Journals Information
- Aims & Scope
- Indexing
- Editorial Board
- Reviewers
- Guidelines
- Submit Manuscript
- Archive
- Article Processing Charges
- Call for Papers
- Publication Ethics and Malpractice Statement
- Copyright
- FAQs
Special Issues Information
Computer Science and Information Technology 
Computer Science and Information Technology is an international peer-reviewed journal that publishes original and high-quality research papers in all areas of computer science and information technology. As an important academic exchange platform, scientists and researchers can know the most up-to-date academic trends and seek valuable primary sources for reference.
ISSN: 2331-6063 (Print)
ISSN: 2331-6071 (Online)
Contact Us: csit.editor@hrpub.org or editor@hrpub.org
Website: https://www.hrpub.org/journals/jour_info.php?id=35
Archive
Volume 11 2023 | |||||
Vol.11 No.1 | Vol.11 No.2 | ||||
Volume 10 2022 | |||||
Vol.10 No.1 | Vol.10 No.2 | Vol.10 No.3 | Vol.10 No.4 | ||
Volume 9 2021 | |||||
Vol.9 No.1 | Vol.9 No.2 | Vol.9 No.3 | |||
Volume 8 2020 | |||||
Vol.8 No.1 | Vol.8 No.2 | Vol.8 No.3 | Vol.8 No.4 | ||
Volume 7 2019 | |||||
Vol.7 No.1 | Vol.7 No.2 | Vol.7 No.3 | Vol.7 No.4 | Vol.7 No.5 | |
Volume 6 2018 | |||||
Vol.6 No.1 | Vol.6 No.2 | Vol.6 No.3 | Vol.6 No.4 | ||
Volume 5 2017 | |||||
Vol.5 No.1 | Vol.5 No.2 | Vol.5 No.3 | Vol.5 No.4 | Vol.5 No.5 | |
Volume 4 2016 | |||||
Vol.4 No.1 | Vol.4 No.2 | Vol.4 No.3 | Vol.4 No.4 | Vol.4 No.5 | |
Volume 3 2015 | |||||
Vol.3 No.1 | Vol.3 No.2 | Vol.3 No.3 | Vol.3 No.4 | Vol.3 No.5 | Vol.3 No.6 |
Volume 2 2014 | |||||
Vol.2 No.1 | Vol.2 No.2 | Vol.2 No.3 | Vol.2 No.4 | Vol.2 No.5 | Vol.2 No.6 |
Vol.2 No.7 | Vol.2 No.8 | ||||
Volume 1 2013 | |||||
Vol.1 No.1 | Vol.1 No.2 | Vol.1 No.3 | Vol.1 No.4 |
Vol 3(Jul, 2015) No 4
A Hierarchical Multilayer Service Composition Model for Global Virtual Organizations
Abiud Wakhanu Mulongo, Elisha T. Opiyo Omulo, William Okello Odongo
[Abstract] [Full Text] [Full Article - PDF] pp. 91 - 104
DOI: 10.13189/csit.2015.030401
ICT and Emergency Volunteering in Jordan: Current and Future Trends
Nidhal El-Omari, Mohamad Alzaghal, Sameh Ghwanmeh
[Abstract] [Full Text] [Full Article - PDF] pp. 105 - 112
DOI: 10.13189/csit.2015.030402
Methods of Modeling the Process of Building the Conceptual Model of TIAV Multimedia System
Beknazarova Saida Safibullayevna
[Abstract] [Full Text] [Full Article - PDF] pp. 113 - 116
DOI: 10.13189/csit.2015.030403
A Novel Smart Card-based Remote User Authentication Mechanism
Deborah Uwera, Dongho Won
[Abstract] [Full Text] [Full Article - PDF] pp. 117 - 121
DOI: 10.13189/csit.2015.030404
Implementing Remote Presence Using Quadcopter Control by a Non-Invasive BCI Device
Jzau-Sheng Lin, Zi-Yang Jiang
[Abstract] [Full Text] [Full Article - PDF] pp. 122 - 126
DOI: 10.13189/csit.2015.030405
Image Tamper Detection and Recovery based on Dilation and Chaotic Mixing
Hao-Chun Wang, Wei-Ming Chen, Ping-Yi Lee
[Abstract] [Full Text] [Full Article - PDF] pp. 127 - 132
DOI: 10.13189/csit.2015.030406
E-Government, Open Data, and Security: Overcoming Information Security Issues with Open Data
Abdurakhmanov Abduaziz Abdugaffarovich, Varisov Akmal Abbasovich, Nasrullaev Nurbek Bakhtiyarovich
[Abstract] [Full Text] [Full Article - PDF] pp. 133 - 137
DOI: 10.13189/csit.2015.030407
Classification of Trajectories Using Category Maps and U-Matrix to Predict Interests Used for Event Sites
Hirokazu Madokoro, Kazuhito Sato, Nobuhiro Shimoi
[Abstract] [Full Text] [Full Article - PDF] pp. 138 - 147
DOI: 10.13189/csit.2015.030408