Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Archives(2012-2019)
Editorial Team
About
About the Journal
Privacy Statement
Submissions
Contact
Search
Publication Ethics and Malpractice
Register
Login
Home
/
Volume 4 - Issue 4 (July 2015)
Volume 4 - Issue 4 (July 2015)
#
Article Title
1
Simulation Studies on Wireless Monitoring and Control of Water and Irrigation System using IEEE 802.15.4 MAC
Authors : Mehamed Ahmed Abdurrahman, Md. Asdaque Hussain
2
Hybrid Approach for Assessing Security Vulnerability and Increasing the Resiliency of Industrial Control System (ICS)
Author : Ruhama Mohammed Zain
3
Robust MIMO Radar Waveform Optimization to Improve the Worst-Case Detection Performance
Authors : Hongyan Wang, Bingnan Pei
4
On the Benefits of Elliptic Curve Cryptography and Steganography for the Security of Cyber-physical Systems
Authors : Laura Vegh, Liviu Miclea
5
Designing and Building a Database of Denial and Excuses for Student Affairs Unit
Author : Layth K. AL-Zuabi
6
Improving the Performance of kNN Queries with Location Privacy
Authors : Raed Al-Dhubhani, Jonathan Cazalas
7
Multimodal (MRI/PET) Fusion of Cerebral Images in Multiresolution Domain
Authors : W. Aribi, A. Khalfallah and M. S. Bouhlel, N. Elkadri
8
E-Verification: The Missing component in E-Recruitment Systems
Authors : Joseph M. Muthoni, Andrew M. Kahonge
9
Employing Semantic Web Technologies to Leverage Learning and Research
Authors : Friday Joseph Agbo, Kissinger Sunday
10
Stop and Move Semantic Trajectory Clustering with Existing Spatio-Temporal Data Model
Authors : Fatima J. Muhdher, Jonathan Cszalas
11
Performance Comparison between Spatial Multiplexing and Non Spatial Multiplexing Systems in Rayleigh Fading Channel with Co-Channel Interference
Authors : J. Minango, C. De Almeida
12
A Review of MC-CDMA Based Broadband Power Line Communications Systems
Authors : Daniel Ngondya, Justinian Anatory, Abdil Rashid Mohamed
13
Expert System for Diagnosis Neurodegenerative Diseases
Authors : Ayangbekun Oluwafemi J., Jimoh Ibrahim A.
14
MapReduce-based Similarity Measurement for Business Processes
Authors : Juntao Gao, Xueshan Wang, Yongan Wang
15
Utilizing the Categories Network in Wikipedia for Linking Named Entities
Author : Abdullah Bawakid
16
A Lower Bound for Codes Correcting Low Density Closed-Loop Burst
Author : Ambika Tyagi
17
Performance Analysis on the Implementation of Data Encryption Algorithms used in Network Security
Authors : Abraham Lemma, Maribel Tolentino, Gebremedhn Mehari
18
Simulation-based Performance Evaluation of Selected Routing Protocols in Mobile Ad hoc Networks
Authors : Goitom Abrehaley, Maribel Tolentino, Gebremedhn Mehari
19
Associative Rational Points for Improving Random Walkswith Collision–based Attack on Elliptic Curve Discrete Logarithm Problem
Authors : Yasuyuki Nogami, Thomas H. Austin
20
Developing a Dynamic Register of Security Quality and Maintenance for Medical Devices
Authors : Roland. C. Houessouvo, Daton Medenou, Gérard Degan
21
Enhanced Web Objects Classification using Social Tags
Authors : Moheb R. Girgis, Lamia M. Rady
22
Designing and Building of Students Cases Database System
Author : Layth K. AL-Zuabi
23
Quantum-inspired Ant Colony Optimization Algorithm
Authors : Jianping Li, Yizhu Duan
Make a Submission
Make a Submission
Language
English
Information
For Readers
For Authors
For Librarians