pp. 32 Downloads
Rasha Al-Mahrouqi, Khalsa Al Siyabi, Amani Al Nabhani, Salma Al-Hashemi and Shoukath Ali Muhammed
Video Game Escapism During Quarantine pp. 36 Downloads
Eian Prinsen and Damian Schofield
Six-in-a-Row Artificial Intelligence Design and Its Implementation Based on Java pp. 47 Downloads
Liujue Zhang
Automatic Identification and Filtration of COVID-19 Misinformation pp. 57 Downloads
Paras Gulati, Abiodun Adeyinka. O. and Saritha Ramkumar
Simulation Research on the Complexity of Life Game pp. 65 Downloads
Jiacheng Huang
Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 4 pp. 79 Downloads
Chris Lee

Volume 14, issue 3, 2021

Exploring Public Attitudes toward E-Government Health Applications Used During the COVID-19 Pandemic: Evidence from Saudi Arabia pp. 1 Downloads
Dalal Bamufleh, Amani Saud Alshamari, Asrar Saud Alsobhi, Hanan Hisham Ezzi and Waad Sultan Alruhaili
Verifying the Audio Evidence to Assist Forensic Investigation pp. 25 Downloads
Hasan Fayyad-Kazan, Ale Hejase, Imad Moukadem and Sondos Kassem-Moussa
A Novel Approach for Robust Perceptual Image Hashing pp. 38 Downloads
Azhar Hadmi and Awatif Rouijel
Using E-learning System in Jordanian Universities during the COVID-19 Pandemic: Benefits and Challenges pp. 49 Downloads
Ahmad Abu-Al-Aish
Targeting Reputation: A New Vector for Attacks to Critical Infrastructures pp. 63 Downloads
Giampiero Giacomello and Oltion Preka
On Bi-gram Graph Attributes pp. 78 Downloads
Thomas Konstantinovsky and Matan Mizrachi
Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 3 pp. 87 Downloads
Chris Lee

Volume 14, issue 2, 2021

Universal Transcendental Logic-Based Ontology pp. 1 Downloads
Oleg V. Moroz
Cyber Security amid COVID-19 pp. 10 Downloads
Hussin J. Hejase, Hasan F. Fayyad-Kazan, Ale J. Hejase and Imad A. Moukadem
Efficient and Privacy-Preserving Multi-User Outsourced K-Means Clustering pp. 26 Downloads
Na Li, Lianguan Huang, Yanling Li and Meng Sun
Monitor Potential Attack Locations in a Specific Area within DTN Network pp. 42 Downloads
Iyas Alodat
The Impact of Augmented Reality on E-learning Systems in Saudi Arabia Universities pp. 50 Downloads
Asma Alsayyar and Riyad Almakki
Research on Entity Label Value Assignment Method in Knowledge Graph pp. 63 Downloads
Linqing Yang, Bo Liu, Youpei Huang and Xiaozhuo Li
A Nonuniform Reference Voltage Optimization Based on Relative-Precision-Loss Ratios in MLC NAND Flash Memory pp. 75 Downloads
Caifeng Lv, Xiujie Huang and Shancheng Zhao
Game Playing: Proposing and Developing Queen Challenge Puzzle Game from 1 to 25 Levels pp. 87 Downloads
Hussain Mohammad Abu-Dalbouh, Fahad Almansour and Nehal Aldowighri
Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 2 pp. 109 Downloads
Chris Lee

Volume 14, issue 1, 2021

Brick and Mortar Education vs. SCORM-based Education in Computer-programming Courses: A Comparative Study pp. 1 Downloads
Mohammed Abu Shquier
An O(nlogn/logw) Time Algorithm for Ridesharing pp. 8 Downloads
Yijie Han and Chen Sun
Blind Electronic Mail System pp. 14 Downloads
Maham Imtiaz, Samina Khalid, Saleema Khadam, Sumaira Arshad, Ali Raza and Tehmina Khalil
Personality and Employees’ Information Security Behavior among Generational Cohorts pp. 44 Downloads
Cartmell Warrington, Javaid Syed and Ruth M. Tappin
Efficient Object Detection Model for Real-time UAV Application pp. 45 Downloads
Subrahmanyam Vaddi, Dongyoun Kim, Chandan Kumar, Shafqat Shad and Ali Jannesari
Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 1 pp. 54 Downloads
Chris Lee
Page updated 2025-12-13