Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Internet"

ADD TO MY LIST
 
Understanding the Reading Habits of Children in Singapore

Author(s): Shaheen Majid | Venus Tan
Concurrent and Predictive Relationships Between Compulsive Internet Use and Substance Use: Findings from Vocational High School Students in China and the USA

Author(s): Ping Sun | Carl Anderson Johnson | Paula Palmer | Thalida E. Arpawong | Jennifer B. Unger | Bin Xie | Louise A. Rohrbach | Donna Spruijt-Metz | Steve Sussman
Shooting short videos in French with mobile phones

Author(s): Serge Gabarre | Cécile Gabarre
CSRF Vulnerabilities and Defensive Techniques

Author(s): Rupali D. Kombade | B.B. Meshram
The Examination of Strength and Weakness of Online Evaluation of Faculty Members Teaching by Students in the University of Isfahan

Author(s): Ansary Maryam | Shavakhi Alireza | Nasr Ahmad Reza | Arbabisarjou Azizollah
ON-LINE MARKETING-COMMUNICATION IN HUNGARY

Author(s): Krisztina TARALIK
Computer and Internet use Among Families: A Case of Botswana

Author(s): Dr. Rama Srivastava | Mr. Ishaan Srivastava
Evolution of Home Automation Technology

Author(s): Mohd. Rihan | M. Salim Beg
NETWORK NEUTRALITY SURVEY

Author(s): Anuj Pathania | Puneet Kalra
AN ALGORITHM FOR DIGITAL WATERMARKING OF STILL IMAGES FOR COPYRIGHT PROTECTION

Author(s): Jahnvi Sen | A.M. Sen | K. Hemachandran
An Overview of MANET: History, Challenges and Applications

Author(s): Mohit Kumar | Rashmi Mishra
Management Information System in Indian Universities: A Comparative Study

Author(s): Sangeeta Gupta | H. Bansal | A. K. Saini
Consensus Building: Implications for Labour – Management Relations in Nigeria

Author(s): Samuel Emeka Mbah | Iwuji Innocent Ifeanyi
Neighborhood Quality and Housing Value: Evidence from Urban Micro Data

Author(s): Yi Wang | Ruiping Ran | Guoying Deng
Web 3.0 in Education & Research

Author(s): Rajiv | Manohar Lal
Symmetry considerations in structural phase transitions

Author(s): Perez-Mato J.M. | Aroyo M.I. | Orobengoa D.
Behavioral Intention towards the Use of 3G Technology

Author(s): Sona Mardikyan | Betül Beşiroğlu | Gözde Uzmaya
TRACKING OF INTRUDERS ON GEOGRAPHICAL MAP USING IDS ALERT

Author(s): Manish Kumar | M. Hanumanthappa | T.V. Suresh Kumar
Internet and education for the patient

Author(s): Bastos, Bárbara Guimarães | Ferrari, Deborah Viviane
A web service based tool to plan atmospheric research flights

Author(s): M. Rautenhaus | G. Bauer | A. Dörnbrack
E-Learning Methodologies and Tools

Author(s): Oye, N.D. | Mazleena Salleh | N. A. Iahad
New design of Robotics Remote lab

Author(s): Mohammad R. Kadhum | Seifedine Kadry
Srovnání způsobu provozování eSlužeb v ČR a vybraných zemích

Author(s): Michal Vojtek | Zdeněk Žák | Dominik Šimůnek
The Spirituality Questionnaire: Core Dimensions of Spirituality

Author(s): Gerhild Becker | Malgorzata Dragan | Carola Xander | Jochen Hardt | Sonja Schultz
Relationship between sense of coherence and lifestyle in middle-aged workers in Japan

Author(s): Kiyoshi Aoki | Syunichi Daitou | Ryuji Ochiai
ENSINO DE LITERATURA: O QUE DIZEM AS DISSERTAÇÕES E TESES RECENTES (2001-2010)?

Author(s): Maria Amélia Dalvi | Neide Luzia de Rezende
Identifyng barriers to successful research during medical school

Author(s): Chayan Chakraborti | Daniel J. Bourgeois III | Elizabeth Gleeson | William Gunderson
Trends in the social and interpersonal relations of young people and digital natives in the Web 2.0

Author(s): Patricia Núñez-Gómez | María-Luisa García-Guardia | Lourdes-Ainhoa Hermida-Ayala
Los sistemas IPTV ¿una amenaza inminente para los actuales medios de teledifusión?

Author(s): Ricardo Alonso Ferro Bolívar | Cesar Hernández
Redes bayesianas y riesgo operacional

Author(s): FÉLIX DOLDÁN TIÉ
Alterações curriculares de uma escola septuagenária: um estudo sobre as grades dos cursos de formação superior em Educação Física da ESEF/UFRGS

Author(s): Alex Branco Fraga | Felipe Wachs | Rute Viu00E9gas Nunes | Cibele Biehl Bossle | Ana Paula Pagliosa Bastos | Felipe Freddo Breunig
Gestión de la información cientifica en estudiantes de medicina de una universidad pública peruana

Author(s): Yolanda Angulo-Bazán | Rubén Borja-García | Teresa Alegre Tuesta | Connie Alva Gutierrez | Graham Gutiérrez Zegarra
Desconfianza hacia la venta tradicional y electrónica: Un estudio sobre el perfil del consumidor desconfiado

Author(s): M Isabel null | Sergio Rom n Nicol s | Roc o Rodr guez Herrera
Eventos de Vida: Investigações sobre a Violência Sexual Contra Crianças e Adolescentes

Author(s): Ana Celina Garcia Albornoz | Denise Ruschel Bandeira
The effects of a Dutch version of an Internet-based treatment program for fear of public speaking: A controlled study

Author(s): María José Gallego | Paul Maria Gerardus Emmelkamp | Marjoke van der Kooij | Hilde Mees
SISTEMA INTEGRADO INALÁMBRICO ETHERNET WIPORT®

Author(s): Jimy Alexander Cort s Osorio | William Ardila Urue a | Jairo Alberto Mendoza Vargas
RoadRunner for Heterogeneous Web Pages Using Extended MinHash

Author(s): A Suresh Babu | P. Premchand | A. Govardhan
Introduction to Devices Orchestration in Internet of Things Using SBPMN

Author(s): Alejandro González García | Manuel Álvarez Álvarez | Jordán Pascual Espada | Oscar Sanjuán Martínez | Juan Manuel Cueva Lovelle | Cristina Pelayo G-Bustelo
Virtual Objects on the Internet of Things

Author(s): Jordán Pascual Espada | Oscar Sanjuán Martínez | B. Cristina Pelayo García-Bustelo | Juan Manuel Cueva Lovelle
Identifying barriers to successful research during medical school

Author(s): Chayan Chakraborti | Daniel J. Bourgeois III | Elizabeth Gleeson | William Gunderson
THE INTERNET-BASED HEALTH INFORMATION AND ADOLESCENTS

Author(s): Biljana Kocić | Branislav Petrović
¿Cartografía antigua o Cartografía histórica?

Author(s): Crespo Sanz, Antonio | Fernández Wyttenbach, Alberto
Lossy Image Compression using Discrete Cosine Transform

Author(s): Pravin B. Pokle | N. G. Bawane
Digital Signatura Schemes for Secure Video

Author(s): R. N. Mandavgane | N.G.Bawane
System Communication based On Wi-Fi Technology Using 802.11x

Author(s): N. P. Giradkar | C. D. Raut
Routing Protocols for V2V communications used in Urban VANET to improve ITS

Author(s): Dongre Manoj M | Bawane N G | Jawade Nilima R
New generatition of Networking with OSPF

Author(s): Pratik N. Katolkar | Sneha R. Burnase
Integration of GSM With IPv6

Author(s): Samir N. Ajani
Efficient Approximate Query Processing In P2P Network

Author(s): Amol P. Bhagat | P. P. Pawade | V. T. Gaikwad
Kernel Based Object Tracking Using Mean Shift Method

Author(s): Swati P. Baviskar | Nitin S. Ujgare
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
Web Page Clustering using Latent Semantic Analysis

Author(s): Lalit A. Patil | S M. Kamalapur | Dhananjay Kanade
Mobility Management in Wireless Body Area Network for Patient Monitoring System

Author(s): Vijay M. Birari | Vijay M.Wadhai | J. B. Helonde
A Proposed System for Network Intrusion Detection System Using Data Mining

Author(s): Gidiya Priyanka V. | Ushir Kishori N | Mirza Shoeb A | Ikhankar Sagar D | Khivsara Bhavana A
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
Trends in Cloud Operating System

Author(s): Sanil C. Savale
IntellectCloud cloud application's mÉnage

Author(s): Deepti Ghuge | Girish Tere
Advanced Video Compression Technique of H.264 Codec Using SPIHT Algorithm

Author(s): S.K Singh | Mahendra Sharma | Priti Singh | Greta Dabre
Mobile Viruses

Author(s): Pranav R Shah | Yash Shah | Saurabh Madan
A Survey of Image Compression Methods

Author(s): Jayavrinda Vrindavanam | Saravanan Chandran | Gautam K. Mahanti
A Novel Approach for Iris Encryption

Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni
Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole
An Adult Site Access Verification System for Non-Adults

Author(s): Shalini Puri | Sona Kaushik
Desain dan Implementasi Web Proxy dan VPN Akses (Studi Kasus di Undip)

Author(s): Adian Fatchur Rochim | Andrian Satria Martiyanto
Robust Algorithm for Face Detection in Color Images

Author(s): Hlaing Htake Khaung Tin
Spatial and Frequency Domain for Grey level Digital Images

Author(s): Dharm Singh | Naveen Choudhary | Madhuri Agrawal
Social Impact of Internet Access: A Survey

Author(s): Poonam Dhaka | Sandeep Upadhyay | Drashti Dave
Cloud Computing: Different Approach & Security Challenge

Author(s): Maneesha Sharma | Himani Bansal | Amit Kumar Sharma
Why do you need a reservation system?      Affiliate Program