مجموعه مقالات ژورنال ACSIJ بر پایگاه سیویلیکا منتشر شد

مجموعه مقالات ژورنال ACSIJ بر پایگاه سیویلیکا منتشر شد

http://www.callforpapers.ir/مجموعه مقالات سه دوره مجله بين المللي پيشرفت در علوم كامپيوتر در سیویلیکا نمایه سازی و منتشر گردید. 

به گزارش پایگاه فراخوانهای علمی پژوهشی کشور (callforpapers.ir) این ژورنال در سه دوره تا کنون 118 عنوان مقاله تخصصی شامل 866  صفحه به زبان انگلیسی منتشر کرده است کلیه مقالات از طریق سیویلیکا قابل جستجو و دریافت می باشند.

لازم به ذکر است ژورنال ACSIJ تحت حمایت پایگاه سیویلیکا بوده و از این پس علاقه مندان می توانند فراخوان دریافت مقاله این نشریه را بر روی پایگاه سیویلیکا مشاهده نمایند.

لیست مقالات منتشر شده  ژورنال Advances in Computer Science : an International Journal :

:2012 Volume 1, Issue 1 September-

 

A Foundation for the Pillars of Software Factories
Developing Parallel Programs
Engineering in the Cloud: An Engineering Software + Services Architecture Forged in Turbulent Times
How the Cloud Stretches the SOA Scope
Surviving Turbulent Times: Prioritizing IT Initiatives Using Business Architecture
Semantic Enterprise Optimizer and Coexistence of Data Models
Application of Bees Algorithm in Multi-Join Query Optimization
Task Scheduling problem in distributed systems considering communication cost and precedence by

 

population-based ACO

:2013 Volume 2, Issue 1 January- 

Service Registry: A Key Piece for Enhancing Reuse in SOA 

Caching in the Distributed Environment 

Is SOA Being Pushed Beyond Its Limits? 

Key management in heterogeneous wireless sensor networks using Voronoi diagrams 

On Distributed Embedded Systems

Software Architecture in the Agile Life Cycle

:2013 Volume 2, Issue 2  May- 

Proposed New Mechanism to Detect and Defend the Malicious Attackers in AODV 

An Adaptive K-random Walks Method for Peer-to-Peer Networks 

Strategic Evaluation of Web-based E-learning; a review on 8 articles 

Distributed Data Storage Model for Cattle Health Monitoring Using WSN 

Presentation of an approach for adapting software production process based ISO/IEC 12207 to ITIL Service 

Applying a natural intelligence pattern in cognitive robots 

A Multi Hop Clustering Algorithm For Reduce Energy Consumption in Wireless Sensor Networks 

Enterprise Microblogging tool to increase employee participation in organizational knowledge management

Security-Aware Dispatching of Virtual Machines in Cloud Environment

:2013 Volume 2, Issue 3  July- 

Performance Estimation of DS-CDMA Receivers Using Genetic Algorithm 

A Mechanism to Mitigate Collision Rate in Wireless Local Networks 

An Efficient Mechanism for Data Rate Adaptation in Wireless LAN’s 

Critical Factors in the Effective of Service-Oriented Architecture 

A New Approach To Focused Crawling: Combination of Text summarizing With Neural Networks and vector space model 

Solving the Scheduling Problem in Computational Grid using Artificial Bee Colony Algorithm 

Efficient Area and Speed Optimized Multiplication Technique Using Vedic and Tree Addition Structure 

Design of Tunable Multiple- Cavity Filter for Optical Fiber Communication 

Combination of SVM and FERN for GPU-assisted texture recognition on mobile devices 

a novel and robust method for automatic license plate recognition system based on pattern recognition 

SecurityArchitecture forAdvancedMetering Infrastructure 

A Hybrid Approach for Optimal Feature Selection based on Evolutionary Algorithms and Classic Approaches 

Designing a Clustering and Prediction-based Protocol for Target Tracking in Wireless Sensor Networks (WSNs 

USE OF E-LEARNING TOOLS TO SOLVE GROUP WORK PROBLEMS IN HIGHER EDUCATION: A CASE STUDY OF GULF COUNTRY 

A New Approach for Labeling Images Using CAPTCHA in Image Semantic Search Engines 

Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks 

A New Heuristic Algorithm for Constructing Steiner Trees inside Simple polygons in Presence of Obstacles 

A New Heuristic Constructing Minimal Steiner Trees inside Simple Polygons 

The analysis of visual parallel programming languages 

: 2013 Volume 2, Issue 4  September-

Blended Learning Resources in Constrained Bandwidth Environment: Considerations for Network and Multimedia Optimization

Power and Energy Aware Design of an Autonomous Wireless Sensor Node

Performance and Analysis of the Automated Semantic Object and Spatial Relationships Extraction in Traffic Images

Reverse Query Tree approach to cope with Id distribution problem in Tree-based tag anti-collision protocols of RFID

Comparative study of data fusion algorithms in P300 Based BCI

Diffuse Objects Extraction in Coronal Holes Using Active Contour Means Model

High Capacity Secure Image Steganography Based on Contourlet Transform

A cluster-based topology control algorithm for wireless sensor networks

Petro-physical characterization and 3D digital modeling for geometric reconstruction of the Neolithic domus de janas of Sedini field (North-Sardinia, Italy

Adaptive Majority-based Re-routing for Differentiated Delay in Wireless Sensor Networks

Image Content Based Retrieval System using Cosine Similarity for Skin Disease Images

A Novel Feature Cloud Visualization for Depiction of Product Features Extracted from Customer Reviews

A Mathematical Model for the Rainbow Vertex-Connection Number

Traffic-Aware Selection Strategy for Application- Specific 3D NoC

:2013 Volume 2, Issue 5  November- 

A novel Approach for regenerating a secure and reliable Password using iris and fingerprint 

A Review of Data Mining Techniques for Result Prediction in Sports 

An Efficient Protocol for Target Tracking in Wireless Sensor Networks (WSNs) 

Using Contourlet Transform and Discrete Cosine Transform and SVD for Digital Watermarking 

Automatic identification of corrosive factors categories according to the environmental factors 

Text Mining and Image Anomaly Explanation with Machine Consciousness 

Performance assessment among hybrid algorithms in tuning SVR parameters to predict pipe failure rates 

Economic growth models: symbolic and numerical computations 

Software Architecture Viewpoint Models: A Short Survey 

Novel Feature Selection by Differential Evolution Algorithm 

Application of Pre-evolution Genetic Algorithm in Fast Path Planning for UCAV 

A Survey: variants of TCP in Ad-hoc networks 

Design Context Aware Activity Recommender System for Iranian Customer Mind Activism in Online Shopping 

The use of a Comprehensive Identification Infrastructure in Enhancing the lifetime of Sensor Networks 

An Ontology Design Pattern of the Multidisciplinary and Complex Field of Climate Change 

Measuring Trust and Selecting Cloud Database Services 

Real-Time and Robust Method for Hand Gesture Recognition System Based on Cross-Correlation Coefficient 

Optimized Method for Real-Time Face Recognition System Based on PCA and Multiclass Support Vector Machine 

Designing Expert System for Detecting Faults in Cloud Environment 

High-Speed Optical Home Network Using Graded Index Plastic Optical Fibers for a Smart House 

Prolonging sensor networks lifetime using convex clusters 

A New Image Steganography Method Based on Pixel Neighbors and 6 Most Significant Bit(MSB) Compare 

 :2014 Volume 3, Issue 1  January-

Prediction of Load in Reverse Extrusion Process of Hollow Parts using Modern Artificial Intelligence Approaches

Theoretical Factors underlying Data Mining Techniques in Developing Countries: a case of Tanzania

Effects of Individual Success on Globally Distributed Team Performance

A Survey of Protocol Classifications and Presenting a New Classification of Routing protocol in ad-hoc

Developing mobile educational apps: development strategies, tools and business models

Data Mining Awareness and Readiness in Healthcare Sector: a case of Tanzania

Digital Organism Simulation Environment (DOSE): A Library for Ecologically-Based In Silico Experimental Evolution

Determining Threshold Value and Sharing Secret Updating Period in MANET

Beyond one shot recommendations: The seamless interplay of environmental parameters and Quality of recommendations for the best fit list

Island Model based Differential Evolution Algorithm for Neural Network Training

3D-Diagram for Managing Industrial Sites Information

Benefits, Weaknesses, Opportunities and Risks of SaaS adoption from Iranian organizations perspective

Evaluation of the CDN architecture for Live Streaming through the improvement of QOS Case study: Islamic Republic of Iran Broadcasting

A Robust and Energy-Efficient DVFS Control Algorithm for GALS-ANoC MPSoC in Advanced Technology under Process Variability Constraints

Mobile IP Issues and Their Potential Solutions: An Overview

Action recognition system based on human body tracking with depth images

Contention -aware virtual channel assignment in application specific Networks-on -chip

Optimization Based Blended Learning Framework for Constrained Bandwidth Environment

Analysis of Computing Open Source Systems

:2014 Volume 3, Issue 2  March –

Multi-Objective Genetic Algorithms for computing Fast Fourier Transform for evolving Smart Sensors devices using Field Programmable gate arrays

Analysis and Improvement of the Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard

Weighted Twin Support Vector Machine with Universum

Designing An Efficient Target Tracking Protocol Based on a Clustering Algorithm and Recovery Mechanism in Wireless Sensor Networks (WSNs

Middle East User Navigation in Online Social Networks and Interactions in E-Commerce, an Analogy

Map Abstraction with Adjustable Time Bounds

Predicting students’ grades using fuzzy non-parametric regression method and ReliefF-based algorithm

Reducing Energy Consumption in Mobile ad hoc Networks Using Energy-aware Routing Algorithm Based on Multiple Routes

Extracting Protein Names from Biological Literature

Cloud based Cross Platform Mobile Applications Building and integrating cloud services with mobile client applications

Applying Web Usage Mining Techniques to Design Effective Web Recommendation Systems: A Case Study

Geometric Transformations via Matrix Multiplications Using Hardware/Software Co-design

A New Robust Audio Signal Steganography Based On Multiple Chaotic Algorithms With Edge Detection Technique

A Quantum Optimization Model for Dynamic Resource Allocation in Networks

Heuristics for Irreversible Ternary MVL Circuit Synthesis and Optimization Using PSO Algorithm

Cooperative Machine-Vision-Based Tracking using Multiple Unmanned Aerial Vehicles

Study of secure m-commerce, challenges and solutions

Traditional Host based Intrusion Detection Systems’ Challenges in Cloud Computing

Botnet Detection using NetFlow and Clustering

Citizens’ Readiness for Remote Electronic Voting in Tanzania

 

 

 

اشتراک گذاری نوشته در:

پاسخی بگذارید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

نوزده + 14 =