Issues 1/2, March/June 2013

134 - 142Removing Hidden Data by Pseudo-CFA Reinterpolation

DOI: 10.20533/ijmip.2042.4647.2013.0017
Pradhumna Lal Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif Download Paper
143 - 149Improving Access to Software Architecture Knowledge: An Ontology-based Search Approach

DOI: 10.20533/ijmip.2042.4647.2013.0018
Adriana Maria Figueiredo, Julio C. dos Reis, Marcos A. Rodrigues Download Paper
150 - 153Traditional Color Image Enhancement Based on Adaptive Filter

DOI: 10.20533/ijmip.2042.4647.2013.0019
Sk.Khwaja Moinuddin, Ch.Madhuri Devi Download Paper

Issues 3/4, September/December 2013

154 - 163Cyberwarfare Doctrine and Strategy Execution using a Semantic Approach

DOI: 10.20533/ijmip.2042.4647.2013.0020
Jeffrey J. Wiley, Frank P. Coyle Download Paper
164 - 171Fingerprint Scheme For Digital Text

DOI: 10.20533/ijmip.2042.4647.2013.0021
Mohamed Sameh Hassanein, Gheorghita Ghinea Download Paper
172 - 179Comparative Analysis of Ontology Alignment Methodology

DOI: 10.20533/ijmip.2042.4647.2013.0022
Said Rabah Azzam, Shikun Zhou Download Paper
180 - 187Understanding the Patterns of the Usage of Mobile Telecommunication Services by Selected Undergraduate Students in Nigeria

DOI: 10.20533/ijmip.2042.4647.2013.0023
Omotayo Kayode Abatan, Manoj Maharaj Download Paper