Vol 5, No 2 (2015)

Table of Contents

Articles

Journal Cover Page PDF
Journal Editor
An Improved Security Model for Identity Authentication against Cheque Payment Fraud in Tanzanian Banks PDF
Feno Heriniaina, R., Kitindi, Edvin 1-5
Three Phase Active Shunt Power Filter with Simple Control in PSIM Simulation PDF
A.Jeraldine viji, M. Sudhakaran 6-13
Designing a Mobile SMS System to Support Offline Distance Training Programme Communications at University of Rwanda PDF
Gerard Nizeyimana, Zaipuna O. Yonah, Mathias Nduwingoma 14-23
GIS and RS Integrated Framework for Supporting Planners and Decision Makers PDF
Mai Mostafa.Mohamed Hassan, Eman ElAmir, Saleh Mesbah Elkaffas 24-33
Three Levels Analytical Model for Monolithic Legacy Program Source Code Analysis PDF
Asfa Praveen, Shamimul Qamar, Shahanawaj Ahamad 34-42
An Efficient Hybrid SIMBO-GA Approach to Design FIR Low Pass Filter PDF
Parampal Singh, Balwinder Singh Dhaliwal 43-49
An Unconstrained Q - G Programming Problem and its Application PDF
Hiren Doshi, Chirag Trivedi 50-54
On Existence of Coincidence and Common Fixed Points for Weakly Compatible Self Maps in Normed Boolean Vector Space PDF
Saurabh Manro, Anita Tomar 55-60


Paper submission email: JIEA@iiste.org
ISSN (Paper)2224-5782 ISSN (Online)2225-0506
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org