JUHD
  • Home
  • Vol 1
    • N.1
    • N.2
    • N.3
    • N.4
  • Vol 2
    • N.1
    • N.2
    • N.3
    • N.4
  • Vol 3
    • N.1
    • N.2
    • N.3
    • N.4
Title Author Hits
Table of Content v2 n3 Written by Super User Hits: 2729
Web Search Enhancement Using WordNet Query Expansion Technique Written by Super User Hits: 1366
Proposed Approach for Enhancement of QoE to Support e-Society Written by Super User Hits: 1371
The Challenges of Implementing ECommerce in Kurdistan of Iraq Written by Super User Hits: 4776
Boosting Authentication Security by Building Strong Password and Individualizing Easy to Remember Techniques Written by Super User Hits: 1233
A Strategic Planning of Developing Student Information Management System Using SWOT Technique Written by Super User Hits: 1452
User-centered Security for Protecting Patient Privacy for E-health Cloud Computing Written by Super User Hits: 1533
Artificial Bee Colony for Quadratic Assignment Problem: A Hospital Case Study Written by Super User Hits: 1318
The Relationship between Customer's Personal Characteristics and Usage of Electronic Banking Services Written by Super User Hits: 1154
Towards a Framework for Supporting Unconditionally Secure Authentication Services within E-Government Infrastructures Written by Super User Hits: 1194

Page 1 of 4

  • 1
  • 2
  • 3
  • 4
  • You are here:  
  • Home
  • Vol 2
  • N.3

Login Form

  • Forgot your username?
  • Forgot your password?

Back to Top

© 2021 JUHD