IJCSI Open Access Publications
IJCSI Thesis Publications IJCSI Conference Special Issues Search Publications, Authors, More...
IJCSI Volume 10, Issue 3, May 2013
Mohamed A. El-Sayed
Download Full-Text
Application of Modified Gravitational Search Algorithm to Solve the Problem of Teaching Hidden Markov Model
Ali Asghar Rahmani Hosseinabadi, Mohammadreza Ramzannezhad Ghaleh and SeyedEsmaeil Hashem
Download Full-Text
Designing an intelligent system for the automatic distribution of narcotic drugs
Samaneh Haji Mohammad Bagher, Mehdi Amini, Javad Aryatabar and Mahmoud Keimasi Salkhor
Download Full-Text
Clustering and routing wireless sensor network based on the parameters of distance, density, energy and traffic With the help of fuzzy logic
Seyed Esmaeil Hashemi, Homayun Motameni, Mohammadreza Ramzannezhad Ghaleh and Shahrbano Esmaeili
Download Full-Text
Mobile SMS based Self-Medication Support System for Health-care
Malik M. Saad Missen, Tareef Ali Khan, Hina Asmat, Nadeem Salamat and Nadeem Akhtar
Download Full-Text
Using Data Mining for Life Insurance Network Optimization
Brunela Karamani, Esteriana Haskasa and Shkelqim Kuka
Download Full-Text
One Method for Via Equivalent Circuit Extraction Based on Structural Segmentation
Yuling Shang, Chunquan Li and Huaqing Xiong
Download Full-Text
A Dichotomy Approach for Ontology Mapping
Zhi Huilai, Huo Zhanqiang and Xu Bin
Download Full-Text
Survey on Content Based Image Retreival System and Gap Analysis for Visual Art Image Retreival System
Poornima Y and P.S. Hiremath
Download Full-Text
VMIMO scheme for Machine-to-Machine on Cellular Network
Wu Xianfeng, Wang Yinfeng, Liu Zhijun, Li Huazhong and Ren Xianyi
Download Full-Text
Design and Realization of the Xml Parser based on Parsing Approach of Delaying Extension and Reducing Redundancy
Xiaoxia Sun, Hui Zhao and Wenjun Meng
Download Full-Text
Emotional BCI Control of a Smart Wheelchair
Anas Fattouh, Odile Horn and Guy Bourhis
Download Full-Text
Risk Analysis and Assessment by Multicriteria Approach Based in RO-RO Port Terminal - Case Study
Charif Mabrouki, Adil Bellabdaoui and Ahmed Mousrij
Download Full-Text
A Model of Image Denoising Based on the Fusion ofAnisotropic Diffusion and Total Variation Models
Ali Abdullah Yahya
Download Full-Text
A 3D Simulation Method of Foundation Pit Excavation Based on Vector Graphics
Mu Huang and Xianyong Han
Download Full-Text
Intelligent City Traffic Management and Public Transportation System
S.A.Mulay, C.S.Dhekne, R.M.Bapat, T.U.Budukh and S.D.Gadgil
Download Full-Text
A Content Based Classification of Spam Mails with Fuzzy Word Ranking
G.Santhi, S. Maria Wenisch and P. Sengutuvan
Download Full-Text
Secure Routing Schema for Manet with Probabilistic Node to Node forwarding
Sumati Ramakrishna Gowda and P.S Hiremath
Download Full-Text
Improved Approach for Exact Pattern Matching
Iftikhar Hussain, Samina Kausar, Liaqat Hussain and Muhammad Asif Khan
Download Full-Text
A Framework for an Automatic Generation of Neural Networks
Belal Al-Khateeb and Maha Mahmood
Download Full-Text
A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map
Jianjiang Cui, Siyuan Li and Dingyu Xue
Download Full-Text
Meta-Modeling Cloud Computing Architecture in Distance Learning
Kebande Rigworo Victor, Kenneth Otula Sigar and Odongo George Yogo
Download Full-Text
A Stoppable clock based Approach for Low Power Network Interface Design in a Network on Chip
Brahim Attia, Wissem Chouchenne, Abdelkrim Zitouni and Rached Tourki
Download Full-Text
A New Approach for Location based Tracking
Shaveta Bhatia
Download Full-Text
Estimation of Reliability Allocation on Components Using a Dynamic Programming
Srinivasa Rao.Sabbineni and Rajasekhararao
Download Full-Text
Internet Usage by Faculty in Saudi Higher Education
Amany Al-Shawi, and Areej Alwabil
Download Full-Text
Scalable and Highly Secured Image Steganography Based on Hopfield Chaotic Neural Network and Wavelet Transforms
B.Geetha Vani and E. V. Prasad
Download Full-Text
A preliminary study of the causality of Freezing of Gait for Parkinson\'s disease patients: Bayesian Belief Network approach
Ali Saad, Iyad Zaarour, Abbas Zeinedine, Mohammad Ayache, François Guerin and Dimitri Lefebvre
Download Full-Text
Privacy Preserving Data Mining: Case of Association Rules
Sarra Gacem, Djamila Mokeddem and Hafida Belbachir
Download Full-Text
Capacity Crunch: Can MoSoNets Offload Data Solve This
Usha R and Annapurna P Patil
Download Full-Text
Simulation of the Radar Ground Clutter Based on DEM
Lishasha
Download Full-Text
A Unified Framework for Information Extraction from Newspaper Images
Jitesh Kumar and Sanjay Kumar Dubey
Download Full-Text
Multi-objective Genetic Algorithm Based Selective Neural Networks Ensemble for Concentration Estimation of Indoor Air Pollutants Using Electronic Nose
Chaibou Kadri, Fengchun Tian, Lei Zhang, Xiongwei Peng and Xin Yin
Download Full-Text
Detection Of Structural Damages In Bridge Based On ZigBee Networks Using Sensors
R.Vinodini, S.Nalini and D.Muthumurugesan
Download Full-Text
Color Reproduction of Outdoor LED Displays with Compensation for Ambient Lighting Conditions
Mohamed Abdellatif, Mohamed Y. Elnahas, Hassan Farahat and Ali Rashed
Download Full-Text
Customer Buying Behavior Analysis: A Clustered Closed Frequent Itemsets for Transactional Databases
N.Kavitha and S.Karthikeyan
Download Full-Text
Toward a Maturity Model Development Process for Information Systems (MMDePSI)
Mina El Maallam and Abdelaziz Kriouile
Download Full-Text
Computationally Efficient Control System Based on Digital DynamicPulse Frequency Modulation for Microprocessor Implementation
Olimzhon A. Baimuratov, Bekmurza H. Aitchanov, Vladimir V. Nikulin and Zhylduz B. àitzhanova
Download Full-Text
Distributed Software agents for antiphishing
Sarika S and Varghese Paul
Download Full-Text
Cognitive-mapping and contextual pyramid based Digital Elevation Model Registration and its effective storage using fractal based compression
Suma Dawn, Vikas Saxena and Bhudev Sharma
Download Full-Text
A Paradigm Approach of Electronic Libraries in an Intellectual Milieu
Salah Alkhafaji and Mkg Rajev
Download Full-Text
Embedding Hex-Cells into Tree-Hypercube Networks
Awad Ibrahim Qatawneh
Download Full-Text
Artificial Immunity and Features Reduction for effective Breast Cancer Diagnosis and Prognosis
Mafaz Mohsin Al-Anezi, Marwah Jasim Mohammed and Dhufr Sami Hammadi
Download Full-Text
Input-Sensitive Fuzzy Cognitive Maps
Ioannis E. Karagiannis and Peter P. Groumpos
Download Full-Text
English to Bangla Machine Translation System Using Context-Free Grammars
Shibli Syeed Ashrafi, Md. Humayun Kabir, Md. Musfique Anwar and A. K. M. Noman
Download Full-Text
Effects of Black Hole Attack on MANET Using Reactive and Proactive Protocols
Irshad Ullah and Shahzad Anwar
Download Full-Text
Rectifying Reverse Polygonization of Digital Curves for Dominant Point Detection
Hamid Abbasi, Mohammad Olyaee and Hamid Reza Ghafari
Download Full-Text
Learning Style Deriving Approach to Personalize E-Learning Material Resources
Ibrahim Fathy Moawad
Download Full-Text
Estimation of Time Difference of Arrival (TDOA) for the Source Radiates BPSK Signal
Hesham Ibrahim Ahmed, Ping Wei, Imran Memon, Yanshen Du and Wei Xie
Download Full-Text
Bit Position based Qualitative and Quantitative Analysis of DCT and Spatial Domain Stegnography
Sahib Khan, Muhammad Nawaz Khan and Somia Iqbal
Download Full-Text
A Novel Approach for Credit Card Fraud Detection Targeting the Indian Market
Jaba Suman Mishra, Soumyashree Panda and Ashis Kumar Mishra
Download Full-Text
Evaluation and Performance of Reactive Protocols Using Mobility Model
Naveed Anjum and Sohail Abid
Download Full-Text
The Rumor Riding Anonymity Approach for Decentralized Peer to Peer Systems
Farman Ali Mangi, Imran Memon, Deedar Ali Jamro, Muhammad Hammad Memon and Muhammad Abdul Basit
Download Full-Text
On the Crowded Places Multi-Exits Emergency Evacuation Model and Algorithm
Li Dawei, Zhang Xiaoqi and Wang Li
Download Full-Text
Multilevel clustering and association rule mining for learners profiles analysis
Nawal Sael, Abdelaziz Marzak and Hicham Behja
Download Full-Text
Efficient Protection of Palms from RPW Larvaeusing Wireless Sensor Networks
Swarnalatha Srinivas, Harsha K S, Sujatha A and Narendra Kumar G
Download Full-Text
Multi-User-Detection for Multibeam-MIMO Multi-Carrier-Cdma systems with MMSE adaptive algorithm
Mourad Benyarou, Fethi Tarik Bendimerad and Fatima Debbat
Download Full-Text
Aligning organization strategy to information system: The BUSITAME method - Application to University Information System
Karim Doumi
Download Full-Text
A Compact Tapered-Shape Slot UWB Antenna with WLAN Band notch characteristics
Hassan H. El-Tamaly, Maher M. Eltayeb and Deena Abd El Hamid Salem
Download Full-Text
Adaptive Process in a Pervasive System - A Holistic Hybrid Approach
Henry Chika Eleonu and Jane Oruh
Download Full-Text
Stochastic Analysis of Mobile Ad-hoc Networks
Nassiri Khalid, El Hibaoui Abdelaaziz and Hajar Moha
Download Full-Text
A Framework for Mobile Application Design
Abdesselam Redouane
Download Full-Text
Fuzzy Based Skin Detection and Segmentation
Afia Nazir, Laiq Hassan, Alamzeb M. Zai and Rehanullah Khan
Download Full-Text
Digital Watermarking for Image Authentication Based on Combined DCT, DWT and SVD Transformation
Mohammad Ibrahim Khan, Md. Maklachurrahman and Md. Iqbal Hasansarker
Download Full-Text
Grid Security and Trust Management Overview
Slavomír Kavecký
Download Full-Text
Hybrid Approach for Network Intrusion Detection System Using K-Medoid Clustering and Naive Bayes Classification
Deepak Upadhyaya and Shubha Jain
Download Full-Text
Usability Inspection of Web Portals: Results and Insights from Empirical Study
Andrina Granic, Nikola Marangunic and Ivica Mitrovic
Download Full-Text
An Unsupervised Salient Object Extraction Approach using Statistical Method and High Contrast Saliency Map
Akram, Tallha, Duan Qichang and Xu Hongying
Download Full-Text
Performance Evaluation of Noise Estimation Techniques for Blind Source Separation in Non Stationary Noise Environment
Mohini S. Avatade
Download Full-Text
A Repository of Software Requirement Patterns for Online Examination System
Sangeeta Srivastava
Download Full-Text
Time Oriented Database System Using RFID
Nadeem Mahmood, Aqil Burney, Zain Abbas, Abdul Khaliq Bari and Qamar Ul Arifeen
Download Full-Text
Stability of Inter domain Routing Protocol with Regressive Peak Contour
Bhavneet Kaur, Karanjeet Singh Kahlon and Sandeep Sharma
Download Full-Text
Sensitivity Analysis of Cloud under Transient Conditions
Satyanarayana.A, P. Suresh Varma, M.V.Rama Sundari and P Sarada Varma
Download Full-Text
Using rules to enhance evolution of knowledge mapping: Application on Healthcare
Brahami Menaouer
Download Full-Text
Engineering of the Decisional Information System by the reuse of patterns
Aziza Sabri and Laila Kjiri
Download Full-Text
A Highly Integrated Ka Band Front-End Receiver
Ghulam Mehdi, Hu Anyong and Jungang Miao
Download Full-Text
Software Performance Driven Quality Refinement of MINPHIS: An Architectural View
Ishaya Gambo, Rhoda Ikono, Olaronke Iroju, Theresa Omodunbi and Abimbola Soriyan
Download Full-Text
IAX-Based Peer-to-Peer VoIP Architecture
Amor Lazzez, Ouissem Ben Fredj and Thabet Slimani
Download Full-Text
Knee Osteoarthritis Diagnosis Using Support Vector Machine and Probabilistic Neural Network
Ozge Aksehirli, Duygu Aydin, Handan Ankarali and Melek Sezgin
Download Full-Text
Low Power of Ring Oscillator Based on CNTFET
Lobna Imsaddak, Dalenda Ben Issa and Kachouri Abdennaceur
Download Full-Text
The Future Vision for the Design of E-government in Egypt
Mohamed El-Sayed Waheed and Esam Mohamed El Gohary
Download Full-Text
Analysis of a Parallel System with Priority to Repair over Maintenance Subject to Random Shocks
S. K. Chhillar, A.K. Barak and S.C.Malik
Download Full-Text
A New approach for Finger-Print Identification
Attallah Bilal, Hendel Fatiha and Boudjelal Abdelwahhab
Download Full-Text
Time Course of Chromatic Adaptation to Outdoor LED Displays
Mohamed Abdellatif, Mohamed Y. Elnahas, Hassan Farahat and Ali Rashed
Download Full-Text
Selection Criteria for Data Mining Software: A Study
Neeraj Bhargava, Atif Aziz and Rajiv Arya
Download Full-Text
Variance Based Scheduling Algorithm with Relay Selectionand Resource Allocation in Cooperative OFDMANetworks
Basly Maryam, Hedia Kochkar and Ammar Bouallegue
Download Full-Text
Optimizing Risk Management Using Learning Automata
Mohhamad Reza Ahmadi, Babak Anari, Mostafa Gobaye Arani and Zohreh Anari
Download Full-Text
Verification and Validation of MapReduce Program Model for Parallel Support Vector Machine Algorithm on Hadoop Cluster
Kiran M., Amresh Kumar, Saikat Mukherjee and Ravi Prakash G.
Download Full-Text
Extraction of Region of Interest in Compressed Domain
Vaishali Choudhary and Preeti Voditel
Download Full-Text
Text mining approach for WSI in QA systems through relation construction
C. Meenakshi
Download Full-Text
On an XML and OWL Computer Ontology for the Representation of Mammals in DRC
Eugene MBUYI MUKENDI, Krystelle SHEMATSI BWIRA, Bevi MBELU MUTOBA and Franck MANYA TUNDA
Download Full-Text
Design and implementation of a Telco Business Intelligence Solution using eTOM, SID and Business Metrics: focus on Data Mart and Application on Order-To-Payment end to end process
Mounire Benhima, John P. Reilly, Zaineb Naamane, Meriam Kharbat, Mohammed Issam Kabbaj and Oussama Esqalli
Download Full-Text
IJCSI Volume 10, Issue 3, No 1, May 2013
Download Full-Text
IJCSI Volume 10, Issue 3, No 2, May 2013
Download Full-Text