NEXT CALL FOR PAPERS - SUBMISSION DEADLINE December 25,2017 -AUTHOR NOTIFICATION: Within 10 working days after submission -PUBLICATION DATE: Immediately after paper registration completed
 
Archive

Archive and Current Issue

 

Volume 6 , Number 6 , December 2017
 #  Article Title

1

Moving Towards Global Technological Advancement: Basis for the E-Clearance Program Development.[pdf]

Authors : Luis Cadiz III, Carl Niño Bondoc and Johnbert Estroga, Philippines.

 

 

 

Volume 6 , Number 5 , October 2017
 #  Article Title

1

Determination of Leaf Type by Image Processing Techniques.[pdf]
Authors : Emre AVUÇLU and Abdullah ELEN, Turkey
.

2

A South African Case Study in Social Activism: #Pay Back The Money.[pdf]
Author : Abraham G. van der Vyver , South Africa.
 3 Bibliographic Review: GIS Sciences and Informal Settlements.[pdf]                        
Author : Jean M. Caldieron, United States of America.

4

Utilization of Computer and Information Technology by Physicians.[pdf]
Authors : Basim Alhadidi and Thamer Al-Rousan,
Jordan.

 

Volume 6 , Number 4 , August 2017
 #  Article Title

1

Exploring Quality Assurance Practices in Management Studies Using Academic Student Information System .[pdf]
Author : Asha Alexander,
Kingdom of Saudi Arabia.

2

Internet of Things: A rule-based analysis applied to a ubiquitous healthcare system.[pdf]
Authors : Reda CHEFIRA and Said RAKRAK , Morocco.
 3 A Novel Method of Trend Lines Generation Using Hough Transform Method.[pdf]                        
Authors : Parisut Jitpakdee and Niran Pravithana, Thailand.

 

Volume 6 , Number 3 , June 2017
 #  Article Title

1

Experimental Evaluation of Shape Memory Alloy Characteristics.[pdf]
Author : Hussein M. Alalem, Lybia.

2

Smooth Handoff Process Cluster_Based In Vehicular Ad Hoc Networks.[pdf]                        
Authors : Wa’el Jum’ah Al_Zyadat, Faisal Y.Al-Zyoud and Aysh M. Alhroob, Jordan.

 

Volume 6 , Number 2 , April 2017
 #  Article Title

1

E-commerce Implementation: A Critical Review.[pdf]              

Authors: Eman Altameem and Riyad Almakki, Kingdom of Saudi Arabia.

2

Negative Selection Algorithm: Recent Improvements and Its Application in Intrusion Detection System.[pdf]
Authors : Chikh Ramdane and Salim Chikhi, Algeria.

3

Combined DHT Precoding and A-Law Companding for PAPR Reduction in FBMC/OQAM signals.[pdf]
Authors : Imad Ahmed Shaheen, AbdelhalimZekry, FatmaNewagy and Reem Ibrahim, Egypt.

4

Determining Minimum Cost Field in Vehicle AD-Hoc Sensor Networks .[pdf]
Authors : Faisal Y.Al-zyoud, Akrem y. Albakheet and Wa’el Jum’ah Al_zyadat, Jordan.

5

Computer Network Performance management using a Simple Network ManagementProtocol.[pdf]
Author : Akram M. Rady and Hatem M. Zakaria , Egypt.

6

E-learning System – Challenges & Barries: A Case Study.[pdf]
Author : Issam Jebreen, Jordan.

7

An experimental Case Study: Comparing Perceived Usability of Two Mobile Environments of a SPOC.[pdf]
Authors : Naima Belarbi, Nadia Chafiq, Mohammed Talbi and Abdelwahed Namir , Morocco.

8

Using AMixed Image Fusion Algorithm To Reduce Noise Images.[pdf]
Authors : Najib Tanish, Mansur Jaba, Musbah Elsghair and Abdusalam Aburgiga, Serbia.

9

Internet of Things: A Healthcare Ubiquitous-Based Approach for Medical Seizure Prevention.[pdf]
Authors : Reda CHEFIRA and Said RAKRAK , Morocco.

10

Force & Compliance Detection on Robot Gripping Manipulator.[pdf]
Authors : Hussein M. Alalem and Asma M. Eshahiry , Lybia.

 

Volume 6 , Number 1 , February 2017
 #  Article Title

1

Modelling and Prediction of Surface Roughness in CNC Turning Operation using Support Vector Machine.[pdf]

Authors : Tiagrajah V. Janahiraman, Nooraziah Ahmad and Wan Illia Binti Wan Ishak, Malaysia.

 

 

 

Volume 5 , Number 6 , December 2016
 #  Article Title

1

Application of Agents for Efficient Energy Consumption: Coalition Formations approach; A Systematic Review.[pdf]

Authors : Areej A. Malibari, Amjad H. Gamlo and Azoof E. Metro, Kingdom of Saudi Arabia.

2

Smooth Handoff Process Cluster_Based In Vehicular Ad Hoc Networks.[pdf]
Authors : Wa’el Jum’ah Al_Zyadat, Faisal Y.Al-Zyoud and Aysh M. Alhroob, Jordan.

 

Volume 5 , Number 5 , October 2016
 #  Article Title

1

Automatic Formation Method of Prospecting Line Profile Map in Complex Coal Geology Based on AutoCAD.[pdf]              

Authors: Zhaogui Zhaogui Shou, Enke Hou and Zhenni Ye, China.

2

Performance Comparison of Most Common High Level Programming Languages SPECT.[pdf]
Authors : ZahidaParveen and Nazish Fatima, Kingdom of Saudi Arabia.

3

Insight on Clustering based Energy Efficient Routing Protocols in WSN.[pdf]
Authors : Aarti Singh, Davender K. Malhotra and Kavita Gupta , India.

4

A Simulation-Based Approach to Analyze CPU Debt in a Cloud.[pdf]
Authors : Jawad Alkasasbeh, Basim Alhadidi and Souvik Pal, Jordan.

 

Volume 5 , Number 4 , August 2016
 #  Article Title

1

A Conceptual Model for Knowledge Sharing Among Small Groups Using Discussion Cases.[pdf]              

Authors: Narumon Sriratanaviriyakul and Jamal El-Den, Australia.

2

IP Multimedia Subsystem and Its Future Perspectives.[pdf]
Authors : Orhan Orhan, Cahit Bollu, Mehmet Ulvi Agca, Selcuk Keskin and Taskin Kocak, Turkey.

3

Assessing Staff Acceptance and Compliance with Information Security.[pdf]
Authors : Talal Alotaibi and Steven Furnell, Kingdom of Saudi Arabia.

4

Robo Tester Evolution (RTE) Automation Tool for GSM Tariff Tests.[pdf]
Authors : Orhan Orhan and Esma Akbey, Turkey.

5

A Chaotic Random Bit Generator with Image Encryption Applications.[pdf]
Author : Günyaz Ablay , Turkey.

6

Resistance Factors Influencing the Adoption of Cloud Computing in Middle East Government Sectors.[pdf]
Authors : Thamer Al-Rousan and Nabil Abu Hashish, Jordan.

7

Intelligent Control System of Intra-Frame Beehive Heater.[pdf]
Authors : Raif BAYIR and Ahmet ALBAYRAK, Turkey.

8

Performance Test of MPI on Raspberry Pi 2 Beowulf Cluster.[pdf]
Authors : Erdem Ağbahca and Adem Alpaslan Altun, Turkey.

 

Volume 5 , Number 3 , June 2016
 #  Article Title

1

Shielding and Duplication for Adaptive Crosstalk-Aware Error Control Coding in On-Chip Communication.[pdf]              

Authors: Wameedh Nazar Flayyih and Fakhrul Zaman Rokhani, Iraq.

2

Effects of Copper 0.127 mm Thick Flat Sheet on Hot Region Images as A Material Filter for Scatter Correction in Tc-99m SPECT.[pdf]
Authors : Inayatullah Shah Sayed and Siti Zawani Harun, Malaysia.

3

Enhanced Packet Dropping Algorithm and Neighbour Node Cluster Strategy for Intrusion Detection in MANET.[pdf]
Authors : E.Selvi and M.S. Shashidara , India.

4

Use of an Effective Attenuation Coefficient Value and Material Filter Technique for Scatter Correction in Tc-99m SPECT.[pdf]
Authors : Inayatullah Shah Sayed and Siti Zubaidah Muda, Malaysia.

5

ABSEP3S- An Agent Based Security Engine for Privacy Preserving in Personalized Search.[pdf]
Authors : AnuSharma, Ali T. Al-khwaldeh and Aarti Singh , India.

 

Volume 5 , Number 2 , April 2016
 #  Article Title

1

An Improved K-Means Clustering Algorithm.[pdf]              

Authors: Asmita Yadav and Sandeep Kumar Singh, India.

2

A Novel Approach for Constructing Ontology Based Grounded Index and Context Sensitive Query Processor.[pdf]
Authors : Sneh Dalal, Jyoti Verma,Komal and Kumar Bhatia, India.

3

Use of a Tin (Sn) Flat Sheet as a Material Filter for Reduction of Scattered Gamma Photons and Enhancement of Cold Regions Image Quality in Tc-99m SPECT.[pdf]
Author : Inayatullah Shah Sayed, United Kingdom.

4

WIRS: Wisdom Based Information Retrieval System.[pdf]
Authors : Vijay Rana and Vijay Dhir, India.

 

Volume 5 , Number 1 , February 2016
 #  Article Title

1

Maximizing Energy Based on SNR using Self Organizing Map in MANETs. [pdf]

Authors : Asha Shiny X.S. and Jagadeesh Kannan R., India.

2

A Survey on Elementary, Symmetric and Asymmetric Key Cryptographic Techniques. [pdf]

Authors : V.Hemamalini, G. Zayaraz, V.Susmitha, M.Gayathri and M.Dhanam, India.

3

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring. [pdf]

Authors : R.Shanmuga Sundaram, D.Arthy and T.Priya Radhika Devi, India.

4

Hide me and Authenticate Implementation of Multi party Key Authentication and SAPA Protocol for Secured Data Transaction in Cloud. [pdf

Authors : R. Archana and S. Prasanna, India.

5

A Generic Permutational Edge Detection Approach for Corrupted Images. [pdf

Authors : P.Shanmugavadivu and A.Shanthasheela, India.

6

Proficiency Comparison of Random Forest and J48 Classifiers for Heart Disease Prediction. [pdf

Author : Lakshmi Devasena C, India.

7

Predicting Effect of Past Qualification in Successful Honoring Master of Computer Applications Degree – A Neural Network Approach. [pdf

Author : Shanti Verma, India.

8

Cloud Storage Auditing With Key Generation Using Blowfish Algorithm. [pdf

Authors : N.Meenakshi and G.Sasikala, India.

9

A Comprehensive Conflict Resolution Approach for Multiagent Systems. [pdf

Authors : Dimple Juneja, Aarti Singh, Rashmi Singh and Saurabh Mukherjee, India.

10

Beowulf Cloud: A Scalable Cloud Computing Architecture. [pdf

Author : Vishal Garg, India.

 

 

 

 

Volume 4 , Number 6 , December 2015
 #  Article Title

1

An Improved Indexing Mechanism Based On Homonym Using Hierarchical Clustering in Search Engine.[pdf]               Authors: Varsha Rathi and Neha Bansal, India.

2

Lung Cancer Detection from X-Ray Image Using Statistical Features.[pdf]
Author : Vinod Kumar, Ashu Gupta, Rattan Rana and Kanwal Garg, India.

3

Application of Min-Min and Max-Min Algorithm for Task Scheduling in Cloud Environment Under Time Shared and Space Shared VM Models.[pdf]
Authors : Sanjay Kumar and Atul Mishra, India.

4

Multispectral Satellite Image Retrieval Using The Combination of Features Color, Shape and Texture.[pdf]
Authors : Chandani Joshi,G.N. Purohit and Saurabh Mukherjee, India.

5

Case-Agent Based System for Designing Wireless Sensor Network.[pdf]
Authors : A.H.Mohamed and M.H.El-Fouly, Egypt.

 

Volume 4 , Number 5 , October 2015
 #  Article Title

1

Identical Twins Face Recognition System Based on Time Series Motif Discovery.[pdf]                             Authors: Mahmoud A. Elgamal, Esam A. Khan and Sameer M. Shaarawy, Kingdom of Saudi Arabia.

2

Time Synchronization for Data Communication in the Wireless Network Systems.[pdf]                        
Author : Ali T. Al-khwaldeh, Jordan.

3

Enterprise Resource Planning (ERP) System as an Innovative Technology in Higher Education Context in Egypt.[pdf]    Authors : Mohamed Soliman and Noorliza Karia , Malaysia.

 

Volume 4 , Number 4 , August 2015
 #  Article Title

1

MMS: Minimum Maximum Strategy for Classification and Testing.[pdf]
Author: Mohammed Issam Younis, Iraq.

2

Online Sales Tracking and Tax Collection (OST2C) Mechanism for Indian Context .[pdf]
Authors : Aarti Singh and Virender Singh, India.

3

Evaluation of a Secure Agent Based Framework for Optimized Resource Scheduling in Cloud Computing.[pdf]
Authors : Aarti Singh and Manisha Malhotra, India.

4

Reducing Checkpoint Creation Overhead using Data Similarity .[pdf]
Author: Angkul Kongmunvattana , United States of America.

5

Situated Learning: Learning in a Contextual Environment .[pdf]
Authors :Virendra Gawande and Said Al-Senaidi, Oman.

6

Improved Layered Architecture for Internet of Things.[pdf]
Author : Dina Gamal Darwish, Egypt.

7

Improved Automated Parent Recognition Approach Based on Genetic Technique Analysis[pdf]
Authors : Ashraf K. ALDabbas, Basim Alhadidi and Mohammad Alayyad, Jordan.

 

Volume 4 , Number 3 , June 2015
 #  Article Title

1

University Course Timetable using Constraint Satisfaction and Optimization.[pdf]                                        Author: Tarek El-Sakka, United Arab Emirates.

2

Using Regression Tools to Assess Hazard Identification in the U.S. Army Risk Management Process.[pdf]                  Authors : Heath McCormick and Rania Hodhod, United States of America.

3

A Ranking Method for Fuzzy Complementary Judgment Matrix.[pdf]                                                                   Author : Ming-Chang Lee, Taiwan.

4

A Power Efficient Cluster Head Based Routing Protocol for Mobile Adhoc Network.[pdf]                                       Authors : Pawan,Rajendra .K.Sharmaa and A.K.Sharma , India.

5

Evaluation of Critical Success Factors for GIS Implementation Using Analytic Hierarchy Process.[pdf]                       Authors : Khalid Aly Eldrandaly, Soaad Mohammad Naguib, and Mohamed Monier Hassan, Egypt.

6

Challenges and Benefits in Implementing M-learning inPre-university Education in Egypt.[pdf]                                Authors : Reham Adel Ali and Muhammad Rafie Mohd Arshad, Malaysia.

7

Virtual Guides and Mechatronic Device for Interactive Surgical System.[pdf]                                                      Author : Moulay Ibrahim El-Khalil Ghembaza, Kingdom of Saudi Arabia.

 

Volume 4 , Number 2 , April 2015
 #  Article Title

1

Safety Analysis for Gamma Irradiator Interlocking System.[pdf]                                                                    Authors : Hany Sallam and Wesam Z. Ibrahim, Egypt.

2

Advisory System for Student Enrollment in University Based on Variety of Machine Learning Algorithms.[pdf]               Author : Mohamed M. Ezz, Egypt.

3

A Cognitive Approach to Design a Real World Curriculum in Computer Science.[pdf]                                            Authors : Virendra Gawande and Sarika Gawande, Oman.

4

A Proposed Assessment Model of Database Performance on Virtual Machine vs. Traditional Server.[pdf]                   Authors : Nevine Makram Labib and Amr Ismail Hassan, Egypt.

5

Construction of an Online Examination System with Resumption and Randomization Capabilities.[pdf]                       Authors : Mohammed Issam Younis and Maysam Sameer Hussein, Iraq.

 

Volume 4 , Number 1 , February 2015
 #  Article Title

1

Utility Maximization Scheduling in Multi-channel Wireless Networks.[pdf]                                                          Authors : Xiaoling Xiong and Ruixue Liu, China.

2

Reassessing Mobile Wireless Sensor Networks.[pdf]                                                                                 Authors : Dimple Juneja, Aarti Singh and Kavita Gupta, India.

3

Updates in Knowledge Query Manipulation Language for Complex Multiagent Systems.[pdf]                                  Authors : Ankit Jagga, Dimple Juneja and Aarti Singh, India.

 

Volume 3 , Number 6 , December 2014
 #  Article Title

1

The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company.[pdf]

Authors : Eman A. AL-Tameem and Heba K. Mohammad, Kingdom of Saudi Arabia.

2

Measuring the Impact of Security Protocols for Bandwidth [pdf]                                                                    Authors : Milos Orgon and Lubomir Fackovec, Slovakia.

 

Volume 3 , Number 5 , October 2014
 #  Article Title

1

Design of a Communication Strategy for Wireless Sensors in Non-Deterministic Environments using Mobile Agents. [pdf]

Authors : PreetiSethi, DimpleJuneja Gupta and NareshChauhan, India.

2

The Design and Implementation of Beidou Satellite Navigation System RF Front-End Filter.[pdf]                              Authors :Guoping Chen, Yi Zhang, Jie Chang and Yikun Luo, China.

 

Volume 3 , Number 4 , August 2014
 #  Article Title

1

E-government Adoption and Trends in the Hashemite Kingdom of Jordan. [pdf]

Author : Sandi N. Fakhouri, Jordan.

2

Integrating ICTs into the Teaching process: Issues in Pedagogical Practices in Teacher Education.[pdf]

Authors : Kofi Bentum Wilson and Kofi Agyenim Boateng , Ghana.

 

 

 

Volume 3 , Number 3 , June 2014
 #  Article Title

1

SMS Based Hardware Controlling System “A Ubiquitous Approach". [pdf]

Author : Mozammel Bin Motalab, Bangladesh.

2

An Efficient Source Information based Filtering Scheme for DDOS Attacks. [pdf]

Authors : M.Parameswari and S.Sukumaran, India.

 

 

 

Volume 3 , Number 2 , April 2014
 #  Article Title

1

A Cognitive Model to Design a Real World Curriculum in Computer Science. [pdf]

Author : Virendra Gawande, Oman.

2

Comparative Performance Evaluation of Heap-Sort and Quick-Sort Algorithms. [pdf]

Authors : Ebtisam S. Al-Jaloud, Haifaa A. Al-Aqel and Ghada H. Badr, Kingdom of Saudi Arabia.

3

 Crime Classification Algorithm for Mining Crime Hot Spot and Cold Spot.[pdf]

Authors: M. VijayaKumar, P.Balamurugan, Basim Alhadidi and Hanumanthappa, India.

 

 

 

Volume 3 , Number 1 , February 2014
 #  Article Title

1

Evaluating the Awareness and Perceptions of Lecturers in using E-Learning Tools for Teaching in University of Cape Coast[pdf]

Authors : John Kwame Euafo Edumadze, Theophilus Aquina Ossei-Anto , Gladys Edumadze , Wisdom Kwadzo Tamakloe , Eric Asamoah and Ernest Boadi, Ghana.

2

New E-Tools in Teaching Writing under the Umbrella of Literature. [pdf]

Author : Samah Thabet, Egypt.

3

Research of a Wide Input Range SMPS. [pdf]

Authors : Danjiang Chen and Qiaowen Zhang,China.

 

 

 

 

Volume 2 , Number 6 , December 2013
  #  Article Title

1

ALPR for Ambiguous Character using Template Matching with Fuzzy Classifiers: a Survey. [pdf]

Authors : G.Angel, J. Rethna virgil Jeny and J. Albert Simon, India.

2

Integrating Information Technology into Pedagogy: The Gender Perspective. [pdf]

Authors : Brandford Bervell, Paul Dela Ahiatrogah , John Ekow Laryea and Gabriel Essilfie, Ghana.

3

MDIA-Master Directed Incentive Based Approach. [pdf]

Authors : Aarti Singh and Divya Chadha , India.

4

Use of Information and Communication Technology for Teaching and Learning in Ghanaian Universities: Case of University of Cape Coast. [pdf]

Authors: John Kwame Eduafo Edumadze and Anthony Akwesi. Owusu, Ghana.

 

 

 

Volume 2 , Number 5 , October 2013
 #  Article Title

1

A Framework for Model-Based Code Generation from a Flowchart. [pdf]

Authors : Basma Moukhtar Hussein and Akram Salah, Egypt.

2

A Cognitive model to enhance learning outcomes in Computing.  [pdf]

Authors : Virendra Gawande, Sarika Gawande and Yassir Abdulghani Al-Bazzaz, Oman.

3

Email policy for tertiary institutions – A study of University of Cape Coast. [pdf]

Author:Kofi Ayebi-Arthur, Ghana.

4

Factors affecting adoption of ICT among Omani faculty members in Sultanate of Oman. [pdf]

Authors: Said Rashid Al-Senaidi and Virendra Gawande, Oman.

5

Performance Analysis of Hybrid Protocols in MANETs. [pdf]

Authors: Ibikunle Frank and Ebiesuwa Seun, Nigeria.

 

 

 

Volume 2 , Number 4 , August 2013
 #  Article Title

1

Design and Implementation of VLSI Systolic Array Multiplier for DSP Applications. [pdf]

Authors : S. Kishore Reddy, N. R. Reddy and A. Ravi Shankar, Ethiopia.

2

Intelligent Surfacing Mechanism for Semantic Deep Web.  [pdf]

Authors : Aarti Singh and Shaily Sachdeva, india.

3

Technical Analysis of the Learning Algorithms in Data Mining Context. [pdf]

Author :Hisham S. Katoua, Kingdom of Saudi Arabia.

 

 

 

Volume 2 , Number 3 , June 2013
 #  Article Title

1

Bio Inspired and Evolutionary Approaches to Optimize MANET Routing. [pdf]

Authors : T.Dhamodharan, S. Vimalanand and C. Chandrasekar, India.

2

Software Requirements Elicitation Tools for Service Oriented Architecture: Comparative Analysis[pdf]

Author : Qasem Nijem, Kingdom of Saudi Arabia.

3

The Role and Prospect of Information and Communication Technology in National Development. [pdf]

Authors :Sefiu Taiwo Oloruntoyin and Ibrahim Adepoj, Nigeria .

4

A Systems Approach to Designing a Graphical Interface in eHealth. [pdf]

Authors: Sunil Eapen Mammen and Deepa Madathil, India.

5

Prediction of Call Arrival Process and Call Holding Time using Stochastic Modeling Process. [pdf]

Authors: R. Kaniezhil, C. Chandrasekar and Basim Alhadidi, India.

 

 

 

 

Volume 2 , Number 2 , April 2013
 #  Article Title

1

Requirements Engineering Through Viewpoints. [pdf]

Author : Mohammed Messaoudi, Kingdom of Saudi Arabia.

2

Design of Remote Security System Using Embedded Linux Based Video Streaming.  [pdf]

Authors : Nagaraja G. and Sharada P.N, India.

3

Notional View of Cloud Computing on Higher Education in Virtual Learning Environment. [pdf]

Authors :Kumar R. and Barani G., India .

4

Search Interface to Capture Searchers Behaviour. [pdf]

Authors: Fadhilah Mat Yamin, T. Ramayah and Wan Hussain Wan Ishak, Malaysia.

5

Office of the Future: Digitizing Record-Keeping. [pdf]

Authors: Okoro U. R., Awodele O., Kuyoro S. O. and Adekunle Y.A., Nigeria.

 

 

 

 

Volume 2 , Number 1 , February 2013
 #  Article Title

1

Augmented Dressed Body System Controlled By Motion Capture Data. [pdf]

Authors : Khaled F. Hussain, Adel A. Sewisy and Islam T. El-Gendy, Egypt.

2

Integration of Background Removal and Thermography Techniques for Crowd Density Scrutinizing.  [pdf]

Authors : Adnan Ghazi Abuarafah and Mohamed Osama Khozium, Kingdom of Saudi Arabia.

3

Cloud Computing Technology: A powerful Engine to Promote Economy in Islamic Societies. [pdf]

Authors :Abdolhamid Rouhani and Nazura Abdul Manap, Malaysia.

4

Internet Presence: A case for web 2.0 technology in the University of Cape Coast. [pdf]

Author: Kofi Ayebi-Arthur, Ghana.

5

Short Term Load Forecasting using Neuro-fuzzy-Wavelet Approach. [pdf]

Authors: D.K.Chaturvedi, Sinha Anand Premdayal and Ashish Chandiok, India.

 

 

 

 

Volume 1 , Number 2 , December 2012
 #  Article Title

1

Binary Based Biological Network Model: A Review. [pdf]

Authors : Ugege Peter Edemewe, Agbaegbu Johnbosco and Akee Sakirat Adedayo, Nigeria.

2

On the Deployment of Password Hints Using Pre-Attentive Visual Priming for One-Time Passwords. [pdf]

Authors : Kenneth Revett and Ahmed Selim Bahaa, Egypt.

3

Performance Evaluation of Exhaustive-Search Equivalent Pattern Matching under Chebyshev distance. [pdf]

Authors : Mohamed Yousef and Khaled F. Hussain, Egypt.

4

Analysis of Security Risks in Bluetooth. [pdf]

Author: Manish Shrivastava, India.

 

 

 

 

Volume 1 , Number 1 , October 2012
 #  Article Title

1

Optimized Circularly Polarized Bandwidth for Microstrip Antenna. [pdf]

Authors : Shashikant Patil, Arpan Patel and Ankur Bansal, India.

2

Looking through the Lenses of Educational Management Information Systems (EMIS). [pdf]

Authors : Simon-Peter Kafui Aheto and Jonathan Fletcher, Ghana.

3

Impact of Information Technology on Nigeria Banking Industry: a case Study of Skye Bank. [pdf]

Authors : Ibikunle Frank and James Oluwafemi, Nigeria.

4

Reasoning Methodologies for Intelligent e-Learning Systems. [pdf

Author : Hisham S. Katoua, Kingdom of Saudi Arabia.

5

A Clustering Internet Search Agent for User Assistance. [pdf

Authors : Ebtessam Mohamed Desouky and Mahmoud Mohamed El-Khouly, Egypt.

 
 

 

   
 
Archive3Archive3