Browse Title Index


 
Issue Title
 
Vol 24, No 1 (2017) Analysis of RSA Digital Signature Key Generation using Strong Prime Abstract   PDF
Abdelmajid Hassan Mansour
 
Vol 27, No 1 (2017) Analysis of Saudi Arabian Social Network Using Analytic Measures and Community Detection Abstract   PDF
Lulwah AlSuwaidan, Mourad Ykhlef
 
Vol 11, No 1 (2013) Analysis of Wireless Routing Protocols Abstract
Teodor Streba
 
Vol 18, No 1 (2015) Analysis Techniques for Power Quality Signals Abstract
Luke Watson, Chelsea Bennett, Jose Long
 
Vol 5, No 1 (2012) Analytical Resarch on Online Banking and Users’ Privacy in Portugal Abstract
Vinita Hansen
 
Vol 25, No 1 (2017) Analyzing Cost Estimation Model to Optimize COCOMO II for Enterprise Level Software Abstract   PDF
Muhammad Javed Shad, Faisal Bahadar
 
Vol 9, No 1 (2013) Animated simulations in Computational Physics Abstract
Luke Rafig
 
Vol 19, No 1 (2015) ANONYMIZATION TECHNIQUE FOR PRIVACY PROTECTION SHARING OF SENSITIVE DATA STREAM Abstract
Vector Surve
 
Vol 10, No 1 (2013) Application of Data Mining Techniques in Japanese Business Organizations Abstract
Bruno Timote
 
Vol 12, No 1 (2014) Application of Data Mining Techniques in Korean Business Organizations Abstract
Bruno Timote
 
Vol 18, No 1 (2015) Application of Shuffled Frog Leaping and Big Data in Complex Component Based Software Engineering Abstract
Meenakshi D.
 
Vol 18, No 1 (2015) Applications of Speech Recognition for Romanian Language Abstract
Hirsch Yalcinoz
 
Vol 8, No 1 (2013) APRAM: An Image Segmentation Method Abstract
Peter Lamal
 
Vol 15, No 1 (2014) Arabic Question Classification Using Multi-class SVM Based on Dependency Parsing Abstract
Naser Albataineh, Essam Ayadi
 
Vol 5, No 1 (2012) Artificial intelligence System to choose a Public School for high-Income Families Abstract
Miroslaw McIlraith
 
Vol 8, No 1 (2013) Artificial Neural Expert Computing Models For Determining Shelf Life Of Processed Meat Abstract
Siddesh Anil
 
Vol 20, No 1 (2016) ASRT: A New Movie Recommender System Using Item Based Collaborative Filtering Technique Abstract
Azadeh D.
 
Vol 20, No 1 (2016) ASRTR: A strong authentication protocol Abstract
Abha joshi
 
Vol 25, No 1 (2017) Assessing Information Quality of Blackboard System Abstract   PDF
Thamer Alhussain
 
Vol 12, No 1 (2014) Assessing the Usability and Accessibility of Austrian E-Government Website Abstract
Divya Madaan
 
Vol 15, No 1 (2014) Attack Classification Based On Data Mining Abstract
Shih Cheng
 
Vol 6, No 1 (2012) Attack Classification Based On Data Mining: Two Methods Comparison Abstract
Shih Cheng
 
Vol 17, No 1 (2015) Automated Content-Based Image Query System Abstract
Moderato r Karola, Paolo Dillenburge
 
Vol 19, No 1 (2015) Automatic Car Number Plate Extraction Using Connected Components and Geometrical Features Approach Abstract
Phyo Thet Khin, Lai Lai Win Kyi, Nang Aye Aye Htwe
 
Vol 21, No 1 (2016) AUTOMATIC TUMOR DETECTION FROM KIDNEY AND THEIR PATHOLOGY Abstract
Adnan Majeed
 
Vol 11, No 1 (2013) Automation of Requirements Analysis Abstract
Wolfgang Frankfurter
 
Vol 26, No 1 (2017) Autonomic Cloud Computing: A Review Abstract   PDF
Yazid Ado Ibrahim, Alhassan Adamu, Salisu Mamman Abdulrahman, Akilu Rilwan Muhammad
 
Vol 3, No 1 (2011) Available Methodes To Improve The Quality Of Datasets Abstract
Javier Garcia
 
Vol 9, No 1 (2013) Bandwidth Recycling In Wide Area Networks Abstract
Koladiya Vaghela, Charde Bhargavi
 
Vol 11, No 1 (2013) Bandwidth Recycling Methods In Wide Area Networks Abstract
Koladiya Vaghela, Charde Bhargavi
 
Vol 16, No 1 (2015) Barriers Of Using Information Technology On Learning And Teaching In Secondary Schools Abstract
José Wilson
 
Vol 16, No 1 (2015) Barriers Of Using Information Technology On Learning And Teaching In Universities Abstract
José Wilson
 
Vol 24, No 1 (2017) Binary Image Segmentation Using Classification Methods: Support Vector Machines, Artificial Neural Networks and Kth Nearest Neighbours Abstract   PDF
Saman Sarraf
 
Vol 21, No 1 (2016) Biometric Identification for Criminals Abstract
Amandeep Kaur
 
Vol 4, No 1 (2011) Biometrics Based Authentication in Computer Systems Abstract
Vijay Khare
 
Vol 23, No 1 (2016) Birth Notification Service for Civil Registration in Kenya - SOA Model Abstract   PDF
Bernard K. Peter, Evans K. Miriti
 
Vol 18, No 1 (2015) Bug Tracking System Abstract
Genya Leela
 
Vol 7, No 1 (2012) Business Intelligence Tool: Opportunities And Challenges Abstract
Azni Suhaily, Rajani Kota
 
Vol 4, No 1 (2011) Chain Coding of Handwritten Character Image File Abstract
Prasad Leela
 
Vol 18, No 1 (2015) Challenges and Techniques for Quality Web Applications Abstract
Samir Adam
 
Vol 8, No 1 (2013) Challenges in Managing Information Security Abstract
Harry Larsson
 
Vol 13, No 1 (2014) Challenges of E-learning in medicine Abstract
Agarwal shahristani
 
Vol 19, No 1 (2015) CHALLENGES OF PROJECT MANAGEMENT IN GLOBAL SOFTWARE DEVELOPMENT Abstract
D. joshi
 
Vol 3, No 1 (2011) Classification Techniques in Data Mining Abstract
Suneeta Dieter, Vetrivelan Pandu
 
Vol 22, No 1 (2016) Cloud Computing Privacy Concerns in Social Networks Abstract   PDF
Naif Ali Almudawi
 
Vol 26, No 1 (2017) Cloud Management Architecture for Private Clouds Abstract   PDF
Berhanu Endesha, Desta Zerihun, Dr. Ravindra Babu
 
Vol 26, No 1 (2017) Clustering Data Text Based on Semantic Abstract   PDF
Parisa Zandieh, Elham Shakibapoor
 
Vol 7, No 1 (2012) Collaborative E-learning Tool for Secondary Schools in Holland m Abstract
Mukesh kumar
 
Vol 9, No 1 (2013) Color Barcodes For Personal Digital Assistant Devices Abstract
Rocha Carneiro, Asawa Agarwal
 
Vol 21, No 1 (2016) Combined Impact of Cryptography and Steganography Methods Abstract
Subray khan
 
Vol 24, No 1 (2017) Comparability of Computer-Based Testing and Paper-Based Testing: Testing Mode Effect, Testing Mode Order, Computer Attitudes and Testing Mode preference Abstract   PDF
Hooshang Khoshsima, Seyyed Morteza Hashemi Toroujeni
 
Vol 19, No 1 (2015) Comparative study of different sorting techniques using new algorithm Abstract
SUBHADRA AKELLA
 
Vol 19, No 1 (2015) Comparative analysis of the popular websites used for electronic filing Abstract
H. joshi
 
Vol 22, No 1 (2016) Comparative Analysis of Two Prominent Routing Protocols in IPv6 Network: OSPFv3 & EIGRPv6 Abstract   PDF
Md. Asif Hossain, Md.Mahful Islam, Md. Nesar Uddin Majumder
 
Vol 17, No 1 (2015) Comparative Study of Open Source Verses Closed Source with Respect to User’s Perspectives Abstract
Shahid Hussain, Faisal Bahadur, Faqir Gul, Arif Iqbal, Sumat Nazeer
 
Vol 20, No 1 (2016) Comparative Study of Risk Administration in Centralized and Distributed Software Development Abstract
Manisha Deshmukh
 
Vol 17, No 1 (2015) Comparing Color And Colorless Barcodes For Personal Digital Assistant Devices Abstract
Rocha Carneiro, Asawa Agarwal
 
Vol 15, No 1 (2014) Comparing Congestion Control Methods in Communication Networks Abstract
Gilles Babes
 
Vol 16, No 1 (2015) Comparing Two Algorithms For Mining Association Rules Abstract
Alireza Vedad, Gordor Podgornyy
 
Vol 11, No 1 (2013) Comparing Two Methods Used For Investigation Of The Presence Of Rod-Shaped Bacteria On Food Surface Abstract
Fang Chan
 
Vol 21, No 1 (2016) Comparison Between MJPEG Standard and Video Compression Technique Based on Advanced Fast Curvelet Transform Abstract
Ahmed Marah
 
Vol 23, No 1 (2016) Complementary Graph Coloring Abstract   PDF
Mohamed Al-Ibrahim, Naser Al-Ibrahim, Yousef Rafique, Omar Al-Sumait
 
Vol 14, No 1 (2014) Compression on Wireless Sensor Network with Performance Guarantee Abstract
reshma sulthana syed ghouse
 
Vol 13, No 1 (2014) Computer Aided Education Systems in Knowledge Based Society Abstract
Pan Osborn
 
Vol 19, No 1 (2015) Computing Devices & Its Recent Trends Abstract
Akingbola Akinsola
 
Vol 25, No 1 (2017) Context Based Indexing in Search Engines: A Review Abstract   PDF
Suraksha Singla, Geetanjali Gandhi
 
Vol 19, No 1 (2015) Context-Aware Model for Dynamic Adaptability of Software for Embedded Systems Abstract
Camille Jaggernauth, Bozena Kaminska, Douglas Gubbe
 
Vol 10, No 1 (2013) Control of A Cart-Ball System Abstract
Liang Yang, Wanli Chen, Fu Wen
 
Vol 4, No 1 (2011) Creating And Comparing Two Novel Term-Weighting Approach In Automatic Text Retrieval Abstract
Pan Belaton
 
Vol 27, No 1 (2017) Cuckoo Based Clustering Algorithm for Wireless Sensor Network Abstract   PDF
Ali Ghiasian, Maryam Hosivandi
 
Vol 10, No 1 (2013) Current E-Government: Pros and Cons Abstract
Vectoria Willard
 
Vol 27, No 1 (2017) Cyber Security Challenges to Mobile Banking in SACCOs in Kenya Abstract   PDF
Nambiro Alice Wechuli, Wabwoba Franklin, Wasike Jotham
 
Vol 8, No 1 (2013) Danish E-Government Where Is It Coming From And Where Is It Going Abstract
Viveca Wiklund
 
Vol 28, No 1 (2018) Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions Abstract   PDF
Geeta C M, Raghavendra S, Rajkumar Buyya, Venugopal K R, S S Iyengar, L M Patnaik
 
Vol 12, No 1 (2014) data fusion in peer-to-peer systems Abstract
Mendez Reyes
 
76 - 150 of 519 Items << < 1 2 3 4 5 6 7 > >>