Computer Science and Information Technologies
- Abhishek, B., Krishi, K., Meghana, M., Daaniyaal, M., Anupama, H.S. Hand gesture recognition using machine learning algorithms. (2020) Computer Science and Information Technologies, 1 (3), pp. 116-120. Cited 15 times.
- Verma, P., Goyal, A., Gigras, Y. Email phishing: Text classification using natural language processing. (2020) Computer Science and Information Technologies, 1 (1), pp. 1-12. Cited 13 times.
- Hamzah, M. L., Purwati, A. A., Sutoyo, S., Marsal, A., Sarbani, S., Nazaruddin, N. Implementation of the internet of things on smart posters using near field communication technology in the tourism sector. (2022) Computer Science and Information Technologies, 3 (3), pp. 194-202. Cited 10 times.
- Florrence, M. Building a multilingual ontology for education domain using monto method. (2020) Computer Science and Information Technologies, 1 (2), pp. 47-53. Cited 9 times.
- Ghugar, U., Pradhan, J. Survey of wormhole attack in wireless sensor networks. (2020) Comput Sci Inf Technol, 2 (1), pp. 33-42. Cited 7 times.
- Atiqur, R. Smart car parking system model for urban areas. (2021) Comput. Sci. Inf. Technol, 2 (2), pp. 95-102. Cited 5 times.
- Saeed, E. M. H., Saleh, H. A., Khalel, E. A. Classification of mammograms based on features extraction techniques using support vector machine. (2021) Comput Sci Inf Technol, 2 (3), pp. 121-131. Cited 5 times.
- Naqvi, M.R. Low power network on chip architectures: A survey. (2022) Computer Science and Information Technologies, 2 (3), pp. 158-168. Cited 3 times.
- Benahmida, A., Maouhoub, N., Sahsah, H. Numerical approach for extraction of photovoltaic generator single-diode model parameters. (2021) Comput. Sci. Inf. Technol, 2 (2), pp. 58-66. Cited 3 times.
- Moe Htay, M. Feature extraction and classification methods of facial expression: A survey. (2021) Computer Science and Information Technologies, 2 (1), pp. 26-32. Cited 3 times.
- Florrence, M. MLGrafViz: Multilingual ontology visualization plug-in for protégé. (2021) Computer Science and Information Technologies, 2 (1), pp. 43-48. Cited 2 times.
- Teguh, R., Usup, H. Realtime monitoring for groundwater level and local climate based on universal communication system. (2021) Comput. Sci. Inf. Technol, 2, p. 67. Cited 3 times.
- Alam, Tanweer. Performance evaluation of blockchains in the internet of things. (2020) Computer Science and Information Technologies, 1 (3), pp. 93-97. Cited 3 times.
- Ben Ismail, M. M. Insult detection using a partitional CNN-LSTM model. (2020) Computer Science and Information Technologies, 1 (2), pp. 84-92. Cited 3 times.
- Khobragade, Shrutika, Bhosale, Rohini, Jiwane, Rahul. High Security Mechanism: Fragmentation and Replication in the Cloud with Auto Update in the System. (2020) Computer Science and Information Technologies, 1 (2), pp. 78-83. Cited 3 times.
- Florrence Joseph, M., Lourdusamy, R. Feature analysis of ontology visualization methods and tools. (2020) Computer Science and Information Technologies, 1 (2), pp. 61-77. Cited 3 times.
- Rayudu, K.V.B.V., Jahagirdar, D.R., Rao, P.S. Design and testing of systolic array multiplier using fault injecting schemes. (0000) Computer Science and Information Technologies, 3 (1), pp. 1-9. Cited 3 times.
- Oladipupo, E. T., Abikoye, O. C. Improved authenticated elliptic curve cryptography scheme for resource starve applications. (2022) Comput. Sci. Inf. Technol., 3 (3), pp. 169-185. Cited 2 times.
- Aravamudu, P., Thattipalli, A. R., Dennisan, A. Exploring and comparing various machine deep learning technique algorithms to detect domain generation algorithms of malicious variants. (2022) Computer Science and Information Technologies, 3 (1). Cited 2 times.
- Nahar, A.K., Hussein, M.A. A hybrid of the selected mapping and partial transmit sequence approaches for reducing the high peak average to power ratio based on multi-carrier systems—Review. (2022) Comput. Sci. Inf. Technol, 3, pp. 10-21. Cited 2 times.
- Hartama, D., Mawengkang, H., Zarlis, M., Sembiring, R. W. Model of emergence evacuation route planning with contra flow and zone scheduling in disaster evacuation. (2021) Computer Science and Information Technologies, 2 (1), pp. 1-10. Cited 2 times.
- C, R., G.N, K. An optimized encryption algorithm and F function with dynamic substitution for creating S-box and P-box entries for blowfish algorithm. (2021) Comput. Sci. Inf. Technol., 2 (1), pp. 16-25. Cited 2 times.
- Shah, Arpita, Patel, Narendra. Efficient and scalable multitenant placement approach for in-memory database over supple architecture. (2020) Computer Science and Information Technologies, 1 (2), p. 39. Cited 2 times.
- Siddiqui, T., Hina, S., Asif, R., Ahmed, S., Ahmed, M. An ensemble approach for the identification and classification of crime tweets in the English language. (2023) Comput. Sci. Inf. Technol, 4, pp. 149-159. Cited 1 time.
- Hariguna, T., Rahardja, U., Aini, Q. The antecedent e-government quality for public behaviour intention, and extended expectation-confirmation theory. (2023) Comput. Sci. Inf. Technol, 4 (1), pp. 33-42.
- Oladipupo, E. T., Abikoye, O. C. Modified Playfair cryptosystem for improved data security. (2022) Comput. Sci. Inf. Technol, 3 (1), pp. 51-64. Cited 1 time.
- Sarasa, A. Development of a web application to share hobbies activities. (2022) Computer Science and Information Technologies, 3 (1), pp. 39-50. Cited 1 time.
- Alwersh, M., Kovács, L. Fuzzy formal concept analysis: approaches, applications and issues. (2022) Comput. Sci. Inf. Technol., 3 (2), pp. 126-136. Cited 1 time.
- Thatipalli, A. R., Aravamudu, P., Kartheek, K., Dennisan, A. Exploring and comparing various machine and deep learning technique algorithms to detect domain generation algorithms of malicious variants. (2022) Computer Science and Information Technologies, 3 (2), pp. 94-103. Cited 1 time.
- Alam, T. Internet of things: review, architecture and applications. (2022) Computer Science and Information Technologies, 3 (1), pp. 31-38. Cited 1 time.
- Rak, F., Wiora, J. Comparison of ESP programming platforms. (2021) Computer science and information technologies, 2 (2), pp. 77-86. Cited 1 time.
- Raghunath, A.K., Bharadwaj, D., Prabhuram, M. Designing a secured audio based key generator for cryptographic symmetric key algorithms. (2021) Computer Science and Information Technologies, 2 (2), pp. 87-94. Cited 1 time.
- Pezeshki, Z. Design and simulation of High-Swing Fully Differential Telescopic Op-Amp. (2021) Comput. Sci. Inf. Technol, 2, pp. 49-57. Cited 1 time.
- Kaviani, V., Amiri, P. A. D., Brujeni, F. Z., Akhlaghi, N. Modification data attack inside computer systems: A critical review. (2020) Computer Science and Information Technologies, 1 (3), pp. 98-105. Cited 1 time.
- Gusdevi, Harya, Ade Setya, P, Zulaeha, Puji Handini. Prototype of LPG gas leakage detector using flame sensor and, MQ-2 sensor. (2020) Computer Science and Information Technologies, 1 (1), pp. 32-38. Cited 1 time.
- Neelima, E., Babu, M.P. Genome feature optimization and coronary artery disease prediction using cuckoo search. (2020) Comput. Sci. Inf. Technol., 1 (3), pp. 106-115. Cited 1 time.