IAJeT Vol. 2
2012 Index
The International Arab Journal of e-Technology Vol. 2
IAJeT Vol. 2, No. 4
June 2012
-
Developing a Three-Tier Web Data Management Application for Higher Education Admission Environment
Mumtaz AL-Mukhtar and Sarmad Hadi
- A Novel Approach to RGB Channel Based Image Steganography Technique Gandharba Swain and Saroj Kumar Lenka
- An Information Retrieval Model from World Wide Web based on Formal Concept Analysis Minyar Sassi Hidri and Amel Grissa Touzi
- An Effective Method For Data Compression Based On Adaptive Character Wordlength Wiam Al Hayek
- The Impact of E-Learning in Workplace: Focus on Organizations and Healthcare Environments Oye David, Mazleena Salleh and Noorminshah Iahad
- Medical Documents Classification Based on the Domain Ontology MeSH Zakaria Elberrichi, Belaggoun Amel and Taibi Malika
- Opportunities for Utilizing Mobile Learning Services in the Palestinian Higher Education Naji Shukri Alzaza
- Self Organizing Maps based Life Enhancement Framework for Wireless Sensor Networks Abdul Mannan
IAJeT Vol. 2, No. 3
January 2012
- Emad A. Abu-Shanab
- The Anatomy of a Domain-Specific Search-Phrase Suggestion Tool for Literature Digital Libraries. Sulieman Bani-Ahmad
- Evaluation of Differential Evolution and Particle Swarm Optimization Algorithms at Training of Neural Network for Stock Prediction. Hatem Abdul- Kader and Mustafa Abdul Salam
- Challenges in Developing Citizen-Centric E-Governance in Libya. Seema Verma, Savita Kumari, Mahmoud Arteimi, Amer Deiri, Rakesh Kumar
- Osama Salameh
- A Novel DWT Based Invisible Watermarking Technique for Digital Images. M.Mohamed Sathik and S.S.Sujatha
IAJeT Vol. 2, No. 2
June 2011
-
Adaptive Mobility Management Scheme for Mobile IP using Ad Hoc Networks
Hatem Hamad, Shadi Abudalfa and Shaaban Sahmoud -
Applying an Efficient Searching Algorithm for Intrusion Detection on Ubicom Network Processor
Qutaiba Ibrahim and Sahar Lazim -
Consumer Protection in Electronic Contracts
Hossein Kaviar -
A Systematic Approach for Agent Design Based on UML
Momtaz Al-Kholy, Ahmed Khalifa and Mohamed El-saied -
Wireless Network Security Still Has no Clothes
Diaa Salama, Hatem Abdual Kader, and Mohiy Hadhoud -
Automated Arabic Text Categorization Using SVM and NB
Saleh Alsaleem
IAJeT Vol. 2, No. 1
January 2011
-
Studying the Effects of Most Common Encryption Algorithms
Diaa Salama, Hatem Abdual Kader, and Mohiy Hadhoud. -
Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation
Marghny Mohamed, Fadwa Al-Afari and Mohamed Bamatraf. -
Analysis and Design of a Guaranteed Real Time Performance Enhanced Industrial Ethernet
Qutaiba Ali and Basil Mahmood. -
A Simple Approach for Education Using Virtual Human Dataset
Woo Chaw Sengand Seyed Hadi Mirisaee. -
Design and Implementation of a Port Simulator Using Formal Graphical Approach (FGA)
Maged Elazony, Ahmed Khalifa and Mohamed Alsaied. -
A Multimedia Offline Cell Phone System For English Language Learning
Osama Salameh. -
Image Denoising And Enhancement Using Multiwavelet With Hard Threshold In Digital Mammographic Images
Kother Mohideen, Arumuga Perumal, Krishnan and Mohamed Sathik. -
Internet Banking Adoption in an Emerging Economy: Indian Consumer’s Perspective
Rahmath Safeena, Hema Date and Abdullah Kammani.
Last Updated (Sunday, 27 May 2012 09:36)