- DocumentLogistic Regression for Detecting Untrustworthy Recommendations in Pervasive Environmentstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentFace Recognition Model Based on Covariance Intersection Fusion for Interactive Devicestéléversé parWorld of Computer Science and Information Technology Journal
- DocumentRecognition Impact on Rescaled Handwritten Digit Images Using Support Vector Machine Classificationtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentThe Challenges of Big Data Visual Analytics and Recent Platformstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentA Content-Based Schema Matching Tooltéléversé parWorld of Computer Science and Information Technology Journal
- DocumentMobile Based Attendance System Using QR Codetéléversé parWorld of Computer Science and Information Technology Journal
- DocumentSpeculation and Negation Detection for Arabic Biomedical Textstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentMultimorbidity Prediction Using Data Mining Modeltéléversé parWorld of Computer Science and Information Technology Journal
- DocumentCustomer Segmentation Based on GRFM Case Studytéléversé parWorld of Computer Science and Information Technology Journal
- DocumentReview of Literature on Software Qualitytéléversé parWorld of Computer Science and Information Technology Journal
- DocumentBroadcast Distributed PSO for Large Scale Problemstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentPerformance Comparative Study of DSDV, E-DSDV, I-DSDV and O-DSDV MANET Routing Protocolstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentElderly People's Life Saving Assistant (EPLSA)téléversé parWorld of Computer Science and Information Technology Journal
- DocumentThe Impacts Factors of Using the Smartphone at Work Environments in Developing Countries the Case of Saudi Arabiatéléversé parWorld of Computer Science and Information Technology Journal
- DocumentImage Retrieval Model Based on Color and Shape Features Utilizing 2D Wavelet Transformtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentGL-Model, Representing Emergence of Dangerous State in Multiprocessor Management Systemtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentCrack Detection on Concrete Surfaces Usingtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentGL-Model, Representing Emergence of Dangerous State in Multiprocessor Management Systemtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentImpact of Security Issues in Cloud Computing Towards Businessestéléversé parWorld of Computer Science and Information Technology Journal
- DocumentObject Oriented Model Development for Education Institutes’ Internal Auditing Processtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentDevelopment of an Efficient Image Segmentation Algorithm via Splitting and Merging Techniquestéléversé parWorld of Computer Science and Information Technology Journal
- DocumentEnhancing the Performance of Intrusion Detection System by Minimizing the False Alarm Detection Using Fuzzy Logictéléversé parWorld of Computer Science and Information Technology Journal
- DocumentThe General Form of GoF Design Patternstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentSpeculation and Negation Annotation for Arabic Biomedical Textstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentNew Automatic Search and Update Algorithms of Vietnamese Abbreviationstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentFingerprint Singular Point Detection via Quantization and Fingerprint Classificationtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentAn Empirical Analysis of Multiple Level Association Rules Mining Method for Feature Extractiontéléversé parWorld of Computer Science and Information Technology Journal
- DocumentData Quality Based Data Integration Approachtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentAnalysis of Factors Influence Online Trusttéléversé parWorld of Computer Science and Information Technology Journal
- DocumentAn Integrated Approach to Predictive Analytics for Stock Indexes and Commodity Trading Using Computational Intelligencetéléversé parWorld of Computer Science and Information Technology Journal
- DocumentFree Scale and SOLR Architectures for Load Handling of Social Networking Sitestéléversé parWorld of Computer Science and Information Technology Journal
- DocumentA Study of the Effect of Resolving Negation and Sentiment Analysis in Recognizing Text Entailment for Arabictéléversé parWorld of Computer Science and Information Technology Journal
- DocumentDynamic Image Display and Adjustment Method for Glassless 3D Viewing Systemstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentAdvances in Mobile Cloud Computingtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentThe Effect of Combining Different Semantic Relations on Arabic Text Classificationtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentGIS as a Job Growth Area for IT Professionalstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentAutomatic Optic Disc Localization and Segmentation using Swarm Intelligencetéléversé parWorld of Computer Science and Information Technology Journal
- DocumentMobile Secure Transmission Method Based on Audio Steganographytéléversé parWorld of Computer Science and Information Technology Journal
- DocumentAnswer ExtractioAnswer Extraction for Why Arabic Questions Answering Systemstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentEvaluating E-Learning System Use by CBAM-Stages of Concern Methodology in Jordanian Universitiestéléversé parWorld of Computer Science and Information Technology Journal
- DocumentA Virtual TV System Using Head-mounted Display with Stereo Cameratéléversé parWorld of Computer Science and Information Technology Journal
- DocumentLunching E-Government in Jordan, Jordanian Experiencetéléversé parWorld of Computer Science and Information Technology Journal
- DocumentDeploying an Efficient Safety System for VANETtéléversé parWorld of Computer Science and Information Technology Journal
- DocumentLexical Cohesion and Entailment based Segmentation for Arabic Text Summarization (LCEAS)téléversé parWorld of Computer Science and Information Technology Journal
- DocumentEvaluating E-portfolio System Use within Educational Contexttéléversé parWorld of Computer Science and Information Technology Journal
- DocumentAn efficient Method to recognise Human Faces from Video Sequences with Occlusiontéléversé parWorld of Computer Science and Information Technology Journal
- DocumentSecure Mobile Cloud Computing Based-On Fingerprinttéléversé parWorld of Computer Science and Information Technology Journal
- DocumentMobile Sink Assisted Energy Efficient Routing Algorithm for Wireless Sensor Networkstéléversé parWorld of Computer Science and Information Technology Journal
- DocumentRole of Component Certification in CBSE Activities for Building High Quality Softwaretéléversé parWorld of Computer Science and Information Technology Journal