Friday 19th of April 2024                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 13, Issue 6, November 2016
A New Efficient Certificateless Multi-Receiver Public Key Encryption Scheme
Jun Zhu, Lin-Lin Chen, Xian Zhu and Ling Xie
Download Full-Text

A dynamic deployment method of micro service oriented to SLA
Zhen-Ling Ji and Yong Liu
Download Full-Text

A pattern based methodology for analyzing enterprise architecture landscape
Jihane Lakhrouit and Karim Baïna
Download Full-Text

The lo-norm-based Blind Image Deconvolution: Comparison and Inspiration
Hai-Song Deng and Wen-Ze Shao
Download Full-Text

5G Wireless Communications Systems: Heterogeneous Network Architecture and Design for Small Cells, D2D Communications (Low Range, Multi-hop) and Wearable Healthcare System on chip (ECG, EEG) for 5G Wireless
Niraj Shakhakarmi
Download Full-Text

Ear Recognition using a novel Feature Extraction Approach
Ibrahim Omara, Feng Li, Ahmed Hagag, Souleyman Chaib and Wangmeng Zuo
Download Full-Text

TLM Platform Based on SystemC for Hybrid MSR Topology
Abid Noureddine, Zitouni Abdelkrim and Tourki Rached
Download Full-Text

Sext3: The Secure Ext3
Raza Muhammad, Zhou Ke and Basheer Riskhan
Download Full-Text

Graph Theoretic and Genetic Algorithm-Based Model for Web Content Mining
Moses Akinjide Adelola, Sunday Olumide Adewale and Gabriel Babatunde Iwasokun
Download Full-Text

A Localization Algorithm for Wireless Sensor Networks Using One Mobile Beacon
Ahmed Elsayed Aboelhassab and Salwa Elramly
Download Full-Text

An Approach Using Dynamic Deferred Acknowledgement to Improve TCP Performance in Multi-Hop Wireless Networks
K. Praveen Kumar Rao and T. Senthil Murugan
Download Full-Text

Modeling and simulation of multi-disk auto-balancing rotor
Yang Yi-Jiao, Tan Qing, Yi Nian-En and Yang Jun-Zhe
Download Full-Text

Lie Face Recognition Use CBIR (Content Based Image Retrieval) Techniques for Otomation System
Dodi Yudo Setyawan and Muhammad Rafiq
Download Full-Text

HomeGuard: A Smart System to Deal with the Emergency Response of Domestic Violence Victims
Anik Islam, Arifa Akter and Bayzid Ashik Hossain
Download Full-Text

Implementation of Email Security using PGP at Zimbramail Server
Made Sudarma and Dandy Pramana Hostiadi
Download Full-Text

AluxBot - A Chatbot that Encourages the Care for the Environment
Jorge Peniche-Avilés, Carlos Miranda-Palma, Lizzie Narváez-Díaz and Erika Llanes-Castro
Download Full-Text

Multi-body dynamics and Biomedical Engineering Development
Wu Ren, Zhong Wei Li, Jiao Wang, Yanping Bi, Yang Luo, Yuancang Lou and Yi Yu
Download Full-Text

Information Security Issues and Threats in Saudi Arabia: A Research Survey
Ahmed Alzahrani and Khalid Alomar
Download Full-Text

Serious Game to Combat Childhood Obesity Using Kinect
Rosa Rodriguez-Dzib, Jose Lopez-Martinez, Victor Chi-Pech and Erika Llanes-Castro
Download Full-Text

Transforming Government: A Proposed Model for Culture Centred Design Approach
Noliza Saidin, Dalbir Singh and Zainul Akramin Mohd Drus
Download Full-Text

Applications of Modern Optimization Methods for Controlling Parallel Connected DC-DC Buck Converters
Ali S. Al-Dmour
Download Full-Text

LBPV Based Partial Face Recognition
M Naveena
Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Email: info@ijcsi.org

More contact details »