|
|
|
|
|
|
Archive and Current Issue
Volume
10 , Number 1 , April 2024
|
# |
Article Title |
1
|
Artificial Intelligence
Technique in earth sciences for
porosity prediction in shaly
petroleum reservoir from
geophysical well-logs data.
Application to Hassi R’mel
field, Algeria.[pdf]
Authors: ALIOUANE Leila and
OUADFEUL Sidali , Algeria.
|
Volume
9 , Number 4 , August 2020
|
# |
Article Title |
1
|
Emergency Remote Teaching during
COVID-19: Lessons Learned.[pdf]
Author: Taher Omran Ahmed, Oman.
|
Volume
9 , Number 3 , June 2020
|
# |
Article Title |
1
|
Holistic Approach to Mobile Cash
Transaction.
[pdf]
Authors: Bulama Mohammed, Bala
Yakubu Mohammed Abba Hassan and
Mohammed Lamir Isah,
Nigeria.
|
Volume
9 , Number 2 , April 2020
|
# |
Article Title |
1
|
The Impact of Augmented Reality
on E- learning Systems in Saudi
Arabia Universities Overview.[pdf]
Authors: Asma Alsayyar and Riyad
Almakki, Kingdom of Saudi Arabia.
|
Volume
9 , Number 1 , February 2020
|
# |
Article Title |
1
|
Analyzing & Modelling Energy
Consumption Logs.[pdf]
Authors: Abba Hassan, Bala
Mohammed Yakubu and Bulama
Mohammed , Nigeria.
|
Volume
8 , Number 6 , December 2019
|
# |
Article Title |
1
|
A Triarchic Model on Student’s
M-Learning Readiness in the
Omani Context: A Structural
Model View.[pdf]
Author: Said Rashid AL Senaidi ,
Oman.
|
Volume
8 , Number 5 , October 2019
|
# |
Article Title |
1
|
Semiconductors: An
Investigational Study.[pdf]
Author: Muna Farhan Abed Aladwan ,
Jordan.
|
2 |
Performance of Naïve and
Complement Naïve Bayes
Algorithms Based on Accuracy,
Precision and Recall Performance
Evaluation Criterions.[pdf]
Authors: Berna Seref and Erkan
Bostanci , Turkey.
|
Volume
8 , Number 4 , August 2019
|
# |
Article Title |
1
|
Features of Ultrasonic
Application for Non-Invasive
Massage.[pdf]
Authors: Muhammad Al-Ayyad,
Sergii Kozeruk and Volodymyr
Shvaichenko ,
Jordan.
|
Volume
8 , Number 3 , June 2019
|
# |
Article Title |
1
|
Method of Synthesis for
Controlled Generators Balanced
SAC-Function.[pdf]
Author: Ali T. AL-Khwaldeh ,
Jordan.
|
Volume
8 , Number 2 , April 2019
|
# |
Article Title |
1
|
Error Detection and Correction
Using a Genetic Algorithm.[pdf]
Authors : Mohammad Wedyan,
Hadeel Al-Zoubi and Jaffar Atwan ,
Jordan.
|
2
|
Arabic Text Light Stemmer.[pdf]
Authors : Jaffar Atwan, Mohammad
Wedyan and Hadeel Al-Zoubi ,
Jordan.
|
3
|
A Survey on Spectrum Prediction
Methods in Cognitive Radio
Networks.[pdf]
Authors : Sayhia TIDJANI and
Zohier HAMMOUDI ,
Algeria.
|
4
|
Economic and Social Prospect of
the Internet of Things: an
Explanatory Study.[pdf]
Authors : Adnan Alrabea and
Basim Alhadidi ,
Jordan.
|
Volume
8 , Number 1 , February 2019
|
# |
Article Title |
1
|
Towards Offline Arabic
Handwritten Character
Recognition Based on
Unsupervised Machine Learning
Methods: A Perspective Study.[pdf]
Authors : Ahmad Hasasneh, Nael
Salman and Derar Eleyan ,
Palestine.
|
Volume 7 , Number 6 , December 2018
|
# |
Article Title |
1
|
ICT Usage in Senior High School Education in Ghana: Effects of Demographic Antecedents.[pdf]
Authors : Ruth DEBRA and Albert Arthur QUA-ENOO , Ghana.
|
Volume 7 , Number 5 , October 2018
|
# |
Article Title |
1
|
Android Based Photomontage Application.[pdf]
Authors : Dhia Damkhi and Mouslem Damkhi , Algeria.
|
Volume 7 , Number 4 , August 2018
|
# |
Article Title |
1
|
Traditional supervised weighting method vs. Logistic regression.[pdf]
Author : Sajjad Salehi, Italy.
|
2
|
A Robust Evaluation for Indoor Channel Propagation Model Based on IA-RSSI algorithm.[pdf]
Author : Xiaolan Yang, Xiaodan Du, Yi Zhang and Weijie Wang, China.
|
Volume 7 , Number 3 , June 2018
|
# |
Article Title |
1
|
A Point-Based Algorithm to Generate Final Table States of Football Tournaments.[pdf]
Authors :
Mouslem Damkhi and Huseyin
Pehlivan, Turkey.
|
2
|
A New Criterion for Stability of Delayed Takagi-Sugeno Fuzzy Cohen-Grossberg Neural Networks.[pdf]
Author : Neyir Ozcan, Turkey.
|
Volume 7 , Number 2 , April 2018
|
# |
Article Title |
1
|
Extension for Workload Performance Measurement in an Educational Database System.[pdf]
Authors : Mehmet Akif Yanatma and M. Utku Kalay, Turkey.
|
2
|
Generation and Enumeration of Final Table States of Football Tournaments Using a Blind Adaptive Filtering Algorithm.[pdf]
Authors : Mouslem Damkhi and
Huseyin Pehlivan, Turkey.
|
3
|
A Hybrid Movie Recommendation System Using Graph-Based Approach.[pdf]
AuthGoksu
Tuysuzoglu and Zerrin Isik, Turkey.
|
Volume 7 , Number 1 , February 2018
|
# |
Article Title |
1
|
More Efficient Solution of Equations Using New Technological Solutions and Knowledge Bases.[pdf]
Authors : Mattoug Dalal Ramadan Saad and
Mladen Radivojevic, Libya.
|
Volume 6 , Number 6 , December 2017
|
# |
Article Title |
1
|
Moving Towards Global Technological Advancement: Basis for the E-Clearance Program Development.[pdf]
Authors : Luis Cadiz III, Carl Ni�o Bondoc and Johnbert Estroga, Philippines.
|
Volume 6 , Number 5 , October 2017
|
# |
Article Title |
1
|
Determination of Leaf Type by Image Processing Techniques.[pdf]
Authors : Emre AVU�LU and Abdullah ELEN, Turkey.
|
2
|
A South African Case Study in Social Activism: #Pay Back The Money.[pdf]
Author : Abraham G. van der Vyver , South Africa. |
3 |
Bibliographic Review: GIS Sciences and Informal Settlements.[pdf]
Author : Jean M. Caldieron, United States of America. |
4
|
Utilization of Computer and Information Technology by Physicians.[pdf]
Authors : Basim Alhadidi and Thamer Al-Rousan, Jordan. |
Volume 6 , Number 4 , August 2017
|
# |
Article Title |
1
|
Exploring Quality Assurance Practices in Management Studies Using Academic Student Information System .[pdf]
Author : Asha Alexander, Kingdom of Saudi Arabia.
|
2
|
Internet of Things: A rule-based analysis applied to a ubiquitous healthcare system.[pdf]
Authors : Reda CHEFIRA and Said RAKRAK , Morocco. |
3 |
A Novel Method of Trend Lines Generation Using Hough Transform Method.[pdf]
Authors : Parisut Jitpakdee and Niran Pravithana, Thailand. |
Volume 6 , Number 3 , June 2017
|
# |
Article Title |
1
|
Experimental Evaluation of Shape Memory Alloy Characteristics.[pdf]
Author : Hussein M. Alalem, Lybia.
|
2
|
Smooth Handoff Process Cluster_Based In Vehicular Ad Hoc Networks.[pdf]
Authors : Wa’el Jum’ah Al_Zyadat, Faisal Y.Al-Zyoud and Aysh M. Alhroob, Jordan. |
Volume 6 , Number 2 , April 2017
|
# |
Article Title |
1
|
E-commerce Implementation: A Critical Review.[pdf]
Authors: Eman Altameem and Riyad Almakki, Kingdom of Saudi Arabia.
|
2
|
Negative Selection Algorithm: Recent Improvements and Its Application in Intrusion Detection System.[pdf]
Authors : Chikh Ramdane and Salim Chikhi, Algeria. |
3
|
Combined DHT Precoding and A-Law Companding for PAPR Reduction in FBMC/OQAM signals.[pdf]
Authors : Imad Ahmed Shaheen, AbdelhalimZekry, FatmaNewagy and Reem Ibrahim, Egypt. |
4
|
Determining Minimum Cost Field in Vehicle AD-Hoc Sensor Networks .[pdf]
Authors : Faisal Y.Al-zyoud, Akrem y. Albakheet and Wa’el Jum’ah Al_zyadat, Jordan. |
5
|
Computer Network Performance management using a Simple Network ManagementProtocol.[pdf]
Author : Akram M. Rady and Hatem M. Zakaria , Egypt. |
6
|
E-learning System – Challenges & Barries: A Case Study.[pdf]
Author : Issam Jebreen, Jordan. |
7
|
An experimental Case Study: Comparing Perceived Usability of Two Mobile Environments of a SPOC.[pdf]
Authors : Naima Belarbi, Nadia Chafiq, Mohammed Talbi and Abdelwahed Namir , Morocco. |
8
|
Using AMixed Image Fusion Algorithm To Reduce Noise Images.[pdf]
Authors : Najib Tanish, Mansur Jaba, Musbah Elsghair and Abdusalam Aburgiga, Serbia. |
9
|
Internet of Things: A Healthcare Ubiquitous-Based Approach for Medical Seizure Prevention.[pdf]
Authors : Reda CHEFIRA and Said RAKRAK , Morocco. |
10
|
Force & Compliance Detection on Robot Gripping Manipulator.[pdf]
Authors : Hussein M. Alalem and Asma M. Eshahiry , Lybia. |
Volume 6 , Number 1 , February 2017
|
# |
Article Title |
1
|
Modelling and Prediction of Surface Roughness in CNC Turning Operation using Support Vector Machine.[pdf]
Authors : Tiagrajah V. Janahiraman, Nooraziah Ahmad and Wan Illia Binti Wan Ishak, Malaysia.
|
Volume 5 , Number 6 , December 2016
|
# |
Article Title |
1
|
Application of Agents for Efficient Energy Consumption: Coalition Formations approach; A Systematic Review.[pdf]
Authors : Areej A. Malibari, Amjad H. Gamlo and Azoof E. Metro, Kingdom of Saudi Arabia.
|
2
|
Smooth Handoff Process Cluster_Based In Vehicular Ad Hoc Networks.[pdf]
Authors : Wa’el Jum’ah Al_Zyadat, Faisal Y.Al-Zyoud and Aysh M. Alhroob, Jordan. |
Volume 5 , Number 5 , October 2016
|
# |
Article Title |
1
|
Automatic Formation Method of Prospecting Line Profile Map in Complex Coal Geology Based on AutoCAD.[pdf]
Authors: Zhaogui Zhaogui Shou, Enke Hou and Zhenni Ye, China.
|
2
|
Performance Comparison of Most Common High Level Programming Languages SPECT.[pdf]
Authors : ZahidaParveen and Nazish Fatima, Kingdom of Saudi Arabia. |
3
|
Insight on Clustering based Energy Efficient Routing Protocols in WSN.[pdf]
Authors : Aarti Singh, Davender K. Malhotra and Kavita Gupta , India. |
4
|
A Simulation-Based Approach to Analyze CPU Debt in a Cloud.[pdf]
Authors : Jawad Alkasasbeh, Basim Alhadidi and Souvik Pal, Jordan. |
Volume 5 , Number 4 , August 2016
|
# |
Article Title |
1
|
A Conceptual Model for Knowledge Sharing Among Small Groups Using Discussion Cases.[pdf]
Authors: Narumon Sriratanaviriyakul and Jamal El-Den, Australia.
|
2
|
IP Multimedia Subsystem and Its Future Perspectives.[pdf]
Authors : Orhan Orhan, Cahit Bollu, Mehmet Ulvi Agca, Selcuk Keskin and Taskin Kocak, Turkey. |
3
|
Assessing Staff Acceptance and Compliance with Information Security.[pdf]
Authors : Talal Alotaibi and Steven Furnell, Kingdom of Saudi Arabia. |
4
|
Robo Tester Evolution (RTE) Automation Tool for GSM Tariff Tests.[pdf]
Authors : Orhan Orhan and Esma Akbey, Turkey. |
5
|
A Chaotic Random Bit Generator with Image Encryption Applications.[pdf]
Author : G�nyaz Ablay , Turkey. |
6
|
Resistance Factors Influencing the Adoption of Cloud Computing in Middle East Government Sectors.[pdf]
Authors : Thamer Al-Rousan and Nabil Abu Hashish, Jordan. |
7
|
Intelligent Control System of Intra-Frame Beehive Heater.[pdf]
Authors : Raif BAYIR and Ahmet ALBAYRAK, Turkey. |
8
|
Performance Test of MPI on Raspberry Pi 2 Beowulf Cluster.[pdf]
Authors : Erdem A�Ÿbahca and Adem Alpaslan Altun, Turkey. |
Volume 5 , Number 3 , June 2016
|
# |
Article Title |
1
|
Shielding and Duplication for Adaptive Crosstalk-Aware Error Control Coding in On-Chip Communication.[pdf]
Authors: Wameedh Nazar Flayyih and Fakhrul Zaman Rokhani, Iraq.
|
2
|
Effects of Copper 0.127 mm Thick Flat Sheet on Hot Region Images as A Material Filter for Scatter Correction in Tc-99m SPECT.[pdf]
Authors : Inayatullah Shah Sayed and Siti Zawani Harun, Malaysia. |
3
|
Enhanced Packet Dropping Algorithm and Neighbour Node Cluster Strategy for Intrusion Detection in MANET.[pdf]
Authors : E.Selvi and M.S. Shashidara , India. |
4
|
Use of an Effective Attenuation Coefficient Value and Material Filter Technique for Scatter Correction in Tc-99m SPECT.[pdf]
Authors : Inayatullah Shah Sayed and Siti Zubaidah Muda, Malaysia. |
5
|
ABSEP3S- An Agent Based Security Engine for Privacy Preserving in Personalized Search.[pdf]
Authors : AnuSharma, Ali T. Al-khwaldeh and Aarti Singh , India. |
Volume 5 , Number 2 , April 2016
|
# |
Article Title |
1
|
An Improved K-Means Clustering Algorithm.[pdf]
Authors: Asmita Yadav and Sandeep Kumar Singh, India.
|
2
|
A Novel Approach for Constructing Ontology Based Grounded Index and Context Sensitive Query Processor.[pdf]
Authors : Sneh Dalal, Jyoti Verma,Komal and Kumar Bhatia, India. |
3
|
Use of a Tin (Sn) Flat Sheet as a Material Filter for Reduction of Scattered Gamma Photons and Enhancement of Cold Regions Image Quality in Tc-99m SPECT.[pdf]
Author : Inayatullah Shah Sayed, United Kingdom. |
4
|
WIRS: Wisdom Based Information Retrieval System.[pdf]
Authors : Vijay Rana and Vijay Dhir, India. |
Volume 5 , Number 1 , February 2016
|
# |
Article Title |
1
|
Maximizing Energy Based on SNR using Self Organizing Map in MANETs. [pdf]
Authors : Asha Shiny X.S. and Jagadeesh Kannan R., India.
|
2
|
A Survey on Elementary, Symmetric and Asymmetric Key Cryptographic Techniques. [pdf]
Authors : V.Hemamalini, G. Zayaraz, V.Susmitha, M.Gayathri and M.Dhanam, India.
|
3
|
Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring. [pdf]
Authors : R.Shanmuga Sundaram, D.Arthy and T.Priya Radhika Devi, India.
|
4
|
Hide me and Authenticate Implementation of Multi party Key Authentication and SAPA Protocol for Secured Data Transaction in Cloud. [pdf]
Authors : R. Archana and S. Prasanna, India.
|
5
|
A Generic Permutational Edge Detection Approach for Corrupted Images. [pdf]
Authors : P.Shanmugavadivu and A.Shanthasheela, India.
|
6 |
Proficiency Comparison of Random Forest and J48 Classifiers for Heart Disease Prediction. [pdf]
Author : Lakshmi Devasena C, India.
|
7 |
Predicting Effect of Past Qualification in Successful Honoring Master of Computer Applications Degree – A Neural Network Approach. [pdf]
Author : Shanti Verma, India.
|
8 |
Cloud Storage Auditing With Key Generation Using Blowfish Algorithm. [pdf]
Authors : N.Meenakshi and G.Sasikala, India.
|
9 |
A Comprehensive Conflict Resolution Approach for Multiagent Systems. [pdf]
Authors : Dimple Juneja, Aarti Singh, Rashmi Singh and Saurabh Mukherjee, India.
|
10 |
Beowulf Cloud: A Scalable Cloud Computing Architecture. [pdf]
Author : Vishal Garg, India.
|
Volume 4 , Number 6 , December 2015
|
# |
Article Title |
1
|
An Improved Indexing Mechanism Based On Homonym Using Hierarchical Clustering in Search Engine.[pdf] Authors: Varsha Rathi and Neha Bansal, India.
|
2
|
Lung Cancer Detection from X-Ray Image Using Statistical Features.[pdf]
Author : Vinod Kumar, Ashu Gupta, Rattan Rana and Kanwal Garg, India. |
3
|
Application of Min-Min and Max-Min Algorithm for Task Scheduling in Cloud Environment Under Time Shared and Space Shared VM Models.[pdf]
Authors : Sanjay Kumar and Atul Mishra, India. |
4
|
Multispectral Satellite Image Retrieval Using The Combination of Features Color, Shape and Texture.[pdf]
Authors : Chandani Joshi,G.N. Purohit and Saurabh Mukherjee, India. |
5
|
Case-Agent Based System for Designing Wireless Sensor Network.[pdf]
Authors : A.H.Mohamed and M.H.El-Fouly, Egypt. |
Volume 4 , Number 5 , October 2015
|
# |
Article Title |
1
|
Identical Twins Face Recognition System Based on Time Series Motif Discovery.[pdf] Authors: Mahmoud A. Elgamal, Esam A. Khan and Sameer M. Shaarawy, Kingdom of Saudi Arabia.
|
2
|
Time Synchronization for Data Communication in the Wireless Network Systems.[pdf]
Author : Ali T. Al-khwaldeh, Jordan. |
3
|
Enterprise Resource Planning (ERP) System as an Innovative Technology in Higher Education Context in Egypt.[pdf] Authors : Mohamed Soliman and Noorliza Karia , Malaysia. |
Volume 4 , Number 4 , August 2015
|
# |
Article Title |
1
|
MMS: Minimum Maximum Strategy for Classification and Testing.[pdf]
Author: Mohammed Issam Younis, Iraq.
|
2
|
Online Sales Tracking and Tax Collection (OST2C) Mechanism for Indian Context .[pdf]
Authors : Aarti Singh and Virender Singh, India. |
3
|
Evaluation of a Secure Agent Based Framework for Optimized Resource Scheduling in Cloud Computing.[pdf]
Authors : Aarti Singh and Manisha Malhotra, India. |
4
|
Reducing Checkpoint Creation Overhead using Data Similarity .[pdf]
Author: Angkul Kongmunvattana , United States of America. |
5
|
Situated Learning: Learning in a Contextual Environment .[pdf]
Authors :Virendra Gawande and Said Al-Senaidi, Oman. |
6
|
Improved Layered Architecture for Internet of Things.[pdf]
Author : Dina Gamal Darwish, Egypt. |
7
|
Improved Automated Parent Recognition Approach Based on Genetic Technique Analysis[pdf]
Authors : Ashraf K. ALDabbas, Basim Alhadidi and Mohammad Alayyad, Jordan. |
Volume 4 , Number 3 , June 2015
|
# |
Article Title |
1
|
University Course Timetable using Constraint Satisfaction and Optimization.[pdf] Author: Tarek El-Sakka, United Arab Emirates.
|
2
|
Using Regression Tools to Assess Hazard Identification in the U.S. Army Risk Management Process.[pdf] Authors : Heath McCormick and Rania Hodhod, United States of America. |
3
|
A Ranking Method for Fuzzy Complementary Judgment Matrix.[pdf] Author : Ming-Chang Lee, Taiwan. |
4
|
A Power Efficient Cluster Head Based Routing Protocol for Mobile Adhoc Network.[pdf] Authors : Pawan,Rajendra .K.Sharmaa and A.K.Sharma , India. |
5
|
Evaluation of Critical Success Factors for GIS Implementation Using Analytic Hierarchy Process.[pdf] Authors : Khalid Aly Eldrandaly, Soaad Mohammad Naguib, and Mohamed Monier Hassan, Egypt. |
6
|
Challenges and Benefits in Implementing M-learning inPre-university Education in Egypt.[pdf] Authors : Reham Adel Ali and Muhammad Rafie Mohd Arshad, Malaysia. |
7
|
Virtual Guides and Mechatronic Device for Interactive Surgical System.[pdf] Author : Moulay Ibrahim El-Khalil Ghembaza, Kingdom of Saudi Arabia. |
Volume 4 , Number 2 , April 2015
|
# |
Article Title |
1
|
Safety Analysis for Gamma Irradiator Interlocking System.[pdf] Authors : Hany Sallam and Wesam Z. Ibrahim, Egypt.
|
2
|
Advisory System for Student Enrollment in University Based on Variety of Machine Learning Algorithms.[pdf] Author : Mohamed M. Ezz, Egypt. |
3
|
A Cognitive Approach to Design a Real World Curriculum in Computer Science.[pdf] Authors : Virendra Gawande and Sarika Gawande, Oman. |
4
|
A Proposed Assessment Model of Database Performance on Virtual Machine vs. Traditional Server.[pdf] Authors : Nevine Makram Labib and Amr Ismail Hassan, Egypt. |
5
|
Construction of an Online Examination System with Resumption and Randomization Capabilities.[pdf] Authors : Mohammed Issam Younis and Maysam Sameer Hussein, Iraq. |
Volume 4 , Number 1 , February 2015
|
# |
Article Title |
1
|
Utility Maximization Scheduling in Multi-channel Wireless Networks.[pdf] Authors : Xiaoling Xiong and Ruixue Liu, China.
|
2
|
Reassessing Mobile Wireless Sensor Networks.[pdf] Authors : Dimple Juneja, Aarti Singh and Kavita Gupta, India. |
3
|
Updates in Knowledge Query Manipulation Language for Complex Multiagent Systems.[pdf] Authors : Ankit Jagga, Dimple Juneja and Aarti Singh, India. |
Volume 3 , Number 6 , December 2014
|
# |
Article Title |
1
|
The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company.[pdf]
Authors : Eman A. AL-Tameem and Heba K. Mohammad, Kingdom of Saudi Arabia.
|
2
|
Measuring the Impact of Security Protocols for Bandwidth [pdf] Authors : Milos Orgon and Lubomir Fackovec, Slovakia. |
Volume 3 , Number 5 , October 2014
|
# |
Article Title |
1
|
Design of a Communication Strategy for Wireless Sensors in Non-Deterministic Environments using Mobile Agents. [pdf]
Authors : PreetiSethi, DimpleJuneja Gupta and NareshChauhan, India.
|
2
|
The Design and Implementation of Beidou Satellite Navigation System RF Front-End Filter.[pdf] Authors :Guoping Chen, Yi Zhang, Jie Chang and Yikun Luo, China. |
Volume 3 , Number 4 , August 2014
|
# |
Article Title |
1
|
E-government Adoption and Trends in the Hashemite Kingdom of Jordan. [pdf]
Author : Sandi N. Fakhouri, Jordan.
|
2
|
Integrating ICTs into the Teaching process: Issues in Pedagogical Practices in Teacher Education.[pdf]
Authors : Kofi Bentum Wilson and Kofi Agyenim Boateng , Ghana.
|
Volume 3 , Number 3 , June 2014
|
# |
Article Title |
1
|
SMS Based Hardware Controlling System “A Ubiquitous Approach". [pdf]
Author : Mozammel Bin Motalab, Bangladesh.
|
2
|
An Efficient Source Information based Filtering Scheme for DDOS Attacks. [pdf]
Authors : M.Parameswari and S.Sukumaran, India.
|
Volume 3 , Number 2 , April 2014
|
# |
Article Title |
1
|
A Cognitive Model to Design a Real World Curriculum in Computer Science. [pdf]
Author : Virendra Gawande, Oman.
|
2
|
Comparative Performance Evaluation of Heap-Sort and Quick-Sort Algorithms. [pdf]
Authors : Ebtisam S. Al-Jaloud, Haifaa A. Al-Aqel and Ghada H. Badr, Kingdom of Saudi Arabia.
|
3
|
Crime Classification Algorithm for Mining Crime Hot Spot and Cold Spot.[pdf]
Authors: M. VijayaKumar, P.Balamurugan, Basim Alhadidi and Hanumanthappa, India.
|
Volume 3 , Number 1 , February 2014
|
# |
Article Title |
1
|
Evaluating the Awareness and Perceptions of Lecturers in using E-Learning Tools for Teaching in University of Cape Coast[pdf]
Authors : John Kwame Euafo Edumadze, Theophilus Aquina Ossei-Anto , Gladys Edumadze , Wisdom Kwadzo Tamakloe , Eric Asamoah and Ernest Boadi, Ghana.
|
2
|
New E-Tools in Teaching Writing under the Umbrella of Literature. [pdf]
Author : Samah Thabet, Egypt.
|
3
|
Research of a Wide Input Range SMPS. [pdf]
Authors : Danjiang Chen and Qiaowen Zhang,China.
|
Volume 2 , Number 6 , December 2013
|
# |
Article Title |
1
|
ALPR for Ambiguous Character using Template Matching with Fuzzy Classifiers: a Survey. [pdf]
Authors : G.Angel, J. Rethna virgil Jeny and J. Albert Simon, India.
|
2
|
Integrating Information Technology into Pedagogy: The Gender Perspective. [pdf]
Authors : Brandford Bervell, Paul Dela Ahiatrogah , John Ekow Laryea and Gabriel Essilfie, Ghana.
|
3
|
MDIA-Master Directed Incentive Based Approach. [pdf]
Authors : Aarti Singh and Divya Chadha , India.
|
4
|
Use of Information and Communication Technology for Teaching and Learning in Ghanaian Universities: Case of University of Cape Coast. [pdf]
Authors: John Kwame Eduafo Edumadze and Anthony Akwesi. Owusu, Ghana.
|
Volume 2 , Number 5 , October 2013
|
# |
Article Title |
1
|
A Framework for Model-Based Code Generation from a Flowchart. [pdf]
Authors : Basma Moukhtar Hussein and Akram Salah, Egypt.
|
2
|
A Cognitive model to enhance learning outcomes in Computing. [pdf]
Authors : Virendra Gawande, Sarika Gawande and Yassir Abdulghani Al-Bazzaz, Oman.
|
3
|
Email policy for tertiary institutions – A study of University of Cape Coast. [pdf]
Author:Kofi Ayebi-Arthur, Ghana.
|
4
|
Factors affecting adoption of ICT among Omani faculty members in Sultanate of Oman. [pdf]
Authors: Said Rashid Al-Senaidi and Virendra Gawande, Oman.
|
5
|
Performance Analysis of Hybrid Protocols in MANETs. [pdf]
Authors: Ibikunle Frank and Ebiesuwa Seun, Nigeria.
|
Volume 2 , Number 4 , August 2013
|
# |
Article Title |
1
|
Design and Implementation of VLSI Systolic Array Multiplier for DSP Applications. [pdf]
Authors : S. Kishore Reddy, N. R. Reddy and A. Ravi Shankar, Ethiopia.
|
2
|
Intelligent Surfacing Mechanism for Semantic Deep Web. [pdf]
Authors : Aarti Singh and Shaily Sachdeva, india.
|
3
|
Technical Analysis of the Learning Algorithms in Data Mining Context. [pdf]
Author :Hisham S. Katoua, Kingdom of Saudi Arabia.
|
Volume 2 , Number 3 , June 2013
|
# |
Article Title |
1
|
Bio Inspired and Evolutionary Approaches to Optimize MANET Routing. [pdf]
Authors : T.Dhamodharan, S. Vimalanand and C. Chandrasekar, India.
|
2
|
Software Requirements Elicitation Tools for Service Oriented Architecture: Comparative Analysis. [pdf]
Author : Qasem Nijem, Kingdom of Saudi Arabia.
|
3
|
The Role and Prospect of Information and Communication Technology in National Development. [pdf]
Authors :Sefiu Taiwo Oloruntoyin and Ibrahim Adepoj, Nigeria .
|
4
|
A Systems Approach to Designing a Graphical Interface in eHealth. [pdf]
Authors: Sunil Eapen Mammen and Deepa Madathil, India.
|
5
|
Prediction of Call Arrival Process and Call Holding Time using Stochastic Modeling Process. [pdf]
Authors: R. Kaniezhil, C. Chandrasekar and Basim Alhadidi, India.
|
Volume 2 , Number 2 , April 2013
|
# |
Article Title |
1
|
Requirements Engineering Through Viewpoints. [pdf]
Author : Mohammed Messaoudi, Kingdom of Saudi Arabia.
|
2
|
Design of Remote Security System Using Embedded Linux Based Video Streaming. [pdf]
Authors : Nagaraja G. and Sharada P.N, India.
|
3
|
Notional View of Cloud Computing on Higher Education in Virtual Learning Environment. [pdf]
Authors :Kumar R. and Barani G., India .
|
4
|
Search Interface to Capture Searchers Behaviour. [pdf]
Authors: Fadhilah Mat Yamin, T. Ramayah and Wan Hussain Wan Ishak, Malaysia.
|
5
|
Office of the Future: Digitizing Record-Keeping. [pdf]
Authors: Okoro U. R., Awodele O., Kuyoro S. O. and Adekunle Y.A., Nigeria.
|
Volume 2 , Number 1 , February 2013
|
# |
Article Title |
1
|
Augmented Dressed Body System Controlled By Motion Capture Data. [pdf]
Authors : Khaled F. Hussain, Adel A. Sewisy and Islam T. El-Gendy, Egypt.
|
2
|
Integration of Background Removal and Thermography Techniques for Crowd Density Scrutinizing. [pdf]
Authors : Adnan Ghazi Abuarafah and Mohamed Osama Khozium, Kingdom of Saudi Arabia.
|
3
|
Cloud Computing Technology: A powerful Engine to Promote Economy in Islamic Societies. [pdf]
Authors :Abdolhamid Rouhani and Nazura Abdul Manap, Malaysia.
|
4
|
Internet Presence: A case for web 2.0 technology in the University of Cape Coast. [pdf]
Author: Kofi Ayebi-Arthur, Ghana.
|
5
|
Short Term Load Forecasting using Neuro-fuzzy-Wavelet Approach. [pdf]
Authors: D.K.Chaturvedi, Sinha Anand Premdayal and Ashish Chandiok, India.
|
Volume 1 , Number 2 , December 2012
|
# |
Article Title |
1
|
Binary Based Biological Network Model: A Review. [pdf]
Authors : Ugege Peter Edemewe, Agbaegbu Johnbosco and Akee Sakirat Adedayo, Nigeria.
|
2
|
On the Deployment of Password Hints Using Pre-Attentive Visual Priming for One-Time Passwords. [pdf]
Authors : Kenneth Revett and Ahmed Selim Bahaa, Egypt.
|
3
|
Performance Evaluation of Exhaustive-Search Equivalent Pattern Matching under Chebyshev distance. [pdf]
Authors : Mohamed Yousef and Khaled F. Hussain, Egypt.
|
4
|
Analysis of Security Risks in Bluetooth. [pdf]
Author: Manish Shrivastava, India.
|
Volume 1 , Number 1 , October 2012
|
# |
Article Title |
1
|
Optimized Circularly Polarized Bandwidth for Microstrip Antenna. [pdf]
Authors : Shashikant Patil, Arpan Patel and Ankur Bansal, India.
|
2
|
Looking through the Lenses of Educational Management Information Systems (EMIS). [pdf]
Authors : Simon-Peter Kafui Aheto and Jonathan Fletcher, Ghana.
|
3
|
Impact of Information Technology on Nigeria Banking Industry: a case Study of Skye Bank. [pdf]
Authors : Ibikunle Frank and James Oluwafemi, Nigeria.
|
4
|
Reasoning Methodologies for Intelligent e-Learning Systems. [pdf]
Author : Hisham S. Katoua, Kingdom of Saudi Arabia.
|
5
|
A Clustering Internet Search Agent for User Assistance. [pdf]
Authors : Ebtessam Mohamed Desouky and Mahmoud Mohamed El-Khouly, Egypt.
|
|
|
|
|