Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Information and Communication Technology Research

ISSN: 2223--4985
Publisher: IRPN Publishers


ADD TO MY LIST
 
An Approach for Alleviating the Starvation Problem in Road Side Units (RSUs)-based Vehicular Ad Hoc Networks(VANETs) PDF available

Author(s): Syeda Khairunnesa Samantha | Nusrat Nur Afrose Shoma | K. M. Azharul Hasan
Volume: 2
Issue: 2
Year: 2012
Performance of SOA for Information Retrieval System Using Web Services PDF available

Author(s): Thippeswamy.K | Manjaiah.D.H
Volume: 2
Issue: 2
Year: 2012
Improved Fisher Face Approach for Human Recognition System using Facial Biometrics PDF available

Author(s): Vijayshree More | Abhay Wagh
Volume: 2
Issue: 2
Year: 2012
Mining Educational Data to Improve Students’ Performance: A Case Study PDF available

Author(s): Mohammed M. Abu Tair | Alaa M. El-Halees
Volume: 2
Issue: 2
Year: 2012
Characterization of TDMA and W-CDMA Performance based on their Key Performance Indicators (KPIs) PDF available

Author(s): Emuoyibofarhe O.J | Oladosu J. B. | Ogunleye O | Alamu F.O
Volume: 2
Issue: 2
Year: 2012
Cloud Computing for Academic Environment PDF available

Author(s): Ajith Singh. N | M. Hemalatha
Volume: 2
Issue: 2
Year: 2012
A Brief Survey on Architecture, Challenges & Security Benefit in Cloud Computing PDF available

Author(s): Ajith Singh. N | Vasanthi.V | M. Hemalatha
Volume: 2
Issue: 2
Year: 2012
Antecedents of Trust and Its Impact on Loyalty: An Empirical Study on E-Commerce's Customer in Surabaya PDF available

Author(s): Sumarto | Prasetyo Hadi | Eko Purwanto | Dewi Khrisna
Volume: 2
Issue: 2
Year: 2012
Optical Computing Alternative for High Speed Interconnectivity and Storage PDF available

Author(s): B.Vasavi | Ch.Bhargava | K.Hemanth Chowdary
Volume: 2
Issue: 2
Year: 2012
A Method for Lung Boundary Detection PDF available

Author(s): Samir Kumar Bandyopadhyay
Volume: 2
Issue: 2
Year: 2012
Integration of Expert Systems in Mobile Learning PDF available

Author(s): Nana Yaw Asabere | Samuel Edusah Enguah
Volume: 2
Issue: 1
Year: 2012
Content Based Image Retrieval Methods Using Graphical Image Retrieval Algorithm (GIRA) PDF available

Author(s): P.Jayaprabha | Rm.Somasundaram
Volume: 2
Issue: 1
Year: 2012
An Extension of UML Modeling for Web Hypermedia Design: A Case Study PDF available

Author(s): Azrul Hazri Jantan
Volume: 2
Issue: 1
Year: 2012
Current Status of E-Health in Kenya and Emerging Global Research Trends PDF available

Author(s): Kilwake Juma | Matoke Nahason | Waliaro Apollo | Wanyembi Gregory | Ogao Patrick
Volume: 2
Issue: 1
Year: 2012
The Information Technology (IT) Adoption Process and E- Readiness to Use within Yogyakarta Indonesian Small Medium Enterprises (SME) PDF available

Author(s): Muafi, R. Hendri Gusaptono | M. Irhas Effendi | Novrido Charibaldi
Volume: 2
Issue: 1
Year: 2012
Integrating Virtual Worlds and Virtual Learning Environments in Schools in Developing Economies PDF available

Author(s): Omieno K. Kelvin | Wanyembi Gregory | Mbugua M. Samuel
Volume: 2
Issue: 1
The Teacher’s Role in Promoting Online Peer Group Learning PDF available

Author(s): Md Kabirul Islam | Colleen Vale
Volume: 2
Issue: 1
Year: 2012
Brain Computer Interface with Genetic Algorithm PDF available

Author(s): Abdolreza. Asadi Ghanbari | Ali Broumandnia | Hamidreza Navidi | Ali.Ahmadi
Volume: 2
Issue: 1
Year: 2012
I’m Leaving the IT Field: the Impact of Stress, Job Insecurity, and Burnout on IT Professionals PDF available

Author(s): Jordan Shropshire | Christopher Kadlec
Volume: 2
Issue: 1
Year: 2012
Favoring Short Flows Without Punishing Long Flows for the Internet Traffic Performance Improvement PDF available

Author(s): Y.Suresh | S.Arumugam | M.A.Bhagyaveni
Volume: 2
Issue: 1
Year: 2012
Regular (Landline) Phone Company versus Cellular Phone Company: The Non-Cooperative Case PDF available

Author(s): Tchai Tavor | Uriel Spiegel
Volume: 2
Issue: 1
Year: 2012
An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice PDF available

Author(s): Ruisong Ye | Wei Zhou
Volume: 1
Issue: 8
Year: 2011
Policy Guidelines and Challenges in Quality Assurance in Distance Learning in Kenyan Public Universities PDF available

Author(s): Betty Mayeku | Odera Florence
Volume: 1
Issue: 8
Year: 2011
Using Program Visualization to Improve ICT skills towards achieving Vision 2030 PDF available

Author(s): Mutua M. Stephen | Wabwoba Franklin | Ogao J. Patrick | Abenga Elizabeth | Juma Kilwake
Volume: 1
Issue: 8
Year: 2011
Design of Reversible Fault Tolerant Programmable Logic Arrays with Vector Orientation PDF available

Author(s): Rubaia Rahman | Lafifa Jamal | Hafiz Md. Hasan Babu
Volume: 1
Issue: 8
Year: 2011
Compression of High-dimensional Data Spaces Using Non-differential Augmented Vector Quantization PDF available

Author(s): Aderemi A. Atayero | Adeyemi A. Alatishe | Oludayo O. Olugbara
Volume: 1
Issue: 8
Year: 2011
Enhanced key Generation Scheme based Cryptography with DNA Logic PDF available

Author(s): Bibhash Roy | Gautam Rakshit | Ritwik Chakraborty
Volume: 1
Issue: 8
Year: 2011
Development of a Framework for Computerized Health Management Information Systems in Nigeria PDF available

Author(s): SOBOWALE, A. A | OLABIYISI, S.O. | ABDUL-HAMEED, T. A.
Volume: 1
Issue: 7
Year: 2011
3GPP Long Term Evolution: Architecture, Protocols and Interfaces

Author(s): Aderemi A. Atayero | Matthew K. Luka | Martha K. Orya | Juliet O. Iruemi
Volume: 1
Issue: 7
Year: 2011
The Role of Wireless Technologies in taking Education to Rural Villages in Developing Countries PDF available

Author(s): Franklin Wabwoba | Kelvin K. Omieno | Carolyne N. Simiyu | Zipporah W. Sisung
Volume: 1
Issue: 7
Year: 2011
Adaptability of Intranet Grids in HEIs to Leverage Dream of Africa Connect PDF available

Author(s): Omieno K kelvin | Karume M. Simon
Volume: 1
Issue: 7
Year: 2011
Potential E-Commerce Adoption Strategies For Libyan Organization PDF available

Author(s): Abdulghader.A.Ahmed | Dalbir S | Ibrahim M
Volume: 1
Issue: 7
Year: 2011
A Proposed Method for Contour Extraction of an Image Based On Self-Affine Mapping System by Fractal Coding PDF available

Author(s): Sri Shimal Das | Dibyendu Ghoshal
Volume: 1
Issue: 6
Year: 2011
Phishing Websites Detection based on Phishing Characteristics in the Webpage Source Code PDF available

Author(s): Mona Ghotaish Alkhozae | Omar Abdullah Batarfi
Volume: 1
Issue: 6
Year: 2011
Special Type of Circuit Dual Hypergraph PDF available

Author(s): Bornali Gogoi | Bichitra Kalita
Volume: 1
Issue: 6
Year: 2011
Compact and Low Profile Antenna for Satellite Digital Audio Radio Application PDF available

Author(s): B.T.P.Madhav | N.V.K.Ramesh | K. Sarat Kumar | K.V.L.Bhavani | P. Rakesh Kumar | Bhavishya Ramineni
Volume: 1
Issue: 6
Year: 2011
Information Technology Research in Developing Nations: Major Research Methods and Publication Outlet PDF available

Author(s): Franklin Wabwoba | Anselimo Peters Ikoha
Volume: 1
Issue: 6
Year: 2011
Survey of Routing Protocols for Mobile Ad-hoc Network PDF available

Author(s): Humayun Bakht
Volume: 1
Issue: 6
Year: 2011
Integrating Computer Science Education in Kenyan Secondary Schools PDF available

Author(s): Florence Y. Odera
Volume: 1
Issue: 5
Year: 2011
Automatically Detecting Relevant Technical Teams for Requested Issues in Issue Tracking Systems by Using Semantic Web Technology PDF available

Author(s): Mohamed Kholief | Yasser Fouad | Mohamed Hassan
Volume: 1
Issue: 5
Year: 2011
Controlling and securing a Digital Home using Multiple Sensor Based Perception system Integrated with Mobile and Voice technology PDF available

Author(s): Avishek Ahmed | Tanvir Ahmed | Md. Samawat Ullah | Md. Manirul Islam
Volume: 1
Issue: 5
Year: 2011
Are Students Ready to Adopt E-Learning? A Preliminary E-readiness Study of a University in the Gulf Region PDF available

Author(s): Abdallah Tubaishat | Azzedine Lansari
Volume: 1
Issue: 5
Year: 2011
Predicting Software Build Failure Using Source Code Metrics PDF available

Author(s): Andy M. Connor | Jacqui Finlay
Volume: 1
Issue: 5
Year: 2011
Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian E-Banking System PDF available

Author(s): Sri Shimal Das | Smt. Jhunu Debbarma
Volume: 1
Issue: 5
Year: 2011
Computer Education Policy and its Implementation in Kenyan Secondary Schools PDF available

Author(s): Florence Y. Odera
Volume: 1
Issue: 5
Year: 2011
QoS Routing using OLSR with Optimization for Flooding PDF available

Author(s): Suman Banik | Bibhash Roy | Parthi Dey | Nabendu Chaki | Sugata Sanyal
Volume: 1
Issue: 4
Year: 2011
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Jona
Tangokurs Rapperswil-Jona