Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Modern Education and Computer Science

ISSN: 2075--0161
Publisher: MECS Publisher


ADD TO MY LIST
 
Mathematical Framework for A Novel Database Replication Algorithm

Author(s): Sanjay Kumar Yadav | Gurmit Singh | Divakar Singh Yadav
Volume: 5
Issue: 9
Year: 2013
Edge-balanced Index Sets of the Nested Graph with Power-cycle C5m×Pm5 (I)

Author(s): Jinmeng Liu | Yuge Zheng
Volume: 5
Issue: 9
Year: 2013
Age Dependent Face Recognition using Eigenface

Author(s): Hlaing Htake Khaung Tin
Volume: 5
Issue: 9
Year: 2013
A Cost Efficient Solution for Surface Technology with Mobile Connect

Author(s): Nitin Sharma | Manshul V Belani | Ms. Indu Chawla
Volume: 5
Issue: 9
Year: 2013
On the Edge-balanced Index Set of a class of Power-cycle Nested Network Graph

Author(s): Qingwen Zhang | Yuge Zheng
Volume: 5
Issue: 9
Year: 2013
A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA

Author(s): Reenu Shukla | Rajat Bhandari
Volume: 5
Issue: 9
Year: 2013
Collaborative Anti-jamming in Cognitive Radio Networks Using Minimax-Q Learning

Author(s): Sangeeta Singh | Aditya Trivedi | Navneet Garg
Volume: 5
Issue: 9
Year: 2013
Study of Blended Learning Process in Education Context

Author(s): Asif Irshad Khan | Noor-ul-Qayyum | Mahaboob Sharief Shaik | Abdullah Maresh Ali | Ch.Vijaya Bebi
Volume: 4
Issue: 9
Year: 2012
The Relationship Between Emotional Intelligence and Students' Attitude Towards Computers: A Study on Polytechnic Engineering Students

Author(s): Jeya Amantha Kumar | Balakrishnan Muniandy | Wan Ahmad Jaafar Wan Yahaya
Volume: 4
Issue: 9
Year: 2012
Implementing WAI Authoring Tool Accessibility Guidelines in Developing Adaptive Elearning

Author(s): Said Talhi | Fairouz Khadraoui | Mahieddine Djoudi
Volume: 4
Issue: 9
Year: 2012
A Naïve Based approach of Model Pruned trees on Learner’s Response

Author(s): S.Anupama Kumar | Vijayalakshmi M.N.
Volume: 4
Issue: 9
Year: 2012
The Effect of Using Instructional Conversation Method on Reading Comprehension of Iranian EFL Learners

Author(s): Nader Assadi Aidinlou | Shafagh Tabeei
Volume: 4
Issue: 9
Year: 2012
An Approach Towards Customized Multi-Tenancy

Author(s): Muhammad Fahad Khan | Mirza Ahsan Ullah | Aziz-ur-Rehman
Volume: 4
Issue: 9
Year: 2012
Classification of ECG Using Chaotic Models

Author(s): Khandakar Mohammad Ishtiak | A. H. M. Zadidul Karim
Volume: 4
Issue: 9
Year: 2012
Mobile Robot Motion Using Cellular Automaton Model to Avoid Transient Obstacles

Author(s): Kohei Arai | Steven Ray Sentinuwo
Volume: 5
Issue: 8
Year: 2013
Design Modified Fuzzy Hybrid Technique: Tuning By GDO

Author(s): Mohammad Shamsodini | Farzin Piltan | Mahdi Jafari | Omid reza Sadrnia | Omid Mahmoudi
Volume: 5
Issue: 8
Year: 2013
Artificial Neural Network in Prognosticating Human Personality from Social Networks

Author(s): Harish Kumar V | Arti Arya | Divyalakshmi V | Nishanth H S
Volume: 5
Issue: 8
Year: 2013
Contours Matching with A Text-based Method

Author(s): Saliha Aouat | Slimane Larabi
Volume: 5
Issue: 8
Year: 2013
A Proposal for Improving Behavioral Adaptation of Web Services Integration

Author(s): M. Rizwan Jameel Qureshi | Alaa Ahmed Almarzuki
Volume: 5
Issue: 8
Year: 2013
Utilization of Data Mining Techniques for Prediction and Diagnosis of Tuberculosis Disease Survivability

Author(s): K.R.Lakshmi | M.Veera Krishna | S.Prem Kumar
Volume: 5
Issue: 8
Year: 2013
Evaluation of the Cost Estimation Models: Case Study of Task Manager Application

Author(s): Mohammed Mugahed Al Qmase | M. Rizwan Jameel Qureshi
Volume: 5
Issue: 8
Year: 2013
Context-Aware Web Service Discovery Based on A Quantitative Similarity Measure

Author(s): Bouyakoub Fayçal M'hamed | Belkhir Abdelkader
Volume: 5
Issue: 8
Year: 2013
An Interactive Teaching – Learning Tool for Underprivileged Children in Rural Schools

Author(s): H.Vignesh Ramamoorthy | P.J.Balakumaran | H.Karthikeyani
Volume: 5
Issue: 7
Year: 2013
Towards Qualitative Computer Science Education: Engendering Effective Teaching Methods

Author(s): Basirat A. Adenowo | Stephen O. Adenle | Adetokunbo A.A. Adenowo
Volume: 5
Issue: 7
Year: 2013
Students' Understanding of Selected Aspects of Interface Class in Java

Author(s): Ilana Lavy | Rami Rashkovits
Volume: 5
Issue: 7
Year: 2013
Economic Designing of PV/FC/Wind Hybrid System Considering Components Availability

Author(s): Saber Arabi Nowdeh | Mahdi Hajibeigy
Volume: 5
Issue: 7
Year: 2013
Improving Teaching Methodology in System Analysis and Design using Problem Based Learning for ABET

Author(s): Sara Fatima | Salha Abdullah
Volume: 5
Issue: 7
Year: 2013
An Ingenious Wireless Home Security System and Protocol based upon Multi-hop 802.15.4 standard, Magnetic contact and PIR sensor

Author(s): Ulya Sabeel | Nidhi Chandra | Shivraj Dagadi
Volume: 5
Issue: 7
Year: 2013
Spatial and Transform Domain Filtering Method for Image De-noising: A Review

Author(s): Vandana Roy | ShailjaShukla
Volume: 5
Issue: 7
Year: 2013
Evaluation: The New Philosophical Roles & Psychological Means

Author(s): Prashant M. Dolia
Volume: 5
Issue: 7
Year: 2013
FPGA Based Pipelined Parallel Architecture for Fuzzy Logic Controller

Author(s): Vinod Kapse | Bhavana Jharia | S. S. Thakur
Volume: 4
Issue: 7
Year: 2012
Machine Learning Elman Technique for Predicting Shelf Life of Burfi

Author(s): Sumit Goyal | Gyanendra Kumar Goyal
Volume: 4
Issue: 7
Year: 2012
A Study on the Role of Motivation in Foreign Language Learning and Teaching

Author(s): Abbas Pourhosein Gilakjani | Lai-Mei Leong | Narjes Banou Sabouri
Volume: 4
Issue: 7
Year: 2012
Factors That Impact on Rural and Remote Students’ Participation in Higher Education

Author(s): Delwar Hossain | Don Gorman | Jill Lawrence | Lorelle Burton
Volume: 4
Issue: 7
Year: 2012
Performance Evaluation of MANET in Realistic Environment

Author(s): Shailender Gupta | Chirag Kumar | C. K. Nagpal | Bharat Bhushan
Volume: 4
Issue: 7
Year: 2012
Ultra Encryption Standard (UES) Version-III: Advanced Symmetric Key Cryptosystem With Bit-level Encryption Algorithm

Author(s): Satyaki Roy | Navajit Maitra | Shalabh Agarwal | Joyshree Nath | Asoke Nath
Volume: 4
Issue: 7
Year: 2012
Students Classification With Adaptive Neuro Fuzzy

Author(s): Mohammad Saber Iraji | Majid Aboutalebi | Naghi. R. Seyedaghaee | Azam Tosinia
Volume: 4
Issue: 7
Year: 2012
Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm

Author(s): Somdip Dey | Kalyan Mondal | Joyshree Nath | Asoke Nath
Volume: 4
Issue: 6
Year: 2012
Using Extra Credit to Facilitate Extra Learning in Students

Author(s): Mohammad Muztaba Fuad | Elva J. Jones
Volume: 4
Issue: 6
Year: 2012
Information Hiding Using Least Significant Bit Steganography and Cryptography

Author(s): Shailender Gupta | Ankur Goyal | Bharat Bhushan
Volume: 4
Issue: 6
Year: 2012
Mathematics Is Science: A Topic Revisited in Context of FCS of India

Author(s): Vinay Kumar
Volume: 4
Issue: 6
Year: 2012
Educational Suport for Hypermedia Design

Author(s): Cristina Portugal | Rita Maria de Souza Couto
Volume: 4
Issue: 6
Year: 2012
Blended Learning for Lifelong Learning: An Innovation for College Education Students

Author(s): Ava Clare Marie O. Robles
Volume: 4
Issue: 6
Year: 2012
An Analysis on Performance of Decision Tree Algorithms using Student’s Qualitative Data

Author(s): T.Miranda Lakshmi | A.Martin | R.Mumtaj Begum | V.Prasanna Venkatesan
Volume: 5
Issue: 5
Year: 2013
Question Answering for Collaborative Learning with Answer Quality Predictor

Author(s): Kohei Arai | Anik Nur Handayani
Volume: 5
Issue: 5
Year: 2013
Student Learning Ability Assessment using Rough Set and Data Mining Approaches

Author(s): A. Kangaiammal | R. Silambannan | C. Senthamarai | M.V. Srinath
Volume: 5
Issue: 5
Year: 2013
All-Optical Parity Circuits Using Nonlinear Directional Coupler

Author(s): L. A.Bakhtiar | E. Yaghoubi | A. Adami | S. M. Hamidi | M. Hosseinzadeh
Volume: 5
Issue: 5
Year: 2013
Activity Recognition with Multi-tapeFuzzy Finite Automata

Author(s): H. Karamath Ali | D. I. George Amalarethinam
Volume: 5
Issue: 5
Year: 2013
Evaluating the Project based Organizational Teaching-Learning Process

Author(s): S. Justus | Mohammed Sirajudin
Volume: 5
Issue: 5
Year: 2013
Analysis of PV-FC Hybrid System Operation Considering Sale Electricity

Author(s): Amirali Shahkoomahalli
Volume: 5
Issue: 5
Year: 2013
Different Platforms for Remote Laboratories in Mobile Devices

Author(s): Ananda Maiti | Balakrushna Tripathy
Volume: 4
Issue: 5
Year: 2012
Dynamics of Love and Happiness: A Mathematical Analysis

Author(s): Dharna Satsangi | Arun K. Sinha
Volume: 4
Issue: 5
Year: 2012
Direction to Prepare Item Bank for the Purpose of On-Line Evaluation

Author(s): Prashant M. Dolia
Volume: 4
Issue: 5
Year: 2012
A Novel Technique for Copyright Protection of Images Using Hybrid Encryption Model

Author(s): Swarnendu Mukherjee | Debashis Gangulyb | Partha Mukherjee | Prasenjit Mitra
Volume: 4
Issue: 5
Year: 2012
E-Learning and Its Impact on Rural Areas

Author(s): Rimmi Anand | Sharad Saxena | Shilpi Saxena
Volume: 4
Issue: 5
Year: 2012
The Effect of Different Types of Repeated Performance (Private Vs Public) as Post-Task Activities on The English Students’ Accuracy and Fluency in L2 Oral Production

Author(s): Hossein Khodabakhshzadeh | Bi Bi Simin Mousavi ( Statistic counselor)
Volume: 4
Issue: 5
Year: 2012
Fuzzy SLIQ Decision Tree Based on Classification Sensitivity

Author(s): Hongze Qiu | Haitang Zhang
Volume: 3
Issue: 5
Year: 2011
Adaptive Compensation of Unknown Actuator Failures for Strict-feedback Systems

Author(s): Jianping. Cai | Lujuan. Shen
Volume: 3
Issue: 5
Year: 2011
Study on Overburden’s Destructive Rules Based on Similar Material Simulation

Author(s): Ruyu Zheng | Kan Wu | Ru Li
Volume: 3
Issue: 5
Year: 2011
H-RBAC: A Hierarchical Access Control Model for SaaS Systems

Author(s): Dancheng Li | Cheng Liu | Binsheng Liu
Volume: 3
Issue: 5
Year: 2011
A New Method of Equivalent Material Model Deformation Observation

Author(s): Lailiang CAI | Kan WU | Qisheng YU | Jinpeng FENG
Volume: 3
Issue: 5
Year: 2011
A New Diagnosis Loseless Compression Method for Digital Mammography Based on Multiple Arbitrary Shape ROIs Coding Framework

Author(s): Ping Xu | Yan Zuo | Wei-Dong Xu | Hua-Jie Chen
Volume: 3
Issue: 5
Year: 2011
Stabilitty of Anti-periodic Solutions for Certain Shunting Inhibitory Cellular Neural Networks

Author(s): Huiyan Kang | Ligeng Si
Volume: 3
Issue: 5
Year: 2011
A Two Layers Novel Low-Cost and Optimized Embedded Board Based on TMS320C6713 DSP and Spartan-3 FPGA

Author(s): Bahram Rashidi | Ghader Karimian
Volume: 5
Issue: 4
Year: 2013
Teachers’ Use of Technology and Constructivism

Author(s): Abbas Pourhosein Gilakjani | Lai-Mei Leong | Hairul Nizam Ismail
Volume: 5
Issue: 4
Year: 2013
Understandings of Graduate Students on Nature of Science

Author(s): Mustafa Serdar Koksal | Canan Tunc Sahin
Volume: 5
Issue: 4
Year: 2013
An Efficient and Effective New Generation Objective Quality Model for Mobile Applications

Author(s): Sobia Zahra | Asra Khalid | Ali Javed
Volume: 5
Issue: 4
Year: 2013
Bio-inspired Ant Algorithms: A review

Author(s): Sangita Roy | heli Sinha Chaudhuri
Volume: 5
Issue: 4
Year: 2013
Bitwise Operations Related to a Combinatorial Problem on Binary Matrices

Author(s): Krasimir Yankov Yordzhev
Volume: 5
Issue: 4
Year: 2013
Steganography on RGB Images Based on a “Matrix Pattern” using Random Blocks

Author(s): Amir Farhad Nilizadeh | Ahmad Reza Naghsh Nilchi
Volume: 5
Issue: 4
Year: 2013
Discovery of Association Rules from University Admission System Data

Author(s): Abdul Fattah Mashat | Mohammed M.Fouad | Philip S. Yu | Tarek F. Gharib
Volume: 5
Issue: 4
Year: 2013
The Significant Role of Multimedia in Motivating EFL Learners’ Interest in English Language Learning

Author(s): Abbas Pourhosein Gilakjani
Volume: 4
Issue: 4
Year: 2012
Evolution and Future Generation of TV

Author(s): Sandeep Joshi | S.L. Maskara
Volume: 4
Issue: 4
Year: 2012
Radial Basis Function and K-Nearest Neighbor Classifiers for Studying Heart Rate Signals during Meditation

Author(s): Ateke Goshvarpour | Atefeh Goshvarpour
Volume: 4
Issue: 4
Year: 2012
Comparison and Evaluation of Intelligence Methods for Distance Education Platform

Author(s): Maysam Hedayati | Seyed Hossein Kamali | Reza Shakerian
Volume: 4
Issue: 4
Year: 2012
Matrix Based Energy Efficient Scheduling With S-MAC Protocol in Wireless Sensor Network

Author(s): Ram Kumar Singh | Akanksha Balyan
Volume: 4
Issue: 4
Year: 2012
Provisioning Remote Lab Support for IT Programs in Distance Education

Author(s): Lakshmanan Senthilkumar
Volume: 4
Issue: 4
Year: 2012
Design and Implementation of GPU-Based Prim's Algorithm

Author(s): Wei Wang | Yongzhong Huang | Shaozhong Guo
Volume: 3
Issue: 4
Year: 2011
A framework for ensuring consistency of Web Services Transactions based on WS-BPEL

Author(s): Pan Shan-liang | Li Ya-Li | Li Wen-juan
Volume: 3
Issue: 4
Year: 2011
Research on Spacecraft Illumination

Author(s): Bo Cai | Ling Li | Jing Hu | Biao He | Yuan Long | Dengyi Zhang
Volume: 3
Issue: 4
Year: 2011
A New Classification Algorithm for Data Stream

Author(s): Li Su | Hong-yan Liu | Zhen-Hui Song
Volume: 3
Issue: 4
Year: 2011
Effective Training Data Improved Ensemble Approaches for Urinalysis Model

Author(s): Ping Wu | Min Zhu | Peng Pu | Tang Jiang
Volume: 3
Issue: 4
Year: 2011
Stereo rectification of calibrated image pairs based on geometric transformation

Author(s): Huihuang Su | Bingwei He
Volume: 3
Issue: 4
Year: 2011
The Application of Bayesian Classification Theories in Distance Education System

Author(s): Ma Da | Wei Wei | Hu Hai-guang | Guan Jian-he
Volume: 3
Issue: 4
Year: 2011
The Platform Built Based on the Mode operations of AES and the Image Applications

Author(s): Chi-Wu Huang | Ying-Hao TU | Shih-Hao Liu | Hsing-Chang Yeh
Volume: 3
Issue: 4
Year: 2011
Detection of Tumours in Digital Mammograms Using Wavelet Based Adaptive Windowing Method

Author(s): G.Bharatha Sreeja | P. Rathika | D. Devaraj
Volume: 4
Issue: 3
Year: 2012
Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT)

Author(s): Nikita Kashyap | G. R. SINHA
Volume: 4
Issue: 3
Year: 2012
Analysis on Energy Optimized Data Collection in Tree Based Ad-Hoc Sensor Network

Author(s): Sharad | Shailendra Mishra | Ashok Kumar Sharma | Durg Singh Chauhan
Volume: 4
Issue: 3
Year: 2012
Growing Importance of Distance Education

Author(s): Milena Bogdanović
Volume: 4
Issue: 3
Year: 2012
AISQA - An Artificial Immune Question Answering System

Author(s): Mohsen Shakiba Fakhr | Mohammad Saniee Abadeh
Volume: 4
Issue: 3
Year: 2012
On Correlation of Р And NP Classes

Author(s): Listrovoy Sergey Vladimirovich
Volume: 4
Issue: 3
Year: 2012
Contemporary Trends in Defect Prevention: A Survey Report

Author(s): Muhammad Faizan | Muhammad Naeem Ahmed Khan | Sami Ulhaq
Volume: 4
Issue: 3
Year: 2012
Contemporary Developments in Wireless Sensor Networks

Author(s): Sangeeta Mittal | Alok Aggarwal | S.L. Maskara
Volume: 4
Issue: 3
Year: 2012
CHex: An Efficient RDF Storage and Indexing Scheme for Column-Oriented Databases

Author(s): Xin Wang | Shuyi Wang | Pufeng Du | Zhiyong Feng
Volume: 3
Issue: 3
Year: 2011
An Experimental Study on College Teacher's Adoption of Instructional Technology

Author(s): Du Chuntao
Volume: 3
Issue: 3
Year: 2011
Application of QFD on Planning courses of Industrial Engineering

Author(s): He-ping Zhang | Yang Zhan | Jing-chao Bian
Volume: 3
Issue: 3
Year: 2011
An Investigation and Structure Model Study on College Students'Studying-interest

Author(s): Chuanmei Wang
Volume: 3
Issue: 3
Year: 2011
The Research of Comprehensive Quality Evaluation for Distant Education

Author(s): Mu Dan | Liu Ming-Li
Volume: 3
Issue: 3
Year: 2011
Dangerous Degree Evaluation System of Mine Debris Flow Based on IGA-BP

Author(s): Xicheng Xue | Jisong Bi | Lingling Chen | Yan Chen
Volume: 3
Issue: 3
Year: 2011
Design and Implementation of a Low Power RSA Processor for Smartcard

Author(s): Zhen Huang | Shuguo Li
Volume: 3
Issue: 3
Year: 2011
An Improved Method of Geometric Hashing Pattern Recognition

Author(s): Ling Ma | Yumin Liu | Huiqin Jiang | Zhongyong Wang | Haofei Zhou
Volume: 3
Issue: 3
Year: 2011
A Review of Fully Automated Techniques for Brain Tumor Detection From MR Images

Author(s): Anjum Hayat Gondal | Muhammad Naeem Ahmed Khan
Volume: 5
Issue: 2
Year: 2013
An Improved, Efficient and Cost Effective Software Inspection Meeting Process

Author(s): Dilawar Ali | Ali Javed | Awais Tanveer | Shahroon Saleem
Volume: 5
Issue: 2
Year: 2013
An Assessment of Extreme Programming Based Requirement Engineering Process

Author(s): Muhammad Khalid | Sami ul Haq | Muhammad Naeem Ahmed Khan
Volume: 5
Issue: 2
Year: 2013
The Use of Educational Web Tools: An Innovative Technique in Teacher Education Courses

Author(s): Ava Clare Marie O. Robles
Volume: 5
Issue: 2
Year: 2013
An Evaluation of the Critical Factors Affecting the Efficiency of Some Sorting Techniques

Author(s): Olabiyisi S.O. | Adetunji A.B. | Oyeyinka F.I.
Volume: 5
Issue: 2
Year: 2013
Designing a Universal Data-Oriented Random Number Generator

Author(s): Rasoul Farjami Nezhad | Mehdi Effatparvar | Mohammad Rahimzadeh
Volume: 5
Issue: 2
Year: 2013
Enhancing Leakage Power in CPU Cache Using Inverted Architecture

Author(s): Bilal A. Shehada | Ahmed M. Serdah | Aiman Abu Samra
Volume: 5
Issue: 2
Year: 2013
Using Computer Aided Assessment System to Assess College Students Writing Skill

Author(s): Huihua He | Jin Liu | Hongmin Ren
Volume: 3
Issue: 2
Year: 2011
The Estimation and Experiment of Axial Force in Deep Well Pump Basing on Numerical Simulation

Author(s): SHI Wei-dong | WANG Hong-liang | ZHOU Ling | ZOU Ping-ping | WANG Chuan
Volume: 2
Issue: 2
Year: 2010
Semantic Management Information Modeling based on Theory of Concept Lattices

Author(s): Hui Xu | Chunzhi Wang | Hongwei Chen | Zhiwei Ye
Volume: 2
Issue: 2
Year: 2010
The Route Research of LED Road Illumination Based On Wireless Sensor Network

Author(s): Jian Liu | Xinjiang Shao | Deng Pan | Zhisen Wang
Volume: 2
Issue: 2
Year: 2010
Optimization of SVM Multiclass by Particle Swarm (PSO-SVM)

Author(s): Fatima Ardjani | Kaddour Sadouni
Volume: 2
Issue: 2
Year: 2010
Data Mining based Software Development Communication Pattern Discovery

Author(s): Gang Zhang | Caixian Ye | Chunru Wang | Xiaomin He
Volume: 2
Issue: 2
Year: 2010
Research of Heated Oil Pipeline Shutdown and Restart Process Based on VB and MATLAB

Author(s): Changjun Li | Xia Wu | Wenlong Jia
Volume: 2
Issue: 2
Year: 2010
P300 Detection Algorithm Based on Fisher Distance

Author(s): Pan WANG | Ji-zhong SHEN | Jin-he SHI
Volume: 2
Issue: 2
Year: 2010
Easy and Deep Media

Author(s): Chun-Ko Hsieh | Quo-ping Lin | Yen-ju Lin | Chiung-yi Huang | Chung-yi Chang | Yi-ping Hung
Volume: 2
Issue: 2
Year: 2010
A Scheme for Evaluating XML Engine on RDBMS

Author(s): Guannan Si | Zhengji Zhou | Nan Li | Jing Xu | Jufeng Yang
Volume: 3
Issue: 2
Year: 2011
A Driving Behavior Retrieval Application for Vehicle Surveillance System

Author(s): Fu Xianping | Men Yugang | Yuan Guoliang
Volume: 3
Issue: 2
Year: 2011
A Routing Priority Scheduling Algorithm for MAC Layer in Wireless Sensor Networks

Author(s): Liyong Bao | Dongfeng Zhao | Yifan Zhao
Volume: 3
Issue: 2
Year: 2011
Study on Extenics Information Fusion Method and It's Application

Author(s): Li Zhong | Wang Ailing | Qi Furong
Volume: 3
Issue: 2
Year: 2011
Undergraduate Program in Network Engineering and Security – A Feasibility Study

Author(s): Fahed Awad | Omar Banimelhem | Eyad Taqieddin | Raed Bani-Hani
Volume: 4
Issue: 2
Year: 2012
Issues of Technical Support for e-Learning Systems in Higher Education Institutions

Author(s): Allah Nawaz | Muhammad Zubair Khan
Volume: 4
Issue: 2
Year: 2012
Robust Algorithm for Face Detection in Color Images

Author(s): Hlaing Htake Khaung Tin
Volume: 4
Issue: 2
Year: 2012
Gender Differences on Information Literacy of Science and Engineering Undergraduates

Author(s): Ting-ting LIU | Hai-bin SUN
Volume: 4
Issue: 2
Year: 2012
Improve Teaching Method of Data Mining Course

Author(s): Sakha'a Al Manaseer | Areej Malibari
Volume: 4
Issue: 2
Year: 2012
Learning the Related Mathematics to Cryptography by Interactive Way

Author(s): Mohamed Salim Trigui | Daniyal M. Alghazzawi
Volume: 4
Issue: 2
Year: 2012
Developing E-Business Strategies Curriculum Case Study in the Information Systems Department

Author(s): Thoria Alghamdi | Arwa Jamjoom
Volume: 4
Issue: 2
Year: 2012
The Impact of E-assessments System on the Success of the Implementation Process

Author(s): Mohammad Ali H. Eljinini | Salwa Alsamarai | Suha Hameed | Amaal Amawi
Volume: 4
Issue: 11
Year: 2012
Gender Identification in Human Gait Using Neural Network

Author(s): Richa Shukla | Reenu Shukla | Anupam Shukla | Sanjeev Sharma | Nirupama Tiwari
Volume: 4
Issue: 11
Year: 2012
Biometric Palm Prints Feature Matching for Person Identification

Author(s): Shriram D. Raut | Vikas T. Humbe
Volume: 4
Issue: 11
Year: 2012
A Match or Mismatch Between Learning Styles of the Learners and Teaching Styles of the Teachers

Author(s): Abbas Pourhosein Gilakjani
Volume: 4
Issue: 11
Year: 2012
Enhancing the Project-Based Learning Experience Through the Use of Live Web Data

Author(s): Nader Mohamed | Jameela Al-Jaroodi | Imad Jawhar
Volume: 4
Issue: 11
Year: 2012
Performance Evaluation on the Effect of Combining DCT and LBP on Face Recognition System

Author(s): Dasari Haritha | Kraleti Srinivasa Rao | Chittipotula Satyanarayana
Volume: 4
Issue: 11
Year: 2012
The System of Free Access Galactica to Compute Interactions of N-Bodies

Author(s): Joseph J. Smulsky
Volume: 4
Issue: 11
Year: 2012
PSICO-A: A Computational System for Learning Psychology

Author(s): Javier González Marqués | Carlos Pelta
Volume: 5
Issue: 10
Year: 2013
Empirical Analysis of Bagged SVM Classifier for Data Mining Applications

Author(s): M.Govindarajan
Volume: 5
Issue: 10
Year: 2013
Design Sliding Mode Modified Fuzzy Linear Controller with Application to Flexible Robot Manipulator

Author(s): Mahdi Mirshekaran | Farzin Piltan | Zahra Esmaeili | Tannaz Khajeaian | Meysam Kazeminasab
Volume: 5
Issue: 10
Year: 2013
Performance Analysis and Enhancement of UTM Device in Local Area Network

Author(s): Ashvin Alagiya | Hiren Joshi | Ashish Jani
Volume: 5
Issue: 10
Year: 2013
A New Method for Content based Image Retrieval using Primitive Features

Author(s): S.Maruthuperumal | G. Rosline Nesa Kumari
Volume: 5
Issue: 10
Year: 2013
Development of A New Efficient Routing Scheme for WiMAX Mesh Networks

Author(s): Sk. Md. Abdullah Al Subail | Sk. Md. Masudul Ahsan | Mostafa Enayetullah
Volume: 5
Issue: 10
Year: 2013
Simulation and Analysis of AODV and DSR Routing Protocol under Black Hole Attack

Author(s): Amin Mohebi | Ehsan Kamal | Simon.Scott
Volume: 5
Issue: 10
Year: 2013
An Efficient Machine Learning Based Classification Scheme for Detecting Distributed Command & Control Traffic of P2P Botnets

Author(s): Pijush Barthakur | Manoj Dahal | Mrinal Kanti Ghose
Volume: 5
Issue: 10
Year: 2013
Identifying Key Challenges in Performance Issues in Cloud Computing

Author(s): Ashraf Zia | Muhammad Naeem Ahmad Khan
Volume: 4
Issue: 10
Year: 2012
Impact of Cognitive and Emotional Intelligence on Quality Education

Author(s): Shilpi Saxena | Sharad Saxena
Volume: 4
Issue: 10
Year: 2012
Effects of Natural Dust on the Performance of PV Panels in Bangladesh

Author(s): Md.Mizanur Rahman | Md. Aminul Islam | A.H.M. Zadidul Karim | Asraful Haque Ronee
Volume: 4
Issue: 10
Year: 2012
Enhancing Information Systems Students' Soft Skill – a Case Study

Author(s): Aharon Yadin
Volume: 4
Issue: 10
Year: 2012
Comparing the Acceptance of Key Performance Indicators Management Systems on Perceived Usefulness and Perceived Ease of Use in a Higher Education Institution in Malaysia

Author(s): Mei Yean ONG | Balakrishnan Muniandy | Saw Lan ONG | Keow Ngang TANG | Kia Kien PHUA
Volume: 4
Issue: 10
Year: 2012
Information Literacy and its Application in Nursing Education

Author(s): Delwar Hossain | Cheryl Perrin | Kaye Cumming
Volume: 4
Issue: 10
Year: 2012
Improve Abstract Reasoning in Computer Introductory Courses

Author(s): Aharon Yadin
Volume: 5
Issue: 1
Year: 2013
High Performance FPGA Based Digital Space Vector PWM Three Phase Voltage Source Inverter

Author(s): Bahram Rashidi | Mehran Sabahi
Volume: 5
Issue: 1
Year: 2013
Fixed Point Theorems for Occasionally Weakly Compatible Maps in G-Metric Space

Author(s): Saurabh Manro
Volume: 5
Issue: 1
Year: 2013
An Ontology-Based Approach for Multi-Agent Systems Engineering

Author(s): Souleymane Koussoube | Armel Ayimdji | Laure Pauline Fotso
Volume: 5
Issue: 1
Year: 2013
The Effect of Weekly Quizzes on Students’ Final Achievement Score

Author(s): Valeh Gholami | Mostafa Morady Moghaddam
Volume: 5
Issue: 1
Year: 2013
A Wavelet Based Approach for Compression of Color Images

Author(s): Sarita Kumari
Volume: 5
Issue: 1
Year: 2013
Review of Requirements Management Issues in Software Development

Author(s): Muhammad Naeem Ahmed Khan | Muhammad Khalid | Sami ul Haq
Volume: 5
Issue: 1
Year: 2013
E-learning Tools to Improve Students’ Learning Experience: a case study

Author(s): Baomin Qi | Lu Liu | Chengbo Wang
Volume: 1
Issue: 1
Year: 2009
Educational Background and High School Maths Teachers ‘Specialism

Author(s): Lin. Wang | Chang-huan. Feng
Volume: 1
Issue: 1
Year: 2009
Analyzing the Influencing Factors of Group Learning: A Mixed Approach

Author(s): Jianhua Zhao | Yinjian Jiang
Volume: 1
Issue: 1
Year: 2009
Development of Networked Virtual Experiment System Based on Virtual Campus

Author(s): Tian-tai Guo | Lin GUO | Dong-sheng LI
Volume: 1
Issue: 1
Year: 2009
Density-Based LLE Algorithm for Network Forensics Data

Author(s): Peng Tao | Chen Xiaosu | Liu Huiyu | Chen Kai
Volume: 3
Issue: 1
Year: 2011
No-Reference JPEG image quality assessment based on Visual sensitivity

Author(s): Zhang You-Sai | Chen Zhong-Jun
Volume: 3
Issue: 1
Year: 2011
A Criterion for Hurwitz Polynomials and its Applications

Author(s): Liejun Xie
Volume: 3
Issue: 1
Year: 2011
Development and Application of an Autonomous Learning System for Engineering Graphics Education

Author(s): Weiwei Song | Shukun Cao | Bo Yang | Kaifeng Song | Changzhong Wu
Volume: 3
Issue: 1
Year: 2011
The Stability of Memory Rules Associative with the Mathematical Thinking Core

Author(s): Xiuzhen Wang | Weiquan Gu
Volume: 3
Issue: 1
Year: 2011
A Chinese Character Text Editor for Embedded System Education

Author(s): Ye Junjie | Yu Jianxin
Volume: 3
Issue: 1
Year: 2011
A Design of Learning Management System for Electronic Secretary Based on Ubiquitous Learning

Author(s): Guangran Liu | Bencai Gao | Jun Lou
Volume: 3
Issue: 1
Year: 2011
Research on Marketing Cooperation System Based on Multi-Agent Services Aggregation Driven by Requirement

Author(s): Hong ZHOU | Yanran XIE | Chengtong YANG
Volume: 2
Issue: 1
Year: 2010
Tuning Schema Matching Systems using Parallel Genetic Algorithms on GPU

Author(s): Yuting Feng | Lei Zhao | Jiwen Yang
Volume: 2
Issue: 1
Year: 2010
A Dynamic Probabilistic Broadcasting Scheme based on Cross-Layer design for MANETs

Author(s): Qing-wen WANG | Hao-shan Shi | Qian Qi
Volume: 2
Issue: 1
Year: 2010
Task-based Approach in College English Teaching of Digital-based Context

Author(s): Ling Jiang | Kai Sun
Volume: 2
Issue: 1
Year: 2010
Cloud Policy Model in the Desktop Management System

Author(s): Fang Zhao | Yin Liu
Volume: 2
Issue: 1
Year: 2010
Detecting and Removing the Motion Blurring from Video Clips

Author(s): Yang shen | Lizhuang ma
Volume: 2
Issue: 1
Year: 2010
A High-Performance Communication Service for Parallel Servo Computing

Author(s): Cheng Xin | Zhou Yunfei | Hu Yongbin | Kong Xiangbin
Volume: 2
Issue: 1
Year: 2010
Professional Courses for Computer Engineering Education

Author(s): Yinan Kong | Yimin Xie
Volume: 2
Issue: 1
Year: 2010
Research on Five Stakeholders & Five Relationships of Higher Engineering Education in China

Author(s): Guangshe Jia | Chengbin Xiao
Volume: 1
Issue: 1
Year: 2009
Research on Bilingual Teaching of Graduates for Computer Specialty in Financial and Economical Colleges

Author(s): Limin Wang | Xuming Han | Ming Li
Volume: 1
Issue: 1
Year: 2009
An Improved Text Clustering Method based on Hybrid Model

Author(s): Jinzhu Hu | Chunxiu Xiong | Jiangbo Shu | Xing Zhou | Jun Zhu
Volume: 1
Issue: 1
Year: 2009
The Model of the Evolution of the Knowledge Content and Contemporary Science Education

Author(s): Tadeusz Wibig | Punsiri Dam-o
Volume: 4
Issue: 1
Year: 2012
Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net

Author(s): V.K. NARENDIRA KUMAR | B. SRINIVASAN
Volume: 4
Issue: 1
Year: 2012
Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

Author(s): Sreenivasa Rao Basavala | Narendra Kumar | Alok Agarrwal
Volume: 4
Issue: 1
Year: 2012
Using Virtual Security Lab in Teaching Cryptography

Author(s): Salma M. Gaffer | Daniyal M. Alghazzawi
Volume: 4
Issue: 1
Year: 2012
A Frame of Intrusion Detection Learning System Utilizing Radial Basis Function

Author(s): S.Selvakani Kandeeban | R.S.Rajesh
Volume: 4
Issue: 1
Year: 2012
Perceived Gender Classification from Face Images

Author(s): Hlaing Htake Khaung Tin
Volume: 4
Issue: 1
Year: 2012
Element-Based Computational Model

Author(s): Conrad Mueller
Volume: 4
Issue: 1
Year: 2012
Affiliate Program      Why do you need a reservation system?