Submit a Manuscript
Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Journal of Advanced Computer Science & Technology (JACST)
About
About the Journal
Author Guidelines
Editorial Team
Indexing and Abstracting
Publication Ethics
Article Processing Charges
Current Issue
Archives
Submit a Manuscript
Other Journals
Contact us
Search
Register
Login
Home
/
Archives
/
Vol. 3 No. 2 (2014)
Vol. 3 No. 2 (2014)
Published:
2014-06-02
Articles
Information visualization by dimensionality reduction: a review
Safa Najim
https://doi.org/10.14419/jacst.v3i2.2746
101-112
A federated approach for global village services interaction
Mohammad Reza Mollahoseini Ardakani, Seyyed Mohsen Hashemi
https://doi.org/10.14419/jacst.v3i2.2514
113-119
Optimized design for controlling LED display matrix by an FPGA board
MATEUR Khalid, EL GOURI Rachid, DAHOU Hamad, HLOU Laâmari
https://doi.org/10.14419/jacst.v3i2.2818
120-128
RLBM model: modeling of Manet’s routing protocols based on restoration links break
Zahra Abdoly, Seyyed Javad Mirabedini, Peyman Arebi
https://doi.org/10.14419/jacst.v3i2.3004
129-135
Effective staff line detection, restoration and removal approach for different quality of scanned handwritten music sheets
Fatemeh Alirezazadeh, Mohammad Reza Ahmadzadeh
https://doi.org/10.14419/jacst.v3i2.3196
136-142
Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions
Anass RGHIOUI, Anass KHANNOUS, Mohammed BOUHORMA
https://doi.org/10.14419/jacst.v3i2.3321
143-153
Range of outputs precise of digits rounding in SPSS and MS Excel
Zaher Al-Hashami
https://doi.org/10.14419/jacst.v3i2.3573
154-159
Cloud computing: use cases & various applications
Seyyed Mohsen Hashemi, Ali Hanani
https://doi.org/10.14419/jacst.v3i2.3602
160-168
A new high capacity steganography based on bit-inverting method in DWT domain
Mahnoosh Sadat Azaminezhad, Amir Massoud Bidgoli
https://doi.org/10.14419/jacst.v3i2.3404
169-178
The (a, q) data modeling in probabilistic reasoning
Richard Douglas
https://doi.org/10.14419/jacst.v3i2.3270
179-201
Securing the Cloud: Threats, Attacks and Mitigation Techniques
Mohammed M. Alani
https://doi.org/10.14419/jacst.v3i2.3588
202-213
A neural network based congestion control algorithm for content-centric networks
Parisa Bazmi, Manijeh Keshtgary
https://doi.org/10.14419/jacst.v3i2.3696
214-220
Reliability evaluation of a payment model in mobile e-commerce using colored Petri net
Abdolghader Pourali, Mohammad V Malakooti, Muhammad Hussein Yektaie
https://doi.org/10.14419/jacst.v3i2.3663
221-231
A survey on SDN, the future of networking
Shiva Rowshanrad, Sahar Namvarasl, Vajihe Abdi, Maryam Hajizadeh, Manijeh Keshtgary
https://doi.org/10.14419/jacst.v3i2.3754
232-248
Fuzzy spanners
Mohammad Farshi
https://doi.org/10.14419/jacst.v3i2.3800
249-252