default search action
International Journal of Sociotechnology and Knowledge Development, Volume 12
Volume 12, Number 1, 2020
- Aya Hegazi, Ahmed Taha, Mazen Mohamed Selim:
Copy-Move Forgery Detection Based on Automatic Threshold Estimation. 1-23 - Mourad R. Mouhamed, Mona M. Soliman, Ashraf Darwish, Aboul Ella Hassanien:
A Robust and Blind 3D Mesh Watermarking Approach Based on Particle Swarm Optimization. 24-48 - Mai Kamal el den Mohamed, Ahmed Taha, Hala Helmy Zayed:
Automatic Gun Detection Approach for Video Surveillance. 49-66 - Rasha Orban Mahmoud, Mazen Mohamed Selim, Omar A. Muhi:
Fusion Time Reduction of a Feature Level Based Multimodal Biometric Authentication System. 67-83 - Youssef Ahmed, Walaa Medhat, Tarek El Shishtawi:
A Framework for Managing Big Data in Enterprise Organizations. 84-97 - Hanaa Ibrahim Abu Zahra, Shaker H. Ali El-Sappagh, Tarek A. El-Shishtawy:
A Proposed Frequent Itemset Discovery Algorithm Based on Item Weights and Uncertainty. 98-118
Volume 12, Number 2, 2020
- Khalid M. Hosny, Ameer El-Sayed Gouda, Ehab R. Mohamed:
New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks. 1-30 - Nadheer Younus Hussien, Rasha Orban Mahmoud, Hala Helmy Zayed:
Deep Learning on Digital Image Splicing Detection Using CFA Artifacts. 31-44 - Mohamed Mounir, Mohamed Bakry El-Mashade:
Effect of Controlling Parameters of Tone Reservation Based on Null Subcarriers (TRNS) on the Performance of OFDM Systems. 45-62 - Khalid M. Hosny, Marwa M. Khashaba, Walid I. Khedr, Fathy A. Amer:
An Efficient Neural Network-Based Prediction Scheme for Heterogeneous Networks. 63-76 - Hana Mallek, Faiza Ghozzi, Faïez Gargouri:
Towards Extract-Transform-Load Operations in a Big Data context. 77-95
Volume 12, Number 3, 2020
- Celbert Mirasol Himang, Harrold U. Beltran, Lanndon A. Ocampo, Jose Maria S. Garcia II, Rosein A. Ancheta Jr., Melanie Mamites Himang, Egberto F. Selerio Jr., Ella Joyce I. Luzano:
Acceptability Evaluation of a Developed Thermal Infrared Device for Fire Risk Management: Using the Unified Theory of Acceptance and Use of Technology (UTAUT) Model. 1-25 - Tiko Iyamu:
Examining E-Government Enabling of E-Health Service Through the Lens of Structuration Theory. 26-40 - Gremil Alessandro Alcazar Naz:
A Grounded Theory on Conflict Management in Long-Distance Relationships: A Sociotechnical Perspective. 41-59 - Pawan Kumar Chand, Rahul Dhiman, Amit Mittal, Deepika Jhamb:
Narcissism as a Determinant of Job Satisfaction Among University Teaching Staff in India. 60-78 - Alaa M. Momani:
The Unified Theory of Acceptance and Use of Technology: A New Approach in Technology Acceptance. 79-98
Volume 12, Number 4, 2020
- Olga Tikhomirova:
Entrepreneurial Innovative Network and the Design of Socio-Economic Neural Systems. 1-23 - Vardan Mkrttchian, Lilya Rozhkova, Vladimir Belashov, Svetlana Vlazneva, Olga Salnikova:
About Technology-Based "Sociology" Software for Knowledge Development: From Questionnaire Creation to Data Processing. 24-40 - Ria Mardiana Yusuf:
Exploring Carers' Views and Experiences of Being Involved in Research and Development Work. 41-54 - Kennedy D. Gunawardana:
Hedonic and Utilitarian Propositions of Mobile Data Services in Sri Lanka: Development of a Consumer Technology Adoption Model. 55-69 - Neeta Baporikar:
Learning Link in Organizational Tacit Knowledge Creation and Dissemination. 70-88 - Kennedy D. Gunawardana:
Success Factors of the Implementation of Crowdfunding for Start-Ups. 89-105
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.