Lightweight Headgear Brain Waves for Fatigue Detection in Smartphone
Full Text Yung Gi Wu, Jwu Jenq Chen and Rui Hsin Wang, Chang Jung Christian University, Taiwan
Election System Based on Blockchain Technology
Full Text Noor Mohammedali and Ali Al-Sherbaz, Northampton University, UK
Image Generation with Gans-based Techniques: A Survey
Full Text Shirin Nasr Esfahani and Shahram Latifi, UNLV, USA
Estimating the Crest Lines on Polygonal Mesh Models by an Automatic Threshold Full Text Zhihong Mao, Ruichao Wang, Fan Liu and Yulin Zhou, Wuyi University, China
Matbase auto Function Non-relational Constraints Enforcement Algorithms
Full Text Christian Mancas, Ovidius University, Romania
Query Optimization for Big Data Analytics
Full Text Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert, Pace University, USA
Detection of Fake Accounts in Instagram Using Machine Learning
Full Text Ananya Dey1 , Hamsashree Reddy2 , Manjistha Dey3 and Niharika Sinha4 , 1 National Institute of Technology, Tiruchirappalli, India, 2 PES University, India, 3 RV College of Engineering, India and 4 Manipal Institute of Technology, India
An Improve Object-oriented Approach for Multi-objective Flexible Job-shop Scheduling Problem (FJSP) Full Text Bamaiyi Sule and Ibrahim Lawal, Abubakar Tafawa Balewa University, Nigeria
Coloured Algebras and Biological Response in Quantum Biological Computing Architectures Full Text L-F Pau1 and P. Borza2 , 1 CBS, Denmark & Erasmus University, Netherlands and 2 Transilvania University Braşov, Romania
A Comparative Study E-Commerce Development Method: Adapting an Agile Approach in Mobile Occasion E – Commerce System Full Text Beshair Khalid Alsiddiq and Nor Shahida Mohd Jamail, Prince Sultan University, Saudi Arabia
An Effect of Using A Storage Medium in Dijkstra Algorithm Performance for Ideal Implicit Path Cost Full Text Ibtusam Alashoury and Mabroukah Amarif, Sebha University, Sebha, Libya
Big Data in Cloud Computing Review and Opportunities
Full Text Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert, Pace University, USA
Remote Monitoring L.V. Switchboard Power Status with 5G New Radio Network Application Full Text Tony Tsang and Lam Sai Chung, Hong Kong College of Technology, Hong Kong
Applying Important-Performance Analysis to Home Stay Service Performance
Full Text Han-Chen Huang, Chung Hua University, Taiwan
Spectrum Occupancy in Rural Nigeria: A Case for A Lightly Licensed Spectrum Band for Rural Broadband Enhancement Full Text Emmanuel A. Ubom, Aloysius C. Akpanobong and Ubong Ukommi, Akwa Ibom State University, Nigeria
Exploring Factors Influencing the Adoption of Online Shopping with Saudi E-Shops, Female Perspective Full Text Noura Mohammed Aldaej, Al-Imam Mohammad Ibn Saud Islamic University(IMSIU), Saudi Arabia
Swedish Student-Teachers in Digital Activities: Digital Competence Through
Development-Oriented Thesis Projects Full Text Peter Karlsudd, Linnaeus University, Sweden
Design and Implementation of A Raspberry-pi Based Home Security and Fire Safety System Full Text Sajid M. Sheikh1 , Modise K. Neiso2 and Fatma Ellouze3 , 1,2 University of Botswana, Gaborone, Botswana and 3 Univeristy of Sfax, Tunisia
An Approach to Extracting Distributed Data From the Integrated Environment of Web Technologies Based on Set Theory Full Text Cheikh Ould El Mabrouk and Karim Konaté, University Cheikh Anta DIOP, Senegal
Comparative Analysis of FCFS, SJN & RR Job Scheduling Algorithms
Full Text Luhutyit Peter Damuut1 and Pam Bulus Dung2 , 1 Kaduna State University, Nigeria and 2 FCE Pankshin, Nigeria
Performance Evaluation of Parallel Bubble Sort Algorithm on Supercomputer IMAN1 Full Text Reem Saadeh and Mohammad Qatawneh, The University of Jordan, Jordan
Intrusion Detection System Classification Using Different Machine Learning Algorithms on KDD-99 and NSL-KDD Datasets - A Review Paper Full Text Ravipati Rama Devi and Munther Abualkibash, Eastern Michigan University, USA
Smart Motorcycle Helmet: Real-Time Crash Detection With Emergency Notification, Tracker and Anti-Theft System Using Internet-of-Things Cloud Based Technology Full Text Marlon Intal Tayag1 and Maria Emmalyn Asuncion De Vigal Capuno2 , 1 Holy Angel University, Philippines and 2 Future University, Sudan
A Survey on Security Challenges of Virtualization Technology in Cloud Computing Full Text Nadiah M. Almutairy1 and Khalil H. A. Al-Shqeerat2 , 1 College of Sciences and Arts in Rass, Saudi Arabia and 2 Qassim University, Saudi Arabia
Towards an Approach for Integrating Business Continuity Management Into Enterprise Architecture Full Text Hanane Anir, Mounia Fredj and Meryem Kassou, Mohammed V University, Morocco
A Survey of Clustering Algorithms in Association Rules Mining
Full Text Wael Ahmad AlZoubi, Balqa Applied University, Jordan
Compromising Systems: Implementing Hacking Phases
Full Text Marlon intal tayag1 and Maria emmalyn asuncion de vigal capuno2 , 1 Holy Angel University, Philippines and 2 Future University, Sudan
Analytical Study to Review of Arabic Language Learning Using Internet Websites Full Text 1 Samer Shorman and 2 Mohammad Al-Shoqran, 1 Applied Science University, Kingdom of Bahrain
2 Ahlia University, Kingdom of Bahrain
Ensemble Learning Model for Screening Autism in Children
Full Text Mofleh Al Diabat and Najah Al-Shanableh, Al Albayt University, Al Mafraq- Jordan
A Novel Prototype Model for Swarm Mobile Robot Navigation Based Fuzzy Logic Controller Full Text Sherif Kamel Hussein and Mashael Amer Al-Mutairi, Arab East Colleges for Graduate Studies, KSA
Web Crawler for Social Network User Data Prediction Using Soft Computing Methods Full Text José L. V. Sobrinho, Gélson da Cruz Júnior and Cássio Dener Noronha Vinhal, Federal University of Goiás, Brazil
Reduction of Monitoring Registers on Software Defined Networks
Full Text Luz Angela Aristizábal Q and Nicolás Toro G, Universidad Nacional de Colombia, Colombia
Data-Driven Model for Non-Functional Requirements in Mobile Application Development Full Text Salisu Garba, Babangida Isyaku and Mujahid Abdullahi, Sule Lamido University, Nigeria
Agile Distributed Software Development in Nine Central European Teams: Challenges, Benefits and Recommendations Full Text Manuel Stadler, Raoul Vallon, Martin Pazderka and Thomas Grechenig, Research Group for Industrial Software, Vienna University of Technology, Austria
Speech Recognition by Improving the Performance of Algorithms Used in Discrimination Full Text Ahmar -Haeder Talib Mahde, AL Iraqia University College of Engineering, Iraq
Developing an Integrated Framework to Utilize Big Data for Higher Education Institutions in Saudi Arabia Full Text Noura A.Alsheikh, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia
New Market Segmentation Methods Using Enhanced (RFM), CLV, Modified Regression and Clustering Methods Full Text Fahed Yoseph1 , Nurul Hashimah Ahamed Hassain Malim2 and Mohammad AlMalaily3 , 1,2 School of Computer Science, Universiti Sains Malaysia,
3 Faculty of Engineering, Mansoura University
Wi-Fi Microcontroller Based Smart Menu
Full Text Sherif Kamel Hussein, University for Modern Sciences and Arts, Giza, Egypt
Minimizing Distortion in Steganog-Raphy Based on Image Feature
Full Text Dong Wu, Lingnan Normal University, China
Detection and Handling of Different Types of Concept Drift in News Recommendation Systems Full Text Nayer Wanas1 , Ahmed Farouk1 , Dina Said1 , Nabila Khodeir1
and Magda Fayek2 , 1 Informatics Department, Electronics Research Institute, Giza, Egypt and 2 Computer Engineering Department, Cairo University, Giza, Egypt
Monitoring Student Attendance Using A Smart System at Taif University
Full Text Saleh Alghamdi, Taif University, Saudi Arabia