Developing Economies and Cloud Security: A Study of Africa

Author(s): Mathias Mujinga
Volume: 3
Issue: 8
Year: 2012





Rule Based Hindi to Urdu Transliteration System

Author(s): Bushra Baig | M.Kumar | Sujoy Das
Volume: 3
Issue: 8
Year: 2012





Stabilization of Motion of the Segway

Author(s): Houtman P. Siregar | Yuri G. Martynenko
Volume: 3
Issue: 8
Year: 2012





Management Strategies for Integrating Cloud Computing into VoIP

Author(s): Floriana GEREA | Drd Adrian Ghencea
Volume: 3
Issue: 8
Year: 2012





The Level of Usage of Computer and The Internet by Teenage Girls in Ghana

Author(s): Henry Osborn Quarshie
Volume: 3
Issue: 8
Year: 2012





A Composite Scheduling Approach for Burst Loss Minimization in Optical Burst Switched Networks

Author(s): Laxman D. Netak | Girish V. Chowdhary | Jyoti G. Borade | Vinay Suryawanshi
Volume: 3
Issue: 8
Year: 2012





Broadband Internet and Czech Competitive Advantage

Author(s): Amir Manzoor
Volume: 3
Issue: 8
Year: 2012





Software Quality Management System

Author(s): Waqar Ul-Hasnain | Shahbaz Ahmad
Volume: 3
Issue: 8
Year: 2012





An Audio Haptic Tool for Visually Impaired Web Users

Author(s): Catherine A. Todd | Ammara Rounaq | Umm Kulsum Nur | Fadi Boufarhat
Volume: 3
Issue: 8
Year: 2012





Development of a new Arabic Sign Language Recognition Using K-Nearest Neighbor Algorithm

Author(s): Prof. Reyadh Naoum | Dr.Hussein H. Owaied, | Shaimaa Joudeh
Volume: 3
Issue: 8
Year: 2012





Flight Data Analyzer using Twitter

Author(s): Brandeis Marshall | Mary Johnson | Aditi Magikar | Anuya Ghanekar | Ian Mathew | Ludovic Delaveau | Raghava Budhiraju | Ramya Chapparala
Volume: 3
Issue: 8
Year: 2012





Genetic Algorithm Rule-Based Intrusion Detection System (GAIDS)

Author(s): A.A. Ojugo | A.O. Eboka | O.E. Okonta | R.E Yoro | F.O. Aghware
Volume: 3
Issue: 8
Year: 2012





Understanding the Factors that Effect Information Overload and Miscommunication within the Workplace

Author(s): Dr. Thomas W. Jackson | Dr. Bart van den Hooff
Volume: 3
Issue: 8
Year: 2012





The Economic Impact of Computer virus - A case of Ghana

Author(s): Henry Osborn Quarshie | Godfred Yaw Koi-Akrofi | Alexander Martin- Odoom
Volume: 3
Issue: 8
Year: 2012





Comparison of Survival Studies for Some Parametric Distributions Models for the Breast Cancer Data Using Maximum Likelihood Method

Author(s): KHAN K. H | SALEEM M
Volume: 3
Issue: 8
Year: 2012





IEEE 802.11s Wireless Mesh Networks for Last-mile Internet Access: An Up- Down Link Approach

Author(s): Mohamed RiduanAbid | Taha Ben Brahim | Maen Al Assaf | TajjeeddineRachidi | Saad Biaz
Volume: 3
Issue: 6
Year: 2012





Online Social Networking as a Tool to Enhance Learning in the Mauritian Education System

Author(s): Kavi Kumar Khedo | Sheik Mohammad Roushdat Ally Elaheebocus | Asslinah Mocktoolah | Rajen Suntoo
Volume: 3
Issue: 6
Year: 2012





Comparison and Analysis of Content Based Image Retrieval Systems Based On Relevance Feedback

Author(s): Latika Pinjarkar | Manisha Sharma | Kamal Mehta
Volume: 3
Issue: 6
Year: 2012





Architectural Analysis of Multi-Agents Educational Model in Web-Learning Environments

Author(s): Majida Ali Abed Al_Asadi | Yousif A. Al_Asadi | H. A. Al_Asadi
Volume: 3
Issue: 6
Year: 2012





An Integrated Success Model for Evaluating Information System in Public Sectors

Author(s): Abdel Nasser H. Zaied
Volume: 3
Issue: 6
Year: 2012





Generating A New Group Digital Signatures

Author(s): Dr. Abdulameer Khalaf Hussein
Volume: 3
Issue: 6
Year: 2012





Feeling Marginalized: Turnover of Public-Sector It Professionals

Author(s): Dr. Jordan Shropshire | Dr. Christopher Kadlec
Volume: 3
Issue: 6
Year: 2012





Data Mining and Wireless Sensor Network for Groundnut Pest Thrips Dynamics and Predictions

Author(s): A. K. Tripathy | J. Adinarayana | S. N. Merchant | U. B. Desa | Vijayalakshmi | D. RajiReddy | S. Ninomiya | M. Hirafuji | T. Kiura
Volume: 3
Issue: 6
Year: 2012





A Secured and Semantically Addressed E-Mail Service

Author(s): ETENG | Idongesit.E | OSOFISAN | Adenike O | AMADI, J.C.
Volume: 3
Issue: 6
Year: 2012





An Anomaly Detector for Keystroke Dynamics Based on Medians Vector Proximity

Author(s): Mudhafar M. Al-Jarrah
Volume: 3
Issue: 6
Year: 2012





Current Arabic (Hindi) Hand Written Numbers Segmentaion and Recognition Advance ImageProcessing and Neural Network

Author(s): Marwan A. Abu-Zanona | Bassam M. El-Zaghmouri
Volume: 3
Issue: 6
Year: 2012





Assessing the Catalyst and the Barriers to Rural Community Based Telecentre Usage

Author(s): Abdulwahab | L Zulkhairi Md Dahalin
Volume: 3
Issue: 6
Year: 2012





A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems

Author(s): Dr Nashaat el-Khameesy | Hossam Abdel Rahman
Volume: 3
Issue: 6
Year: 2012





Investigation of Cross Gain Modulation in Quantum-Dot Amplifier Using Four-Level Rate Equations Model

Author(s): R. S. Fyath | Abdul Kareem H | Dagher, Hussein H. Warid
Volume: 3
Issue: 6
Year: 2012





Exploring Cloud Computing Services and Applications

Author(s): Ahmed E. Youssef
Volume: 3
Issue: 6
Year: 2012





Trends in Web-Based Search Engine

Author(s): Kuyoro Shade O | Okolie Samuel O | Kanu Richmond U | Awodele Oludele
Volume: 3
Issue: 6
Year: 2012





Behavioral Intention to Accept and Use ICT in Public University: Integrating Quantitative and Qualitative Data

Author(s): Oye | N. D, A.Iahad | N, Ab.Rabin, N
Volume: 3
Issue: 6
Year: 2012





Simple, Fast and Synchronous Hybrid Scaling Scheme for the 8-bit Moduli Set

Author(s): Azadeh Safari | Yinan Kong
Volume: 3
Issue: 6
Year: 2012





New Multiband Design Using Chebhyshev Distribution For Broadband & Military Applications

Author(s): P.Poorna priya | G.Anupama | K.Pavan kumar | Habibullah khan
Volume: 3
Issue: 6
Year: 2012





Improving Virus C type 4 Interferon using Bioinformatics Techniques

Author(s): Attalah Hashad | Khaled Kamal, | Ahmed Fahmy, | Amr Badr
Volume: 3
Issue: 6
Year: 2012





Comparative Study of Gaussian and Nearest Mean Classifiers for Filtering Spam E-mails

Author(s): Upasna Attri | Harpreet Kaur
Volume: 3
Issue: 5
Year: 2012





Marketing Infrastructure for Kola-Nut in Ika Local Government Area of Delta State, Nigeria

Author(s): E.N. Ajani and E.A | Onwubuya
Volume: 3
Issue: 5
Year: 2012





Numerical and Chaotic Analysis of CHUA'S CIRCUT

Author(s): Dr. Maysoon M. Aziz | Mansour N. faraj
Volume: 3
Issue: 5
Year: 2012





Performance Analysis of Parallelizing Program Code for Multi-Core Architectures Using OPENMP

Author(s): Neha Agrawal | Ruchira Datta M Rajasekhara Babu | Ch. Pradeep Reddy | Y.Shabber Ali
Volume: 3
Issue: 5
Year: 2012





LSPC: An Algorithm for Inference of Gene Networks Using Bayesian Network

Author(s): Ali Ebrahimi, | Rosa Aghdam | Parisa Niloofar | Mojtaba Ganjali,
Volume: 3
Issue: 5
Year: 2012





The Research on the Analysis of the Redundant Data

Author(s): Tan Shunhua | Chen Miao
Volume: 3
Issue: 5
Year: 2012





The Impact of Computer Technology on the Development Of Children In Ghana

Author(s): Henry Osborn Quarshie
Volume: 3
Issue: 5
Year: 2012





Software Models, Extensions and Independent Models in Cocomo Suite: A Review

Author(s): Syed Ali Abbas | Saleem Ullah Lar | Xiaofeng Liao | Raja Aftab Naseem
Volume: 3
Issue: 5
Year: 2012





Analyses of Student Programming Errors In Java Programming Courses

Author(s): Ioana Tuugalei Chan Mow
Volume: 3
Issue: 5
Year: 2012





The Role of Requirement Engineering in Software Development Life Cycle

Author(s): Abhijit Chakraborty | Mrinal Kanti Baowaly | Ashraful Arefin | Ali Newaz Bahar
Volume: 3
Issue: 5
Year: 2012





DNA-Based Active Logic Design and Its Implications

Author(s): Christy M. Gearheart | Eric C. Rouchka | Benjamin Arazi
Volume: 3
Issue: 5
Year: 2012





Characterizing the Utilization of Knowledge Transferred in Software Architecture Development

Author(s): Salfarina | A, Marzanah | A. J.Sazly, A.
Volume: 3
Issue: 5
Year: 2012





Exploring Factors That Influence Knowledge Sharing Behavior via Computer

Author(s): Majid Zamiri | Dr. Shadiya Mohamed S. Baqutayan
Volume: 3
Issue: 5
Year: 2012




