IAJeT Vol. 2
IAJeT Vol. 2, No. 4
Developing a Three-Tier Web Data Management Application for Higher Education Admission Environment
Mumtaz AL-Mukhtar and Sarmad Hadi
- A Novel Approach to RGB Channel Based Image Steganography Technique Gandharba Swain and Saroj Kumar Lenka
- An Information Retrieval Model from World Wide Web based on Formal Concept Analysis Minyar Sassi Hidri and Amel Grissa Touzi
- An Effective Method For Data Compression Based On Adaptive Character Wordlength Wiam Al Hayek
- The Impact of E-Learning in Workplace: Focus on Organizations and Healthcare Environments Oye David, Mazleena Salleh and Noorminshah Iahad
- Medical Documents Classification Based on the Domain Ontology MeSH Zakaria Elberrichi, Belaggoun Amel and Taibi Malika
- Opportunities for Utilizing Mobile Learning Services in the Palestinian Higher Education Naji Shukri Alzaza
- Self Organizing Maps based Life Enhancement Framework for Wireless Sensor Networks Abdul Mannan
IAJeT Vol. 2, No. 3
- Emad A. Abu-Shanab
- The Anatomy of a Domain-Specific Search-Phrase Suggestion Tool for Literature Digital Libraries. Sulieman Bani-Ahmad
- Evaluation of Differential Evolution and Particle Swarm Optimization Algorithms at Training of Neural Network for Stock Prediction. Hatem Abdul- Kader and Mustafa Abdul Salam
- Challenges in Developing Citizen-Centric E-Governance in Libya. Seema Verma, Savita Kumari, Mahmoud Arteimi, Amer Deiri, Rakesh Kumar
- Osama Salameh
- A Novel DWT Based Invisible Watermarking Technique for Digital Images. M.Mohamed Sathik and S.S.Sujatha
IAJeT Vol. 2, No. 2
Adaptive Mobility Management Scheme for Mobile IP using Ad Hoc Networks
Hatem Hamad, Shadi Abudalfa and Shaaban Sahmoud
Applying an Efficient Searching Algorithm for Intrusion Detection on Ubicom Network Processor
Qutaiba Ibrahim and Sahar Lazim
Consumer Protection in Electronic Contracts
A Systematic Approach for Agent Design Based on UML
Momtaz Al-Kholy, Ahmed Khalifa and Mohamed El-saied
Wireless Network Security Still Has no Clothes
Diaa Salama, Hatem Abdual Kader, and Mohiy Hadhoud
Automated Arabic Text Categorization Using SVM and NB
IAJeT Vol. 2, No. 1
Studying the Effects of Most Common Encryption Algorithms
Diaa Salama, Hatem Abdual Kader, and Mohiy Hadhoud.
Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation
Marghny Mohamed, Fadwa Al-Afari and Mohamed Bamatraf.
Analysis and Design of a Guaranteed Real Time Performance Enhanced Industrial Ethernet
Qutaiba Ali and Basil Mahmood.
A Simple Approach for Education Using Virtual Human Dataset
Woo Chaw Sengand Seyed Hadi Mirisaee.
Design and Implementation of a Port Simulator Using Formal Graphical Approach (FGA)
Maged Elazony, Ahmed Khalifa and Mohamed Alsaied.
A Multimedia Offline Cell Phone System For English Language Learning
Image Denoising And Enhancement Using Multiwavelet With Hard Threshold In Digital Mammographic Images
Kother Mohideen, Arumuga Perumal, Krishnan and Mohamed Sathik.
Internet Banking Adoption in an Emerging Economy: Indian Consumer’s Perspective
Rahmath Safeena, Hema Date and Abdullah Kammani.
Last Updated (Sunday, 27 May 2012 09:36)