Computer Science and Information Technology  

Computer Science and Information Technology is an international peer-reviewed journal that publishes original and high-quality research papers in all areas of computer science and information technology. As an important academic exchange platform, scientists and researchers can know the most up-to-date academic trends and seek valuable primary sources for reference.


ISSN: 2331-6063 (Print)

ISSN: 2331-6071 (Online)

Contact Us: csit.editor@hrpub.org or editor@hrpub.org

Website: https://www.hrpub.org/journals/jour_info.php?id=35


Archive

Volume 11   2023
Vol.11 No.1Vol.11 No.2
Volume 10   2022
Vol.10 No.1Vol.10 No.2Vol.10 No.3Vol.10 No.4
Volume 9   2021
Vol.9 No.1Vol.9 No.2Vol.9 No.3
Volume 8   2020
Vol.8 No.1Vol.8 No.2Vol.8 No.3Vol.8 No.4
Volume 7   2019
Vol.7 No.1Vol.7 No.2Vol.7 No.3Vol.7 No.4Vol.7 No.5
Volume 6   2018
Vol.6 No.1Vol.6 No.2Vol.6 No.3Vol.6 No.4
Volume 5   2017
Vol.5 No.1Vol.5 No.2Vol.5 No.3Vol.5 No.4Vol.5 No.5
Volume 4   2016
Vol.4 No.1Vol.4 No.2Vol.4 No.3Vol.4 No.4Vol.4 No.5
Volume 3   2015
Vol.3 No.1Vol.3 No.2Vol.3 No.3Vol.3 No.4Vol.3 No.5Vol.3 No.6
Volume 2   2014
Vol.2 No.1Vol.2 No.2Vol.2 No.3Vol.2 No.4Vol.2 No.5Vol.2 No.6
Vol.2 No.7Vol.2 No.8
Volume 1   2013
Vol.1 No.1Vol.1 No.2Vol.1 No.3Vol.1 No.4

Vol 3(Jul, 2015) No 4

A Hierarchical Multilayer Service Composition Model for Global Virtual Organizations

Abiud Wakhanu Mulongo, Elisha T. Opiyo Omulo, William Okello Odongo

[Abstract] [Full Text] [Full Article - PDF] pp. 91 - 104

DOI: 10.13189/csit.2015.030401

ICT and Emergency Volunteering in Jordan: Current and Future Trends

Nidhal El-Omari, Mohamad Alzaghal, Sameh Ghwanmeh

[Abstract] [Full Text] [Full Article - PDF] pp. 105 - 112

DOI: 10.13189/csit.2015.030402

Methods of Modeling the Process of Building the Conceptual Model of TIAV Multimedia System

Beknazarova Saida Safibullayevna

[Abstract] [Full Text] [Full Article - PDF] pp. 113 - 116

DOI: 10.13189/csit.2015.030403

A Novel Smart Card-based Remote User Authentication Mechanism

Deborah Uwera, Dongho Won

[Abstract] [Full Text] [Full Article - PDF] pp. 117 - 121

DOI: 10.13189/csit.2015.030404

Implementing Remote Presence Using Quadcopter Control by a Non-Invasive BCI Device

Jzau-Sheng Lin, Zi-Yang Jiang

[Abstract] [Full Text] [Full Article - PDF] pp. 122 - 126

DOI: 10.13189/csit.2015.030405

Image Tamper Detection and Recovery based on Dilation and Chaotic Mixing

Hao-Chun Wang, Wei-Ming Chen, Ping-Yi Lee

[Abstract] [Full Text] [Full Article - PDF] pp. 127 - 132

DOI: 10.13189/csit.2015.030406

E-Government, Open Data, and Security: Overcoming Information Security Issues with Open Data

Abdurakhmanov Abduaziz Abdugaffarovich, Varisov Akmal Abbasovich, Nasrullaev Nurbek Bakhtiyarovich

[Abstract] [Full Text] [Full Article - PDF] pp. 133 - 137

DOI: 10.13189/csit.2015.030407

Classification of Trajectories Using Category Maps and U-Matrix to Predict Interests Used for Event Sites

Hirokazu Madokoro, Kazuhito Sato, Nobuhiro Shimoi

[Abstract] [Full Text] [Full Article - PDF] pp. 138 - 147

DOI: 10.13189/csit.2015.030408