Sunday 26th of February 2017                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 10, Issue 6, November 2013
A Comparative Study of Machine Learning Methods for Verbal Autopsy Text Classification
Samuel Danso, Eric Atwell and Owen Johnson
Download Full-Text

New Approach for Identity Verification System Using the Vital Features Based on Entropy
Mohamed A. El-Sayed, S. F.Bahgat and S. Abdel-Khalek
Download Full-Text

Conceptual Framework for Internet of Things Virtualization via OpenFlow in Context-aware Networks
Rahim Rahmani
Download Full-Text

A Survey Paper: Areas, Techniques and Challenges of Opinion Mining
Ayesha Rashid
Download Full-Text

Development of a tool based on mobile services in a WiFi network as support of tutorial activity
Maximiliano Canche Euán, Erika Rossana Llanes Castro, Nelly Leal Pérez and Cinhtia Maribel González Segura
Download Full-Text

Interaction Relationship between Symmetry and Arts in the Kingdom of Saudi Arabia
Amer Salman
Download Full-Text

A Multi Objective Chance Constrained Programming Model for Intermodal Logistics with Uncertain Time
Maria Kalinina, Leif Olsson and Aron Larsson
Download Full-Text

From Partial Element Equivalent Circuit (PEEC) to muphyPEEC for Solving Coupled Multiphysics Problems
Vjosa Shatri, Ruzhdi Sefa, Lavdim Kurtaj and Avni Skeja
Download Full-Text

Opportunistic Cognitive MAC (OC-MAC) Protocol for Dynamic Spectrum Access in WLAN Environment
Ateeq Ur Rehman
Download Full-Text

Smart Braille System Recognizer
Aisha Mousa, Hazem Hiary, Raja Alomari and Loai Alnemer
Download Full-Text

Game for Mayan Speaking Children with Speech Recognition Provided by an English Speech Corpus
Jorge Rafael Pech Uicab, Carlos Andrés Miranda Miranda, Victor Manuel Chi Pech and Sergio Alejandro González Segura
Download Full-Text

A maturity model for Business Intelligence System project in Small and Medium-sized Enterprises: an empirical investigation
Faycal Fedouaki, Chafik Okar and Semma El Alami
Download Full-Text

Estimation of Resources Availability in OBS Networks: A QoS-Based Approach
Amor Lazzez
Download Full-Text

Traceability and Data Support in SME Manufacturing
Rhythm Suren Wadhwa
Download Full-Text

Contrast Enhancement of HDR images using genetic Algorithm with efficient Fitness Value
Ram Ratan Ahirwal, Rameshwar Nath Pathak and Y.K Jain
Download Full-Text

Extended Breadth-First Search Algorithm
Tamás Kádek and János Pánovics
Download Full-Text

Design of Data Warehouse System to Support the Quality Management of Information Technology Based School
Didik Nugroho, Sri Siswanti, Tri Irawati and Kustanto
Download Full-Text

Review of Software Reuse Processes
Ljupcho Antovski and Florinda Imeri
Download Full-Text

A Detailed Study of E-government Readiness in Jordan
Tamara Almarabeh and Omar Aladwan
Download Full-Text

Supercharging Enterprise 2.0 Analytics modules with SNA metrics
Benhiba Lamia and Mohammed Abdou Janati-Idrissi
Download Full-Text

Reverse Converter for the Moduli Set {2n-1, 2n, 2n+1} Base on Grouping Number
Saeid Bahanfar and Nadali Zarei
Download Full-Text

Using Image Processing Functions to Determine the Edges of the Dead Sea and Calculate the Declining Rate
Muaad Abu-Faraj and Nazeeh Ghatasheh
Download Full-Text

Wavelet Fractal Image Watermarking System
Itimad Raheem Ali and Itimad Raheem Ali
Download Full-Text

Path Tracking Control of Tracked Vehicle
Han Qing-Jue and LIU Shao-jun
Download Full-Text

Design, Analysis and Implementation of Semantic Web Applications
Sani Danjuma, Jun Zhou, Hongyan Mei, Ahmed Aliyu and Usman Waziri
Download Full-Text

Survey of Flocking Algorithms in Multi-agent Systems
Aabha Barve and Manisha J. Nene
Download Full-Text

A Novel Approach for Canvas Accessibility Problem in HTML5
Paniz Alipour Aghdam and Reza Ravanmehr
Download Full-Text

Web Scraping Framework based on Combining Tag and Value Similarity
Shridevi Appayya Swami
Download Full-Text

Privacy Preserving Association Rule Mining based on the Intersection Lattice and Impact Factor of Items
Bonam Janakiramaiah, Ramamohan Reddy A and Kalyani G
Download Full-Text

Textural Approach for Mass Abnormality Segmentation in Mammographic Images
Khamsa Djaroudib, Abdelmalik Taleb Ahmed and Abdelmadjid Zidani
Download Full-Text

Feature Based Registration for Panoramic Image Generation
Kawther Abbas Sallal and Abdul-Monem Saleh Rahma
Download Full-Text

A Heuristic Algorithm For QoS (Non-Functional) Based Service Matching
Islam Harb, Hassan Farahat and Mohamed Ezz
Download Full-Text

Permutation Binomials of the form {symbols}
Zengxiang Li, Xishun Zhu and Delong Wan
Download Full-Text

A New Machine Learning Approach for Arabic-English Documents Classification
Walid Mohamed Aly, Wafaa Hanna Sharaby and Hany Atef Kelleny
Download Full-Text

On cubic Pade Approximation to the exponential function and its application in solving diffusion-convection equation
Jing-Hua Gao and Mei-Yan Lin
Download Full-Text

A New Trust Reputation System for E-Commerce Applications
Rahimi Hasnae and Elbakkali Hanan
Download Full-Text

Image Denoising with Linear and Non-Linear Filters: A Review
Bhumika Gupta and Shailendra Singh Negi
Download Full-Text

Development of an Innovative Internet of Things Security System
Omar Said
Download Full-Text

The Use of Intelligent Tutoring System for Developing Web-based Learning Communities
Ahmed Ragheb Mohamed Salman
Download Full-Text

Automatic Detection and Recognize Different Shapes in an Image
Nidhal Khdhair El Abbadi and Lamis H. Al Saadi
Download Full-Text

A Survey on using Data Mining Techniques for Online Social Network Analysis
Gypsy Nandi and Anjan Das
Download Full-Text

Extending Certificateless Authentication for Wireless Sensor Networks: A Novel Insight
Gaurav Sharma, Suman Bala and Anil K Verma
Download Full-Text

An Evolutionary approach for solving Shrodinger Equation
Khalid Jebari, Mohammed Madiafi and Abdelaziz Elmoujahid
Download Full-Text

Enhanced Authentication Protocol EAP-TTLS using encrypted ECDSA
Nazanin Bahrami, Mohamad Ebrahim Shiri and Morteza Salari Akhgar
Download Full-Text

State of the Art of Copy-Move Forgery Detection Techniques-A Review
Salam A.Thajeel and Ghazali Bin Sulong
Download Full-Text

Automatic Detection of Vascular Bifurcations and Crossovers in Retinal Fundus Image
Nidhal Khdhair El Abbadi and Enas Hamood Al-Saadi
Download Full-Text

A Hybrid DPCM-DCT and RLE Coding for Satellite Image Compression
Khaled Sahnoun and Noureddine Benabadji
Download Full-Text

Cluster Based Data Transfer Strategy for Layered Wireless Sensor Network
Santhana Krishnan. B and Ramaswamy. M
Download Full-Text

Design of Information Technology in Enhancing the Quality of M-Learning-Based Learning at Diponegoro University
Oky Dwi Nurhayati and Kurniawan Teguh M
Download Full-Text

Panoramic dental X-ray image compression using Wavelet filters
J.Nancy, J.Wilson and K.Vinothkumar
Download Full-Text

Statistical Analysis of Laws Mask Texture Features for Cancer and Water Lung Detection
Heba Ahmed Elnemr
Download Full-Text

Data Hiding over Mobile Phones using Socket Network Communication
Ahmed S. Nori and Shatha A. Baker
Download Full-Text

Microarray Gene Expression Extraction and Archiving Based on Local Spot Locations
Omar Adwan, Amjad Hudaib, Hussam Nawwaf Fakhouri and Loai M. Alnemer
Download Full-Text

A study of risk management in cloud computing bank
Dou El Kefel Mansouri and Mohamed Benyettou
Download Full-Text

Geographic Information System of Local Poverty Reduction Using Basic Need Approach Concept with Fuzzy Multi-Criteria Decision Analysis Method
Hartomo Kristoko, Wowor Danny, Trihandaru Suryasatriya and Yulianto Sri
Download Full-Text

Parallel GPU Implementation of Hough Transform for Circles
Meisam Askari, Hossein Ebrahimpour, Azam Asilian Bidgoli and Farahnaz Hosseini
Download Full-Text

Geographic Information System of Critical Level of Land Degradation Based on Agro-ecological Zone in Agricultural Areas with Recombination Method of Fuzzy Logic and Scoring
Sri Yulianto Joko Prasetyo, Bistok Hasiholan Simanjuntak, Mila Paseleng, Kristoko Dwi Hartomo and Bayu Nuswantoro
Download Full-Text

Performance Metrics of a Reconfigurable Fabric
Muaad Abu-Faraj
Download Full-Text

ERP Success and Logistical Performance Indicators
Fareed Ud Din and Saroop Anwer
Download Full-Text

Effective Anomaly Intrusion Detection System based on Neural Network with Indicator Variable and Rough set Reduction
Rowayda Abd El-Hamid Sadek, Mahmoud Sami Soliman and Hagar Saad El-Din El-Sayed
Download Full-Text

Searching Encrypted Data on Cloud
Muhammad Sajid Khan
Download Full-Text

Distributed Bandwidth Clustering Scheme for Node Cooperation in Intermittently Wireless Sensor Networks
B Shaji, K.L.Nisha and B.Chitra
Download Full-Text

Effect of WiMAX Networks on IPTV Technology
M.A. Mohamed, M.E.A. Abou-Elseoud and H.F. Mohamed
Download Full-Text

Telemedicine: Current and Future Perspectives
Ryhan Ebad
Download Full-Text

Scattering by Dielectric Arrays Analysis using the Extended Method of Auxiliary Sources Emas in Conjunction with Global and Partial Coupling
Hichem Naamen and Taoufik Aguili
Download Full-Text

Mining and Analysis of Tandem Repeated Patterns in Oncogenic Sequences involved in Cancer progression
Satish Kumar, Dharminder Kumar and Ashok Chaudhury
Download Full-Text

A Method to Risk Analysis in Requirement Engineering Using Tropos Goal Model with Optimized Candidate Solutions
K.Venkatesh Sharma and P.V.Kumar
Download Full-Text

Performance Analysis of RIP and OSPF in Network Using OPNET
Syed Muhammad Asif Shah and Waqas J.Rana
Download Full-Text

Trusted Wireless Security Environment turn-on in Robotics (TWSE)
A.H.Yahia, Hatem M. Elborai and Mohammed A.M. Al-Saadi
Download Full-Text

A Review of Color Image Encryption Techniques
Lahieb Mohammed Jawad and Ghazali Bin Sulong
Download Full-Text

Robust MLCR Linear Classification Technique: An Application to Classify Aede Albopictus Mosquito
Friday Zinzendoff Okwonu and Abdul Rahman Othman
Download Full-Text

Dynamic Workload Performance Optimization Model for Multiple-Tenancy in Cloud Systems
Atwine Mugume Twinamatsiko, Ali Naser Abdulhussein Abdulhussein, Jugal Harshvadan Joshi, Arash Habibi Lashkari and Mohammad Sadeghi
Download Full-Text

Investigational Study of 7 Effective Schemes of Load Balancing in Cloud Computing
Suriya Begum and Prashanth C.S.R
Download Full-Text

Enhancing the Integrity of Short Message Service (SMS) in New Generation Mobile Devices
Ramesh Yegireddi, Surya Pavan Kumar Gudla, Kiran Kumar Reddi and Naresh Tangudu
Download Full-Text

A Succinct Reflection on Data Classification Methodologies
Divyanka Hooda, Divya Wadhwa, Hardik Singh and Anuradha Dhull
Download Full-Text

A Methodology for Virtual Human Animation
Francisco A. Madera, Carlos G. Herrera and Francisco Moo-Mena
Download Full-Text

Fuzzy Based Detection and Prediction of DDOS Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network
C Balarengadurai and S Saraswathi
Download Full-Text

New LMI robust stability criteria of uncertain bidirectional associative memory neural networks
Jun Wang
Download Full-Text

Description of a Heterogeneous Handoff Algorithm
Victor Manuel Chi-Pech, Lizzie Edmea Narváez-Díaz, Francisco Alejandro González Horta and Maximiliano Canché Euán
Download Full-Text

Comparative Study of Software Quality Models
Boukouchi Youness, Marzak Abdelaziz, Benlahmer Habib and Moutachaouik Hicham
Download Full-Text

Toward a Model to describe semantic learning objetcs
Aarab Yassine, Benkaddour Abdelhamid, Aknin Noura and Aamou Souhaib
Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »