Vol 5, No 2 (2015)
Table of Contents
Articles
Journal Cover Page | |
Journal Editor |
An Improved Security Model for Identity Authentication against Cheque Payment Fraud in Tanzanian Banks | |
Feno Heriniaina, R., Kitindi, Edvin | 1-5 |
Three Phase Active Shunt Power Filter with Simple Control in PSIM Simulation | |
A.Jeraldine viji, M. Sudhakaran | 6-13 |
Designing a Mobile SMS System to Support Offline Distance Training Programme Communications at University of Rwanda | |
Gerard Nizeyimana, Zaipuna O. Yonah, Mathias Nduwingoma | 14-23 |
GIS and RS Integrated Framework for Supporting Planners and Decision Makers | |
Mai Mostafa.Mohamed Hassan, Eman ElAmir, Saleh Mesbah Elkaffas | 24-33 |
Three Levels Analytical Model for Monolithic Legacy Program Source Code Analysis | |
Asfa Praveen, Shamimul Qamar, Shahanawaj Ahamad | 34-42 |
An Efficient Hybrid SIMBO-GA Approach to Design FIR Low Pass Filter | |
Parampal Singh, Balwinder Singh Dhaliwal | 43-49 |
An Unconstrained Q – G Programming Problem and its Application | |
Hiren Doshi, Chirag Trivedi | 50-54 |
On Existence of Coincidence and Common Fixed Points for Weakly Compatible Self Maps in Normed Boolean Vector Space | |
Saurabh Manro, Anita Tomar | 55-60 |
Paper submission email: JIEA@iiste.org
ISSN (Paper)2224-5782 ISSN (Online)2225-0506