International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE)

                                                                                                                                                                                                   ISSN : 2278 7917 

Call For Papers

January 2019

  Submission         January 10

  Acceptance         January 20

  Publication          January 30

Bookmark and Share

International Journal of advanced studies in Computer Science and Engineering (IJASCSE) is here to provide a timely and broad coverage of research in ever-challenging field of Computer Science and Computer Science Engineering. IJASCSE is an interdisciplinary, peer reviewed, fully refereed, monthly, Open Access journal for research scholars with a mix of regular and theme based issues to share their new and advanced research in Computer Science and Engineering. 


The papers published at IJASCSE are currently Abstracted & Indexed by some world famous databases.

 Call For Papers

December  2018

     Submission            December 10

      Notification            December 20

      Publication            December 31

Bookmark and Share

Open Access Database


IJASCSE is an online peer reviewed quality publication, which publishes research papers from diverse fields in computers, sciences, engineering and technologies that emphasizes new research, development and their applications. It provides an open access database for all who are interested to exchange their research work, technical notes & surveying results among professionals through out the world.

 

 IJASCSE volume 5 issue 11 (Theme: Computer Sciences and Informatics)                            

A Logic Based Context Modeling and Context aware Services Adaptation for a Smart Office

Moeiz Miraoui, Sharif El-etriby, Abdulbasit Zaid Abed, Chakib Tadj

 

Arabic Keyword Extraction using SOM Neural Network

Ebtehal H.Omoush, Venus W. Samawi

 

Big Data Analysis Techniques using Multi-GPUs Map Reduce Implementations

Belal Zaqaibeh, Islam Obaidat and Wegdan Hussien

 

Choosing The Right Technique For the Robust Watermark

Prof. Dr. Alaa H Al-Hamami, Fidaa Mahmoud Shuaib

 

Cloud Computing Access Authentication through Mobile Device Based on Face Recognition

Alaa Hussein Al-Hamami, Ali Mohammad Saab

 

Comparison of optimized Dijkstra’s and enhanced Particle Swarm Optimization Algorithm to find shortest path

Hashim Ali, Fazal Hadi, Ahmadullah, Muhammad Haris

 

Computerization of Medical Laboratories Examinations in the Sudan: Reality and Expectations: Case Study Documentation and Information Center, National Center for Research- Sudan

Dr. Nasreldin Hassan Ahmed Juma

 

Enhance Mobile Phones Privacy Based on Steganography

Mohammed Alaa Al-Hamami Alaa. H. Al-Hamami and Salwa AlSharif

 

Enhanced Image Retrieval using Distributed Contrast Model

Mohammed. A. Otair

 

Enhancing the Compression Ratio of the HCDC Text Compression Algorithm

Hussein Al-Bahadili, Ghassan F. Issa, Ahmed Imad

 

Exploring the Effects of Users’ Location on HCI Factors Using Multi-touch Tabletops

Firas Alghanim

 

Extracting Named Entities Using Named Entity Recognizer for Arabic News Articles

Tarek Kanan, Raed Kanaan, Omar Al-Dabbas, Ghassan Kanaan, Ali Al-Dahoud, Edward Fox

  

Face Recognition Technique Based On Artificial Neural Network and Principal

Component Analysis

Alaa Hussein Al-Hamami and Noor Hamadi Batty

 

Future Challenges in Android

Ahmed Alaa Al-Hamami Dr. Mohammad Nassar

 

Gesture Recognition For Learning Math Using Kinect

Tareq M. AlZubi, Julián F. González, Anas Al-Rahamneh, Jose M. Cotos

 

Improving the Performance of Naïve Bayes Algorithm for Arabic Text Categorization

Akram M. O.Al Mashaykhi, Nibras Jamal Abu Aqoulah, May H. Riadh

 

Improved Round Robin Algorithm: Proposed Method to Apply SJF using Geometric Mean

Omar Hani Mohammad Dorgham, Dr. Mohammad Othman Nassar

 

Influence of Nominal Project Knowledge in the Detection of Design Smells: An Exploratory Study with God Class

Khalid Alkharabsheh, Shahed Almobydeen, Jose A. Taboada, Yania Crespo

 

Managing the Security of Information and Communication in Light of the Networks Technology

Raed J. Altoom

 

Routing Protocols In Large Scale Wireless Sensor Networks – A Survey

Alaa Alzoubi, Tarek Kanan, Ghassan Kanaan, Riyadh Alshalabi

 

Signal Processing and Applications in Metering System

A. Harrouz and A. Benatiallah, O. Harrouz

 

Student Perception about the Use of Biometrics Technologies in an Academic Environment of Abdul Wali Khan University Mardan Pakistan

Fazal Hadia, Ahmad Ullahb , Muhammad Harisc , Yasir Shahd

 

Sustainable Development: Proposing Cloud Computing Framework for Higher Education

Ministry (HEM) in Iraq

Prof. Dr. Alaa H. AL-Hamami Dr. Soukaena H. Hashem

 

The Performance of Inner Join Types in SQL

Fawwaz Yousef Alnawaj'ha

 

Towards Adaptive Hybrid Optimization Technique

Marwah Alian, Amjad Hudaibline, Dima Suleiman

 

Technique of Regular Expression for Arabic Light Stemmer

Omar Aldabbas, Ghassan Kanaan, Motasim Albdarnah, Riyadh Alshalabi, Mohammed A.Shehab, Nizar

Mahyoub

 

Tool for computer teachers' CPD-MOOCs: Opportunities and Challenges

Mohamed Saad Eldin Mohamed Ahmed

 

New Developments in the use of Spatial Technology in Archaeology, Sample case: Rocha Castle System

Zaid Mustafa, José M. Cotos, Julián Flores, Emilio Abad

Keywords-Smart office; Context; Logic; Modeling; Service; Adaptation.

 

Keywords-Arabic keywords extraction; Self organized neural network; Natural language

 

Keywords- Big Data; Map Reduce; GPU; Mapper; Reducer; multi- GPU frameworks

 

Keywords- Watermark; Robustness; Imperceptibility; Attacks; Contour let Transform and Redundant Discrete

 

Keywords: Cloud Network; Authentication; Biometric; Face Recognition; Mobile device

 

Keywords- Dijkstra’s; Particle Swarm Optimization; Optimization problem; swarm intelligence

 

Keywords: Computerization-Medical Laboratories – Medical information-Database- documentation center 


Keywords- SMS; MMS; Steganography; Privacy; Secret Messages

 

Keywords-component; Image retrieval; similarity; content based image retrieval (CBIR); contrast model

 

Keywords- Text compression; Hamming Codes; HCDC algorithm; compression ratio

 

Keywords- Human-Computer Interaction; Collaboration; Usability, User performance

 

Keywords: Arabic Language; Named Entity Recognizer; Natural Language Processing

 

Keywords--Data Mining; Principle Component Analysis; Eigen; Face Recognition; and Neural Network 


Keywords- Google; Hardware; Marshmallow; Future; Android

 

Keywords: Human Computer Interaction HCI; Gesture Recognition; Education

 

Key words- Text Categorization; Naïve Bayes classifier; Arabic categorization; N-Gram

 

Keywords- CPU Scheduling; Round Robin Algorithm; Shortest Job First (SJF); Geometric Mean

 

Keywords-design smell detection; god class; machine learning

 

Keywords-component; management; information security; communication, networks

 

Keywords: Wireless sensor network; routing techniques; data transmission in WSN

 

Keywords-Metering; signal; communication

 

Keywords: Biometrics tools; Privacy; Security

 

Keywords: Cloud Computing, Higher Education Ministry, Framework, and cloud characteristics

 

Keywords-- query; performance; join; inner join; natural join

 

Keywords- Optimization; Differential evolution; Invasive Weed Optimizer

 

Keywords: NLP; Light stemming; Arabic text; preprocessing; Regular expression

 

Keywords: Massive Open Online Courses; Continued Professional Development; Connectives; ComputerTeachers


Keywords- Virtual Geographic Environments (VGEs); Spatial Analysis; Information Visualization; Keyhole Markup Language (KML); Geographic Information Science (GIScience).