Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Use of Internet"

ADD TO MY LIST
 
Data publication and dissemination of interactive keys under the open access model

Author(s): Lyubomir Penev | Michael Sharkey | Terry Erwin | Simon van Noort | Matthew Buffington | Katja Seltmann | Norman Johnson | Matt Taylor | Chris Thompson | Michael Dallwitz
USO DA INTERNET E OPORTUNIDADES DE PARTICIPAÇÃO POLÍTICA VIRTUAL NAS ELEIÇÕES MUNICIPAIS DE OUTUBRO DE 2008 NO BRASIL

Author(s): Sérgio Braga | María Alejandra Nicolás | Andressa Silvério Terrona França
APPLYING BAYESIAN NETWORK AND ASSOCIATION RULE ANALYSIS FOR PRODUCT RECOMMENDATION

Author(s): Sung-Shun Weng | Shang-Chia Liu | Tsung-Hsien Wu
A Land Use Planning Ontology: LBCS

Author(s): Nuno Montenegro | Jorge C. Gomes | Paulo Urbano | José P. Duarte
A Survey Analysis of National and International University Websites Contents

Author(s): Sunita S. Padmannavar | Dr. Milind J. Joshi
A Block Cipher Using Graph Structures and Logical XOR Operation

Author(s): CH. Suneetha | D. Sravan Kumar | A.Chandra sekhar
Efficient Search Techniques in Peer to Peer Networks

Author(s): Tarunpreet Bhatia | Dr. Deepak Garg
A Comparison of Trojan Virus Behavior in Linux and Windows Operating System

Author(s): Ghossoon. M. W. Al-Saadoon | Hilal M.Y. Al-Bayatt
A Cloud-based Approach for Context Information Provisioning

Author(s): Elarbi Badidi | Larbi Esmahi
Word Geology – its Roots and Meanings

Author(s): Mihael Brenčič
Psycho-social impacts of virtual communication

Author(s): Macura Rajko | Vujović Slavoljub | Mikić Đuro
Leading dental journals availability through academic network of Serbia

Author(s): Jaćimović Jelena | Živković Slavoljub
From the Editor

Author(s): Ugur Demiray
USE OF EDUCATIONAL TECHNOLOGY IN PROMOTING DISTANCE EDUCATION

Author(s): Muhammad RASHID | Uzma ELAHI
Analyzing e-service quality in service-based website by E-SERVQUAL

Author(s): Babak Nemati | Hossein Gazor | Seyed Norollah MirAshrafi | Kianoush Nazari Ameleh
The Importance of Social Media for Commerce. A Case Study in Madeira (Portugal)

Author(s): Irene Garcia Medina | Pedro Alvaro Correia Pereira
Analysing Lecturers` Web/Internet Competence at the Zimbabwe Open University

Author(s): Bukaliya Richard and Paul Rumbidzai Dzimano
Multipurpose soft contact lens care in Japan

Author(s): Toshida H | Kadota Y | Suto C | Ohta T | Murakami A
Achievements of Nursing Portal Development in Selected Countries

Author(s): Reza Safdari | Mashaallah Torabi | Mohammad Ali Cheraghi | Niloufar Masoori | Zahra Azadmanjir
FAKTOR-FAKTOR YANG MEMPENGARUHI MINAT NASABAH

Author(s): Sri Maharsi | Yuliani Mulyadi
Testing Control, Innovation and Enjoy as External Variables to the Technology Acceptance Model in a North American French Banking Environment

Author(s): Jean-Pierre Lévy Mangin | Normand Bourgault | Juan Antonio Moriano León | Mario Martínez Guerrero
Reading habits of secondary school students in Serbia

Author(s): Krnjaić Zora | Stepanović Ivana | Pavlović-Babić Dragica
Alone at home

Author(s): Hannu Pääkkönen
Controlling IP Spoofing through PACKET Filtering

Author(s): Mridu Sahu | Rainey C. Lal
A New Approach for Web Information Extraction

Author(s): R.Gunasundari | Dr.S.Karthikeyan
Protection Switching and Rerouting in MPLS

Author(s): S. Veni | Dr.G.M.Kadhar Nawaz Bharathiar University
COMPARATIVE STUDY OF ASYCUDA ROLE IN INCREASING THE EFFICACY OF CUSTOMS AFFAIRS

Author(s): Dr. Mehrdad Alipour | Seyed Mahdi Moniri | Javad Tanha
KEY SUCCESS FACTORS FOR ACHIEVING CUSTOMER’S LOYALTY IN E-SMES: A STUDY ON IMPACT OF CUSTOMER AND E-BUSINESS CHARACTERISTICS ON E-LOYALTY IN IRAN

Author(s): Hengameh Rabiei | Mohammad Reza Meigounpoory | Pedram Yazdani | Mostafa Maleki Someah lu
Wideband Wireless Access Systems Interference Robustness: Its Effect on Quality of Video Streaming

Author(s): Aderemi A. Atayero | Oleg I. Sheluhin | Yuri A. Ivanov | Julet O. Iruemi
A Natural Language Query Processor for Database Interface

Author(s): Mrs.Vidya Dhamdhere | Nijesh Hirpara | Kalpesh Surana | Karishma Gangwani | Chirayu Bootley
Protection through Oblivion 'An Image Based Steganography'

Author(s): T Chandra Sekhara Reddy | D Prasad | B.Venkateswara Reddy
Diameter-based Protocol in the IP Multimedia Subsystem

Author(s): Vinay Kumar.S.B | Manjula N Harihar
New ICT Trends in E-Health

Author(s): Peter Ciganek | Rastislav Pirnik | Tatiana Broncekova
Students' profile as autonomous learners in an Internet-based EAP course

Author(s): Antonia Soler Cervera | Carmen Rueda Ramos | Elisabet Arnó Macià
Internet Use and the Political Knowledge Gap in Spain

Author(s): Anduiza, Eva | Gallego, Aina | Jorba, Laia
Advertising books: a linguistic analysis of blurbs

Author(s): Mª Lluïsa Gea Valor
CSR communication through online social media

Author(s): Vicente-José Ros-Diego, Ph.D. | Araceli Castelló-Martínez, Ph.D.
Development of E-government Services in Iran: A Comparison of Adoption Constructs

Author(s): Lotfollah Forozandeh Dehkordi | Reza Rasouli | Zahra Zebardast
INTEGRATING XML DATA INTO MULTIPLE ROLAP DATA WAREHOUSE SCHEMAS

Author(s): Soumya Sen | Ranak Ghosh | Debanjali Paul | Nabendu Chaki
PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
Pattern-Based Development and Management of Cloud Applications

Author(s): Christoph Fehling | Frank Leymann | Jochen Rütschlin | David Schumm
Evaluating the Impacts of Online Banking Factors on Motivating the Process of E-banking

Author(s): Akram Jalal | Jassim Marzooq | Hassan A. Nabi
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
THE SIX SIGMA SYSTEM IN RELATION TO THE BUSINESS STRATEGY AND PRIORITIES

Author(s): Dragoi Ionut | David Marcel | Boldea Monica
Concurrent and Predictive Relationships Between Compulsive Internet Use and Substance Use: Findings from Vocational High School Students in China and the USA

Author(s): Ping Sun | Carl Anderson Johnson | Paula Palmer | Thalida E. Arpawong | Jennifer B. Unger | Bin Xie | Louise A. Rohrbach | Donna Spruijt-Metz | Steve Sussman
e-Health technologies for adult hearing screening

Author(s): S. Stenfelt | T. Janssen | V. Schirkonyer | F. Grandori
Shooting short videos in French with mobile phones

Author(s): Serge Gabarre | Cécile Gabarre
The Examination of Strength and Weakness of Online Evaluation of Faculty Members Teaching by Students in the University of Isfahan

Author(s): Ansary Maryam | Shavakhi Alireza | Nasr Ahmad Reza | Arbabisarjou Azizollah
Computer and Internet use Among Families: A Case of Botswana

Author(s): Dr. Rama Srivastava | Mr. Ishaan Srivastava
An Overview of MANET: History, Challenges and Applications

Author(s): Mohit Kumar | Rashmi Mishra
Symmetry considerations in structural phase transitions

Author(s): Perez-Mato J.M. | Aroyo M.I. | Orobengoa D.
Behavioral Intention towards the Use of 3G Technology

Author(s): Sona Mardikyan | Betül Beşiroğlu | Gözde Uzmaya
Internet and education for the patient

Author(s): Bastos, Bárbara Guimarães | Ferrari, Deborah Viviane
ENSINO DE LITERATURA: O QUE DIZEM AS DISSERTAÇÕES E TESES RECENTES (2001-2010)?

Author(s): Maria Amélia Dalvi | Neide Luzia de Rezende
Trends in the social and interpersonal relations of young people and digital natives in the Web 2.0

Author(s): Patricia Núñez-Gómez | María-Luisa García-Guardia | Lourdes-Ainhoa Hermida-Ayala
¿Cartografía antigua o Cartografía histórica?

Author(s): Crespo Sanz, Antonio | Fernández Wyttenbach, Alberto
Lossy Image Compression using Discrete Cosine Transform

Author(s): Pravin B. Pokle | N. G. Bawane
Web Page Clustering using Latent Semantic Analysis

Author(s): Lalit A. Patil | S M. Kamalapur | Dhananjay Kanade
A Proposed System for Network Intrusion Detection System Using Data Mining

Author(s): Gidiya Priyanka V. | Ushir Kishori N | Mirza Shoeb A | Ikhankar Sagar D | Khivsara Bhavana A
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
IntellectCloud cloud application's mÉnage

Author(s): Deepti Ghuge | Girish Tere
Advanced Video Compression Technique of H.264 Codec Using SPIHT Algorithm

Author(s): S.K Singh | Mahendra Sharma | Priti Singh | Greta Dabre
Mobile Viruses

Author(s): Pranav R Shah | Yash Shah | Saurabh Madan
An Adult Site Access Verification System for Non-Adults

Author(s): Shalini Puri | Sona Kaushik
Spatial and Frequency Domain for Grey level Digital Images

Author(s): Dharm Singh | Naveen Choudhary | Madhuri Agrawal
Social Impact of Internet Access: A Survey

Author(s): Poonam Dhaka | Sandeep Upadhyay | Drashti Dave
Why do you need a reservation system?      Save time & money - Smart Internet Solutions