Vol 3, No 2 (2014)

Table of Contents


Information visualization by dimensionality reduction: a review

Safa Najim Pages: 101-112

DOI: 10.14419/jacst.v3i2.2746

A federated approach for global village services interaction

Mohammad Reza Mollahoseini Ardakani, Seyyed Mohsen Hashemi Pages: 113-119

DOI: 10.14419/jacst.v3i2.2514

Optimized design for controlling LED display matrix by an FPGA board

MATEUR Khalid, EL GOURI Rachid, DAHOU Hamad, Pages: 120-128

DOI: 10.14419/jacst.v3i2.2818

RLBM model: modeling of Manets routing protocols based on restoration links break

Zahra Abdoly, Seyyed Javad Mirabedini, Peyman Arebi Pages: 129-135

DOI: 10.14419/jacst.v3i2.3004

Effective staff line detection, restoration and removal approach for different quality of scanned handwritten music sheets

Fatemeh Alirezazadeh, Mohammad Reza Ahmadzadeh Pages: 136-142

DOI: 10.14419/jacst.v3i2.3196

Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions

Anass RGHIOUI, Anass KHANNOUS, Mohammed BOUHORMA Pages: 143-153

DOI: 10.14419/jacst.v3i2.3321

Range of outputs precise of digits rounding in SPSS and MS Excel

Zaher Al-Hashami Pages: 154-159

DOI: 10.14419/jacst.v3i2.3573

Cloud computing: use cases & various applications

Seyyed Mohsen Hashemi, Ali Hanani Pages: 160-168

DOI: 10.14419/jacst.v3i2.3602

A new high capacity steganography based on bit-inverting method in DWT domain

Mahnoosh Sadat Azaminezhad, Amir Massoud Bidgoli Pages: 169-178

DOI: 10.14419/jacst.v3i2.3404

The (a, q) data modeling in probabilistic reasoning

Richard Douglas Pages: 179-201

DOI: 10.14419/jacst.v3i2.3270

Securing the Cloud: Threats, Attacks and Mitigation Techniques

Mohammed M. Alani Pages: 202-213

DOI: 10.14419/jacst.v3i2.3588

A neural network based congestion control algorithm for content-centric networks

Parisa Bazmi, Manijeh Keshtgary Pages: 214-220

DOI: 10.14419/jacst.v3i2.3696

Reliability evaluation of a payment model in mobile e-commerce using colored Petri net

Abdolghader Pourali, Mohammad V Malakooti, Muhammad Hussein Yektaie Pages: 221-231

DOI: 10.14419/jacst.v3i2.3663

A survey on SDN, the future of networking

Shiva Rowshanrad, Sahar Namvarasl, Vajihe Abdi, Maryam Hajizadeh, Manijeh Keshtgary Pages: 232-248

DOI: 10.14419/jacst.v3i2.3754

Fuzzy spanners

Mohammad Farshi Pages: 249-252

DOI: 10.14419/jacst.v3i2.3800

Copyright © 2022 Science Publishing Corporation Inc. All rights reserved.