Tuesday 23rd of April 2024                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 10, Issue 2, March 2013
A New IPFM Based Model For Artifitial Generating Of HRV With Random Input
Gholamreza Attarodi, Nader Jafarnia Dabanloo, Zahra Abbasvandi and Nazanin Hemmati
Download Full-Text

The Development of Android Software and Kernel Files by Using Example of Wi-Fi Adaptor
Yi-Jen Mon
Download Full-Text

Analyzing the Benefits of Blog for Enhancing Knowledge Management among Bloggers
Pinkie Anggia and Dana Indra Sensuse
Download Full-Text

Hybrid Swarm Intelligence Technique for CBIR Systems
Anil Kumar Mishra, Madhabananda Das and T.C.Panda
Download Full-Text

Fuzzy ideals of Dual QS-algebras
Samy M. Mostafa, Mokhtar A.Abdel Naby and Areej T. Hameed
Download Full-Text

QR Code Application for Water Meter Recorder Based on Windows Mobile Platform
I Made Dwiki Wirya Suharta, I Ketut Gede Darma Putra and Putu Wira Buana
Download Full-Text

Efficient Algorithm for Near Duplicate Documents Detection
Gaudence Uwamahoro and
Download Full-Text

Human-Computer Interactive Fast Edge Matching of High Resolution Orthophotos
Jun Liu, Huaxing Bi, Jinzhao Zhu, Peilin Zhu, Xinjie Wang and Guohua Li
Download Full-Text

Intelligent Word-Based Spam Filter Detection Using Multi-Neural Networks
Ann Nosseir, Khaled Nagati and Islam Taj-Eddin
Download Full-Text

Influence of Project Duration constraint on efforts in Constructive Cost Model and optimizing the efforts to obtain accuracy
Brajesh Kumar Singh and A. K. Misra
Download Full-Text

The Index System Construction of Province Initial Water Rights Allocation System Based on the Algorithm of Attribute Reduction
Peng Jia, Fengping Wu and Lina Zhang
Download Full-Text

Knowledge Management: Workshop APO Framework (Case Study: Ministry of Religious Affairs of Republic Indonesia)
Dana Indra Sensuse and Siti Rohajawati
Download Full-Text

Awareness-Usability Issues in IT-initiatives for difficult geographies
Kamal Kumar Ghanshala and Durgesh Pant
Download Full-Text

3D-Simulation and Experiment of Gas Penetration Length in Gas-Assisted Injection Molding
Tie Geng
Download Full-Text

Cross Layer Optimized Transmission for an Energy Efficient Wireless Image Sensor Network
Alice Abraham and Narendra Kumar G
Download Full-Text

System dynamics simulation model for the electronic commerce credit risk mechanism research
Xiao Qiang, Liao Hui and Qian Xiao-Dong
Download Full-Text

A Digital Archives-Based Active Service Framework for Scientific Workflow System
Wang Rui
Download Full-Text

Energy Aware Adaptive Image Transmission Scheme with Data Authentication in Wireless Sensor Networks
Alice Abraham and Narendra Kumar G
Download Full-Text

A novel Stereo Matching Method based on Rank Transformation
Wenming Zhang
Download Full-Text

The Exploration of the Construction of Athletes Physical Function Digital Archives
Zhigang Gong, Hongtao Liu and Xiaoben Ma
Download Full-Text

A Robust Digital Watermarking Technique using DWT-DCT and Statics blocks
Idrissi Nadia, Ahmed Roukhe, Lhoussaine Masmoudi, Mohamed Radouane and Rochdi Messoussi
Download Full-Text

Swarm Optimization Algorithm for Privacy Preserving in Data Mining
Sridhar Mandapati, Raveendra Babu Bhogapathi and M.V.P.Chandra Sekhara Rao
Download Full-Text

A Comparison Between Present and Future Models Of Software Engineering
Harikrishnan Natarajan, Ram Kumar Somasundaram and Kalpana Lakshmi
Download Full-Text

A SMS Based Security Providing for an Email ID by Creating an Email Server
R. Kaviarasi, S. Anitha and K. Suganya
Download Full-Text

Combining Web SCADA Software and Matlab-Simulink for Studying Wind-PV-Battery Power Systems
Aryuanto Soetedjo, Abraham Lomi2, Yusuf Ismail Nakhoda3 and Yohan Pramono Tosadu
Download Full-Text

Residual Stress Calculation of Swage Autofrettage Gun Barrel
Liezhen Chang, Yutian Pan and Xinmou Ma
Download Full-Text

A Study On Data Privacy, Protection and Sanitization Practices During Disk Disposal By Indian Educational Institutes
Ramakrishnan Raman and Dhanya Pramod
Download Full-Text

Larg Band Ridged Waveguide Polarizer as Feed for Telecommunications Satellites Antennas
Bousalah Fayza
Download Full-Text

Agent Based Secured Online Hotel Booking System
R.Jaya Subalakshmi, N.Ch.S.N. Iyengar, Sougata Khatua and Haleema
Download Full-Text

On Providing Automated Support to Students Based on Their Personal Preferences
Sylvia Encheva
Download Full-Text

Categorizing ancient documents
Nizar Zaghden, Rémy Mullot and Mohamed Adel Alimi
Download Full-Text

The Jordanian Mineral Resources Geographical Information System: A First Step towards a Computerized Exploration of the Jordanian Mineral
Mohammed Otair
Download Full-Text

Agent Based Approach for Searching Document in Semantic Web
Teguh Susyanto
Download Full-Text

Electronic Customer Relationship Management Usability Model: Improving the Usability of eCRM Systems in Jordan
Osama K Harfoushi
Download Full-Text

Suggested method for Estimating Maximum Capacity of images for different intensities
Thekra Abbas, Zou Beiji and Ongalo P.N.Fedha
Download Full-Text

Framework Model for Database Replication within the Availability Zones
Ala’a Atallah A. Al-Mughrabi and Hussein H. Owaied
Download Full-Text

Decision Making Processes Supported by Set Theoretical Approach
Sylvia Encheva
Download Full-Text

New DTN Routing Algorithm
Mohammad Boudguig and Abdelmounaïm Abdali
Download Full-Text

Sliding Mode ANFIS-Based MIMO Fuzzy Neural Network Control for Robotic Systems
Yi-Jen Mon
Download Full-Text

Enterprise-Wide Logging Through Software Life-Cycle
Sylvia Encheva and
Download Full-Text

Conceptual Understanding of Computer Program Execution: Application to C++
Sabah Al-Fedaghi
Download Full-Text

Evaluating Effects of Chatteing on the Sliding mode System
Ali Amer Al_rawi
Download Full-Text

An Efficient Trojan Horse Classification (ETC)
Madihah Mohd Saudi, Areej Mustafa Ahmad, Bachok M Taib and Zul Hilmi Abdullah
Download Full-Text

An Adaptive Fractal Image Compression
Taha Mohammed Hasan and Xinagqian Wu
Download Full-Text

Anti-surge Control Technologies of LargeCsized Chinese Gas Compression Pump
Liu Xiaoyang
Download Full-Text

MAS for video objects segmentation and tracking based on active contours and SURF descriptor
Mohamed Chakroun, Ali Wali and Adel M. Alimi
Download Full-Text

Optimization and Application of initial Value of Non-equidistant New Information GM(1,1) Model
Youxin Luo
Download Full-Text

An Effective Model for Evaluating Website Quality Considering Customer Satisfaction and Loyalty: Evidence of Airline Websites
Naeimeh Elkhani, Sheida Soltani and Aryati Bakri
Download Full-Text

An Approach of Chunk Alignment for French-Vietnamese Bilingual Corpora
Ngoc Tan Le, Ngoc Tien Le and Dien Dinh
Download Full-Text

Improvement and Application of Initial Value of Non-equidistant GM(1,1) Model
Youxin Luo
Download Full-Text

An Improved AES Masking Method Smartcard Implementation for Resisting DPA Attacks
Xiaoan Zhou, Juan Peng and Liping Guo
Download Full-Text

Analysis of MRI Images of Rheumatoid Arthritis through Morphological Image Processing Techniques
Arpita Mittal and Sanjay Kumar Dubey
Download Full-Text

Non-equidistant GRM(1,1) Generated by Accumulated Generating Operation of Reciprocal Number and its Application
Youxin Luo, and
Download Full-Text

Application of Fuzzy Control in Central Air-conditioning Terminal Units Energy-saving
Yanqiu Zhao, Yingli Lv, Yong Gu and Shucheng Liu
Download Full-Text

Impact of Route Selection Metrics on the Performance of DSR Protocol for MANETs
Ragb O. M. Saleh, Md Yazid Mohd Saman and M Nordin A Rahman
Download Full-Text

Based on RFID Products Information Tracing Anti-counterfeiting Strategy Design and Application
Jiao Yabing
Download Full-Text

Neural Network Ensembles for Online Gas Concentration Estimation Using an Electronic Nose
Chaibou Kadri, Fengchun Tian, Lei Zhang, Guojun Li, Lijun Dang and Guorui Li
Download Full-Text

Person Name Recognition for Uyghur Using Conditional Random Fields
Muhtar Arkin, Abdurahim Mahmut and Askar Hamdulla
Download Full-Text

Improved delay-range-dependent stability criteria for systems with interval time-varying delay and nonlinear perturbations
Hui-Junjun, Zhang-Hexin, Megn-Fei and Zhou-Xin
Download Full-Text

FEA-OLSR: An Adaptive Energy Aware Routing Protocol for Mobile Ad-hoc Networks Using Zero-Order Sugeno Fuzzy System
Saloua Chettibi and Salim Chikhi
Download Full-Text

Supply Chain Coordination Research under a Fuzzy Decision Environment
Shengju Sang
Download Full-Text

Location Sharing Without Central Server
Alla Edein Qoussini, Yousef Daradkeh and Dmitry Namiot
Download Full-Text

Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment
Priyanka Negi, Anupama Mishra and B. B. Gupta
Download Full-Text

The Echelon Pattern and Its Key Technologies of Urban Circle Solid Waste Disposal
Xuhui Li, Gangyan Li, Guowen Sun, Huiping Shi and Baoan Yang
Download Full-Text

Managing Vulnerabilities in a Networked System
Muhammad Ali, Jamshed Mustafa and Mahera Erum Baloch
Download Full-Text

Cognitive Sensor Techniques to Face Security Challenges in CWSN
Isra Sitan Mohammed Al-Qasrawi
Download Full-Text

A Fitting Approach to Mend Defective Urban Traffic Flow Information Based on SARBF Neural Networks
Ning Chen, Weibing Weng and Xing Xu
Download Full-Text

A Proposed SOAP Model Against Wrapping Attacks and Insecure Conversation
Rajni Mohana and Deepak Dahiya
Download Full-Text

Communication and Control in Home Gateway
Shuanji Zhang and Minzhe Zhang
Download Full-Text

Application Analysis of Mobile Block Section Based on ZigBee
Xuebo-Zi
Download Full-Text

Modeling of a Microstrip Low- Pass Filter by the Scattering- Bond Graph Formalism
Sameh Khmailia, Hichem Taghouti and Abdelkader Mami
Download Full-Text

Predicting the Severity of Breast Masses with Data Mining Methods
Sahar A. Mokhtar and Alaa M. Elsayad
Download Full-Text

A Tool for Data Warehouse Multidimensional Schema Design using Ontology
M.Thenmozhi and K.Vivekanandan
Download Full-Text

Predicting Customer Churn in Mobile Telephony Industry Using Probabilistic Classifiers in Data Mining
Clement Kirui, Li Hong, Wilson Cheruiyot and Hillary Kirui
Download Full-Text

Fusion of Physical Extraction Parameter Model Optical and SAR Data for Flood Detection
Wawan Setiawan and Wiweka
Download Full-Text

Object Identification Using Raster Models:A Comparative Analysis
Akbar Khan and L.Pratap Reddy
Download Full-Text

Design and Construct of Coefficient of Friction (COF) Machine utilizing ISO 13287: 2006 And Analyzingto Find Better COF of Shoes Sole Material
Chalermkiet Srisila
Download Full-Text

Using Virtual Learning Environment (VLE) as an Input to Development Visual Pereception Skills (VPS)
Ahmed Ragheb Mohamed Salman
Download Full-Text

A Search Algorithm Oriented to XML Keywords
Xingyuan Li
Download Full-Text

Face Recognition using Image Gradient Regression Approach
Shafiqul Abidin, Ujjawal Jain, Saurabh Gupta and Dr. S. C. Gupta
Download Full-Text

Differential Evolution with Tournament-based Mutation Operators
Chen Qiu, Miaomiao Liu and Wenyin Gong
Download Full-Text

Using fractal dimensions for determination of porosity of robot laser-hardened specimens
Matej Babiä, Peter Panjan, Peter Kokol, Milan Zorman, Igor Beliä and Timotej Verbovå¡ek
Download Full-Text

Application of equivalent permeability in numerical simulation of horizontal wells in bottom water reservoirs
Li-Feng Li, Bing-Bing Wang and Xiang-An Yue
Download Full-Text

DOA Estimation of Multi-path Signals Using Transient Smoothing Method
Fugang Liu and Ming Diao
Download Full-Text

An Improved Cost-Efficient Thinning Algorithm for Digital Image
Liang Jia and Zhenjie Hou
Download Full-Text

Infrastructure Independent Mobility Support for Multiple Mobile Routers Multihomed NEMO Networks
Zohra Slimane, Abdelhafid Abdelmalek and Mohamed Feham
Download Full-Text

Document Segmentation And Region Classification Using Multilayer Perceptron
Priyadharshini N and Vijaya Ms
Download Full-Text

Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing
Lilian Sing\'oei and Jiayang Wang
Download Full-Text

Distributed and clustering techniques for Multiprocessor Systems
Elsayed A. Sallam
Download Full-Text

Face recognition approach using Gabor Wavelets, PCA and SVM
Faten Bellakhdhar, Kais Loukil and Mohamed Abid
Download Full-Text

The Implementation of Univariate and Bivariate B-Spline Interpolation Method in Continuous
Dian Pratiwi
Download Full-Text

Dynamic Matrices from Hardware Fingerprint and Its Application in Software Copyright Protection
Ning Huang
Download Full-Text

Revealing the Criterion on Botnet Detection Technique
Raihana Syahirah Abdullah, Mohd Faizal Abdollah, Zul Azri Muhamad Noh, Mohd Zaki Mas\'ud, Siti Rahayu Selamat and Robiah Yusof
Download Full-Text

Design of a Radioactive Source Sampler Based on CPAC
Bin Yang and Zhenyu Wang
Download Full-Text

Enhanced Diffusion Encryption for Video Transmission over Mobile WiMax Networks
Mohamed Abdel-Azim Mohamed, Fayez Wanis Zaki and Awny Mohsen El-Mohandes
Download Full-Text

Spectral Characterization of Stride-to-Stride Variability in Children Gait Motion
Hedi Khammari and Azeemsha Thacham
Download Full-Text

Android-based Java Programming for Mobile Phone LED Control
Yi-Jen Mon
Download Full-Text

Enhanced LSB Image Steganography Method By Using Knight Tour Algorithm, Vigenere Encryption and LZW Compression
Morteza Bashardoost, Ghazali Bin Sulong and Parisa Gerami
Download Full-Text

Fuzzy Logic Method for Evaluation of Difficulty Level of Exam and Student Graduation
Rusmiari
Download Full-Text

Effect of the MMF Curvature in the System Capacity of an Optical MIMO Channel Using MGDM Technique
Faîçal Baklouti and Rabah Attia
Download Full-Text

EOCTC: Energy Efficient Ordered Congestion Tolerant and Control Routing Topology for Mobile Ad hoc Networks
T.Suryaprakash Reddy and Dr P.Chenna Reddy
Download Full-Text

A Microcontroller Based Digital Thermometer with Timer (Digithermo)
Abayomi-Alli A., Etuk E. J., Ezomo P. I., Izilein F. A., Akingboye A.Y. and Erameh K. B.
Download Full-Text

Application of optimal control theory to an SEIR model with immigration of infectives
Elhia Mohamed
Download Full-Text

Automatic Detection of Exudates in Retinal Images
Nidhal K. El Abbadi and Enas Hamood Al Saadi
Download Full-Text

Profit-Aware DVFS Enabled Resource Management of IaaS Cloud
Shahzad Ali
Download Full-Text

Research on Information Retrieval Based on Semantic Similarity Related Technology
Yangxin Yu, Yangxin Yu, Yizhou Zhang and Yizhou Zhang
Download Full-Text

Image Compression using Phase Diversity of Synthesis Filters
Abdul Nadeem and Yangyu Fan
Download Full-Text

Research on Integration Development Modes of China-ASEAN National Sports Cultures
Naiqiong Li and Naiqiong Li
Download Full-Text

Vision-Based Obstacle Avoidance Controller Design for Mobile Robot by Using Single Camera
Yi-Jen Mon
Download Full-Text

Modeling and Object-Oriented Design of Adaptive Hypermedia in Distance Learning
Fayçal Messaoudi, Mimoun Moussaoui, Ahmed Bouchboua and Rabeh Ouremchi
Download Full-Text

Morphological Analyzer of Arabic Words Using the Surface Pattern
Said Iazzi, Abdellah Yousfi, Mostafa Bellafkih and Driss Aboutajdine
Download Full-Text

Robust controller design of sliding mode control for a class of nonlinear system with parametric uncertainty via Takagi Sugeno Fuzzy Model
Budiman Azzali Basir
Download Full-Text

Post-processing of Engineering Analysis Results for Visualization in VR System
Stoyan Maleshkov and Dimo Chotrov
Download Full-Text

Building a Cloud Storage Encryption (CSE) Architecture for Enhancing Cloud Security
Hamdan M. Al-Sabri and Saleh M. Al-Saleem
Download Full-Text

Exploring the Potential Application of MetOp/GOME2 Ozone Data to Weather Analysis
Siham Sbii, Mimoune Zazoui, Noureddine Semane, Yann Michel and Philippe Arbogast
Download Full-Text

Parallel and distributed closed regular pattern mining in large databases
M.Sreedevi and L S S Reddy
Download Full-Text

An End-to-End Secure Mail System Based on Certificateless Cryptography in the Standard Security Model
Mohammed Hassouna, Nashwa Mohamed, Bazara Barry and Eihab Bashier
Download Full-Text

Automatic Image Annotation Using Modified Keywords Transfer Mechanism Base on Image-Keyword Graph
, Guo-Qing Xu, and Zhi-Chun Mu
Download Full-Text

Dynamic Forensics Model based on Ontology and Context Information
Baoxian Jia and Weiqiang Yang
Download Full-Text

UML Modeling for General Educational Services in KSA integrated with GIS
Mohammed Al-Shabi
Download Full-Text

Human-Robot Interaction in UVs Swarming: A Survey
Zhen-Qiang Mi and Yang Yang
Download Full-Text

Peripheral Contour Feature Based On-line Handwritten Uyghur Character Recognition
Zulpiya Kahar, Mayire Ibrayim, Institute Of Information Science And Engineering, Xinjiang University and Askar Hamdulla
Download Full-Text

Modified TCP Protocol for Wireless Sensor Networks
Hesham Abusaimeh and Mohammad Shkoukani
Download Full-Text

Signal Integrity Analysis of BGA Solder Joint
Shang Yuling and Shi Guangyao
Download Full-Text

Implementation of Data Privacy and Query Optimization in Data Providing Service Composition
Rashmi Kulkarni and Amit Chougule
Download Full-Text

A Novel Image Scrambling Technique Based On Information Entropy And Quad Tree Decomposition
Prabhudev Jagadeesh, P Nagabhushan and R.Pradeep Kumar
Download Full-Text

Differential Evolution with (u+T)-Selection Technique
Miao-Miao Liu, Pan Huo and Wen-Yin Gong
Download Full-Text

Simulative Investigation of QoS parameters for VoIP over WiMAX networks
Priyanka, Jyoteesh Malhotra and Kuldeep Sharma
Download Full-Text

Study on bifurcation and chaotic motion of a strongly nonlinear torsional vibration system under combination harmonic excitations
Wenming Zhang
Download Full-Text

ANFIS Transient Control for Double Inverted Pendulum System
Yi-Jen Mon
Download Full-Text

Detection of copy-move forgery in digital images based on DCT
Wandji Nanda Nathalie Diane, Sun Xingming and Moise Fah Kue
Download Full-Text

Dynamic Analysis for Video Based Smoke Detection
Chen Junzhou, You Yong and Peng Qiang
Download Full-Text

Tracking Document of Disposition Letter by Using Mobile Agents on Distributed Information System
Muhammad Hasbi
Download Full-Text

How to Resolve Management Issues in Software Development?
Mubashir Ahmad, Mahmood Ul Hassan, Abdelrahman Osman and Muhammad Anwar
Download Full-Text

Design and Simulation of Gate Driver Circuit Using Pulse Transformer
Daizhuang Wang, Haifeng Dai and Zechang Sun
Download Full-Text

GA Based Model for Web Content Mining
Vikrant Sabnis and R. S. Thakur
Download Full-Text

Formal Validation for Software Modeling
Baojun Tian and Yanlin Gu
Download Full-Text

Studied and Their Application of Vibration Control Technologies
Ying Sun, Yuesheng Gu and Hegen Xiong
Download Full-Text

How Consultant Participation Lead to ERP Implementation Satisfaction: A Study Upon the Iranian Industries
Sheida Soltani, Sheida Soltani, Sheida Soltani, Naeimeh Elkhani, Naeimeh Elkhani, Naeimeh Elkhani, Aryati Bakri, Aryati Bakri and Aryati Bakri
Download Full-Text

Wimax Capacity Estimation through Different Channel Characteristic
Saeed Al-Rashdy and Guo Qing
Download Full-Text

An Ensemble Monte Carlo Model to Calculate Photocurrent of MSM Photodetector
Mohammad Soroosh and Yasser Amiri
Download Full-Text

Portal System for Secondary Schools
Ahmad T. Al-Halhouli and Hussein H. Owaied
Download Full-Text

Numerical simulation investigation on propagation of the detonation wave for small-charge
Haixia Zhao
Download Full-Text

Evaluation of a Proposed Intelligent Transportation Framework using Computer Network Concepts: A Case Study for Hajj-Pilgrim Traffic Monitoring and Control
Omar Tayan and Abdullah Al-Binali
Download Full-Text

Model based testing of Datawarehouse
Kuldeep Deshpande
Download Full-Text

An Intelligent Watermarking Approach Based Particle Swarm Optimization in Discrete Wavelet Domain
Abdelaziz I. Hammouri
Download Full-Text

A New Scheme Based Biometric to Protect Location Privacy in Wireless Body Area Networks
Mohammed Mana, Mohamed Feham and Boucif Amar Bensaber
Download Full-Text

A Formal Framework of Hybrid Test Cases Generation Applied to Embedded Systems
Tarik Nahhal
Download Full-Text

Simulation of Efficient Real-time Scheduling and Power Optimization
Rym Cheour, Urunuela Richard, Yvon Trinquet and Mohamed Abid
Download Full-Text

A General Purpose Image-Based Electors Smart Card Using an Enhanced Least Significant Bit Steganographic Method for Information Hiding
Gabriel Macharia Kamau, Stephen Kimani and Waweru Mwangi
Download Full-Text

A Normative Multiagent Trust Framework for Electronic Payment Analysis
Vincent, O. R., Adekoya A. F. and
Download Full-Text

Web Usage Mining: Data Preprocessing and Multi Level analysis on Moodle
Nawal Sael, Abdelaziz Marzak and Hicham Behja
Download Full-Text

A Hybrid Memetic Algorithm (Genetic Algorithm and Great Deluge Local Search) With Back-Propagation Classifier for Fish Recognition
Usama A. Badawi and Mutasem Khalil Sari Alsmadi
Download Full-Text

Performance Comparison of MIMO Systemsover AWGN and Rician Channels using OSTBC3 with Zero Forcing Receivers
Navjot Kaur and Lavish Kansal
Download Full-Text

Optimal Web Service Selection with Consideration for User Preferences
Tajudeen Adeyemi Ajao and Safaai Deris
Download Full-Text

A MLFQ Scheduling Technique using MMc Queues for Grid Computing
Dharamendra Chouhan, S.M Dilip Kumar and Jerry Antony Ajay
Download Full-Text

Packet Analyzer and Measurement Tool
Abdulsalam Alarabeyyat
Download Full-Text

Analysis on Characteristics of Communication Policy and its Transmission Dynamics
Jinbao Luo, Yongsheng Qian, Zhilong Jia, Junwei Zeng and Min Wang
Download Full-Text

A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks
Haixia Zhao, Yaowei Li, Jincheng Shen, Mingchuan Zhang, Ruijuan Zheng and Qingtao Wu
Download Full-Text

Wavelets Study for better multiresolution analysis in CAD of Microcalcification
Nizar Ben Hamad, Atef Masmoudi and Khaled Taouil
Download Full-Text

A Superlinearly feasible SQP algorithm for Constrained Optimization
Zhijun Luo
Download Full-Text

A Converged Service Plane for Virtual Infrastructure Containers
Ibrahim Kabiru Musa and Stuart D. Walker
Download Full-Text

Multi-agent Based Booking of Consignment for Supply Chain Management
Pankaj Rani and Dr S Srinivasan
Download Full-Text

Performance Analysis of ST,SF and STF IN MIMO-OFDM Technique
M.Vijaya Laxmi and S.Narayana Reddy
Download Full-Text

Calculation and Analysis of the Synergetic Degree Model between Modern Logistics and Transportation Industry in Gansu Province
Yan Yan, Yongsheng Qian, Yongzhong Yang, Junwei Zeng and Min Wang
Download Full-Text

Deployment of Palm Recognition Approach using Image Processing Technique
Jugal Kishore Patel and Sanjay Kumar Dubey
Download Full-Text

A New Method Combining Neural Networks and Hough Transform (HT) in Robotic Vision
Mahfoud Hamada and Abdelhalim Boutarfa
Download Full-Text

A Linear Active Disturbance Rejection Control applied for DFIG based Wind Energy Conversion System
Ali Boukhriss, Tamou Nasser and Ahmed Essadki
Download Full-Text

Clustering and Classification Augmented with Semantic Similarity for Text Mining
S.Revathi and T.Nalini
Download Full-Text

Collision Avoidance of Intelligent Service Robot for Industrial Security System
Imran Memon, Farman Ali Mangi and Deedar Ali Jamro
Download Full-Text

Collaborative Representation for Face Recognition based on Bilateral Filtering
Rokan Khaji, Hong Li, Ramadan Abdo Musleh, Hongfen Li and Qabas Ali
Download Full-Text

The Gray images of linear codes over the ring F3+vF3+v2F3
Yazhou Xiong, Shujie Yun, Jingyuan Xing and Xiaofang Xu
Download Full-Text

Empirical Validation of Reliable Requirement Specification Framework
Sandeep, Raees Ahmad Khan and Mohd. Rizwan Beg
Download Full-Text

FPGA Implementation Of A Fully And Partially Connected MLP-A Dedicated Approach
Hrudaya Kumar Tripathy, Jnana Ranjan Tripathy and Maya Nayak
Download Full-Text

Multi-Objective Particle Swarm Optimization for Facility Location Problem in Wireless Mesh Networks
Tarik Mountassir, Bouchaib Nassereddine, Abdelkrim Haqiq and Samir Bennani
Download Full-Text

EOE-DRTSA: End-to-End Distributed Real-time System Scheduling Algorithm
Dhuha Basheer Abdullah and Amira Bibo Sallow
Download Full-Text

Knowledge Engineering Process for a Rapid Prototyping of Inductive Expert System
Nittaya Kerdprasop and Kittisak Kerdprasop
Download Full-Text

Erratum to: Adjacency Matrix based method to compute the node connectivity of a Computer Communication Network
Onur Ugurlu and Murat Ersen Berberler
Download Full-Text

Failure Detection and Recovery in Hierarchical Network Using FTN Approach
Bhagvan Krishna Gupta, Ankit Mundra and Nitin Rakesh
Download Full-Text

Improving Rare Case Prediction with Replication Technique
Nittaya Kerdprasop, Fonthip Koongaew, Zagon Budsabong, Phaichayon Kongchai and Kittisak Kerdprasop
Download Full-Text

The Logistic Regression Analysis on Risk Factors of Hypertension among Peasants in East China Its Results Validating
Zhuoyuan Zheng, Ye Li and Yunpeng Cai
Download Full-Text

Efficient structural similarity computation between XML documents
Ali Aitelhadj
Download Full-Text

Handwritten Word Recognition Using MLP based Classifier: A Holistic Approach
Ankush Acharyya, Sandip Rakshit, Ram Sarkar, Subhadip Basu and Mita Nasipuri
Download Full-Text

Performance Analysis of Privacy Preserving Nave Bayes Classifiers for Distributed Databases
Alka Gangrade and Ravindra Patel
Download Full-Text

Proposal to Enhance AntNet Routing Algorithm by Exploiting Association Rules as Analysis Tool
Soukaena Hassan Hashem
Download Full-Text

A Novel Low Complexity Combinational RNS Multiplier Using Parallel Prefix Adder
Mohammad R. Reshadinezhad and Farshad Kabiri Samani
Download Full-Text

Graphical Password Authentication Schemes: Current Status and Key Issues
Harsh Kumar Sarohi and Farhat Ullah Khan
Download Full-Text

Intelligent Online Education Transformation System
Rashmi Chahar, Anubhav Agarwal, Vipul Malhotra, Rahul Jain and Ashish Chandiok
Download Full-Text

Shape analysis of planar trigonometric Bezier curves with two shape parameters
Rongjun Wu and Guohua Peng
Download Full-Text

A New Robust Cryptography Algorithm based on Symmetric Key to prevent Unauthorized Access to Contents of Encrypted Files
Mohammad Soltani
Download Full-Text

A Taxonomy of Enterprise ArchitectureFramework for Indonesian SMEs
Ambar Yoganingrum, Dana Indra Sensuse and Aniati Murni
Download Full-Text

Study on Sustainable Development of Various Modes of Transport in China on the Background of Low-carbon Economy
Junwei Zeng, Xiaoming Shao, Yongsheng Qian and Jinbao Luo
Download Full-Text

Design an electronic system for computer communication between hospital departments (card desk)
Samaneh Haji Mohammad Bagher, Ali Amini, Javad Aryatabar and Hossein Akhavan Zanjani
Download Full-Text

Performance Analysis of Variable Energy Levels of Clustering Protocols for Wireless Sensor Network
Firas Ali Al-Juboori and Sura Fawzi Ismail
Download Full-Text

The Research of a Decision-Making Model based on OODA Loop for Emergency Evacuation in City
Lei Du, Guixing Zheng, Yuan Kan, Bo Xu and Qun Zhao
Download Full-Text

Vehicle logo classification using support vector machine Ensemble
Wesal Abdallah and Li Hong
Download Full-Text

Modified PSO for Optimal Tuning of Fuzzy PID Controller
Sawsan Morkos Gharghory and Hanan Ahmed Kamal
Download Full-Text

OpenMP performance analysis for many-core platforms with non-uniform memory access
Pablo González De Aledo Marugán, Javier González-Bayón, Pablo Sánchez and Juan Casal
Download Full-Text

The Technical, Non-technical Issues and the Challenges of Migration to Free and Open Source Software
Mohamed Sarrab, Mahmoud Elbasir and Laila Elgamel
Download Full-Text

A Symbol-Based Estimation Technique for Inter-vehicular Communication Performance Optimization
Aymen Sassi, Atika Revenq, Lotfi Kamoun, Faiza Charfi and Yassin El Hillali
Download Full-Text

Hybrid Framework for Robust Multimodal Face Recognition
Mostafa Mohamed Mohie El-Din, Mohamed Yousri El Nahas and Hassan Ahmed Hassan Elshenbary
Download Full-Text

Face Detection By Finding The Facial Features And The Angle of Inclination of Tilted Face
A.Hemlata, and Mahesh Motwani
Download Full-Text

Recognition of leaf based on its tip and base using Centroid Contour Gradient
Mei Fern Bong, Ghazali Bin Sulong and Mohd Shafry Bin Mohd Rahim
Download Full-Text

Analysis of Modified Cooperative Transmission Routing Protocol in Manet
K. Vanisree and V.S.K. Reddy
Download Full-Text

Design and Built Interactive Whiteboard Application as Learning Support Using Game Controlling
Wandana Narayana Putra, Aa Ketut Agung Cahyawan, St., Mt and Nyoman Piarsa, St., Mt
Download Full-Text

Texture Based MRI Image Retrieval Using Curvelet With Statistical Similarity Matching
K.Rajakumar and S.Muttan
Download Full-Text

An Experimental Aspect-Oriented Design Methodology
Mario Pavlov and Daniela Gotseva
Download Full-Text

Improved Mobile WiMax Image Privacy Using Novel Encryption Techniques
Mohamed Abdel-Azim Mohamed, Fayez Wanis Zaki and Awny Mohsen El-Mohandes
Download Full-Text

Analysis of Financial Time Series Data Using Adaptive Neuro Fuzzy Inference System (ANFIS)
Tarno, Subanar, Dedi Rosadi and Suhartono
Download Full-Text

Modeling Unstructured Document Using N-gram Consecutive and WordNet Dictionary
Abdul Halim Omar
Download Full-Text

An Inter-lingual Reference Approach For Multi-Lingual Ontology Matching
Haytham Al-Feel, Ralph Schafermeier and Adrian Paschke
Download Full-Text

Progressive Compression of 3D Objects with an Adaptive Quantization
Zeineb Abderrahim and Mohamed Salim Bouhlel
Download Full-Text

General Approach for Energy Conservation in Wireless Sensor Networks
Alami Chaibrasou and Ahmed Mouhsen
Download Full-Text

A Visual and Interactive Learning Tool for CPU Scheduling Algorithms
Sukanya Suranauwarat
Download Full-Text

Towards a Heralded Single Photon Source Model Based on Photonic Crystal: Constraints and Feasibility
Rihab Chatta, Moez Attia and Amor Gueddana
Download Full-Text

Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges
Srikanth Mavuri and K B Madhuri
Download Full-Text

Acoustic Representation of Galo and Adi Vowels
Marpe Sora
Download Full-Text

A Common Factors Analysis on cloud computing models
Behrang Parhizkar, Ali Naser Abdulhussein Abdulhussein, Jugal Harshvadan Joshi and Atwine Mugume Twinamatsiko
Download Full-Text

Singularly perturbed Quasilinear Boundary Value Problems With Interior Shock Layer Behavior
Ghoul Rafia and Ni Yu-Dong
Download Full-Text

Analyzing the Makier Virus
Ritwik M and Praveen K
Download Full-Text

Evaluation of Regional Benchmark Impact in EDM
P.V.Praveen Sundar and A.V.Senthil Kumar
Download Full-Text

Image Mosaicing and Registration
Asha Rani K P, Asha K N and Manjunath M
Download Full-Text

IJCSI Volume 10, Issue 2, No 1, March 2013

Download Full-Text

IJCSI Volume 10, Issue 2, No 2, March 2013

Download Full-Text

IJCSI Volume 10, Issue 2, No 3, March 2013

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Email: info@ijcsi.org

More contact details »