Journals Information
- Aims & Scope
- Indexing
- Editorial Board
- Reviewers
- Guidelines
- Submit Manuscript
- Archive
- Article Processing Charges
- Call for Papers
- Publication Ethics and Malpractice Statement
- Copyright
- FAQs
Special Issues Information
Computer Science and Information Technology
Computer Science and Information Technology is an international peer-reviewed journal that publishes original and high-quality research papers in all areas of computer science and information technology. As an important academic exchange platform, scientists and researchers can know the most up-to-date academic trends and seek valuable primary sources for reference.
ISSN: 2331-6063 (Print)
ISSN: 2331-6071 (Online)
Contact Us: csit.editor@hrpub.org or editor@hrpub.org
Website: https://www.hrpub.org/journals/jour_info.php?id=35
Archive
Volume 11 2023 | |||||
Vol.11 No.1 | Vol.11 No.2 | ||||
Volume 10 2022 | |||||
Vol.10 No.1 | Vol.10 No.2 | Vol.10 No.3 | Vol.10 No.4 | ||
Volume 9 2021 | |||||
Vol.9 No.1 | Vol.9 No.2 | Vol.9 No.3 | |||
Volume 8 2020 | |||||
Vol.8 No.1 | Vol.8 No.2 | Vol.8 No.3 | Vol.8 No.4 | ||
Volume 7 2019 | |||||
Vol.7 No.1 | Vol.7 No.2 | Vol.7 No.3 | Vol.7 No.4 | Vol.7 No.5 | |
Volume 6 2018 | |||||
Vol.6 No.1 | Vol.6 No.2 | Vol.6 No.3 | Vol.6 No.4 | ||
Volume 5 2017 | |||||
Vol.5 No.1 | Vol.5 No.2 | Vol.5 No.3 | Vol.5 No.4 | Vol.5 No.5 | |
Volume 4 2016 | |||||
Vol.4 No.1 | Vol.4 No.2 | Vol.4 No.3 | Vol.4 No.4 | Vol.4 No.5 | |
Volume 3 2015 | |||||
Vol.3 No.1 | Vol.3 No.2 | Vol.3 No.3 | Vol.3 No.4 | Vol.3 No.5 | Vol.3 No.6 |
Volume 2 2014 | |||||
Vol.2 No.1 | Vol.2 No.2 | Vol.2 No.3 | Vol.2 No.4 | Vol.2 No.5 | Vol.2 No.6 |
Vol.2 No.7 | Vol.2 No.8 | ||||
Volume 1 2013 | |||||
Vol.1 No.1 | Vol.1 No.2 | Vol.1 No.3 | Vol.1 No.4 |
Vol 1(Sep, 2013) No 2
Identity Management in the Internet of Things: the Role of MANETs for Healthcare Applications
Caroline Chibelushi, Alan Eardley, Abdullahi Arabo
[Abstract] [Full Text] [Full Article - PDF] pp. 73 - 81
DOI: 10.13189/csit.2013.010201
A Bayesian Network Decision Support System for Order Management in New Product Development
Hamed Fazlollahtabar, Mina Ashena
[Abstract] [Full Text] [Full Article - PDF] pp. 82 - 89
DOI: 10.13189/csit.2013.010202
Using Parallel Filtering Algorithms to Solve the 0-1 Knapsack Problem on DNA-based Computing
Sientang Tsai
[Abstract] [Full Text] [Full Article - PDF] pp. 90 - 96
DOI: 10.13189/csit.2013.010203
Multiuser Message Authentication, Application to Verifiable Secret Sharing and Key Management Schemes
Aparna Ram, B.B. Amberker
[Abstract] [Full Text] [Full Article - PDF] pp. 97 - 104
DOI: 10.13189/csit.2013.010204
Developing an Expertise Interaction Meta-Model for Group Decision Support System (GDSS)
Christina Albert Rayed
[Abstract] [Full Text] [Full Article - PDF] pp. 105 - 110
DOI: 10.13189/csit.2013.010205
Descriptive Study of 3D Imagination to Teach Children in Primary Schools: Planets in Outer Space (Sun, Moon, Our Planet)
Satar Habib Mnaathr, Ahmed Dheyaa Basha
[Abstract] [Full Text] [Full Article - PDF] pp. 111 - 114
DOI: 10.13189/csit.2013.010206
Detection and Management System of Digitized Images of Fingerprints
Angélica González, José Gómez, Miguel Ramón, Luis García
[Abstract] [Full Text] [Full Article - PDF] pp. 115 - 124
DOI: 10.13189/csit.2013.010207
Generation of Questions Sequences in Intelligent Teaching Systems Based on Algebraic Аpproach
Alexander Zuenko, Alexander Fridman, Boris Kulik
[Abstract] [Full Text] [Full Article - PDF] pp. 125 - 131
DOI: 10.13189/csit.2013.010208
To the Question of Fuzzy Evaluation of Quality of Trainees Knowledge in the System of Distance Learning
Usmanov R.N., Khamidov V.S.
[Abstract] [Full Text] [Full Article - PDF] pp. 132 - 137
DOI: 10.13189/csit.2013.010209
On the Problem of Modeling of the Relations between Documents
Yu.V. Leonova, V.B. Barakhnin
[Abstract] [Full Text] [Full Article - PDF] pp. 138 - 144
DOI: 10.13189/csit.2013.010210
Factors Influencing Group Decision Making Performance in a GSS Enabled Environment
Rawan T. Khasawneh, Emad A. Abu-Shanab
[Abstract] [Full Text] [Full Article - PDF] pp. 145 - 152
DOI: 10.13189/csit.2013.010211
GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec
Garrett Calpouzos, Cihan Varol
[Abstract] [Full Text] [Full Article - PDF] pp. 153 - 158
DOI: 10.13189/csit.2013.010212
How Jordanian Youth Perceive Social Networks Influence?
Emad A. Abu-Shanab, Heyam A. Al-Tarawneh
[Abstract] [Full Text] [Full Article - PDF] pp. 159 - 164
DOI: 10.13189/csit.2013.010213
Exact Formulas for the Average Internode Distance in Mesh and Binary Tree Networks
Behrooz Parhami
[Abstract] [Full Text] [Full Article - PDF] pp. 165 - 168
DOI: 10.13189/csit.2013.010214