|
Issue |
Title |
|
Volume 2, Issue 5, November 2013 |
The use of a Comprehensive Identification Infrastructure in Enhancing the lifetime of Sensor Networks |
Abstract
PDF
|
Payam Salehi, Mohammad Ebrahim Shiri Ahmad Abadi |
|
Volume 3, Issue 1, January 2014 |
Theoretical Factors underlying Data Mining Techniques in Developing Countries: a case of Tanzania |
Abstract
PDF
|
Salim Amour Diwani, Anael Sam |
|
Volume 5, Issue 4, July 2016 |
Timely diagnosis of the heart disease using data mining algorithm |
Abstract
PDF
|
Hamid Reza Sahebi, Mohammad Azimimehr |
|
Volume 4, Issue 3, May 2015 |
To Go or Not To Go: N-hop Congestion Notice with Experience Support for Dynamic Detouring |
Abstract
PDF
|
Kuen-Liang Sue, Chih-Yi Kao |
|
Volume 3, Issue 6, November 2014 |
Towards a Secure Maturity Model for Protecting e-Government Services in Tanzania: A Stakeholders View |
Abstract
PDF
|
Mohamed D. Waziri, Zaipuna O. Yonah |
|
Volume 3, Issue 5, September 2014 |
Towards A Secure Remote Electronic Voting in Tanzania Organizational Challenges |
Abstract
PDF
|
Sylvester Kimbi, Yaw Nkansah-Gyekye, Kisangiri Michael |
|
Volume 5, Issue 2, March 2016 |
Towards An Algorithms Ontology Cluster: for Modular Code Reuse and Polyglot Programming |
Abstract
PDF
|
Karabo Selaolo, Hlomani Hlomani |
|
Volume 3, Issue 2, March 2014 |
Traditional Host based Intrusion Detection Systems’ Challenges in Cloud Computing |
Abstract
PDF
|
Masoudeh Keshavarzi |
|
Volume 2, Issue 4, September 2013 |
Traffic-Aware Selection Strategy for Application-Specific 3D NoC |
Abstract
PDF
|
Sanaz Azampanah, Azadeh Eskandari, Ahmad Khademzadeh, Fathollah Karimi |
|
Volume 2, Issue 3, July 2013 |
USE OF E-LEARNING TOOLS TO SOLVE GROUP WORK PROBLEMS IN HIGHER EDUCATION: A CASE STUDY OF GULF COUNTRY |
Abstract
PDF
|
HABIB ULLAH KHAN |
|
Volume 2, Issue 5, November 2013 |
Using Contourlet Transform and Discrete Cosine Transform and SVD for Digital Watermarking |
Abstract
PDF
|
S. A. Hosseini, S. Ghofrani |
|
Volume 3, Issue 6, November 2014 |
Using generalised Łukasiewicz’s t-norm to represent and improve fuzzy rough approximations |
Abstract
PDF
|
Iwan Tabakow |
|
Volume 4, Issue 3, May 2015 |
Using GIS data and satellite images to manage hazard zone in earthquake |
Abstract
PDF
|
Hamoon Fathi, Mohammad Salman Ghavami |
|
Volume 5, Issue 1, January 2016 |
Using k-means clustering algorithm for common lecturers timetabling among departments |
Abstract
PDF
|
hamed babaei, Jaber Karimpour, Sajjad Mavizi |
|
Volume 4, Issue 5, September 2015 |
Variability management challenges in small and medium sized enterprises (SMEs) |
Abstract
PDF
|
Tuomas Ihme, Päivi Parviainen, Susanna Teppola |
|
Volume 4, Issue 3, May 2015 |
VCS-RSCBAODV: Vehicular Cloud Storage Concepts for RSCBAODV Protocol to Reduce Connection Breakage in VANET |
Abstract
PDF
|
N. Arul Kumar, Dr. E. George Dharma Prakash Raj |
|
Volume 3, Issue 6, November 2014 |
Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol |
Abstract
PDF
|
Seyed Mohammad Alavi, Behzad Abdolmaleki, Karim Baghery |
|
Volume 2, Issue 3, July 2013 |
Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks |
Abstract
PDF
|
Mohammad Reza Rohbanian, Mohammad Rafi Kharazmi, Alireza Keshavarz-Haddad, Manije Keshtgary |
|
Volume 3, Issue 2, March 2014 |
Weighted Twin Support Vector Machine with Universum |
Abstract
PDF
|
Shuxia Lu, Le Tong |
|
Volume 4, Issue 6, November 2015 |
Writer Identity Recognition and Confirmation Using Persian Handwritten Texts |
Abstract
PDF
|
aida sheikh, Hassan Khotanlou |
|
Volume 4, Issue 4, July 2015 |
« ACASYA »: a knowledge-based system for aid in the storage, classification, assessment and generation of accident scenarios. Application to the safety of rail transport systems |
Abstract
PDF
|
Dr. Habib HADJ-MABROUK, Dr. Hinda MEJRI |
|
326 - 346 of 346 Items |
<< < 9 10 11 12 13 14 |