Saturday 20th of April 2024                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 10, Issue 5, September 2013
Multiple Tree Multicast in a Dynamic Environment
David A. Johnston, David R. Mcintyre, Francis G. Wolff and Christos A. Papachristou
Download Full-Text

On Performance of Logical-Clustering of Flow-Sensors
Rahim Rahmani, Hasibur Rahman and Theo Kanter
Download Full-Text

Detection of Syntactic Aspect Interaction in UML State Diagrams Using Critical Pair Analysis in Graph Transformation
Zaid Tahat, Tzilla Elrad, Luay Tahat and Nada Almasri
Download Full-Text

The Cerebellum: New Computational Model that Reveals its Primary Function to Calculate Multibody Dynamics Conform to Lagrange-Euler Formulation
Lavdim Kurtaj, Ilir Limani, Vjosa Shatri and Avni Skeja
Download Full-Text

Simulation Techniques and Control Schemes in Electromyography for a Lower Limb and Power Assist Exoskeleton
Ngoc Khoat Nguyen and Thi Mai Phuong Dao
Download Full-Text

Human Aspect in security of M-Commerce services in ICTD: A Siyakhula Living Lab Case Study
Marufu Anesu M.C., Sibanda Khulumani and Scott Mfundo S.
Download Full-Text

Supporting Context-Centric Relations in Heterogeneous Environments
Jamie Walters, Theo Kanter and Rahim Rahmani
Download Full-Text

The impact of indexes on data warehouse performance
El Amin Aoulad Abdelouarit, Mohamed El Merouani and Abdellatif Medouri
Download Full-Text

Extract an Essential Skeleton of a Character as a Graph from a Character Image
Kazuhisa Fujita
Download Full-Text

Link Quality and MAC-Overhead aware Predictive Preemptive Routing Protocol for Mobile Ad hoc Network
Ali Cherif Moussa and Feraoun Mohamed Kamel
Download Full-Text

Emulating Trust Zone in Android Emulator with Secure Channeling
Arun Muthu, Rahim Rahmani and Dinakaran Rajaram
Download Full-Text

Semi-automatic Data Warehouse Design methodologies: A Survey
Wafa Tebourski, Wahiba Ben Abdessalem Karâa and Henda Ben Ghezala
Download Full-Text

A speech recognition based approach for development in C++
Mubbashir Ayub and Muhammad Asjad Saleem
Download Full-Text

Object Recognition using Particle Swarm Optimization and Genetic Algorithm
Mahmood Ul Hassan, Muhammad Sarfraz, Abdelrahman Osman and Muteb Alruwaili
Download Full-Text

Handwriting and Hand Drawing Velocity Modeling by Superposing Beta Impulses and Continuous Training Component
Houcine Boubaker, Aymen Chaabouni, Najiba Tagougui, Monji Kherallah and Adel M. Alimi
Download Full-Text

Adapting IS Strategic Planning methodology to define Mobile Strategy
Mouhsine Lakhdissi, Rachid El Habi, Alami Semma and Bouchaib Bounabat
Download Full-Text

Multiple Skew Estimation In Multilingual Handwritten Documents
D. S. Guru, M Ravikumar and S. Manjunath
Download Full-Text

A conceptual framework for the Adoption of Social Network Technologies (SNTs) in Teaching: Case of Ghana
John Kingsley Arthur, Adu-Manu Kofi Sarpong and Clement Yeboah
Download Full-Text

Algorithms for Data Compression in Wireless Computing Systems
Upasana Mahajan and Prashanth C.S.R
Download Full-Text

A Generalized symmetric single step method for solving interval linear systems
Hassan Badry Mohamed Ahmed El-Owny
Download Full-Text

Modified Pattern Extraction Algorithm for Efficient Semantic Similarity Measures between Words
Pushpa C N, Thriveni J, Venugopal K R and L M Patnaik
Download Full-Text

Artificial Neural Networks in Medical Images for Diagnosis Heart Valve Diseases
Atta Elalfi, Mohamed Eisa and Hosnia Ahmed
Download Full-Text

Plastic Surgery Face Recognition: A comparative Study of Performance
Rehab M.Ibrahim, F.E.Z Abou-Chadi and A. S. Samra
Download Full-Text

Proposed Software Testing Using Intelligent techniques (Intelligent Water Drop (IWD) and Ant Colony Optimization Algorithm (ACO))
Baraa
Download Full-Text

Cluster Head Recovery Mechanism for Hierarchical Protocols
Nahla S. Abd El-Azeem, Sherine M. Abd El-Kader and Mohamed M. Zahra
Download Full-Text

ERP and Customization: Case Study of Logistics Processes Integration in a Telecommunications Company
Mustapha El Masbahi and Alami Semma
Download Full-Text

Human Eye Tracking Using Particle Filters
Elham Ghasemi-Dehkordi, Mahmoud Mahlouji and Hossein Ebrahimpour- Komleh
Download Full-Text

Fast Color Edge Detection Algorithm Based on Similarity Relation Matrix
Hossam Eldin Ibrahim Ali
Download Full-Text

In-orbit Calibration Method Based on Empirical Model for Non-collinear TDI CCD Camera
Shujuan Zhang and Shuying Jin
Download Full-Text

Neighborhood Crossover Operator - A new operator in Gravitational Search Algorithm
Zhongping Shang
Download Full-Text

A 3D ear recognition method based on auricle structural feature
Kai Wang and Zhi-Chun Mu
Download Full-Text

Probabilistic Latent Semantic Analysis for Unsupervised Word Sense Disambiguation
Gaurav Singh Tomar, Manmeet Singh, Shishir Rai, Atul Kumar, Ratna Sanyal and Sudip Sanyal
Download Full-Text

Frequency-Domain Modeling and Simulation of Coupled Lossy Multiconductor Transmission Lines
Youssef Mejdoub, Hicham Rouijaa, Mohamed Saih and Abdelilah Ghammaz
Download Full-Text

The Academic use of Social Networks Among University Students in Jordan
Atika Al Doghmi, Hasan Al-Shalabi, Jwaifell Mustafa Odeh, Swidan Andraws, Arafat Awajan and Adnan I. Alrabea
Download Full-Text

Building web crawler based on bee swarm intelligent algorithm
Muhamed Ibrahim Shujaa and Ahmed Bahaa Ulddin
Download Full-Text

Quality Issues in Infrastructure as a Service
Vb Singh and Nikita Yadav
Download Full-Text

Cylindrical heat exchanger trajectory planning and tracking using orthogonal functions
Hajer Sayem, Naceur Benhadj Braiek and Hassan Hammmouri
Download Full-Text

Security Issues and Challenges - Cloud Computing
Daniyal M. Alghazzawi and Syed Hamid Hasan
Download Full-Text

Comparative Study Based on Open Source Content Management Systems Mambo and his Fork - Joomla and Elxis
Dejan Viduka, Igor Lavrnic and Ana Basic
Download Full-Text

Security in Electronic Business
Abdullah Saad Al-Malaise Al-Ghamdi
Download Full-Text

An Efficient and Secure Handover Protocol for IEEE 802.16m Networks
Heba K. Aslan
Download Full-Text

Design of a Code Using System Theoretic Approach
V. C. Kotak and B. K. Lande
Download Full-Text

A Cipher based on Multiple Circular Arrays
Pushpa R. Suri and Sukhvinder Singh Deora
Download Full-Text

Reducing the Computational Cost in Multi-objective Evolutionary Algorithms by Filtering Worthless Individuals
Zahra Pourbahman and Ali Hamzeh
Download Full-Text

IT-infrastructure of university based on cloud computing
Zhuldyz B. Kalpeyeva and Akkyz K. Mustafina
Download Full-Text

An Effective Genetic Algorithm for Job Shop Scheduling with Fuzzy Degree of Satisfaction
Akeela M.Al-Atroshi, Sama T. Azez and Baydaa S.Bhnam
Download Full-Text

Compression of an AVI Video File Using Fractal System
Nevart A. Yousif and Faten H. Al-Qadhee
Download Full-Text

Hybrid Genetic Algorithm and Local Search for Energy Demand Prediction Model
Wahab Musa, Ku Ruhana Ku-Mahamud and Azman Yasin
Download Full-Text

Multi-data embedding in to RGB Image with using SVD method
El Gorfte Zineb, Noureddine Cherkaoui Eddeqaqi, Abdenbi Bouzid and Ahmad.Roukh
Download Full-Text

Subjectivity Classification using Machine Learning Techniques for Mining Feature-Opinion Pairs from Web Opinion Sources
Ahmad Kamal
Download Full-Text

A Novel Steganography with Preserving Statistical Properties
Thamir Rashed Saeed
Download Full-Text

Propose HMNIDS Hybrid Multilevel Network Intrusion Detection System
Saad K. Majeed, Soukaena H. Hashem and Ekhlas K. Gbashi
Download Full-Text

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability
Abderrahim Taoudi, Bouchaib Bounabat and Badr Elmir
Download Full-Text

Service Orchestration Algorithm for Web Services: Evaluation and Analysis
Yousra Chtouki, Hamid Harroud, Mohammed Khalidi Idrissi and Samir Bennani
Download Full-Text

Efficient Computation of Resonant Frequency of Rectangular Microstrip Antenna using a Neural Network Model with Two Stage Training
Guru Pyari Jangid, Gur Mauj Saran Srivastava and Ashok Jangid
Download Full-Text

A Model to Find Outliers in Mixed-Attribute Data sets using Mixed Attribute Outlier Factor
M. Krishna Murthy, A. Govardhan and Lakshmi Sreenivasareddy D
Download Full-Text

Modeling Methodology for NoC : MM4NoC
Sefrioui Nassim, Berrahou Aissam, Diouri Ouafaa and Eleuldj Mohsine
Download Full-Text

Using Discrete Wavelet Transformation To Enhance Underwater Image
Ali A. Yassin, Rana M. Ghadban, Salah F. Saleh and Hikmat Z. Neima
Download Full-Text

Importance of Software Documentation
Noela Jemutai Kipyegen and William P. K. Korir
Download Full-Text

Enhanced Technique for Data Cleaning in Text File
Arup Kumar Bhattacharjee, Atanu Mallick, Arnab Dey and Sananda Bandyopadhyay
Download Full-Text

A Symbol Based Graphical Schema Resistant to Peeping Attack
T.Srinivasa Ravi Kiran, K.V.Samabasiva Rao, M.Kameswara Rao and A.Srisaila
Download Full-Text

New Approach to optimize the time of Association Rules Extraction
Thabet Slimani
Download Full-Text

A Multimodal Approach for Face and Ear Biometric System
Gandhimathi Amirthalingam and G. Radhamani
Download Full-Text

A Vision Based Approach for Web Data Extraction Using Enhanced Cocitation Algorithm
R.Vijay and K.Prasadh
Download Full-Text

Adaptive Neuro-Fuzzy Inference System (ANFIS) Based Software Evaluation
Khyati Mewada, Amit Sinhal and Bhupendra Verma
Download Full-Text

A New Method to Solve Multi-Objective Non-Linear Fractional Programming Problems
Ramesh Babu.R, Palanisamy.V and Divyaa Devi.S
Download Full-Text

Metric Base Analysis and Modeling Experiments of Routing Protocols in MANETs and VANETs Wireless Network using Real Time Scenarios
Syed Fakhar Abbas, Ghulam Yasin, Muhammad Akram Mujahid and Saqib Rasool Chaudhry
Download Full-Text

Handwritten Arabic Digits Recognition Using Bezier Curves
Aissa Kerkour El Miad and Azzeddine Mazroui
Download Full-Text

Mapping Wireless Sensor Network Applications Requirements to Existing Operating Systems
Tarek Mohamed Ibrahim Salem and Sherine Mohamed Abd El-Kader
Download Full-Text

Authentication System of Banking Transaction by Fingerprinting- Neural Network Approach
Eugène Mbuyi Mukendi and Jean Didier Batubenga Muamba
Download Full-Text

Challenges and Opportunities for the Implementation of Social Network Technologies (SNTs) in Teaching in Universities in Ghana
Adu-Manu Kofi Sarpong, Arthur John Kingsley and Clement Yeboah
Download Full-Text

Customer Churn Prediction in Telecommunication- A Decade Review and Classification
Nabgha Hashmi
Download Full-Text

BER analysis of 3x3 Spatial Multiplexing under AWGN and Rician channels for different modulation techniques
Anuj Vadhera and Lavish Kansal
Download Full-Text

A proposed visualization tool for multilayer conceptual representation
Ahmed Sharaf Eldin, Adel Elsayed, Mona M. Nasr and Mostafa Thabet Mohamed Thabet
Download Full-Text

Network research based on the fuzzy comprehensive evaluation model of natural language
Zhi-Hong Ma, Xun-Song He and Hao-Xuan Ding
Download Full-Text

Preliminary Identification of Performance-Oriented Competences for Undergraduates Entrepreneurial Education via Information Communication Technology (ICT) for Wealth Creation in Enugu State, Nigeria
Michael Eskay, Ezegbe Nkiruka, Anyanwu Joy and Ikwumelu Sn
Download Full-Text

Problem of Universal Basic Education in Nigeria and the Role of Information Communication Technology in Enhancing its Quality, Sociological and Counseling Perspective
Anyanwu Joy, Michael Eskay, Ezegbe Nkiru and Ikwumelu Sn
Download Full-Text

IJCSI Volume 10, Issue 5, No 1, September 2013

Download Full-Text

IJCSI Volume 10, Issue 5, No 2, September 2013

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Email: info@ijcsi.org

More contact details »