Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Internet use"

ADD TO MY LIST
 
Data publication and dissemination of interactive keys under the open access model

Author(s): Lyubomir Penev | Michael Sharkey | Terry Erwin | Simon van Noort | Matthew Buffington | Katja Seltmann | Norman Johnson | Matt Taylor | Chris Thompson | Michael Dallwitz
USO DA INTERNET E OPORTUNIDADES DE PARTICIPAÇÃO POLÍTICA VIRTUAL NAS ELEIÇÕES MUNICIPAIS DE OUTUBRO DE 2008 NO BRASIL

Author(s): Sérgio Braga | María Alejandra Nicolás | Andressa Silvério Terrona França
APPLYING BAYESIAN NETWORK AND ASSOCIATION RULE ANALYSIS FOR PRODUCT RECOMMENDATION

Author(s): Sung-Shun Weng | Shang-Chia Liu | Tsung-Hsien Wu
A Land Use Planning Ontology: LBCS

Author(s): Nuno Montenegro | Jorge C. Gomes | Paulo Urbano | José P. Duarte
A Survey Analysis of National and International University Websites Contents

Author(s): Sunita S. Padmannavar | Dr. Milind J. Joshi
A Block Cipher Using Graph Structures and Logical XOR Operation

Author(s): CH. Suneetha | D. Sravan Kumar | A.Chandra sekhar
Efficient Search Techniques in Peer to Peer Networks

Author(s): Tarunpreet Bhatia | Dr. Deepak Garg
A Comparison of Trojan Virus Behavior in Linux and Windows Operating System

Author(s): Ghossoon. M. W. Al-Saadoon | Hilal M.Y. Al-Bayatt
A Cloud-based Approach for Context Information Provisioning

Author(s): Elarbi Badidi | Larbi Esmahi
Word Geology – its Roots and Meanings

Author(s): Mihael Brenčič
Psycho-social impacts of virtual communication

Author(s): Macura Rajko | Vujović Slavoljub | Mikić Đuro
Leading dental journals availability through academic network of Serbia

Author(s): Jaćimović Jelena | Živković Slavoljub
From the Editor

Author(s): Ugur Demiray
USE OF EDUCATIONAL TECHNOLOGY IN PROMOTING DISTANCE EDUCATION

Author(s): Muhammad RASHID | Uzma ELAHI
Analyzing e-service quality in service-based website by E-SERVQUAL

Author(s): Babak Nemati | Hossein Gazor | Seyed Norollah MirAshrafi | Kianoush Nazari Ameleh
The Importance of Social Media for Commerce. A Case Study in Madeira (Portugal)

Author(s): Irene Garcia Medina | Pedro Alvaro Correia Pereira
Analysing Lecturers` Web/Internet Competence at the Zimbabwe Open University

Author(s): Bukaliya Richard and Paul Rumbidzai Dzimano
Multipurpose soft contact lens care in Japan

Author(s): Toshida H | Kadota Y | Suto C | Ohta T | Murakami A
Achievements of Nursing Portal Development in Selected Countries

Author(s): Reza Safdari | Mashaallah Torabi | Mohammad Ali Cheraghi | Niloufar Masoori | Zahra Azadmanjir
FAKTOR-FAKTOR YANG MEMPENGARUHI MINAT NASABAH

Author(s): Sri Maharsi | Yuliani Mulyadi
Testing Control, Innovation and Enjoy as External Variables to the Technology Acceptance Model in a North American French Banking Environment

Author(s): Jean-Pierre Lévy Mangin | Normand Bourgault | Juan Antonio Moriano León | Mario Martínez Guerrero
Reading habits of secondary school students in Serbia

Author(s): Krnjaić Zora | Stepanović Ivana | Pavlović-Babić Dragica
Alone at home

Author(s): Hannu Pääkkönen
Controlling IP Spoofing through PACKET Filtering

Author(s): Mridu Sahu | Rainey C. Lal
A New Approach for Web Information Extraction

Author(s): R.Gunasundari | Dr.S.Karthikeyan
Protection Switching and Rerouting in MPLS

Author(s): S. Veni | Dr.G.M.Kadhar Nawaz Bharathiar University
COMPARATIVE STUDY OF ASYCUDA ROLE IN INCREASING THE EFFICACY OF CUSTOMS AFFAIRS

Author(s): Dr. Mehrdad Alipour | Seyed Mahdi Moniri | Javad Tanha
KEY SUCCESS FACTORS FOR ACHIEVING CUSTOMER’S LOYALTY IN E-SMES: A STUDY ON IMPACT OF CUSTOMER AND E-BUSINESS CHARACTERISTICS ON E-LOYALTY IN IRAN

Author(s): Hengameh Rabiei | Mohammad Reza Meigounpoory | Pedram Yazdani | Mostafa Maleki Someah lu
Wideband Wireless Access Systems Interference Robustness: Its Effect on Quality of Video Streaming

Author(s): Aderemi A. Atayero | Oleg I. Sheluhin | Yuri A. Ivanov | Julet O. Iruemi
A Natural Language Query Processor for Database Interface

Author(s): Mrs.Vidya Dhamdhere | Nijesh Hirpara | Kalpesh Surana | Karishma Gangwani | Chirayu Bootley
Protection through Oblivion 'An Image Based Steganography'

Author(s): T Chandra Sekhara Reddy | D Prasad | B.Venkateswara Reddy
Diameter-based Protocol in the IP Multimedia Subsystem

Author(s): Vinay Kumar.S.B | Manjula N Harihar
New ICT Trends in E-Health

Author(s): Peter Ciganek | Rastislav Pirnik | Tatiana Broncekova
Students' profile as autonomous learners in an Internet-based EAP course

Author(s): Antonia Soler Cervera | Carmen Rueda Ramos | Elisabet Arnó Macià
Internet Use and the Political Knowledge Gap in Spain

Author(s): Anduiza, Eva | Gallego, Aina | Jorba, Laia
Advertising books: a linguistic analysis of blurbs

Author(s): Mª Lluïsa Gea Valor
CSR communication through online social media

Author(s): Vicente-José Ros-Diego, Ph.D. | Araceli Castelló-Martínez, Ph.D.
Development of E-government Services in Iran: A Comparison of Adoption Constructs

Author(s): Lotfollah Forozandeh Dehkordi | Reza Rasouli | Zahra Zebardast
INTEGRATING XML DATA INTO MULTIPLE ROLAP DATA WAREHOUSE SCHEMAS

Author(s): Soumya Sen | Ranak Ghosh | Debanjali Paul | Nabendu Chaki
PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
Pattern-Based Development and Management of Cloud Applications

Author(s): Christoph Fehling | Frank Leymann | Jochen Rütschlin | David Schumm
Evaluating the Impacts of Online Banking Factors on Motivating the Process of E-banking

Author(s): Akram Jalal | Jassim Marzooq | Hassan A. Nabi
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
THE SIX SIGMA SYSTEM IN RELATION TO THE BUSINESS STRATEGY AND PRIORITIES

Author(s): Dragoi Ionut | David Marcel | Boldea Monica
Concurrent and Predictive Relationships Between Compulsive Internet Use and Substance Use: Findings from Vocational High School Students in China and the USA

Author(s): Ping Sun | Carl Anderson Johnson | Paula Palmer | Thalida E. Arpawong | Jennifer B. Unger | Bin Xie | Louise A. Rohrbach | Donna Spruijt-Metz | Steve Sussman
e-Health technologies for adult hearing screening

Author(s): S. Stenfelt | T. Janssen | V. Schirkonyer | F. Grandori
Shooting short videos in French with mobile phones

Author(s): Serge Gabarre | Cécile Gabarre
The Examination of Strength and Weakness of Online Evaluation of Faculty Members Teaching by Students in the University of Isfahan

Author(s): Ansary Maryam | Shavakhi Alireza | Nasr Ahmad Reza | Arbabisarjou Azizollah
Computer and Internet use Among Families: A Case of Botswana

Author(s): Dr. Rama Srivastava | Mr. Ishaan Srivastava
An Overview of MANET: History, Challenges and Applications

Author(s): Mohit Kumar | Rashmi Mishra
Symmetry considerations in structural phase transitions

Author(s): Perez-Mato J.M. | Aroyo M.I. | Orobengoa D.
Behavioral Intention towards the Use of 3G Technology

Author(s): Sona Mardikyan | Betül Beşiroğlu | Gözde Uzmaya
Internet and education for the patient

Author(s): Bastos, Bárbara Guimarães | Ferrari, Deborah Viviane
ENSINO DE LITERATURA: O QUE DIZEM AS DISSERTAÇÕES E TESES RECENTES (2001-2010)?

Author(s): Maria Amélia Dalvi | Neide Luzia de Rezende
Trends in the social and interpersonal relations of young people and digital natives in the Web 2.0

Author(s): Patricia Núñez-Gómez | María-Luisa García-Guardia | Lourdes-Ainhoa Hermida-Ayala
¿Cartografía antigua o Cartografía histórica?

Author(s): Crespo Sanz, Antonio | Fernández Wyttenbach, Alberto
Lossy Image Compression using Discrete Cosine Transform

Author(s): Pravin B. Pokle | N. G. Bawane
Web Page Clustering using Latent Semantic Analysis

Author(s): Lalit A. Patil | S M. Kamalapur | Dhananjay Kanade
A Proposed System for Network Intrusion Detection System Using Data Mining

Author(s): Gidiya Priyanka V. | Ushir Kishori N | Mirza Shoeb A | Ikhankar Sagar D | Khivsara Bhavana A
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
IntellectCloud cloud application's mÉnage

Author(s): Deepti Ghuge | Girish Tere
Advanced Video Compression Technique of H.264 Codec Using SPIHT Algorithm

Author(s): S.K Singh | Mahendra Sharma | Priti Singh | Greta Dabre
Mobile Viruses

Author(s): Pranav R Shah | Yash Shah | Saurabh Madan
An Adult Site Access Verification System for Non-Adults

Author(s): Shalini Puri | Sona Kaushik
Spatial and Frequency Domain for Grey level Digital Images

Author(s): Dharm Singh | Naveen Choudhary | Madhuri Agrawal
Social Impact of Internet Access: A Survey

Author(s): Poonam Dhaka | Sandeep Upadhyay | Drashti Dave
Save time & money - Smart Internet Solutions     

Tango Rapperswil
Tango Rapperswil