Asian Journal of Information Technology (2022 Volume 21)

  • Number of issues per year: 12
  • ISSN: 1682-3915 (Print)
  • ISSN: 1993-5994 (Online)
Archive (Volume 15 Issue 18, 2016)

The Role of ICTS in the Improvement of the Competitiveness of SMEs

Agwu , J.N. Taiwo, Agumadu Mercy and Afieroho Evawere

The Adoption of E-Tourism: An Empirical Investigation

Eweoya Ibukun, S.R. Okuboyejo and Agomuo Kelechi

Frequency Based Modified Term Weighting Method for Text Classification

M. Santhanakumar, C. Christopher Columbus and K. Jayapriya

Mining a Complete Set of Fuzzy Multiple-Level Coherent Rules

R. Anuradha and N. Rajkumar

Enhancing Security for Gnome Data Using Referential Compression with Symmetric Cryptography Scheme

E. Wiselin Kiruba and K. Ramar

FPGA Implementation of Mars Based 2-D Fast Cosine Transform

K. Kalyani and S. Rajaram

Neuro Fuzzy ART Based User Behaviour Trust in Cloud Computing

M. Jaiganesh, S. Mercy, K.C. Anupama and A. Vincent Antony Kumar

Video Transcoding by Dynamic Frame Skipping Mechanism and Offloading Through Decision Logica

B.L. Velammal, P. Anandhakumar and Varun Gowrishankar

Elliptic Curve Cryptography with Optimal Resource Allocation Schema for Security in Cloud Computing Environment

S. Rajalakshmi and R. Maguteeswaran

Hybrid Optimization Techniques for Fuzzy Logic Controller Design in Parallel Job Scheduling Problems

S.V. Sudha

A New Algorithmforsolving Fuzzy Transportation Problems with Triangularfuzzy Numbers

R. Srinivasan, S. Muruganandam and V. Vijayan

Denoising and Automatic Detection of Breast Tumor in Ultrasound Images

Telagarapu Prabhakar and S. Poonguzhali

DFA Based QoS-Aware Clustering Approach for Future Prediction and Performance Improvement in MANET

P. Madhavan and P. Malathi

Techniques for Enhancing Security in Wireless Sensor Networks

Vikas Dhawan and Gurjot Singh Gaba

An Event Graph Based Document Representation for Information Retrieval and Summarazing the Text Based on Events

P. Janarthanan and V. Ramachandran

Dynamic Resource Utilization over Parallel Slot Configuration in Distributed Computing

K. Divya Bharathi and P.V.R.D. Prasada Rao

An Enhanced and Secured Wireless Environment using Swept Frequency Capacitive Sensing

A. Babu Karuppiah, R. RajaRaja, N. Shiny Ponmani and C. S. Meenakshi

Harvesting Deep Web Extractions Based on Hybrid Classification Procedures

T. Yamini Satya and G. Pradeepini

An Novel Approach On Software Reliability Growth Modelin Using the Data Mining Techniques

G. Nandini and G. Sridevi

ASAKE: Adaptive Secure Authenticated Key Establishment Mechanism for Dynamic Networks

A. John Prakash and B. Lydia Elizabeth

Hard Switching Versus Soft Switching-Case Study on Positive Output Elementary Super Lift Luo Converter

Shibu J.V. Bright, Hithu Anand and S. Ramkumar

Efficient Negotiation of SLA Parameters in Cloud Computing Environment

S. Usha Kiruthika and S. Thamarai Selvi

Implementation of Hybrid Vedic Multiplier Nikhilam Sutra and Karatsuba Algorithm for N-bit Multiplier Using Successive Approximation of N-1 Bit Multiplier

M. Nisha Angeline and S. Valarmathy

Comparative Study of Multiple Intrusion Detection Systems

S. Saravanan and M. Ramakrishnan

Performance Evaluation Of LDPC Coded DWT/IDWT MB-OFDM UWB for Power Line communication

P. Dhinakar and M. Chandrasekar

An Enhanced Hidden Markov Dynamic Bayesian model for Resisting Camouflaging Worm attack study

R. Saranya and S. Senthamarai Kannan