International Journal of Computer and Information Technology (IJCIT) Vol.3 - Issue 6 (November 2014) is available now

The International Journal of Computer and Information Technology (IJCIT) delighted to announce the publication of the latest issue. The Volume 3 - Issue 6 (November 2014) is now freely available on
The IJCIT is an international scholarly open access, peer reviewed bi-monthly journal. The journal aims at providing a platform and encourages emerging scholars and academicians globally to share their professional and academic knowledge in the fields of computer science, engineering, technology and related disciplines. IJCIT also aims to reach a large number of audiences worldwide with original and current research work completed on the vital issues of the above important disciplines.
In this issue:
#Article Title
1Biomedical Image Mapping: Issues and Challenges
Authors : Nurzi Juana Mohd Zaizi1, Albert Burger
2Implementation of a High-Performance Touch Controller and Differential Sensing Circuit
Authors : Sang Hyuck Bae, Yong S. Lee
33D-Cybertherapy and Immersive Learning Environments for Hand Stroke Patients' Daily Living Activities
Authors : Dayang Hjh Tiawa Awg Hj Hamid, A.H.Omar, Siti Rohani Isnin, Norazman Abdul Majid, Ardyansyah Syahrom
4An Agent Model with Adaptive Weight-based Multi-objective Algorithm for Road-network Congestion Management
Authors : Bin Jiang, Takashi Yamada, Chao Yang, Takao Terano
5Discrete Process Neural Networks and Its Application in Time Series Prediction
Authors : Xin Li, Panchi Li
6A Study on MANET Routing Protocol Performance with Node Mobility
Authors : Tulga Jargalsaikhan, Kilhung Lee
7A Network Meta-Analysis on the Effects of Information Technology Application on Preoperative Knowledge of Patients
Author : Yi-Horng Lai
8Big SQL 3.0 Functionality: A comprehensive approach to SQL-on-Hadoop
Authors : Anjali Khatri, Maria N. Schewenger, Neal Finkelstein
9Incentives for Online Communities
Authors : David DeAngelis, K. Suzanne Barber
10Function Templates for the Synthesis of Functional Programs
Authors : Natela Archvadze, Merab Pkhovelishvili, Otari Ioseliani, Lia Shetsiruli
11Improving the Similarity for Privacy in Location Based Service
Authors : Reemah M. Alhebshi, Jonathan Cazalas
12GB-KNN-WI: Group Based K-NN Queries Processing in MANETs with Wireless Integration
Authors : Shoaa JadAllah Al-Hejaili, Jonathan Cazalas
13User Concerns on Cloud Security – A UAE Perspective
Authors : Maurice Danaher, Choo Je Chong
14Lessons Learned in Academic Hybrid Software Development Projects – A Retrospective
Authors : Robert F. Roggio, Dalila Castilla
15A Survey of Circuit Level Techniques for Designing Ultra Low Power, Low Frequency OTA
Authors : Prashanth Shetty, Somashekhara Bhat
16Electronic Helpdesk Support System in Tertiary Institutions in Developing Countries: A Case Study of Lagos State University, Nigeria
Authors : Boluwaji A. Akinnuwesi, Oluwatoyin A. Enikuomehin, Faith-Michael E. Uzoka, Onyekachi C. Onwudike, Abayomi Osamiluyi, Benjamin S. Aribisala
17Palmprint Recognition by using Bandlet, Ridgelet, Wavelet and Neural Network
Authors : Mohanad A. M. Abukmeil, Hatem Elaydi, Mohammed Alhanjouri
18Reform Based Version Management System for XML Data
Authors : Sayed MD. Fahim Fahad, Md. Abdur Rafi Ibne Mahmood, Mohammad Zahidur Rahman
19Denoising of ABR Signals using Wavelet Packets
Author : Nivin Ghamry
20Enhancing User Experience using Mobile QR-Code Application
Authors : Abdulhakeem Aliyu Wara, Sunday Dugga
21SEC–DED–DAEC Codes for On-chip Memory Protection against Multiple Cell Upsets
Authors : Hoyoon Jun, Yongsurk Lee
22Comparative Analysis of Search Engine Usage, Relevance and Effectiveness among Final Year Undergraduate Students
Authors : Solomon A. Adepoju, Cosmas U. Ugwuoke, Grace A. Onyeabor, Joseph A. Abioye
23A Modified Neurofuzzy-based Quality of eLearning Model (Modified SCeLQM)
Author : Labib Arafeh
24Optimisation of the Linear Probability Model for Credit Risk Management
Authors : Kanelo Tsepiso Nyathi, Siqabukile Ndlovu, Sibonile Moyo, Thambo Nyathi
25A Novel Framework for Effective Deployment of E-Learning Environment in Developing Countries: A Case Study of Pakistan
Authors : Muhammad Nawaz, Bilal Zaka, Bilal Zaka
26Guidelines for Designing Reusable Software Components
Authors : Basem Y. Alkazemi, Mohammed K. Nour, Abd-El-Kader Sahraoui
27Incorporating Human Computer Interaction with Web Technologies to Augment Communication and Interaction in Higher Learning Institutions: A Study Conducted at the University of Dar es Salaam
Author : Anthony Mwombeki
28Exploratory Study of Information System User Satisfaction: A Study of University of Ibadan Post Graduate School Web Portal
Author : Simeon Ambrose Nwone
29Applicability of Quality Attribute-Driven Architecting In the Context of Agile Software Development: A Case Study
Authors : G. H. El-Khawaga , Galal Hassan Galal-Edeen, A. M. Riad
30What are we tweeting about? :Providing Context for Twitter Analysis
Authors : Martin Ebner, Thomas Altmann
31Parameter Controlled Harmony Search Algorithm for Solving the Four-Color Mapping Problem
Authors : Bnar Faisal A. Daham, Mohammed Nasseh Mohammed, Kanar Shukr Mohammed
32LEACH-1R: Enhancing The LEACH Protocol Using The First Round Clusters
Author : Mohammed Omari
33The Impacts of Changing of Mandatory Information Systems on the End-User Satisfaction
Authors : Ramadan Moawad, Yasser Elsheshengy
34Game Theoretic Multi-Agent Algorithms for the Job Shop Scheduling Problem
Authors : Orwa Horace Owiti, Elisha T. Opiyo Omulo, William Okelo-Odongo, Bernard Manderick
35Answer Set Survey
Author : Omar EL-Khatib
36Reducing Power Dissipation in Multi-Core Processors using Effective Core Switching
Authors : Vijayalakshmi Saravanan, Aniket Shivam, Sudeep Chauhan
37COBAS-M: A Proposal Method in Analysis in Financial Corporative Business Architectures
Authors : Miguel A. González Serrano, Diana Pérez-Marín, Miren Idoia Alarcón
38Context-Aware Formalization of Inter-Model Relations
Author : Ahmet Egesoy
39Image Encryption Based on Pixel Shuffling and Random Key Stream
Authors : T. Sivakumar, R. Venkatesan
40On Multiplayer Techniques for Crowdsourcing Mapping onto Custom Domain-Specific Architectures
Authors : Gayatri Mehta, Xiaozhong Luo, Anil Kumar Sistla, Andrew Marin, Mukund Malladi, Krunalkumar Patel, Brandon Rodgers
41Fractional Metrics for Fuzzy c-Means
Authors : Amina Dik, Khalid Jebari, Abdelaziz Bouroumi, Aziz Ettouhami
42Influence of Mobile Operating System Characteristics on Adoption of Mobile Devices in Education: The Case of Higher Learning Institutions in Kenya
Authors : Peter Namisiko, William Sakataka, Sylvester Mackton Wanyama
43Modeling and Monitoring of a Distillation Column
Authors : Samia Latreche, Mohammed Mostefai, Abd Essalam Badoud, Mabrouk Khemliche
The IJCIT invite you to consider submitting a manuscript for inclusion in this journal. Submissions are welcome from across all streams related to computing and information technology. The subject areas covered by the IJCIT include (but are not limited to):
Algorithms, Applications of computer science in modeling, Artificial Intelligence, Bio-informatics, Circuits and Systems, Cloud Computing, Computer Architecture, Computer Vision, Computer Graphics and Multimedia, Data Communication and Computer Networks, Computer in Agriculture, Computing in Energy Technology, Computing in Hybrid/Convergence Service/Technology, Computing in Medical Service/Technology, Data Mining, Database Systems, Digital Signal and Image Processing, Digital System and Logic Design, Distributed and Parallel Systems, E-commerce and E-governance, Formal Methods, Fuzzy Logic, Computer Games and Animation, Graph Theory and Computing, High performance and Next Generation Computing, Human Computer Interaction, Information Security, Information Systems, Internet and Web Applications, Knowledge and Data Engineering, Language Processing, Learning Management System (LMS) and e-Learning, Mobile computing, Neural Networks and Fuzzy Logic, Operating Systems, Pattern Recognition, Programming Languages, Robotics, Sensors, Signal Processing, Business Aspects of Convergence IT, Software Engineering, System Security and Control, Ubiquitous Computing, VLSI, Wireless Communication
Please, send your article to:
Best regards,


Popular posts from this blog

Anna University Annexure 1 & 2 List


British Journal of Mathematics & Computer Science (BJMCS)