A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention MM Mohammed Nazeh Abdul Wahid*, Abdulrahman Ali, Babak Esparham Journal of Computer Science Applications and Information Technology 3 (2), 1-7, 2018 | 92 | 2018 |
Special Aspects in Attitude Control of a Spacecraft, Equipped With Inertial Actuators L MV* Journal of Computer Science Applications and Information Technology 2 (4), 1-9, 2017 | 15 | 2017 |
Automated Teller Machine Card Fraud of Financial Organizations in Bangladesh ARSMM Rahman* Journal of Computer Science Applications and Information Technology 1 (3), 1-6, 2018 | 12 | 2018 |
Desktop and Web-based Gesamt Software for Fast and Accurate Structural Queries in the PDB EKV Uski Journal of Computer Science Applications and Information Technology 2 (2), 1-7, 2017 | 10 | 2017 |
Detecting and Determining the Types of Hand Bone Fracture Using K-Means Clustering AA Mohammad Badrul Alam Miah Journal of Computer Science Applications and Information Technology 3 (3), 1-10, 2018 | 9 | 2018 |
Improvement of Haar Feature Based Face Detection in OpenCV Incorporating Human Skin Color Characteristic AMAH Asif Anjum Akash , Abdus Salim Mollah Journal of Computer Science Applications and Information Technology 1 (1), 8, 2016 | 9* | 2016 |
Secure Electronic Voting Application Based on Face Recognition and Ciphering ZJM Ameen* Journal of Computer Science Applications and Information Technology 3 (2), 1-11, 2018 | 8 | 2018 |
Application and Implementation of Secure Hybrid Steganography Algorithm in Private Cloud Platform SR Ihssan Alkadi* Journal of Computer Science Applications and Information Technology 2 (2), 1-4, 2017 | 8* | 2017 |
Natural Language Translator Correctness Prediction PM Jenny Li J, Yulia Rossikova Journal of Computer Science Applications and Information Technology 1 (1), 11, 2016 | 8 | 2016 |
A Model-driven Ontology Approach for Developing Service System Applications POO Petrenko AI Journal of Computer Science Applications and Information Technology 2 (4), 1-7, 2017 | 6 | 2017 |
An Autonomous UAS with AI for Forest Fire Prevention, Detection, and Real Time Advice and Communication To and Among Firefighters YEA Harris SL Journal of Computer Science Applications and Information Technology 2 (3), 1-5, 2017 | 6* | 2017 |
Dynamic Watermark Injection in NoSQL Databases V Khanduja Journal of Computer Science Applications and Information Technology 2 (1), 5, 2017 | 6 | 2017 |
PLC Motor Control Fundamentals and Safety Features; A Case Study K Kamel, E Kamel Journal of Computer Science Applications and Information Technology 3 (3), 8, 2018 | 5 | 2018 |
Matbase DFS Detecting and Classifying E-RD Cycles Algorithm CMA Mocanu Journal of Computer Science Applications and Information Technology 2 (4), 1-14, 2017 | 5 | 2017 |
On The Frank FREs and Its Application in Optimization Problems A Ghodousian* Journal of Computer Science Applications and Information Technology 3 (2), 1-14, 2018 | 4 | 2018 |
Automated Live Migration in OpenStack:A Moving Target Defense Solution FPS Shiva* Journal of Computer Science Applications and Information Technology 2 (3), 1-5, 2017 | 3 | 2017 |
An Improved Decoding Technique for Efficient Huffman Coding ZSLN Jamil As-ad, Mohibur Rahaman, Rashed Mustafa Journal of Computer Science Applications and Information Technology 2 (1), 5, 2017 | 3* | 2017 |
Personal Health Records in Maternity care “a process evaluation” JAMK Carola J M Groenen, Noortje T L van Duijnhoven, Frank P H A Van ... Journal of Computer Science Applications and Information Technology 2 (1), 5, 2017 | 2* | 2017 |
Camera Based Localization of a Smartphone in a Vehicle AK Vamsi Paruchuri Journal of Computer Science Applications and Information Technology 1 (1), 8, 2016 | 2 | 2016 |
The Value of Crowdsourcing for Complex Problems: Comparative Evidence from Software Developed By the Crowd And Professionals DK Abhishek Tripathi Journal of Computer Science Applications and Information Technology 1 (1), 7, 2016 | 2* | 2016 |