for Journals by Title or ISSN
for Articles by Keywords

Publisher: Horizon Research Publishing   (Total: 54 journals)   [Sort by number of followers]

Showing 1 - 54 of 54 Journals sorted alphabetically
Advances in Diabetes and Metabolism     Open Access   (Followers: 26)
Advances in Economics and Business     Open Access   (Followers: 15)
Advances in Energy and Power     Open Access   (Followers: 16)
Advances in Pharmacology and Pharmacy     Open Access   (Followers: 6)
Advances in Signal Processing     Open Access   (Followers: 13)
Advances in Zoology and Botany     Open Access  
Bioengineering and Bioscience     Open Access   (Followers: 1)
Cancer and Oncology Research     Open Access   (Followers: 10)
Chemical and Materials Engineering     Open Access   (Followers: 24)
Civil Engineering and Architecture     Open Access   (Followers: 24)
Computational Research     Open Access   (Followers: 1)
Computer Science and Information Technology     Open Access   (Followers: 13)
Energy and Environmental Engineering     Open Access   (Followers: 7)
Environment and Ecology Research     Open Access   (Followers: 8)
Food Science and Technology     Open Access   (Followers: 3)
Immunology and Infectious Diseases     Open Access   (Followers: 9)
Intl. J. of Biochemistry and Biophysics     Open Access   (Followers: 1)
Intl. J. of Cardiovascular and Cerebrovascular Disease     Open Access   (Followers: 2)
Intl. J. of Neuroscience and Behavioral Science     Open Access   (Followers: 1)
Linguistics and Literature Studies     Open Access   (Followers: 4)
Manufacturing Science and Technology     Open Access   (Followers: 3)
Mathematics and Statistics     Open Access   (Followers: 5)
Nanoscience and Nanoengineering     Open Access   (Followers: 1)
Natural Resources and Conservation     Open Access   (Followers: 6)
Nursing and Health     Open Access   (Followers: 4)
Open J. of Dentistry and Oral Medicine     Open Access   (Followers: 1)
Sociology and Anthropology     Open Access   (Followers: 5)
Sport and Art     Open Access   (Followers: 1)
Universal J. of Accounting and Finance     Open Access   (Followers: 4)
Universal J. of Agricultural Research     Open Access   (Followers: 1)
Universal J. of Applied Mathematics     Open Access   (Followers: 5)
Universal J. of Applied Science     Open Access   (Followers: 2)
Universal J. of Biomedical Engineering     Open Access  
Universal J. of Chemistry     Open Access   (Followers: 1)
Universal J. of Clinical Medicine     Open Access  
Universal J. of Communications and Network     Open Access   (Followers: 1)
Universal J. of Computational Mathematics     Open Access   (Followers: 5)
Universal J. of Control and Automation     Open Access   (Followers: 4)
Universal J. of Educational Research     Open Access   (Followers: 1)
Universal J. of Electrical and Electronic Engineering     Open Access   (Followers: 6)
Universal J. of Engineering Science     Open Access   (Followers: 2)
Universal J. of Food and Nutrition Science     Open Access   (Followers: 6)
Universal J. of Geoscience     Open Access   (Followers: 4)
Universal J. of Industrial and Business Management     Open Access   (Followers: 1)
Universal J. of Management     Open Access   (Followers: 2)
Universal J. of Materials Science     Open Access   (Followers: 3)
Universal J. of Mechanical Engineering     Open Access   (Followers: 16)
Universal J. of Medical Science     Open Access  
Universal J. of Microbiology Research     Open Access  
Universal J. of Physics and Application     Open Access   (Followers: 2)
Universal J. of Plant Science     Open Access  
Universal J. of Psychology     Open Access   (Followers: 3)
Universal J. of Public Health     Open Access   (Followers: 2)
World J. of Computer Application and Technology     Open Access   (Followers: 4)
Journal Cover
Computer Science and Information Technology
Number of Followers: 13  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2331-6063 - ISSN (Online) 2331-6071
Published by Horizon Research Publishing Homepage  [54 journals]
  • Modification of the Norwegian Traffic Light States as the Method to Reduce
           the Travel Delay

    • Abstract: Publication date:  Jan 2019
      Source:Computer Science and Information Technology  Volume  7  Number  1  Setiyo Daru Cahyono   Sutomo   Seno Aji   Sudarno   Pradityo Utomo   and Tomi Tristono   Traffic lights have a vital role as regulatory systems to control the vehicles flowed in urban networks. This research is based on the real case. The traffic lights are installed at a massive intersection of an urban network consisting of four sections. The systems control implements the modification of the Norwegian traffic lights states. The behavior of traffic lights states were modeled using Petri net method. For the model verification and validation, the invariants and simulation were applied. The purpose of the implementation of this control system was to reduce travel delays. The intersection performance level was good while the average travel delay on all sections was low. The method used for the testing was the comparison of the simulation results due to the settings that apply the standard system to the imitation of the reality of the system using modifications of the Norwegian traffic lights states. The control system was able to reduce the travel delays slightly. The average of Level of Service (LoS) index of the roads for all sections was at level D. It improved the performance of the intersection, but not yet significant. In addition to setting traffic lights, the presence of flyovers is urgent to improve travel delays.
      PubDate: Jan 2019
  • Business Intelligence Improved by Data Mining Algorithms and Big Data
           Systems: An Overview of Different Tools Applied in Industrial Research

    • Abstract: Publication date:  Jan 2019
      Source:Computer Science and Information Technology  Volume  7  Number  1  Alessandro Massaro   Valeria Vitti   Angelo Galiano   and Alessandro Morelli   The proposed paper shows different tools adopted in an industry project oriented on business intelligence (BI) improvement. The research outputs concern mainly data mining algorithms able to predict sales, logistic algorithms useful for the management of the products dislocation in the whole marketing network constituted by different stores, and web mining algorithms suitable for social trend analyses. For the predictive data mining and web mining algorithms have been applied Weka, Rapid Miner and KNIME tools, besides for the logistic ones have been adopted mainly Dijkstra's and Floyd-Warshall's algorithms. The proposed algorithms are suitable for an upgrade of the information infrastructure of an industry oriented on strategic marketing. All the facilities are enabled to transfer data into a Cassandra big data system behaving as a collector of massive data useful for BI. The goals of the BI outputs are the real time planning of the warehouse assortment and the formulation of strategic marketing actions. Finally is presented an innovative model oriented on E-commerce sales neural network forecasting based on multi-attribute processing. This model can process data of the other data mining outputs supporting logistic actions. This model proves how it is possible to embed many data mining algorithms into a unique prototypal information system connected to a big data, and how it can work on real business intelligence. The goal of the proposed paper is to show how different data mining tools can be adopted into a unique industry information system.
      PubDate: Jan 2019
  • Modeling and Simulation of Low Frequency Subsurface Radar Imaging in

    • Abstract: Publication date:  Sep 2018
      Source:Computer Science and Information Technology  Volume  6  Number  3  K. van den Doel   and G. Stove   We describe simulated low frequency subsurface radar scans targeting the detection of a liquid water layer, or some other reflector such as conductive sulfides, under permafrost. A finite-difference time-domain (FDTD) and ray tracing simulation framework is used to model measurements and data analysis at depths from 350m to 800m. Operating characteristics such as pulse shape and noise levels of the measurement apparatus were obtained from an existing commercial radar scanning system. Results were used to test and optimize data analysis methods, predict maximum detection depth under realistic time constraints, and guide experimental design parameters such as the amount of replications required for denoising and length of the wide angle reflection and refraction (WARR) scan lines used for velocity estimation.
      PubDate: Sep 2018
  • Co-opetition Strategy in Volunteer Computing: The Example of Collaboration
           Online in BOINC.RU Community

    • Abstract: Publication date:  Sep 2018
      Source:Computer Science and Information Technology  Volume  6  Number  3  Victor Tishchenko   Volunteer computing (VC) is a strong way to harness distributed computing resources to perform large-scale scientific tasks. Its success directly depends on the number of participants, PC (some other devices) and time of their work. And while the computational aspect received much effective research attention and solutions; the social problem of VC phenomenon – how persuade the owners of widely dispersed smart machines and devices to participate in VC projects, and how figure out ways to speed and expand the capability of donated computer resources, remains largely unexplored. We think that a motive of self-actualization of participants of volunteer computing is not enough to explain why millions of unskilled people day by day participate in scientific computation. Our research indicates that the answer lies at the intersection of self-oriented motivation and the interactional, organizational possibilities emerging through the Internet. In this paper we investigate Russian community of VC and discuss the suggestion that online collaboration can capture people`s motivation better than only intrinsic motives.
      PubDate: Sep 2018
  • Drunk Driving Detection

    • Abstract: Publication date:  Jul 2018
      Source:Computer Science and Information Technology  Volume  6  Number  2  Kavish Atul Sanghvi   Drunk driving accidents have increased day by day and has become a big issue. On an average nearly 29% of road accidents are caused due to drunk driving. To avoid such accidents, precautionary measures using different technologies are taken. Drunk driving detection is process of detecting whether a person is drunk or not. It uses data provided by sensors and camera to detect whether the person is drunk or not. The data is further processed using specific algorithm and methods to detect whether person is drunk or not. It uses various detection methods like Iris recognition using Gabor filter, Neural network using face images, detection using speech, Non-invasive Biological sensors, detection using Driving pattern and Engine locking system.
      PubDate: Jul 2018
  • Universal Electronic Student Course Registration Model (U-ESCRM)

    • Abstract: Publication date:  Jul 2018
      Source:Computer Science and Information Technology  Volume  6  Number  2  Ejiofor C. I.   and Okon, Emmanuel Uko   Student course registration is an integral facet of university registration processes, which holistically cater for organizational resources: manpower and material. Although several approaches have been proposed in addressing student registration, this research paper provide a comprehensive approach with the aim of addressing comprehensiveness in courses registration through the integration of departmental units within the university into a single architecture framework. This architecture has the propensity in supporting organizational procedures and processes while lessening overhead costs associated with process depletions.
      PubDate: Jul 2018
  • Cyberconflicts as a Threat for the Modern State

    • Abstract: Publication date:  Jan 2018
      Source:Computer Science and Information Technology  Volume  6  Number  1  Marek Górka   The Internet quite naturally is becoming a 'new battlefield' or 'offers a new dimension' (the fifth to the: land, sea, air, and stratosphere) to the conflict. Cyberwar is another way of being in conflict in the long history of military technology, which forces new tactical and operational concepts. Global awareness of cyberwar has risen considerably in the last few years and many national states are preparing for defence and offensive operations. In fact, cyberwar is a part of the evolution of conventional war, which, on the other hand is related to the changes in the social, political and mainly technological sphere. What is being stressed is the need to examine the ethical implications, which lead to further questions and doubts whether the use of the techniques of cyber war may result in shorter and less bloody and consequently more 'ethical' conflicts' Cyber-attack doesn’t need to kill anyone or cause material loses, but it is still considered dangerous.
      PubDate: Jan 2018
  • Motivating Energy and Resource Conservation Behavior by Gamification

    • Abstract: Publication date:  Jan 2018
      Source:Computer Science and Information Technology  Volume  6  Number  1  Huang Lin   and Daqing Hou   Gamification is the use of game thinking and game mechanics in a non-game context to engage users and solve problems. The project, Motivating Energy and Resource Conservation Behavior by Gamification, is to complement the area about gamification effect on motivating energy savings. In this project, we are designing a web game called Castle War which implements the electricity usage and water usage data from the Smart Housing Project of Clarkson University. The game is designed to be a war game that can engage every resident from the Smart Housing Project. The resident who saves more energy on that day, will get more currency to spend in the game on that day. The players can use the game currency to build their own empires while at the same time form unions to battle with others. In addition, the game elements will be closely related to the environmental-friendly topic. The real world concept of carrying capacity of environment, the tradeoff between development and pollution will be reflected in this game. This project will be a great addition to the research area that involves how the computer-based virtual world engagement of gamified system would motivate the real world energy consumption behavior.
      PubDate: Jan 2018
  • Agribusiness System Hub for Rural Agricultural Cooperative Societies in
           Developing Countries

    • Abstract: Publication date:  Dec 2018
      Source:Computer Science and Information Technology  Volume  6  Number  4  Kenedy Aliila Greyson   This paper proposes the alternative method to be used in sharing agribusiness resources to the rural areas inhabitants of developing countries. The small scale enterprises in the rural areas of developing countries are in agribusiness category. Enterprises in those areas are categorized by the different products produced in a small scale throughout the year. Moreover, the market places are limited. It is recommended that, when agribusiness system hub are utilized effectively in cooperative unions of developing countries, it will strengthen the capacity to access markets, create jobs, enhance income, and hence reduce poverty in their communities. The papers consider the whole community as one Business Company and manage the business collectively using agribusiness system hub. Data are collected from the various selected communities are discussed and the model to address the problem is presented.
      PubDate: Dec 2018
  • Developing a Privacy Compliance Scale for IoT Health Applications

    • Abstract: Publication date:  Dec 2018
      Source:Computer Science and Information Technology  Volume  6  Number  4  Kavenesh Thinakaran   Jaspaljeet Singh Dhillon   Saraswathy Shamini Gunasekaran   and Lim Fung Chen   Internet of things (IoT) is intensely gaining popularity in the healthcare industry. Though these systems are ubiquitous, pervasive and seamless, an issue concerning consumers’ privacy remains debatable. There is an immaculate rise in terms of awareness amongst patients where data privacy is concerned. IoT-based health applications are more prone to privacy risks, and hence general privacy guidelines for health applications, in general, are not adequate. Often, privacy is oversighted, causing consumers to lose interest from using an application continuously. In this paper, we propose a compliance scale modelling the privacy principles for privacy-aware novel IoT-based health applications. We have conducted an analytical review of privacy guidelines to derive at the essential principles required to develop and measure privacy-aware IoT health applications after discarding irrelevant principles, extracting repeating core principles, and merging relevant principles. A quantitative survey was deployed to empirically evaluate the proposed scale to finalize the principles based on their significance. The proposed compliance scale presents essential privacy principles to adhere in the development of novel IoT health applications. The proposed compliance scale would be significant for policymakers and applications developers to measure, better understand and respect the privacy principles of consumers towards novel IoT-based health applications.
      PubDate: Dec 2018
  • Maximum MBF Types

    • Abstract: Publication date:  Dec 2018
      Source:Computer Science and Information Technology  Volume  6  Number  4  Tkachenco V. G.   and Sinyavsky O. V.   The classification of monotone Boolean functions (MBF) into types is given. The notion of the maximum type of MBF is introduced, and the shift-sum types are constructed. The matrices of type distribution by rank are constructed. Convenient algorithms for finding the number of maximum types and the maximum types themselves are presented. The proposed methods can be used to analyze large MBF ranks.
      PubDate: Dec 2018
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-