Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Advances in Information Technology

ISSN: 1798--2340
Publisher: ACADEMY PUBLISHER


ADD TO MY LIST
 
A Glimpse into the Research Space of Location Based Services

Author(s): Chen Wei Tan | Mohammod Sazid Zaman Khan | Thilek Silvadorai | Toni Anwar | Sureswaran Ramadass
Volume: 3
Issue: 2
Year: 2012
A Clonal Selection Algorithm Based Tabu Search for Satisfiability Problems

Author(s): Abdesslem Layeb
Volume: 3
Issue: 2
Year: 2012
Feature Optimization and Performance Evaluation of Machine Learning Algorithms for Identification of P2P Traffic

Author(s): Sunil Agrawal | Balwinder S. Sohi
Volume: 3
Issue: 2
Year: 2012
Robust Power Control using Efficient Minimum Variance Beamforming for Cognitive Radio Networks

Author(s): Ummy Habiba | Zahed Hossain | Mohammad Abdul Matin
Volume: 3
Issue: 2
Year: 2012
A Dynamic Bandwidth Assignment Approach Under DDoS Flood Attack

Author(s): Raman Singh | Amandeep Verma
Volume: 3
Issue: 2
Year: 2012
Spread Spectrum Modem for Voice and Data Transmission

Author(s): Md. Abdul Alim
Volume: 3
Issue: 2
Year: 2012
‘Quality & Popularity’ Prediction Modeling of TV Programme through Fuzzy QFD Approach

Author(s): Savitur Prakash | Manuj Darbari
Volume: 3
Issue: 2
Year: 2012
Discovery of Scalable Association Rules from Large Set of Multidimensional Quantitative Datasets

Author(s): Tamanna Siddiqui | M Afshar Aalam | Sapna Jain
Volume: 3
Issue: 1
Year: 2012
Research on Learning Effect based on Outer P- set

Author(s): Xiu-qing Yu
Volume: 3
Issue: 1
Year: 2012
Multivariable control of nonlinear process using soft computing techniques

Author(s): N. Kamala | T. Thyagarajan | S. Renganathan
Volume: 3
Issue: 1
Year: 2012
iiOSProTrain: An Interactive Intelligent Online System for Programming Training

Author(s): Tho Thanh Quan | Phung H Nguyen | Thang H Bui | Thuan Dinh Le | An Nhu Nguyen | Duc L.N. Hoang | Vu Huu Nguyen | Binh Thien Nguyen
Volume: 3
Issue: 1
Year: 2012
Activity Recognition in Ubiquitous Learning Environment

Author(s): Tao Lu | Shaokun Zhang | Qian Hao
Volume: 3
Issue: 1
Year: 2012
A Hybrid Revisit Policy For Web Search

Author(s): Vipul Sharma | Mukesh Kumar | Renu Vig
Volume: 3
Issue: 1
Year: 2012
Metaphorical Interpretation of eLearning in Higher Education Institutions

Author(s): Allah Nawaz
Volume: 3
Issue: 1
Year: 2012
A Prognostics Framework for Health Degradation and Air Pollution Concentrations

Author(s): Bernard Fong | G. Y. Hong
Volume: 3
Issue: 1
Year: 2012
PSO tuned Adaptive Neuro-fuzzy Controller for Vehicle Suspension Systems

Author(s): Rajeswari Kothandaraman | Lakshmi Ponnusamy
Volume: 3
Issue: 1
Year: 2012
Design and Realization of Virtual Classroom

Author(s): Rong Zhu | Yong Wang
Volume: 3
Issue: 1
Year: 2012
The Utilization of Web2.0 Functionalities on E-Commerce Web Sites

Author(s): Yong-Mi Kim | Suliman Hawamdeh
Volume: 2
Issue: 4
Year: 2011
Customer Interaction 2.0: Adopting Social Media as Customer Service Channel

Author(s): Michaela Geierhos
Volume: 2
Issue: 4
Year: 2011
On Performance Evaluation of Mining Algorithm for Multiple-Level Association Rules based on Scale-up Characteristics

Author(s): Suraj K Srivastava | Harsh K Verma | Deepti Gupta
Volume: 2
Issue: 4
Year: 2011
Inferring Asymmetry of Inhabitant Flow using Call Detail Records

Author(s): Santi Phithakkitnukoon | Carlo Ratti
Volume: 2
Issue: 4
Year: 2011
An Efficient Technique for Detection of Suspicious Malicious Web Site

Author(s): K. Pragadeesh Kumar | N. Jaisankar | N. Mythili
Volume: 2
Issue: 4
Year: 2011
Investigation of MQAM and MPSK with EGC in Generalized Flat-Fading Channels

Author(s): Jyoteesh Malhotra
Volume: 2
Issue: 4
Year: 2011
The Impact of the New Web 2.0 Technologies in Communication, Development, and Revolutions of Societies

Author(s): Ashraf Darwish | Kamaljit I. Lakhtaria
Volume: 2
Issue: 4
Year: 2011
Building Machine Learning Based Senti-word Lexicon for Sentiment Analysis

Author(s): Alaa Hamouda | Mahmoud Marei | Mohamed Rohaim
Volume: 2
Issue: 4
Year: 2011
Guest Editorial

Author(s): Kamaljit I. Lakhtaria
Volume: 2
Issue: 4
Year: 2011
Explaining Human Behavior in Dynamic Tasks through Reinforcement Learning

Author(s): Varun Dutt
Volume: 2
Issue: 3
Year: 2011
A Novel History based Weighted Voting Algorithm for Safety Critical Systems

Author(s): Phanikumar Singamsetty | SeethaRamaiah Panchumarthy
Volume: 2
Issue: 3
Year: 2011
Guest Editorial

Author(s): Deepak Garg
Volume: 2
Issue: 3
Year: 2011
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations

Author(s): N.R. Sunitha | B.B. Amberker
Volume: 2
Issue: 3
Year: 2011
Efficient Refinery Scheduling Heuristic in Heterogeneous Computing Systems

Author(s): Sunita Bansal | Chittaranjan Hota
Volume: 2
Issue: 3
Year: 2011
Differential Geometric Approach to Change Detection Using Remotely Sensed Images

Author(s): N Panigrahi | B K Mohan | G Athithan
Volume: 2
Issue: 3
Year: 2011
Hybrid Personalized Recommender System Using Fast K-medoids Clustering Algorithm

Author(s): Subhash K. Shinde | Uday V. Kulkarni
Volume: 2
Issue: 3
Year: 2011
Improvement in RSA Cryptosystem

Author(s): Seema Verma | Deepak Garg
Volume: 2
Issue: 3
Year: 2011
Securing Retinal Template Using Quasigroups

Author(s): N. Radha | T. Rubya | S. Karthikeyan
Volume: 2
Issue: 2
Year: 2011
Defense Strategy Using Trust Based Model to Mitigate Active Attacks in DSR Based MANET

Author(s): N. Bhalaji | A. Shanmugam
Volume: 2
Issue: 2
Year: 2011
Components Based Key Management Algorithm for Storage Area Networks

Author(s): P. Mahalingam | Dr. N. Jayaprakash | Dr. S. Karthikeyan
Volume: 2
Issue: 2
Year: 2011
Analysis of Open Environment Sign-in Schemes-Privacy Enhanced & Trustworthy Approach

Author(s): Zubair Ahmad Khattak | Jamalul-lail Ab Manan | Suziah Sulaiman
Volume: 2
Issue: 2
Year: 2011
Guest Editorial

Author(s): Karthikeyan Subramainan
Volume: 2
Issue: 2
Year: 2011
A Fault-Tolerant Routing Protocol for Mobile Ad Hoc Networks

Author(s): Rana Ejaz Ahmed
Volume: 2
Issue: 2
Year: 2011
Emerging Intuitionistic Fuzzy Classifiers for Intrusion Detection System

Author(s): Kavitha B | Karthikeyan Subramanian | Sheeba Maybell P
Volume: 2
Issue: 2
Year: 2011
Security Model for TCP/IP Protocol Suite

Author(s): Anand Kumar | S. Karthikeyan
Volume: 2
Issue: 2
Year: 2011
Design Research of an Adaptive-Fuzzy-Neural Controller

Author(s): Peifeng Niu | Guoqiang Li | Mizhe Zhang
Volume: 2
Issue: 2
Year: 2011
Using Materialized Views to Enhance a Traceable P2P Record Exchange Framework

Author(s): Fengrong Li | Yoshiharu Ishikawa
Volume: 2
Issue: 1
Year: 2011
PM4SWS: A P2P Model for Semantic Web Services Discovery and Composition

Author(s): Mohamed Gharzouli | Mahmoud Boufaida
Volume: 2
Issue: 1
Year: 2011
Load Balancing in P2P Networks: Using Statistics to Fight Data and Execution Skew

Author(s): Daniel Warneke | Christian Dannewitz
Volume: 2
Issue: 1
Year: 2011
An ACO Algorithm for Effective Cluster Head Selection

Author(s): Amritha Sampath | Tripti C | Sabu M. Thampi
Volume: 2
Issue: 1
Year: 2011
Complex Queries in P2P Networks with Resource-Constrained Devices

Author(s): Christian Dannewitz | Thorsten Biermann | Martin Dräxler | Holger Karl
Volume: 2
Issue: 1
Year: 2011
Guest Editorial

Author(s): Sabu M. Thampi
Volume: 2
Issue: 1
Year: 2011
Prediction of Number of Zombies in a DDoS Attack using Polynomial Regression Model

Author(s): B. B. Gupta | R. C. Joshi | Manoj Misra
Volume: 2
Issue: 1
Year: 2011
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Rapperswil
Tango Rapperswil