|
Issue |
Title |
|
Vol 4, No 1: JISCT |
A Cloud-based Business Analytics for Supply Chain Decision Support |
Abstract
PDF
|
Shah J. Miah |
|
Vol 4, No 1: JISCT |
A Comprehensive Review of Cloud Computing Simulators |
Abstract
PDF
|
Hitesh Marwaha |
|
Vol 5, No 2: JISCT |
A Conceptual Requirements Model for the Domain of Electronic Service Delivery: Success Factors in E-Government Implementation |
Abstract
PDF
|
Arbi Ghazarian, Mehdi Sagheb-Tehrani |
|
Vol 3, No 3: JISCT |
A Corpus-Based Analysis of Four Modality Types |
Abstract
PDF
|
Nam-Kil Kang |
|
Vol 7, No 2: JISCT |
A Hand-Based Biometric Verification System Using Ant Colony Optimization |
Abstract
PDF
|
Nirmal Pandey, O.P. Verma, Amioy Kumar |
|
Vol 5, No 1: JISCT |
A new approach called Weighted Least Squares Ratio (WLSR) Method to M-estimators |
Abstract
PDF
|
MURAT YAZICI |
|
Vol 3, No 1: JISCT |
A New Computing Envornment Using Hybrid Cloud |
Abstract
PDF
|
T.Venkat Narayana Rao, Kamsali Naveena, Reena David |
|
Vol 6, No 1: JISCT |
A Performance Assessment on Various Data mining Tool Using Support Vector Machine |
Abstract
PDF
|
S. Prasath |
|
Vol 2, No 2: JISCT |
A Review: Cloud Computing Technologies and Its Technical Improvements |
Abstract
PDF
|
Ateeq Ahmad |
|
Vol 4, No 1: JISCT |
A sEMG-driven Musculoskeletal Model to Control Exoskeleton Robot Used in Lower Extremity Rehabilitation |
Abstract
PDF
|
Shi Lei, Zhen Liu, Chao Zhang |
|
Vol 2, No 1: JISCT |
A Study of Customer Behaviour Through Web Mining |
Abstract
PDF
|
Wahidah Husain |
|
Vol 7, No 2: JISCT |
A Wireless Sensor Network Based Solar Powered Harvesting System for Aquaculture |
Abstract
PDF
|
Daudi Samson Simbeye |
|
Vol 2, No 2: JISCT |
Adaptive Security Mechanism: a study on the different approaches to mobile devices |
Abstract
PDF
|
Zair Abdelouahab, , Denivaldo Lopes, Jonathan Santos, Willian Ribeiro, Higo Pires |
|
Vol 5, No 2: JISCT |
An Enhanced Technique for Face Recognition and Retrieval with Feature Extraction Using Euclidean Distance Classifier |
Abstract
PDF
|
S. Prasath |
|
Vol 4, No 2: JISCT |
Artificial Immune Algorithm for exams timetable |
Abstract
PDF
|
Tad Gonsalves, Rina Oishi |
|
Vol 5, No 1: JISCT |
Cloud Computing Security: A Survey |
Abstract
PDF
|
Elaheh Golzardi |
|
Vol 5, No 2: JISCT |
Computerized Measurement and Control System of the Universal Testing Machine Based On Virtual Instruments |
Abstract
PDF
|
Daudi Samson Simbeye |
|
Vol 7, No 1: JISCT |
Concealment Conserving the Data Mining of Groups & Individual |
Abstract
PDF
|
Abu Sarwar Zamani |
|
Vol 3, No 3: JISCT |
Designing and Developing E-Passport System Using &Asp.Net Implanting E-government Concepts |
Abstract
PDF
|
Mohamed Abaza, Saif Fatooh |
|
Vol 1, No 1: JISCT |
Development Of Health Care Systems in Subareas of KSA Using GIS Concept |
Abstract
PDF
|
Magdy Shayboub A. Mahmoud, Mohamed Ibrahim Abdel Magid, Samir Mahmud A. Abdullah, Nasreldin M. El-Tayeb |
|
Vol 5, No 3: JISCT |
Effective Capacity Analysis for Cognitive Networks under QoS Satisfaction |
Abstract
PDF
|
Mohamed Elalem |
|
Vol 4, No 2: JISCT |
Electronic accounting Applications using Cloud Computing technology |
Abstract
PDF
|
Alameen Eltoum Mohamed Abdalrahman, Adil Mahmoud Mohamed Mahmoud |
|
Vol 4, No 3: JISCT |
Electronic service quality: An empirical investigation in Saudi Arabia |
Abstract
PDF
|
Moez Bellaaj, Ines Zekri |
|
Vol 7, No 1: JISCT |
Evaluation of Random Early Detection and Adaptive Random Early Detection in Benchmark Scenarios |
Abstract
PDF
|
Rohit P. Tahiliani, Sagar Sachdeva, Sachin Hadke, Shane Sheehan, Eamonn O’ Nuallain |
|
Vol 2, No 1: JISCT |
Gesture-controlled user interfaces |
Abstract
PDF
|
Vikrant Sharma, Bharat Droch |
|
1 - 25 of 72 Items |
1 2 3 > >> |