| Issue | Title | |
| Vol 4, No 1: JISCT | A Cloud-based Business Analytics for Supply Chain Decision Support | Abstract PDF |
| Shah J. Miah | ||
| Vol 4, No 1: JISCT | A Comprehensive Review of Cloud Computing Simulators | Abstract PDF |
| Hitesh Marwaha | ||
| Vol 5, No 2: JISCT | A Conceptual Requirements Model for the Domain of Electronic Service Delivery: Success Factors in E-Government Implementation | Abstract PDF |
| Arbi Ghazarian, Mehdi Sagheb-Tehrani | ||
| Vol 3, No 3: JISCT | A Corpus-Based Analysis of Four Modality Types | Abstract PDF |
| Nam-Kil Kang | ||
| Vol 7, No 2: JISCT | A Hand-Based Biometric Verification System Using Ant Colony Optimization | Abstract PDF |
| Nirmal Pandey, O.P. Verma, Amioy Kumar | ||
| Vol 5, No 1: JISCT | A new approach called Weighted Least Squares Ratio (WLSR) Method to M-estimators | Abstract PDF |
| MURAT YAZICI | ||
| Vol 3, No 1: JISCT | A New Computing Envornment Using Hybrid Cloud | Abstract PDF |
| T.Venkat Narayana Rao, Kamsali Naveena, Reena David | ||
| Vol 6, No 1: JISCT | A Performance Assessment on Various Data mining Tool Using Support Vector Machine | Abstract PDF |
| S. Prasath | ||
| Vol 2, No 2: JISCT | A Review: Cloud Computing Technologies and Its Technical Improvements | Abstract PDF |
| Ateeq Ahmad | ||
| Vol 4, No 1: JISCT | A sEMG-driven Musculoskeletal Model to Control Exoskeleton Robot Used in Lower Extremity Rehabilitation | Abstract PDF |
| Shi Lei, Zhen Liu, Chao Zhang | ||
| Vol 2, No 1: JISCT | A Study of Customer Behaviour Through Web Mining | Abstract PDF |
| Wahidah Husain | ||
| Vol 7, No 2: JISCT | A Wireless Sensor Network Based Solar Powered Harvesting System for Aquaculture | Abstract PDF |
| Daudi Samson Simbeye | ||
| Vol 2, No 2: JISCT | Adaptive Security Mechanism: a study on the different approaches to mobile devices | Abstract PDF |
| Zair Abdelouahab, , Denivaldo Lopes, Jonathan Santos, Willian Ribeiro, Higo Pires | ||
| Vol 5, No 2: JISCT | An Enhanced Technique for Face Recognition and Retrieval with Feature Extraction Using Euclidean Distance Classifier | Abstract PDF |
| S. Prasath | ||
| Vol 4, No 2: JISCT | Artificial Immune Algorithm for exams timetable | Abstract PDF |
| Tad Gonsalves, Rina Oishi | ||
| Vol 5, No 1: JISCT | Cloud Computing Security: A Survey | Abstract PDF |
| Elaheh Golzardi | ||
| Vol 5, No 2: JISCT | Computerized Measurement and Control System of the Universal Testing Machine Based On Virtual Instruments | Abstract PDF |
| Daudi Samson Simbeye | ||
| Vol 7, No 1: JISCT | Concealment Conserving the Data Mining of Groups & Individual | Abstract PDF |
| Abu Sarwar Zamani | ||
| Vol 3, No 3: JISCT | Designing and Developing E-Passport System Using &Asp.Net Implanting E-government Concepts | Abstract PDF |
| Mohamed Abaza, Saif Fatooh | ||
| Vol 1, No 1: JISCT | Development Of Health Care Systems in Subareas of KSA Using GIS Concept | Abstract PDF |
| Magdy Shayboub A. Mahmoud, Mohamed Ibrahim Abdel Magid, Samir Mahmud A. Abdullah, Nasreldin M. El-Tayeb | ||
| Vol 5, No 3: JISCT | Effective Capacity Analysis for Cognitive Networks under QoS Satisfaction | Abstract PDF |
| Mohamed Elalem | ||
| Vol 4, No 2: JISCT | Electronic accounting Applications using Cloud Computing technology | Abstract PDF |
| Alameen Eltoum Mohamed Abdalrahman, Adil Mahmoud Mohamed Mahmoud | ||
| Vol 4, No 3: JISCT | Electronic service quality: An empirical investigation in Saudi Arabia | Abstract PDF |
| Moez Bellaaj, Ines Zekri | ||
| Vol 7, No 1: JISCT | Evaluation of Random Early Detection and Adaptive Random Early Detection in Benchmark Scenarios | Abstract PDF |
| Rohit P. Tahiliani, Sagar Sachdeva, Sachin Hadke, Shane Sheehan, Eamonn O’ Nuallain | ||
| Vol 2, No 1: JISCT | Gesture-controlled user interfaces | Abstract PDF |
| Vikrant Sharma, Bharat Droch | ||
| 1 - 25 of 72 Items | 1 2 3 > >> | |


