Friday 19th of April 2024                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 9, Issue 2, March 2012
Implementing an Expert Diagnostic Assistance System for Car Failure and Malfunction
Salama A. Mostafa, Mohd Sharifuddin Ahmad, Mazin Abed Mohammed and Omar Ibrahim Obaid
Download Full-Text

Cooperative Electronic Attack for Groups of Unmanned Air Vehicles based on Multi-agent Simulation and Evaluation
Yee Ming Chen and Wen-Yuan Wu
Download Full-Text

Forming Teams for Teaching Programming based on Static Code Analysis
Davis Arosemena-Trejos, Sergio Crespo and Clifton Clunie
Download Full-Text

Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras Network
L. A. Hassnawi, R.B Ahmad, Abid Yahya, S. A. Aljunid and M. Elshaikh
Download Full-Text

An Analysis of Internet Banking Security of Foreign Subsidiary Banks in Australia: A Customer Perspective
Panida Subsorn and Sunsern Limwiriyakul
Download Full-Text

Improving Accuracy of Authentication Process via Short Free Text using Bayesian Network
Charoon Chantan, Sukree Sinthupinyo and Tippakorn Rungkasiri
Download Full-Text

Information system subsystems execution and development order algorithm implementation and analysis
Robert Kudelic, Alen Lovrencic and Mladen Konecki
Download Full-Text

Adaptive Synthesis Filter Banks for Image Compression
Abdul Nadeem, Abdul Nadeem, Fan Yangyu and Fan Yangyu
Download Full-Text

Survey of NoC and Programming Models Proposals for MPSoC
Eduard Fernandez-Alonso, David Castells-Rufas, Jaume Joven and Jordi Carrabina
Download Full-Text

The Ontology and Architecture for an Academic Social Network
Moharram Challenger
Download Full-Text

Computerized Simulation of Automotive Air-Conditioning System: Development of Mathematical Model and Its Validation
Haslinda Mohamed Kamar, Mohd Yusoff Senawi and Nazri Kamsah
Download Full-Text

A Mixed Integer Programming Model Formulation for Solving the Lot-Sizing Problem
Maryam Mohammadi and Masine Md. Tap
Download Full-Text

Energy Efficient Security Preserving VM Live Migration In Data Centers For Cloud Computing
Korir Sammy, Ren Shengbing and Cheruiyot Wilson
Download Full-Text

Semantic Service Composition with QoS End - to - End Constraints via AND/OR Graphs
Xhemal Zenuni and Ivan Momtchev
Download Full-Text

An Adaptive Parameters Binary-Real Coded Genetic Algorithm for Real Parameter Optimization: Performance Analysis and Estimation of Optimal Control Parameters
Omar Abdul-Rahman, Masaharu Munetomo and Kiyoshi Akama
Download Full-Text

An Architecture for Context-Aware Knowledge Flow Management Systems
Ali Jarrahi and Mohammad Reza Kangavari
Download Full-Text

Graphical Model Based for Robust Fault Diagnosis
Rafika El Harabi, Belkacem Ould Bouamama and Mohamed Naceur Abdelkrim
Download Full-Text

Function Group Based of Indonesian e-Government Grid Services Topology
Ummi Azizah Rachmawati, Heru Suhartanto and Dana Indra Sensuse
Download Full-Text

Modify AODV Routing Protocol to Improve Motorway Surveillance System Performance
Layth Abdulkareem Hassnawi, R. Badlishah Ahmad and Abid Yahya
Download Full-Text

Towards an information flow in logic programming
Antoun Yaacoub
Download Full-Text

Fuzzification of Web Objects: A Semantic Web Mining Approach
Tasawar Hussain, Muhammad Abdul Qadir and Sohail Asghar
Download Full-Text

Learning Bayesian Network to Explore Connectivity of Risk Factors in Enterprise Risk Management
Paradee Namwongse and Yachai Limpiyakorn
Download Full-Text

Comparison between Poissonian and Markovian Primary Traffics in Cognitive Radio Networks
Abdelaali Chaoub and Elhassane Ibn-Elhaj
Download Full-Text

Continuous Bangla Speech Segmentation, Classification and Feature Extraction
Md. Mijanur Rahman, Md. Farukuzzaman Khan and Md. Al-Amin Bhuiyan
Download Full-Text

Identification of Nominated Classes for Software Refactoring Using Object-Oriented Cohesion Metrics
Safwat M. Ibrahim, Sameh A. Salem, Manal A. Ismail and Mohamed Eladawy
Download Full-Text

Improving performance of distributed data mining (DDM) with multi-agent system
Trilok Nath Pandey, Niranjan Panda and Pravat Kumar Sahu
Download Full-Text

MVSDAP: a new extensible, modifiable and secure data access pattern for layered Information Systems
Gholamali Nejad Hajali Irani and Vali Tawosi
Download Full-Text

Automatic Generation of OWL Ontology from XML Data Source
Nora Yahia, Sahar A. Mokhtar and Abdelwahab Ahmed
Download Full-Text

Design, Simulation and Hardware implementation of Low Density Parity Check Decoders using Min-Sum Algorithm
Abdessalam Ait Madi, Anas Mansouri and Ali Ahaitouf
Download Full-Text

Accurate dynamic power model for FPGA based implementations
Chalbi Najoua, Boubaker Mohamed and Bedoui Mohamed Hedi
Download Full-Text

A Novel Approach of Query Optimization for Genetic Population
Ishtiaq Ahmed, M. Rizwan Beg, Kapil Kumar Gupta and Mohd.Isha Mansoori
Download Full-Text

Performance Analysis Cluster Computing Environments on Molecular Dynamic Simulation of RAD GTPase and LOXCurcumin Molecules with AMBER
Heru Suhartanto, Arry Yanuar, M. H. Hilman, Ari Wibisono and Toni Dermawan
Download Full-Text

A Review on Factors Affecting the EDI System Migration in Logistics
Umussaadah Adam, Mohammad Ishak Desa and Mohd Iskandar Illyas Tan
Download Full-Text

Web-based Decision Support System for Agribusiness Development in Oil Palm Plantations at Siak Local Government Using Policy Analysis Matrix
Arif Imam Suroso and Arief Ramadhan
Download Full-Text

Stability Study of Fuzzy Control Processes Application to a Nonlinear Second Order System
Basma Zahra, Anis Sakly and Mohamed Benrejeb
Download Full-Text

Ontology-oriented e-gov services retrieval
Hassania Ouchetto, Ouail Ouchetto and Ounsa Roudies
Download Full-Text

An Approach for Data Storage Security in Cloud Computing
Deepanchakaravarthi Purushothaman and Sunitha Abburu
Download Full-Text

An Improved Authentication Scheme for Passport Verification Using Watermarking Technique
V. Madhu Viswanatham, Galma Santosh Reddy, Potluri Jagadeesh and Mothe Dinesh Reddy
Download Full-Text

Brainstorming: Towards a tool for decision-making in the Web 2.0
Chrayah Mohamed, Kamal Eddine El Kadiri, Boubker Sbihi and Noura Aknin
Download Full-Text

Design and Performance Evaluation of a New Irregular Fault-Tolerant Multistage Interconnection Network
Rinkle Rani Aggarwal
Download Full-Text

Applications of Data Mining in Higher Education
Monika Goyal and Rajan Vohra
Download Full-Text

Decision Support System using Artificial Neural Network for Managing Product Innovation
Noppakorn Klintong, Pakpachong Vadhanasindhu and Natcha Thawesaengskulthai
Download Full-Text

Accurate Intelligent Map Matching Algorithms for Vehicle Positioning System
M. Pashaian, M. R. Mosavi and M. Pashaian
Download Full-Text

Mean Square Error Performance of OFDM Systems Against Signal to Noise Ratio under different fading Channels
Haritha.Thotakura, Sri Gowri .Sajja and Elizabeth Rani.D
Download Full-Text

Brain Tumor Growth and Volume Detection by Ellipsoid-Diameter Technique Using MRI Data
S.Karpagam and S.Gowri
Download Full-Text

Timed Test Case Generation Using Labeled Prioritized Time Petri Nets
Noureddine Adjir, Pierre De Saqui Sannes, Kamel Rahmouni and Abdelkader Adla
Download Full-Text

Current Web Applications Development and Measurement Practices for Small Software Firms
Faudziah Ahmad, Fauziah Baharom and Moath Husni
Download Full-Text

Converting Relational Database Into Xml Document
Kanagaraj.S and Sunitha Abburu
Download Full-Text

Near Rough and Near Exact Subgraphs in Gm-Closure Spaces
Yousif Yaqoub Yousif
Download Full-Text

Cryptography Based E-Commerce Security: A Review
Shazia Yasin, Khalid Haseeb and Rashid Jalal Qureshi
Download Full-Text

X-Vaults: a Software for the Analysis of the Stability of Masonry Cross-Vaults
Stefano Galassi, Michele Paradiso and Giacomo Tempesta
Download Full-Text

A Learning Automata Based Algorithm For Solving Capacitated Vehicle Routing Problem
Mir Mohammad Alipour and Mir Mohammad Alipour
Download Full-Text

OFDM Transmission Performance Evaluation in V2X Communication
Aymen Sassi, Faiza Charfi, Yassin El Hillali, Lotfi Kamoun and Atika Menhaj Rivenq
Download Full-Text

Software Metrics to Estimate Software Quality using Software Component Reusability
Prakriti Trivedi and Rajeev Kumar
Download Full-Text

Data Mining Classifiers for Static Security Evaluation in Power System
Ibrahim Saeh and M.W.Mustafa
Download Full-Text

Web-based AR Advertising Branding for Proton Company
Ashraf Abbas M. Al-Modwahi, and Arash Habibi Lashkari
Download Full-Text

Multilingual Medical Documents Classification Based on MesH Domain Ontology
Elberrichi Zakaria, Taibi Malika and Belaggoun Amel
Download Full-Text

Development of Personal Learning Network System To Build E-Literacy
Wawan Setiawan
Download Full-Text

Project Management Phases of a SCADA System for Automation of Electrical Distribution Networks
Mohamed Najeh Lakhoua and Mohamed Kamel Jbira
Download Full-Text

Decision-making application for the Management of HumanResources: the automation of the recruitment to the breasts ofUniversities
Latifa Oubedda, Erraha Brahim and Khalfaoui Mohamed
Download Full-Text

Directional Total Variation Filtering Based Image Denoising Method
S.Karthik, Hemanth V K, K.P. Soman, V.Balaji, Sachin Kumar S and M. Sabarimalai Manikandan
Download Full-Text

Term Recognition and Extraction based on Semantics for Ontology Construction
Akalya.B and Nirmala Sherine.F
Download Full-Text

An Efficient Strategy of Shape Assignment for Block Division
Ismadi Md Badarudin, Abu Bakar Md Sultan, Md Nasir Sulaiman, Ali Mamat and Mahmud Tengku Muda Mohamed
Download Full-Text

A survey on implementation of a Linux-based operating system using LFS method
Alireza Abed Masrurkhah, Amir Seyed Danesh and Seyyedeh Narjes Ghiami Taklimi
Download Full-Text

New development in Anticipatory Agent System used for Power Management in Smart Home Simulator
Ahmed Elmahalawy and Mohamed Nour El-Dien
Download Full-Text

Energy Aware Reliable Routing Protocol (EARRP) for Mobile AdHoc Networks Using Bee Foraging Behavior and Ant Colony Optimization
K.G.Santhiya and N. Arumugam
Download Full-Text

CDMA Based Interconnect Mechanism for SOPC
V. Rajesh and P. Vijaya Kumar
Download Full-Text

Energy-Aware Task Partitioning on Heterogeneous Multiprocessor Platforms
Elsayed Saad, Medhat Awadalla, Mohamed Shalan and Abdullah Elewi
Download Full-Text

The Algorithm to Detect Color Gradation on Silk
Suyoto, Widyastuti, Leonardo Ardhinugroho Dasuki and Raymundus Galih Prasetya
Download Full-Text

Fuzzy Association Rule Mining Algorithm to Generate Candidate Cluster: An Approach to Hierarchical Document Clustering
Ashish Jaiswal and Nitin J. Janwe
Download Full-Text

An Efficient Clustered Multipath Routing to improve lifespan in WSN
S.Manju Priya and S. Karthikeyan
Download Full-Text

Effective Requirement Management Through Version Control Data centric Approach
Imran Iqbal, Naveed Abbas Mirani and Ali Javed
Download Full-Text

Speckle Noise Reduction in Medical Ultrasound Images
Faouzi Benzarti and Hamid Amiri
Download Full-Text

Fast and Accurate Practical Positioning Method using Enhanced-Lateration Technique and Adaptive Propagation Model in GSM Mode
Mohamed H. Abdel Meniem, Ahmed M. Hamad and Eman Shaaban
Download Full-Text

Fortification of Transport Layer Security Protocol with Hashed Fingerprint Identity Parameter
Kuljeet Kaur and G. Geetha
Download Full-Text

Improved Image Steganography Technique for Colored Images using Huffman Encoding with Symlet Wavelets
Saddaf Rubab and M. Younus
Download Full-Text

Detection of Stationary Foreground Objects in Region of Interest from Traffic Video Sequences
Smitha H. and V. Palanisamy
Download Full-Text

Data Selection for Semi-Supervised Learning
Shafigh Parsazad, Ehsan Saboori and Amin Allahyar
Download Full-Text

Improved Self-Organizing Maps and Speech Compression
Mohamed Ettaouil and Mohamed Lazaar
Download Full-Text

Extracting Generalized Semantic Roles from Corpus
Fateme Jafarinejad and Mehrnoush Shamsfard
Download Full-Text

Data classification by Fuzzy Ant-Miner
Mohamed Hamlich and Mohammed Ramdani
Download Full-Text

Task Assignment Problem Solved by Continuous Hopfield Network
Ettaouil Mohamed, Loqman Chakir, Hami Youssef and Haddouch Khalid
Download Full-Text

Designing Inhibitors against HOX domain mutations of PDX-1 and studying its association in Diabetes
Allam Appa Rao, Anupam Bhattacharya, Amit Kumar, Amita Kashyap and Gr Sridhar
Download Full-Text

Fractal Image Compression Mechanism by Applying Statistical Self-Similarities
Jeet Kumar and Manish Kumar
Download Full-Text

Comparison of the Fuzzy-based Wavelet Shrinkage Image Denoising Techniques
Ali Adeli, Farshadtajeripoor, M. Javad Zomorodian and Mehdi Neshat
Download Full-Text

Slow Adaptive OFDMA Systems ThroughChance Constrained Programming
N. Revathy and T. Guhan
Download Full-Text

Traceability Method for Software Engineering Documentation
Nur Adila Azram and Rodziah Atan
Download Full-Text

Performance Analysis of Receivers in WDM for Extended Reach Passive Optical Networks
S. Rajalakshmi
Download Full-Text

Recycling RF energy in the GSM-1800 band
Bouchouicha Dhaou, Latrach Mohamed and Sakli Hedi
Download Full-Text

An Ontology Based Approach for Automatically Annotating Document Segments
Maryam Hazman, Samhaa R. El-Beltagy and Ahmed Rafea
Download Full-Text

Web Image Retrieval Search Engine based on Semantically Shared Annotation
Alaa Riad, Hamdy Kamal Elminir and Sameh Abd-Elghany
Download Full-Text

Dynamic Clustering Of High Speed Data Streams
J. Chandrika and K.R. Ananda Kumar
Download Full-Text

WPSR: Word Plane Sweep Replicated, Present a Plane sweep Algorithm to optimize the use of Replicated data in a document
Arash Ghorbannia Delavar and Elahe Moghimi Hanjani
Download Full-Text

A New Hybrid Video Segmentation Algorithm using Fuzzy C Means Clustering
K. Mahesh and K. Kuppusamy
Download Full-Text

Efficient Channel State Based Call Admission Control for Non Real Time traffic in LTE (3GPP) Networks
J Vijay Franklin and K. Paramasivam
Download Full-Text

Implementation study of AODV for Microsoft Windows CE platform
Prinima Gupta and R. K Tuteja
Download Full-Text

A New Multimodal Biometric Identification Approach
Akrouf Samir, Belayadi Yahia and Mouhoub Nasser Eddine
Download Full-Text

Electromagnet Gripping in Iron Foundry Automation Part II: Simulation
Rhythm Suren Wadhwa
Download Full-Text

A Survey on Semantic Web Search Engine
G.Sudeepthi, G. Anuradha and M.Surendra Prasad Babu
Download Full-Text

Improved Aprori Algorithm Based on bottom upapproach using Probability and Matrix
Sunil Kumar S, Shyam Karanth, Ananth Prabhu, Akshay K C and Bharathraj Kumar M
Download Full-Text

Current Status of Mobile Internet Protocol version 4 and its Security Issues
Susanna S Henry and V. Santhosh Kumar
Download Full-Text

A Parallel Processing Algorithms for Solving Factorization and Knapsack Problems
G.Aloy Anuja Mary, J.Naresh and C.Chellapan
Download Full-Text

Interpretation of Forecast State of Dynamic Objects by Images Recognition And Evolutionary Computation
Adalat Kerim Kerimov, Ceyran Khalilova and Sadagat Abdulzade
Download Full-Text

An Investigation about obstacles of Mobile Commerce in Iran (A case study in Saravan City)
Baqer Kord, Dawood Karimzadegan and Mehrab Omara
Download Full-Text

An Improved PI Regulator Based Load Regulation in Constant Photovoltaic Power Supply System
A. Durgadevi and S. Arulselvi
Download Full-Text

A new content framework and metamodel for Enterprise Architecture and IS Strategic Planning
Mouhsine Lakhdissi and Bouchaib Bounabat
Download Full-Text

Static Filtered Skin Detection
Rehanullah Khan, Zeeshan Khan and Muhammad Aamir
Download Full-Text

Optimization of multi-channel HDLC protocol transceiver using Verilog
Harpreet Singh, Navneet Kaur, Vinay Chopra and Amardeep Singh
Download Full-Text

Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic
Fasee Ullah, Waqas Tariq, Muhammad Arshad, Muhammad Saqib and Noor Gul
Download Full-Text

Machine Learning Classifiers for Steady State Security Evaluation in Power System
Ibrahim Saeh and M.W.Mustafa
Download Full-Text

An Enhanced Model of E-Learning Management System Using Semantic Web Technology and Development of Universal Namespace for University Domain
Sharmin Rashid, Md. Maidul Islam and Md. Rakibul Islam
Download Full-Text

Multiband F-PIFA Fractal Antennas for the Mobile Communication Systems
Y. Belhadef and N. Boukli Hacene
Download Full-Text

A survey paper on Ant Colony Optimization Routing algorithm for selecting Multiple Feasible Paths for Packet Switched Networks
Meenakshi R Patel and Babita Kubde
Download Full-Text

Cross-View of Testing Techniques Toward Improving Web-Based Application Testing
Mostafa Kandil, Ehab Hassanein and Sherif Mazen
Download Full-Text

Efficient Use of Semantic Annotation in Content Based Image Retrieval (CBIR)
V. Khanaa, M. Rajani and K. Ashok Augustine Raj
Download Full-Text

Fingerprint Gender Classification using Wavelet Transform and Singular Value Decomposition
Gnanasivam P and Muttan S
Download Full-Text

Oil Refinery Supply Chain Modelling Using Pipe Transportation Simulator
Jakub Dyntar and Jan Skvor
Download Full-Text

An Approach of Digital Image Copyright Protection by Using Watermarking Technology
Md. Selim Reza, Mohammed Shafiul Alam Khan, Md. Golam Robiul Alam and Serajul Islam
Download Full-Text

Transmitting Cryptographic data through Steganography
Maria Akhtar Mufti, Aihab Khan, Malik Sikandar Hayat Khiyal and Asim Munir
Download Full-Text

Efficient Design and Implementation of DFA Based Pattern Matching onHardware
Aakanksha Pandey, Dr. Nilay Khare and Akhtar Rasool
Download Full-Text

Cloud Infrastructure Service Management - A Review
A. Anasuya Threse Innocent
Download Full-Text

SNMP Based Network Optimization Technique Using Genetic Algorithms
M. Mohamed Surputheen, G. Ravi and R. Srinivasan
Download Full-Text

Hardware Implementation of Multimedia Encryption Techniques Using FPGA
M.A. Mohamed, M.E. Abou-Elsoud and W.M. Kamal El-Din
Download Full-Text

Energy Efficient Routing Protocol for MANET
S.Gopinath
Download Full-Text

Performance Analysis of Probabilistic Rebroadcasting in Grid FSR for MANET
S. Nithya Rekha and C. Chandrasekar
Download Full-Text

Automatic Diagnosis of Diabetes by Expert System
P. Santosh Kumar Patra
Download Full-Text

DSP implementation of Fuzzy based Power Quality enhancement strategy for IPOS converter fed drive
N.Radhakrishnan and M.Ramaswamy
Download Full-Text

Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks
G Sunilkumar, Thriveni J, K R Venugopal and L M Patnaik
Download Full-Text

Automatic Color Images Classification Algorithm
Rushdi Saleem Hussein Abu Zneit, Amjad Abu Jazar and Belal Ayyoub
Download Full-Text

RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks
M Salman Ashraf and Muhammad Raheel
Download Full-Text

New Environmental Prediction Model Using Fuzzy logic and Neural Networks
Abou-Bakr Ramadan, Ahmed El-Garhy, Fathy Zaky and Mazhar Mahmoud Hefnawi
Download Full-Text

Lattice Based Attack on Common Private Exponent RSA
Santosh Kumar Ravva
Download Full-Text

An Optical / Wireless Integrated Approach to provide Multiple Gateways in Wireless Mesh Networks
Muhammad Raheel and Muhammad Salman Ashraf
Download Full-Text

Hyper-Graph Based Documents Categorization on Knowledge from Decision Trees
Merjulah Roby
Download Full-Text

Node Reliability in WDM Optical Network
Chinmayananda Panda, Surya Narayan Patro, Pradipta Kumar Das and Pradosh Kumar Gantayat
Download Full-Text

Digital Radiation image
Abou-Bakr Ramadan, Ahmed El-Garhy, Fathy Zaky and Mazhar Mahmoud Hefnawi
Download Full-Text

Precise multiple object identification and tracking using efficient visual attributes in dense crowded scene with regions of rational movement
Pushpa D and H. S. Sheshadri
Download Full-Text

Using Layer Recurrent Neural Network to Generate Pseudo Random Number Sequences
Veena Desai, Ravindra Patil and Dandina Rao
Download Full-Text

Maximising Wireless sensor Network life time through cluster head selection using Hit sets
B. Jaya Lakshmi and M. Neelima
Download Full-Text

The Pattern as a Reusable Component to Adaptive Framework for Load Balancing Mobile Agent in Internet Banking
A. Meiappane, V. Prasanna Venkatesan, V. Jegatheeswari, B. Kalpana and U. Sarumathy
Download Full-Text

Web Application Security by SQL Injection DetectionTools
Atefeh Tajpour, Suhaimi Ibrahim and Mohammad Sharifi
Download Full-Text

From ð-Calcul towards a Dynamic architecture for the resolution of the problems of optimization for mobile telephony operators
Chaker Mezioud and Mohammed Khireddine Kholladi
Download Full-Text

A Power Efficient, Oblivious, Path-Diverse, Minimal Routing for Mesh-based Networks-on-Chip
El Sayed M. Saad, Sameh A. Salem, Medhat H. Awadalla and Ahmed M. Mostafa
Download Full-Text

Security of the DNS Protocol - Implementation and Weaknesses Analyses of DNSSEC
Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji and Abdelmajid Lakbabi
Download Full-Text

Role of Permutations in Significance Analysis of Microarray and Clustering of Significant Microarray Gene list
Tejashree Damle and Manali Kshirsagar
Download Full-Text

Hybrid Distance Based Document Clustering with Keyword and Phrase Indexing
Subhadra Kompella and M. Shashi
Download Full-Text

Proposition of an Unexploited Multiple Access Technique
Sidi Ahmed Djennas and Fethi Tarik Bendimerad
Download Full-Text

Utility based Power Control with FEC in Hexagonally deployed WSN
Rajendran Valli and Perumal Dananjayan
Download Full-Text

A Differential Double Pass Transistor Logic Unit
Chiraz Khedhiri, Mouna Karmani and Belgacem Hamdi
Download Full-Text

Performance Enhancement of Digital Communication Systems Using Fuzzy Logic
Danmeet Kaur
Download Full-Text

PCLA: A New Public-key Cryptosystem Basedon Logarithmic Approach
Archana Raghuvamshi, P. Premchand and P. Venkateswara Rao
Download Full-Text

An OSPF based UMTS/WLAN Radio over Fiber Convergence Network for Enhanced Quality of Service
R Shankar and P Dananjayan
Download Full-Text

Chaos Control of Lure Like Chaotic System using Backstepping Controller Optimized by Chaotic Particle Swarm Optimization
Alireza Khosravi
Download Full-Text

A Content based CT Lung Image Retrieval by DCT Matrix and Feature Vector Technique
J.Bridget Nirmala and S.Gowri
Download Full-Text

Performance Analysis of Genetic Algorithm for Mining Association Rules
K.Indira and S. Kanmani
Download Full-Text

New Strategy for Congestion Control based on Dynamic Adjustment of Congestion Window
Gamal Attiya
Download Full-Text

Approximate Equalities on Rough Intuitionistic Fuzzy Sets and an Analysis of Approximate Equalities
B. K. Tripathy and G. K. Panda
Download Full-Text

A Quantitative Measurement and Validation of Granularity in Service Oriented Architecture
Geetha J. and T. Karthikeyan
Download Full-Text

A Study on the Impact of Learning Management Systems on Students of a University College in Sultanate of Oman
Sarachandran Nair. C and Rajendra Patil
Download Full-Text

Stimulating Cooperation in Mobile Ad hoc Networks using Cut Diamond with Diamond method
Sangheethaa Sukumaran, J.Venkatesh and Arun Korath
Download Full-Text

Fast Energy-Efficient Secure Dynamic Address Routing For Scalable WSNs
G. Ravi, M. Mohamed Surputheen and R. Srinivasan
Download Full-Text

Evaluation of socio-economic patterns of SHG members in Kerala using clustering analysis
Sajeev B. U, Sajeev B. U, K. Thangavel and K. Thangavel
Download Full-Text

Face Recognition Algorithm Based on Doubly Truncated Gaussian Mixture Model Using Hierarchical Clustering Algorithm
D. Haritha, K. Srinivasa Rao and Ch. Satyanarayana
Download Full-Text

Integration of chaotic sequences uniformly distributedin a new image encryption algorithm
Nassiba Wafa Abderrahim, Fatima Zohra Benmansour and Omar Seddiki
Download Full-Text

An Architecture of a Multi Agent Enterprise Knowledge Management System Based on Service Oriented Architecture
Pooja Jain and Deepak Dahiya
Download Full-Text

Exploration of Teaching Staff and Students Preferences of Information and Communication Technologies in Private and Academic Lives
Mohamed Elsaadani
Download Full-Text

Left Ventricle Cavity Segmentation from Cardiac Cine MRI
Marwa M. A. Hadhoud, Mohamed I. Eladawy and Ahmed Farag
Download Full-Text

Identifying Data Integrity in the Cloud Storage
Saranya Eswaran and Sunitha Abburu
Download Full-Text

Image Denoising with Modified Wavelets Feature Restoration
Sachin D Ruikar and Dharmpal D Doye
Download Full-Text

Image Fusion Technique for Impulse Noise Removal in Digital Images using Empirical Mode Decomposition
A. Ramarao, Ch. Satyanandareddy and G. Sateesh
Download Full-Text

Proposed Challenges and Areas of Concern in Operating System Research and Development
Plawan Kumar Rath and Anil G.N.
Download Full-Text

Regular Maximum Principle in the Time Optimal Control Problems with Time-Varying State Constraint
Murad H. Imanov
Download Full-Text

Environmental Noise Classification and Cancellation using Fuzzy Classifier and Fuzzy Adaptive Filters
T. Meera Devi, N. Kasthuri and A. M. Natarajan
Download Full-Text

Contribution to the Study of Optical Properties of a Dielectric Medium (Atomic Vapor) Using the Lorentz Model
H. Benosman, T. Benouaz and A. Chikhaoui
Download Full-Text

Collaborative Decision Support Systems for Primary Health care Managers
Gunjan Pahuja and Rajan Vohra
Download Full-Text

A framework for Outdoor Mobile Augmented Reality
Edmund Ng Gaip Weng, Rehman Ullah Khan, Shahren Ahmad Zaidi Adruce and Oon Yin Bee
Download Full-Text

Secure and Compressed Secret Writing using DES and DEFLATE algorithm
S.Smyrna Grace, T. Nalini and A.Pravin Kumar
Download Full-Text

Analytical Analysis of Generic Reusabilty: Weyukers Properties
Parul Gandhi and Pradeep Kumar Bhatia
Download Full-Text

Comparative Study of CDMA and OFDM in WI-FI
N. Larbi, F. Debbat and A. Boudghen Stambouli
Download Full-Text

Secure Internet Voting System based on Public Key Kerberos
Hussein Khalid Abd-Alrazzq, Mohammed Salah Ibrahim and Omer Abdulrahman Dawood
Download Full-Text

Improvements in the channel Equalizer Performance Using Modified LMS and BP Algorithms
Ashraf A.M. Khalaf
Download Full-Text

Segmenting and Supervising an ECG Signal by Combining the CWT and PCA
Hanen Chaouch, Khaled Ouni and Lotfi Nabli
Download Full-Text

A New Architecture of a Ubiquitous Health Monitoring System: A Prototype of Cloud Mobile Health Monitoring System
Abderrahim Bourouis, Mohammed Feham and Abdelhamid Bouchachia
Download Full-Text

Semantic Architecture for Web application Security
Abdul Razzaq, Ali Hur, H Farooq Ahmad and Muddassar Masood
Download Full-Text

Demand Based Effective Energy Utilization in Mobile Ad Hoc Networks
R. Bhuvaneswari and M. Viswanathan
Download Full-Text

QoS-Aware SINR-based Call Blocking Evaluation in Cellular Networks with 3G Interface
Moses Ekpenyong and Imeh Umoren
Download Full-Text

Advance in Head Pose Estimation from Low Resolution Images: A Review
Teera Siriteerakul
Download Full-Text

Hybrid Genetic Algorithms for University Course Timetabling
Meysam Shahvali Kohshori and Mohammad Saniee Abadeh
Download Full-Text

How Workflow Systems Facilitate Business Process Reengineering and Improvement
Mohamed El Khadiri and Abdelaziz El Fazziki
Download Full-Text

Study And Implementation Of LCS Algorithm For Web Mining
Vrishali P. Sonavane
Download Full-Text

Qos- based rate allocation in wireless mesh networks
Airin Mardokhpour
Download Full-Text

Mobile Node for Wireless Sensor Network to Detect Landmines
P.Vijaya Kumar, M.Saravana Guru, R.Saparnaa and D.Saravanan
Download Full-Text

Tag Based Audio Search Engine
Parameswaran Vellachu and Sunitha Abburu
Download Full-Text

Cryptographic Hash functions - a review
Rajeev Sobti and G.Geetha
Download Full-Text

Electronic Payment System (EPS) - Facilitating the Development and Adoption in Nigeria
Akudo C. Anyanwu, Absalom E. Ezugwu and Sale E. Abdullahi
Download Full-Text

Fuzzy Integrity Constraints for Native XML Database
E.J.Thomson Fredrick and G. Radhamani
Download Full-Text

(i,j)-Quasi Semi Weakly g-Closed Functions in Bitopological Spaces
C. Mukundhan and N. Nagaveni
Download Full-Text

Tracking of a Moving Target by Improved Potential Field Controller in Cluttered Environments
Marwa Taher Yousef, Hosam Eldin Ibrahim Ali, Shahira Mahmoud Habashy and Elsayed Mostafa Saad
Download Full-Text

Towards the Next Generation of Full and Accurate 3D Building Models by Fusing Aerial and Terrestrial Imagery
Karim Hammoudi
Download Full-Text

Adaptive filtering using Higher Order Statistics (HOS)
Abdelghani Manseur, Daoud Berkani and Abdenour Mekhmoukh
Download Full-Text

Knowledge Management Model and Strategy of Genetic Resources and Traditional Knowledge in Indonesia
Dana Indra Sensuse and Lukman
Download Full-Text

Web Testing: Tool, Challenges and Methods
Shakti Kundu
Download Full-Text

Application Independent Energy Efficient Data Aggregation in Wireless Sensor Networks
Deepali Virmani, Tanuj Singhal, Ghanshyam, Khyati Ahlawat and Noble Vashisht
Download Full-Text

Situational Decomposition Method
Zhukabayeva Tamara Kokenovna and Khu Ven-Tsen
Download Full-Text

Architecture of Wireless Network
Ram Kumar Singh and Shweta Singh
Download Full-Text

Hierarchical Hybrid Routing Protocol For wireless sensor networks
Badr Chahidi and Abdallah Ezzati
Download Full-Text

A new Replica Placement Algorithm in Data Grid
Zeinab Fadaie and Amir Masoud Rahmani
Download Full-Text

Ants for Document Clustering
Priya Vaijayanthi, Natarajan A M and Raja Murugadoss
Download Full-Text

Neuro Fuzzy System Based Condition Monitoring of Power Transformer
Anil Kumar Kori, A. K. Sharma and A. K. S. Bhadoriya
Download Full-Text

Analysis and design of multiple feedback control loops for both Inverter and Rectifier of single-phase UPS under Non-linear Load
Seyed Reza Hadian Amrei, Seyed Morteza Alizadeh, Amin.Yaghoubi and Ali. Bemani
Download Full-Text

Domain ontology and multi-criteria analysis for enterprise modeling
Sabria Hadj Tayeb and Myriam Noureddine
Download Full-Text

A Novel Architecture for Collaborative Environments
Sahar Saberi and Mehdi N.Fesharaki
Download Full-Text

Intrusion Detection System using Memtic Algorithm Supporting with Genetic and Decision Tree Algorithms
K. P. Kaliyamurthie, D. Parameswari and R. M. Suresh
Download Full-Text

Low-Power and High Speed 128-Point Pipline FFT/IFFT Processor for OFDM Applications
D. Rajaveerappa and K. Umapathy
Download Full-Text

Network Anomalies Detection Using Statistical Technique: A Chi- Square approach
Rahul Rastogi, Mhoammad Zubair Khan and M H Khan
Download Full-Text

Image Classification through integrated K- Means Algorithm
Balasubramanian Subbiah and Seldev Christopher. C
Download Full-Text

Application of Back Propagation Neural Network to Drum Level Control in Thermal Power Plants
Preeti Manke and Sharad Tembhurne
Download Full-Text

An Efficient Method for Urdu Language Text Search in Image Based Urdu Text
Khalil Khan, Muhammad Sidique, Muhammad Aamir and Rehan Ullah
Download Full-Text

An Unsupervised Dynamic Image Segmentation using Fuzzy Hopfield Neural Network based Genetic Algorithm
Amiya Halder and Soumajit Pramanik
Download Full-Text

A Systematic Study of Requirement Volatility During Software Development Process
Harsh Dev and Ranjana Awasthi
Download Full-Text

A Study on the Existing Computer Aided Crime Analysis Tools to Handle Indian State of Affairs
D.Gnana Rajesh and M. Punithavalli
Download Full-Text

Categorization of Social Networks Based on Multiplicity Constraints
Priya R, Chitra M T and Elizabeth Sherly
Download Full-Text

Maximizing Expected Base Pair Accuracy in RNA Secondary Structure Prediction by Joining Stochastic Context-Free Grammars Method
Shahira M. Habashy
Download Full-Text

Design and Simulation of Double S Shaped Metamaterial
Hayet Benosman and Nouredine Boukli Hacene
Download Full-Text

Using image key as cipher key in AES
Razi Hosseinkhani and Hamid Haj Seyyed Javadi
Download Full-Text

Evaluation of Joint Sleep and Idle Mode in IEEE 802.16e WIMAX
Fuad M. Abinader Jr., Vicente A. De Sousa Jr., Anderson B. Fernandes, Adaildo G. Dassuncao, Nibia S. Bezerra, Gino Lozada and Pekko Orava
Download Full-Text

Performance Analysis of Mobile Phone Radiation Minimization Through Characteristic Impedance Measurement
S.Palanivel Rajan, R. Sukanesh, T.Kamalesshwaren, R.Prasaanth and P.Thangaperumal
Download Full-Text

Fuzzy algorithm to Mitigate Risk in the Assignment of Roles in a Wireless Network
A. K. Santra and Nagarajan S
Download Full-Text

Performance Optimization - Necessary Steps for PC Fast Performance
Mohamed Anvar Haither
Download Full-Text

The Integration of Networking and Computerization towards e-Education and e-Learning at the Higher Education and Research Institutions of Pakistan
Dost Muhammad Khan, Najia Saher, Faisal Shahzad and Nawaz Mohamudally
Download Full-Text

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols
Qazi Javed Ahmed, Mirza Aamir Mehmood and Abdul Qudoos
Download Full-Text

Authentication Algorithm for Intrusion Detection in Wireless Networks
A. K. Santra and Nagarajan S
Download Full-Text

Bearing Faults Classification Using THH and Neural Network
Aida Kabla and Karim Mokrani
Download Full-Text

Social Engineering:A Partial Technical attack
P. S. Maan and Manish Sharma
Download Full-Text

Optimization of Cellular Resources Evading Intra and Inter Tier Interference in Femto cells Equipped Macro cell Networks
Niraj Shakhakarmi
Download Full-Text

Hardware Software co-simulation for Image Processing Applications
A.C.Suthar, Mohammed Vayada, C.B.Patel and G.R.Kulkarni
Download Full-Text

Fuzzy Watershed Algorithm: An enhanced algorithm for 2D gel electrophoresis image segmentation
Shaheera Rashwan, Amany M. Sarhan, Muhamed Talaat Faheem and Bayumy A.B. Youssef
Download Full-Text

A Neural Network based Path Planning Algorithm for Extinguishing Forest Fires
M.P.Sivaram Kumar and S.Rajasekaran
Download Full-Text

Comparison between a conventional receiver (RC) and conventional receiver with limiting device (RC-LO) for a DS-OCDMA link using OOC codes
Boudaoud Radhwane and Chikh-Bled Mohamed
Download Full-Text

Advanced SWOT Analysis of E-Commerce
Muhammad Awais and Tanzila Samin
Download Full-Text

A Reliable multicast routing approach for VANET
Ravendra Singh, Rajesh Babu and Indrani Chatterjee
Download Full-Text

A Comprehensive Analysis of Wireless Mobile Based Tele-Monitoring System for Myocardial Malfunctioning
S.Palanivel Rajan, Dr.R.Sukanesh, A.Ramprasad, M.Jeyakumar and G.Shanmuga Raja
Download Full-Text

Modelling Virus Propagation in P2P Networks
Muhammad Faheem Rasheed
Download Full-Text

Cryptography and State-of-the-art Techniques
Mohiuddin Ahmed, T. M. Shahriar Sazzad and Md. Elias Mollah
Download Full-Text

Numerical Approach For Local Bifurcation Analysis of Nonlinear Physical System
Abdelhak Chikhaoui, Tayeb Benouaz and Fatiha Lassouani
Download Full-Text

Encryption and Decryption of Digital Image Using Color Signal
Gamil R. S. Qaid and S.N. Talbar
Download Full-Text

SMS Spam Filtering Technique Based on Artificial Immune System
Tarek M Mahmoud and Ahmed M Mahfouz
Download Full-Text

Improving Regression Testing through Modified Ant Colony Algorithm on a Dependency Injected Test Pattern
G.Keerthi Lakshmi and K.Vivekanandan
Download Full-Text

Designing the Mode solving of the photonic crystal fiber via BPM and Exploring the Single-Mode Properties
Mohammed Debbal and Mohamed Chikh-Bled
Download Full-Text

IPv6 Tunneling Over IPV4
A.Sankara Narayanan, M.Syed Khaja Mohideen and M.Chithik Raja
Download Full-Text

Intelligent versus Malicious Agent: A Comparative Study
Dost Muhammad Khan and Nawaz Mohamudally
Download Full-Text

3D Mesh Streaming and Rendering - An approach based on Predictive Modeling
V.Vani, R.Pradeep Kumar and Mohan.S
Download Full-Text

Implementation of the OFDM Physical Layer Using FPGA
M.A. Mohamed, A.S. Samarah and M.I. Fath Allah
Download Full-Text

A Novel Approach for Inflation Analysis Using Hidden Markov Model
Bushra Hossain, Mohiuddin Ahmed and Md. Fazle Rabbi
Download Full-Text

Compact Tree for Associative Classification of Data Stream Mining
K.Prasanna Lakshmi and C. R. K. Reddy
Download Full-Text

IJCSI Volume 9, Issue 2, No 1, March 2012

Download Full-Text

IJCSI Volume 9, Issue 2, No 2, March 2012

Download Full-Text

IJCSI Volume 9, Issue 2, No 3, March 2012

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Email: info@ijcsi.org

More contact details »