![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
International Journal of Sociotechnology and Knowledge Development, Volume 12
Volume 12, Number 1, 2020
- Aya Hegazi, Ahmed Taha
, Mazen Mohamed Selim:
Copy-Move Forgery Detection Based on Automatic Threshold Estimation. 1-23 - Mourad R. Mouhamed
, Mona M. Soliman, Ashraf Darwish
, Aboul Ella Hassanien
:
A Robust and Blind 3D Mesh Watermarking Approach Based on Particle Swarm Optimization. 24-48 - Mai Kamal el den Mohamed, Ahmed Taha
, Hala Helmy Zayed:
Automatic Gun Detection Approach for Video Surveillance. 49-66 - Rasha Orban Mahmoud, Mazen Mohamed Selim, Omar A. Muhi:
Fusion Time Reduction of a Feature Level Based Multimodal Biometric Authentication System. 67-83 - Youssef Ahmed, Walaa Medhat
, Tarek El Shishtawi:
A Framework for Managing Big Data in Enterprise Organizations. 84-97 - Hanaa Ibrahim Abu Zahra, Shaker H. Ali El-Sappagh
, Tarek A. El-Shishtawy:
A Proposed Frequent Itemset Discovery Algorithm Based on Item Weights and Uncertainty. 98-118
Volume 12, Number 2, 2020
- Khalid M. Hosny
, Ameer El-Sayed Gouda, Ehab R. Mohamed:
New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks. 1-30 - Nadheer Younus Hussien, Rasha Orban Mahmoud, Hala Helmy Zayed:
Deep Learning on Digital Image Splicing Detection Using CFA Artifacts. 31-44 - Mohamed Mounir
, Mohamed Bakry El-Mashade
:
Effect of Controlling Parameters of Tone Reservation Based on Null Subcarriers (TRNS) on the Performance of OFDM Systems. 45-62 - Khalid M. Hosny
, Marwa M. Khashaba, Walid I. Khedr, Fathy A. Amer:
An Efficient Neural Network-Based Prediction Scheme for Heterogeneous Networks. 63-76 - Hana Mallek, Faiza Ghozzi
, Faïez Gargouri
:
Towards Extract-Transform-Load Operations in a Big Data context. 77-95
Volume 12, Number 3, 2020
- Celbert Mirasol Himang
, Harrold U. Beltran
, Lanndon A. Ocampo
, Jose Maria S. Garcia II
, Rosein A. Ancheta Jr., Melanie Mamites Himang, Egberto F. Selerio Jr.
, Ella Joyce I. Luzano:
Acceptability Evaluation of a Developed Thermal Infrared Device for Fire Risk Management: Using the Unified Theory of Acceptance and Use of Technology (UTAUT) Model. 1-25 - Tiko Iyamu
:
Examining E-Government Enabling of E-Health Service Through the Lens of Structuration Theory. 26-40 - Gremil Alessandro Alcazar Naz
:
A Grounded Theory on Conflict Management in Long-Distance Relationships: A Sociotechnical Perspective. 41-59 - Pawan Kumar Chand, Rahul Dhiman
, Amit Mittal
, Deepika Jhamb:
Narcissism as a Determinant of Job Satisfaction Among University Teaching Staff in India. 60-78 - Alaa M. Momani
:
The Unified Theory of Acceptance and Use of Technology: A New Approach in Technology Acceptance. 79-98
Volume 12, Number 4, 2020
- Olga Tikhomirova
:
Entrepreneurial Innovative Network and the Design of Socio-Economic Neural Systems. 1-23 - Vardan Mkrttchian
, Lilya Rozhkova
, Vladimir Belashov, Svetlana Vlazneva, Olga Salnikova:
About Technology-Based "Sociology" Software for Knowledge Development: From Questionnaire Creation to Data Processing. 24-40 - Ria Mardiana Yusuf:
Exploring Carers' Views and Experiences of Being Involved in Research and Development Work. 41-54 - Kennedy D. Gunawardana
:
Hedonic and Utilitarian Propositions of Mobile Data Services in Sri Lanka: Development of a Consumer Technology Adoption Model. 55-69 - Neeta Baporikar
:
Learning Link in Organizational Tacit Knowledge Creation and Dissemination. 70-88 - Kennedy D. Gunawardana
:
Success Factors of the Implementation of Crowdfunding for Start-Ups. 89-105
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.