به گزارش پایگاه فراخوانهای علمی پژوهشی کشور (callforpapers.ir) این ژورنال در سه دوره تا کنون 118 عنوان مقاله تخصصی شامل 866 صفحه به زبان انگلیسی منتشر کرده است. کلیه مقالات از طریق سیویلیکا قابل جستجو و دریافت می باشند.
لازم به ذکر است ژورنال ACSIJ تحت حمایت پایگاه سیویلیکا بوده و از این پس علاقه مندان می توانند فراخوان دریافت مقاله این نشریه را بر روی پایگاه سیویلیکا مشاهده نمایند.
لیست مقالات منتشر شده ژورنال Advances in Computer Science : an International Journal :
:2012 Volume 1, Issue 1 September-
A Foundation for the Pillars of Software Factories
Developing Parallel Programs
Engineering in the Cloud: An Engineering Software + Services Architecture Forged in Turbulent Times
How the Cloud Stretches the SOA Scope
Surviving Turbulent Times: Prioritizing IT Initiatives Using Business Architecture
Semantic Enterprise Optimizer and Coexistence of Data Models
Application of Bees Algorithm in Multi-Join Query Optimization
Task Scheduling problem in distributed systems considering communication cost and precedence by
:2013 Volume 2, Issue 1 January-
Service Registry: A Key Piece for Enhancing Reuse in SOA
Caching in the Distributed Environment
Is SOA Being Pushed Beyond Its Limits?
Key management in heterogeneous wireless sensor networks using Voronoi diagrams
On Distributed Embedded Systems
Software Architecture in the Agile Life Cycle
:2013 Volume 2, Issue 2 May-
Proposed New Mechanism to Detect and Defend the Malicious Attackers in AODV
An Adaptive K-random Walks Method for Peer-to-Peer Networks
Strategic Evaluation of Web-based E-learning; a review on 8 articles
Distributed Data Storage Model for Cattle Health Monitoring Using WSN
Applying a natural intelligence pattern in cognitive robots
A Multi Hop Clustering Algorithm For Reduce Energy Consumption in Wireless Sensor Networks
Security-Aware Dispatching of Virtual Machines in Cloud Environment
:2013 Volume 2, Issue 3 July-
Performance Estimation of DS-CDMA Receivers Using Genetic Algorithm
A Mechanism to Mitigate Collision Rate in Wireless Local Networks
An Efficient Mechanism for Data Rate Adaptation in Wireless LAN’s
Critical Factors in the Effective of Service-Oriented Architecture
Solving the Scheduling Problem in Computational Grid using Artificial Bee Colony Algorithm
Efficient Area and Speed Optimized Multiplication Technique Using Vedic and Tree Addition Structure
Design of Tunable Multiple- Cavity Filter for Optical Fiber Communication
Combination of SVM and FERN for GPU-assisted texture recognition on mobile devices
SecurityArchitecture forAdvancedMetering Infrastructure
A New Approach for Labeling Images Using CAPTCHA in Image Semantic Search Engines
Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks
A New Heuristic Constructing Minimal Steiner Trees inside Simple Polygons
The analysis of visual parallel programming languages
: 2013 Volume 2, Issue 4 September-
Power and Energy Aware Design of an Autonomous Wireless Sensor Node
Comparative study of data fusion algorithms in P300 Based BCI
Diffuse Objects Extraction in Coronal Holes Using Active Contour Means Model
High Capacity Secure Image Steganography Based on Contourlet Transform
A cluster-based topology control algorithm for wireless sensor networks
Adaptive Majority-based Re-routing for Differentiated Delay in Wireless Sensor Networks
Image Content Based Retrieval System using Cosine Similarity for Skin Disease Images
A Mathematical Model for the Rainbow Vertex-Connection Number
Traffic-Aware Selection Strategy for Application- Specific 3D NoC
:2013 Volume 2, Issue 5 November-
A novel Approach for regenerating a secure and reliable Password using iris and fingerprint
A Review of Data Mining Techniques for Result Prediction in Sports
An Efficient Protocol for Target Tracking in Wireless Sensor Networks (WSNs)
Using Contourlet Transform and Discrete Cosine Transform and SVD for Digital Watermarking
Automatic identification of corrosive factors categories according to the environmental factors
Text Mining and Image Anomaly Explanation with Machine Consciousness
Economic growth models: symbolic and numerical computations
Software Architecture Viewpoint Models: A Short Survey
Novel Feature Selection by Differential Evolution Algorithm
Application of Pre-evolution Genetic Algorithm in Fast Path Planning for UCAV
A Survey: variants of TCP in Ad-hoc networks
An Ontology Design Pattern of the Multidisciplinary and Complex Field of Climate Change
Measuring Trust and Selecting Cloud Database Services
Designing Expert System for Detecting Faults in Cloud Environment
High-Speed Optical Home Network Using Graded Index Plastic Optical Fibers for a Smart House
Prolonging sensor networks lifetime using convex clusters
A New Image Steganography Method Based on Pixel Neighbors and 6 Most Significant Bit(MSB) Compare
:2014 Volume 3, Issue 1 January-
Theoretical Factors underlying Data Mining Techniques in Developing Countries: a case of Tanzania
Effects of Individual Success on Globally Distributed Team Performance
Developing mobile educational apps: development strategies, tools and business models
Data Mining Awareness and Readiness in Healthcare Sector: a case of Tanzania
Determining Threshold Value and Sharing Secret Updating Period in MANET
Island Model based Differential Evolution Algorithm for Neural Network Training
3D-Diagram for Managing Industrial Sites Information
Mobile IP Issues and Their Potential Solutions: An Overview
Action recognition system based on human body tracking with depth images
Contention -aware virtual channel assignment in application specific Networks-on -chip
Optimization Based Blended Learning Framework for Constrained Bandwidth Environment
Analysis of Computing Open Source Systems
:2014 Volume 3, Issue 2 March –
Weighted Twin Support Vector Machine with Universum
Middle East User Navigation in Online Social Networks and Interactions in E-Commerce, an Analogy
Map Abstraction with Adjustable Time Bounds
Predicting students’ grades using fuzzy non-parametric regression method and ReliefF-based algorithm
Extracting Protein Names from Biological Literature
Applying Web Usage Mining Techniques to Design Effective Web Recommendation Systems: A Case Study
Geometric Transformations via Matrix Multiplications Using Hardware/Software Co-design
A Quantum Optimization Model for Dynamic Resource Allocation in Networks
Heuristics for Irreversible Ternary MVL Circuit Synthesis and Optimization Using PSO Algorithm
Cooperative Machine-Vision-Based Tracking using Multiple Unmanned Aerial Vehicles
Study of secure m-commerce, challenges and solutions
Traditional Host based Intrusion Detection Systems’ Challenges in Cloud Computing
Botnet Detection using NetFlow and Clustering
Citizens’ Readiness for Remote Electronic Voting in Tanzania