Issue | Title | |
Vol 4, No 10 (2014) | The System of Government Works and Its Applications in Jordan Compared to the Construction Contract Letter 1999 and the Ways of Resolving Disputes and Settling by Alternative Means (Mediating and Arbitration) | Abstract PDF |
Omar Al-Khataibeh, Firas Al-Labady, LR.Jumanah Zahedah | ||
Vol 5, No 3 (2015) | The Use of Operational Amplifier in Providing Safety for Electronic Devices | Abstract PDF |
Oluyamo Sunday Samuel, Olusola O. Ibukun | ||
Vol 6, No 2 (2016) | The Use of RFID Sensors for Automatic Doorstop Application | Abstract PDF |
Hedy Eko Hidayat Santoso, Herdi Saputra, Amien Shofyan, Khoirul Anam, Eko Supraptono | ||
Vol 7, No 2 (2017) | The Use of Neural Networks in the Cloud Computing Environment | Abstract PDF |
Mazin Omar Khairo | ||
Vol 3, No 13 (2013) | Theoretical Study as Nano Structure for Fluorine Phenanthrene Molecules(crystal ) Group: by B3LYP-DFT | Abstract PDF |
Maan Ab.Saleh Almamory | ||
Vol 5, No 2 (2015) | Three Levels Analytical Model for Monolithic Legacy Program Source Code Analysis | Abstract PDF |
Asfa Praveen, Shamimul Qamar, Shahanawaj Ahamad | ||
Vol 5, No 2 (2015) | Three Phase Active Shunt Power Filter with Simple Control in PSIM Simulation | Abstract PDF |
A.Jeraldine viji, M. Sudhakaran | ||
Vol 7, No 4 (2017) | Time Delay Estimation in Mobile Sensors for Underwater Networking | Abstract PDF |
Rand N. Dawood, A. E. Abdelkareem | ||
Vol 3, No 10 (2013) | To Investigate Factors Affecting the Performance of Students on Distance Learning Mode | Abstract PDF |
Gladwell Kaguu Ikinya, Oddillia Nabwire Okoth | ||
Vol 4, No 8 (2014) | Trust, Privacy, and Peer Group Correlates of Intention to Adopt the Automated Teller Machine in Nigeria 1998-2012 | Abstract PDF |
Chijindu Herbert Iruka, John G. Amue, Sunny Rukany Igwe | ||
Vol 3, No 7 (2013) | UHF band Radio Wave Propagation Mechanism in Forested Environments for Wireless Communication Systems | Abstract PDF |
Ayekomilogbon Olufemi, Famoriji Oluwole, Olasoji Olajide | ||
Vol 11, No 1 (2021) | Understanding Students’ C Programming Language Learning Styles: A Case Study in College of Science and Technology | Abstract PDF |
Kezang Dema | ||
Vol 4, No 8 (2014) | Untapped Opportunities: ICT Use by Zanzibar SMEs | Abstract PDF |
Hamad Said | ||
Vol 5, No 7 (2015) | Usage of Cell Phones in Morogoro Municipality, Tanzania | Abstract PDF |
Matokeo Msavange | ||
Vol 6, No 9 (2016) | Use of ICT in the Detection and Prevention of Crime in Kenya | Abstract PDF |
Dennis Kipchumba Tanui, Catherine Kiptanui Barmao | ||
Vol 6, No 11 (2016) | Use Techniques of Remote Sensing Images and Geographic Information Systems to Estimate the Area of Random Housing | Abstract PDF |
Kasim Jubair Salman | ||
Vol 4, No 5 (2014) | User Resistance Factor to UTM e-learning in Post- Implementation | Abstract PDF |
Hani Zamani, MahadiBahari . | ||
Vol 9, No 5 (2019) | Using Ensemble Technique to Improve Multiclass Classification | Abstract PDF |
Dalton Ndirangu, Waweru Mwangi, Lawrence Nderu | ||
Vol 8, No 6 (2018) | Using Keystroke Dynamics and Location Verification Method for Mobile Banking Authentication. | Abstract PDF |
Edwin M. Miiri, Michael Kimwele, Ogada Kennedy | ||
Vol 4, No 8 (2014) | Using Optimized Features for Modified Optical Backpropagation Neural Network Model in Online Handwritten Character Recognition System | Abstract PDF |
Fenwa O.D, Adetunji A.B, Ajala F.A | ||
Vol 2, No 2 (2012) | Using Rule Based Classifiers for the Predictive Analysis of Breast Cancer Recurrence | Abstract PDF |
Srinivas Murti, Mahantappa Mahantappa | ||
Vol 7, No 7 (2017) | Using the Information Processing Approach to Explain the Mysteries of the Black Box: Implications for Teaching Religious and Moral Education | Abstract PDF |
Andrews Acquah, Eric Quainoo Jnr | ||
Vol 14, No 2 (2024) | Utilize Geographic Information Systems to Find the Rates of Extinction of Archaeological Site Case study (Clover-leaf site) | Abstract PDF |
Oras Fadhil Khalaf | ||
Vol 5, No 5 (2015) | Value of E-Business to Insurance Firms in Kenya | Abstract PDF |
Francis Ofunya Afande | ||
Vol 2, No 11 (2012) | Virus Attack on Mobile Phone as an Impediment to Network Stability | Abstract PDF |
JEREMIAH CHUKWU, NWODE SUNDAY NNAMDI | ||
626 - 650 of 659 Items | << < 21 22 23 24 25 26 27 > >> |
Paper submission email: JIEA@iiste.org
ISSN (Paper)2224-5782 ISSN (Online)2225-0506
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org