Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Journal of Advanced Computer Science & Technology
About
About the Journal
Author Guidelines
Indexing and Abstracting
Publication Ethics
Article Processing Charges
Current Issue
Archives
Submit a Manuscript
Other Journals
Contact us
Search
Register
Login
Home
/
Archives
/
Vol. 3 No. 2 (2014)
Vol. 3 No. 2 (2014)
DOI:
https://doi.org/10.14419/jacst.v3i2
Published:
2014-06-02
Articles
Information visualization by dimensionality reduction: a review
Safa Najim
Pages: 101-112
DOI:
https://doi.org/10.14419/jacst.v3i2.2746
A federated approach for global village services interaction
Mohammad Reza Mollahoseini Ardakani, Seyyed Mohsen Hashemi
Pages: 113-119
DOI:
https://doi.org/10.14419/jacst.v3i2.2514
Optimized design for controlling LED display matrix by an FPGA board
MATEUR Khalid, EL GOURI Rachid, DAHOU Hamad, HLOU Laâmari
Pages: 120-128
DOI:
https://doi.org/10.14419/jacst.v3i2.2818
RLBM model: modeling of Manet’s routing protocols based on restoration links break
Zahra Abdoly, Seyyed Javad Mirabedini, Peyman Arebi
Pages: 129-135
DOI:
https://doi.org/10.14419/jacst.v3i2.3004
Effective staff line detection, restoration and removal approach for different quality of scanned handwritten music sheets
Fatemeh Alirezazadeh, Mohammad Reza Ahmadzadeh
Pages: 136-142
DOI:
https://doi.org/10.14419/jacst.v3i2.3196
Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions
Anass RGHIOUI, Anass KHANNOUS, Mohammed BOUHORMA
Pages: 143-153
DOI:
https://doi.org/10.14419/jacst.v3i2.3321
Range of outputs precise of digits rounding in SPSS and MS Excel
Zaher Al-Hashami
Pages: 154-159
DOI:
https://doi.org/10.14419/jacst.v3i2.3573
Cloud computing: use cases & various applications
Seyyed Mohsen Hashemi, Ali Hanani
Pages: 160-168
DOI:
https://doi.org/10.14419/jacst.v3i2.3602
A new high capacity steganography based on bit-inverting method in DWT domain
Mahnoosh Sadat Azaminezhad, Amir Massoud Bidgoli
Pages: 169-178
DOI:
https://doi.org/10.14419/jacst.v3i2.3404
The (a, q) data modeling in probabilistic reasoning
Richard Douglas
Pages: 179-201
DOI:
https://doi.org/10.14419/jacst.v3i2.3270
Securing the Cloud: Threats, Attacks and Mitigation Techniques
Mohammed M. Alani
Pages: 202-213
DOI:
https://doi.org/10.14419/jacst.v3i2.3588
A neural network based congestion control algorithm for content-centric networks
Parisa Bazmi, Manijeh Keshtgary
Pages: 214-220
DOI:
https://doi.org/10.14419/jacst.v3i2.3696
Reliability evaluation of a payment model in mobile e-commerce using colored Petri net
Abdolghader Pourali, Mohammad V Malakooti, Muhammad Hussein Yektaie
Pages: 221-231
DOI:
https://doi.org/10.14419/jacst.v3i2.3663
A survey on SDN, the future of networking
Shiva Rowshanrad, Sahar Namvarasl, Vajihe Abdi, Maryam Hajizadeh, Manijeh Keshtgary
Pages: 232-248
DOI:
https://doi.org/10.14419/jacst.v3i2.3754
Fuzzy spanners
Mohammad Farshi
Pages: 249-252
DOI:
https://doi.org/10.14419/jacst.v3i2.3800