Saturday 19th of August 2017                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 10, Issue 4, July 2013
The Design of a Dual-band antenna for GPS-Beidou Applications
Shenzheng Zuo, Luyao Shi and Encheng Wang
Download Full-Text

Keystroke Dynamics Authentication: A Survey of Free-text Methods
Arwa Alsultan and Kevin Warwick
Download Full-Text

Architecture Exploration of Multicore Systems-on-Chip using a TLM-based Framework
Mona Safar, Magdy A. El-Moursy, Mohamed Abdelsalam and Ashraf Salem
Download Full-Text

Three-dimensional Numerical Study of Natural Convection in a Cubical Enclosure with Two Heated Square Sections Submitted to Periodic Temperatures
Lahoucine Belarche, Btissam Abourida and Touria Mediouni
Download Full-Text

A New Energy Consumption Algorithm with Active Sensor Selection Using GELS in Target Coverage WSN
Ali Bagrezai, Seyed Vahab AL-Din Makki and Ali Shokouhi Rostami
Download Full-Text

Characteristics of Global Calling in VoIP services: A logistic regression analysis
Thanyalak Mueangkhot, Julian Ming-Sung Cheng and Chaknarin Kongcharoen
Download Full-Text

Flexible boom numerical simulation and vibration characteristics analysis
Hongbin Tang and Wu Ren
Download Full-Text

EVAM-MAC: An Event Based Medium Access Control for Wireless sensor Networks with Multihop Support
Zaher Merhi, Mohamed Elgamel, Samih Abdul-Nabi, Amin Haj-Ali and Magdy Bayoumi
Download Full-Text

Adaptive approach for spam detection
Sumant Sharma and Amit Arora
Download Full-Text

Adoption of ICT to Enhance Educational Development in Nigeria
Odeniyi O.A, Ayinde A.Q, Adetunji A.B and Sarumi O.A
Download Full-Text

Model for determining the impact analysis of open source adoption in software development economics
Ahmad Adnan and Muhammad Faisal Akram
Download Full-Text

A Critical Review of Development of Intelligent Tutoring Systems: Retrospect, Present and Prospect
Neelu Jyothi Ahuja and Roohi Sille
Download Full-Text

Application of the Gradient Vector Flow Method for Treating Satellite Image
Mohammed Ait Oussous, Noureddine Alaa and Youssef Ait Khouya
Download Full-Text

Mitigate Black Hole Attack In Dynamic Source Routing (DSR) Protocol By Trapping
Mahamuni K and Chandrasekar C
Download Full-Text

An Enhanced Application of Modified PSO for Association Rule Mining
Bharathi.T and P.Krishnakumari
Download Full-Text

Transformation from E-commerce to M-commerce in Indian Context
Sujata P. Deshmukh, Prashant Deshmukh and G.T. Thampi
Download Full-Text

An Exploratory Study of Arabic Language Support in Software Project Management Tools
Arwa Al-Amoudi, Hailah Almazrua, Hebah Al-Moaiqel, Noura Alomar and Sarah Al-Koblan
Download Full-Text

An Expressive Role-based Approach for Improving Distributed Collaboration Transparency
Abdullah O. Al-Zaghameem and Mohammad Alfraheed
Download Full-Text

Web-Marketing in Social NetworksUsing MDA Approach
Lamlili El Mazoui Nadori Yasser, Erramdani Mohamed, Arrassen Ibtissam, Esbai Redouane and Moussaoui Mimoun
Download Full-Text

Exit Chart for Iterative Decoding of Product and Concatenated Block Codes
Abderrazak Farchane, Mostafa Belkasmi and Ahmed Azouaoui
Download Full-Text

Combining a drug therapy and oncolytic virotherapy to treat cancer: an optimal control approach
Adil El Alami Laaroussi, Elhia Mohamed and Mostafa Rachik
Download Full-Text

Protection of Personal Data in Information Systems
Bojken Shehu, Shqiponja Ahmetaj, Marin Aranitasi and Aleksander Xhuvani
Download Full-Text

Mixed Immunotherapy and Chemotherapy of Tumors: Optimal Control Approach
Samira Zouhri, Smahane Saadi, Ilias Elmouki, Amine Hamdache and Mostafa Rachik
Download Full-Text

The Analysis and Design of a Web-Based Social Network: Locate it! Project
Noura Alomar and Wea\'am Alrashed
Download Full-Text

An Eccentric Scheme for Oblivious Communication
Khan Farhan Rafat and Muhammad Sher
Download Full-Text

Performance analysis of Internet Protocol Storage Area Network (IP SAN) and its usage in Clustered Database
Akanksha Verma, Shrijee Bhattacharjee, Prashant Baste, Nandan Nagarajappa Mirajkar, Sandeep Bhujbal, Nilesh Deshmukh and Kumud Singh
Download Full-Text

Task Migration in Cloud Computing using Combination of Yu and Post-Copy Techniques
Elham Shamsinezhad, Asadollah Shahbahrami, Alireza Hedayati, Ahmad Khadem Zadeh and Hamid Banirostam
Download Full-Text

Assessment of offline Digital Signature Recognition Classification Techniques
Dina Darwish
Download Full-Text

Towards an Assessment-oriented Model for External Information System Quality Characterization
Abir Elmir, Badr Elmir and Bouchaib Bounabat
Download Full-Text

A Model for Optimizing Data Caching of Dual Mode Handheld Devices
Mohamed Grida, Hasnaa Soliman and Mohamed Hassan
Download Full-Text

TTowards a better control of the infectious risks associated with health care activities
Benzouai Messaoud, Smadi Hacene, Kassah-Laouar Ahmed, Bahmani Younes and Bellala Djamel
Download Full-Text

On the Limits of Perfect Security for Steganographic System
Khan Farhan Rafat and Muhammad Sher
Download Full-Text

Image enhancement using fusion by wavelet transform and Laplacian pyramid
Shailendra M. Mukane, Yogesh S Ghodake and P.S.Khandagle
Download Full-Text

A Review of Fault Detection Techniques for Wireless Sensor Networks
Saurabh Mittal and Rinkle Rani Aggarwal
Download Full-Text

User Authentication with Adaptive Keystroke Dynamics
Shimaa I. Hassan, Mazen M. Selim and Hala H. Zayed
Download Full-Text

Indiscernible Communication through ASCII Text Document/File (Communication in Veil)
Khanfarhanrafat and Muhammad Sher
Download Full-Text

New Efficient Technique for Compression of ECG Signal
Nidhal K. El Abbadi and Abbas M. Al-Bakry
Download Full-Text

Biometric System by Pointing Finger
Eugène Mbuyi Mukendi and Jean Didier Batubenga Muamba
Download Full-Text

Performance Evaluation of Naive Bayes and Decision Stump Algorithms in Mining Students Educational Data
Ayinde A.Q, Adetunji A.B, Bello M and Odeniyi O.A
Download Full-Text

Sapwood Oak classification using Global and Local Features
Hammad Naeem, Asim Anees, Maria Minhas and Jameel Ahmed
Download Full-Text

Effectiveness of Online Job Recruitment System: Evidence from the University of the East
Mary Grace G. Ventura and Rex P. Bringula
Download Full-Text

A Comparative Study about Object Classification based on Global and Local Features
Hammad Naeem, Maria Minhas and Jameel Ahmed
Download Full-Text

Cloud Computing: A Survey on its limitations and Potential Solutions
Mohammad Manzurul Islam, Sarwar Morshed and Parijat Goswami
Download Full-Text

Evaluation of Different Query Expansion Techniques by using Different Similarity Measures in Arabic Documents
Hayel Hussain Khafajeh and Nidal Abedalrahman Yousef
Download Full-Text

Intelligent Vehicle Recognition based on Wireless Sensor Network
Maha Mohamed Nabeel, Mahmoud Fakhr El-Dein and Sherine Abd El-Kader
Download Full-Text

Design and Implementation of Feynman Gate in Quantum-dot Cellular Automata (QCA)
Md. Anisur Rahman, Fatema Khatun, Angona Sarkar and Md. Fazlul Huq
Download Full-Text

Face Recognition Using SVM Based on LDA
Anissa Bouzalmat, Jamal Kharroubi and Arsalane Zarghili
Download Full-Text

Online Newspaper using Mashup
Mentor Hamiti and Ramiz Kastrati
Download Full-Text

Blind Fake Image detection
Nidhal Khdhair El Abbadi, Adil Mohamad Hassan and Mudher Mohammed Al-Nwany
Download Full-Text

Lock-Free Readers/Writers
Anupriya Chakraborty, Sourav Saha, Ryan Saptarshi Ray and Utpal Kumar Ray
Download Full-Text

The Utilization of Internet Communication intoKnowledge Sharing Activities in Primary Schools
Lokman Mohd Tahir, Mohd Fadzli Ali, Tina Abdullah, Mehmet Ozay, Haswadi Hassan and Khadijah Daud
Download Full-Text

Iterative Decoding Termination Schemes for Turbo Code Performance Optimization In Mobile Wi-Max Environment
Jagdish D. Kene and Kishor D. Kulat
Download Full-Text

Design a Secure Electronic Voting System Using Fingerprint Technique
Sanjay Kumar and Manpreet Singh
Download Full-Text

Adoption of ICT-Based Secondary Education for Actualizing the Millenium Development Goals in Nigeria
O.A. Odeniyi, A.Q Ayinde, N.B Lawal, A.B Ghazaly-Agboola and S.O Kolade
Download Full-Text

Minimizing Handoff Latency and Packet Loss in NEMO
Fatimah Abdulnabi Salman and Emad Hassan Al-Hemairy
Download Full-Text

The Effect of Changing the Speed and the Number of Nodes on Packet Delivery Ratio in MANET
Imad I. Saada, Magdy Z. Rashad and Mohamed A. Abu Elsoud
Download Full-Text

The development of algorithms for alleviating the problem of discontinuity in speech synthesis from text written in Albanian
Adnan Maxhuni, Agni Dika, Avni Rexhepi and Dren Imeraj
Download Full-Text

A Fuzzy Based Feature Extraction Approach for Handwritten Characters
Mahmood K Jasim, Anwar M Al-Saleh and Alaa Aljanaby
Download Full-Text

A Proposed Permutation Scheme based on 3-D Chaotic System for Encrypting the Colored Images
Osama M. Abu Zaid
Download Full-Text

Cryptosystem Algorithm Based on Chaotic Systems for Encrypting Colored Images
Osama M. Abu Zaid
Download Full-Text

RBAC Architectural Design Issues in Institutions Collaborative Environment
Muhammad Umar Aftab, Amna Nisar, Muhammad Asif, Adeel Ashraf and Burhan Gill
Download Full-Text

An Efficient Approach for Sky Detection
Irfanullah, Kamal Haider, Qasim Sattar, Sadaqat Ur Rehman and Amjad Ali
Download Full-Text

New algorithm for automatic visualization of metro map
Somayeh Sobati Moghadam
Download Full-Text

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
Dhuha Basheer Abdullah and Zeena Abdulgafar Thanoon
Download Full-Text

Optimizing the Number of Neighbors in Trust Based Recommender Systems
Harmeet Kaur and Deepali Jain
Download Full-Text

Heuristics for Routing and Spiral Run-time taskMapping in NoC-based Heterogeneous MPSOCs
Mohammed Kamel Benhaoua, Abbou El Hassen Benyamina and Pierre Boulet
Download Full-Text

The Difference Between Dwelling And Home In Architecture
Shadab Shidfar
Download Full-Text

Broad View of Cryptographic Hash Functions
Mohammad A. Alahmad and Imad Fakhri Alshaikhli
Download Full-Text

A Novel Design of Ultra-Wideband Antenna Using Slot-Based Structures
Mohamed Taouzari, Ahmed Mouhsen, Jamal El Aoufi and Jamal Zbitou
Download Full-Text

Heterogeneous Vehicle Routing Problem with profits Dynamic solving by Clustering Genetic Algorithm
Sawsan Amous Kallel and Younes Boujelbene
Download Full-Text

Criticality estimation of IT business functions with the Business Continuity Testing Points method for implementing effective recovery exercises of crisis scenarios
Athanasios Podaras and Tomas Zizka
Download Full-Text

An Investigation of the Incidences of Repetitive Strain Injury among computer Users in Nigeria
Olabiyisi Olutunde, Akingboye Yusuff, Abayomi-Alli Adebayo, Izilien Fred and Adeleke Iyiola
Download Full-Text

A Metric Based Approach to Extract, Store and Deploy Software Reusable Components Effectively
Muhammad Ilyas, Mubashir Abbas and Khansa Saleem
Download Full-Text

Improving the methods of email classification based on words ontology
Foruzan Kiamarzpour, Rouhollah Dianat, Mohammad Bahrani and Mehdi Sadeghzadeh
Download Full-Text

Sentiment Analysis of Equities using Data Mining Techniques and Visualizing the Trends
Shradha Tulankar, Rahul Athale and Sandeep Bhujbal
Download Full-Text

OpenMP - Automatic Parallelization Tools: An Empirical Comparative Evaluation
Emna Kallel Laadhar and Yassine Aoudni
Download Full-Text

A Shadow Detection and Removal from a Single Image Using LAB color Space
Ashraful Huq Suny and Nasrin Hakim Mithila
Download Full-Text

Software Reliability Prediction using Artificial Techniques
Rita G. Al Gargoor and Nada N. Saleem
Download Full-Text

Ontology based data warehouses federation management system
Naoual Mouhni and Abderrafiaa El Kalay
Download Full-Text

Spectral Subtraction for Speech Enhancement in Modulation Domain
Muhammad Tariq Sadiq, Noman Shabbir and Wlodek J. Kulesza
Download Full-Text

An Effective Web Service Ranking Algorithm based on Quality of Experience of Users
Vandan Tewari, Nirmal Dagdee and Aruna Tiwari
Download Full-Text

Spectrum Hole Prediction based on Historical Data: A Neural Network Approach
Bara\'u Gafai Najashi, Feng Wenjiang and Mohammed Dikko Almustapha
Download Full-Text

Energy Efficient Topology Control Approach for Mobile Ad hoc Networks
T.S.Asha and N.J.R.Muniraj
Download Full-Text

The Effect of Data Hiding at Various Bit Positions on Audio Stegnography in DCT Domain
Sahib Khan, Umar Said, Ejaz Ahmad, Fazlullah and Mukhtair Ali
Download Full-Text

A High-Speed Residue-to-Binary Converter for Three-Moduli Set
Amani Goniemat and Andraws Swidan
Download Full-Text

The Effect of Various Number of Least Significant Bits substitution in Audio using Discrete Cosine Transform
Sahib Khan, Umar Said, Ejaz Ahmad, Fazlullah and Mukhtair Ali
Download Full-Text

The True Powers of Multi-core Smartphones
Dhuha Basheer Abdullah and Mohammed M. Al-Hafidh
Download Full-Text

An Energy Efficient Data Redundancy Reduction Approach for Data Aggregation in WSN
Bharathi M A, B P Vijayakumar and D H Manjaiah
Download Full-Text

An Expert System for Diabetic Microvascular Complication Diagnosis
Truc Ly Thi Nguyen and Nhon Van Do
Download Full-Text

An online collaborative framework for orthography system development
Sook-Kuan Chin, Alvin W. Yeo and Nadianatra Musa
Download Full-Text

Optimal Transmission Power of target tracking with Quantized Measurement in WSN
Amr Lotfy Elewa Mohamed and Osama El-Ghandour
Download Full-Text

Implementation of Information and Communication Technology in Inclusive Education in Nigeria: Future Perspective
Eskay M., Ezegbe, N., Anyanwu, J. and Ikwumelu, S. N.
Download Full-Text

Dimension Reduction in Intrusion Detection Features Using Discriminative Machine Learning Approach
Karan Bajaj and Amit Arora
Download Full-Text

A Novel Design to Increase Trust in Cloud IaaS model
Jitendra Kumar Seth and Satish Chandra
Download Full-Text

Continuous Improvement of Production system in Algerian Industry
Mechenene Athmane and Aouag Hichem
Download Full-Text

IJCSI Volume 10, Issue 4, No 1, July 2013

Download Full-Text

IJCSI Volume 10, Issue 4, No 2, July 2013

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »