Volume 3 (2013)
Issues 1/2, March/June 2013
Pages | Title | Author(s) | Papers |
134 - 142 | Removing Hidden Data by Pseudo-CFA Reinterpolation DOI: 10.20533/ijmip.2042.4647.2013.0017 |
Pradhumna Lal Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif | |
143 - 149 | Improving Access to Software Architecture Knowledge: An Ontology-based Search Approach DOI: 10.20533/ijmip.2042.4647.2013.0018 |
Adriana Maria Figueiredo, Julio C. dos Reis, Marcos A. Rodrigues | |
150 - 153 | Traditional Color Image Enhancement Based on Adaptive Filter DOI: 10.20533/ijmip.2042.4647.2013.0019 |
Sk.Khwaja Moinuddin, Ch.Madhuri Devi |
Issues 3/4, September/December 2013
Pages | Title | Author(s) | Papers |
154 - 163 | Cyberwarfare Doctrine and Strategy Execution using a Semantic Approach DOI: 10.20533/ijmip.2042.4647.2013.0020 |
Jeffrey J. Wiley, Frank P. Coyle | |
164 - 171 | Fingerprint Scheme For Digital Text DOI: 10.20533/ijmip.2042.4647.2013.0021 |
Mohamed Sameh Hassanein, Gheorghita Ghinea | |
172 - 179 | Comparative Analysis of Ontology Alignment Methodology DOI: 10.20533/ijmip.2042.4647.2013.0022 |
Said Rabah Azzam, Shikun Zhou | |
180 - 187 | Understanding the Patterns of the Usage of Mobile Telecommunication Services by Selected Undergraduate Students in Nigeria DOI: 10.20533/ijmip.2042.4647.2013.0023 |
Omotayo Kayode Abatan, Manoj Maharaj |