Computer and Information Science
2020 - 2025
From Canadian Center of Science and Education Contact information at EDIRC. Bibliographic data for series maintained by Canadian Center of Science and Education (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 15, issue 4, 2022
- Uni-CARE: Universal Interface via Cloud Archive Repository Express pp. 1

- Sheldon Liang
- Analysis of Current Trends in Software Aging: A Literature Survey pp. 19

- Tajmilur Rahman, Joshua Nwokeji and Tejas Veeraganti Manjunath
- Objects Movement Detection Based on Impulsed Neural Network of the Analogue of the Biological Retinal Model pp. 46

- Ihar Yeuseyenka and Ihar Melnikau
- Analysis of Engineering Students Acceptance and Usage of 5G Technology: A Case Study of Gannon University pp. 57

- Jay Shah, Joshua Nwokeji, Tejas Veeraganti Manjunath and Tajmilur Rahman
- Security and Performance through Operating System Services; Development of an Anti-Hacking System pp. 66

- Sahar Badri and Daniyal Alghazzawi
- Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 4 pp. 80

- Chris Lee
Volume 15, issue 3, 2022
- Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning pp. 1

- Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala and Evelyn Sowells-Boone
- Social Media Behaviour Analysis in Disaster-Response Messages of Floods and Heat Waves via Artificial Intelligence pp. 18

- VÃctor Ponce-López and Catalina Spataru
- Integration of AI Supported Risk Management in ERP Implementation pp. 37

- Petya Biolcheva and Miglena Molhova
- Homogenous Multiple Classifier System for Software Quality Assessment Based on Support Vector Machine pp. 47

- Udoinyang G. Inyang, Olufemi S. Adeoye, Edward N. Udo, Edidiong F. Bassey, Enefiok A. Etuk, Fidelia N. Ugwoke and Emmanuel B. Usoro
- Using a Modified Technology Acceptance Model for a Learning Management System Platform: A Questionnaire Design for Evaluating the Blackboard Learning Management System pp. 61

- Hussain Mohammad Abu-Dalbouh
- Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 3 pp. 72

- Chris Lee
Volume 15, issue 2, 2022
- Darwinism & Other Crumbling Theories in Science pp. 1

- Nikolaos E Myridis
- A Brief Presentation of the Knowledge Paths for Semiotics (KPS) Project: Creating Digital Research Tools pp. 2

- Dimitra Sarakatsianou
- Out of the Box Artificial Intelligence (OBAI): The Beginning of a New Era in Artificial Intelligence pp. 6

- Satish Gajawada and Hassan M. H. Mustafa
- Transcendental Logic-Based Formalism for Semantic Representation of Software Project Requirements Architecture pp. 15

- Oleg V. Moroz, Oleksii O. Pysarchuk and Tetiana I. Konrad
- A Geometry Consisting of Singularities Containing Only Integers pp. 38

- Qing Li
- A Survey of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University pp. 43

- Boniface Mwangi Wambui, Joyce W Gikandi and Geoffrey Mariga Wambugu
- Efficient and Traceable Anonymous Credentials on Smart Cards pp. 58

- Wei Wu
- Multi-Issuer Attribute-based Anonymous Credential with Traceability and Revocation pp. 68

- Ye Yang
- Anomaly Detection Methodology of In-vehicle Network Based on Graph Pattern Matching pp. 78

- Mengsi Sun and Jiarun Wu
- Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 2 pp. 89

- Chris Lee
Volume 15, issue 1, 2022
- A Decision Support System for Undecided and Exploratory Students pp. 1

- Sobitha Samaranayake, Athula D. A. Gunawardena and Robert Meyer
- A New Method for Calculating Energy of Matter pp. 13

- Qing Li
- A Review of Factors Affecting the Effectiveness of Phishing pp. 20

- Robert Karamagi
- Divergence and Curl of COVID19 Spreading in the Lower Peninsula of Michigan pp. 32

- Yanshuo Wang
- VR Users Are More Relaxed and Optimistic during COVID Lockdown than Others pp. 47

- Erik Geslin and Erik Hammer
- MiniWarner: An Novel and Automatic Malicious Phishing Mini-apps Detection Approach pp. 57

- Junhan Chen
- Dual Fine-Grained Public-Key Searchable Encryption from Lattices pp. 66

- Zike Jiang and Shixin Chen
- Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 1 pp. 81

- Chris Lee
Volume 14, issue 4, 2021
- The Role of e-Government in Enhancing Postgraduate Employment Transparency in Saudi Arabia pp. 1

- Mohammed Al-Saif and Ahmed Abdel-Whab
- Real-time Automated Detection and Recognition of Nigerian License Plates via Deep Learning Single Shot Detection and Optical Character Recognition pp. 11

- Kayode David Adedayo and Ayomide Oluwaseyi Agunloye
- Non-Delay Tolerant Non-Overlay Routing Protocols Performance Evaluation for VANET pp. 20

- Mahmoud Ali Al Shugran
- E-commerce Web App in Azure Cloud: Considerations, Components of Implementation and Schematic Design pp. 32

- Rasha Al-Mahrouqi, Khalsa Al Siyabi, Amani Al Nabhani, Salma Al-Hashemi and Shoukath Ali Muhammed
- Video Game Escapism During Quarantine pp. 36

- Eian Prinsen and Damian Schofield
- Six-in-a-Row Artificial Intelligence Design and Its Implementation Based on Java pp. 47

- Liujue Zhang
- Automatic Identification and Filtration of COVID-19 Misinformation pp. 57

- Paras Gulati, Abiodun Adeyinka. O. and Saritha Ramkumar
- Simulation Research on the Complexity of Life Game pp. 65

- Jiacheng Huang
- Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 4 pp. 79

- Chris Lee
Volume 14, issue 3, 2021
- Exploring Public Attitudes toward E-Government Health Applications Used During the COVID-19 Pandemic: Evidence from Saudi Arabia pp. 1

- Dalal Bamufleh, Amani Saud Alshamari, Asrar Saud Alsobhi, Hanan Hisham Ezzi and Waad Sultan Alruhaili
- Verifying the Audio Evidence to Assist Forensic Investigation pp. 25

- Hasan Fayyad-Kazan, Ale Hejase, Imad Moukadem and Sondos Kassem-Moussa
- A Novel Approach for Robust Perceptual Image Hashing pp. 38

- Azhar Hadmi and Awatif Rouijel
- Using E-learning System in Jordanian Universities during the COVID-19 Pandemic: Benefits and Challenges pp. 49

- Ahmad Abu-Al-Aish
- Targeting Reputation: A New Vector for Attacks to Critical Infrastructures pp. 63

- Giampiero Giacomello and Oltion Preka
- On Bi-gram Graph Attributes pp. 78

- Thomas Konstantinovsky and Matan Mizrachi
- Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 3 pp. 87

- Chris Lee
Volume 14, issue 2, 2021
- Universal Transcendental Logic-Based Ontology pp. 1

- Oleg V. Moroz
- Cyber Security amid COVID-19 pp. 10

- Hussin J. Hejase, Hasan F. Fayyad-Kazan, Ale J. Hejase and Imad A. Moukadem
- Efficient and Privacy-Preserving Multi-User Outsourced K-Means Clustering pp. 26

- Na Li, Lianguan Huang, Yanling Li and Meng Sun
- Monitor Potential Attack Locations in a Specific Area within DTN Network pp. 42

- Iyas Alodat
- The Impact of Augmented Reality on E-learning Systems in Saudi Arabia Universities pp. 50

- Asma Alsayyar and Riyad Almakki
- Research on Entity Label Value Assignment Method in Knowledge Graph pp. 63

- Linqing Yang, Bo Liu, Youpei Huang and Xiaozhuo Li
- A Nonuniform Reference Voltage Optimization Based on Relative-Precision-Loss Ratios in MLC NAND Flash Memory pp. 75

- Caifeng Lv, Xiujie Huang and Shancheng Zhao
- Game Playing: Proposing and Developing Queen Challenge Puzzle Game from 1 to 25 Levels pp. 87

- Hussain Mohammad Abu-Dalbouh, Fahad Almansour and Nehal Aldowighri
- Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 2 pp. 109

- Chris Lee
Volume 14, issue 1, 2021
- Brick and Mortar Education vs. SCORM-based Education in Computer-programming Courses: A Comparative Study pp. 1

- Mohammed Abu Shquier
- An O(nlogn/logw) Time Algorithm for Ridesharing pp. 8

- Yijie Han and Chen Sun
- Blind Electronic Mail System pp. 14

- Maham Imtiaz, Samina Khalid, Saleema Khadam, Sumaira Arshad, Ali Raza and Tehmina Khalil
- Personality and Employees’ Information Security Behavior among Generational Cohorts pp. 44

- Cartmell Warrington, Javaid Syed and Ruth M. Tappin
- Efficient Object Detection Model for Real-time UAV Application pp. 45

- Subrahmanyam Vaddi, Dongyoun Kim, Chandan Kumar, Shafqat Shad and Ali Jannesari
- Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 1 pp. 54

- Chris Lee
| |