{"title":"Information fusion with dempster-shafer evidence theory for software defect prediction","authors":"Aytunç Paksoy, Mehmet Göktürk","doi":"10.1016/j.procs.2010.12.100","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.100","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122310163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A tool for evaluating event based middleware","authors":"C. Ivan, V. Dădârlat","doi":"10.1016/j.procs.2011.01.005","DOIUrl":"https://doi.org/10.1016/j.procs.2011.01.005","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133650411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The analysis of correlation between Information Technology (IT) and educational planning","authors":"M. Damavandi, Zohreh Bagherzadeh, S. Shahmir","doi":"10.1016/j.procs.2011.01.041","DOIUrl":"https://doi.org/10.1016/j.procs.2011.01.041","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy cognitive mapping in factor elimination: A case study for innovative power and risks","authors":"Ayça Altay, G. Kayakutlu","doi":"10.1016/j.procs.2010.12.181","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.181","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Early childhood teachers' thoughts and practices about the use of computers in early childhood education","authors":"Özlem Yurt, Nilgün Cevher-Kalburan","doi":"10.1016/j.procs.2011.01.050","DOIUrl":"https://doi.org/10.1016/j.procs.2011.01.050","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127173865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muamer N. Mohammad, N. Sulaiman, Osama Abdulkarim Muhsin
{"title":"A novel intrusion detection system by using intelligent data mining in weka environment","authors":"Muamer N. Mohammad, N. Sulaiman, Osama Abdulkarim Muhsin","doi":"10.1016/j.procs.2010.12.198","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.198","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125247789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Condition aware robust routing algorithm with cross layer technique for ad hoc situations","authors":"Mehdi Rajabzadeh, F. Adibniya, M. Ghasemzadeh","doi":"10.1016/j.procs.2010.12.116","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.116","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125396303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Barriers to e-teaching and e-learning","authors":"A. Assareh, M. H. Bidokht","doi":"10.1016/j.procs.2010.12.129","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.129","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sheida Ghanbari Ghooshchy, Shilan Kameli, M. Jahromi
{"title":"The effect of sport activity and gender differences on self-perception in adolescents","authors":"Sheida Ghanbari Ghooshchy, Shilan Kameli, M. Jahromi","doi":"10.1016/j.procs.2011.01.044","DOIUrl":"https://doi.org/10.1016/j.procs.2011.01.044","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130816546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}