The International Journal of Computer and Information Technology (IJCIT) delighted to announce the publication of the latest issue. The Volume 3 - Issue 6 (November 2014) is now freely available on
http://ijcit.net/current.php
The IJCIT is an international scholarly open access, peer reviewed bi-monthly journal. The journal aims at providing a platform and encourages emerging scholars and academicians globally to share their professional and academic knowledge in the fields of computer science, engineering, technology and related disciplines. IJCIT also aims to reach a large number of audiences worldwide with original and current research work completed on the vital issues of the above important disciplines.
In this issue:
# | Article Title |
1 | Biomedical Image Mapping: Issues and Challenges
Authors : Nurzi Juana Mohd Zaizi1, Albert Burger
|
2 | Implementation of a High-Performance Touch Controller and Differential Sensing Circuit
Authors : Sang Hyuck Bae, Yong S. Lee
|
3 | 3D-Cybertherapy and Immersive Learning Environments for Hand Stroke Patients' Daily Living Activities
Authors : Dayang Hjh Tiawa Awg Hj Hamid, A.H.Omar, Siti Rohani Isnin, Norazman Abdul Majid, Ardyansyah Syahrom
|
4 | An Agent Model with Adaptive Weight-based Multi-objective Algorithm for Road-network Congestion Management
Authors : Bin Jiang, Takashi Yamada, Chao Yang, Takao Terano
|
5 | Discrete Process Neural Networks and Its Application in Time Series Prediction
Authors : Xin Li, Panchi Li
|
6 | A Study on MANET Routing Protocol Performance with Node Mobility
Authors : Tulga Jargalsaikhan, Kilhung Lee
|
7 | A Network Meta-Analysis on the Effects of Information Technology Application on Preoperative Knowledge of Patients
Author : Yi-Horng Lai
|
8 | Big SQL 3.0 Functionality: A comprehensive approach to SQL-on-Hadoop
Authors : Anjali Khatri, Maria N. Schewenger, Neal Finkelstein
|
9 | Incentives for Online Communities
Authors : David DeAngelis, K. Suzanne Barber
|
10 | Function Templates for the Synthesis of Functional Programs
Authors : Natela Archvadze, Merab Pkhovelishvili, Otari Ioseliani, Lia Shetsiruli
|
11 | Improving the Similarity for Privacy in Location Based Service
Authors : Reemah M. Alhebshi, Jonathan Cazalas
|
12 | GB-KNN-WI: Group Based K-NN Queries Processing in MANETs with Wireless Integration
Authors : Shoaa JadAllah Al-Hejaili, Jonathan Cazalas
|
13 | User Concerns on Cloud Security – A UAE Perspective
Authors : Maurice Danaher, Choo Je Chong
|
14 | Lessons Learned in Academic Hybrid Software Development Projects – A Retrospective
Authors : Robert F. Roggio, Dalila Castilla
|
15 | A Survey of Circuit Level Techniques for Designing Ultra Low Power, Low Frequency OTA
Authors : Prashanth Shetty, Somashekhara Bhat
|
16 | Electronic Helpdesk Support System in Tertiary Institutions in Developing Countries: A Case Study of Lagos State University, Nigeria
Authors : Boluwaji A. Akinnuwesi, Oluwatoyin A. Enikuomehin, Faith-Michael E. Uzoka, Onyekachi C. Onwudike, Abayomi Osamiluyi, Benjamin S. Aribisala
|
17 | Palmprint Recognition by using Bandlet, Ridgelet, Wavelet and Neural Network
Authors : Mohanad A. M. Abukmeil, Hatem Elaydi, Mohammed Alhanjouri
|
18 | Reform Based Version Management System for XML Data
Authors : Sayed MD. Fahim Fahad, Md. Abdur Rafi Ibne Mahmood, Mohammad Zahidur Rahman
|
19 | Denoising of ABR Signals using Wavelet Packets
Author : Nivin Ghamry
|
20 | Enhancing User Experience using Mobile QR-Code Application
Authors : Abdulhakeem Aliyu Wara, Sunday Dugga
|
21 | SEC–DED–DAEC Codes for On-chip Memory Protection against Multiple Cell Upsets
Authors : Hoyoon Jun, Yongsurk Lee
|
22 | Comparative Analysis of Search Engine Usage, Relevance and Effectiveness among Final Year Undergraduate Students
Authors : Solomon A. Adepoju, Cosmas U. Ugwuoke, Grace A. Onyeabor, Joseph A. Abioye
|
23 | A Modified Neurofuzzy-based Quality of eLearning Model (Modified SCeLQM)
Author : Labib Arafeh
|
24 | Optimisation of the Linear Probability Model for Credit Risk Management
Authors : Kanelo Tsepiso Nyathi, Siqabukile Ndlovu, Sibonile Moyo, Thambo Nyathi
|
25 | A Novel Framework for Effective Deployment of E-Learning Environment in Developing Countries: A Case Study of Pakistan
Authors : Muhammad Nawaz, Bilal Zaka, Bilal Zaka
|
26 | Guidelines for Designing Reusable Software Components
Authors : Basem Y. Alkazemi, Mohammed K. Nour, Abd-El-Kader Sahraoui
|
27 | Incorporating Human Computer Interaction with Web Technologies to Augment Communication and Interaction in Higher Learning Institutions: A Study Conducted at the University of Dar es Salaam
Author : Anthony Mwombeki
|
28 | Exploratory Study of Information System User Satisfaction: A Study of University of Ibadan Post Graduate School Web Portal
Author : Simeon Ambrose Nwone
|
29 | Applicability of Quality Attribute-Driven Architecting In the Context of Agile Software Development: A Case Study
Authors : G. H. El-Khawaga , Galal Hassan Galal-Edeen, A. M. Riad
|
30 | What are we tweeting about? :Providing Context for Twitter Analysis
Authors : Martin Ebner, Thomas Altmann
|
31 | Parameter Controlled Harmony Search Algorithm for Solving the Four-Color Mapping Problem
Authors : Bnar Faisal A. Daham, Mohammed Nasseh Mohammed, Kanar Shukr Mohammed
|
32 | LEACH-1R: Enhancing The LEACH Protocol Using The First Round Clusters
Author : Mohammed Omari
|
33 | The Impacts of Changing of Mandatory Information Systems on the End-User Satisfaction
Authors : Ramadan Moawad, Yasser Elsheshengy
|
34 | Game Theoretic Multi-Agent Algorithms for the Job Shop Scheduling Problem
Authors : Orwa Horace Owiti, Elisha T. Opiyo Omulo, William Okelo-Odongo, Bernard Manderick
|
35 | Answer Set Survey
Author : Omar EL-Khatib
|
36 | Reducing Power Dissipation in Multi-Core Processors using Effective Core Switching
Authors : Vijayalakshmi Saravanan, Aniket Shivam, Sudeep Chauhan
|
37 | COBAS-M: A Proposal Method in Analysis in Financial Corporative Business Architectures
Authors : Miguel A. González Serrano, Diana Pérez-Marín, Miren Idoia Alarcón
|
38 | Context-Aware Formalization of Inter-Model Relations
Author : Ahmet Egesoy
|
39 | Image Encryption Based on Pixel Shuffling and Random Key Stream
Authors : T. Sivakumar, R. Venkatesan
|
40 | On Multiplayer Techniques for Crowdsourcing Mapping onto Custom Domain-Specific Architectures
Authors : Gayatri Mehta, Xiaozhong Luo, Anil Kumar Sistla, Andrew Marin, Mukund Malladi, Krunalkumar Patel, Brandon Rodgers
|
41 | Fractional Metrics for Fuzzy c-Means
Authors : Amina Dik, Khalid Jebari, Abdelaziz Bouroumi, Aziz Ettouhami
|
42 | Influence of Mobile Operating System Characteristics on Adoption of Mobile Devices in Education: The Case of Higher Learning Institutions in Kenya
Authors : Peter Namisiko, William Sakataka, Sylvester Mackton Wanyama
|
43 | Modeling and Monitoring of a Distillation Column
Authors : Samia Latreche, Mohammed Mostefai, Abd Essalam Badoud, Mabrouk Khemliche
|
The IJCIT invite you to consider submitting a manuscript for inclusion in this journal. Submissions are welcome from across all streams related to computing and information technology. The subject areas covered by the IJCIT include (but are not limited to):
Algorithms, Applications of computer science in modeling, Artificial Intelligence, Bio-informatics, Circuits and Systems, Cloud Computing, Computer Architecture, Computer Vision, Computer Graphics and Multimedia, Data Communication and Computer Networks, Computer in Agriculture, Computing in Energy Technology, Computing in Hybrid/Convergence Service/Technology, Computing in Medical Service/Technology, Data Mining, Database Systems, Digital Signal and Image Processing, Digital System and Logic Design, Distributed and Parallel Systems, E-commerce and E-governance, Formal Methods, Fuzzy Logic, Computer Games and Animation, Graph Theory and Computing, High performance and Next Generation Computing, Human Computer Interaction, Information Security, Information Systems, Internet and Web Applications, Knowledge and Data Engineering, Language Processing, Learning Management System (LMS) and e-Learning, Mobile computing, Neural Networks and Fuzzy Logic, Operating Systems, Pattern Recognition, Programming Languages, Robotics, Sensors, Signal Processing, Business Aspects of Convergence IT, Software Engineering, System Security and Control, Ubiquitous Computing, VLSI, Wireless Communication
Best regards,
Team IJCITwww.ijcit.net
Comments
Post a Comment