# | Article Title |
1 |
Throughput Analysis in an Infrastructure-based Mesh Network using BeeHive Algorithm Authors : Kiran K., Vaishnavi K., P. Deepa Shenoy and Venugopal K. R. |
2 |
Artificial Neural Network Modeling of Job Satisfaction: A Case Study of ICT, Federal University of Agriculture, Makurdi Authors : K. K. Ikpambese, T. D. Ipilakyaa and V. T. Achirgbenda |
3 |
A Mapping Study to Investigate Spam Detection on Social Networks Authors : Balogun Abiodun Kamoru, Azmi Jaafar, Marzanah A. Binti Jabar and Masrah Azrifah Azmi Murad |
4 |
Adoption of Computer-Aided Technology (CAx) in Textile and Apparel Industries Authors : Mekonnen Wagaw |
5 |
Cryptanalysis of Nonlinear Stream Cipher Cryptosystem based on Improved Particle Swarm Optimization Authors : Salim A. Abbas Al-Ageelee and Riyam N. J. Kadhum |
6 |
Efficient Detection of Legitimate and Malicious URLs using ID3 Algorithm Authors : Yogesh Dubey, Pranil Chaudhari, Shaldon Chaphya and Tina D’abreo |
7 |
Cross-Layer Congestion Control in Wireless Ad Hoc Network Authors : Ali Alomari |
8 |
Energy Consumption and Conservation Family Lifestyle: Survey Authors : Meri Algarni |
9 |
A Comparative Assessment between Visual Interpretation and Pixel based Approach for Land Use/Cover Mapping using IRS LISS-III Imagery Authors : Parmod Kumar, Raj Setia, D. C. Loshali, Brijendra Pateriya |