IJCSI Open Access Publications
IJCSI Thesis Publications IJCSI Conference Special Issues Search Publications, Authors, More...
IJCSI Volume 8, Issue 6, November 2011
Dang-Quan Nguyen and Louise Lamont
Download Full-Text
Wavelet Based Color Image Compression and Mathematical Analysis of Sign Entropy Coding
Mbainaibeye Jérôme, Noureddine Ellouze and Christian Olivier
Download Full-Text
A Tunable Checkpointing Algorithm for Distributed Mobile Applications
Sungchae Lim
Download Full-Text
Modelling and simulation of complex systems: an approach based on multi-level agents
Alain-Jerome Fougeres
Download Full-Text
Implementation of MDA Method into SOA Environment for Enterprise Integration
Wiranto Herry Utomo
Download Full-Text
Testability Analysis Approach For Reactive Systems
Nguyen Thanh Binh and Chantal Robach
Download Full-Text
SMARTNotes: Semantic annotation system for a collaborative learning
Driss Bouzidi, Rachid Elouahabi and Noreddine Abghour
Download Full-Text
Comparison and Application of Metaheuristic Population-Based Optimization Algorithms in Manufacturing Automation
Rhythm Suren Wadhwa
Download Full-Text
Learning Mechanisms and Local Search Heuristics for the Fixed Charge Capacitated Multicommodity Network Design
Ilfat Ghamlouche, Teodor Gabriel Crainic, Michel Gendreau and Ihab Sbeity
Download Full-Text
An Ensemble Method for Validation of Cluster Analysis
Sunghae Jun
Download Full-Text
An Efficient Method for Mining Event-Related Potential Patterns
Seyed Aliakbar Mousavi, Muhammad Rafie Hj Arshad, Hasimah Hj Mohamed and Saleh Ali Alomari
Download Full-Text
A System to Detect Residential Area in Multispectral Satellite Images
Seyfallah Bouraoui
Download Full-Text
GSAT Enhanced with Learning Automata and Multilevel Paradigm
Noureddine Bouhmala and Ole-Christoffer Granmo
Download Full-Text
LR-WPAN Formation Topologies using IEEE 802.15.4
Salman Naseer and S R Chaudhary
Download Full-Text
Dewy Index Based Arabic Document Classification with Synonyms Merge Feature Reduction
Amal Alajmi, Elsayed M Saad and Medhat H Awadalla
Download Full-Text
Electromagnet Gripping in Iron Foundry Automation Part I: Principles and Framework
Rhythm Suren Wadhwa and Terje-Lien
Download Full-Text
A Novel Architecture for Quantum-Dot Cellular Automata Multiplexer
Arman Roohi, Hossein Khademolhosseini, Samira Sayedsalehi and Keivan Navi
Download Full-Text
QGRP: A Novel QoS-Geographic Routing Protocol for Multimedia Wireless Sensor Networks
Mohammed-Amine Koulali, Mohammed El Koutbi, Abdellatif Kobbane and Mostafa Azizi
Download Full-Text
Conception and Use of Ontologies for Indexing and Searching by Semantic Contents of Video Courses
Merzougui Ghalia, Djoudi Mahieddine and Behaz Amel
Download Full-Text
A Collaborative Algorithm for Ontological Matching in E-Learning Courseware Domain Knowledge Network
Akanbi C. Olufisoye, Adagunodo E. Rotimi, Omotosho Lawrence O and Adigun Adepeju A
Download Full-Text
Enhancing Web Search with Semantic Identification of User Preferences
Naglaa Fathy, Nagwa Badr, Mohamed Hashem and Tarek F. Gharib
Download Full-Text
Diagnosis of Fish Diseases Using Artificial Neural Networks
J.N.S. Lopes, A.N.A. Gonçalves, R.Y. Fujimoto and J.C.C. Carvalho
Download Full-Text
Blind Recognition Algorithm of Turbo Codes for Communication Intelligence Systems
Ali Naseri, Omid Azmoon and Samad Fazeli
Download Full-Text
BPISG: A Batching Heuristic Scheduling Algorithm With Taking Index Parameters for Mapping Independent Tasks on Heterogenous Computing Environment
Arash Ghorbannia Delavar, Ali Reza Kalili Boroujeni and Javad Bayrampoor
Download Full-Text
A Review of Burst Scheduling Algorithm in WDM Optical Burst Switching Network
Sanjay.N.Sharma and R.P.Adgaonkar
Download Full-Text
Performance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks
Abeer Ghandar, Eman Shabaan and Zaky Taha Fayed
Download Full-Text
Real-Time Projection Shadow with Respect to Sun Position in Virtual Environments
Hoshang Kolivand, Azam Amirshakarami and Mohd Shahrizal Sunar
Download Full-Text
Design Approaches to Enhance Usability for E-Commerce Sites
Mohiuddin Ahmed, Jonayed Kaysar and Nafis Rahman
Download Full-Text
Designing an Improved Fuzzy Multi Controller
Saeed Barzideh, Arash Dana, Ahmad Ali Ashrafian and Gh.Sajedy Abkenar
Download Full-Text
Cross Layer Implementation of Key Establishment and Configuration Protocols in WSN
Ozgur Saglam and Mehmet Emin Dalkilic
Download Full-Text
DTN Routing Protocols for VANETs: Issues and Approaches
Ramin Karimi, Norafida Ithnin, Shukor Abd Razak and Sara Najafzadeh
Download Full-Text
Design of a New Model of Multiband Miniature Antenna Near Isotropic
Abdellatif Berkat and Noureddine Boukli-Hacene
Download Full-Text
Theoretical analysis of VoIP transmission through different Wireless access technologies
Emna Charfi, Lamia Chaari and Lotfi Kamoun
Download Full-Text
Performance Evaluation and Analytical Validation of Internet Gateway Discovery Approaches in MANET
Rakesh Kumar, Anil K. Sarje and Manoj Misra
Download Full-Text
Application of Quantitative Models, MNLR and ANN in Short Term Forecasting of Ship Data
P.Oliver Jayaprakash and K. Gunasekaran
Download Full-Text
Comparing Methods for segmentation of Microcalcification Clusters in Digitized Mammograms
Hajar Moradmand, Saeed Setayeshi and Hossein Khazaei Targhi
Download Full-Text
Enhancing the Quality of E-learning Systems via Multimedia Learning Tools
Haroon Tarawneh, Mohammad Tarawneh and Farid Alzboun
Download Full-Text
Scalable Symmetric Key Cryptography Using Asynchronous Data Exchange in Enterprise Grid
Medhat Awadallah and Ahmed Youssef
Download Full-Text
Grayscale Image Compression Based on Min Max Block Truncating Coding
Hilal Almarabeh, Khalil Barhoum and Majdi Ahed
Download Full-Text
A Model for Crises Management in Software Projects
Mohammad Tarawneh, Haroon Tarawneh and Farid Alzboun
Download Full-Text
The Conception and the Study of a Triple-band Planar Inverted-F Antenna
Ibnyaich Saida, Ghammaz Abdelilah and Hassani Moha Mrabet
Download Full-Text
A Luenberger State Observer for Simultaneous Estimation of Speed and Rotor Resistance in sensorless Indirect Stator Flux Orientation Control of Induction Motor Drive
Mabrouk Jouili, Mabrouk Jouili and Mabrouk Jouili
Download Full-Text
Exploring a Hybrid of Geospatial Semantic Information in Ubiquitous Computing Environments
Raghda A. Fouad, Mohamed Hashem, Nagwa Badr and Hanaa Talha
Download Full-Text
HASoC for Developing a Software System
Salah Eldin Abdelrahman and Mohammed Badawy
Download Full-Text
A Multimodal Biometric System Using Linear Discriminant Analysis For Improved Performance
Aamir Khan, Muhammad Farhan, Aasim Khurshid and Adeel Akram
Download Full-Text
FHESMM: Fuzzy Hybrid Expert System for Marketing Mix Model
Mehdi Neshat, Ahmad Baghi, Ali Akbar Pourahmad, Ghodrat Sepidnam, Mehdi Sargolzaei and Azra Masoumi
Download Full-Text
Nurture IDR Segmentation and Multiple Instruction Queues in Superscalar Pipelining Processor
J.Nandini Meeraa, N.Indhuja, S.Devi Abirami and K.Rathinakumar
Download Full-Text
A Simple Technique for Enhancing Conversion Speed of Successive Approximation ADC
Gururaj Balikatti, R.M Vani and P.V. Hunagund
Download Full-Text
Design of a High Performance Reversible Multiplier
Md.Belayet Ali, Hosna Ara Rahman and Md. Mizanur Rahman
Download Full-Text
Automated Classification of SAR Images Using Moment
Debabrata Samanta and Gautam Sanyal
Download Full-Text
Design and Characterization of Tapered Transition and Inductive Window Filter Based on Substrate Integrated Waveguide Technology
Nouri Keltouma, Nouri Keltouma, Feham Mohammed, Feham Mohammed, Adnan Saghir and Adnan Saghir
Download Full-Text
Marginal Object Weight Ranking for Nearest Neighbor Search in Spatial Databases
K. Balasaravanan and K. Duraiswamy
Download Full-Text
Indirect DNS Covert Channel based on Base 16 Matrix for Stealth Short Message Transfer
Md Asri Ngadi, Syaril Nizam Omar and Ismail Ahmedy
Download Full-Text
A Block Cipher using Rotation and Logical XOR Operations
D. Sravan Kumar, Ch. Suneetha and A. Chandra Sekhar
Download Full-Text
A Dynamic Model for Sharing Reputation of Sellers Among Buyers for Enhancing Trust in Agent Mediated E-Market
Vibha Gaur, Neeraj Kumar Sharma and Punam Bedi
Download Full-Text
Framework for Ethernet Network Functionality Testing
Mirza Aamir Mehmood, Ahthasham Sajid and Amir Shehzad
Download Full-Text
DNS ID Covert Channel based on Lower Bound Steganography for Normal DNS ID Distribution
Abdulrahman H. Altalhi, Md Asri Ngadi, Syaril Nizam Omar and Zailani Mohamed Sidek
Download Full-Text
A New Weather Forecasting Technique using Back Propagation Neural Network with Modified Levenberg-Marquardt Algorithm for Learning
I.Kadar Shereef and S. Santhosh Baboo
Download Full-Text
Incorporating Security in Embedded System - A critical analysis
Mirza Aamir Mehmood, Amir Shahzad and Mazhar Ali
Download Full-Text
Integrated Circuit of CMOS DC-DC Buck Converter with Differential Active Inductor
Kaoutar Elbakkar and Khadija Slaoui
Download Full-Text
Implementing VoIP over Fatima Jinnah Women University
Ammara Asif, Ammara Asif, and Tahira Mahboob
Download Full-Text
Comparing Online Analytical Processing and Data Mining Tasks In Enterprise Resource Planning Systems
Tamer Salah, Mohamed Abo Elsoud and Hesham Arafat
Download Full-Text
Improving Security Levels Of IEEE802.16e Authentication By Diffie-Hellman Method
Mohammad Zabihi, Ramin Shaghaghi and Mohammad Esmail Kalantari
Download Full-Text
Analysis of Image Denoising using Wavelet Coefficient and Adaptive Subband Thresholding Technique
S.Kalavathy and R.M.Suresh
Download Full-Text
PPNOCS: Performance and Power Network on Chip Simulator based on SystemC
El Sayed M. Saad, Sameh A. Salem, Medhat H. Awadalla and Ahmed M. Mostafa
Download Full-Text
Strategical Modelling with Virtual Competition for Analyzing Behavior of Malicious Node in Mobile Adhoc Network to Prevent Decamping
Anil G.N and A. Venugopal Reddy
Download Full-Text
Realization of a Dual Transmission Band Conjugate Omega Shaped Metamaterial
Asit Kumar Panda and Ashutosh Mohanty
Download Full-Text
RDWSN: To offer Reliable Algorithm for Routing in Wireless Sensor Network
Arash Ghorbannia Delavar, Tayebeh Backtash and Leila Goodarzi
Download Full-Text
Cloud Services for Collaborative Web Based Project Management System
Chetan Yuvraj Dhembre, Parvez Javed Shaikh, Sushant Anant Gawali and Ahmad Raza Khan
Download Full-Text
Authentication of DICOM Medical Images using Multiple fragile watermarking Techniques in Wavelet Transform Domain
A Kannammal, A. Kannammal, S. Subha Rani and S. Subha Rani
Download Full-Text
Towards a pooling of ITIL V3 and COBIT
Samir Bahsani, Abdelaali Himi, Hassan Moubtakir and Alami Semma
Download Full-Text
Automated PolyU Palmprint sample Registration and Coarse Classification
Dhananjay D M, C. V. Guru Rao and I. V. Muralikrishna
Download Full-Text
E-Business: Application of software and technology in selected Ethiopian banks - Issues and challenges
Bhaskar Reddy Muvva Vijay and Tewdros Sisay Asefa
Download Full-Text
Virtual Shopping and Impulse Purchasing Strengths and Weaknesses in Pakistan
Muhammad Ali Hussain, Muhammad Zeeshan Anwar, Humna Mehboob, Ayesha Majeed and Tanzila Samin
Download Full-Text
Color Features Integrated with Line Detection for Object Extraction and Recognition in Traffic Images Retrieval
Hui Hui Wang, Dzulkifli Mohamad and N. A. Ismail
Download Full-Text
Comprehensive Analysis of Web Log Files for Mining
Vikas Verma, A. K. Verma and S. S. Bhatia
Download Full-Text
Design and Implementation of Memory-less Forbidden Transition Free Crosstalk Avoidance CODECs for On-Chip Buses
J.Venkateswara Rao and P.Sudhakara Rao
Download Full-Text
A Critical Simulation of CPU Scheduling Algorithm using Exponential Distribution
Abur Maria Mngohol, Mohammed Aminu Umar, Sani Danjuma and Saleh Abdullahi
Download Full-Text
Efficient Web Usage Mining With Clustering
K. Poongothai, M. Parimala and S. Sathiyabama
Download Full-Text
Extending XACML to support Credential Based Hybrid Access Control
Nirmal Dagdee and Ruchi Vijaywargiya
Download Full-Text
Implementation of Portion Approach in Distributed Firewall Application for Network Security Framework
Harleen Kaur, Omid Mahdi Ebadati E. and M. Afshar Alam
Download Full-Text
Multi databases in Health Care Networks
Nadir Kamal Salih and Tianyi Zang
Download Full-Text
New Channel Assignment Method for Access Points in Wireless LANs
Mohammed Fawzi Al-Hunaity
Download Full-Text
Pseudonymous Privacy Preserving Buyer-Seller Watermarking Protocol
Neelesh Mehra and Madhu Shandilya
Download Full-Text
Reduction of Measuring Items- Contemporary Issue in Assessing Internal Consistency
Oluwaseun Gbenga Fadare, Hezekiah Oluleye Babatunde, Gbenga Olayinka Ojo, John Niyi Iyanda and Fisayo Caleb Sangogboye
Download Full-Text
User Navigation Pattern Discovery using Fast Adaptive Neuro-Fuzzy Inference System
J Vellingiri and S. Chenthur Pandian
Download Full-Text
Comparison of Routing Protocols to Assess Network Lifetime of WSN
Owais Ahmed, Ahthsham Sajid and Mirza Aamir Mehmood
Download Full-Text
Fault Localization for Java Programs Using Probabilistic Program Dependence Graph
A. Askarunisa, T. Manju and B. Giri Babu
Download Full-Text
Approach to a conceptual model of indexation in a weak ontology described in RDFS
Traore Issa, Souleymane Oumtanaga, Babri Michel and Claude Lischou
Download Full-Text
Unsupervised Graph-based Word Sense Disambiguation Using Lexical Relation of WordNet
Ehsan Hessami, Faribourz Mahmoudi and
Download Full-Text
Collaborative Personalized Web Recommender System using Entropy based Similarity Measure
Harita Mehta, Shveta Kundra Bhatia, Punam Bedi and V. S. Dixit
Download Full-Text
Search content via Cloud Storage System
Haytham Al-Feel and Mohamed Khafagy
Download Full-Text
A Novel Approach to Fast Image Filtering Algorithm of Infrared Images based on Intro Sort Algorithm
Kapil Kumar Gupta, Kapil Kumar Gupta, M. Rizwan Beg, M. Rizwan Beg, Jitendra Kumar Niranjan and Jitendra Kumar Niranjan
Download Full-Text
Performance Evaluation of Bionomic Algorithm (BA) in Comparison with Genetic Algorithm (GA) for Shortest Path Finding Problem
Saira Beg, Azam Khan, Umar Nauman and Sajjad Mohsin
Download Full-Text
Hierarchal Object Oriented Fault Tolerant Secured and Atomic Mobile Agent Model
Mayank Aggarwal and Nipur
Download Full-Text
A New Factorization Method to Factorize RSA Public Key Encryption
Bhagvant Ram Ambedkar and Sarabjeet Singh Bedi
Download Full-Text
Comparison of Cloud Database: Amazon SimpleDB and Google Bigtable
Shalini Ramanathan, Savita Goel and Subramanian Alagumalai
Download Full-Text
Increasing DGPS Navigation Accuracy using Kalman Filter Tuned by Genetic Algorithm
M. R. Mosavi, M. Sadeghian and S. Saeidi
Download Full-Text
Six layers Architecture Model for Object Oriented Database
Mansaf Alam
Download Full-Text
A Classical Fuzzy Approach for Software Effort Estimation on Machine Learning Technique
S.Malathi and S. Sridhar
Download Full-Text
A Survey on Design Pattern Recovery Techniques
Ghulam Rasool and Detlef Streitfdert
Download Full-Text
Performance Analysis of Enhanced Clustering Algorithm for Gene Expression Data
T. Chandrasekhar, K. Thangavel and E. Elayaraja
Download Full-Text
Intelligent Paging Strategy for Multi-Carrier CDMA System
Sheikh Shanawaz Mostafa, Khondker Jahid Reza, Md. Ziaul Amin and Mohiuddin Ahmad
Download Full-Text
Phishing Attack Protection-PAP-Approaches for Fairness in Web Usage
Mohiuddin Ahmed and Jonayed Kaysar
Download Full-Text
Apply Multi-Layer Perceptrons Neural Network for Off-Line Signature Verification and Recognition
Suhail Odeh and Manal Khalil
Download Full-Text
An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing
Syam Kumar P and Subramanian R
Download Full-Text
Study of Image Processing, Enhancement and Restoration
Bhausaheb Shivajirao Shinde, D.K. Mhaske and Sachin Macchindra Chavan
Download Full-Text
Why banks and financial institutions in Pakistan are turning towards Internet banking?
Sajjad Nazir, Muhammad Naseer Akhtar and Muhammad Zohaib Irshad
Download Full-Text
Principal Component Analysis-Linear Discriminant Analysis Feature Extractor for Pattern Recognition
Aamir Khan and Hasan Farooq
Download Full-Text
A New Local Adaptive Thresholding Technique in Binarization
T.Romen Singh, T.Romen Singh, Sudipta Roy, O.Imocha Singh, Tejmani Sinam and Kh.Manglem Singh
Download Full-Text
An Authoring System for Editing Lessons in Phonetic English in SMIL3.0
Merzougui Ghalia and Djoudi Mahieddine
Download Full-Text
Performance Evaluation of Fingerprint Identification Based on DCT and DWT using Multiple Matching Techniques
Lavanya B. N. and Raja K.B.
Download Full-Text
Implementation of Wireless Group Support System in Mobile Healthcare
Karupothula Madhavi Latha, Pogaku Ranjith Kumar and Jayadev Gyani
Download Full-Text
TBEE: Tier Based Energy Efficient Protocol Providing Sink and Source Mobility in Wireless Sensor Networks
Siddhartha Chauhan and Lalit Awasthi
Download Full-Text
Improvement in Gain and Bandwidth of Rectangular and U Slot Loaded Patch
Aruna Rani and A. K. Gautam
Download Full-Text
FLoMSqueezer: An Effective Approach For Clustering Categorical Data Stream
Marpe Sora, Swarup Roy and S I Singh
Download Full-Text
A Synthetic Heuristic Algorithm for Independent Task Scheduling in Cloud Systems
Arash Ghorbannia Delavar and Yalda Aryan
Download Full-Text
Implementation of Variable Least Significant Bits Stegnographyusing DDDB Algorithm
Sahib Khan, Muhammad Haroon Yousaf and Jamal Akram
Download Full-Text
iAgile: A Tool for Database Generation Guided by Graphical User Interface
Shaimaa Galal and Ehab Hassanein
Download Full-Text
Study of Reputation Based Defense Mechanism in Peer To Peer Live Streaming
M. A. Mottalib, Md. Ali-Al Mamun, Reazul Hoque, Md. Ehsanuzzaman and Jonayed Kaysar
Download Full-Text
Voice Recognition Using HMM with MFCC for Secure ATM
Shumaila Iqbal, Tahira Mahboob and Malik Sikandar Hayat Khiyal
Download Full-Text
Enhancing E-Learning with VRML Techniques
Sangeetha Senthilkumar and E. Kirubakaran
Download Full-Text
System Performance Ratings of High Speed Nano Devices Using Fuzzy Logic
Ak. Ashakumar Singh, Y. Surjit Singh and K. Surchandra Singh
Download Full-Text
Information Extraction and Webpage Understanding
M.Sharmila Begum, L.Dinesh and P.Aruna
Download Full-Text
Knowledge Acquisition and Knowledge Management through E-Learning
V.Thennarasu and E. Kirubakaran
Download Full-Text
Impact of Data Mining in Drought Monitoring
Anil Rajput, Ritu Soni, Ramesh Prasad Aharwal and Rajesh Sharma
Download Full-Text
A Survey of Web Crawler Algorithms
Pavalam S M, S V Kashmir Raja, Felix K Akorli and Jawahar M
Download Full-Text
Literature Survey on Design and Implementation of Processing Model for Polarity Identification on Textual Data of English Language
Aparna Trivedi, Ingita Singh, Apurva Srivastava, Karishma Singh and Suneet Kumar Gupta
Download Full-Text
Data Mining in Sequential Pattern for Asynchronous Periodic Patterns
Thodeti Srikanth
Download Full-Text
Construction of Learning Path Using Ant Colony Optimization from a Frequent Pattern Graph
Souvik Sengupta, Sandipan Sahu and Ranjan Dasgupta
Download Full-Text
Cost-Benefit Analysis of a Redundant System with Inspection and Priority Subject to Degradation
Jitender Kumar
Download Full-Text
A Partitioning Strategy for OODB
Sudesh Rani
Download Full-Text
A Review of Data Mining Classification Techniques Applied for Diagnosis and Prognosis of the Arbovirus-Dengue
A. Shameem Fathima, D. Manimegalai and Nisar Hundewale
Download Full-Text
Developing an Intelligent User Interaction Development Engine
Ashit Kumar Dutta
Download Full-Text
Water Marking on Digital Image using Genetic Algorithm
Cauvery N K
Download Full-Text
Minimal Feature Set for Unsupervised Classification of Knee MR Images
Rajneet Kaur, Rajneet Kaur and Naveen Aggarwal
Download Full-Text
An Integrative Study on Bioinformatics Computing Concepts, Issues and Problems
Muhammad Zakarya, Izaz Ur Rahman, Nadia Dilawar and Reshma Sadaf
Download Full-Text
Acoustic Phonetic Characteristics of Kannada Language
Hemakumar G
Download Full-Text
An Analysis of MIPS Group Based Job Scheduling Algorithm with other Algorithms in Grid Computing
S.Gomathi
Download Full-Text
Automatic Fracture Detection Using Classifiers- A Review
S.K.Mahendran and S. Santhosh Baboo
Download Full-Text
CAPTCHA Celebrating its Quattuordecennial- A Complete Reference
Ragavi V and G.Geetha
Download Full-Text
Operating System Performance Analyzer for Embedded Systems
Shahzada Khayyam Nisar, Maqsood Ahmed, Huma Ayub and Iram Baig
Download Full-Text
Automatic Histogram Threshold with Fuzzy Measures using C-means
K. Srinivas and V. Srikanth
Download Full-Text
Transmission System Planning in Competitive and Restructured Environment using Artificial Intelligence
Badar Ul Islam and Syed Amjad Ahmed
Download Full-Text
Semantic Analysis of Energy Consumption for Estimating SLA Violation with Virtual Machine Provisioning Schema using DVFS
Arunadevi M and R. S. D Wahidabanu
Download Full-Text
Modified LRU Algorithm To Implement Proxy Server With Caching Policies
Jitendra Singh Kushwah and Brijesh Patel
Download Full-Text
A Detailed Study of Resource Scheduling and Fault Tolerance in Grid
Radha.B, B. Radha and V. Sumathy
Download Full-Text
Classification of Speech for Clinical Data using Artificial Neural Network
C.R.Bharathi and V. Shanthi
Download Full-Text
Robust RSA for Digital Signature
Virendra Kumar and Puran Krishen Koul
Download Full-Text
Vowel-Plosive of English Word Recognition using HMM
Hemakumar G
Download Full-Text
Social Networks Research Aspects: A Vast and Fast Survey Focused on the Issue of Privacy in Social Network Sites
Mohammad Soryani and Behrooz Minaei
Download Full-Text
Effective Business Value of Bal Information System
Muhammad Awais, Tanzila Samin and Muhammad Bilal
Download Full-Text
Efficient Retrieval of Text for Biomedical Domain using Expectation Maximization Algorithm
Sumit Vashishtha and Yogendra Kumar Jain
Download Full-Text
Four Layered Approach to Non-Functional Requirements Analysis
A. Anandarao and M. Gopichand
Download Full-Text
Symmetrical Dispersion Compensation For High Speed Optical Links
Ojuswini Arora, Amit Kumar Garg and Savita Punia
Download Full-Text
Hybrid Multiobjective Evolutionary Algorithms: A Survey of the State-of-the-art
Wali Khan Mashwani
Download Full-Text
Improvement the Flatness, Gain and Bandwidth of Cascaded Raman Amplifiers for Long-Haul UW-WDM Optical Communications Systems
Fathy M. Mustafa, Ashraf A. Khalaf and F. A. El-Geldawy
Download Full-Text
A Robust Client Verification in Cloud Enabled m-Commerce using Gaining Protocol
Chitra Kiran N. and G. Narendra Kumar
Download Full-Text
Fuzzy Priority CPU Scheduling Algorithm
Bashir Alam, M.N. Doja, R. Biswas and Mansaf Alam
Download Full-Text
Blood Vessel Segmentation For High Resolution Retinal Images
J. Benadict Raja and C. G. Ravichandran
Download Full-Text
Dynamic Gesture Recognition Using Hidden Markov Model in Static Background
Malvika Bansal, Shivin Saxena, Devendra Desale and Dnyaneshwar Jadhav
Download Full-Text
Reengineering Multi Tiered Enterprise Business Applications for Performance Enhancement and Reciprocal or Rectangular Hyperbolic Relation of Variation of Data Transportation Time with Row Pre-fetch Size of Relational Database Drivers
Sridhar Sowmiyanarayanan
Download Full-Text
Performance Comparison Of Routing Protocols For Zigbee Wpan
A. Narmada and P. Sudhakara Rao
Download Full-Text
Image Compression Using Partitioning Around Medoids Clustering Algorithm
Valmik B Nikam, Vinod J Kadam and B.B.Meshram
Download Full-Text
Lanes and Road Signs Recognition for Driver Assistance System
Ahmed Hechri and Abdellatif Mtibaa
Download Full-Text
Digital Image Watermarking Algorithm Based on Wavelet Packet
A. Geetha, B.Vijayakumari, C.Nagavani and T.Pandiselvi
Download Full-Text
Cleaning of Ancient Document Images Using Modified Iterative Global Threshold
N.Venkata Rao, A.Venkata Srinivasa Rao, S.Balaji and L.Pratap Reddy
Download Full-Text
Modeling a Distributed Database System for Voters Registration in Nigeria
Olabode Olatubosun
Download Full-Text
Operating System Based Analysis of Security Tools for Detecting Suspicious Events in Network Traffic
Fasee Ullah and Waqas Tariq
Download Full-Text
A Comparison Between Data Mining Prediction Algorithms for Fault Detection-Case study Ahanpishegan Co.
Golriz Amooee, Behrouz Minaei-Bidgoli and Malihe Bagheri-Dehnavi
Download Full-Text
A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols
Kavita Pandey and Abhishek Swaroop
Download Full-Text
IJCSI Volume 8, Issue 6, No 1, November 2011
Download Full-Text
IJCSI Volume 8, Issue 6, No 2, November 2011
Download Full-Text
IJCSI Volume 8, Issue 6, No 3, November 2011
Download Full-Text