Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Emerging Trends in Computing and Information Sciences

ISSN: 2079--8407
Publisher: ARPN Publishers


ADD TO MY LIST
 
Intelligent Widget Reconfiguration for Mobile Phones

Author(s): Peter K.K. Loh | C.T. Lau | B.H. Chan
Volume: 2
Issue: 9
Year: 2011
File Systems in Linux and FreeBSD: A Comparative Study

Author(s): Kuo-pao Yang | Katie Wallace
Volume: 2
Issue: 9
Year: 2011
A Dark Side of Computing and Information Sciences: Characteristics of Online Groomers

Author(s): Petter Gottschalk
Volume: 2
Issue: 9
Year: 2011
Rough Set adaptive in the Model Based of Cellular Automata and Multi-Agents

Author(s): Yasser F. Hassan
Volume: 2
Issue: 9
Year: 2011
Development of a new Arabic Sign Language Recognition Using K-Nearest Neighbor Algorithm PDF available

Author(s): Prof. Reyadh Naoum | Dr.Hussein H. Owaied, | Shaimaa Joudeh
Volume: 3
Issue: 8
Year: 2012
Developing Economies and Cloud Security: A Study of Africa PDF available

Author(s): Mathias Mujinga
Volume: 3
Issue: 8
Year: 2012
Broadband Internet and Czech Competitive Advantage PDF available

Author(s): Amir Manzoor
Volume: 3
Issue: 8
Year: 2012
An Audio Haptic Tool for Visually Impaired Web Users PDF available

Author(s): Catherine A. Todd | Ammara Rounaq | Umm Kulsum Nur | Fadi Boufarhat
Volume: 3
Issue: 8
Year: 2012
A Composite Scheduling Approach for Burst Loss Minimization in Optical Burst Switched Networks PDF available

Author(s): Laxman D. Netak | Girish V. Chowdhary | Jyoti G. Borade | Vinay Suryawanshi
Volume: 3
Issue: 8
Year: 2012
The Level of Usage of Computer and The Internet by Teenage Girls in Ghana PDF available

Author(s): Henry Osborn Quarshie
Volume: 3
Issue: 8
Year: 2012
Understanding the Factors that Effect Information Overload and Miscommunication within the Workplace PDF available

Author(s): Dr. Thomas W. Jackson | Dr. Bart van den Hooff
Volume: 3
Issue: 8
Year: 2012
The Economic Impact of Computer virus - A case of Ghana PDF available

Author(s): Henry Osborn Quarshie | Godfred Yaw Koi-Akrofi | Alexander Martin- Odoom
Volume: 3
Issue: 8
Year: 2012
Flight Data Analyzer using Twitter PDF available

Author(s): Brandeis Marshall | Mary Johnson | Aditi Magikar | Anuya Ghanekar | Ian Mathew | Ludovic Delaveau | Raghava Budhiraju | Ramya Chapparala
Volume: 3
Issue: 8
Year: 2012
Stabilization of Motion of the Segway PDF available

Author(s): Houtman P. Siregar | Yuri G. Martynenko
Volume: 3
Issue: 8
Year: 2012
The Topology of P2P Network PDF available

Author(s): Xu Yong | Deng Chi | Gao Min
Volume: 3
Issue: 8
Year: 2012
Software Quality Management System PDF available

Author(s): Waqar Ul-Hasnain | Shahbaz Ahmad
Volume: 3
Issue: 8
Year: 2012
Rule Based Hindi to Urdu Transliteration System PDF available

Author(s): Bushra Baig | M.Kumar | Sujoy Das
Volume: 3
Issue: 8
Year: 2012
Management Strategies for Integrating Cloud Computing into VoIP PDF available

Author(s): Floriana GEREA | Drd Adrian Ghencea
Volume: 3
Issue: 8
Year: 2012
Genetic Algorithm Rule-Based Intrusion Detection System (GAIDS) PDF available

Author(s): A.A. Ojugo | A.O. Eboka | O.E. Okonta | R.E Yoro | F.O. Aghware
Volume: 3
Issue: 8
Year: 2012
Development of a Social Networking Site with a Networked Library and Conference Chat

Author(s): Adebiyi Marion | Ogunlade Omotayo
Volume: 2
Issue: 8
Year: 2011
Authentication and Virus Detection Enhancement for Client and Server Applications

Author(s): Ghossoon. M. W. Al-Saadoon
Volume: 2
Issue: 8
Year: 2011
An RFID based E-commerce solution for the implementation of secure unattended stores

Author(s): Athul Rathore | Raul Valverde
Volume: 2
Issue: 8
Year: 2011
Accelerating Fast Fourier Transformation for Image Processing using Graphics Processing Unit

Author(s): Mohammad Nazmul Haque | Mohammad Shorif Uddin
Volume: 2
Issue: 8
Year: 2011
Algorithms in

Author(s): SAŠA PUŠICA | VELIMIR ŠCEKIC | MILUNKA PUŠICA
Volume: 2
Issue: 7
Year: 2011
Pune University Metabolic Pathway Engineering (PuMPE) Resource

Author(s): A.S.Kolaskar | Shweta Kolhi
Volume: 2
Issue: 7
Year: 2011
Accelerating Closed Frequent Itemset Mining by Elimination of Null Transactions

Author(s): Binesh Nair | Amiya Kumar Tripathy
Volume: 2
Issue: 7
Year: 2011
Software Efforts and Cost Estimation with a Systematic Approach

Author(s): Chetan Nagar | Anurag Dixit
Volume: 2
Issue: 7
Year: 2011
An Association Rules Analysis to enhance solving the Congestion Problem

Author(s): Soukaena Hassan Hasheem
Volume: 2
Issue: 7
Year: 2011
Simple, Fast and Synchronous Hybrid Scaling Scheme for the 8-bit Moduli Set PDF available

Author(s): Azadeh Safari | Yinan Kong
Volume: 3
Issue: 6
Year: 2012
New Multiband Design Using Chebhyshev Distribution For Broadband & Military Applications PDF available

Author(s): P.Poorna priya | G.Anupama | K.Pavan kumar | Habibullah khan
Volume: 3
Issue: 6
Year: 2012
An Anomaly Detector for Keystroke Dynamics Based on Medians Vector Proximity PDF available

Author(s): Mudhafar M. Al-Jarrah
Volume: 3
Issue: 6
Year: 2012
A Secured and Semantically Addressed E-Mail Service PDF available

Author(s): ETENG | Idongesit.E | OSOFISAN | Adenike O | AMADI, J.C.
Volume: 3
Issue: 6
Year: 2012
A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems PDF available

Author(s): Dr Nashaat el-Khameesy | Hossam Abdel Rahman
Volume: 3
Issue: 6
Year: 2012
Behavioral Intention to Accept and Use ICT in Public University: Integrating Quantitative and Qualitative Data PDF available

Author(s): Oye | N. D, A.Iahad | N, Ab.Rabin, N
Volume: 3
Issue: 6
Year: 2012
Online Social Networking as a Tool to Enhance Learning in the Mauritian Education System PDF available

Author(s): Kavi Kumar Khedo | Sheik Mohammad Roushdat Ally Elaheebocus | Asslinah Mocktoolah | Rajen Suntoo
Volume: 3
Issue: 6
Year: 2012
Trends in Web-Based Search Engine PDF available

Author(s): Kuyoro Shade O | Okolie Samuel O | Kanu Richmond U | Awodele Oludele
Volume: 3
Issue: 6
Year: 2012
Current Arabic (Hindi) Hand Written Numbers Segmentaion and Recognition Advance ImageProcessing and Neural Network PDF available

Author(s): Marwan A. Abu-Zanona | Bassam M. El-Zaghmouri
Volume: 3
Issue: 6
Year: 2012
Architectural Analysis of Multi-Agents Educational Model in Web-Learning Environments PDF available

Author(s): Majida Ali Abed Al_Asadi | Yousif A. Al_Asadi | H. A. Al_Asadi
Volume: 3
Issue: 6
Year: 2012
Data Mining and Wireless Sensor Network for Groundnut Pest Thrips Dynamics and Predictions PDF available

Author(s): A. K. Tripathy | J. Adinarayana | S. N. Merchant | U. B. Desa | Vijayalakshmi | D. RajiReddy | S. Ninomiya | M. Hirafuji | T. Kiura
Volume: 3
Issue: 6
Year: 2012
Highly Configurable Computing Unit PDF available

Author(s): Karthic Ashokan
Volume: 3
Issue: 6
Year: 2012
Generating A New Group Digital Signatures PDF available

Author(s): Dr. Abdulameer Khalaf Hussein
Volume: 3
Issue: 6
Year: 2012
Investigation of Cross Gain Modulation in Quantum-Dot Amplifier Using Four-Level Rate Equations Model PDF available

Author(s): R. S. Fyath | Abdul Kareem H | Dagher, Hussein H. Warid
Volume: 3
Issue: 6
Year: 2012
Improving Virus C type 4 Interferon using Bioinformatics Techniques PDF available

Author(s): Attalah Hashad | Khaled Kamal, | Ahmed Fahmy, | Amr Badr
Volume: 3
Issue: 6
Year: 2012
IEEE 802.11s Wireless Mesh Networks for Last-mile Internet Access: An Up- Down Link Approach PDF available

Author(s): Mohamed RiduanAbid | Taha Ben Brahim | Maen Al Assaf | TajjeeddineRachidi | Saad Biaz
Volume: 3
Issue: 6
Year: 2012
Feeling Marginalized: Turnover of Public-Sector It Professionals PDF available

Author(s): Dr. Jordan Shropshire | Dr. Christopher Kadlec
Volume: 3
Issue: 6
Year: 2012
Exploring Cloud Computing Services and Applications PDF available

Author(s): Ahmed E. Youssef
Volume: 3
Issue: 6
Year: 2012
Comparison and Analysis of Content Based Image Retrieval Systems Based On Relevance Feedback PDF available

Author(s): Latika Pinjarkar | Manisha Sharma | Kamal Mehta
Volume: 3
Issue: 6
Year: 2012
Assessing the Catalyst and the Barriers to Rural Community Based Telecentre Usage PDF available

Author(s): Abdulwahab | L Zulkhairi Md Dahalin
Volume: 3
Issue: 6
Year: 2012
An Integrated Success Model for Evaluating Information System in Public Sectors PDF available

Author(s): Abdel Nasser H. Zaied
Volume: 3
Issue: 6
Year: 2012
New Positioning Control of Stepper Motor using BP Neural Networks

Author(s): Barhoumi EM | Ben salah B
Volume: 2
Issue: 6
Year: 2011
Effect of Information Technology Policy on Nigerian Health Sector

Author(s): Hassan Omowunmi M | Siyanbola Willie O | Oyebisi T.O.
Volume: 2
Issue: 6
Year: 2011
A Proposed Anti-viruses Strategy for a Complex Environment with a Huge Number of Viruses Attacks

Author(s): Mohammad Alaa Hussain Al-Hamami
Volume: 2
Issue: 6
Year: 2011
Investigation of Performance Parameters by Varying the Dimensions of Microstrip Rectangular Patch Antenna at Higher Frequency

Author(s): B.T.P.Madhav | VGKM Pisipati | P.Rakesh Kumar | N.V.K.Ramesh | Y.Joseph Manoj Reddy | N.Srinivas Sri Chaitanya | N.Krishna Chaitanya
Volume: 2
Issue: 6
Year: 2011
A Framework to Discover New Business Processes through Business Data Integration

Author(s): Yih-Feng Hwang | David Rine
Volume: 2
Issue: 6
Year: 2011
Survey on ICT for HIV/AIDS Preventive Education: Are the teenagers forgotten in developing countries?

Author(s): Bada Joseph Kizito | Jarkko Suhonen
Volume: 2
Issue: 6
Year: 2011
Web-Based Expert System for Classification of Industrial and Commercial Waste Products

Author(s): Joseph O. Dada | Hans-D. Kochs | Joerg Petersen
Volume: 2
Issue: 6
Year: 2011
Counter-based Traffic Management Scheme for Vehicular Networks

Author(s): Tarun Prakash | Ritu Tiwari
Volume: 2
Issue: 6
Year: 2011
Exploring Factors That Influence Knowledge Sharing Behavior via Computer PDF available

Author(s): Majid Zamiri | Dr. Shadiya Mohamed S. Baqutayan
Volume: 3
Issue: 5
Year: 2012
Restoration of Degraded Historical Document Image PDF available

Author(s): B. Gangamma | Srikanta Murthy K, | Arun Vikas Singh
Volume: 3
Issue: 5
Year: 2012
Numerical and Chaotic Analysis of CHUA'S CIRCUT PDF available

Author(s): Dr. Maysoon M. Aziz | Mansour N. faraj
Volume: 3
Issue: 5
Year: 2012
LSPC: An Algorithm for Inference of Gene Networks Using Bayesian Network PDF available

Author(s): Ali Ebrahimi, | Rosa Aghdam | Parisa Niloofar | Mojtaba Ganjali,
Volume: 3
Issue: 5
Year: 2012
DNA-Based Active Logic Design and Its Implications PDF available

Author(s): Christy M. Gearheart | Eric C. Rouchka | Benjamin Arazi
Volume: 3
Issue: 5
Year: 2012
Characterizing the Utilization of Knowledge Transferred in Software Architecture Development PDF available

Author(s): Salfarina | A, Marzanah | A. J.Sazly, A.
Volume: 3
Issue: 5
Year: 2012
Analyses of Student Programming Errors In Java Programming Courses PDF available

Author(s): Ioana Tuugalei Chan Mow
Volume: 3
Issue: 5
Year: 2012
Comparative Study of Gaussian and Nearest Mean Classifiers for Filtering Spam E-mails PDF available

Author(s): Upasna Attri | Harpreet Kaur
Volume: 3
Issue: 5
Year: 2012
The Role of Requirement Engineering in Software Development Life Cycle PDF available

Author(s): Abhijit Chakraborty | Mrinal Kanti Baowaly | Ashraful Arefin | Ali Newaz Bahar
Volume: 3
Issue: 5
Year: 2012
The Impact of Computer Technology on the Development Of Children In Ghana PDF available

Author(s): Henry Osborn Quarshie
Volume: 3
Issue: 5
Year: 2012
Role of Information and Communication Technologies in the Smart Grid PDF available

Author(s): Ban Al-Omar | A. R. Al-Ali | Rana Ahmed | Taha Landolsi
Volume: 3
Issue: 5
Year: 2012
Performance Analysis of Parallelizing Program Code for Multi-Core Architectures Using OPENMP PDF available

Author(s): Neha Agrawal | Ruchira Datta M Rajasekhara Babu | Ch. Pradeep Reddy | Y.Shabber Ali
Volume: 3
Issue: 5
Year: 2012
Marketing Infrastructure for Kola-Nut in Ika Local Government Area of Delta State, Nigeria PDF available

Author(s): E.N. Ajani and E.A | Onwubuya
Volume: 3
Issue: 5
Year: 2012
Software Models, Extensions and Independent Models in Cocomo Suite: A Review PDF available

Author(s): Syed Ali Abbas | Saleem Ullah Lar | Xiaofeng Liao | Raja Aftab Naseem
Volume: 3
Issue: 5
Year: 2012
An Evaluative Study of Automation Software Applications and Database Management Systems in Academic Libraries PDF available

Author(s): S. Dhanavandan | M.Tamizhchelvan
Volume: 3
Issue: 5
Year: 2012
The Research on the Analysis of the Redundant Data PDF available

Author(s): Tan Shunhua | Chen Miao
Volume: 3
Issue: 5
Year: 2012
LTE-Advanced: Requirements and Technical Challenges for 4G Cellular Network PDF available

Author(s): Muhammed Mustaqim | Khalid Khan | Muhammed Usman
Volume: 3
Issue: 5
Year: 2012
Markovian Method of Finding the Availability of Repairable Systems

Author(s): M. Y. Ashkar
Volume: 2
Issue: 5
Year: 2011
Extraction of ROI in Geographical Map Image

Author(s): Mehnaz Tabassum | Mohammad Shorif Uddin
Volume: 2
Issue: 5
Year: 2011
E-Government Adoption in Developing Countries; the Case of Indonesia

Author(s): Ali Rokhman
Volume: 2
Issue: 5
Year: 2011
Developing a Block-Cipher-Key Generator Using Philosophy of Data Fusion Technique

Author(s): Soukaena H. Hashem | Mohammad A. AL-Hamami | Alaa H. AL-Hamami
Volume: 2
Issue: 5
Year: 2011
A Comparative Study of Available Protocols during Privacy Preservation in Secure Multiparty Computation

Author(s): Zulfa Shaikh | Poonam Garg
Volume: 2
Issue: 5
Year: 2011
An ATMS-Based Tool for Locating Honor Cards in Rubber Bridge

Author(s): Ali Awada | May Dehayni | Antoun Yaacoub
Volume: 2
Issue: 5
Year: 2011
Network Multi-layer Semantic Analysis PDF available

Author(s): Tan Shunhua
Volume: 3
Issue: 4
Year: 2012
Search Algorithm in the Five-piece Chess PDF available

Author(s): Tan Shunhua | Chen Miao
Volume: 3
Issue: 4
Year: 2012
Computer Vision and Wireless Sensor Networks in Ambient Assisted Living: State of the Art and Challenges PDF available

Author(s): Velislava Spasova | Ivo Iliev
Volume: 3
Issue: 4
Year: 2012
Adaptive Antenna Array Approach in the Processing Of Weakest GPS Signals PDF available

Author(s): R Ranjana | P S Brahmanandam | Raghava Yathiraju | T Raghavendra Vishnu
Volume: 3
Issue: 4
Year: 2012
Wireless Sensor Networks: A Solution for Smart Transportation PDF available

Author(s): Rahat Ali Khan | Shakeel Ahmed Shah | Muhammad Abdul Aleem | Zulfiqar Ali Bhutto | Asad Ali Shaikh | Muhmaad Aslam Kumbhar
Volume: 3
Issue: 4
Year: 2012
Performance Enhancement of WiMAX System using Adaptive Equalizer PDF available

Author(s): Anita Garhwal, | Partha Pratim Bhattacharya
Volume: 3
Issue: 4
Year: 2012
Performance Analysis of Two-Layer Spreading scheme based FEC encoded MC–CDMA wireless communication system under implementation of various signal detection schemes PDF available

Author(s): Sohag Sarker | Farhana Enam | Md. Golam Rashed | Shaikh Enayet Ullah
Volume: 3
Issue: 4
Year: 2012
Ranking of Academic Web-sites on the Basis of External Quality Measurement PDF available

Author(s): Ritu Shrivastava | R.K. Pandey | M. Kumar
Volume: 3
Issue: 4
Year: 2012
Exploring Factors That Influence Knowledge Sharing Behavior via Computer PDF available

Author(s): Majid Zamiri | Shadiya Mohamed S | Baqutayan
Volume: 3
Issue: 4
Year: 2012
Requirements of Routing Algorithms for Sensor Networks PDF available

Author(s): Prof. Prashant J Bagga | Prof. Nagendra P Gajjar
Volume: 3
Issue: 4
Year: 2012
Citizens Adoption of SMS Based E-Government Services in Lagos State, Nigeria PDF available

Author(s): Chete, F.O | Oyemade, D | Abere, R | Chiemeke, S.C | Ima-Omasogie, I
Volume: 3
Issue: 4
Year: 2012
The Effect Of Communications on the Lifetime of Wireless Sensor Networks PDF available

Author(s): Abdelrahman Elleithy | Gonhsin Liu
Volume: 3
Issue: 4
Year: 2012
Cloud Hadoop Map Reduce For Remote Sensing Image Analysis PDF available

Author(s): Mohamed H. Almeer
Volume: 3
Issue: 4
Year: 2012
Cost Estimation: A Survey of Well-known Historic Cost Estimation Techniques PDF available

Author(s): Syed Ali Abbas | Xiaofeng Liao | Aqeel Ur Rehman, | Afshan Azam | M.I. Abdullah
Volume: 3
Issue: 4
Year: 2012
Modeling of Orthogonal Frequency Division Multiplexing (OFDM) for Transmission in Broadband Wireless Communications PDF available

Author(s): John Samuel, | Akinola Emmanuel | Ibikunle Frank | Ndujiuba Charles | Akinade Bayonle
Volume: 3
Issue: 4
Year: 2012
Evaluation of Subscriber Attitude to Mobile Number Portability Implementation in Nigeria PDF available

Author(s): Tiamiyu | Osuolale Abdramon | Mejabi | Omenogo Veronica
Volume: 3
Issue: 4
Year: 2012
Multi-Channel E-Retailing Information Technology Management System (ITMS) PDF available

Author(s): Muneeb Iqbal | Atif Ali Khan
Volume: 3
Issue: 4
Year: 2012
E-government Development in Yemen: Assessment and Solutions PDF available

Author(s): Ali A. Al-wazir | Zhao Zheng
Volume: 3
Issue: 4
Year: 2012
A Sobel Edge Detection Algorithm Based System for Analyzing and Classifying Image Based Spam PDF available

Author(s): N. C. Woods | O.B. Longe | A.B.C. Roberts
Volume: 3
Issue: 4
Year: 2012
Assessing E-Government Implementation in Ekiti State, Nigeria PDF available

Author(s): Wole Michael Olatokun | Busola M. Adebayo
Volume: 3
Issue: 4
Year: 2012
An Enhancement on Content-Based Image Retrieval using Color and Texture Features PDF available

Author(s): Tamer Mehyar | Jalal Omer Atoum
Volume: 3
Issue: 4
Year: 2012
African Trypanosomiasis Detection Using Dempster-Shafer Theory PDF available

Author(s): Andino Maseleno | Md. Mahmud Hasan
Volume: 3
Issue: 4
Year: 2012
Effective Pair Programming Practice- An Experimental Study PDF available

Author(s): Venkata Vinod Kumar Padmanabhuni | Hari Praveen Tadiparthi | Muralidhar Yanamadala | Sagar Madina
Volume: 3
Issue: 4
Year: 2012
Concept-Oriented Model: Classes, Hierarchies and References Revisited PDF available

Author(s): Alexandr Savinov
Volume: 3
Issue: 4
Year: 2012
Investigate the Result of Object Oriented Design Software Metrics on Fault-Proneness in Object Oriented Systems: A Case Study

Author(s): Amjan. Shaik | N.Satyanarayana | Mohammed Huzaifa | Nazeer Shaik | Mohd Zainuddin Naveed | S.V.Achuta Rao | C.R.K.Reddy
Volume: 2
Issue: 4
Year: 2011
Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad-hoc Mobile Networks

Author(s): K Ranganath | L.Naveen Kumar | Y.V.Sreevani
Volume: 2
Issue: 4
Year: 2011
Eye Detection and Tracking in Image with Complex Background

Author(s): Mohammadali Azimi Kashani | Mahdi Mollaei Arani | Mohammad Reza Ramezanpour
Volume: 2
Issue: 4
Year: 2011
Information Computing in Crime Mapping: The Pocket Man Case of Criminal Child Sexual Abuse

Author(s): Petter Gottschalk | Morten Espen Ørn
Volume: 2
Issue: 4
Year: 2011
Detecting Auto Insurance Fraud by Data Mining Techniques

Author(s): Rekha Bhowmik
Volume: 2
Issue: 4
Year: 2011
Gait Based Personal Identification System Using Rotation Sensor PDF available

Author(s): Soumik Mondal | Anup Nandy | Pavan Chakraborty | G. C. Nandi
Volume: 3
Issue: 3
Year: 2012
Security Framework for Cloud Computing Environment: A Review PDF available

Author(s): Ayesha Malik | Muhammad Mohsin Nazir
Volume: 3
Issue: 3
Year: 2012
New Bandwidth Guaranteed QoS Routing Algorithm for MPLS Networks PDF available

Author(s): Santosh Kulkarni | Reema Sharma | Ishani Mishra
Volume: 3
Issue: 3
Year: 2012
Web Application Security of Money Transfer Systems PDF available

Author(s): Alaa Hussein Al-hamami | Fadi Ali Oqla Najadat, | Mohammed Saad Abdul Wahhab
Volume: 3
Issue: 3
Year: 2012
Determination of Risk During Requirement Engineering Process PDF available

Author(s): Saima Amber | Narmeen Shawoo | Saira Begum
Volume: 3
Issue: 3
Year: 2012
System for Robot Control Inspired By the Functionality and Organisation of the Human Nervous System PDF available

Author(s): J. V. Berna-Martinez | F. Macia-Perez
Volume: 3
Issue: 3
Year: 2012
Performance Evaluation of an OFDM System under Rayleigh Fading Environment PDF available

Author(s): Gurpreet Kaur | Partha Pratim Bhattacharya
Volume: 3
Issue: 3
Year: 2012
The Improvement of Key Management Based On Logical Key Hierarchy by Implementing Diffie Hellman Algorithm PDF available

Author(s): Nur Alyani Jusoh@Mohd | Kamaruzzaman Seman | Norita Md Nawawi | Norazizi Sham Mohd Sayuti
Volume: 3
Issue: 3
Year: 2012
Fuzzy Logic Based Channel Estimation and Performance Analysis of WiMAX Systems PDF available

Author(s): Anita Garhwal | Partha Pratim Bhattacharya
Volume: 3
Issue: 3
Year: 2012
Wireless Senor Networks Health Monitoring: Trends and Challenges PDF available

Author(s): Shakeel Ahmed Shah | Syed M.K Raazi | Rahat Ali Khan
Volume: 3
Issue: 3
Year: 2012
The Role of ICT in the Economic Development of North East Africa: Eritrea PDF available

Author(s): Mungamuru Nirmala | Kaliyaperumal Karthikeyan | Sreedhar Appalabatla | J.Patharaj
Volume: 3
Issue: 3
Year: 2012
Supporting Model Reuse in Organic Reaction Simulation: Towards the Compositional Modelling Approach PDF available

Author(s): Alicia Y.C. Tang | Sharifuddin M. Zain
Volume: 3
Issue: 3
Year: 2012
Transmission Performance of Optical Code Division Multiple Access Network Based on Spectral Amplitude Coding PDF available

Author(s): Raad S. Fyath | Howraa M. Mohammad Ali
Volume: 3
Issue: 3
Year: 2012
Network Deployment and Routing Based on the Energy-Saving and Long-Lasting Life of Knots PDF available

Author(s): W. Hayder | M. Abdellaoui
Volume: 3
Issue: 3
Year: 2012
Integrated Development and Testing Environments (IDTE) – A Research Proposal PDF available

Author(s): Ranjith Engu | Sharat Chandra Kotakonda
Volume: 3
Issue: 3
Year: 2012
Current Status of Open Access Institutional Repository: A Case Study in Universiti Teknologi Mara (UiTM) PDF available

Author(s): Current Status of Open Access Institutional Repository: A Case Study in Universiti Teknologi Mara (UiTM) | Wan Ab. Kadir Wan Dollah
Volume: 3
Issue: 3
Year: 2012
An Evaluation of E-Resources in Academic Libraries in Tamil Nadu PDF available

Author(s): S. Dhanavandan | M. Tamizhchelvan
Volume: 3
Issue: 3
Year: 2012
Multilevel Index Algorithm in Search Engine

Author(s): Laxmi Ahuja | Ela Kumar
Volume: 2
Issue: 3
Year: 2011
Trust Based Authorization Framework for Grid Services

Author(s): Sarbjeet Singh
Volume: 2
Issue: 3
Year: 2011
An improved Combinatorial Particle Swarm Optimization Algorithm to Database Vertical Partition

Author(s): Bilal Benmessahel | Mohamed Touahria
Volume: 2
Issue: 3
Year: 2011
Finding Web Log Groups with Geometric Data Analysis

Author(s): Nikos Koutsoupias
Volume: 2
Issue: 3
Year: 2011
Substrate Permittivity Effects on the Performance of the Microstrip Elliptical Patch Antenna

Author(s): B.T.P.Madhav | VGKM Pisipati | K.Sarat Kumar | P.Rakesh Kumar | K.Praveen Kumar | N.V.K.Ramesh | M.Ravi Kumar
Volume: 2
Issue: 3
Year: 2011
A Multiple Fault Tolerant Approach with Improved Performance in Cluster Computing

Author(s): Sanjay Bansal | Sanjeev Sharma | Rajiv Gandhi Prodhyogiki Vishwavidya
Volume: 2
Issue: 3
Year: 2011
An Empirically Base Path Loss Model for GSM Fixed Wireless Access

Author(s): Shalangwa D. A. | Singh, K. S.
Volume: 2
Issue: 3
Year: 2011
Design and Implementation of Non Real Time and Real Time Digital Filters for Audio Signal Processing

Author(s): Pranab Kumar Dhar | Mohammand Ibrahim Khan
Volume: 2
Issue: 3
Year: 2011
Success and Failure of e-Learning Projects: Alignment of Vision and Reality, Change and Culture PDF available

Author(s): Hussein Al-Yaseen | Mou’ath Hourani | Saheer Al-Jaghoub
Volume: 3
Issue: 2
Year: 2012
Role of Cognitive Radio on 4G Communications: A Review PDF available

Author(s): Maninder Jeet Kaur | Moin Uddin | Harsh K Verma
Volume: 3
Issue: 2
Year: 2012
Energy 10 Performance on Building Energy Efficiency in Jordan PDF available

Author(s): Mahmoud S. Awad | Anwar Al-Mofleh
Volume: 3
Issue: 2
Year: 2012
The State of High Performance Computing in the Cloud PDF available

Author(s): Sanjay P. Ahuja | Sindhu Mani
Volume: 3
Issue: 2
Year: 2012
Development of a Dynamic Model for Data-Driven DSS PDF available

Author(s): Fatma Zada | Shawkat K.Guirguis | Ahmed Ahmed Hesham Sedky
Volume: 3
Issue: 2
Year: 2012
A Stochastic Approach to the Problem of the Königsberg Bridges PDF available

Author(s): M. Y. Ashkar
Volume: 3
Issue: 2
Year: 2012
Cervix Cancer Diagnosis from Pap Smear Images Using Structure Based Segmentation and Shape Analysis PDF available

Author(s): Lipi B. Mahanta | Dilip Ch. Nath | Chandan Kr. Nath
Volume: 3
Issue: 2
Year: 2012
AODV Extension using Ant Colony Optimization for Scalable Routing in VANETs PDF available

Author(s): R.K.Chauhan | Arzoo Dahiya
Volume: 3
Issue: 2
Year: 2012
Enhancement of XP for Cloud Application Development PDF available

Author(s): Sara Tariq | Muhammad Mohsin Nazi | Farhat Saleemi
Volume: 3
Issue: 2
Year: 2012
Visualization of Graph-Based Structures for Navigation and Tracking of Real-World Objects PDF available

Author(s): Vitaly Zabiniako | Oleg Gorbik
Volume: 3
Issue: 2
Year: 2012
Handling Security Issues for Smart Grid Applications using Cloud Computing Framework PDF available

Author(s): Sadia Fayyaz | Muhammad Mohsin Nazir
Volume: 3
Issue: 2
Year: 2012
Telemedicine Enlightment: A Smart Health Care System for Rural Areas PDF available

Author(s): Beenish Ishtiaq Hussain Ansari | Asad Ali Shaikh | Rahat Ali Khan | Nayab Suhail Hamirani
Volume: 3
Issue: 2
Year: 2012
Students' Perception of Computer Based Test (CBT) for Examining Undergraduate Chemistry Courses PDF available

Author(s): Jimoh | R. G., AbdulJaleel Kehinde Shittu | Kawu | Yakub Kola
Volume: 3
Issue: 2
Year: 2012
Effect of System Impairments on the Performance of QPSK Label-Based Photonic Router PDF available

Author(s): R. S. Fyath | Israa B | Al-Mashhadani | Ruslan S. A. Al-Nuaimi
Volume: 3
Issue: 2
Year: 2012
A Distributed Shared Memory Cluster Architecture With Dynamic Load Balancing PDF available

Author(s): Minakshi Tripathy | C.R. Tripathy
Volume: 3
Issue: 2
Year: 2012
Road Accident Models with Two Threshold Levels of Fuzzy Linear Regression PDF available

Author(s): Lazim Abdullah | Nurnadiah Zamri
Volume: 3
Issue: 2
Year: 2012
Harvesting Information from the Internet to Construct Ontologies PDF available

Author(s): Steve Smith | Thomas W. Jackson
Volume: 3
Issue: 2
Year: 2012
A Rule-Based Expert System for Mineral Identification PDF available

Author(s): Folorunso, I. O. | Abikoye, O. C | Jimoh, R. G | Raji, K.S
Volume: 3
Issue: 2
Year: 2012
Enhancing Network Architecture in Minority Institutions’ Library PDF available

Author(s): S. Dhanavandan | M. Tamizhchelvan
Volume: 3
Issue: 2
Year: 2012
A Proposal Setting Solution for Subscriber Profile of Mobile Internet Applications in Home Location Register (HLR) PDF available

Author(s): Salih M. S. Atroshey | Myasar R. Tabany
Volume: 3
Issue: 2
Year: 2012
Bespoke, Mdre And Challenges In Mdre In Comparison With Bespoke PDF available

Author(s): Ranjith Engu | Sairam Vakkalanka | Loka. Ashwin Kumar
Volume: 3
Issue: 2
Year: 2012
On the Statistical Analysis of the Dynamics of Rational Function Having Poles PDF available

Author(s): Jean Bosco Mugiraneza | Amritasu Sinha
Volume: 3
Issue: 2
Year: 2012
Canonical Genetic Algorithm To Optimize Cut Order Plan Solutions in Apparel Manufacturing PDF available

Author(s): R P Abeysooriya | T G I Fernando
Volume: 3
Issue: 2
Year: 2012
Face Component Extraction Using Segmentation Method on Face Recognition System

Author(s): Dewi Agushinta R | Adang Suhendra | Sarifuddin Madenda | Suryadi H.S
Volume: 2
Issue: 2
Year: 2011
Data Count Driven Concurrency Control Scheme with Performance Gain in Mobile Environments

Author(s): Mohammed Khaja Nizamuddin | Syed Abdul Sattar
Volume: 2
Issue: 2
Year: 2011
Multi-Objective Optimization Using Multi Parent Crossover Operators

Author(s): Rahila Patel | M.M.Raghuwanshi
Volume: 2
Issue: 2
Year: 2011
A Review on Information Assimilation Tools

Author(s): Siew Hock Ow | Omid Aghili | Theen Gee Yee
Volume: 2
Issue: 2
Year: 2011
A Survey in Project Commitment in the Context of Information Security

Author(s): Ioannis Koskosas | Nikolaos Sariannidis | Nikolaos Asimopoulos
Volume: 2
Issue: 2
Year: 2011
Microstrip Circular Patch Array Antenna for Wlan Applications on Liquid Crystal Polymer Substrate

Author(s): B.T.P.Madhav | VGKM Pisipati | Habibulla Khan | VGNS Prasad | P.V.Datta
Volume: 2
Issue: 2
Year: 2011
The Effectiveness of Learning Management System (LMS) Case Study at Open University Malaysia (OUM), Kota Bharu Campus

Author(s): Khadijah Abdul Rahman | Siti Aswani Mohd Ghazali | Mohd Nasir Ismail
Volume: 2
Issue: 2
Year: 2011
Using Multimodal Fusion in Accessing Web Services PDF available

Author(s): Manolo Dulva Hina
Volume: 1
Issue: 2
Year: 2010
The Rule Based Intrusion Detection and Prevention Model for Biometric System PDF available

Author(s): Maithili Arjunwadkar
Volume: 1
Issue: 2
Year: 2010
Solving Fuzzy based Job Shop Scheduling Problems using Ga and Aco PDF available

Author(s): P Surekha
Volume: 1
Issue: 2
Year: 2010
Age Estimation based on Neural Networks using Face Features PDF available

Author(s): Nabil Hewahi
Volume: 1
Issue: 2
Year: 2010
Knowledge based Diagnosis of Abdomen Pain using Fuzzy Prolog Rules PDF available

Author(s): Priti Srinivas Sajja
Volume: 1
Issue: 2
Year: 2010
Fruit Recognition using Color and Texture Features PDF available

Author(s): R. Newlin Shebiah
Volume: 1
Issue: 2
Year: 2010
Stock Price Prediction using Neural Network with Hybridized Market Indicators PDF available

Author(s): Adebiyi Ayodele A. | Ayo Charles K | Adebiyi Marion O | Otokiti Sunday O
Volume: 2
Issue: 12
Year: 2011
Detection and Control of DDOS Attacks over Reputation and Score Based MANET PDF available

Author(s): Rizwan Khan | A. K. Vatsa
Volume: 2
Issue: 12
Year: 2011
Extracting Entities and Relationships from Arabic Text for Information System PDF available

Author(s): Belkacem KOUNINEF | Badr AL-JOHAR
Volume: 2
Issue: 12
Year: 2011
Efficient Method for Multiple-Level Association Rules in Large Databases PDF available

Author(s): Pratima Gautam | K. R. Pardasani
Volume: 2
Issue: 12
Year: 2011
A Watermarking of Medical Image: Method Based PDF available

Author(s): Mohamed Ali HAJJAJI | Abdellatif MTIBAA | El-bey BOURENNANE
Volume: 2
Issue: 12
Year: 2011
Comparative Study of Scalability and Availability in Cloud and Utility Computing PDF available

Author(s): Farrukh Shahzad Ahmed | Ammad Aslam | Shahbaz Ahmed | M. Abdul Qadoos Bilal
Volume: 2
Issue: 12
Year: 2011
Time-Variant Captcha: Generating Strong Captcha Security by Reducing Time to Automated Computer Programs PDF available

Author(s): Prem Shanker Yadava | Chandra Prakash Sahu | Sanjeev Kumar Shukla
Volume: 2
Issue: 12
Year: 2011
Learning Electronically in Nigeria Universities: The Example of Federal University of Technology Minna, Nigeria PDF available

Author(s): Evarest C. Madu | Laura Anointing Pam
Volume: 2
Issue: 12
Year: 2011
Phased Array Antenna for Millimeter Wave Radar in W-band using Liquid Crystal Substrate PDF available

Author(s): I.Govardhani | K.Rajkamal | M.Venkata Narayana | S.Venkateswarlu
Volume: 2
Issue: 12
Year: 2011
Design of Coaxial fed Microstrip Patch Antenna for 2.4GHz BLUETOOTH Applications PDF available

Author(s): Govardhani.Immadi | M.S.R.S Tejaswi | M.Venkata Narayana N.Anil Babu | G.Anupama | K.Venkata Ravi teja
Volume: 2
Issue: 12
Year: 2011
Password Based Rotational Multistory Car Parking System PDF available

Author(s): Nayab Suhail Hamirani | Imdad Ali Ismaili | Asad Ali Shaikh | Faheem Ahmed | Azhar Ali Shah
Volume: 2
Issue: 12
Year: 2011
Gait Recognition Based Improved Histogram PDF available

Author(s): Muzhir Sh. Al-Ani | Isra H. Al-Ani
Volume: 2
Issue: 12
Year: 2011
Reaching Activities by Places in the Context-Aware Environments Using Software Sensors PDF available

Author(s): Kamran Taj Pathan | Stephan Reiff-Marganiec | Asad Ali Shaikh | Nizamuddin Channa
Volume: 2
Issue: 12
Year: 2011
A Survey on the Preprocessing Techniques of Mammogram for the Detection of Breast Cancer PDF available

Author(s): D.Narain Ponraj | M.Evangelin Jenifer | P. Poongodi | J.Samuel Manoharan
Volume: 2
Issue: 12
Year: 2011
Detection and Control of DDOS Attacks over Reputation and Score Based MANET PDF available

Author(s): Rizwan Khan | A. K. Vatsa
Volume: 2
Issue: 11
Year: 2011
Extracting Entities and Relationships from Arabic Text for Information System PDF available

Author(s): Belkacem KOUNINEF | Badr AL-JOHAR
Volume: 2
Issue: 11
Year: 2011
Synergizing E-infrastructures Initiatives to Foster e-Research in Higher Education Institutions in Africa PDF available

Author(s): Simon M. KARUME | Kelvin K. OMIENO
Volume: 2
Issue: 11
Year: 2011
A Fuzzy Search Model for Dealing with Retrieval Issues in Some Classes of Dirty Data PDF available

Author(s): Olufade | F. W. ONIFADE | Oladeji | P. AKOMOLAFE
Volume: 2
Issue: 11
Year: 2011
Detection of Outlier-Communities using Minimum Spanning Tree PDF available

Author(s): S. Chidambaranathan | S. John Peter
Volume: 2
Issue: 11
Year: 2011
Influence-Number of Antennas on the Total Sensing Time in Cognitive Radio Systems PDF available

Author(s): Ahmed S. Kadhim | Haider M. AlSabbagh
Volume: 2
Issue: 11
Year: 2011
A Study of Mining Software Engineering Data and Software Testing PDF available

Author(s): T.Murali Krishna | Devara Vasumathi
Volume: 2
Issue: 11
Year: 2011
User Perception of Electronic Resources in the University of Ilorin PDF available

Author(s): BASHORUN | M. Tunji | ISAH Abdulmumin | M.Y ADISA
Volume: 2
Issue: 11
Year: 2011
Comparative Analysis of Exponentially Shaped Microstrip-Fed Planar Monopole Antenna With and Without Notch

Author(s): M. Venkata Narayana | I.Govadhani | K.P.Sai Kumar | K. Pushpa Rupavathi
Volume: 2
Issue: 11
Year: 2011
Inertia Optimization of a Two Masses System

Author(s): Mabrouki. H | Firchichi. N
Volume: 2
Issue: 11
Year: 2011
Effect of GSM Phone Radiation on Human Pulse Rate (Heartbeat Rate)

Author(s): A. A. Ayeni | K.T. Braimoh | O. B. Ayeni
Volume: 2
Issue: 11
Year: 2011
Satellite Communications: Impact on Developing Economies

Author(s): AAA. Atayero | Matthew K. Luka | Orya M. Kwaghdoo | Adeyemi A. Alatishe
Volume: 2
Issue: 11
Year: 2011
A MCDM Approach for Evaluating Bowlers Performance in IPL

Author(s): Pabitra Kumar Dey | Dipendra Nath Ghosh | Abhoy Chand Mondal
Volume: 2
Issue: 11
Year: 2011
User Perception of Electronic Resources in the University of Ilorin, Nigeria (UNILORIN)

Author(s): BASHORUN | M. Tunji | ISAH Abdulmumin | M.Y ADISA
Volume: 2
Issue: 11
Year: 2011
Performance Comparison of Two Dynamic Routing Protocols: RIP and OSPF

Author(s): Fatima A. Hamza | Amr M. Mohamed
Volume: 2
Issue: 11
Year: 2011
Comparing Performance of Genetic Algorithm with Varying eCrossover in Solving Examination Timetabling Problem PDF available

Author(s): Omar Ibrahim Obaid | MohdSharifuddin Ahmad | Salama A. Mostafa | Mazin Abed Mohammed
Volume: 3
Issue: 10
Year: 2012
Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption

Author(s): Aderemi A. Atayero | Oluwaseyi Feyisetan
Volume: 2
Issue: 10
Year: 2011
Examining the Effect of Technology Acceptance Model on ICT Usage in Nigerian Tertiary Institutions

Author(s): Oye N. D | Noorminshah A | NorZairah Ab. Rahim
Volume: 2
Issue: 10
Year: 2011
Classification of Artificial Intelligence IDS

Author(s): N.Ugtakhbayar | Sh.Sodbileg
Volume: 2
Issue: 10
Year: 2011
A Perceptually Approach for Speech Enhancement Based on Mmse Error Estimators and Masking in an Auditory System

Author(s): T.Raghavendra Vishnu | P.S.Brahamanandam | Raghava Yathiraju | Naga Himaja Alla | K.PhaniSrinivas | B.T.P.Madhav | Radhika Chinaboina | Usha Mallaparapu
Volume: 2
Issue: 10
Year: 2011
Investigation and Addressing Unfairness in Wireless Mesh Networks

Author(s): M. I. Gumel | N Faruk | A.A Ayeni
Volume: 2
Issue: 10
Year: 2011
Comparative Assessment of Genetic and Memetic Algorithms

Author(s): H. A. Sanusi | A. Zubair | R. O. Oladele
Volume: 2
Issue: 10
Year: 2011
A Novel Metric For Measuring The Readability of Software Source Code

Author(s): Bajeh, A. O.
Volume: 2
Issue: 10
Year: 2011
An Examination of Privacy Policies of Global University Web Sites

Author(s): Joanne Kuzma
Volume: 2
Issue: 10
Year: 2011
A CBR-based Approach to ITIL-based Service Desk

Author(s): Abtin Refahi Farjadi Tehrani | Faras Zuheir Mustafa Mohamed
Volume: 2
Issue: 10
Year: 2011
Impact of Agile Software Development on Quality within Information Technology Organizations

Author(s): Robert Imreh | Mahesh S. Raisinghani
Volume: 2
Issue: 10
Year: 2011
OCR Post-Processing Error Correction Algorithm Using Google's Online Spelling Suggestion PDF available

Author(s): Youssef Bassil | Mohammad Alwani
Volume: 3
Issue: 1
Year: 2012
Impact of IT on Process Improvement PDF available

Author(s): Lotfollah najjar | Ziaul huq | Seyed-mahmoud aghazadeh | Saeedreza hafeznezami
Volume: 3
Issue: 1
Year: 2012
Incorporation of IDS in Real World Applications PDF available

Author(s): Umang Singh | Shruti Gupta
Volume: 3
Issue: 1
Year: 2012
Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services PDF available

Author(s): Bibhash Roy | Suman Banik | Parthi Dey | Sugata Sanyal | Nabendu Chaki
Volume: 3
Issue: 1
Year: 2012
Hibernating ICT Infrastructure During Rainy Days PDF available

Author(s): Joseph Ng P.S | Choo P.Y | Wong S.W | Phan K.Y | Lim E. H.
Volume: 3
Issue: 1
Year: 2012
Development of a GPS Powered Mobile Health Assistant for Improved Health Care Delivery in Africa: A Nigerian Case Study PDF available

Author(s): Emuoyibofarhe O. J | Adenegan J | Adewusi E
Volume: 3
Issue: 1
Year: 2012
Identification of Critical Factors in Checkpointing Based Multiple Fault Tolerance for Distributed System

Author(s): Sanjay Bansal | Sanjeev Sharma
Volume: 2
Issue: 1
Year: 2011
Learner satisfaction for a hybrid course in probability

Author(s): Amir T. Payandeh Najafabadi | Maryam Omidi Najafabadi
Volume: 2
Issue: 1
Year: 2011
The Beaconless Node Velocity-based Stable Path Routing Protocol for Unicasting and Multicasting in Mobile Ad hoc Networks

Author(s): Natarajan Meghanathan | DeMarcus Thomas | Ebony S. Addison
Volume: 2
Issue: 1
Year: 2011
An Overview of Transform Domain Robust Digital Image Watermarking Algorithms

Author(s): Baisa L. Gunjal | R.R. Manthalkar
Volume: 2
Issue: 1
Year: 2011
Software Cost Estimation Methods: A Review

Author(s): Vahid Khatibi | Dayang N. A. Jawawi
Volume: 2
Issue: 1
Year: 2011
Evaluation of ICT Penetration in Selected Insurance Companies: The Lagos Experience PDF available

Author(s): Apampa . | Olatunji Razaq
Volume: 1
Issue: 1
Year: 2010
Linking Geographic Dispersion, Commitment, and Job Satisfaction: the Mediating Role of Quality Relationship PDF available

Author(s): Rocco Agrifoglio | Concetta Metallo
Volume: 1
Issue: 1
Year: 2010
RELEVANCE OF INFORMATION LITERACY IN DIGITAL ENVIRONMENT PDF available

Author(s): R. N. Mishra | C. Mishra
Volume: 1
Issue: 1
Year: 2010
Reliable Job Scheduler using RFOH in Grid Computing PDF available

Author(s): Leyli Mohammad Khanli | Maryam Etminan Far | Ali Ghaffari
Volume: 1
Issue: 1
Year: 2010
Effect of Unconstrained Walking Plane with Virtual Environment on Spatial Learning: An Exploratory Study PDF available

Author(s): Kanubhai K. Patel | Sanjay Kumar Vij
Volume: 1
Issue: 1
Year: 2010
Introducing a Graduate Research Problem to a Junior Level Class: A Successful Experience PDF available

Author(s): Ghassan Alkadi | Theresa Beaubouef
Volume: 1
Issue: 1
Year: 2010
KNOWLEDGE STRATEGY FOR FINANCIAL CRIME PREVENTION PDF available

Author(s): Petter Gottschalk
Volume: 1
Issue: 1
Year: 2010
Free Forms + CRM     Why do you need a reservation system?