Vol 5, No 2 (2015)
Table of Contents
Articles
| Journal Cover Page | |
| Journal Editor |
| An Improved Security Model for Identity Authentication against Cheque Payment Fraud in Tanzanian Banks | |
| Feno Heriniaina, R., Kitindi, Edvin | 1-5 |
| Three Phase Active Shunt Power Filter with Simple Control in PSIM Simulation | |
| A.Jeraldine viji, M. Sudhakaran | 6-13 |
| Designing a Mobile SMS System to Support Offline Distance Training Programme Communications at University of Rwanda | |
| Gerard Nizeyimana, Zaipuna O. Yonah, Mathias Nduwingoma | 14-23 |
| GIS and RS Integrated Framework for Supporting Planners and Decision Makers | |
| Mai Mostafa.Mohamed Hassan, Eman ElAmir, Saleh Mesbah Elkaffas | 24-33 |
| Three Levels Analytical Model for Monolithic Legacy Program Source Code Analysis | |
| Asfa Praveen, Shamimul Qamar, Shahanawaj Ahamad | 34-42 |
| An Efficient Hybrid SIMBO-GA Approach to Design FIR Low Pass Filter | |
| Parampal Singh, Balwinder Singh Dhaliwal | 43-49 |
| An Unconstrained Q – G Programming Problem and its Application | |
| Hiren Doshi, Chirag Trivedi | 50-54 |
| On Existence of Coincidence and Common Fixed Points for Weakly Compatible Self Maps in Normed Boolean Vector Space | |
| Saurabh Manro, Anita Tomar | 55-60 |
Paper submission email: JIEA@iiste.org
ISSN (Paper)2224-5782 ISSN (Online)2225-0506