Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Advances in Information Technology

ISSN: 1798--2340
Publisher: ACADEMY PUBLISHER


ADD TO MY LIST
 
Investigation of MQAM and MPSK with EGC in Generalized Flat-Fading Channels

Author(s): Jyoteesh Malhotra
Volume: 2
Issue: 4
Year: 2011
Inferring Asymmetry of Inhabitant Flow using Call Detail Records

Author(s): Santi Phithakkitnukoon | Carlo Ratti
Volume: 2
Issue: 4
Year: 2011
On Performance Evaluation of Mining Algorithm for Multiple-Level Association Rules based on Scale-up Characteristics

Author(s): Suraj K Srivastava | Harsh K Verma | Deepti Gupta
Volume: 2
Issue: 4
Year: 2011
Customer Interaction 2.0: Adopting Social Media as Customer Service Channel

Author(s): Michaela Geierhos
Volume: 2
Issue: 4
Year: 2011
An Efficient Technique for Detection of Suspicious Malicious Web Site

Author(s): K. Pragadeesh Kumar | N. Jaisankar | N. Mythili
Volume: 2
Issue: 4
Year: 2011
The Impact of the New Web 2.0 Technologies in Communication, Development, and Revolutions of Societies

Author(s): Ashraf Darwish | Kamaljit I. Lakhtaria
Volume: 2
Issue: 4
Year: 2011
Building Machine Learning Based Senti-word Lexicon for Sentiment Analysis

Author(s): Alaa Hamouda | Mahmoud Marei | Mohamed Rohaim
Volume: 2
Issue: 4
Year: 2011
The Utilization of Web2.0 Functionalities on E-Commerce Web Sites

Author(s): Yong-Mi Kim | Suliman Hawamdeh
Volume: 2
Issue: 4
Year: 2011
Guest Editorial

Author(s): Kamaljit I. Lakhtaria
Volume: 2
Issue: 4
Year: 2011
Redistribution of Paid Channels Freely by Modifying Live Video

Author(s): Prem Shanker Yadav | Manuj Darbari
Volume: 1
Issue: 4
Year: 2010
On Routing Protocols for WSNs with Additional Layers: Future Technology for IT

Author(s): Deepti Gupta | Ajay K Sharma
Volume: 1
Issue: 4
Year: 2010
A Client-based Vertical Handoff System in 4G Wireless Networks

Author(s): Shivakumar V Saboji | Channappa B Akki
Volume: 1
Issue: 4
Year: 2010
A Network Selection Mechanism for Fourth Generation Communication Networks

Author(s): Mohammod Sazid Zaman Khan | Shaiful Alam | Mohammad Rezaul Huque Khan
Volume: 1
Issue: 4
Year: 2010
A Hybrid Particle Swarm Optimization with Genetic Operator for Vehicle Routing Problem

Author(s): Geetha Shanmugam | Poonthalir Ganesan | Vanathi P T
Volume: 1
Issue: 4
Year: 2010
A Recent-Pattern Biased Dimension-Reduction Framework for Time Series Data

Author(s): Santi Phithakkitnukoon | Carlo Ratti
Volume: 1
Issue: 4
Year: 2010
Direct Torque Control of PMBLDC Motor using Hybrid (GA and Fuzzy Logic) Controller

Author(s): Esakkiappan Kaliappan | C. Sharmeela
Volume: 1
Issue: 4
Year: 2010
Using SAT-Based Techniques in Test Vectors Generation

Author(s): Fadi Aloul | Assim Sagahyroon
Volume: 1
Issue: 4
Year: 2010
Review of Machine Learning Approaches to Semantic Web Service Discovery

Author(s): Shalini Batra | Seema Bawa
Volume: 1
Issue: 3
Year: 2010
JPEG Compression Steganography & Crypography Using Image-Adaptation Technique

Author(s): Meenu Kumari | A. Khare | Pallavi Khare
Volume: 1
Issue: 3
Year: 2010
A Channel Allocation Algorithm for Hot-Spot Cells in Wireless Networks

Author(s): Rana Ejaz Ahmed
Volume: 1
Issue: 3
Year: 2010
GRAAA: Grid Resource Allocation Based on Ant Algorithm

Author(s): Manpreet Singh
Volume: 1
Issue: 3
Year: 2010
Discrete Characterization of Domain Using Semantic Clustering

Author(s): Sanjay Madan | Shalini Batra
Volume: 1
Issue: 3
Year: 2010
Peripheral Display for Multi-User Location Awareness

Author(s): Rahat Iqbal | Anne James | John Black | Witold Poreda
Volume: 1
Issue: 3
Year: 2010
A Location Dependent Connectivity Guarantee Key Management Scheme for Heterogeneous Wireless Sensor Networks

Author(s): Kamal Kumar | A. K. Verma | R.B. Patel
Volume: 1
Issue: 3
Year: 2010
Guest Editorial

Author(s): Neeraj Kumar Nehra | Pranay Chaudhuri
Volume: 1
Issue: 3
Year: 2010
Explaining Human Behavior in Dynamic Tasks through Reinforcement Learning

Author(s): Varun Dutt
Volume: 2
Issue: 3
Year: 2011
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations

Author(s): N.R. Sunitha | B.B. Amberker
Volume: 2
Issue: 3
Year: 2011
Efficient Refinery Scheduling Heuristic in Heterogeneous Computing Systems

Author(s): Sunita Bansal | Chittaranjan Hota
Volume: 2
Issue: 3
Year: 2011
Hybrid Personalized Recommender System Using Fast K-medoids Clustering Algorithm

Author(s): Subhash K. Shinde | Uday V. Kulkarni
Volume: 2
Issue: 3
Year: 2011
Improvement in RSA Cryptosystem

Author(s): Seema Verma | Deepak Garg
Volume: 2
Issue: 3
Year: 2011
A Novel History based Weighted Voting Algorithm for Safety Critical Systems

Author(s): Phanikumar Singamsetty | SeethaRamaiah Panchumarthy
Volume: 2
Issue: 3
Year: 2011
Differential Geometric Approach to Change Detection Using Remotely Sensed Images

Author(s): N Panigrahi | B K Mohan | G Athithan
Volume: 2
Issue: 3
Year: 2011
Guest Editorial

Author(s): Deepak Garg
Volume: 2
Issue: 3
Year: 2011
A Clonal Selection Algorithm Based Tabu Search for Satisfiability Problems

Author(s): Abdesslem Layeb
Volume: 3
Issue: 2
Year: 2012
Robust Power Control using Efficient Minimum Variance Beamforming for Cognitive Radio Networks

Author(s): Ummy Habiba | Zahed Hossain | Mohammad Abdul Matin
Volume: 3
Issue: 2
Year: 2012
A Dynamic Bandwidth Assignment Approach Under DDoS Flood Attack

Author(s): Raman Singh | Amandeep Verma
Volume: 3
Issue: 2
Year: 2012
Spread Spectrum Modem for Voice and Data Transmission

Author(s): Md. Abdul Alim
Volume: 3
Issue: 2
Year: 2012
Feature Optimization and Performance Evaluation of Machine Learning Algorithms for Identification of P2P Traffic

Author(s): Sunil Agrawal | Balwinder S. Sohi
Volume: 3
Issue: 2
Year: 2012
A Glimpse into the Research Space of Location Based Services

Author(s): Chen Wei Tan | Mohammod Sazid Zaman Khan | Thilek Silvadorai | Toni Anwar | Sureswaran Ramadass
Volume: 3
Issue: 2
Year: 2012
‘Quality & Popularity’ Prediction Modeling of TV Programme through Fuzzy QFD Approach

Author(s): Savitur Prakash | Manuj Darbari
Volume: 3
Issue: 2
Year: 2012
Generalization of VLC Decoding Trees-to-Processes Translation

Author(s): Guan Hong | ACM Fong
Volume: 1
Issue: 2
Year: 2010
An Ameliorated Methodology for Comprehension of Legacy System

Author(s): Shivanand M. Handigund | Ajeet Annarao Chikkamannur | K. Ananthapadmanabha | H. R. Shashidhara
Volume: 1
Issue: 2
Year: 2010
User Behavior Information and Diffusion Process for IC-Card System

Author(s): Donghun Yoon
Volume: 1
Issue: 2
Year: 2010
Adoption of E-Learning Technology for Anti-Money Laundering Training

Author(s): Alya H. Al-Hammadi | Rana E. Ahmed | Imran Zualkernan
Volume: 1
Issue: 2
Year: 2010
A Lightweight Model for Mobile Peer-to-Peer File Sharing Systems

Author(s): George Stephan | Badieh Traboulsi | Rabih Dbouk | Sanaa Sharafeddine
Volume: 1
Issue: 2
Year: 2010
A Fault-Tolerant Routing Protocol for Mobile Ad Hoc Networks

Author(s): Rana Ejaz Ahmed
Volume: 2
Issue: 2
Year: 2011
Design Research of an Adaptive-Fuzzy-Neural Controller

Author(s): Peifeng Niu | Guoqiang Li | Mizhe Zhang
Volume: 2
Issue: 2
Year: 2011
Analysis of Open Environment Sign-in Schemes-Privacy Enhanced & Trustworthy Approach

Author(s): Zubair Ahmad Khattak | Jamalul-lail Ab Manan | Suziah Sulaiman
Volume: 2
Issue: 2
Year: 2011
Emerging Intuitionistic Fuzzy Classifiers for Intrusion Detection System

Author(s): Kavitha B | Karthikeyan Subramanian | Sheeba Maybell P
Volume: 2
Issue: 2
Year: 2011
Defense Strategy Using Trust Based Model to Mitigate Active Attacks in DSR Based MANET

Author(s): N. Bhalaji | A. Shanmugam
Volume: 2
Issue: 2
Year: 2011
Security Model for TCP/IP Protocol Suite

Author(s): Anand Kumar | S. Karthikeyan
Volume: 2
Issue: 2
Year: 2011
Securing Retinal Template Using Quasigroups

Author(s): N. Radha | T. Rubya | S. Karthikeyan
Volume: 2
Issue: 2
Year: 2011
Components Based Key Management Algorithm for Storage Area Networks

Author(s): P. Mahalingam | Dr. N. Jayaprakash | Dr. S. Karthikeyan
Volume: 2
Issue: 2
Year: 2011
Guest Editorial

Author(s): Karthikeyan Subramainan
Volume: 2
Issue: 2
Year: 2011
A Prognostics Framework for Health Degradation and Air Pollution Concentrations

Author(s): Bernard Fong | G. Y. Hong
Volume: 3
Issue: 1
Year: 2012
Discovery of Scalable Association Rules from Large Set of Multidimensional Quantitative Datasets

Author(s): Tamanna Siddiqui | M Afshar Aalam | Sapna Jain
Volume: 3
Issue: 1
Year: 2012
PSO tuned Adaptive Neuro-fuzzy Controller for Vehicle Suspension Systems

Author(s): Rajeswari Kothandaraman | Lakshmi Ponnusamy
Volume: 3
Issue: 1
Year: 2012
Multivariable control of nonlinear process using soft computing techniques

Author(s): N. Kamala | T. Thyagarajan | S. Renganathan
Volume: 3
Issue: 1
Year: 2012
A Hybrid Revisit Policy For Web Search

Author(s): Vipul Sharma | Mukesh Kumar | Renu Vig
Volume: 3
Issue: 1
Year: 2012
Activity Recognition in Ubiquitous Learning Environment

Author(s): Tao Lu | Shaokun Zhang | Qian Hao
Volume: 3
Issue: 1
Year: 2012
Design and Realization of Virtual Classroom

Author(s): Rong Zhu | Yong Wang
Volume: 3
Issue: 1
Year: 2012
Research on Learning Effect based on Outer P- set

Author(s): Xiu-qing Yu
Volume: 3
Issue: 1
Year: 2012
iiOSProTrain: An Interactive Intelligent Online System for Programming Training

Author(s): Tho Thanh Quan | Phung H Nguyen | Thang H Bui | Thuan Dinh Le | An Nhu Nguyen | Duc L.N. Hoang | Vu Huu Nguyen | Binh Thien Nguyen
Volume: 3
Issue: 1
Year: 2012
Metaphorical Interpretation of eLearning in Higher Education Institutions

Author(s): Allah Nawaz
Volume: 3
Issue: 1
Year: 2012
Guest Editorial

Author(s): Sabu M. Thampi
Volume: 2
Issue: 1
Year: 2011
Automatic Segmentation of Liver and Tumor for CAD of Liver

Author(s): S S Kumar | R. S. Moni | J. Rajeesh
Volume: 2
Issue: 1
Year: 2011
Prediction of Number of Zombies in a DDoS Attack using Polynomial Regression Model

Author(s): B. B. Gupta | R. C. Joshi | Manoj Misra
Volume: 2
Issue: 1
Year: 2011
An ACO Algorithm for Effective Cluster Head Selection

Author(s): Amritha Sampath | Tripti C | Sabu M. Thampi
Volume: 2
Issue: 1
Year: 2011
Load Balancing in P2P Networks: Using Statistics to Fight Data and Execution Skew

Author(s): Daniel Warneke | Christian Dannewitz
Volume: 2
Issue: 1
Year: 2011
Using Materialized Views to Enhance a Traceable P2P Record Exchange Framework

Author(s): Fengrong Li | Yoshiharu Ishikawa
Volume: 2
Issue: 1
Year: 2011
PM4SWS: A P2P Model for Semantic Web Services Discovery and Composition

Author(s): Mohamed Gharzouli | Mahmoud Boufaida
Volume: 2
Issue: 1
Year: 2011
Complex Queries in P2P Networks with Resource-Constrained Devices

Author(s): Christian Dannewitz | Thorsten Biermann | Martin Dräxler | Holger Karl
Volume: 2
Issue: 1
Year: 2011
Introduction to the Inaugural Issue

Author(s): A.C.M. Fong
Volume: 1
Issue: 1
Year: 2010
Welcome Message from the Editor-in-Chief

Author(s): A.C.M. Fong
Volume: 1
Issue: 1
Year: 2010
Dynamic Differential Evolution for Constrained Real-Parameter Optimization

Author(s): Youyun Ao | Hongqin Chi
Volume: 1
Issue: 1
Year: 2010
Integrated Performance and Visualization Enhancement of OLAP Using Growing Self Organizing Neural Networks

Author(s): Muhammad Usman | Sohail Asghar | Simon Fong
Volume: 1
Issue: 1
Year: 2010
Fuzzy Logic Based Position-Sensorless Speed Control of Multi Level Inverter Fed PMBLDC Drive

Author(s): T.V. Narmadha | T. Thyagarajan
Volume: 1
Issue: 1
Year: 2010
Multilingual Context Ontology Rule Enhanced Focused Web Crawler

Author(s): Mukesh Kumar | Renu Vig
Volume: 1
Issue: 1
Year: 2010
A Review of Machine Learning Algorithms for Text-Documents Classification

Author(s): Baharum Baharudin | Lam Hong Lee | Khairullah Khan
Volume: 1
Issue: 1
Year: 2010
Introducing the Associate Editor-in-Chiefs

Author(s): A.C.M. Fong
Volume: 1
Issue: 1
Year: 2010
Design and Implementation of an Online Social Network with Face Recognition

Author(s): Ray K. C. Lai | Jack C. K. Tang | Angus K. Y. Wong | Philip I. S. Lei
Volume: 1
Issue: 1
Year: 2010
Affiliate Program      Why do you need a reservation system?