| Issue | Title | |
| Vol 6, No 5 (2016) | A Theoretical Review of Mobile Commerce Success Determinants | Abstract PDF |
| Adrian Kamotho Njenga, Kate Litondo, Tonny Omwansa | ||
| Vol 5, No 9 (2015) | A Trusted Model for Secure Cloud Environment | Abstract PDF |
| Dipti Singh Galav | ||
| Vol 4, No 7 (2014) | Academic Scheduling Problem Made Easy Through Optimization Technique | Abstract PDF |
| Bolanle Oladejo, Fagbemi Babatunde | ||
| Vol 4, No 12 (2014) | Academic Infrastructural Support System on ICT Use in Distance Learning University of Lagos Nigeria | Abstract PDF |
| Ugonna Aralu | ||
| Vol 6, No 9 (2016) | Accessibility, Affordability and Use of the Internet Café by Students in Higher Institutions of Bauchi State, Nigeria | Abstract PDF |
| Manir Abdullahi Kamba, Yahya Muhammd Sulaiman | ||
| Vol 4, No 4 (2014) | Achieving the Efficient Distribution of Police Stations and Rescue Police Points in Duhok City/ Iraq by Using (GIS) | Abstract PDF |
| Maha J. Malaika, Hussein Hamid, AbdulWahid Sulaiman | ||
| Vol 4, No 11 (2014) | Adopting Competitive Strategies in the Telecommunications Industry | Abstract PDF |
| Samuel Akwasi Danso | ||
| Vol 6, No 8 (2016) | Adoption of Web Based Technology to Facilitate Industrial Attachment Schemes in Tertiary Institutions: A Case Takoradi Polytechnic, Ghana | Abstract PDF |
| Timothy Simpson, Joseph Danso, Angela Aba Otchere | ||
| Vol 1, No 2 (2011) | An Affective Decision Making Engine Framework for Practical Software Agents | Abstract PDF |
| Hafiz Mohd Sarim, Abdul Razak Hamdan, Azuraliza Abu Bakar, Zulaiha Ali Othman | ||
| Vol 6, No 8 (2016) | An Appraisal of Potential Benefits of Phone Communications among Students of University of Maiduguri – Nigeria | Abstract PDF |
| Bitrus N. Umar | ||
| Vol 10, No 1 (2020) | An Appraisal of the Production Cycle Accounting Information System: Feat and Failure. The Case of Manufacturing Firms in Ethiopia | Abstract PDF |
| Yehualashet Getahun Ayele | ||
| Vol 3, No 13 (2013) | An autonomous driverless car: an idea to overcome the urban road challenges | Abstract PDF |
| Sheetal Ds Rathod | ||
| Vol 3, No 6 (2013) | An Efficient Technique for Color Image Classification Based On Lower Feature Content | Abstract PDF |
| Jitendra Kumar, Neelesh Gupta, Neetu Sharma, Paresh Rawat | ||
| Vol 4, No 6 (2014) | An Efficient Clustering System for the Measure of Page (Document) Authoritativeness | Abstract PDF |
| F. U. Ogban, P. O. Asagba, Olumide Owolabi | ||
| Vol 5, No 2 (2015) | An Efficient Hybrid SIMBO-GA Approach to Design FIR Low Pass Filter | Abstract PDF |
| Parampal Singh, Balwinder Singh Dhaliwal | ||
| Vol 2, No 9 (2012) | An enhanced Least Significant Bit Steganographic Method for Information Hiding | Abstract PDF |
| Gabriel Macharia Kamau, Stephen Kimani, Waweru Mwangi | ||
| Vol 9, No 2 (2019) | An Ensemble Model for Multiclass Classification and Outlier Detection Method in Data Mining | Abstract PDF |
| Dalton Ndirangu, Waweru Mwangi, Lawrence Nderu | ||
| Vol 13, No 1 (2023) | An Evaluation of Smartphone Usage and Social Interaction of Delta State University Students, Abraka | Abstract PDF |
| OKPAKO, Abugor Ejaita | ||
| Vol 5, No 11 (2015) | An examination of the extent of implementation of the information security system and IT audit system in Ghananian Banks | Abstract PDF |
| Sylvester Hatsu, Martin B. Ujapka, Enoch D. Mpimwood | ||
| Vol 2, No 6 (2012) | An FPGA based Efficient Fruit Recognition System Using Minimum Distance Classifier | Abstract PDF |
| Harsh S Holalad, Preethi Warrier, Aniket D Sabarad | ||
| Vol 3, No 6 (2013) | An Improved Image Compression Algorithm Based on Daubechies- Wavelets with Arithmetic Coding | Abstract PDF |
| Sunill Malviya, Neelesh Gupta, Vibhanshu Shirvastava | ||
| Vol 5, No 2 (2015) | An Improved Security Model for Identity Authentication against Cheque Payment Fraud in Tanzanian Banks | Abstract PDF |
| Feno Heriniaina, R., Kitindi, Edvin | ||
| Vol 8, No 6 (2018) | An Innovative Technique to Avoid Traffic Jamming for VANET Using NS-2 | Abstract PDF |
| Pooja Kourav | ||
| Vol 2, No 1 (2012) | An Overview Study on Cyber crimes in Internet | Abstract PDF |
| V.Karamchand Gandhi | ||
| Vol 5, No 2 (2015) | An Unconstrained Q - G Programming Problem and its Application | Abstract PDF |
| Hiren Doshi, Chirag Trivedi | ||
| 51 - 75 of 664 Items | << < 1 2 3 4 5 6 7 8 9 10 > >> | |
Paper submission email: JIEA@iiste.org
ISSN (Paper)2224-5782 ISSN (Online)2225-0506
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org
Journal of Information Engineering and Applications