IJCSI Open Access Publications
IJCSI Thesis Publications IJCSI Conference Special Issues Search Publications, Authors, More...
IJCSI Volume 10, Issue 5, September 2013
David A. Johnston, David R. Mcintyre, Francis G. Wolff and Christos A. Papachristou
Download Full-Text
On Performance of Logical-Clustering of Flow-Sensors
Rahim Rahmani, Hasibur Rahman and Theo Kanter
Download Full-Text
Detection of Syntactic Aspect Interaction in UML State Diagrams Using Critical Pair Analysis in Graph Transformation
Zaid Tahat, Tzilla Elrad, Luay Tahat and Nada Almasri
Download Full-Text
The Cerebellum: New Computational Model that Reveals its Primary Function to Calculate Multibody Dynamics Conform to Lagrange-Euler Formulation
Lavdim Kurtaj, Ilir Limani, Vjosa Shatri and Avni Skeja
Download Full-Text
Simulation Techniques and Control Schemes in Electromyography for a Lower Limb and Power Assist Exoskeleton
Ngoc Khoat Nguyen and Thi Mai Phuong Dao
Download Full-Text
Human Aspect in security of M-Commerce services in ICTD: A Siyakhula Living Lab Case Study
Marufu Anesu M.C., Sibanda Khulumani and Scott Mfundo S.
Download Full-Text
Supporting Context-Centric Relations in Heterogeneous Environments
Jamie Walters, Theo Kanter and Rahim Rahmani
Download Full-Text
The impact of indexes on data warehouse performance
El Amin Aoulad Abdelouarit, Mohamed El Merouani and Abdellatif Medouri
Download Full-Text
Extract an Essential Skeleton of a Character as a Graph from a Character Image
Kazuhisa Fujita
Download Full-Text
Link Quality and MAC-Overhead aware Predictive Preemptive Routing Protocol for Mobile Ad hoc Network
Ali Cherif Moussa and Feraoun Mohamed Kamel
Download Full-Text
Emulating Trust Zone in Android Emulator with Secure Channeling
Arun Muthu, Rahim Rahmani and Dinakaran Rajaram
Download Full-Text
Semi-automatic Data Warehouse Design methodologies: A Survey
Wafa Tebourski, Wahiba Ben Abdessalem Karâa and Henda Ben Ghezala
Download Full-Text
A speech recognition based approach for development in C++
Mubbashir Ayub and Muhammad Asjad Saleem
Download Full-Text
Object Recognition using Particle Swarm Optimization and Genetic Algorithm
Mahmood Ul Hassan, Muhammad Sarfraz, Abdelrahman Osman and Muteb Alruwaili
Download Full-Text
Handwriting and Hand Drawing Velocity Modeling by Superposing Beta Impulses and Continuous Training Component
Houcine Boubaker, Aymen Chaabouni, Najiba Tagougui, Monji Kherallah and Adel M. Alimi
Download Full-Text
Adapting IS Strategic Planning methodology to define Mobile Strategy
Mouhsine Lakhdissi, Rachid El Habi, Alami Semma and Bouchaib Bounabat
Download Full-Text
Multiple Skew Estimation In Multilingual Handwritten Documents
D. S. Guru, M Ravikumar and S. Manjunath
Download Full-Text
A conceptual framework for the Adoption of Social Network Technologies (SNTs) in Teaching: Case of Ghana
John Kingsley Arthur, Adu-Manu Kofi Sarpong and Clement Yeboah
Download Full-Text
Algorithms for Data Compression in Wireless Computing Systems
Upasana Mahajan and Prashanth C.S.R
Download Full-Text
A Generalized symmetric single step method for solving interval linear systems
Hassan Badry Mohamed Ahmed El-Owny
Download Full-Text
Modified Pattern Extraction Algorithm for Efficient Semantic Similarity Measures between Words
Pushpa C N, Thriveni J, Venugopal K R and L M Patnaik
Download Full-Text
Artificial Neural Networks in Medical Images for Diagnosis Heart Valve Diseases
Atta Elalfi, Mohamed Eisa and Hosnia Ahmed
Download Full-Text
Plastic Surgery Face Recognition: A comparative Study of Performance
Rehab M.Ibrahim, F.E.Z Abou-Chadi and A. S. Samra
Download Full-Text
Proposed Software Testing Using Intelligent techniques (Intelligent Water Drop (IWD) and Ant Colony Optimization Algorithm (ACO))
Baraa
Download Full-Text
Cluster Head Recovery Mechanism for Hierarchical Protocols
Nahla S. Abd El-Azeem, Sherine M. Abd El-Kader and Mohamed M. Zahra
Download Full-Text
ERP and Customization: Case Study of Logistics Processes Integration in a Telecommunications Company
Mustapha El Masbahi and Alami Semma
Download Full-Text
Human Eye Tracking Using Particle Filters
Elham Ghasemi-Dehkordi, Mahmoud Mahlouji and Hossein Ebrahimpour- Komleh
Download Full-Text
Fast Color Edge Detection Algorithm Based on Similarity Relation Matrix
Hossam Eldin Ibrahim Ali
Download Full-Text
In-orbit Calibration Method Based on Empirical Model for Non-collinear TDI CCD Camera
Shujuan Zhang and Shuying Jin
Download Full-Text
Neighborhood Crossover Operator - A new operator in Gravitational Search Algorithm
Zhongping Shang
Download Full-Text
A 3D ear recognition method based on auricle structural feature
Kai Wang and Zhi-Chun Mu
Download Full-Text
Probabilistic Latent Semantic Analysis for Unsupervised Word Sense Disambiguation
Gaurav Singh Tomar, Manmeet Singh, Shishir Rai, Atul Kumar, Ratna Sanyal and Sudip Sanyal
Download Full-Text
Frequency-Domain Modeling and Simulation of Coupled Lossy Multiconductor Transmission Lines
Youssef Mejdoub, Hicham Rouijaa, Mohamed Saih and Abdelilah Ghammaz
Download Full-Text
The Academic use of Social Networks Among University Students in Jordan
Atika Al Doghmi, Hasan Al-Shalabi, Jwaifell Mustafa Odeh, Swidan Andraws, Arafat Awajan and Adnan I. Alrabea
Download Full-Text
Building web crawler based on bee swarm intelligent algorithm
Muhamed Ibrahim Shujaa and Ahmed Bahaa Ulddin
Download Full-Text
Quality Issues in Infrastructure as a Service
Vb Singh and Nikita Yadav
Download Full-Text
Cylindrical heat exchanger trajectory planning and tracking using orthogonal functions
Hajer Sayem, Naceur Benhadj Braiek and Hassan Hammmouri
Download Full-Text
Security Issues and Challenges - Cloud Computing
Daniyal M. Alghazzawi and Syed Hamid Hasan
Download Full-Text
Comparative Study Based on Open Source Content Management Systems Mambo and his Fork - Joomla and Elxis
Dejan Viduka, Igor Lavrnic and Ana Basic
Download Full-Text
Security in Electronic Business
Abdullah Saad Al-Malaise Al-Ghamdi
Download Full-Text
An Efficient and Secure Handover Protocol for IEEE 802.16m Networks
Heba K. Aslan
Download Full-Text
Design of a Code Using System Theoretic Approach
V. C. Kotak and B. K. Lande
Download Full-Text
A Cipher based on Multiple Circular Arrays
Pushpa R. Suri and Sukhvinder Singh Deora
Download Full-Text
Reducing the Computational Cost in Multi-objective Evolutionary Algorithms by Filtering Worthless Individuals
Zahra Pourbahman and Ali Hamzeh
Download Full-Text
IT-infrastructure of university based on cloud computing
Zhuldyz B. Kalpeyeva and Akkyz K. Mustafina
Download Full-Text
An Effective Genetic Algorithm for Job Shop Scheduling with Fuzzy Degree of Satisfaction
Akeela M.Al-Atroshi, Sama T. Azez and Baydaa S.Bhnam
Download Full-Text
Compression of an AVI Video File Using Fractal System
Nevart A. Yousif and Faten H. Al-Qadhee
Download Full-Text
Hybrid Genetic Algorithm and Local Search for Energy Demand Prediction Model
Wahab Musa, Ku Ruhana Ku-Mahamud and Azman Yasin
Download Full-Text
Multi-data embedding in to RGB Image with using SVD method
El Gorfte Zineb, Noureddine Cherkaoui Eddeqaqi, Abdenbi Bouzid and Ahmad.Roukh
Download Full-Text
Subjectivity Classification using Machine Learning Techniques for Mining Feature-Opinion Pairs from Web Opinion Sources
Ahmad Kamal
Download Full-Text
A Novel Steganography with Preserving Statistical Properties
Thamir Rashed Saeed
Download Full-Text
Propose HMNIDS Hybrid Multilevel Network Intrusion Detection System
Saad K. Majeed, Soukaena H. Hashem and Ekhlas K. Gbashi
Download Full-Text
Control Theory based Approach for the Improvement of Integrated Business Process Interoperability
Abderrahim Taoudi, Bouchaib Bounabat and Badr Elmir
Download Full-Text
Service Orchestration Algorithm for Web Services: Evaluation and Analysis
Yousra Chtouki, Hamid Harroud, Mohammed Khalidi Idrissi and Samir Bennani
Download Full-Text
Efficient Computation of Resonant Frequency of Rectangular Microstrip Antenna using a Neural Network Model with Two Stage Training
Guru Pyari Jangid, Gur Mauj Saran Srivastava and Ashok Jangid
Download Full-Text
A Model to Find Outliers in Mixed-Attribute Data sets using Mixed Attribute Outlier Factor
M. Krishna Murthy, A. Govardhan and Lakshmi Sreenivasareddy D
Download Full-Text
Modeling Methodology for NoC : MM4NoC
Sefrioui Nassim, Berrahou Aissam, Diouri Ouafaa and Eleuldj Mohsine
Download Full-Text
Using Discrete Wavelet Transformation To Enhance Underwater Image
Ali A. Yassin, Rana M. Ghadban, Salah F. Saleh and Hikmat Z. Neima
Download Full-Text
Importance of Software Documentation
Noela Jemutai Kipyegen and William P. K. Korir
Download Full-Text
Enhanced Technique for Data Cleaning in Text File
Arup Kumar Bhattacharjee, Atanu Mallick, Arnab Dey and Sananda Bandyopadhyay
Download Full-Text
A Symbol Based Graphical Schema Resistant to Peeping Attack
T.Srinivasa Ravi Kiran, K.V.Samabasiva Rao, M.Kameswara Rao and A.Srisaila
Download Full-Text
New Approach to optimize the time of Association Rules Extraction
Thabet Slimani
Download Full-Text
A Multimodal Approach for Face and Ear Biometric System
Gandhimathi Amirthalingam and G. Radhamani
Download Full-Text
A Vision Based Approach for Web Data Extraction Using Enhanced Cocitation Algorithm
R.Vijay and K.Prasadh
Download Full-Text
Adaptive Neuro-Fuzzy Inference System (ANFIS) Based Software Evaluation
Khyati Mewada, Amit Sinhal and Bhupendra Verma
Download Full-Text
A New Method to Solve Multi-Objective Non-Linear Fractional Programming Problems
Ramesh Babu.R, Palanisamy.V and Divyaa Devi.S
Download Full-Text
Metric Base Analysis and Modeling Experiments of Routing Protocols in MANETs and VANETs Wireless Network using Real Time Scenarios
Syed Fakhar Abbas, Ghulam Yasin, Muhammad Akram Mujahid and Saqib Rasool Chaudhry
Download Full-Text
Handwritten Arabic Digits Recognition Using Bezier Curves
Aissa Kerkour El Miad and Azzeddine Mazroui
Download Full-Text
Mapping Wireless Sensor Network Applications Requirements to Existing Operating Systems
Tarek Mohamed Ibrahim Salem and Sherine Mohamed Abd El-Kader
Download Full-Text
Authentication System of Banking Transaction by Fingerprinting- Neural Network Approach
Eugène Mbuyi Mukendi and Jean Didier Batubenga Muamba
Download Full-Text
Challenges and Opportunities for the Implementation of Social Network Technologies (SNTs) in Teaching in Universities in Ghana
Adu-Manu Kofi Sarpong, Arthur John Kingsley and Clement Yeboah
Download Full-Text
Customer Churn Prediction in Telecommunication- A Decade Review and Classification
Nabgha Hashmi
Download Full-Text
BER analysis of 3x3 Spatial Multiplexing under AWGN and Rician channels for different modulation techniques
Anuj Vadhera and Lavish Kansal
Download Full-Text
A proposed visualization tool for multilayer conceptual representation
Ahmed Sharaf Eldin, Adel Elsayed, Mona M. Nasr and Mostafa Thabet Mohamed Thabet
Download Full-Text
Network research based on the fuzzy comprehensive evaluation model of natural language
Zhi-Hong Ma, Xun-Song He and Hao-Xuan Ding
Download Full-Text
Preliminary Identification of Performance-Oriented Competences for Undergraduates Entrepreneurial Education via Information Communication Technology (ICT) for Wealth Creation in Enugu State, Nigeria
Michael Eskay, Ezegbe Nkiruka, Anyanwu Joy and Ikwumelu Sn
Download Full-Text
Problem of Universal Basic Education in Nigeria and the Role of Information Communication Technology in Enhancing its Quality, Sociological and Counseling Perspective
Anyanwu Joy, Michael Eskay, Ezegbe Nkiru and Ikwumelu Sn
Download Full-Text
IJCSI Volume 10, Issue 5, No 1, September 2013
Download Full-Text
IJCSI Volume 10, Issue 5, No 2, September 2013
Download Full-Text