The International Journal of Computer and Information Technology (IJCIT) delighted to announce the publication of the latest November 2012 issue (Volume 1 Issue 2). Volume 1 Issue 2 is now freely available on http://duke.expresssender.in/link.php?M=4874168&N=3425&L=3059&F=H
The IJCIT is an international scholarly open access, peer reviewed bi-monthly journal. The journal aims at providing a platform and encourages emerging scholars and academicians globally to share their professional and academic knowledge in the fields of computer science, engineering, technology and related disciplines. IJCIT also aims to reach a large number of audiences worldwide with original and current research work completed on the vital issues of the above important disciplines.
In this issue:
1 A framework for junction detection using local Hough transforms

Author : Andrzej Sluzek
2 Development of an ICT-based layer model for improving managerial decision making on water issues in arid and semi-arid regions

Authors : Ali Al-Hamdi, Muhammad Akram, Ahmed Monjurul Hasan
3 Investigating RFID Tags Fusion in a Clustered WSN Applied to Vehicle Identification and Tracking

Authors : Abdelaziz Araar, Hakim Khali
4 Analysis of Different Programming Primitives used in a Beowulf Cluster

Authors : Mohamed Faidz Mohamed Said, Saadiah Yahya, Mohd Nasir Taib
5 Domain Driven Classification of Customer Credit Data for Intelligent Credit Scoring using Fuzzy set and MC2

Author : K.Shanmugapriya
6 The Usage of LMS among Undergraduate Students

Authors : Kung Siew Min, Fadhilah Mat Yamin, Wan Hussain Wan Ishak
7 An Identification System Using Eye Detection Based On Wavelets And Neural Networks

Authors : Mohamed A. El-Sayed, Mohamed A. Khfagy
8 Statistical Analysis of Arabic Phonemes for Continuous Arabic Speech Recognition

Authors : Khalid M.O Nahar, Moustafa Elshafei, Wasfi G. Al-Khatib, Husni Al-Muhtaseb, Mansour M. Alghamdi
9 Artificial Intelligent Control Techniques for Nonlinear Real Time Chemical Reactor

Authors : W. A. Wali, A. I. Al-Shamma’a, Kadhim H. Hassan, J.D. Cullen
10 Community Radio in Africa: Cost effective ICT Tool to Connect Geographically Dispersed Communities

Authors : Anas Tawileh, Edward Jaser
11 Laplacian Behaviour-Based Control (LBBC) for the Path Planning of Mobile Robot Via Four Point-EGSOR

Authors : Azali Saudi, Jumat Sulaiman
12 Analyzing the probabilistic distribution of the predicted wind speed

Authors : Vigneswaran.T, Dhivya.S
13 Research of routing protocol in RFID-based internet of things

Authors : Songsen Yu, Yun Peng, Jian Yang
14 ECG compression by Discrete Cosine associated Wavelet 2-D Transforms: SPIHT statistical method and pic detector

Authors : Ntsama Eloundou Pascal, Kabiena Ivan Basile
15 Identification of linear system in random time

Author : Edward Kozlowski
16 Contextualized Framework for Ubiquitous Learning Support Using a Learning Management System

Authors : Mampilo M. Phahlane, Raymond M. Kekwaletswe
17 A novel motion simulator technique for generating a realistic physical human jump movement

Authors : Przemyslaw Prokopow, Krzysztof Pomorski
18 DB2′s SQL Compatibility Features: An alternative approach to traditional migration

Authors : Maria N. Schwenger, Kamen N. Tsvetkov
19 Automatic code generation by model transformation from sequence diagram of system’s internal behavior

Authors : EL BEGGAR Omar, BOUSETTA Brahim, GADI Taoufiq
20 SenCept: A Domain-specific Textual Commonsense Concept Acquisition System

Authors : Rushdi Shams, M.S.A. Shahnawaz Chowdhury, S.M. Abu Saleh Shawon
21 Metaheuristic Optimization Algorithms for Training Artificial Neural Networks

Authors : Ahmad AL Kawam, Nashat Mansour
22 Using Inductive Approach as Research Strategy in Requirements Engineering

Author : Issam Jebreen
23 Research on Fast Reconstruction of Virtual Plant Leaves

Authors : Fang Kui, Lu-Ming Shen, Jing Song
24 The Frame Work Design Of Mobile Learning Management System

Authors : J.Hemabala, E.S.M.Suresh
25 Impact of Cloud Computing on IT Industry: A Review & Analysis

Authors : Mohd Rahul,Mohd Junedul Haque,Mohd Muntjir
26 Image compression Using Daryaei Shuffle Singular Value Decomposition method

Authors : Majid Aboutalebi, Javad Vahidi, Shaqayeq Daryaei
27 Steganography and Its Applications in Information Dessimilation on the Web Using Images as SecurityEmbeddment: A Wavelet Approach

Authors : Victor Onomza Waziri, Audu Isah, Abraham Ochoche, Shafi’i Muhammad Abulhamid
The IJCIT invite you to consider submitting a manuscript for inclusion in this journal. Submissions are welcome from across all streams related to computing and information technology. The subject areas covered by the IJCIT include (but are not limited to):
Algorithms, Applications of computer science in modeling, Artificial Intelligence, Bio-informatics, Circuits and Systems, Cloud Computing, Computer Architecture, Computer Vision, Computer Graphics and Multimedia, Data Communication and Computer Networks, Computer in Agriculture, Computing in Energy Technology, Computing in Hybrid/Convergence Service/Technology, Computing in Medical Service/Technology, Data Mining, Database Systems, Digital Signal and Image Processing, Digital System and Logic Design, Distributed and Parallel Systems, E-commerce and E-governance, Formal Methods, Fuzzy Logic, Computer Games and Animation, Graph Theory and Computing, High performance and Next Generation Computing, Human Computer Interaction, Information Security, Information Systems, Internet and Web Applications, Knowledge and Data Engineering, Language Processing, Learning Management System (LMS) and e-Learning, Mobile computing, Neural Networks and Fuzzy Logic, Operating Systems, Pattern Recognition, Programming Languages, Robotics, Sensors, Signal Processing, Business Aspects of Convergence IT, Software Engineering, System Security and Control, Ubiquitous Computing, VLSI, Wireless Communication
Please, send your article to: editor@ijcit.com
Best regards,
Team IJCIT
www.ijcit.com
Powered by Mail Marketer
: News