Enhanced key Generation Scheme based Cryptography with DNA Logic

Author(s): Bibhash Roy | Gautam Rakshit | Ritwik Chakraborty
Volume: 1
Issue: 8
Year: 2011





Policy Guidelines and Challenges in Quality Assurance in Distance Learning in Kenyan Public Universities

Author(s): Betty Mayeku | Odera Florence
Volume: 1
Issue: 8
Year: 2011





Using Program Visualization to Improve ICT skills towards achieving Vision 2030

Author(s): Mutua M. Stephen | Wabwoba Franklin | Ogao J. Patrick | Abenga Elizabeth | Juma Kilwake
Volume: 1
Issue: 8
Year: 2011





An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice

Author(s): Ruisong Ye | Wei Zhou
Volume: 1
Issue: 8
Year: 2011





Design of Reversible Fault Tolerant Programmable Logic Arrays with Vector Orientation

Author(s): Rubaia Rahman | Lafifa Jamal | Hafiz Md. Hasan Babu
Volume: 1
Issue: 8
Year: 2011





Compression of High-dimensional Data Spaces Using Non-differential Augmented Vector Quantization

Author(s): Aderemi A. Atayero | Adeyemi A. Alatishe | Oludayo O. Olugbara
Volume: 1
Issue: 8
Year: 2011





Potential E-Commerce Adoption Strategies For Libyan Organization

Author(s): Abdulghader.A.Ahmed | Dalbir S | Ibrahim M
Volume: 1
Issue: 7
Year: 2011





Development of a Framework for Computerized Health Management Information Systems in Nigeria

Author(s): SOBOWALE, A. A | OLABIYISI, S.O. | ABDUL-HAMEED, T. A.
Volume: 1
Issue: 7
Year: 2011





3GPP Long Term Evolution: Architecture, Protocols and Interfaces
Author(s): Aderemi A. Atayero | Matthew K. Luka | Martha K. Orya | Juliet O. Iruemi
Volume: 1
Issue: 7
Year: 2011




The Role of Wireless Technologies in taking Education to Rural Villages in Developing Countries

Author(s): Franklin Wabwoba | Kelvin K. Omieno | Carolyne N. Simiyu | Zipporah W. Sisung
Volume: 1
Issue: 7
Year: 2011





Adaptability of Intranet Grids in HEIs to Leverage Dream of Africa Connect

Author(s): Omieno K kelvin | Karume M. Simon
Volume: 1
Issue: 7
Year: 2011





Phishing Websites Detection based on Phishing Characteristics in the Webpage Source Code

Author(s): Mona Ghotaish Alkhozae | Omar Abdullah Batarfi
Volume: 1
Issue: 6
Year: 2011





A Proposed Method for Contour Extraction of an Image Based On Self-Affine Mapping System by Fractal Coding

Author(s): Sri Shimal Das | Dibyendu Ghoshal
Volume: 1
Issue: 6
Year: 2011





Compact and Low Profile Antenna for Satellite Digital Audio Radio Application

Author(s): B.T.P.Madhav | N.V.K.Ramesh | K. Sarat Kumar | K.V.L.Bhavani | P. Rakesh Kumar | Bhavishya Ramineni
Volume: 1
Issue: 6
Year: 2011





Survey of Routing Protocols for Mobile Ad-hoc Network

Author(s): Humayun Bakht
Volume: 1
Issue: 6
Year: 2011





Information Technology Research in Developing Nations: Major Research Methods and Publication Outlet

Author(s): Franklin Wabwoba | Anselimo Peters Ikoha
Volume: 1
Issue: 6
Year: 2011





Special Type of Circuit Dual Hypergraph

Author(s): Bornali Gogoi | Bichitra Kalita
Volume: 1
Issue: 6
Year: 2011





Controlling and securing a Digital Home using Multiple Sensor Based Perception system Integrated with Mobile and Voice technology

Author(s): Avishek Ahmed | Tanvir Ahmed | Md. Samawat Ullah | Md. Manirul Islam
Volume: 1
Issue: 5
Year: 2011





Predicting Software Build Failure Using Source Code Metrics

Author(s): Andy M. Connor | Jacqui Finlay
Volume: 1
Issue: 5
Year: 2011





Are Students Ready to Adopt E-Learning? A Preliminary E-readiness Study of a University in the Gulf Region

Author(s): Abdallah Tubaishat | Azzedine Lansari
Volume: 1
Issue: 5
Year: 2011





Automatically Detecting Relevant Technical Teams for Requested Issues in Issue Tracking Systems by Using Semantic Web Technology

Author(s): Mohamed Kholief | Yasser Fouad | Mohamed Hassan
Volume: 1
Issue: 5
Year: 2011





Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian E-Banking System

Author(s): Sri Shimal Das | Smt. Jhunu Debbarma
Volume: 1
Issue: 5
Year: 2011





An Assessment of Quality of Service (QoS) In Voice Communications over Four GSM Networks in Lagos and Oyo States of Nigeria

Author(s): T. O. OYEBISI | T. A. ABDUL-HAMEED
Volume: 1
Issue: 5
Year: 2011





The Role of Heads of Department in the implementation of Computer Integrated Education in Secondary schools in Nyanza Province, Kenya
Author(s): Florence Y. Odera
Volume: 1
Issue: 5
Year: 2011




Challenges in the use of Scientific Calculators in the Teaching and Learning Mathematics in Secondary School Education

Author(s): Florence Y. Odera
Volume: 1
Issue: 5
Year: 2011





Computer Education Policy and its Implementation in Kenyan Secondary Schools

Author(s): Florence Y. Odera
Volume: 1
Issue: 5
Year: 2011





Integrating Computer Science Education in Kenyan Secondary Schools

Author(s): Florence Y. Odera
Volume: 1
Issue: 5
Year: 2011





ePortfolio: Expanding the Information Technology Vision to Serve as a Capstone in an Outcome-Based University

Author(s): Abdallah Tubaishat
Volume: 1
Issue: 4
Year: 2011





QoS Routing using OLSR with Optimization for Flooding

Author(s): Suman Banik | Bibhash Roy | Parthi Dey | Nabendu Chaki | Sugata Sanyal
Volume: 1
Issue: 4
Year: 2011





Pattern Emission by Nobelium Streams

Author(s): SarathChand P.V | VenuMadhav K | Nagamani K | Jyotsna A | Benarji T
Volume: 1
Issue: 4
Year: 2011





Improving the Performance of Least Significant Bit Substitution Steganography against Rs Steganalysis by Minimizing Detection Probability

Author(s): Vijay Kumar Sharma | Vishal Shrivastava
Volume: 1
Issue: 4
Year: 2011





Data Retrieval and Gaining Optimistic Nepotism Samples

Author(s): SarathChand P.V | Balraju M | Bhukya Shankar Nayak | Rambabu Pemula | Suryaprakash G
Volume: 1
Issue: 3
Year: 2011





A New Weighted Composite Complexity Measure for Object-Oriented Systems

Author(s): Usha Chhillar | Shuchita Bhasin
Volume: 1
Issue: 3
Year: 2011





Implementation of Data Mining Techniques for Meteorological Data Analysis (A case study for Gaza Strip)

Author(s): Sarah N. Kohail | Alaa M. El-Halees
Volume: 1
Issue: 3
Year: 2011





A plan of M-Library for Smt. Hansa Mehta Library: A study

Author(s): Mayank Trivedi | Vishnu Suthar
Volume: 1
Issue: 3
Year: 2011





A Risk Management Decision Support System for the Real Estate Industry

Author(s): Raul Valverde
Volume: 1
Issue: 3
Year: 2011





A Roadmap for Transitioning an Information Assurance Program and Others to Cloud Computing

Author(s): Samir Tout
Volume: 1
Issue: 3
Year: 2011





Artificial Life Simulation in Bioinformatics

Author(s): MABAYOJE M.A | MUFTAU O. W | ABIKOYE O.C
Volume: 1
Issue: 3
Year: 2011





China’s Media Regulations and Its Political Right to Enforce: Conflict with Foreign Correspondents
Author(s): Young Joon Lim
Volume: 1
Issue: 3
Year: 2011




An Approach for Alleviating the Starvation Problem in Road Side Units (RSUs)-based Vehicular Ad Hoc Networks(VANETs)

Author(s): Syeda Khairunnesa Samantha | Nusrat Nur Afrose Shoma | K. M. Azharul Hasan
Volume: 2
Issue: 2
Year: 2012





A Method for Lung Boundary Detection

Author(s): Samir Kumar Bandyopadhyay
Volume: 2
Issue: 2
Year: 2012





Performance of SOA for Information Retrieval System Using Web Services

Author(s): Thippeswamy.K | Manjaiah.D.H
Volume: 2
Issue: 2
Year: 2012





Mining Educational Data to Improve Students’ Performance: A Case Study

Author(s): Mohammed M. Abu Tair | Alaa M. El-Halees
Volume: 2
Issue: 2
Year: 2012





Improved Fisher Face Approach for Human Recognition System using Facial Biometrics

Author(s): Vijayshree More | Abhay Wagh
Volume: 2
Issue: 2
Year: 2012





Characterization of TDMA and W-CDMA Performance based on their Key Performance Indicators (KPIs)

Author(s): Emuoyibofarhe O.J | Oladosu J. B. | Ogunleye O | Alamu F.O
Volume: 2
Issue: 2
Year: 2012





Antecedents of Trust and Its Impact on Loyalty: An Empirical Study on E-Commerce's Customer in Surabaya

Author(s): Sumarto | Prasetyo Hadi | Eko Purwanto | Dewi Khrisna
Volume: 2
Issue: 2
Year: 2012





Optical Computing Alternative for High Speed Interconnectivity and Storage

Author(s): B.Vasavi | Ch.Bhargava | K.Hemanth Chowdary
Volume: 2
Issue: 2
Year: 2012





A Brief Survey on Architecture, Challenges & Security Benefit in Cloud Computing

Author(s): Ajith Singh. N | Vasanthi.V | M. Hemalatha
Volume: 2
Issue: 2
Year: 2012





Cloud Computing for Academic Environment

Author(s): Ajith Singh. N | M. Hemalatha
Volume: 2
Issue: 2
Year: 2012





Preliminary Study to Investigation the Determinants that Effect IS/IT Outsourcing

Author(s): Abdul Hafeez-Baig | Raj Gururajan
Volume: 1
Issue: 2
Year: 2011





Dealing with Occlusion with Partial Visibility

Author(s): Ahmed Ridwanul Islam | Mohammad Saidur Rahman | Mohammad Saiedur Rahaman
Volume: 1
Issue: 2
Year: 2011





A Survey of Methods to mitigate Selfishness in Mobile Ad hoc Networks

Author(s): Sangheethaa Sukumaran | Venkatesh. J | Arunkorath
Volume: 1
Issue: 2
Year: 2011





A Framework for Improving Target Marketing Using Collaborative Data Mining Approach

Author(s): Vishal Shrivastava | Rajesh Boghey | Bhupendra Verma
Volume: 1
Issue: 2
Year: 2011





A Coverage aware Clustering Scheme for power constrained Wireless Sensor Networks

Author(s): Namrata S. Baghele | K.N. Hande
Volume: 1
Issue: 2
Year: 2011





Recent Progress of LiNbO3 Based Electrooptic Modulators with Non Return to Zero (NRZ) Coding in High Speed Photonic Networks

Author(s): Abd El–Naser A. Mohamed | Mohamed A. Metawe'e Ahmed Nabih Zaki Rashed | Amira M. Bendary
Volume: 1
Issue: 2
Year: 2011





I’m Leaving the IT Field: the Impact of Stress, Job Insecurity, and Burnout on IT Professionals

Author(s): Jordan Shropshire | Christopher Kadlec
Volume: 2
Issue: 1
Year: 2012





Favoring Short Flows Without Punishing Long Flows for the Internet Traffic Performance Improvement

Author(s): Y.Suresh | S.Arumugam | M.A.Bhagyaveni
Volume: 2
Issue: 1
Year: 2012





The Teacher’s Role in Promoting Online Peer Group Learning

Author(s): Md Kabirul Islam | Colleen Vale
Volume: 2
Issue: 1
Year: 2012





Brain Computer Interface with Genetic Algorithm

Author(s): Abdolreza. Asadi Ghanbari | Ali Broumandnia | Hamidreza Navidi | Ali.Ahmadi
Volume: 2
Issue: 1
Year: 2012





An Extension of UML Modeling for Web Hypermedia Design: A Case Study

Author(s): Azrul Hazri Jantan
Volume: 2
Issue: 1
Year: 2012





Use of Information & Communication Technology (ICT) in Tertiary Education in Ghana: A Case Study of Electronic Learning (E-Learning)

Author(s): Nana Yaw Asabere | Samuel Edusah Enguah
Volume: 2
Issue: 1
Year: 2012





Integration of Expert Systems in Mobile Learning

Author(s): Nana Yaw Asabere | Samuel Edusah Enguah
Volume: 2
Issue: 1
Year: 2012





Current Status of E-Health in Kenya and Emerging Global Research Trends

Author(s): Kilwake Juma | Matoke Nahason | Waliaro Apollo | Wanyembi Gregory | Ogao Patrick
Volume: 2
Issue: 1
Year: 2012





Regular (Landline) Phone Company versus Cellular Phone Company: The Non-Cooperative Case

Author(s): Tchai Tavor | Uriel Spiegel
Volume: 2
Issue: 1
Year: 2012





The Information Technology (IT) Adoption Process and E- Readiness to Use within Yogyakarta Indonesian Small Medium Enterprises (SME)

Author(s): Muafi, R. Hendri Gusaptono | M. Irhas Effendi | Novrido Charibaldi
Volume: 2
Issue: 1
Year: 2012





Content Based Image Retrieval Methods Using Graphical Image Retrieval Algorithm (GIRA)

Author(s): P.Jayaprabha | Rm.Somasundaram
Volume: 2
Issue: 1
Year: 2012





Integrating Virtual Worlds and Virtual Learning Environments in Schools in Developing Economies

Author(s): Omieno K. Kelvin | Wanyembi Gregory | Mbugua M. Samuel
Volume: 2
Issue: 1




Morphological Edge Detection Algorithm Based on Multi-Structure Elements of Different Directions

Author(s): C.NagaRaj | S.NagaMani | G.rakesh Prasad | S.Sunitha
Volume: 1
Issue: 1
Year: 2011





The Enterprise Content Management can develop the Organizational Value through Knowledge Management

Author(s): Aless andro Zardin | Lapo Mola | Cecilia Rossignoli
Volume: 1
Issue: 1
Year: 2011





E-Learning for Car Faulty Diagnosis

Author(s): Adsavakulchai S | Ngamdumrongkiat N | Chuchirdkiatskul E
Volume: 1
Issue: 1
Year: 2011





A New Algorithm for Static Task Scheduling For Heterogeneous Distributed Computing Systems

Author(s): Nirmeen A. Bahnasawy | Fatma Omar | Magdy A. Koutb | Mervat Mos
Volume: 1
Issue: 1
Year: 2011





One-Level Buffer for Call Admission Control in Mobile Cellular Systems

Author(s): Ojesanmi O.A | Ojesanmi S.O | Oyebisi T.O | Odim M
Volume: 1
Issue: 1
Year: 2011





Performance of UMTS Interworking with WLAN to Provide Consistent Services

Author(s): S. NandaKumar | Praveen Kumar | Nagendran N.
Volume: 1
Issue: 1
Year: 2011




