Quick Search:

Paper Preview:

International Journal of Electronics and Information Engineering

1. SMS-Based Automated E-Notice Board using Mobile Technology
Abayomi O. Agbeyangi, Joseph O. Odiete, and Olusegun Olatinwo
Article Full Text PDF

2. Anonymity and Certificateless Property Could Not Be Acquired Concurrently
Lihua Liu, Zhenzhen Guo, Zhengjun Cao, Zhen Chen
Article Full Text PDF

3. Overview of Using Private Cloud Model with GIS
Salah E. Elgazzar, Ahmed A. Saleh, Hazem M. El-Bakry
Article Full Text PDF

4. Hidden Data Transmission with Variable DNA Technology
Ravinder Paspula, K. Chiranjeevi, S. Laxman Kumar
Article Full Text PDF

5. One Private Broadcast Encryption Scheme Revisited
Lihua Liu, Yang Li, Zhengjun Cao, Zhen Chen
Article Full Text PDF

6. Mobile Ad-Hoc clustering using inclusive particle swarm optimization algorithm
Anurag Rana
Article Full Text PDF

7. Angle Oriented based Image Analysis Using L-axial Semi-Circular Model
R.N.V.Jagan Mohan
Article Full Text PDF

8. A Novel Approach for Speeding up Secured Litigation Procedure
Fadiyya A. Mohsin, Reham R. Mostafa, Hazem M. El-Bakry
Article Full Text PDF

9. University Courses Scheduling Using Cat Swarm Optimization Algorithm
Hussein Khalaf Ali
Article Full Text PDF

10. Reducing Waiting Time for Transportation using GIS
Firas F. Jawad
Article Full Text PDF

11. Community sharing in enhancing the educational process
shakir shabram
Article Full Text PDF

12. A collective Intelligence Based Multi Aspect Sentiment Analysis for Arabic Language
Saad Adel
Article Full Text PDF

13. Design Decision Support System for loans based on Data Mining Techniques
mohammed kamal
Article Full Text PDF

14. Handwritten Text Recognition System based on Neural Networks
ahmed obiad
Article Full Text PDF

15. A Proposed Model for Authentication using Identity Detection
Riyadh Abdulamir
Article Full Text PDF

16. The Effect of Priming Treatment on Yield Components of Pea
Hajar Aroubandi
Article Full Text PDF

17. Fast sound verification using support vector machine and particle swarm optimization algorithms
Thaer taha
Article Full Text PDF

18. Mutual Authentication and updating the Authentication Key in MANETS
Ahmad Alomari
Article Full Text PDF

19. A Note on Group Authentication Schemes
Mohsen Pourpouneh, Rasoul Ramezanian, and Afshin Zarei
Article Full Text PDF

20. Convolutional Codes Based FCA When Combiner Function is 1-CI
Amar Pandey
Article Full Text PDF

21. A Complex Algorithm for Encrypting/Decrypting Textual Messages
S. Umamaheswaran, K. Senthil, L. Kamatchi Priya, R. Rajaram
Article Full Text PDF

22. A Modified Technology Acceptance Model For Health Informatic
Hamsa Emad, Hazem M. El-Bakry, Aziza Asem
Article Full Text PDF

23. A new Technique for License Plate Detection Using Mathematical Morphology and Support Vector Machine
Akram AL-Hadad, Hazem Elbakry, Reham R. Mostafa
Article Full Text PDF