European Journal of Computer Science and Information Technology (EJCSIT)

EA Journals

Journals

RECEPTIVENESS OF EDUCATIONAL MULTIMEDIA TOOLS IN COMPUTER PROGRAMMING EDUCATION

Computer Science students face lots of difficult concepts while learning to program. To understand these concepts, students and teachers face challenges based on lots of factors such as course content, environment and/or miscellaneous of students learning styles. Computer technologies, such as educational multimedia tools, may or may not help to make these concepts more comprehensible.

RECEPTIVENESS OF EDUCATIONAL MULTIMEDIA TOOLS IN COMPUTER PROGRAMMING EDUCATION Read More »

RECEPTIVENESS OF EDUCATIONAL MULTIMEDIA TOOLS IN COMPUTER PROGRAMMING EDUCATION

Computer Science students face lots of difficult concepts while learning to program. To understand these concepts, students and teachers face challenges based on lots of factors such as course content, environment and/or miscellaneous of students learning styles. Computer technologies, such as educational multimedia tools, may or may not help to make these concepts more comprehensible.

RECEPTIVENESS OF EDUCATIONAL MULTIMEDIA TOOLS IN COMPUTER PROGRAMMING EDUCATION Read More »

IRIS IDENTIFICATION SYSTEM BASED ON RLM TEXTURE FEATURES

Among biometric identification technologies, iris recognition has attracted lots of attention because of uniqueness and long term stability. In this paper, a new iris recognition system based on texture has been proposed and used for identification of person. Texture features such as Run Length Matrix features (RLM) will be used for feature extraction. Inner and

IRIS IDENTIFICATION SYSTEM BASED ON RLM TEXTURE FEATURES Read More »

A Review of Privacy Preserving Techniques inWireless Sensor Network.

This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this pa-per we represent a research

A Review of Privacy Preserving Techniques inWireless Sensor Network. Read More »

Secure data packet of Cluster head and base station in wireless sensor networks

LEACH in wireless sensor networks (WSNs) achieves good performance with reserving energy consumption and decreasing system delay. LEACH protocol does not consider a security issue for ensuring the protection of the network. So the security in LEACH is a complicated task. were we improved the LEACH protocol called a novel algorithm to select cluster heads

Secure data packet of Cluster head and base station in wireless sensor networks Read More »

Speech User Interface For Low Literacy Users Of Ict Services

Speech user interface has the potentials to accommodate different users irrespective of the level of education. This type of user interface can provide interactions that meet the capabilities of low literacy users in underserved rural communities. One of the challenges facing the development of Information and Communication Technology in rural underserved communities is the inability

Speech User Interface For Low Literacy Users Of Ict Services Read More »

A HYBRID AND PERSONALIZED ONTOLOGY RANKING MODEL USING U-MEANS CLUSTERING AND HIT COUNT

Semantic Web is an extension of current Web which offers to add structure to the present Web. Ontologies play an important role in Semantic Web development and retrieval of relevant ontology. Ontology is being represented as a set of concepts and their inter-relationships relevant to some knowledge domain. As the number of Ontology repositories are

A HYBRID AND PERSONALIZED ONTOLOGY RANKING MODEL USING U-MEANS CLUSTERING AND HIT COUNT Read More »

A Novel Third Party Auditability and Dynamic Based Security in Cloud Computing

Cloud computing refers to the use and access of multiple server-based computational resources via a digital network (WAN, Internet connection using the World Wide Web, etc.). Cloud users may access the server resources using a computer or other device. In cloud computing, applications are provided and managed by the cloud server and data is also

A Novel Third Party Auditability and Dynamic Based Security in Cloud Computing Read More »

Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.