Issues 1/2, March/June 2013

Pages Title Author(s) Papers
134 - 142 Removing Hidden Data by Pseudo-CFA Reinterpolation

DOI: 10.20533/ijmip.2042.4647.2013.0017
Pradhumna Lal Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif Download Paper
143 - 149 Improving Access to Software Architecture Knowledge: An Ontology-based Search Approach

DOI: 10.20533/ijmip.2042.4647.2013.0018
Adriana Maria Figueiredo, Julio C. dos Reis, Marcos A. Rodrigues Download Paper
150 - 153 Traditional Color Image Enhancement Based on Adaptive Filter

DOI: 10.20533/ijmip.2042.4647.2013.0019
Sk.Khwaja Moinuddin, Ch.Madhuri Devi Download Paper

Issues 3/4, September/December 2013

Pages Title Author(s) Papers
154 - 163 Cyberwarfare Doctrine and Strategy Execution using a Semantic Approach

DOI: 10.20533/ijmip.2042.4647.2013.0020
Jeffrey J. Wiley, Frank P. Coyle Download Paper
164 - 171 Fingerprint Scheme For Digital Text

DOI: 10.20533/ijmip.2042.4647.2013.0021
Mohamed Sameh Hassanein, Gheorghita Ghinea Download Paper
172 - 179 Comparative Analysis of Ontology Alignment Methodology

DOI: 10.20533/ijmip.2042.4647.2013.0022
Said Rabah Azzam, Shikun Zhou Download Paper
180 - 187 Understanding the Patterns of the Usage of Mobile Telecommunication Services by Selected Undergraduate Students in Nigeria

DOI: 10.20533/ijmip.2042.4647.2013.0023
Omotayo Kayode Abatan, Manoj Maharaj Download Paper
0