|
|
|
|
|
|
Archive and Current Issue
Volume
5 , Number 5 , October 2016
|
# |
Article Title |
1
|
Automatic Formation Method of
Prospecting Line Profile Map in
Complex Coal Geology Based on
AutoCAD.[pdf]
Authors:
Zhaogui Zhaogui Shou, Enke Hou
and Zhenni Ye, China.
|
2
|
Performance Comparison of Most
Common High Level Programming
Languages SPECT.[pdf]
Authors :
ZahidaParveen and Nazish Fatima,
Kingdom of Saudi Arabia. |
3
|
Insight on Clustering based
Energy Efficient Routing
Protocols in WSN.[pdf]
Authors :
Aarti Singh, Davender K.
Malhotra and Kavita Gupta , India. |
4
|
A Simulation-Based Approach to
Analyze CPU Debt in a Cloud.[pdf]
Authors :
Jawad Alkasasbeh, Basim Alhadidi
and Souvik Pal,
Jordan. |
Volume
5 , Number 4 , August 2016
|
# |
Article Title |
1
|
A Conceptual Model for Knowledge
Sharing Among Small Groups Using
Discussion Cases.[pdf]
Authors:
Narumon
Sriratanaviriyakul and
Jamal El-Den,
Australia.
|
2
|
IP Multimedia Subsystem and Its
Future Perspectives.[pdf]
Authors :
Orhan Orhan, Cahit Bollu, Mehmet
Ulvi Agca, Selcuk Keskin and
Taskin Kocak, Turkey. |
3
|
Assessing Staff Acceptance and
Compliance with Information
Security.[pdf]
Authors :
Talal Alotaibi and Steven
Furnell, Kingdom of Saudi Arabia. |
4
|
Robo Tester Evolution (RTE)
Automation Tool for GSM Tariff
Tests.[pdf]
Authors :
Orhan Orhan and Esma Akbey,
Turkey. |
5 |
A Chaotic Random Bit Generator
with Image Encryption
Applications.[pdf]
Author :
Günyaz Ablay
,
Turkey. |
6 |
Resistance Factors Influencing
the Adoption of Cloud Computing
in Middle East Government
Sectors.[pdf]
Authors :
Thamer Al-Rousan and Nabil Abu Hashish,
Jordan. |
7 |
Intelligent Control System of
Intra-Frame Beehive Heater.[pdf]
Authors :
Raif BAYIR and Ahmet ALBAYRAK,
Turkey. |
8 |
Performance Test of MPI on
Raspberry Pi 2 Beowulf Cluster.[pdf]
Authors :
Erdem Ağbahca and Adem Alpaslan
Altun,
Turkey. |
Volume
5 , Number 3 , June 2016
|
# |
Article Title |
1
|
Shielding and Duplication for
Adaptive Crosstalk-Aware Error
Control Coding in On-Chip
Communication.[pdf]
Authors:
Wameedh Nazar Flayyih and
Fakhrul Zaman Rokhani, Iraq.
|
2
|
Effects of Copper 0.127 mm Thick
Flat Sheet on Hot Region Images
as A Material Filter for Scatter
Correction in Tc-99m SPECT.[pdf]
Authors :
Inayatullah Shah Sayed and Siti
Zawani Harun, Malaysia. |
3
|
Enhanced Packet Dropping
Algorithm and Neighbour Node
Cluster Strategy for Intrusion
Detection in MANET.[pdf]
Authors :
E.Selvi and M.S. Shashidara , India. |
4
|
Use of an Effective Attenuation
Coefficient Value and Material
Filter Technique for Scatter
Correction in Tc-99m SPECT.[pdf]
Authors :
Inayatullah Shah Sayed and Siti
Zubaidah Muda, Malaysia. |
5 |
ABSEP3S- An Agent Based Security
Engine for Privacy Preserving in
Personalized Search.[pdf]
Authors :
AnuSharma, Ali T. Al-khwaldeh
and Aarti Singh , India. |
Volume
5 , Number 2 , April 2016
|
# |
Article Title |
1
|
An Improved K-Means Clustering
Algorithm.[pdf]
Authors:
Asmita Yadav and Sandeep Kumar
Singh, India.
|
2
|
A Novel Approach for
Constructing Ontology Based
Grounded Index and Context
Sensitive Query Processor.[pdf]
Authors :
Sneh Dalal, Jyoti Verma,Komal
and Kumar Bhatia, India. |
3
|
Use of a Tin (Sn) Flat Sheet as
a Material Filter for Reduction
of Scattered Gamma Photons and
Enhancement of Cold Regions
Image Quality in Tc-99m SPECT.[pdf]
Author :
Inayatullah Shah Sayed, United
Kingdom. |
4
|
WIRS: Wisdom Based Information
Retrieval System.[pdf]
Authors :
Vijay Rana and Vijay Dhir, India. |
Volume 5 , Number 1 , February 2016
|
# |
Article Title |
1
|
Maximizing Energy Based on SNR using Self Organizing Map in MANETs. [pdf]
Authors : Asha Shiny X.S. and Jagadeesh Kannan R., India.
|
2
|
A Survey on Elementary, Symmetric and Asymmetric Key Cryptographic Techniques. [pdf]
Authors : V.Hemamalini, G. Zayaraz, V.Susmitha, M.Gayathri and M.Dhanam, India.
|
3
|
Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring. [pdf]
Authors : R.Shanmuga Sundaram, D.Arthy and T.Priya Radhika Devi, India.
|
4
|
Hide me and Authenticate Implementation of Multi party Key Authentication and SAPA Protocol for Secured Data Transaction in Cloud. [pdf]
Authors : R. Archana and S. Prasanna, India.
|
5
|
A Generic Permutational Edge Detection Approach for Corrupted Images. [pdf]
Authors : P.Shanmugavadivu and A.Shanthasheela, India.
|
6 |
Proficiency Comparison of Random Forest and J48 Classifiers for Heart Disease Prediction. [pdf]
Author : Lakshmi Devasena C, India.
|
7 |
Predicting Effect of Past Qualification in Successful Honoring Master of Computer Applications Degree – A Neural Network Approach. [pdf]
Author : Shanti Verma, India.
|
8 |
Cloud Storage Auditing With Key Generation Using Blowfish Algorithm. [pdf]
Authors : N.Meenakshi and G.Sasikala, India.
|
9 |
A Comprehensive Conflict Resolution Approach for Multiagent Systems. [pdf]
Authors : Dimple Juneja, Aarti Singh, Rashmi Singh and Saurabh Mukherjee, India.
|
10 |
Beowulf Cloud: A Scalable Cloud Computing Architecture. [pdf]
Author : Vishal Garg, India.
|
Volume 4 , Number 6 , December 2015
|
# |
Article Title |
1
|
An Improved Indexing Mechanism Based On Homonym Using Hierarchical Clustering in Search Engine.[pdf] Authors: Varsha Rathi and Neha Bansal, India.
|
2
|
Lung Cancer Detection from X-Ray Image Using Statistical Features.[pdf]
Author : Vinod Kumar, Ashu Gupta, Rattan Rana and Kanwal Garg, India. |
3
|
Application of Min-Min and Max-Min Algorithm for Task Scheduling in Cloud Environment Under Time Shared and Space Shared VM Models.[pdf]
Authors : Sanjay Kumar and Atul Mishra, India. |
4
|
Multispectral Satellite Image Retrieval Using The Combination of Features Color, Shape and Texture.[pdf]
Authors : Chandani Joshi,G.N. Purohit and Saurabh Mukherjee, India. |
5
|
Case-Agent Based System for Designing Wireless Sensor Network.[pdf]
Authors : A.H.Mohamed and M.H.El-Fouly, Egypt. |
Volume 4 , Number 5 , October 2015
|
# |
Article Title |
1
|
Identical Twins Face Recognition System Based on Time Series Motif Discovery.[pdf] Authors: Mahmoud A. Elgamal, Esam A. Khan and Sameer M. Shaarawy, Kingdom of Saudi Arabia.
|
2
|
Time Synchronization for Data Communication in the Wireless Network Systems.[pdf]
Author : Ali T. Al-khwaldeh, Jordan. |
3
|
Enterprise Resource Planning (ERP) System as an Innovative Technology in Higher Education Context in Egypt.[pdf] Authors : Mohamed Soliman and Noorliza Karia , Malaysia. |
Volume 4 , Number 4 , August 2015
|
# |
Article Title |
1
|
MMS: Minimum Maximum Strategy for Classification and Testing.[pdf]
Author: Mohammed Issam Younis, Iraq.
|
2
|
Online Sales Tracking and Tax Collection (OST2C) Mechanism for Indian Context .[pdf]
Authors : Aarti Singh and Virender Singh, India. |
3
|
Evaluation of a Secure Agent Based Framework for Optimized Resource Scheduling in Cloud Computing.[pdf]
Authors : Aarti Singh and Manisha Malhotra, India. |
4
|
Reducing Checkpoint Creation Overhead using Data Similarity .[pdf]
Author: Angkul Kongmunvattana , United States of America. |
5
|
Situated Learning: Learning in a Contextual Environment .[pdf]
Authors :Virendra Gawande and Said Al-Senaidi, Oman. |
6
|
Improved Layered Architecture for Internet of Things.[pdf]
Author : Dina Gamal Darwish, Egypt. |
7
|
Improved Automated Parent Recognition Approach Based on Genetic Technique Analysis[pdf]
Authors : Ashraf K. ALDabbas, Basim Alhadidi and Mohammad Alayyad, Jordan. |
Volume 4 , Number 3 , June 2015
|
# |
Article Title |
1
|
University Course Timetable using Constraint Satisfaction and Optimization.[pdf] Author: Tarek El-Sakka, United Arab Emirates.
|
2
|
Using Regression Tools to Assess Hazard Identification in the U.S. Army Risk Management Process.[pdf] Authors : Heath McCormick and Rania Hodhod, United States of America. |
3
|
A Ranking Method for Fuzzy Complementary Judgment Matrix.[pdf] Author : Ming-Chang Lee, Taiwan. |
4
|
A Power Efficient Cluster Head Based Routing Protocol for Mobile Adhoc Network.[pdf] Authors : Pawan,Rajendra .K.Sharmaa and A.K.Sharma , India. |
5
|
Evaluation of Critical Success Factors for GIS Implementation Using Analytic Hierarchy Process.[pdf] Authors : Khalid Aly Eldrandaly, Soaad Mohammad Naguib, and Mohamed Monier Hassan, Egypt. |
6
|
Challenges and Benefits in Implementing M-learning inPre-university Education in Egypt.[pdf] Authors : Reham Adel Ali and Muhammad Rafie Mohd Arshad, Malaysia. |
7
|
Virtual Guides and Mechatronic Device for Interactive Surgical System.[pdf] Author : Moulay Ibrahim El-Khalil Ghembaza, Kingdom of Saudi Arabia. |
Volume 4 , Number 2 , April 2015
|
# |
Article Title |
1
|
Safety Analysis for Gamma Irradiator Interlocking System.[pdf] Authors : Hany Sallam and Wesam Z. Ibrahim, Egypt.
|
2
|
Advisory System for Student Enrollment in University Based on Variety of Machine Learning Algorithms.[pdf] Author : Mohamed M. Ezz, Egypt. |
3
|
A Cognitive Approach to Design a Real World Curriculum in Computer Science.[pdf] Authors : Virendra Gawande and Sarika Gawande, Oman. |
4
|
A Proposed Assessment Model of Database Performance on Virtual Machine vs. Traditional Server.[pdf] Authors : Nevine Makram Labib and Amr Ismail Hassan, Egypt. |
5
|
Construction of an Online Examination System with Resumption and Randomization Capabilities.[pdf] Authors : Mohammed Issam Younis and Maysam Sameer Hussein, Iraq. |
Volume 4 , Number 1 , February 2015
|
# |
Article Title |
1
|
Utility Maximization Scheduling in Multi-channel Wireless Networks.[pdf] Authors : Xiaoling Xiong and Ruixue Liu, China.
|
2
|
Reassessing Mobile Wireless Sensor Networks.[pdf] Authors : Dimple Juneja, Aarti Singh and Kavita Gupta, India. |
3
|
Updates in Knowledge Query Manipulation Language for Complex Multiagent Systems.[pdf] Authors : Ankit Jagga, Dimple Juneja and Aarti Singh, India. |
Volume 3 , Number 6 , December 2014
|
# |
Article Title |
1
|
The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company.[pdf]
Authors : Eman A. AL-Tameem and Heba K. Mohammad, Kingdom of Saudi Arabia.
|
2
|
Measuring the Impact of Security Protocols for Bandwidth [pdf] Authors : Milos Orgon and Lubomir Fackovec, Slovakia. |
Volume 3 , Number 5 , October 2014
|
# |
Article Title |
1
|
Design of a Communication Strategy for Wireless Sensors in Non-Deterministic Environments using Mobile Agents. [pdf]
Authors : PreetiSethi, DimpleJuneja Gupta and NareshChauhan, India.
|
2
|
The Design and Implementation of Beidou Satellite Navigation System RF Front-End Filter.[pdf] Authors :Guoping Chen, Yi Zhang, Jie Chang and Yikun Luo, China. |
Volume 3 , Number 4 , August 2014
|
# |
Article Title |
1
|
E-government Adoption and Trends in the Hashemite Kingdom of Jordan. [pdf]
Author : Sandi N. Fakhouri, Jordan.
|
2
|
Integrating ICTs into the Teaching process: Issues in Pedagogical Practices in Teacher Education.[pdf]
Authors : Kofi Bentum Wilson and Kofi Agyenim Boateng , Ghana.
|
Volume 3 , Number 3 , June 2014
|
# |
Article Title |
1
|
SMS Based Hardware Controlling System “A Ubiquitous Approach". [pdf]
Author : Mozammel Bin Motalab, Bangladesh.
|
2
|
An Efficient Source Information based Filtering Scheme for DDOS Attacks. [pdf]
Authors : M.Parameswari and S.Sukumaran, India.
|
Volume 3 , Number 2 , April 2014
|
# |
Article Title |
1
|
A Cognitive Model to Design a Real World Curriculum in Computer Science. [pdf]
Author : Virendra Gawande, Oman.
|
2
|
Comparative Performance Evaluation of Heap-Sort and Quick-Sort Algorithms. [pdf]
Authors : Ebtisam S. Al-Jaloud, Haifaa A. Al-Aqel and Ghada H. Badr, Kingdom of Saudi Arabia.
|
3
|
Crime Classification Algorithm for Mining Crime Hot Spot and Cold Spot.[pdf]
Authors: M. VijayaKumar, P.Balamurugan, Basim Alhadidi and Hanumanthappa, India.
|
Volume 3 , Number 1 , February 2014
|
# |
Article Title |
1
|
Evaluating the Awareness and Perceptions of Lecturers in using E-Learning Tools for Teaching in University of Cape Coast[pdf]
Authors : John Kwame Euafo Edumadze, Theophilus Aquina Ossei-Anto , Gladys Edumadze , Wisdom Kwadzo Tamakloe , Eric Asamoah and Ernest Boadi, Ghana.
|
2
|
New E-Tools in Teaching Writing under the Umbrella of Literature. [pdf]
Author : Samah Thabet, Egypt.
|
3
|
Research of a Wide Input Range SMPS. [pdf]
Authors : Danjiang Chen and Qiaowen Zhang,China.
|
Volume 2 , Number 6 , December 2013
|
# |
Article Title |
1
|
ALPR for Ambiguous Character using Template Matching with Fuzzy Classifiers: a Survey. [pdf]
Authors : G.Angel, J. Rethna virgil Jeny and J. Albert Simon, India.
|
2
|
Integrating Information Technology into Pedagogy: The Gender Perspective. [pdf]
Authors : Brandford Bervell, Paul Dela Ahiatrogah , John Ekow Laryea and Gabriel Essilfie, Ghana.
|
3
|
MDIA-Master Directed Incentive Based Approach. [pdf]
Authors : Aarti Singh and Divya Chadha , India.
|
4
|
Use of Information and Communication Technology for Teaching and Learning in Ghanaian Universities: Case of University of Cape Coast. [pdf]
Authors: John Kwame Eduafo Edumadze and Anthony Akwesi. Owusu, Ghana.
|
Volume 2 , Number 5 , October 2013
|
# |
Article Title |
1
|
A Framework for Model-Based Code Generation from a Flowchart. [pdf]
Authors : Basma Moukhtar Hussein and Akram Salah, Egypt.
|
2
|
A Cognitive model to enhance learning outcomes in Computing. [pdf]
Authors : Virendra Gawande, Sarika Gawande and Yassir Abdulghani Al-Bazzaz, Oman.
|
3
|
Email policy for tertiary institutions – A study of University of Cape Coast. [pdf]
Author:Kofi Ayebi-Arthur, Ghana.
|
4
|
Factors affecting adoption of ICT among Omani faculty members in Sultanate of Oman. [pdf]
Authors: Said Rashid Al-Senaidi and Virendra Gawande, Oman.
|
5
|
Performance Analysis of Hybrid Protocols in MANETs. [pdf]
Authors: Ibikunle Frank and Ebiesuwa Seun, Nigeria.
|
Volume 2 , Number 4 , August 2013
|
# |
Article Title |
1
|
Design and Implementation of VLSI Systolic Array Multiplier for DSP Applications. [pdf]
Authors : S. Kishore Reddy, N. R. Reddy and A. Ravi Shankar, Ethiopia.
|
2
|
Intelligent Surfacing Mechanism for Semantic Deep Web. [pdf]
Authors : Aarti Singh and Shaily Sachdeva, india.
|
3
|
Technical Analysis of the Learning Algorithms in Data Mining Context. [pdf]
Author :Hisham S. Katoua, Kingdom of Saudi Arabia.
|
Volume 2 , Number 3 , June 2013
|
# |
Article Title |
1
|
Bio Inspired and Evolutionary Approaches to Optimize MANET Routing. [pdf]
Authors : T.Dhamodharan, S. Vimalanand and C. Chandrasekar, India.
|
2
|
Software Requirements Elicitation Tools for Service Oriented Architecture: Comparative Analysis. [pdf]
Author : Qasem Nijem, Kingdom of Saudi Arabia.
|
3
|
The Role and Prospect of Information and Communication Technology in National Development. [pdf]
Authors :Sefiu Taiwo Oloruntoyin and Ibrahim Adepoj, Nigeria .
|
4
|
A Systems Approach to Designing a Graphical Interface in eHealth. [pdf]
Authors: Sunil Eapen Mammen and Deepa Madathil, India.
|
5
|
Prediction of Call Arrival Process and Call Holding Time using Stochastic Modeling Process. [pdf]
Authors: R. Kaniezhil, C. Chandrasekar and Basim Alhadidi, India.
|
Volume 2 , Number 2 , April 2013
|
# |
Article Title |
1
|
Requirements Engineering Through Viewpoints. [pdf]
Author : Mohammed Messaoudi, Kingdom of Saudi Arabia.
|
2
|
Design of Remote Security System Using Embedded Linux Based Video Streaming. [pdf]
Authors : Nagaraja G. and Sharada P.N, India.
|
3
|
Notional View of Cloud Computing on Higher Education in Virtual Learning Environment. [pdf]
Authors :Kumar R. and Barani G., India .
|
4
|
Search Interface to Capture Searchers Behaviour. [pdf]
Authors: Fadhilah Mat Yamin, T. Ramayah and Wan Hussain Wan Ishak, Malaysia.
|
5
|
Office of the Future: Digitizing Record-Keeping. [pdf]
Authors: Okoro U. R., Awodele O., Kuyoro S. O. and Adekunle Y.A., Nigeria.
|
Volume 2 , Number 1 , February 2013
|
# |
Article Title |
1
|
Augmented Dressed Body System Controlled By Motion Capture Data. [pdf]
Authors : Khaled F. Hussain, Adel A. Sewisy and Islam T. El-Gendy, Egypt.
|
2
|
Integration of Background Removal and Thermography Techniques for Crowd Density Scrutinizing. [pdf]
Authors : Adnan Ghazi Abuarafah and Mohamed Osama Khozium, Kingdom of Saudi Arabia.
|
3
|
Cloud Computing Technology: A powerful Engine to Promote Economy in Islamic Societies. [pdf]
Authors :Abdolhamid Rouhani and Nazura Abdul Manap, Malaysia.
|
4
|
Internet Presence: A case for web 2.0 technology in the University of Cape Coast. [pdf]
Author: Kofi Ayebi-Arthur, Ghana.
|
5
|
Short Term Load Forecasting using Neuro-fuzzy-Wavelet Approach. [pdf]
Authors: D.K.Chaturvedi, Sinha Anand Premdayal and Ashish Chandiok, India.
|
Volume 1 , Number 2 , December 2012
|
# |
Article Title |
1
|
Binary Based Biological Network Model: A Review. [pdf]
Authors : Ugege Peter Edemewe, Agbaegbu Johnbosco and Akee Sakirat Adedayo, Nigeria.
|
2
|
On the Deployment of Password Hints Using Pre-Attentive Visual Priming for One-Time Passwords. [pdf]
Authors : Kenneth Revett and Ahmed Selim Bahaa, Egypt.
|
3
|
Performance Evaluation of Exhaustive-Search Equivalent Pattern Matching under Chebyshev distance. [pdf]
Authors : Mohamed Yousef and Khaled F. Hussain, Egypt.
|
4
|
Analysis of Security Risks in Bluetooth. [pdf]
Author: Manish Shrivastava, India.
|
Volume 1 , Number 1 , October 2012
|
# |
Article Title |
1
|
Optimized Circularly Polarized Bandwidth for Microstrip Antenna. [pdf]
Authors : Shashikant Patil, Arpan Patel and Ankur Bansal, India.
|
2
|
Looking through the Lenses of Educational Management Information Systems (EMIS). [pdf]
Authors : Simon-Peter Kafui Aheto and Jonathan Fletcher, Ghana.
|
3
|
Impact of Information Technology on Nigeria Banking Industry: a case Study of Skye Bank. [pdf]
Authors : Ibikunle Frank and James Oluwafemi, Nigeria.
|
4
|
Reasoning Methodologies for Intelligent e-Learning Systems. [pdf]
Author : Hisham S. Katoua, Kingdom of Saudi Arabia.
|
5
|
A Clustering Internet Search Agent for User Assistance. [pdf]
Authors : Ebtessam Mohamed Desouky and Mahmoud Mohamed El-Khouly, Egypt.
|
|
|
|
|