首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Journal of Emerging Trends in Computing and Information Sciences
ISSN Print: 2079-8407
ISSN Online:
主页:
http://www.cisjournal.org/
分享:
Go
Finding Web Log Groups with Geometric Data Analysis
Nikos Koutsoupias
Synergizing E-infrastructures Initiatives to Foster e-Research in Higher Education Institutions in Africa
Simon M. KARUME
,
Kelvin K. OMIENO
Gait Recognition Based Improved Histogram
Muzhir Sh. Al-Ani
,
Isra H. Al-Ani
User Perception of Electronic Resources in the University of Ilorin, Nigeria (UNILORIN)
BASHORUN
,
M. Tunji
,
ISAH Abdulmumin
,
M.Y ADISA
Proffering a Brand New Method for Mapping of Tasks to Resource in Grid Computing with the Aims of Load Balancing Based on P2P Model Uses Ant Colony Algorithm
Ali Sarhadi
A Fuzzy Search Model for Dealing with Retrieval Issues in Some Classes of Dirty Data
Olufade
,
F. W. ONIFADE
,
Oladeji
,
P. AKOMOLAFE
Performance Comparison of Two Dynamic Routing Protocols: RIP and OSPF
Fatima A. Hamza
,
Amr M. Mohamed
Multi-Objective Optimization Using Multi Parent Crossover Operators
Rahila Patel
,
M.M.Raghuwanshi
Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption
Aderemi A. Atayero
,
Oluwaseyi Feyisetan
Survey on ICT for HIV/AIDS Preventive Education: Are the teenagers forgotten in developing countries?
Bada Joseph Kizito
,
Jarkko Suhonen
Trust Based Authorization Framework for Grid Services
Sarbjeet Singh
A Perceptually Approach for Speech Enhancement Based on Mmse Error Estimators and Masking in an Auditory System
T.Raghavendra Vishnu
,
P.S.Brahamanandam
,
Raghava Yathiraju
,
Naga Himaja Alla
Detecting Auto Insurance Fraud by Data Mining Techniques
Rekha Bhowmik
Detection and Control of DDOS Attacks over Reputation and Score Based MANET
Rizwan Khan
,
A. K. Vatsa
An improved Combinatorial Particle Swarm Optimization Algorithm to Database Vertical Partition
Bilal Benmessahel
,
Mohamed Touahria
Systems Analysis and Design for Service Oriented Architecture Projects: A Case Study at the Federal Financial Institutions Examinations Council (FFIEC)
Chon Abraham
,
Iris Junglas
,
Mike Willis
A Dark Side of Computing and Information Sciences: Characteristics of Online Groomers
Petter Gottschalk
Reaching Activities by Places in the Context-Aware Environments Using Software Sensors
Kamran Taj Pathan
,
Stephan Reiff-Marganiec
,
Asad Ali Shaikh
,
Nizamuddin Channa
Eye Detection and Tracking in Image with Complex Background
Mohammadali Azimi Kashani
,
Mahdi Mollaei Arani
,
Mohammad Reza Ramezanpour
A Novel Metric For Measuring The Readability of Software Source Code
Bajeh
,
A. O.
Information Computing in Crime Mapping: The Pocket Man Case of Criminal Child Sexual Abuse
Petter Gottschalk
,
Morten Espen ?rn
Learning Electronically in Nigeria Universities: The Example of Federal University of Technology Minna, Nigeria
Evarest C. Madu
,
Laura Anointing Pam
Intelligent Widget Reconfiguration for Mobile Phones
Peter K.K. Loh
,
C.T. Lau
,
B.H. Chan
A CBR-based Approach to ITIL-based Service Desk
Abtin Refahi Farjadi Tehrani
,
Faras Zuheir Mustafa Mohamed
Effectiveness of Telecentre using a Model of Unified Theory of Acceptance and Use of Technology (UTAUT): Structural Equation Modeling Approach
Abdulwahab
,
L
,
Zulkhairi Md Dahalin
Efficient Method for Multiple-Level Association Rules in Large Databases
Pratima Gautam
,
K. R. Pardasani
Adaptation, Design and Application of a Computational Trust and Reputation Model for the Assessment of an Agent
ETENG
,
I.E
,
OSOFISAN
,
N. O.
Counter-based Traffic Management Scheme for Vehicular Networks
Tarun Prakash
,
Ritu Tiwari
A Study of Mining Software Engineering Data and Software Testing
T.Murali Krishna
,
Devara Vasumathi
Software Cost Estimation Methods: A Review
Vahid Khatibi
,
Dayang N. A. Jawawi
Developing a Block-Cipher-Key Generator Using Philosophy of Data Fusion Technique
Soukaena H. Hashem
,
Mohammad A. AL-Hamami
,
Alaa H. AL-Hamami
An Empirically Base Path Loss Model for GSM Fixed Wireless Access
Shalangwa D. A.
,
Singh
,
K. S.
Examining the Effect of Technology Acceptance Model on ICT Usage in Nigerian Tertiary Institutions
Oye N. D
,
Noorminshah A
,
NorZairah Ab. Rahim
User Perception of Electronic Resources in the University of Ilorin
BASHORUN
,
M. Tunji
,
ISAH Abdulmumin
,
M.Y ADISA
RELEVANCE OF INFORMATION LITERACY IN DIGITAL ENVIRONMENT
R. N. Mishra
,
C. Mishra
The Rule Based Intrusion Detection and Prevention Model for Biometric System
Maithili Arjunwadkar
Fruit Recognition using Color and Texture Features
R. Newlin Shebiah
Solving Fuzzy based Job Shop Scheduling Problems using Ga and Aco
P Surekha
Linking Geographic Dispersion, Commitment, and Job Satisfaction: the Mediating Role of Quality Relationship
Rocco Agrifoglio
,
Concetta Metallo
Using Multimodal Fusion in Accessing Web Services
Manolo Dulva Hina
Reliable Job Scheduler using RFOH in Grid Computing
Leyli Mohammad Khanli
,
Maryam Etminan Far
,
Ali Ghaffari
A Systems Approach for Dealing with Resistance to Change: With Reference to Library and Information Professionals Working in Academic and Research Sector Libraries in India
Kshema Prakash
Impact of Gender and Nationality on Acceptance of a Digital Library: An Empirical Validation of Nationality Based UTAUT Using SEM
Rita Oluchi ORJI
Age Estimation based on Neural Networks using Face Features
Nabil Hewahi
Evaluation of ICT Penetration in Selected Insurance Companies: The Lagos Experience
Apampa .
,
Olatunji Razaq
Encouraging the Inclusion of Evolutionary Psychology into Information Systems’ Theoretical Repertoire as an Emerging Trend
Chon Abraham
Introducing a Graduate Research Problem to a Junior Level Class: A Successful Experience
Ghassan Alkadi
,
Theresa Beaubouef
Knowledge based Diagnosis of Abdomen Pain using Fuzzy Prolog Rules
Priti Srinivas Sajja
KNOWLEDGE STRATEGY FOR FINANCIAL CRIME PREVENTION
Petter Gottschalk
Go