{"id":5611,"date":"2019-06-11T12:24:55","date_gmt":"2019-06-11T04:24:55","guid":{"rendered":"http:\/\/sg.upm.edu.my\/?page_id=5611"},"modified":"2019-06-11T12:46:38","modified_gmt":"2019-06-11T04:46:38","slug":"comp_findarticles","status":"publish","type":"page","link":"http:\/\/subjects.upm.edu.my\/sg\/?page_id=5611","title":{"rendered":"comp_findarticles"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5611\" class=\"elementor elementor-5611\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c23 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c23\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-152\" data-id=\"152\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71dd elementor-widget elementor-widget-heading\" data-id=\"71dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">find Articles - Computer science & information technology<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-609e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"609e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ed9\" data-id=\"4ed9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7520 elementor-widget elementor-widget-spacer\" data-id=\"7520\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6576 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6576\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-7f95\" data-id=\"7f95\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-777f elementor-view-stacked elementor-position-left elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"777f\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-shrink\" >\n\t\t\t\t<i class=\"fa fa-laptop\" aria-hidden=\"true\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h2 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tONLINE DATABASES\t\t\t\t\t<\/span>\n\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-434c elementor-widget elementor-widget-text-editor\" data-id=\"434c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Use online databases to find journal articles about a subject. Below is a list of databases which are most often used.<\/p><ul><li><strong>ACM Digital Library<\/strong><\/li><li><strong>ASME<\/strong><\/li><li><strong>Cambridge University Press &#8211; Cambridge Journals Online<\/strong><\/li><li><strong>CINAHL Plus with Full Text<\/strong><\/li><li><strong>Academic Search Premier<\/strong><\/li><li><strong>Emerald Insight<\/strong><\/li><li><strong>IEEE Xplore<\/strong><\/li><li><strong>IOP Science<\/strong><\/li><li><strong>JSTOR<\/strong><\/li><li><strong>Oxfords Journal Online<\/strong><\/li><li><strong>Proquest Central<\/strong><\/li><li><strong>Scopus<\/strong><\/li><li><strong>SAGE Journals Online<\/strong><\/li><li><strong>Wiley Online Library<\/strong><\/li><\/ul><p>If you are accessing this web site from off-campus, you will need to login to <span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezaccess.upm.edu.my\/\" target=\"_blank\" rel=\"noopener\">EZaccess<\/a><\/strong><\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-68aa\" data-id=\"68aa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-11\" data-id=\"11\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9b elementor-view-stacked elementor-position-left elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"c9b\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-shrink\" >\n\t\t\t\t<i class=\"fa fa-book\" aria-hidden=\"true\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h2 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tPRINTED JOURNALS\t\t\t\t\t<\/span>\n\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4838 elementor-widget elementor-widget-text-editor\" data-id=\"4838\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Journals are important sources of information for subject research. Below is list of journals often used.<\/p><ul><li><strong>Cybernetics\u00a0 \u00a0Q300-390<\/strong><\/li><li><strong>Mathematics\u00a0 \u00a0QA1-QA76.95<\/strong><\/li><li><strong>Artificial intelligence\u00a0 \u00a0Q334-Q342<\/strong><\/li><li><strong>Electronic Computers\u00a0 \u00a0QA75-QA76.95<\/strong><\/li><li><strong>Individual languages\u00a0 \u00a0A-Z QA76.73.A-Z<\/strong><\/li><li><strong>Computer software\u00a0 \u00a0QA76.75-76.765<\/strong><\/li><li><strong>Telecommunications\u00a0 \u00a0TK5101-TK5105<\/strong><\/li><li><strong>Artificial satellites in telecommunications\u00a0 \u00a0TK5104-TK5104.2<\/strong><\/li><li><strong>Computer Engineering\u00a0 \u00a0TK7885-TK7895<\/strong><\/li><\/ul><p>Other journals subscribed by library can be search via\u00a0<span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"http:\/\/www.elib.upm.edu.my\/\" target=\"_blank\" rel=\"noopener noreferrer\">WebOPAC<\/a><\/strong>\u00a0<\/span>to identify location and holdings.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d4e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d4e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-c4d\" data-id=\"c4d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5777 elementor-view-stacked elementor-position-left elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"5777\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-shrink\" >\n\t\t\t\t<i class=\"fa fa-file-photo-o\" aria-hidden=\"true\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h2 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tOPEN ACCESS ARTICLES\t\t\t\t\t<\/span>\n\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fe4 elementor-widget elementor-widget-text-editor\" data-id=\"2fe4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<ul><li><span style=\"color: #0000ff;\"><strong>Open access articles is open to all, with no access fees that are available online to the reader.<\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/onlinelibrary.wiley.com\/doi\/epdf\/10.1002\/isd2.12023\" target=\"_blank\" rel=\"noopener\">\u00a0An investigation of ICT knowledge and skills in Vietnam<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/onlinelibrary.wiley.com\/doi\/epdf\/10.1002\/isd2.12025\" target=\"_blank\" rel=\"noopener\">Digital technologies and youth mobility in rural Zimbabwe<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong>\u00a0<a style=\"color: #0000ff;\" href=\"https:\/\/onlinelibrary.wiley.com\/doi\/epdf\/10.1002\/isd2.12008\" target=\"_blank\" rel=\"noopener\">Organisational adoption of telecommuting: Evidence from a developing country<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/onlinelibrary.wiley.com\/doi\/epdf\/10.1002\/isd2.12011\" target=\"_blank\" rel=\"noopener\">A mobile health technology intervention for addressing the critical public health issue of child mortality<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/jisajournal.springeropen.com\/articles\/10.1186\/s13174-017-0062-3\" target=\"_blank\" rel=\"noopener\">Changes in free and open source software licenses: managerial interventions and variations on project attractiveness<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-017-0082-3\" target=\"_blank\" rel=\"noopener\">Data security in decentralized cloud systems \u2013 system comparison, requirements analysis and organizational levels<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-017-0914-3\" target=\"_blank\" rel=\"noopener\">A method for identifying faulty cells using a classification tree-based UE diagnosis in LTE<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/journal-bcs.springeropen.com\/articles\/10.1186\/s13173-017-0052-0\" target=\"_blank\" rel=\"noopener\">Detecting referential inconsistencies in electronic CV datasets<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S0950705118301394?via%3Dihub\" target=\"_blank\" rel=\"noopener\">Enhancing user creativity: Semantic measures for idea generation<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"http:\/\/journals.plos.org\/ploscompbiol\/article?id=10.1371\/journal.pcbi.1005379\" target=\"_blank\" rel=\"noopener\">Data-driven reverse engineering of signaling pathways using ensembles of dynamic models<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/misy\/2017\/3254908\/\" target=\"_blank\" rel=\"noopener\">A Process Mining Based Service Composition Approach for Mobile Information Systems<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/misy\/2017\/2301970\/\" target=\"_blank\" rel=\"noopener\">Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/misy\/2017\/3906953\/\" target=\"_blank\" rel=\"noopener\">An Extended Technology Acceptance Model for Mobile Social Gaming Service Popularity Analysis<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/misy\/2017\/6195024\/\" target=\"_blank\" rel=\"noopener\">Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/wcmc\/2017\/8323646\/\" target=\"_blank\" rel=\"noopener\">Internet of Things Framework for Home Care Systems<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/misy\/2017\/8682168\/\" target=\"_blank\" rel=\"noopener\">Design and Voluntary Motion Intention Estimation of a Novel Wearable Full-Body Flexible Exoskeleton Robot<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/misy\/2017\/2164072\/\" target=\"_blank\" rel=\"noopener\">Design and Implementation of a Cloud-Based Platform for Unleashing the Personal and Communal Internet of Things<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/cin\/2017\/7276084\/\" target=\"_blank\" rel=\"noopener\">Reversible Data Hiding Based on DNA Computing<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/cin\/2017\/9580815\/\" target=\"_blank\" rel=\"noopener\">An Evolutionary Method for Financial Forecasting in Microscopic High-Speed Trading Environment<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/scn\/2017\/6907146\/\" target=\"_blank\" rel=\"noopener\">Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker<\/a><\/strong><\/span><\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68a0421 elementor-widget elementor-widget-toggle\" data-id=\"68a0421\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1091\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1091\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">View More<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1091\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1091\"><ul><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0776-0\" target=\"_blank\" rel=\"noopener\">Detection of wormhole attacks on IPv6 mobility-based wireless sensor network<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S0166361516301233?via%3Dihub\" target=\"_blank\" rel=\"noopener\">Agent-based manufacturing execution systems for short-series production scheduling<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S1077314216000680?via%3Dihub\" target=\"_blank\" rel=\"noopener\">\u00a0An assistive haptic interface for appearance-based indoor navigation<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"http:\/\/journals.plos.org\/ploscompbiol\/article?id=10.1371\/journal.pcbi.1004809\" target=\"_blank\" rel=\"noopener\">QuIN: A Web Server for Querying and Visualizing Chromatin Interaction Networks<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"http:\/\/www.iaescore.com\/journals\/index.php\/IJEECS\/article\/view\/333\" target=\"_blank\" rel=\"noopener\">Intrusion Prevention System Inspired Immune Systems<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/jece\/2016\/4789803\/\" target=\"_blank\" rel=\"noopener\">User Adaptive and Context-Aware Smart Home Using Pervasive and Semantic Technologies<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/cin\/2016\/6172453\/\" target=\"_blank\" rel=\"noopener\">An Efficient Adaptive Window Size Selection Method for Improving Spectrogram Visualization<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/misy\/2016\/8364909\/\" target=\"_blank\" rel=\"noopener\">From Mobile to Wearable System: A Wearable RFID System to Enhance Teaching and Learning Conditions<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S0925231215002155?via%3Dihub\" target=\"_blank\" rel=\"noopener\">Fusion paradigms in cognitive technical systems for human\u2013computer interaction<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/cin\/2015\/762403\/\" target=\"_blank\" rel=\"noopener\">Explore Awareness of Information Security: Insights from Cognitive Neuromechanism<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/ahci\/2015\/850474\/\" target=\"_blank\" rel=\"noopener\">CaRo 2.0: An Interactive System for Expressive Music Rendering<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.hindawi.com\/journals\/jcnc\/2015\/872326\/\" target=\"_blank\" rel=\"noopener\">Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S037872061400007X?via%3Dihub\" target=\"_blank\" rel=\"noopener\">From computer ethics to responsible research and innovation in ICT: The transition of reference discourses informing ethics-related research in information systems<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S0010448514001419?via%3Dihub\" target=\"_blank\" rel=\"noopener\">Design and implementation of an integrated surface texture information system for design, manufacture and measurement<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"http:\/\/journals.plos.org\/ploscompbiol\/article?id=10.1371\/journal.pcbi.1003951\" target=\"_blank\" rel=\"noopener\">The HIV Mutation Browser: A Resource for Human Immunodeficiency Virus Mutagenesis and Polymorphism Data<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"http:\/\/journals.plos.org\/ploscompbiol\/article?id=10.1371\/journal.pcbi.1003516\" target=\"_blank\" rel=\"noopener\">Computational Biology and Bioinformatics in Nigeria<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S1110866514000036?via%3Dihub\" target=\"_blank\" rel=\"noopener\">Optimum Resource Allocation of Database in Cloud Computing<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S016764231200144X?via%3Dihub\" target=\"_blank\" rel=\"noopener\">Recovering management information from source code<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S1532046413000737?via%3Dihub\" target=\"_blank\" rel=\"noopener\">Privacy-preserving screen capture: Towards closing the loop for health IT usability<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S0898122112004142?via%3Dihub\" target=\"_blank\" rel=\"noopener\">The configuration and detection strategies for information security systems<\/a><\/strong><\/span><\/li><li><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/ezproxy.upm.edu.my:2060\/science\/article\/pii\/S0360131513000857?via%3Dihub\" target=\"_blank\" rel=\"noopener\">Improving literacy skills through learning reading by writing: The iWTR method presented and tested<\/a><\/strong><\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-6302\" data-id=\"6302\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-2049\" data-id=\"2049\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7413 elementor-view-stacked elementor-position-left elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"7413\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-shrink\" >\n\t\t\t\t<i class=\"fa fa-globe\" aria-hidden=\"true\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h2 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tOPEN ACCESS JOURNALS\t\t\t\t\t<\/span>\n\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6650 elementor-widget elementor-widget-text-editor\" data-id=\"6650\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Open access journals are scholarly journals that open to all, with no access fees that are available online to the reader.<\/p><ul><li><a href=\"https:\/\/www.hindawi.com\/journals\/aai\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Advances in Artificial Intelligence<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.aece.ro\/index.php\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Advances in Electrical and Computer Engineering<\/strong><\/span><\/a><\/li><li><a href=\"https:\/\/www.hindawi.com\/journals\/ahci\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Advances in Human-Computer Interaction<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.scirp.org\/journal\/ait\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Advances in Internet of Things<\/strong><\/span><\/a><\/li><li><a href=\"https:\/\/www.hindawi.com\/journals\/am\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Advances in Multimedia<\/strong><\/span><\/a><\/li><li><a href=\"https:\/\/www.hindawi.com\/journals\/ase\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Advances in Software Engineering<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/epress.lib.uts.edu.au\/journals\/index.php\/ajict\/index\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>African Journal of Information and Communication Technology<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.scientific-journals.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>ARPN Journal of Systems and Software<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.cjlt.ca\/index.php\/cjlt\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Canadian Journal of Learning and Technology<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.scirp.org\/journal\/cn\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Communications and Network<\/strong><\/span><\/a><\/li><li><a href=\"https:\/\/www.hindawi.com\/journals\/cin\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Computational Intelligence and Neuroscience<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/ccsenet.org\/journal\/index.php\/cis\/index\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Computer and Information Science<\/strong><\/span><\/a><\/li><li><a href=\"https:\/\/journals.agh.edu.pl\/csci\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Computer Science<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.comsis.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Computer Science and Information Systems<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.comsj.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Computer Science Journal<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.math.md\/publications\/csjm\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Computer Science Journal of Moldova<\/strong><\/span><\/a><\/li><li><a href=\"https:\/\/www.jstage.jst.go.jp\/browse\/jssst\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Computer Software<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.crosstalkonline.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Crosstalk : Journal of Defense Software Engineering\u00a0<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.cit.iit.bas.bg\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Cybernetics and Information Technologies<\/strong><\/span><\/a><\/li><li><a href=\"https:\/\/www.jstage.jst.go.jp\/browse\/dsj\/-char\/en\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Data Science Journal<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.dbjournal.ro\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Database Systems Journal<\/strong><\/span><\/a><\/li><li><a href=\"https:\/\/www.dmtcs.org\/dmtcs-ojs\/index.php\/dmtcs\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Discrete Mathematics &amp; Theoretical Computer Science<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.economyinformatics.ase.ro\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Economy Informatics<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.e-informatyka.pl\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>e-Informatica Software Engineering Journal<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/elcvia.cvc.uab.es\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>ELCVIA Electronic Letters on Computer Vision and Image Analysis<\/strong><\/span><\/a><\/li><li><a href=\"https:\/\/journal.ub.tu-berlin.de\/index.php\/eceasst\/index\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Electronic Communications of the EASST<\/strong><\/span><\/a><\/li><li><a href=\"http:\/\/www.ejise.com\/main.html\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\"><strong>Electronic Journal of Information Systems Evaluation<\/strong><\/span><\/a><\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>find Articles &#8211; Computer science &amp; information technology ONLINE DATABASES Use online databases to find journal articles about a subject. Below is a list of databases which are most often used. ACM Digital Library ASME Cambridge University Press &#8211; Cambridge Journals Online CINAHL Plus with Full Text Academic Search Premier Emerald Insight IEEE Xplore IOP&hellip; <a class=\"more-link\" href=\"http:\/\/subjects.upm.edu.my\/sg\/?page_id=5611\">Continue reading <span class=\"screen-reader-text\">comp_findarticles<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":[],"_links":{"self":[{"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/pages\/5611"}],"collection":[{"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5611"}],"version-history":[{"count":5,"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/pages\/5611\/revisions"}],"predecessor-version":[{"id":5616,"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/pages\/5611\/revisions\/5616"}],"wp:attachment":[{"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}