|
Issue |
Title |
|
Vol 3, No 1 (2015): February 2015 |
3D Virtual Object Manipulation Interface for Virtual Surgery using Gesture Recognition |
Abstract
PDF
|
Ho-chul Shin, Jae-chan Jeong, Jae-il Cho |
|
Vol 6, No 2 (2018): April 2018 |
A Data Exchange Interoperability Framework for eHealth Applications in Ethiopia |
Abstract
PDF
|
Wondwosen Shiferaw, Mengistu Kifle, Senanu Okuboyejo, Victor Mbarika |
|
Vol 2, No 5 (2014): October 2014 |
A Fast Wavelet-Based Seam Carving Algorithm for Image Resizing |
Abstract
PDF
|
Hsi-Chin Hsin, Tze-Yun Sung, Chin-Wei Su |
|
Vol 2, No 6 (2014): December 2014 |
A Feature Based Facial Image Morphing System |
Abstract
PDF
|
Jya-Kai Chang, Wei-Fen Hsieh, Shih-Chieh Chen, Lieu-Hen Chen, Yasufumi Takama |
|
Vol 3, No 3 (2015): August 2015 |
A Miniature Study on Mobile Ad-Hoc Networks |
Abstract
PDF
|
V. Anantha Krishna |
|
Vol 4, No 3 (2016): June 2016 |
A Provably Secure Trapdoor Hash Function Based on k-ECAA |
Abstract
PDF
|
Fuw-Yi Yi Yanga, Su Hui Chiu |
|
Vol 4, No 2 (2016): April 2016 |
A Single Traversal Algorithm for Serializing any Binary Tree |
Abstract
PDF
|
Austin Owino Wetoyi |
|
Vol 4, No 6 (2016): December 2016 |
A Study of Young Taiwanese Consumers’ Attitude toward Internet Transnational Surrogate Buyer Service: Perspectives from Merchandise Attribute, Consumers’ Perceived Result and Characteristics |
Abstract
PDF
|
Huey-Wen Chou, Chi-Long Yen, Li-Ru Hwand |
|
Vol 3, No 2 (2015): April 2015 |
Accelerate the Solution of Problems of Digital Signal Processing Technology Based INTEL CILK PLUS |
Abstract
PDF
|
M. Musaev, I. Khujayarov, A. Buriboev |
|
Vol 6, No 1 (2018): February 2018 |
Adoption and Implementation of Health Information System in Limited Resource Setting: A Survey on User Experience Perspective |
Abstract
PDF
|
Geletaw Sahle, Henok Bekele |
|
Vol 5, No 1 (2017): April 2017 |
After IT Outsourcing: An Exploratory Research of an Agency of Taiwan from the Perspectives of IT Personnel’s Ability and IT Budget Allocation _ |
Abstract
PDF
|
Huey-Wen Chou, Chi-Lung Yen |
|
Vol 2, No 6 (2014): December 2014 |
An Analysis of Top Management Change on Information Security Management System |
Abstract
PDF
|
Dyana Zainudin, Humayun Bakht, Atta Ur Rahman |
|
Vol 4, No 1 (2016): February 2016 |
An Efficient Hybrid Filtering Method for Noise and Artifacts Removal in Effective Medical Image Segmentation |
Abstract
PDF
|
S. Karthikeyan, V. V. Gomathi, H. Hemalatha |
|
Vol 1, No 2 (2013): August 2013 |
An Empirical Evaluation of the Effect of Automated Teller Machines Investment on Cost Efficiency of Banks in Nigeria |
Abstract
PDF
|
Jonathan Oyerinde Adewoye |
|
Vol 3, No 3 (2015): August 2015 |
An Empirical Study of Software Requirements Verification and Validation Techniques along their Mitigation Strategies |
Abstract
PDF
|
Hameed Ullah Khan, Ikram Asghar, Shahbaz Ahmad A. K. Ghayyur, Mohsin Raza |
|
Vol 3, No 5 (2015): December 2015 |
An Exploratory Analysis of Public Healthcare Data: A Case Study of Jammu & Kashmir State |
Abstract
PDF
|
Anand Sharma, Vibhakar Mansotra, Sourabh Shastri |
|
Vol 1, No 1 (2013): June 2013 |
Analysis and Design an Expert System for Identifying the Types of Water Quality in the Context of Physical Indicators |
Abstract
PDF
|
Shah Murtaza Rashid Al Masud |
|
Vol 2, No 6 (2014): December 2014 |
Applying Data Mining Technology on Risk Analysis for Transitional Cell Carcinoma on End-Stage Renal Disease Patients with Maintenance Hemodialysis |
Abstract
PDF
|
Yi-Horng Lai |
|
Vol 3, No 2 (2015): April 2015 |
Area Optimized Low Latency Karatsuba Ofman Multiplier Variant for Elliptical Curve Cryptography |
Abstract
PDF
|
Sunil Devidas Bobade, Vijay R. Mankar |
|
Vol 3, No 1 (2015): February 2015 |
Assessment and Evaluation of KOHA ILS for Online Library Registration at University of Jos, Nigeria |
Abstract
PDF
|
Akpokodje Nkiruka Vera, Akpokodje Thomas Edore |
|
Vol 3, No 4 (2015): October 2015 |
Audio-visual Recognition of Auscultatory Breathing Sounds using Fourier and Wavelet Analyses |
Abstract
PDF
|
Fumio Nogata, Yasunai Yokota, Yoko Kawamura, Hiroyuki Morita, Yoshiyuki Uno |
|
Vol 1, No 4 (2013): December 2013 |
Cloud Computing: Software as a Service (SaaS ) Model in Academic Book Publication |
Abstract
PDF
|
Usman-Hamza F. E. |
|
Vol 4, No 5 (2016): October 2016 |
Combating Intra-Region DoS Attacks in Delay Tolerant Networks using Energy-Efficient Mechanisms |
Abstract
PDF
|
Godwin Ansa, Haitham Cruickshank, Zhili Sun, Feda Alshahwan |
|
Vol 3, No 1 (2015): February 2015 |
Comparative Analysis of Genetic Algorithm and Particle Swam Optimization: An Application in Precision Agriculture |
Abstract
PDF
|
Oluleye Babatunde, Leisa Armstrong, Jinsong Leng, Dean Diepeveen |
|
Vol 1, No 2 (2013): August 2013 |
Comparing GUI Automation Testing Tools for Dynamic Web Applications |
Abstract
PDF
|
Samer Al-Zain, Derar Eleyan, Yousef Hassouneh |
|
1 - 25 of 90 Items |
1 2 3 4 > >> |