A review of data mining techniques for result prediction in sports M Haghighat, H Rastegari, N Nourafza, N Branch, I Esfahan Advances in Computer Science: an International Journal 2 (5), 7-12, 2013 | 137 | 2013 |
Agricultural market information services in developing countries: A review MM Magesa, K Michael, J Ko Advances in Computer Science: an International Journal, 2014 | 73 | 2014 |
A survey on web penetration test M Mirjalili, A Nowroozi, M Alidoosti Advances in Computer Science: an International Journal 3 (6), 107-121, 2014 | 43 | 2014 |
Use of E-learning tools to solve group work problems in higher education: A case study of gulf country HU Khan sciences 6, 12, 2013 | 41 | 2013 |
Botnet detection using NetFlow and clustering P Amini, R Azmi, M Araghizadeh Advances in Computer Science: an International Journal 3 (2), 139-149, 2014 | 35 | 2014 |
A novel and robust method for automatic license plate recognition system based on pattern recognition R Azad, F Davami, B Azad Advances in Computer Science: an International Journal 2 (3), 64-70, 2013 | 35 | 2013 |
Diabetes forecasting using supervised learning techniques SA Diwani, A Sam Adv Comput Sci an Int J 3, 10-18, 2014 | 33 | 2014 |
Watchdog-LEACH: a new method based on LEACH protocol to secure clustered wireless sensor networks MR Rohbanian, MR Kharazmi, A Keshavarz-Haddad, M Keshtgary arXiv preprint arXiv:1310.3637, 2013 | 31 | 2013 |
Real-time and robust method for hand gesture recognition system based on cross-correlation coefficient R Azad, B Azad, IT Kazerooni arXiv preprint arXiv:1408.1759, 2014 | 30 | 2014 |
Applying web usage mining techniques to design effective web recommendation systems: A case study M Jafari, FS Sabzchi, AJ Irani Advances in Computer Science: an International Journal 3 (2), 78-90, 2014 | 29 | 2014 |
Citizens’ readiness for e-government services in Tanzania M Dewa, I Zlotnikova Advances in Computer Science: An International Journal 3 (4), 37-45, 2014 | 28 | 2014 |
Image content based retrieval system using cosine similarity for skin disease images S Kaur, D Aggarwal Adv. Comput. Sci. Int. J 2, 89-95, 2013 | 22 | 2013 |
Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags SM Alavi, K Baghery, B Abdolmaleki Advances in Computer Science: an Int. Journal 3 (5), 44-52, 2014 | 17 | 2014 |
Evaluation of free/open source software using OSMM model case study: WebGIS and spatial database M Akbari, SRH Peikar Advances in Computer Science: an International Journal 3 (5), 34-43, 2014 | 15 | 2014 |
Distributed data storage model for cattle health monitoring using WSN AR Bhavsar, DJ Shah, HA Arolkar Advances in Computer Science: an International Journal 2 (2), 19-24, 2013 | 15 | 2013 |
A review of distributed multi-agent systems approach to solve university course timetabling problem H Babaei, A Hadidi ACSIJ Advances in Computer Science: an International Journal 3 (5), 19-28, 2014 | 14 | 2014 |
Optimized method for real-time face recognition system based on PCA and multiclass support vector machine R Azad, B Azad, IT Kazerooni Advances in Computer Science: an International Journal 2 (5), 126-132, 2013 | 14 | 2013 |
Improved black hole algorithm for efficient low observable UCAV path planning in constrained aerospace AA Heidari, RA Abbaspour Adv Comput Sci Int J 3 (3), 87-92, 2014 | 13 | 2014 |
A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania MD Waziri, ZO Yonah ACSIJ Advances in Computer Science: An International Journal 3 (5), 98-106, 2014 | 13 | 2014 |
Analysis and improvement of the lightweight mutual authentication protocol under EPC C-1 G-2 standard M Mohammadi, M Hosseinzadeh, M Esmaeildoust Advances in Computer Science: an International Journal 3 (2), 10-16, 2014 | 13 | 2014 |