default search action
BCS International IT Conference 2014: Abu Dhabi, United Arab Emirates
- Hussain Al-Ahmad:
Mobility, Intelligent Networks &Smart Societies, Proceedings of the 2nd BCS International IT Conference 2014, Abu Dhabi, United Arab Emirates, 9 - 10 March 2014. Workshops in Computing, BCS 2014 [contents]
S1: Business Applications
- Marie Griffiths, Leena Janahi, Hesham Al-Ammal:
IT Governance from Theory to Practice: The Importance of Accountability. - Ghassan Kbar, Wathiq Mansoor:
E-HRM and Outsourcing For Arabic Countries and Large Organisations. - Siva Sankaran:
Is Your IT Investment Adding Value to the Enterprise. - Ali al-Azzawi:
User Experience in Arabia: The Business Case for User-Centred Design and Usability Engineering.
S2: Educational Applications
- Mostafa Al-Emran, Khaled Shaalan:
E-podium Technology: A Medium of Managing Knowledge at Al Buraimi University College via M-learning. - Salah Al-Khafaji, Balasubramanian Sriram:
Using Online Learning Resources: A Self Learning Tool. - Hani Al Chalabi, Mostafa Al-Emran:
Developing an IT Help Desk Troubleshooter Expert System for diagnosing and solving IT Problems. - Sohail Iqbal Malik, Roy Mathew, Morshed U. Chowdhury, Jo Coldwell-Neilson:
Impact of Assurance of Learning (AOL) in Programming Course for Novices.
M1: Networks and Mobile Applications
- Oday D. Jerew, Kim L. Blackmore, Masoud Mohammadian:
Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks. - Bushra Qayyum, Mohammed Saeed:
Data Aggregation in Wireless Sensor Networks with Minimum Delay and Minimum Use of Energy: A Comparative Study. - Dongchen Zhang, Shoufeng Wang, Xiaoyan Xu, Xingzheng Li, Wenwen Yao, Tinglan Wang:
A Novel Long Term Traffic Forecast Algorithm. - Saeed Al Mannaee, Rashid Al Matar, Yousef Al Ahmedi, Jamal Zemerly, Ahmed Bentiba:
ICAPS: Intelligent Context Aware Profile Switching. - David Ming Liu, Benjamin Hirsch, Bashir Aden, Ahmed Mohammad Abdalla:
Mobile Malaria Larval Source Surveillance.
M2: Security and Imaging Applications
- Juha K. Mattila:
Protecting National Assets Against Information Operations in Post-modern World. - Daniel Tse, Zihuan Li, Ka Fai Wong, Yuhui Tao, Wei Liu, Wai Hou Choi:
Two-factor Protection Scheme in Securing the Source Code of Android Applications. - Walid Alakk, Hussain Al-Ahmad:
A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function. - Taha Dawood Jassim, Hussain Al-Ahmad, Raed A. Abd-Alhameed, Ahmed Al-Gindy:
Two Levels Block Based Wavelet Watermarking Algorithm For Still Colour Images.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.