Subscribe Now Subscribe Today
Science Alert Home Journals at Science Alert For Authors For Subscribers Contact Us
 
FOLLOW US:     Facebook    Twitter
   
 
    Publisher: Academic Journals Inc., USA
   
  Research Journal of Information Technology is positioned to publish high quality research papers that reflect global information technology advances. Scope of the journal includes: Strategy, change, infrastructure, human resources, sourcing, system development and implementation, communications, technology developments, technology futures, national policies and standards.

Research Journal of Information Technology now accepting new submissions. Submit your best paper via online submission system.
  Editor-in-Chief:  David Chek Ling Ngo
 
 
Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
CrossRef  |  Direct Link  |  
Alanazi, H.O., R. Alnaqeib, A.K.Hmood, M.A. Zaidan and Y. Al-Nabhani, 2010. On the module of internet banking system. J. Comput., 2: 133-143.
Direct Link  |  
Alshammari, F.H., R. Alnaqeib, M.A. Zaidan, A.K. Hmood, B.B. Zaidan and A.A. Zaidan, 2010. New quantitative study for dissertations repository system. J. Comput., 2: 85-93.
Direct Link  |  
Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
CrossRef  |  Direct Link  |  
Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A.Jalab, 2010. A novel approach for corrosion detection using texture analysis. Int. J. Computat. Intell. Inform. Security, 1: 70-75.
Hmood, A.K., H.A. Jalab and Z. M. Kasirun, 2010. Hiding information in digital video files. Proc. 3rd Int. Conf. Comput. Electrical Eng., 6: 114-119.
Hmood, A.K., H.A. Jalab and Z.M. Kasirun, 2010. An analytical study on steganography and digital watermarking metrics: Are the recent metrics suitable?. Sci. Res. Essays, .
Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
CrossRef  |  Direct Link  |  
Hmood, A.K., M.A. Zaidan, H.O. Alanazi, R. Alnaqeib and Y. Al-Nabhani, 2010. Dissertations repository system using context module. J. Comput., 2: 113-121.
Direct Link  |  
Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062.
Direct Link  |  
Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and H.A. Jalab, 2010. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922.
CrossRef  |  Direct Link  |  
Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
CrossRef  |  Direct Link  |  

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 

                 home       |       journals        |       for authors       |       for subscribers       |       asci
          © Science Alert. All Rights Reserved