Monday 20th of February 2017                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 10, Issue 3, May 2013
Study of Edge Detection Based On 2D Entropy
Mohamed A. El-Sayed
Download Full-Text

Application of Modified Gravitational Search Algorithm to Solve the Problem of Teaching Hidden Markov Model
Ali Asghar Rahmani Hosseinabadi, Mohammadreza Ramzannezhad Ghaleh and SeyedEsmaeil Hashem
Download Full-Text

Designing an intelligent system for the automatic distribution of narcotic drugs
Samaneh Haji Mohammad Bagher, Mehdi Amini, Javad Aryatabar and Mahmoud Keimasi Salkhor
Download Full-Text

Clustering and routing wireless sensor network based on the parameters of distance, density, energy and traffic With the help of fuzzy logic
Seyed Esmaeil Hashemi, Homayun Motameni, Mohammadreza Ramzannezhad Ghaleh and Shahrbano Esmaeili
Download Full-Text

Mobile SMS based Self-Medication Support System for Health-care
Malik M. Saad Missen, Tareef Ali Khan, Hina Asmat, Nadeem Salamat and Nadeem Akhtar
Download Full-Text

Using Data Mining for Life Insurance Network Optimization
Brunela Karamani, Esteriana Haskasa and Shkelqim Kuka
Download Full-Text

One Method for Via Equivalent Circuit Extraction Based on Structural Segmentation
Yuling Shang, Chunquan Li and Huaqing Xiong
Download Full-Text

A Dichotomy Approach for Ontology Mapping
Zhi Huilai, Huo Zhanqiang and Xu Bin
Download Full-Text

Survey on Content Based Image Retreival System and Gap Analysis for Visual Art Image Retreival System
Poornima Y and P.S. Hiremath
Download Full-Text

VMIMO scheme for Machine-to-Machine on Cellular Network
Wu Xianfeng, Wang Yinfeng, Liu Zhijun, Li Huazhong and Ren Xianyi
Download Full-Text

Design and Realization of the Xml Parser based on Parsing Approach of Delaying Extension and Reducing Redundancy
Xiaoxia Sun, Hui Zhao and Wenjun Meng
Download Full-Text

Emotional BCI Control of a Smart Wheelchair
Anas Fattouh, Odile Horn and Guy Bourhis
Download Full-Text

Risk Analysis and Assessment by Multicriteria Approach Based in RO-RO Port Terminal - Case Study
Charif Mabrouki, Adil Bellabdaoui and Ahmed Mousrij
Download Full-Text

A Model of Image Denoising Based on the Fusion ofAnisotropic Diffusion and Total Variation Models
Ali Abdullah Yahya
Download Full-Text

A 3D Simulation Method of Foundation Pit Excavation Based on Vector Graphics
Mu Huang and Xianyong Han
Download Full-Text

Intelligent City Traffic Management and Public Transportation System
S.A.Mulay, C.S.Dhekne, R.M.Bapat, T.U.Budukh and S.D.Gadgil
Download Full-Text

A Content Based Classification of Spam Mails with Fuzzy Word Ranking
G.Santhi, S. Maria Wenisch and P. Sengutuvan
Download Full-Text

Secure Routing Schema for Manet with Probabilistic Node to Node forwarding
Sumati Ramakrishna Gowda and P.S Hiremath
Download Full-Text

Improved Approach for Exact Pattern Matching
Iftikhar Hussain, Samina Kausar, Liaqat Hussain and Muhammad Asif Khan
Download Full-Text

A Framework for an Automatic Generation of Neural Networks
Belal Al-Khateeb and Maha Mahmood
Download Full-Text

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map
Jianjiang Cui, Siyuan Li and Dingyu Xue
Download Full-Text

Meta-Modeling Cloud Computing Architecture in Distance Learning
Kebande Rigworo Victor, Kenneth Otula Sigar and Odongo George Yogo
Download Full-Text

A Stoppable clock based Approach for Low Power Network Interface Design in a Network on Chip
Brahim Attia, Wissem Chouchenne, Abdelkrim Zitouni and Rached Tourki
Download Full-Text

A New Approach for Location based Tracking
Shaveta Bhatia
Download Full-Text

Estimation of Reliability Allocation on Components Using a Dynamic Programming
Srinivasa Rao.Sabbineni and Rajasekhararao
Download Full-Text

Internet Usage by Faculty in Saudi Higher Education
Amany Al-Shawi, and Areej Alwabil
Download Full-Text

Scalable and Highly Secured Image Steganography Based on Hopfield Chaotic Neural Network and Wavelet Transforms
B.Geetha Vani and E. V. Prasad
Download Full-Text

A preliminary study of the causality of Freezing of Gait for Parkinson\'s disease patients: Bayesian Belief Network approach
Ali Saad, Iyad Zaarour, Abbas Zeinedine, Mohammad Ayache, François Guerin and Dimitri Lefebvre
Download Full-Text

Privacy Preserving Data Mining: Case of Association Rules
Sarra Gacem, Djamila Mokeddem and Hafida Belbachir
Download Full-Text

Capacity Crunch: Can MoSoNets Offload Data Solve This
Usha R and Annapurna P Patil
Download Full-Text

Simulation of the Radar Ground Clutter Based on DEM
Lishasha
Download Full-Text

A Unified Framework for Information Extraction from Newspaper Images
Jitesh Kumar and Sanjay Kumar Dubey
Download Full-Text

Multi-objective Genetic Algorithm Based Selective Neural Networks Ensemble for Concentration Estimation of Indoor Air Pollutants Using Electronic Nose
Chaibou Kadri, Fengchun Tian, Lei Zhang, Xiongwei Peng and Xin Yin
Download Full-Text

Detection Of Structural Damages In Bridge Based On ZigBee Networks Using Sensors
R.Vinodini, S.Nalini and D.Muthumurugesan
Download Full-Text

Color Reproduction of Outdoor LED Displays with Compensation for Ambient Lighting Conditions
Mohamed Abdellatif, Mohamed Y. Elnahas, Hassan Farahat and Ali Rashed
Download Full-Text

Customer Buying Behavior Analysis: A Clustered Closed Frequent Itemsets for Transactional Databases
N.Kavitha and S.Karthikeyan
Download Full-Text

Toward a Maturity Model Development Process for Information Systems (MMDePSI)
Mina El Maallam and Abdelaziz Kriouile
Download Full-Text

Computationally Efficient Control System Based on Digital DynamicPulse Frequency Modulation for Microprocessor Implementation
Olimzhon A. Baimuratov, Bekmurza H. Aitchanov, Vladimir V. Nikulin and Zhylduz B. àitzhanova
Download Full-Text

Distributed Software agents for antiphishing
Sarika S and Varghese Paul
Download Full-Text

Cognitive-mapping and contextual pyramid based Digital Elevation Model Registration and its effective storage using fractal based compression
Suma Dawn, Vikas Saxena and Bhudev Sharma
Download Full-Text

A Paradigm Approach of Electronic Libraries in an Intellectual Milieu
Salah Alkhafaji and Mkg Rajev
Download Full-Text

Embedding Hex-Cells into Tree-Hypercube Networks
Awad Ibrahim Qatawneh
Download Full-Text

Artificial Immunity and Features Reduction for effective Breast Cancer Diagnosis and Prognosis
Mafaz Mohsin Al-Anezi, Marwah Jasim Mohammed and Dhufr Sami Hammadi
Download Full-Text

Input-Sensitive Fuzzy Cognitive Maps
Ioannis E. Karagiannis and Peter P. Groumpos
Download Full-Text

English to Bangla Machine Translation System Using Context-Free Grammars
Shibli Syeed Ashrafi, Md. Humayun Kabir, Md. Musfique Anwar and A. K. M. Noman
Download Full-Text

Effects of Black Hole Attack on MANET Using Reactive and Proactive Protocols
Irshad Ullah and Shahzad Anwar
Download Full-Text

Rectifying Reverse Polygonization of Digital Curves for Dominant Point Detection
Hamid Abbasi, Mohammad Olyaee and Hamid Reza Ghafari
Download Full-Text

Learning Style Deriving Approach to Personalize E-Learning Material Resources
Ibrahim Fathy Moawad
Download Full-Text

Estimation of Time Difference of Arrival (TDOA) for the Source Radiates BPSK Signal
Hesham Ibrahim Ahmed, Ping Wei, Imran Memon, Yanshen Du and Wei Xie
Download Full-Text

Bit Position based Qualitative and Quantitative Analysis of DCT and Spatial Domain Stegnography
Sahib Khan, Muhammad Nawaz Khan and Somia Iqbal
Download Full-Text

A Novel Approach for Credit Card Fraud Detection Targeting the Indian Market
Jaba Suman Mishra, Soumyashree Panda and Ashis Kumar Mishra
Download Full-Text

Evaluation and Performance of Reactive Protocols Using Mobility Model
Naveed Anjum and Sohail Abid
Download Full-Text

The Rumor Riding Anonymity Approach for Decentralized Peer to Peer Systems
Farman Ali Mangi, Imran Memon, Deedar Ali Jamro, Muhammad Hammad Memon and Muhammad Abdul Basit
Download Full-Text

On the Crowded Places Multi-Exits Emergency Evacuation Model and Algorithm
Li Dawei, Zhang Xiaoqi and Wang Li
Download Full-Text

Multilevel clustering and association rule mining for learners profiles analysis
Nawal Sael, Abdelaziz Marzak and Hicham Behja
Download Full-Text

Efficient Protection of Palms from RPW Larvaeusing Wireless Sensor Networks
Swarnalatha Srinivas, Harsha K S, Sujatha A and Narendra Kumar G
Download Full-Text

Multi-User-Detection for Multibeam-MIMO Multi-Carrier-Cdma systems with MMSE adaptive algorithm
Mourad Benyarou, Fethi Tarik Bendimerad and Fatima Debbat
Download Full-Text

Aligning organization strategy to information system: The BUSITAME method - Application to University Information System
Karim Doumi
Download Full-Text

A Compact Tapered-Shape Slot UWB Antenna with WLAN Band notch characteristics
Hassan H. El-Tamaly, Maher M. Eltayeb and Deena Abd El Hamid Salem
Download Full-Text

Adaptive Process in a Pervasive System - A Holistic Hybrid Approach
Henry Chika Eleonu and Jane Oruh
Download Full-Text

Stochastic Analysis of Mobile Ad-hoc Networks
Nassiri Khalid, El Hibaoui Abdelaaziz and Hajar Moha
Download Full-Text

A Framework for Mobile Application Design
Abdesselam Redouane
Download Full-Text

Fuzzy Based Skin Detection and Segmentation
Afia Nazir, Laiq Hassan, Alamzeb M. Zai and Rehanullah Khan
Download Full-Text

Digital Watermarking for Image Authentication Based on Combined DCT, DWT and SVD Transformation
Mohammad Ibrahim Khan, Md. Maklachurrahman and Md. Iqbal Hasansarker
Download Full-Text

Grid Security and Trust Management Overview
Slavomír Kavecký
Download Full-Text

Hybrid Approach for Network Intrusion Detection System Using K-Medoid Clustering and Naive Bayes Classification
Deepak Upadhyaya and Shubha Jain
Download Full-Text

Usability Inspection of Web Portals: Results and Insights from Empirical Study
Andrina Granic, Nikola Marangunic and Ivica Mitrovic
Download Full-Text

An Unsupervised Salient Object Extraction Approach using Statistical Method and High Contrast Saliency Map
Akram, Tallha, Duan Qichang and Xu Hongying
Download Full-Text

Performance Evaluation of Noise Estimation Techniques for Blind Source Separation in Non Stationary Noise Environment
Mohini S. Avatade
Download Full-Text

A Repository of Software Requirement Patterns for Online Examination System
Sangeeta Srivastava
Download Full-Text

Time Oriented Database System Using RFID
Nadeem Mahmood, Aqil Burney, Zain Abbas, Abdul Khaliq Bari and Qamar Ul Arifeen
Download Full-Text

Stability of Inter domain Routing Protocol with Regressive Peak Contour
Bhavneet Kaur, Karanjeet Singh Kahlon and Sandeep Sharma
Download Full-Text

Sensitivity Analysis of Cloud under Transient Conditions
Satyanarayana.A, P. Suresh Varma, M.V.Rama Sundari and P Sarada Varma
Download Full-Text

Using rules to enhance evolution of knowledge mapping: Application on Healthcare
Brahami Menaouer
Download Full-Text

Engineering of the Decisional Information System by the reuse of patterns
Aziza Sabri and Laila Kjiri
Download Full-Text

A Highly Integrated Ka Band Front-End Receiver
Ghulam Mehdi, Hu Anyong and Jungang Miao
Download Full-Text

Software Performance Driven Quality Refinement of MINPHIS: An Architectural View
Ishaya Gambo, Rhoda Ikono, Olaronke Iroju, Theresa Omodunbi and Abimbola Soriyan
Download Full-Text

IAX-Based Peer-to-Peer VoIP Architecture
Amor Lazzez, Ouissem Ben Fredj and Thabet Slimani
Download Full-Text

Knee Osteoarthritis Diagnosis Using Support Vector Machine and Probabilistic Neural Network
Ozge Aksehirli, Duygu Aydin, Handan Ankarali and Melek Sezgin
Download Full-Text

Low Power of Ring Oscillator Based on CNTFET
Lobna Imsaddak, Dalenda Ben Issa and Kachouri Abdennaceur
Download Full-Text

The Future Vision for the Design of E-government in Egypt
Mohamed El-Sayed Waheed and Esam Mohamed El Gohary
Download Full-Text

Analysis of a Parallel System with Priority to Repair over Maintenance Subject to Random Shocks
S. K. Chhillar, A.K. Barak and S.C.Malik
Download Full-Text

A New approach for Finger-Print Identification
Attallah Bilal, Hendel Fatiha and Boudjelal Abdelwahhab
Download Full-Text

Time Course of Chromatic Adaptation to Outdoor LED Displays
Mohamed Abdellatif, Mohamed Y. Elnahas, Hassan Farahat and Ali Rashed
Download Full-Text

Selection Criteria for Data Mining Software: A Study
Neeraj Bhargava, Atif Aziz and Rajiv Arya
Download Full-Text

Variance Based Scheduling Algorithm with Relay Selectionand Resource Allocation in Cooperative OFDMANetworks
Basly Maryam, Hedia Kochkar and Ammar Bouallegue
Download Full-Text

Optimizing Risk Management Using Learning Automata
Mohhamad Reza Ahmadi, Babak Anari, Mostafa Gobaye Arani and Zohreh Anari
Download Full-Text

Verification and Validation of MapReduce Program Model for Parallel Support Vector Machine Algorithm on Hadoop Cluster
Kiran M., Amresh Kumar, Saikat Mukherjee and Ravi Prakash G.
Download Full-Text

Extraction of Region of Interest in Compressed Domain
Vaishali Choudhary and Preeti Voditel
Download Full-Text

Text mining approach for WSI in QA systems through relation construction
C. Meenakshi
Download Full-Text

On an XML and OWL Computer Ontology for the Representation of Mammals in DRC
Eugene MBUYI MUKENDI, Krystelle SHEMATSI BWIRA, Bevi MBELU MUTOBA and Franck MANYA TUNDA
Download Full-Text

Design and implementation of a Telco Business Intelligence Solution using eTOM, SID and Business Metrics: focus on Data Mart and Application on Order-To-Payment end to end process
Mounire Benhima, John P. Reilly, Zaineb Naamane, Meriam Kharbat, Mohammed Issam Kabbaj and Oussama Esqalli
Download Full-Text

IJCSI Volume 10, Issue 3, No 1, May 2013

Download Full-Text

IJCSI Volume 10, Issue 3, No 2, May 2013

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »