Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of New Computer Architectures and their Applications

ISSN: 2220--9085
Publisher: The Society of Digital Information and Wireless Communication


ADD TO MY LIST
 
EPS2WAY: AN EFFICIENT PAIRWISE TEST DATA GENERATION STRATEGY PDF available

Author(s): K.F. Rabbi | Sabira Khatun | Che Yahaya Yaakub | M. F. J. Klaib
Volume: 1
Issue: 4
Year: 2011
A DATA MINING APPROACH TO CONSTRUCT GRADUATES EMPLOYABILITY MODEL IN MALAYSIA PDF available

Author(s): Myzatul Akmam Sapaat | Aida Mustapha | Johanna Ahmad | Khadijah Chamili | Rahamirzam Muhamad
Volume: 1
Issue: 4
Year: 2011
MINING FEATURE-OPINION IN EDUCATIONAL DATA FOR COURSE IMPROVEMENT PDF available

Author(s): Alaa El-Halees
Volume: 1
Issue: 4
Year: 2011
EVALUATION OF STUDENT'S NOTES IN A BLENDED LEARNING COURSE PDF available

Author(s): Minoru Nakayama | Kouichi Mutsuura | Hiroh Yamamoto
Volume: 1
Issue: 4
Year: 2011
ONLINE INSTRUCTIONAL CONSULTATION FOR HIGHER EDUCATION INSTITUTIONS IN MALAYSIA: THE SYSTEM ARCHITECTURE PDF available

Author(s): Ang Ling Weay | Abd Hadi Bin Abd Razak
Volume: 1
Issue: 4
Year: 2011
WEB CONTENT ADAPTATION FOR MOBILE DEVICES: A GREEDY APPROACH PDF available

Author(s): Rajibul Anam | Chin Kuan Ho and Tek Yong Lim
Volume: 1
Issue: 4
Year: 2011
DIMENSION REDUCTION OF HEALTH DATA CLUSTERING PDF available

Author(s): Rahmat Widia Sembiring | Jasni Mohamad Zain | Abdullah Embong
Volume: 1
Issue: 4
Year: 2011
REMOVING DUPLICATIONS IN EMAIL ADDRESSES IN LINEAR TIME PDF available

Author(s): Eyas El-Qawasmeh
Volume: 1
Issue: 4
Year: 2011
STRUCTURING THE INFORMATION SYSTEM ARCHITECTURE USING PATTERNS PDF available

Author(s): Shokoofeh Ketabchi | Navid Karimi Sani | Kecheng Liu
Volume: 1
Issue: 4
Year: 2011
CYBER FORENSICS COMPETENCY-BASED FRAMEWORK - AREVIEW PDF available

Author(s): Elfadil Sabeil | Azizah Bt Abdul Manaf | Zuraini Ismail | Mohamed Abas
Volume: 1
Issue: 4
Year: 2011
AUGMENTING INTUITIVENESS WITH WHEELCHAIR INTERFACE USING NINTENDO WIIMOTE PDF available

Author(s): Mahmood Ashraf | Masitah Ghazali
Volume: 1
Issue: 4
Year: 2011
REVIEW ON TRADITIONAL AND AGILE COST ESTIMATION SUCCESS FACTOR IN SOFTWARE DEVELOPMENT PROJECT PDF available

Author(s): Zulkefli Mansor | Saadiah Yahya | Noor Habibah Hj Arshad
Volume: 1
Issue: 4
Year: 2011
A STUDY ON THE EVALUATION OF UNIT TESTING FOR ANDROID SYSTEMS PDF available

Author(s): Ben Sadeh | Sundar Gopalakrishnan
Volume: 1
Issue: 4
Year: 2011
A COMPARATIVE PERFORMANCE ANALYSIS OF GAUSSIAN DISTRIBUTION FUNCTIONS IN ANT SWARM OPTIMIZED ROUGH REDUCTS PDF available

Author(s): Lustiana Pratiwi | Yun-Huoy Choo | Azah Kamilah Muda
Volume: 1
Issue: 4
Year: 2011
ANALYSIS OF COMPOUND ENHANCEMENT ALGORITHMS (CEA) BASED ON ADAPTIVE HISTOGRAM EQUALIZATION (AHE) ON INTRA-ORAL DENTAL RADIOGRAPHS IMAGES PDF available

Author(s): Siti Arpah Ahmad | Mohd Nasir Taib | NoorElaiza Abd Khalid | Rohana Ahmad
Volume: 1
Issue: 4
Year: 2011
IMPROVEMENTS OF BACK PROPAGATION ALGORITHM PERFORMANCE BY ADAPTIVELY CHANGING GAIN, MOMENTUM AND LEARNING RATE PDF available

Author(s): Norhamreeza Abdul Hamid | Nazri Mohd Nawi | Rozaida Ghazali | Mohd Najib Mohd Salleh.
Volume: 1
Issue: 4
Year: 2011
MODEL-BASED WEB COMPONENTS TESTING: PRIORITIZATION USING MIDS AND CENTRALITY MEASURES PDF available

Author(s): Ahmed Al-Herz | Moataz Ahmed
Volume: 1
Issue: 4
Year: 2011
SOLVING SMALL SAMPLE RECIPE GENERATION PROBLEM WITH HYBRID WKRCF-PSO PDF available

Author(s): Mohd Ibrahim Shapiai | Zuwairie Ibrahim | Marzuki Khalid | Lee Wen Jau | Soon-Chuan Ong | Vladimir Pavlovich
Volume: 1
Issue: 4
Year: 2011
PROTECTION OF PERSONAL INFORMATION BASED ON USER PREFERENCE PDF available

Author(s): Kenichi Takahashi | Takanori Matsuzaki | Tsunenori Mine | Takao Kawamura | Kazunori Sugahara
Volume: 1
Issue: 4
Year: 2011
INTEGRATING WORKFLOW-BASED MOBILE AGENTS WITH CLOUD BUSINESS PROCESS MANAGEMENT SYSTEMS PDF available

Author(s): Antons Mislevics | Janis Grundspenkis
Volume: 2
Issue: 4
Year: 2012
CONVERSION STRATEGY OF A SYSTEM OF COLLABORATING DESIGN PATTERNS INTO UML DIAGRAM FOR DESIGN PATTERN PDF available

Author(s): Muhazam Mustapha | Nik Ghazali Nik Daud | Indika Udawatta | Manjula Atapattu
Volume: 1
Issue: 4
Year: 2011
AGENTS BASED ADAPTIVE HYPERMEDIA SYSTEM WITH THE COMPETENCY APPROACH PDF available

Author(s): Jose Sergio Magdaleno-Palencia | Mario Garcia-Valdez | Manuel Castanon-Puga | Bogart Yail Marquez
Volume: 1
Issue: 4
Year: 2011
NEW WINDOWING TECHNIQUE DETECTION OF SAGS AND SWELLS BASED ON CONTINUOUS S-TRANSFORM (CST) PDF available

Author(s): K. Daud | A. F. Abidin | N. Hamzah | H. S. Nagindar Singh
Volume: 2
Issue: 4
Year: 2012
REALIZATION OF IP CORE FOR ROBOT CONTROLLED TRENCHING SYSTEM PDF available

Author(s): C. S. Mala | S. Ramachandran
Volume: 2
Issue: 4
Year: 2012
PERFORMANCE ANALYSIS AND GRID COMPUTING ON WIDE AREA PDF available

Author(s): Gianni Fenu | Marco Nitti | Pier Luigi Pau
Volume: 2
Issue: 4
Year: 2012
Mining Positive and Negative Association Rules: An Approach for Binary Trees PDF available

Author(s): John Tsiligaridis
Volume: 3
Issue: 3
Year: 2013
Management of Temporal System – Column Level PDF available

Author(s): Michal Kvet | Karol Matiaško
Volume: 3
Issue: 3
Year: 2013
Intelligent License Plate Recognition PDF available

Author(s): Charbel Fares
Volume: 3
Issue: 3
Year: 2013
Task Scheduling in Multiprocessor System using Fork-Join Method (TSFJ) PDF available

Author(s): Ranjit Rajak | C.P.Katti
Volume: 3
Issue: 3
Year: 2013
EVALUATING COMPLEXITY OF TASK KNOWLEDGE PATTERNS THROUGH REUSABILITY ASSESSMENT PDF available

Author(s): Cheah WaiShiang | Cheah WaiShiang | Edwin Mit | Azman Bujang Masli
Volume: 1
Issue: 3
Year: 2011
TOWARDS A DYNAMIC FILE INTEGRITY MONITOR THROUGH A SECURITY CLASSIFICATION PDF available

Author(s): Zul Hilmi Abdullah | Nur Izura Udzir | Ramlan Mahmod | and Khairulmizam Samsudin
Volume: 1
Issue: 3
Year: 2011
DYNAMIC LOAD BALANCING POLICY WITH COMMUNICATION AND COMPUTATION ELEMENTS IN GRID COMPUTING WITH MULTI-AGENT SYSTEM INTEGRATION PDF available

Author(s): Bakri Yahaya | Rohaya Latip | Mohamed Othman | Azizol Abdullah
Volume: 1
Issue: 3
Year: 2011
INTEGRATED KMS@EWS OF CONCEPTUAL IMPLEMENTATION MODEL FOR CLINICAL DENGUE FEVER ENVIRONMENT PDF available

Author(s): Norzaliha Mohamad Noor | Rusli Abdullah | Mohd Hasan Selamat
Volume: 1
Issue: 3
Year: 2011
AN EXTENDED SIMULATION OF COMPLEX TASK PARTITIONING METHOD IN ASELF-ORGANIZED ROBOTICS SWARM PDF available

Author(s): Mehrdad Jangjou | Alireza Bagheri | Mohammad Mansour Riahi Kashani | Koosha Sadeghi Oskooyee
Volume: 1
Issue: 3
Year: 2011
OPTIMIZING DECISION TREE IN MALWARE CLASSIFICATION SYSTEM BY USING GENETIC ALGORITHM PDF available

Author(s): Mohd Najwadi Yusoff | Aman Jantan
Volume: 1
Issue: 3
Year: 2011
APPLYING ROUGH SET THEORY IN MULTIMEDIA DATA CLASSIFICATION PDF available

Author(s): M Nordin A Rahman | Yuzarimi M Lazim | Farham Mohamed
Volume: 1
Issue: 3
Year: 2011
BLOG QUALITY MEASUREMENT: ANALYSIS OF CRITERIA USING THE RASCH MODEL PDF available

Author(s): Zuhaira Muhammad Zain | Abdul Azim Abd Ghani | Rusli Abdullah | Rodziah Atan | Razali Yaakob
Volume: 1
Issue: 3
Year: 2011
CLASSIFICATION AND MEASUREMENT ON C OVERFLOW VULNERABILITIES ATTACK PDF available

Author(s): Nurul Haszeli Ahmad | Syed Ahmad Aljunid | Jamalul-lail Ab Manan
Volume: 1
Issue: 3
Year: 2011
SEMANTIC WEB SERVICE COMPOSITION APPROACHES: OVERVIEW AND LIMITATIONS PDF available

Author(s): Furkh Zeshan | Radziah Mohamad
Volume: 1
Issue: 3
Year: 2011
ONE-TIME KEY AND DIAMETER MESSAGE AUTHENTICATION PROTOCOL FOR PROXY MOBILE IPV6 PDF available

Author(s): Md. Mahedi Hassan | Poo Kuan Hoong
Volume: 1
Issue: 3
Year: 2011
FACTORS FOR KMS POST ADOPTION: THE EXPLORATORY STUDY IN OIL AND GAS INDUSTRY IN MALAYSIA PDF available

Author(s): Sureena Matayong | Ahmad Kamil Bin Mahmood
Volume: 1
Issue: 3
Year: 2011
AN EMPIRICAL FRAMEWORK DESIGN TO EXAMINE THE IMPROVEMENT IN SOFTWARE REQUIREMENTS THROUGH NEGOTIATION PDF available

Author(s): Sabrina Ahmad | Noor Azilah Muda
Volume: 1
Issue: 3
Year: 2011
COMPUTATIONALLY INEXPENSIVE SEQUENTIAL FORWARD FLOATING SELECTION FOR ACQUIRING SIGNIFICANT FEATURES FOR AUTHORSHIP INVARIANCENESS IN WRITER IDENTIFICATION PDF available

Author(s): Satrya Fajri Pratama | Azah Kamilah Muda | Yun-Huoy Choo | and Noor Azilah Muda
Volume: 1
Issue: 3
Year: 2011
MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL PDF available

Author(s): Muhammad Qaiser Saleem | Jafreezal Jaafar | Mohd Fadzil Hassan
Volume: 1
Issue: 3
Year: 2011
EXPLORATION ON SCALABILITY OF DATABASE BULK INSERTION WITH MULTITHREADING PDF available

Author(s): Boon-Wee Low | Boon-Yaik Ooi | and Chee-Siang Wong
Volume: 1
Issue: 3
Year: 2011
QOS MEASUREMENT OF SINGLE-HOP PERIODIC COMMUNICATION IN VEHICULAR ENVIRONMENT PDF available

Author(s): Bilal Munir Mughal | Asif Ali Wagan | Halabi Hasbullah
Volume: 1
Issue: 3
Year: 2011
DETECTING SLEEP DEPRIVATION ATTACK OVER MANET USING A DANGER THEORY-BASED ALGORITHM PDF available

Author(s): Maha Abdelhaq | Rosilah Hassan | Mahamod Ismail | Raed Alsaqour | Daud Israf
Volume: 1
Issue: 3
Year: 2011
REUSABILITY ASSESSMENT OF OPEN SOURCE COMPONENTS FOR SOFTWARE PRODUCT LINES PDF available

Author(s): Fazal-e- Amin | Ahmad Kamil Mahmood | Alan Oxley
Volume: 1
Issue: 3
Year: 2011
IEEE802.11A STANDARD PERFORMANCE IN MOBILE ENVIRONMENT PDF available

Author(s): Janis Jansons | Arturs Barancevs | Ernests Petersons | Nikolajs Bogdanovs
Volume: 2
Issue: 3
Year: 2012
ANALYSIS OF FIXED PRIORITY SWAP SCHEDULING POLICY FOR REAL-TIME AND NON REAL-TIME JOBS PDF available

Author(s): Michael Okopa | Tonny Bulega
Volume: 2
Issue: 3
Year: 2012
FACE EXPRESSION RECOGNITION USING AUTOREGRESSIVE MODELS TO TRAIN NEURAL NETWORK CLASSIFIERS PDF available

Author(s): M. Saaidia | A. Gattal | M. Maamri | M. Ramdani
Volume: 2
Issue: 3
Year: 2012
URBAN GROWTH SIMULATION: UTILIZING A MULTIDIMENSIONAL METHODOLOGY PDF available

Author(s): Bogart Yail Marquez | Alejandro Brugues-Rodriguez
Volume: 2
Issue: 3
Year: 2012
ANALYZING THE BASIC PERFORMANCE OF IEEE802.11G/N PDF available

Author(s): Janis Jansons | Toms Dorins | Nikolajs Bogdanovs
Volume: 2
Issue: 3
Year: 2012
SERVICE AVAILABILITY AND ACCESSIBILITY OF REQUIREMENTS USINGCLUSTERING IN CLOUD ENVIRONMENT PDF available

Author(s): Thamilvaani Arvaree Alvar | Rodziah Atan
Volume: 2
Issue: 3
Year: 2012
CONTEDI - APPLICATION DEVELOPMENT FOR TVDI PDF available

Author(s): Adriana X. Reyes G | Gustavo A. Moreno | Jovani Jimenez B.
Volume: 2
Issue: 3
Year: 2012
AUTOMATED REASONING TECHNIQUES FOR SYSTEM CORRECTNESS VERIFICATION PDF available

Author(s): Hasan Krad
Volume: 2
Issue: 3
Year: 2012
EVOLUTIONARY TECHNIQUES IN SYNTHESIS OF MULTIPLE-VALUED LOGIC FUNCTIONS PDF available

Author(s): Mostafa Abd-El-Barr
Volume: 2
Issue: 3
Year: 2012
TRANSFORMING OBJECT ORIENTED DATA MODEL TO RELATIONAL DATA MODEL PDF available

Author(s): Mohd Khalid Awang | Nur Lian Labadu
Volume: 2
Issue: 3
Year: 2012
Adaptive VLSI Architecture of Beam Former for Active Phased Array Radar PDF available

Author(s): D. Govind Rao | N. S. Murthy | A. Vengadarajan
Volume: 3
Issue: 2
Year: 2013
Large Sending Offload: Design and Implementation for High-Speed Communications Rate up to 100 Gbps PDF available

Author(s): Mohamed Elbeshti | Mike Dixon | Terry Koziniec
Volume: 3
Issue: 2
Year: 2013
T-WAY STRATEGIES AND ITS APPLICATIONS FOR COMBINATORIAL TESTING PDF available

Author(s): Rozmie R. Othman | Kamal Z. Zamli
Volume: 1
Issue: 2
Year: 2011
GUIDELINES FOR COLLECTING AND CENTRALIZING NETWORK DIGITAL EVIDENCES PDF available

Author(s): Mohammed Abbas | Azizah Abdul Manaf | Elfadil Sabeil
Volume: 1
Issue: 2
Year: 2011
QUANTIFYING TEXT-BASED PUBLIC€'S EMOTION AND DISCUSSION ISSUES IN ONLINE FORUM PDF available

Author(s): Siti Z. Z. Abidin | Nasiroh Omar | Muhammad H.M. Radzi and Mohammad B.C. Haron
Volume: 1
Issue: 2
Year: 2011
AGENT-BASED MOM INTEROPERABILITY FRAMEWORK FOR INTEGRATION AND COMMUNICATION OF DIFFERENT SOA APPLICATIONS PDF available

Author(s): Najhan M.Ibrahim | Mohd Fadzil Hassan | Zain Balfagih
Volume: 1
Issue: 2
Year: 2011
AUTOMATIC DOCUMENT STRUCTURE ANALYSIS OF STRUCTURED PDF FILES PDF available

Author(s): Rosmayati Mohemad | Abdul Razak Hamdan | Zulaiha Ali Othman | Noor MaizuraMohamad Noor
Volume: 1
Issue: 2
Year: 2011
AN ENHANCED REMOTE AUTHENTICATION SCHEME USING SECURE KEY EXCHANGE PROTOCOL WITH PLATFORM INTEGRITY ATTESTATION PDF available

Author(s): Fazli Bin Mat Nor | Kamarularifin Abd Jalil | Jamalul-lail Ab Manan
Volume: 1
Issue: 2
Year: 2011
REQUIREMENT ELICITATION: IDENTIFYING THE COMMUNICATION CHALLENGES BETWEEN DEVELOPER AND CUSTOMER PDF available

Author(s): Noraini Che Pa | Abdullah Mohd Zin
Volume: 1
Issue: 2
Year: 2011
HUMAN IDENTIFICATION BASED ON EXTRACTED GAIT FEATURES PDF available

Author(s): Hu Ng | Hau-Lee Ton | Wooi-Haw Tan | Timothy Tzen-Vun Yap | Pei-Fen Chong | Junaidi Abdullah
Volume: 1
Issue: 2
Year: 2011
EVALUATION AND SELECTION COTS SOFTWARE PROCESS: THE STATE OF THE ART PDF available

Author(s): Feras Tarawneh | Fauziah Baharom | Jamaiah Hj. Yahaya | Faudziah Ahmad
Volume: 1
Issue: 2
Year: 2011
MITIGATION OF BLACK HOLE ATTACKS FOR AODV ROUTING PROTOCOL PDF available

Author(s): Kamarularifin Abd. Jali | Zaid Ahmad | Jamalul-Lail Ab Manan
Volume: 1
Issue: 2
Year: 2011
A STUDY ON RISK ASSESSMENT FOR SMALL AND MEDIUM SOFTWARE DEVELOPMENT PROJECTS PDF available

Author(s): Abdullahi Mohamud Sharif | Shuib Basri
Volume: 1
Issue: 2
Year: 2011
A SCALABLE BLOCK COMPENSATION WITH INDEX SELECTION MECHANISM TO ACHIEVE HIGH VIDEO QUALITY RETRIEVAL PDF available

Author(s): Ta- Te Lu | Tsung-Hsuan Tsai | Jia-Yuan Wu
Volume: 1
Issue: 2
Year: 2011
A BIO-INSPIRED MUSIC GENRE CLASSIFICATION FRAMEWORK USING MODIFIED AIS-BASED CLASSIFIER PDF available

Author(s): Noor Azilah Draman | Sabrina Ahmad | Azah Kamilah Muda
Volume: 1
Issue: 2
Year: 2011
FUZZY MODELS APPLIED TO COMPLEX SOCIAL SYSTEMS: MODELING POVERTY USING DISTRIBUTED AGENCIES PDF available

Author(s): Bogart Yail Márquez | Manuel Castañon-Puga | Juan R. Castro | Eugenio D. Suarez | José Sergio Magdaleno-Palencia
Volume: 1
Issue: 2
Year: 2011
THE USE OF SOFT COMPUTING FOR MEASURING THE QUALITY OF EDUCATION: PDF available

Author(s): Sergio Valdés-Pasarón | Bogart Yail Márquez | Juan Manuel Ocegueda-Hernández
Volume: 1
Issue: 2
Year: 2011
SHADOW MAPPING OR SHADOW VOLUME? PDF available

Author(s): Hoshang Kolivand | Mohd Shahrizal Sunar
Volume: 1
Issue: 2
Year: 2011
NEURAL NETWORK APPLICATION IN RESERVOIR WATER LEVEL FORECASTING AND RELEASE DECISION PDF available

Author(s): Wan Hussain Wan Ishak | Ku Ruhana Ku-Mahamud | Norita Md Norwawi
Volume: 1
Issue: 2
Year: 2011
AN AGENT TOOL FOR INTEGRATING COMPONENT BASED APPLICATIONS PDF available

Author(s): Ebtehal Alsaggaf | Prof.Dr. Fathy albouraey
Volume: 1
Issue: 2
Year: 2011
COLLABORATION, WEALTH AND VALUE CREATION, SMES€' HALAL PRODUCTS COMMUNITIES, AND INFORMATION SYSTEMS PDF available

Author(s): Alfi Khairiansyah Machfud | Abdul Rahman Ahmad Dahlan | Jawdat Khatib | Ahmed Abdulaziz Haji-Ahmed
Volume: 1
Issue: 2
Year: 2011
COLLABORATIVE LEARNING THROUGH FACIAL EXPRESSION FOR SPECIAL CHILDREN PDF available

Author(s): Nia Valeria | Lau Bee Theng
Volume: 1
Issue: 2
Year: 2011
ANALYSIS OF DELAY PERFORMANCE IN EFFICIENT DBA WITH GLOBAL PRIORITY FOR EPON PDF available

Author(s): Nurul Asyikin Mohamed Radzi | Norashidah Md. Din | Mohammed Hayder AlMansoori | Mohd. Shahmi Abdul Majid
Volume: 1
Issue: 2
Year: 2011
USING SUBTHRESHOLD SRAM TO DESIGN LOW-POWER CRYPTO HARDWARE PDF available

Author(s): Adnan Abdul-Aziz Gutub | Esam Ali Khan
Volume: 1
Issue: 2
Year: 2011
IA-TCP: IMPROVING ACKNOWLEDGEMENT MECHANISM OF TCP FOR BETTER PERFORMANCE IN MANET PDF available

Author(s): Sofiane Hamrioui | Mustapha Lalam | Pascal Lorenz
Volume: 2
Issue: 2
Year: 2012
TURBO CODES FOR PULSE POSITION MODULATION: APPLYING BCJR ALGORITHM ON PPM SIGNALS PDF available

Author(s): Serj Haddad | Chadi Abou-Rjeily
Volume: 2
Issue: 2
Year: 2012
Automatic Control of Configuration of Web Anonymization PDF available

Author(s): Tomas Sochor
Volume: 3
Issue: 2
Year: 2013
A MODIFIED COMPLEX PERMITTIVITY MEASUREMENT TECHNIQUE AT MICROWAVE FREQUENCY PDF available

Author(s): Salah I. Yahya Al-Mously
Volume: 2
Issue: 2
Year: 2012
A SURVEY ON COST ESTIMATION PROCESS IN MALAYSIA SOFTWARE INDUSTRY PDF available

Author(s): Zulkefli Mansor | Zarinah Mohd Kasirun | Saadiah Yahya | Noor Habibah Hj Arshad
Volume: 2
Issue: 2
Year: 2012
CONTINUOUS FUNCTIONING OF SOFT SYSTEM BUS BASED CENTRALIZED PERSISTENT COMPUTING SYSTEM PDF available

Author(s): Quazi Mahera Jabeen | Muhammad Anwarul Azim | Yuichi Goto | Jingde Cheng
Volume: 2
Issue: 2
Year: 2012
STUDY OF THE EFFECTED GENETIC WATERMARKING ROBUSTNESS UNDER DCT AND DWT DOMAINS PDF available

Author(s): Abduljabbar Shaamala | Azizah A. Manaf
Volume: 2
Issue: 2
Year: 2012
DYNAMIC WEIGHT PARAMETER FOR THE RANDOM EARLY DETECTION (RED) IN TCP NETWORKS PDF available

Author(s): Nabhan Hamadneh | David Murray | Michael Dixon | Peter Cole
Volume: 2
Issue: 2
Year: 2012
REALITY OF ALIGNING IT WITH BUSINESS IN CZECH ORGANIZATIONS PDF available

Author(s): Renata Kunstova
Volume: 2
Issue: 1
Year: 2012
PERFORMANCE INVESTIGATIONS OF SOME ACTIVE QUEUE MANAGEMENT TECHNIQUES USING SIMULATION PDF available

Author(s): Hussein Abdel-jaber | Fadi Thabtah | Amjad M Daoud,Jafar Ababneh | Mahmoud Baklizi
Volume: 2
Issue: 1
Year: 2012
A STUDY OF THE TREND OF SMARTPHONE AND ITS USAGE BEHAVIOR IN MALAYSIA PDF available

Author(s): Mohd Azam Osman | Abdullah Zawawi Talib | Zainal Abidin Sanusi | Tan Shiang-Yen | Abdullah Sani Alwi
Volume: 2
Issue: 1
Year: 2012
SUPPLIER SELECTION BASED ON MULTIPLE CRITERIA PDF available

Author(s): Reza Allahyari Soeini | Laleh Tashakor | Javad Tashakori Bafghi | Mohammad Mokhtari | Amin Vakili
Volume: 2
Issue: 1
Year: 2012
EFFICIENT INFORMATION DISSEMINATION AND COLLECTION STRATEGIES FOR WIRELESS SENSOR NETWORKS PDF available

Author(s): S. K. Makki | B. Sun1 | L. Osborne | A. Husain | James Carnley
Volume: 2
Issue: 1
Year: 2012
A META-MODELING AND GRAPH GRAMMAR APPROACH FOR MODELING AND ANALYSIS OF E-ENTREPRENEURSHIP SYSTEMS PDF available

Author(s): Mouna Bouarioua | Allaoua Chaoui | Raida Elmansouri
Volume: 2
Issue: 1
Year: 2012
PUBLICATIONS' CLASSIFICATION ANALYSIS USING CONCEPT LATTICES PDF available

Author(s): Saleh Alwahaishi | Jan Martinovic | Vaclav Snasel
Volume: 2
Issue: 1
Year: 2012
INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USING DNA STEGANOGRAPHY PDF available

Author(s): Mohammad Reza Najaf Torkaman | Nazanin Sadat Kazazi | Azizallah Rouddini
Volume: 2
Issue: 1
Year: 2012
METHOD FOR GENERATING DC-DC CONVERTERS WITH REQUIRED CHARACTERISTICS PDF available

Author(s): Murad Ahmed Ali Taher
Volume: 2
Issue: 1
Year: 2012
EMPLOYING SEMANTIC WEB TECHNOLOGIES IN FINANCIAL INSTRUMENTS TRADING PDF available

Author(s): Dejan Lavbic | Marko Bajec
Volume: 2
Issue: 1
Year: 2012
DNA BASE DATA HIDING ALGORITHM PDF available

Author(s): Mohammad Reza Abbasy | Pourya Nikfard | Ali Ordi | Mohammad Reza Najaf Torkaman
Volume: 2
Issue: 1
Year: 2012
WEB INTERACTIVE MULTIMEDIA TECHNOLOGY: IMPLEMENTATION FROM TWO PERSPECTIVES PDF available

Author(s): Asma Md Ali | Joan Richardson
Volume: 2
Issue: 1
Year: 2012
INTELLIGENT SYSTEM FOR PERSONALIZING STUDENTS' ACADEMIC BEHAVIORS- A CONCEPTUAL FRAMEWORK PDF available

Author(s): Azwa Abdul Aziz | Wan Mohd Rizhan Wan Idris | Hasni Hassan | Julaily Aida Jusoh
Volume: 2
Issue: 1
Year: 2012
CYBER FORENSICS: COMPUTER SECURITY AND INCIDENTRESPONSE PDF available

Author(s): Virginiah Sekgwathe | Mohammad Talib
Volume: 2
Issue: 1
Year: 2012
PUBLISHING WEB SERVICES WHICH ENABLE SYSTEMATIC SEARCH PDF available

Author(s): Vitezslav Nezval
Volume: 2
Issue: 1
Year: 2012
THE INTEGRATION OF ACTUAL AND VIRTUAL LEARNING SPACES IN RURALSCHOOLS PDF available

Author(s): Ken Stevens
Volume: 2
Issue: 1
Year: 2012
ONLINE SURVEYS SYSTEM WITH ENHANCED AUTHENTICATION INTELLIGENCE: A CASE OF ONLINE COURSE EVALUATION SYSTEM PDF available

Author(s): Kosmas Kapis | Sijali Petro Korojelo
Volume: 2
Issue: 1
Year: 2012
SECURE COMMUNICATION BASED ON QI HYPER-CHAOS PDF available

Author(s): Dennis Luke Owuor | Guoyuan Qi
Volume: 2
Issue: 1
Year: 2012
A REDUCED RANK STAP AND STAGGERED PRF FOR MULTIPLE TARGETSITUATIONS PDF available

Author(s): Samira Dib | Mourad Barkat | IEEE Fellow | Jean-Marie Nicolas | Morad Grimes
Volume: 2
Issue: 1
Year: 2012
SESSION TIMEOUT THRESHOLDS IMPACT ON QUALITY AND QUANTITY OF EXTRACTED SEQUENCE RULES PDF available

Author(s): Martin Drlik | Michal Munk
Volume: 2
Issue: 1
Year: 2012
MULTI-PEOPLE TRACKING ACROSS MULTIPLE CAMERAS PDF available

Author(s): Faouzi Alaya Cheikh | Sajib Kumar Saha | Victoria Rudakova | Peng Wang
Volume: 2
Issue: 1
Year: 2012
TRACING ONE NEURON ACTIVITY FROM THE INSIDE OF ITS STRUCTURE PDF available

Author(s): Luciana Morogan
Volume: 2
Issue: 1
Year: 2012
AN ALGORITHM FOR DETECTING CYCLES IN UNDIRECTED GRAPHS USING CUDA TECHNOLOGY PDF available

Author(s): Maytham Safar | Fahad Mahdi | Khaled Mahdi
Volume: 2
Issue: 1
Year: 2012
SINGULAR POINT DETECTION FOR EFFICIENT FINGERPRINT CLASSIFICATION PDF available

Author(s): Ali Ismail Awad | Kensuke Baba
Volume: 2
Issue: 1
Year: 2012
INFRASTRUCTURE SHARING: A COST EFFECTIVE ALTERNATIVE FOR RESILIENCY IN 4G-LTE MOBILE NETWORKS PDF available

Author(s): Venmani Daniel Philip | Yvon GOURHANT | Djamal ZEGHLACHE
Volume: 2
Issue: 1
Year: 2012
COOPERATIVE MECHANISMS TO CARRY AND FORWARD PACKETS IN A DTN VANET PDF available

Author(s): Gianni Fenu | Marco Nitti
Volume: 1
Issue: 1
Year: 2011
SIMPLE DESIGN METHOD OF MIMO MULTIUSER DOWNLINK SYSTEM BASED ON BLOCK-DIAGONALIZATION PDF available

Author(s): T. taniguchi | Y. Karasawa | N. Natajima
Volume: 1
Issue: 1
Year: 2011
MAXIMUM LIKELIHOOD CURVES FOR MULTIPLE OBJECTS EXTRACTION: APPLICATION TO RADIOGRAPHIC INSPECTION FOR WELD DEFECTS DETECTION PDF available

Author(s): Aicha Baya Goumeidane | Mohammed Khamadja | Nafaa Nacereddine
Volume: 1
Issue: 1
Year: 2011
COMBINING STEGANOGRAPHY AND CRYPTOGRAPHY: NEW DIRECTIONS PDF available

Author(s): Khalil Challita | Hikmat Farhat
Volume: 1
Issue: 1
Year: 2011
DIFFERENCES BETWEEN THE ANSWERS OF QUESTIONNAIRE INVESTIGATION AND REAL BEHAVIOR OF THE STUDENTS IN THE E-COURSE FOR HEALTHCARE PDF available

Author(s): Martin Cápay | Zoltán Balogh | Michal Munk | Miroslava Mesárošová
Volume: 1
Issue: 1
Year: 2011
ENHANCEMENT OF LEARNING AND TEACHING IN COMPUTER GRAPHICS THROUGH MARKER AUGMENTED REALITY TECHNOLOGY PDF available

Author(s): Malinka Ivanova | Georgi Ivanov
Volume: 1
Issue: 1
Year: 2011
IMPROVING TRANSPORT PROTOCOL PERFORMANCE IN MANET BY EXPLOITING THE BACKOFF ALGORITHM OF MAC PROTOCOL PDF available

Author(s): Sofiane Hamrioui | Mustapha Lalam
Volume: 1
Issue: 1
Year: 2011
EMPIRICAL INVESTIGATION ON COGNITIVE USER INTERFACE DIMENSIONS PDF available

Author(s): Natrah Abdullah | Wan Adilah Wan Adnan | Nor Laila Md Noor
Volume: 1
Issue: 1
Year: 2011
APPLICATION OF HYBRID WAVELET-FRACTAL COMPRESSION ALGORITHM FOR RADIOGRAPHIC IMAGES OF WELD DEFECTS PDF available

Author(s): Faiza Mekhalfa | Daoud Berkani
Volume: 1
Issue: 1
Year: 2011
AN EFFICIENT TEMPORAL PARTITIONING ALGORITHM TO MINIMIZE COMMUNICATION COST FOR RECONFIGURABLE COMPUTING SYSTEMS PDF available

Author(s): Ramzi. Ayadi | Bouaoui. Ouni | Abdellatif. Mtibaa
Volume: 1
Issue: 1
Year: 2011
METADATA-DERIVED KEYWORDS FOR EFFECTIVE NAVIGATION AND ACCESS IN PERSONAL FILE HIERARCHIES PDF available

Author(s): Gontlafetse Mosweunyane | Leslie Carr | Nicholas Gibbins
Volume: 1
Issue: 1
Year: 2011
A TRAINING BASED TRANSMISSION PERIOD SETTING PROTOCOL PDF available

Author(s): Guangri Jin | Li Gong | Hiroshi Furukawa
Volume: 1
Issue: 1
Year: 2011
EVALUATING SOFTWARE MAINTENANCE TESTING APPROACHES TO SUPPORT TEST CASE EVOLUTION PDF available

Author(s): Othman Mohd Yusop | Suhaimi Ibrahim
Volume: 1
Issue: 1
Year: 2011
DATABASE PREPROCESSING AND COMPARISON BETWEEN DATA MINING METHODS PDF available

Author(s): Yas A. Alsultanny
Volume: 1
Issue: 1
Year: 2011
REVERSIBLE DATA HIDING BASED ON STATISTICAL CORRELATION OF BLOCKED SUB-SAMPLED IMAGE PDF available

Author(s): Mona Nafari | Mansour Nejati Jahromi | Gholam HoseinSheisi
Volume: 1
Issue: 1
Year: 2011
DNA SECURITY USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY PDF available

Author(s): Radu Terec | Mircea-Florin Vaida | Lenuta Alboaie | Ligia Chiorean
Volume: 1
Issue: 1
Year: 2011
A MUTLI-AGENT SYSTEM FOR FIREWALL FORENSICS ANALYSIS PDF available

Author(s): Hassina Bensefia | Nacira Ghoualmi
Volume: 1
Issue: 1
Year: 2011
HEP: CONTEXT-AWARE COMMUNICATION SYSTEM PDF available

Author(s): Bachir Chihani | Emmanuel Bertin | Fabrice Jeanne | Noel Crespi
Volume: 1
Issue: 1
Year: 2011
ASSESSMENT PROCEDURE OF THE EM INTERACTION BETWEEN MOBILE PHONE ANTENNAE AND HUMAN BODY PDF available

Author(s): Salah I. Al-Mously
Volume: 1
Issue: 1
Year: 2011
ULTRA-LOW COMPLEXITY CONTROL MECHANISMS FOR SENSOR NETWORKS AND ROBOTIC SWARMS PDF available

Author(s): Matthias Scheutz | Peter Bauer
Volume: 3
Issue: 1
Year: 2013
PROCESSING XML WITH JAVA – A PERFORMANCE BENCHMARK PDF available

Author(s): Bruno Oliveira | Vasco Santos | Orlando Belo
Volume: 3
Issue: 1
Year: 2013
SCHEDULING TECHNIQUES TO CLASSIFY WEAR PARTICLES ON MULTI-COMPUTERS PDF available

Author(s): Mohammad Shakeel Laghari | Gulzar Ali Khuwaja
Volume: 3
Issue: 1
Year: 2013
STUDY OF THE DYNAMIC RESPONSE AND STATUS OF THE VEHICLE SUSPENSION ELEMENTS PDF available

Author(s): Emil Iontchev | Rosen Miletiev | Vladimir Bashev | Ivaylo Simeonov
Volume: 3
Issue: 1
Year: 2013
MEDICAL IMAGE SEGMENTATION ON A CLUSTER OF PCS USING MARKOV RANDOM FIELDS PDF available

Author(s): El-Hachemi Guerrout | Ramdane Mahiou | Samy Ait-Aoudia
Volume: 3
Issue: 1
Year: 2013
TOOTH-BASED IDENTIFICATION OF INDIVIDUALS PDF available

Author(s): Charbel Fares | Mireille Feghali
Volume: 3
Issue: 1
Year: 2013
REAL TIME INJURY AND RELATED ACTIVITIES MONITORING WITH SINGLE ROTATABLE INFRARED SENSOR PDF available

Author(s): Ong Chin Ann | Lau Bee Theng | Hamid Bagha
Volume: 3
Issue: 1
Year: 2013
TOWARD AN ASPECT-ORIENTED SIMULATION PDF available

Author(s): Meriem Chibani | Brahim Belattar | Abdelhabib Bourouis
Volume: 3
Issue: 1
Year: 2013
Free Forms + CRM     Why do you need a reservation system?