A Secure and Robust Prototype for Electronic Voting System |
Ashraf Darwish, Magidalgendy, Eman Mohamed |
Vol 5, No 2 (2012), Pagination: 161-168
|
ABSTRACT |
PDF
|
|
Abstract Views: 234 |
PDF Views: 0
|
Virtual Reality Helps Rheumatoid Arthritis Patients |
Wadee Alhalabi |
Vol 5, No 2 (2012), Pagination: 169-179
|
ABSTRACT |
PDF
|
|
Abstract Views: 223 |
PDF Views: 0
|
A Genetic Algorithm Scheduling Approach for Virtual Machine Resources in Cloud Data Centers |
Zohreh Royaee, Majid Mohammadi |
Vol 5, No 2 (2012), Pagination: 189-197
|
ABSTRACT |
PDF
|
|
Abstract Views: 298 |
PDF Views: 0
|
The Impact of Client-Server Modalities on Cryptography |
Al-Shomrani Mohammed Mosa, Mohammad A. A. Al-Rababah, Hussein Ahmad |
Vol 5, No 2 (2012), Pagination: 199-204
|
ABSTRACT |
PDF
|
|
Abstract Views: 240 |
PDF Views: 0
|
Queuing Approach to Estimate the MANET’s Optimal Number of Nodes |
Saad Talib Hasson, Enass Fadil |
Vol 5, No 2 (2012), Pagination: 205-214
|
ABSTRACT |
PDF
|
|
Abstract Views: 226 |
PDF Views: 0
|
Intelligent and Effective Diabetes Risk Prediction System Using Data Mining |
Kawsar Ahmed, Tasnuba Jesmin, Ushin Fatima, Md. Moniruzzaman, Abdulla-Al-Emran, Md. Zamilur Rahman |
Vol 5, No 2 (2012), Pagination: 215-221
|
ABSTRACT |
PDF
|
|
Abstract Views: 234 |
PDF Views: 0
|
Requirement for Computer Support and its Protocols for AVT |
Asia Begum, Faheem Khan, Parveen Mehboob, Muhammad Shoaib, Lala Rukh |
Vol 5, No 2 (2012), Pagination: 223-230
|
ABSTRACT |
PDF
|
|
Abstract Views: 228 |
PDF Views: 0
|
Using Artificial Bee Colony Algorithm for MLP Training on Software Defect Prediction |
Solmaz Farshidpour, Farshid Keynia |
Vol 5, No 2 (2012), Pagination: 231-239
|
ABSTRACT |
PDF
|
|
Abstract Views: 225 |
PDF Views: 0
|
New Developed Traffic Generator for NS-2 |
Saad Talib Hasson, Mohammad H. Husain |
Vol 5, No 2 (2012), Pagination: 241-250
|
ABSTRACT |
PDF
|
|
Abstract Views: 197 |
PDF Views: 0
|
Feature Aware Prediction of User Action in Software Process |
Seema Safi, Sajid Anwar, Lala Rukh |
Vol 5, No 2 (2012), Pagination: 251-256
|
ABSTRACT |
PDF
|
|
Abstract Views: 223 |
PDF Views: 0
|
Review on Financial Forecasting using Neural Network and Data Mining Technique |
Mehzabin Shaikh, Gyankamal J. Chhajed |
Vol 5, No 2 (2012), Pagination: 263-267
|
ABSTRACT |
PDF
|
|
Abstract Views: 221 |
PDF Views: 0
|
A Review on Role of Information Technology in Business Management |
A. Sreeram, D. R. P. Chandra Sekhar, S. R. Karumuri, Y. Srinivas, J. Vijayasekhar |
Vol 5, No 2 (2012), Pagination: 269-272
|
ABSTRACT |
PDF
|
|
Abstract Views: 234 |
PDF Views: 0
|
Batch Installer Inoculation for Digital Repository Software Open Source DSpace |
Bharat M. Chaudhari |
Vol 5, No 2 (2012), Pagination: 273-276
|
ABSTRACT |
PDF
|
|
Abstract Views: 210 |
PDF Views: 0
|
Double-reflecting Data Perturbation Method for Information Security |
Maram Balajee, Challa Narasimham |
Vol 5, No 2 (2012), Pagination: 283-288
|
ABSTRACT |
PDF
|
|
Abstract Views: 215 |
PDF Views: 0
|
Impact of Information Technology in Various Sectors |
A. Sreeram, Y. Srinivas, G. Ananda Rao, S. R. Karumuri, J. Vijayasekhar, R. Sampath Kumar |
Vol 5, No 2 (2012), Pagination: 289-294
|
ABSTRACT |
PDF
|
|
Abstract Views: 197 |
PDF Views: 0
|
Service Oriented Architecture Integration |
Suresh Krishnaraju, K. Subramani |
Vol 5, No 2 (2012), Pagination: 295-301
|
ABSTRACT |
PDF
|
|
Abstract Views: 208 |
PDF Views: 0
|
SSL Based Transport Layer Security |
J. Vijayabharathi |
Vol 5, No 2 (2012), Pagination: 315-320
|
ABSTRACT |
PDF
|
|
Abstract Views: 210 |
PDF Views: 6
|
Secure Dynamic Data Aggregation Routing Protocol for Wireless Sensor Networks |
Bhawana Mathur |
Vol 5, No 2 (2012), Pagination: 321-325
|
ABSTRACT |
PDF
|
|
Abstract Views: 184 |
PDF Views: 0
|
Cloud Computing:Risks and Security Issues |
Sucheta Arora |
Vol 5, No 2 (2012), Pagination: 327-332
|
ABSTRACT |
PDF
|
|
Abstract Views: 173 |
PDF Views: 0
|