|
Issue |
Title |
|
Vol 3, No 3: JISCT |
Hiding Information- A Survey |
Abstract
PDF
|
Samir Kumar Bandyopadhyay, Subhojit Malik, Writi Mitra |
|
Vol 6, No 1: JISCT |
Hybrid Approach for Resource Provisioning in Cloud Computing |
Abstract
PDF
|
Moh'D Zuhier Freaj, Azzam Sleit |
|
Vol 4, No 3: JISCT |
Improving BB84 in Quantum Encryption |
Abstract
PDF
|
Elaheh Golzardi |
|
Vol 6, No 2: JISCT |
Improving Data Integrity in Communication Systems by Designing a New Security Hash Algorithm |
Abstract
PDF
|
S. Hakim, M. Fouad |
|
Vol 5, No 1: JISCT |
Improving the MVA-km Method for Transmission Cost Allocation Using Counter-Flow Approaches |
Abstract
PDF
|
Alireza Sedaghati, Ali Mokhtarizade |
|
Vol 1, No 1: JISCT |
Increasing energy efficiency in wireless sensor networks using cognitive radios |
Abstract
PDF
|
Pranjal Singh |
|
Vol 6, No 2: JISCT |
Industrial Air Pollution Monitoring System Based on Wireless Sensor Networks |
Abstract
PDF
|
Daudi Samson Simbeye |
|
Vol 1, No 1: JISCT |
Information Retrieval: A Comparative Study of Textual Indexing using an Oriented Object Database (DB4O) and the Inverted File |
Abstract
PDF
|
Mohammed ERRITALI |
|
Vol 5, No 3: JISCT |
Information Visualization Tool for Academic Institutions: Imam University as a Case Study |
Abstract
PDF
|
Omar A. AlShathry |
|
Vol 4, No 3: JISCT |
Intertwined Relationships between Systems Analysis & Design and Software Engineering |
Abstract
PDF
|
Mohammad A. Rob |
|
Vol 7, No 2: JISCT |
MANAGEMENT OF ARCHIVES IN PUBLIC UNIVERSITIES OF KENYA, KISII UNIVERSITY |
Abstract
PDF
|
Rodger Mokandu Osebe, Josephine Orayo, Jane N Muthoka |
|
Vol 3, No 2: JISCT |
Managing Access to Electronic Health Records in a Cloud Computing Environment |
Abstract
PDF
|
Emmanuel Kusi Achampong, Clement Dzidonu |
|
Vol 4, No 3: JISCT |
Modelling and Optimization of a Non-Constrained Multi-objective Problem having Multiple Utility Functions using Bayesian Theory |
Abstract
PDF
|
Hamed Fazlollahtabar, Pooneh Abbasian, Nezam Mahdavi-Amiri |
|
Vol 8, No 1: JISCT |
Newborn Health Data Transfer in the Cape Coast Metropolis, Ghana |
Abstract
PDF
|
Emmanuel Kusi Achampong, Godwin Adzakpah, Richard Okyere Boadu, Obed Owumbornyi Lasim, Richard Opoku |
|
Vol 3, No 1: JISCT |
Open Source Virtual Machines on Xen: Creation, Implementaion and Analysis |
Abstract
PDF
|
Prakash Kumar |
|
Vol 4, No 2: JISCT |
Organizational Hospital Management Team working as Professional Technological Innovation |
Abstract
PDF
|
Nasser Fegh-hi Farahmand |
|
Vol 6, No 1: JISCT |
Path Optimization and Object Localization Using Hybrid Particle Swarm and Ant Colony Optimization for Mobile RFID Reader |
Abstract
PDF
|
Mohd Zaki Zakaria, Md Yusoff Jamaluddin |
|
Vol 7, No 2: JISCT |
Performance Evaluation of Bluetooth Low Energy Communication |
Abstract
PDF
|
Manas Marawaha, Pradeep Jha, Rohan Razdan, Jonathan Dukes, Shane Sheehan, Eamonn O’ Nuallain |
|
Vol 7, No 1: JISCT |
Performance Evaluation of HTTP/2 over TLS+TCP and HTTP/2 over QUIC in a Mobile Network |
Abstract
PDF
|
Yueming Zheng, Ying Wang, Mingda Rui, Andrei Palade, Shane Sheehan, Eamonn O’ Nuallain |
|
Vol 1, No 1: JISCT |
Performances analysis of image encryption for medical applications |
Abstract
PDF
|
Sammoud Ali, Adnen Cherif |
|
Vol 6, No 2: JISCT |
Pilot Aided Transmissions Technique to Achieve Optimal Effective Capacity Over Imperfect Channel Estimation in Cognitive Radio Networks |
Abstract
PDF
|
Mohamed Elalem |
|
Vol 6, No 1: JISCT |
Point-Of-Sales Systems in Food and Beverage Industry: Efficient Technology and Its User Acceptance |
Abstract
PDF
|
Yomayra Ramos, Angel Ojeda Castro |
|
Vol 4, No 2: JISCT |
Power Load Optimization for a Remote Area BTS Site Using MPPT Algorithms |
Abstract
PDF
|
Bahaa Abdul Khaliq, Anas Lateef Mahmood |
|
Vol 2, No 1: JISCT |
Pretreatment of web log files |
Abstract
PDF
|
Mohammed ERRITALI, Hanane EZZIKOURI |
|
Vol 5, No 3: JISCT |
Recent Trends in Image Encryption: A Review |
Abstract
PDF
|
Ibrahim M. Harram |
|
26 - 50 of 72 Items |
<< < 1 2 3 > >> |