Friday 19th of April 2024                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 11, Issue 1, January 2014
An Exploration Scrutiny of Systems Performance Monitoring Tools: An Applications and Agentless Server Approach
Phumzile Nomnga and Mfundo Shakes Scott
Download Full-Text

Review and Simulation of Quantum Teleportation
Weike Liao and Soon Xin Ng
Download Full-Text

Robust stability condition for neutral-type neural networks with discrete and distributed delays
Li-Yuan Wang and Xiu-Mei Li
Download Full-Text

Novel robust stability criteria of neutral-type bidirectional associative memory neural networks
Shu-Lian Zhang and Yu-Li Zhang
Download Full-Text

New robust stability criteria of neutral-type neural networks with interval time-varying delays
Mei-Yan Lin and Li-Yuan Wang
Download Full-Text

An Efficient Algorithm to Estimate Mixture Matrix in Blind Source Separation using Tensor Decomposition
Yan-Liang Zhang and Geng Li
Download Full-Text

Existence and Local Behavior of the Cubic Pade Approximation
Lei Shi and Zhi-Min Xu
Download Full-Text

FSA based Code Sequence Checking to Prevent Mal Use of Myanmar IDNs
Tin Htay Hlaing and Yoshiki Mikami
Download Full-Text

Stochastic Model Predictive Control for optimization costs in multi-level supply chain
Tikito Kawtar
Download Full-Text

University Communication at Intelligent Ad Hoc Network using SIP services
Imad Mourtaji
Download Full-Text

Optimization of Group Decision Support System in Updated Pranata Mangsa System Using Fuzzy Multi Criteria Decision Making (FMCDM) Method
Sri Winarso Martyas Edi, Kristoko Dwi Hartomo and Sri Yulianto Joko Prasetyo
Download Full-Text

Opportunistic Spectrum Access in Cognitive Radio Ad Hoc Networks
Tarek Mohamed Ibrahim Salem, Sherine Mohamed Abd El-Kader, Salah Ramadan Abd-Elmagied and Mohamed Zaki Abd-Elmagied
Download Full-Text

3D Object Reconstruction Using Single Image
M.A. Mohamed, A.I. Fawzy and E.A. Othman
Download Full-Text

Iris Detection and Normalization in Image Domain Based on Morphological Features
Mohamed A. Mohamed, Mohy Eldin A. Abou-El-Soud and Marwa M. Eid
Download Full-Text

An Enhanced AODV routing protocol for MANETs
Ashraf Abdel-Karim Abu-Ein and Jihad Nader
Download Full-Text

Comparative Analysis of IDF Methods to Determine Word Relevance in Web Document
Jitendra Nath Singh
Download Full-Text

Modeling Switched Behavior with Hybrid Bond Graph : Application to a Tank System
Slim Triki, Taher Mekki and Anas Kamoun
Download Full-Text

Adaptive Algorithms for Wormhole-Routed Single-Port Mesh-Hypercube Network
Mahmoud Omari
Download Full-Text

An Efficient Pipelined Technique for Signcryption Algorithms
Ghada F. El Kabbany, Heba K. Aslan and Mohamed M. Rasslan
Download Full-Text

A Comprehensive Review for Disk Scheduling Algorithms
John Ryan E. Celis, Dennis B. Gonzales, Erwinaldgeriko F. Lagda and Larry T. Rutaquio Jr.
Download Full-Text

Increase the efficiency of Network on Chip using buffer sharing mechanism
Farid Daneshgar and Majid Taghipoor
Download Full-Text

Performance Analysis of LTE-Advanced Physical Layer
Mohamed Abd El-Azim Mohamed, Heba Mohamed Abd El-Atty, Mohy El-Din Ahmed Abo El-Seoud and Walid Mohamed Raslan
Download Full-Text

New Generalized Interval Arithmetic and its applications to structural mechanics and electrical circuits
Hassan Badry Mohamed Ahmed El-Owny
Download Full-Text

Analysis the Impacts of Transmission Range of AODV and DSDV Ad-Hoc Network Protocols Performance over Mobile WiMAX Networks
Zayed- Us- Salehin and Sumon Kumar Debnath
Download Full-Text

Hierarchical Cluster-Based Routing Protocols for Wireless Sensor Networks - A Survey
Alia Sabri and Khalil Al-Shqeerat
Download Full-Text

Numerical study of double diffusive convection in a cylindrical annular geometry Validation and mesh sensibility
Bouchra Cheddadi, Rajae Aboulaich and Abdelkhalek Cheddadi
Download Full-Text

Developing Web-Based Semantic Expert Systems
Mostafa Nofal and Khaled M. Fouad
Download Full-Text

Image Restoration using Multilayer Neural Networks with Minimization of Total Variation Approach
Mohammed Debakla, Khalifa Djemal and Mohamed Benyettou
Download Full-Text

Fingerprint Classification Techniques: A Review
Alaa Ahmed Abbood and Ghazali Sulong
Download Full-Text

A New Technique for Adding Scribbles in Video Matting
Neven Galal Hamdi, Hossam El-Din Moustafa and F. E.Z. Abou-Chadi
Download Full-Text

Presenting a Novel Method for Mining Association Rules Using Binary Genetic Algorithm
Salah Karimi Haji Pamagh
Download Full-Text

A Decentralized Fault Tolerant model for Grid Computing
Mohammed Rebbah, Yahya Slimani and Abdelkader Benyettou
Download Full-Text

Detection of Reliable Pareto Software Using SPRT
Sridevi Gutta and Satya Prasad Ravi
Download Full-Text

Secure routing in Mobile Ad hoc Networks: Laurel verification based Node Selection Strategy
K Sreenivasulu, E V Prasad and A Subramanyam
Download Full-Text

Dorsal Hand Vein Image Contrast Enhancement Techniques
A. Djerouni, H. Hamada, A.Loukil and N. Berrached
Download Full-Text

Imposing fairness in electronic commerce- Using Trusted Third Party for electronic product delivery
Fahad A.Alqahtani
Download Full-Text

A Hybrid Rough-Neuro model For Diagnosing Erythemato-Squamous Diseases
Shahenda Sarhan, Enas Elharir and Magdi Zakaria
Download Full-Text

Directory Compaction Techniques for Space Optimizations in ExFAT and FAT File Systems for Embedded Storage Devices
Keshava Munegowda, G T Raju and Veera Manikandan Raju
Download Full-Text

A Mobile Agent Approach for IDS in Mobile Ad Hoc Network
Yousef El Mourabit, Ahmed Toumanari and Hicham Zougagh
Download Full-Text

Beyond Recommenders and Expert Finders, processing the Expert Knowledge
Minakshi Gujral and Satish Chandra
Download Full-Text

Classification and Recognition of Fingerprints using Self Organizing Maps(SOM)
J.B.Hayfron-Acquah and Mavis S. Gyimah
Download Full-Text

A Proposed Cryptosystem Algorithm Based on Two Different Chaotic Systems (PCA2CS) for Securing the Colored Images
Osama M. Abu Zaid and Moussa Demba
Download Full-Text

An Algorithm Forecasting Time Series Using Wavelet
Kais Ismail Ibraheem and Eman Bacheer Abdelahad
Download Full-Text

A Survey of Health Effects of Electromagnetic Fields
Mohamed Sami Mohamed Zewita
Download Full-Text

Restoration and Deblured Motion Blurred Images
Salem Saleh Ahmed Al-Amri and Ali Salem Ali
Download Full-Text

A Contractual Specification of Functional and Non-Functional Requirements of Domain-Specific Components
Maryem Rhanoui and Bouchra El Asri
Download Full-Text

Automatic Named Entity Identification and Classification using Heuristic Based Approach for Telugu
P. M. Yohan, B. Sasidhar, Sk. Althaf Hussain Basha and A. Govardhan
Download Full-Text

Morphology Based POS Tagging on Telugu
Srinivasu Badugu
Download Full-Text

A Best Approach In Intrusion Detection For Computer Network PNN-GRNN-RBF
Farzad Fekrazad
Download Full-Text

Exploring Technical Deployments of IPv6 on University LANs
Shadreck Mudziwepasi and Shakes Mfundo Scott
Download Full-Text

The Homogeneity Indicator of Learners in Project-based Learning
Benjelloun Touimi Yassine, Faddouli Nourredine, Bennani Samir and Mohammed Khalidi Idrissi
Download Full-Text

VoIP versus VoMPLS Performance Evaluation
M.A. Mohamed, M.M. Awad and H.A. Sakr
Download Full-Text

Information Security Modelling In an E-Learning Environment
Ann Baby and A.Kannamamal
Download Full-Text

Risk Factors in Construction Projects Cash-Flow Analysis
Mohamed Abd El Razek, Hossam El Din Hosny and Ahmed El Beheri
Download Full-Text

HW/SW Classification of Images of FPGA
Sami El Moukhlis, Sami El Moukhlis, Abdessamad Elrharras, Abdessamad Elrharras, Abdelatif Hamdoun and Abdelatif Hamdoun
Download Full-Text

Revealing a Novel Method for Detecting Positive and Negative Optimal Performance Association Rules in Very Large Databases Using BPSO
Salah Karimi Haji Pamagh, Mehdi Afzali and Amir Sheilkh Ahmadi
Download Full-Text

A pattern based methodology for evolution management in business process reuse
Hanae Sbai, Mounia Fredj and Laila Kjiri
Download Full-Text

Efficient Web Data Extraction Using Clustering Approach in Web Usage Mining
Neeraj Raheja and V.K. Katiyar
Download Full-Text

Secure Remote Access to Devices in a Smart Grid
Eric Mccary
Download Full-Text

SMES Adoption of Web-based Marketing Empirical Evidence from Kenya
Omanga Cleophas Mochoge
Download Full-Text

From Human-Computer Interaction to Human-Robot Social Interaction
Toumi Tarek and Zidani Abdelmadjid
Download Full-Text

Approach for the formal modeling of requirements, verification, and architecture of a multi-agent robotic system
Nadeem Akhtar and Anique Akhtar
Download Full-Text

Breast Cancer Detection Based on Watershed Transformation
Sura Ramzi Shareef
Download Full-Text

Change detection in Migrating Parallel Web Crawler: A Neural Network Based Approach
Md Faizan Farooqui, Md Rizwan Beg and Md Qasim Rafiq
Download Full-Text

Practical application of a light-weight formal implementation for specifying a multi-agent robotic system
Nadeem Akhtar and Malik M. Saad Missen
Download Full-Text

Validation of Architecture of Migrating Parallel Web Crawler using Finite State Machine
Md Faizan Farooqui, Md Rizwan Beg and Md Qasim Rafiq
Download Full-Text

Using Genetic Algorithms to Optimize Wavelet Neural Networks Parameters for Function Approximation
Mohammed Awad
Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Email: info@ijcsi.org

More contact details »