Table of Contents
Vol 6, No 3 (2013)
Articles
Effect of the Neuron Coding by Gaussian Receptive Fields on Enhancing the Performance of Spiking Neural Network for An Automatic Lipreading System | ||
Asmaa Ourdighi, Abdelkader Benyettou | ||
Vol 6, No 3 (2013), Pagination: 287-294 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 287 | PDF Views: 0 |
Dangers of Internet to Society and Practical Avoidance | ||
Mohammad Al-Rababah, Al-Marghirani Abdulsamad, Al-Shomrani Mohammed Mosa | ||
Vol 6, No 3 (2013), Pagination: 295-302 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 299 | PDF Views: 0 |
Role of Information and Communication Technology in Education | ||
M. Akkalakshmi, N. Venkatanarayana, Y. Srinivas, J. Vijayasekhar, G. Ananda Rao | ||
Vol 6, No 3 (2013), Pagination: 303-306 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 267 | PDF Views: 0 |
Comparative Study and Performance Analysis of DSDV, OLSR, AODV, DSR and MAODV Routing Protocols in MANETs | ||
Haider Ayad Khudair, Mohammed A. Naser | ||
Vol 6, No 3 (2013), Pagination: 307-314 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 278 | PDF Views: 0 |
An Efficient Edge Detection Method Based on Bit-Plane Slicing for Bacterial Images | ||
P. Kalavathi | ||
Vol 6, No 3 (2013), Pagination: 315-320 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 288 | PDF Views: 0 |
Parallel Mining Association Rules in Calculation Grids | ||
Khadidja Belbachir, Hafida Belbachir | ||
Vol 6, No 3 (2013), Pagination: 321-331 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 266 | PDF Views: 0 |
Digital Vector Map Watermarking:Applications, Techniques and Attacks | ||
Tawfiq A. Abbas, Majid J. Jawad | ||
Vol 6, No 3 (2013), Pagination: 333-339 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 270 | PDF Views: 0 |
Search Engine:A Review | ||
S. K. Vijay, Manish Maheshwari, Roohi Ali | ||
Vol 6, No 3 (2013), Pagination: 341-349 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 264 | PDF Views: 0 |
Analytical Study for Optimal Time Parameter in Cellular Communication Data Analysis | ||
Wurood H. Albayati, Tawfiq A. Al-Asadi | ||
Vol 6, No 3 (2013), Pagination: 351-355 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 272 | PDF Views: 0 |
EE- commerce in Developing Countries | ||
Trushar Patel, Premal Soni | ||
Vol 6, No 3 (2013), Pagination: 357-361 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 263 | PDF Views: 0 |
Adding TCP-Variants to NS-2 | ||
Ahmed Jawad Kadhim | ||
Vol 6, No 3 (2013), Pagination: 363-369 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 282 | PDF Views: 0 |
Robots Considered Harmful | ||
Sanjay Bhatt, Syed Minhaj Ali, Sana Iqbal | ||
Vol 6, No 3 (2013), Pagination: 377-382 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 257 | PDF Views: 0 |
The Multi-Agents Immune System for Network Intrusions Detection (MAISID) | ||
Noria Benyettou, Abdelkader Benyettou, Vincent Rodin, Souad Yahia Berrouiguet | ||
Vol 6, No 3 (2013), Pagination: 383-390 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 272 | PDF Views: 0 |
Biometric Technology Based on Hand Vein | ||
Sarah Benziane, Abdelkader Benyettou | ||
Vol 6, No 3 (2013), Pagination: 401-412 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 271 | PDF Views: 0 |