


default search action
International Arab Journal of e-Technology, Volume 2
Volume 2, Number 1, January 2011
- Diaa Salama Abd Elminaam, Hatem Mohamed Abdual-Kader, Mohiy Mohamed Hadhoud:

Studying the Effects of Most Common Encryption Algorithms. 1-10 - Marghny Mohamed, Fadwa Al-Afari, Mohamed A. Bamatraf:

Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation. 11-17 - Qutaiba Ali, Basil Mahmood:

Analysis and Design of a Guaranteed Real Time Performance Enhanced Industrial Ethernet. 18-28 - Chaw-Seng Woo, Seyed Hadi Mirisaee:

A Simple Approach for Education Using Virtual Human Dataset. 29-35 - Maged Elazony, Ahmed Khalifa, Mohamed Alsaied:

Design and Implementation of a Port Simulator Using Formal Graphical Approach (FGA). 36-43 - Osama Salameh:

A Multimedia Offline Cell Phone System For English Language Learning. 44-48 - Kother Mohideen, Arumuga Perumal, Nallaperumal Krishnan, Mohamed Sathik:

Image Denoising And Enhancement Using Multiwavelet With Hard Threshold In Digital Mammographic Images. 49-55 - Rahmath Safeena, Hema Date, Abdullah Kammani:

Internet Banking Adoption in an Emerging Economy: Indian Consumer's Perspective. 56-64
Volume 2, Number 2, June 2011
- Hatem Hamad, Shadi Abudalfa, Shaaban Sahmoud:

Adaptive Mobility Management Scheme for Mobile IP using Ad Hoc Networks. 65-71 - Qutaiba Ibrahim:

Design & Implementation of High Speed Network Devices Using SRL16 Reconfigurable Content Addressable Memory (RCAM). 72-81 - Qutaiba Ibrahim, Sahar Lazim:

Applying an Efficient Searching Algorithm for Intrusion Detection on Ubicom Network Processor. 82-90 - Salah Alabady:

Simulation and Best Design of an Optical Single Channel in Optical Communication Network. 91-95 - Hossein Kaviar:

Consumer Protection in Electronic Contracts. 96-104 - Momtaz Al-Kholy, Ahmed Khalifa, Mohamed El-Saied:

A Systematic Approach for Agent Design Based on UML. 105-111 - Diaa Salama Abd Elminaam, Hatem Abdual Kader, Mohiy M. Hadhoud:

Wireless Network Security Still Has no Clothes. 112-123 - Saleh Alsaleem:

Automated Arabic Text Categorization Using SVM and NB. 124-128
Volume 2, Number 3, January 2012
- Emad Abu-Shanab:

Digital Government Adoption in Jordan: An Environmental Model. 129-135 - Sulieman Bani-Ahmad:

The Anatomy of a Domain-Specific Search-Phrase Suggestion Tool for Literature Digital Libraries. 136-144 - Hatem Abdul-Kader, Mustafa Abdul Salam:

Evaluation of Differential Evolution and Particle Swarm Optimization Algorithms at Training of Neural Network for Stock Prediction. 145-151 - Seema Verma, Savita Kumari, Mahmoud Arteimi, Amer Deiri, Rakesh Kumar:

Challenges in Developing Citizen-Centric E-Governance in Libya. 152-160 - Osama Salameh:

A Mobile Phone SMS-Based System For Diabetes Self Management. 161-166 - M. Mohamed Sathik, S. S. Sujatha:

A Novel DWT Based Invisible Watermarking Technique for Digital Images. 167-173
Volume 2, Number 4, June 2012
- Mumtaz Al-Mukhtar, Sarmad Hadi:

Developing a Three-Tier Web Data Management Application for Higher Education Admission Environment. 175-180 - Gandharba Swain, Saroj Kumar Lenka:

A Novel Approach to RGB Channel Based Image Steganography Technique. 181-186 - Minyar Sassi Hidri, Amel Grissa Touzi:

An Information Retrieval Model from World Wide Web based on Formal Concept Analysis. 187-196 - Wiam Al Hayek:

An Effective Method For Data Compression Based On Adaptive Character Wordlength. 197-202 - Oye David, Mazleena Salleh, Noorminshah A. Iahad:

The Impact of E-Learning in Workplace: Focus on Organizations and Healthcare Environments. 203-209 - Zakaria Elberrichi, Amel Belaggoun, Malika Taibi:

Medical Documents Classification Based on the Domain Ontology MeSH. 210-215 - Naji Shukri Alzaza:

Opportunities for Utilizing Mobile Learning Services in the Palestinian Higher Education. 216-222 - Abdul Mannan:

Self Organizing Maps based Life Enhancement Framework for Wireless Sensor Networks. 223-228

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














