Monday 1st of May 2017                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 11, Issue 4, July 2014
ASTRO: Architecture of Services Toward Robotic Objects
Jacques Saraydaryan, Fabrice Jumel and Adrien Guenard
Download Full-Text

FPGA-based load test accelerator
Anton Borodin
Download Full-Text

Adaptive Information Provisioning in Distributed Context Centric Architectures
Jamie Walters, Theo Kanter and Rahim Rahmani
Download Full-Text

Digital Educational Resource to support the Computer Networks Course
Lizzie Narváez Díaz, Victor Chi Pech, Carlos Miranda Palma and José López Martínez
Download Full-Text

Adapting eSpeak for converting text into speech in Albanian
Me Ntor Hamiti and Ramiz Kastrati
Download Full-Text

Tensity Research Based on the Information of Eye Movement
Yi Wang and Zhiliang Wang
Download Full-Text

A new Watermarking Technique for Medical Image using Hierarchical Encryption
Med Karim Abdmouleh, Ali Khalfallah and Med Salim Bouhlel
Download Full-Text

A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and their Prevention and Detection Techniques
Bojken Shehu and Aleksander Xhuvani
Download Full-Text

Clustered Hierarchical Concept Based Semantic Closeness Between Two Concepts Using WordNet
Boddu Bhaskara Rao and V. Valli Kumari
Download Full-Text

An Efficient Protective Layer Against SQL Injection Attacks
Bojken Shehu and Aleksander Xhuvani
Download Full-Text

Human Action Recognition based on MSVM and Depth Images
Ahmed Taha, Hala H. Zayed, M. E. Khalifa and El-Sayed El-Horbaty
Download Full-Text

Boosting Facial Expression Recognition in a Noisy Environment Using LDSP-Local Distinctive Star Pattern
Mohammad Shahidul Islam, Tarikuzzaman Emon and Tarin Kazi
Download Full-Text

Elaboration of implicative graph according to measure MGK
Bemarisika Parfait and Totohasina André
Download Full-Text

Image Compression Using Wavelets
Tarlok Singh, Pooja and Pammy Manchanda
Download Full-Text

Performance Analysis of LTE Physical Layer based on 3GPP-Release-8
M.A. Mohamed, M.M. Abdel-Razzak and A.N. Gamal
Download Full-Text

Performance Evaluation of some Routing Protocols using TCP Traffic Types in Mobile Ad Hoc Networks
Hassan Al-Mahdi, Mohamed Wahed, Tarek M Mahmoud and Hassan Shaban
Download Full-Text

Performance Evaluation of Three Node Tandem Communication Network Model with feedback for first two nodes having Homogeneous Poisson arrivals
G.Naga Satish, Ch.V.Raghavendran, M.V.Rama Sundari and P.Suresh Varma
Download Full-Text

Performance Evaluation of HEVC Over Broadband Networks
Saeed Ur Rehman and Gulistan Raja
Download Full-Text

Analysis of Competence Level and the Attendance of the Lecturer in Its Effects on Students Grade Using Fuzzy Quantification Theory
Hindayati Mustafidah and Suwarsito
Download Full-Text

Particle Swarm Optimized Fuzzy Controller for Indirect Vector Control of Multilevel Inverter fed Induction Motor
Sanjaya Kumar Sahu, T.V. Dixit and D.D. Neema
Download Full-Text

Calculation of Unpredictable Time Deviation from Defined Enterprise Information System Recovery Effort in Emergency Situations
Athanasios Podaras
Download Full-Text

An Automatic Sleep-Wake Classifier Using ECG Signals
Werteni Hayet, Slim Yacoub and Noureddine Ellouze
Download Full-Text

Implementing a Prototype Diabetic Telemedicine System
Ladan Soltanzadeh, Arezou Taheri and Mohammad Rabiee
Download Full-Text

Temporal Absence in Recommendations: a survey of Temporal Patterns in Netflix Prize Data
Mulang\' Isaiah Onando and Waweru Ronald Mwangi
Download Full-Text

A Martingale Approach to Detect Peak of News in Social Network
Saba Babakhani, Niloofar Mozaffari and Ali Hamzeh
Download Full-Text

Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment
Er.Navreet Singh
Download Full-Text

Image Features As a Feed To Rough Sets for Fire/Smoke Detection
Jean Paul Dukuzumuremyi, Beiji Zou and Damien Hanyurwimfura
Download Full-Text

Application of robotic assisted technology and imaging devices in autopsy and virtual autopsy
Ladan Soltanzadeh
Download Full-Text

A Survey of VPN Security Issues
M.A. Mohamed, Mohy Abo-Elsoud and A.M. El-Feki
Download Full-Text

Algorithmic Solution To Reduce Storage Overhead On Cloud Based System
Dhanashri P. Joshi and N. P. Kulkarni
Download Full-Text

Streaming Algorithm For Multi-path Secure Routing in Mobile Networks
As\'ad Mahmoud As\'ad Alnaser
Download Full-Text

WaSS: A Novel Hybrid Method for Object Recognition Using Wavelet based Statistical and Structural Approaches
G.Karuna, B.Sujatha and P.Chandrasekhar Reddy
Download Full-Text

Email Filtering and Analysis Using Classification Algorithms
Akanksha Pandey, Akshay Iyer, Karmanya Pathak, Dipti Pamnani and Jayshree Hajgude
Download Full-Text

Mobile Based System for Palestine Exchange Management
Aseel Kmail and Osama Salameh
Download Full-Text

Optical Encryption Techniques: An Overview
M.A. Mohamed, A.S.M. Samrah and M.I. Fath Allah
Download Full-Text

Software Architectures: A Comparative Study for Web Based Applications
Raheela Nasim
Download Full-Text

Design of an Ultra-Wideband Antenna using Split Ring Resonator
Abdelghani Nacer and Noureddine Boukli Hacene
Download Full-Text

Analysis of Various Crop Yields in Different Spatial Locations of Karimnagar District in AP
Ch.Mallikarjuna Rao, A.Ananda Rao and N.Madhusudhana Reddy
Download Full-Text

Extracting Essential Business Entities from BPMN Models
Rana Yousef
Download Full-Text

Investigation Of Multi Joint Jumping Robot Movement
Jamil Al Azzeh, Ludmila U. Vorochaeva, Vadim V. Serebrovskiy and Sergey F. Yatsun
Download Full-Text

Performance of COFDM Technology for the Fourth Generation (4G) of Mobile System with Convolutional Coding and Viterbi Decoding
Djamel Slimani and Mohammed F. Alsharekh
Download Full-Text

Incorporating Information Technology in a Nigerian Learning Environment: the case for a Courseware Solution
Denye .N. Ogeh and Segun .A. Fatumo
Download Full-Text

SN2SMS - Location-Aware Social Network Based Health-Care Recommendation System
Tareef Ali Khan, Hina Asmat, Faisal Shahzad, M. Faheem Mushtaq, Malik Muhammad Saad Missen and Nadeem Akhtar
Download Full-Text

VideoWatermarking using Discrete Slantlete Transform
Arwa Hameed Mohammed Taqi and Ahmed Toman Thahab
Download Full-Text

Calculation of Multiconductor transmission line capacitance of elliptical shape using numerical method
, Saih Mohamed, , Rouijaa Hicham, and Ghammaz Abdelilah
Download Full-Text

Performance Analysis of the Proxy Mobile IPv6 (PMIPv6) and Multiprotocol Label Switching (MPLS) Integration
Juan P. Pantoja, Danny A. Solano, Oscar J. Calderón, Bazil Taha Ahmed and Jesus Hamilton Ortiz
Download Full-Text

FHAMIPv6/AHRA vs FHAMIPV6/AODV
Jesús Hamilton Ortiz Monedero, Bazil Taha Ahmed and Jaime Daniel Mejía Castro
Download Full-Text

Factors Affecting the Adoption of ICT in the Hospitality Industry in Imo State
Nwakanma Ifeanyi Cosmas, Ubani E.C., Asiegbu B.C. and Nwokonkwo O.C
Download Full-Text

Finding Correlation between Content Based Features and the Popularity of a Celebrity on Twitter
Muhammad Asghar, M. Faheem Mushtaq, Hina Asmat, Malik Muhammad Saad Missen, Tareef Ali Khan and Saleem Ullah
Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »