IJCSI Open Access Publications
IJCSI Thesis Publications IJCSI Conference Special Issues Search Publications, Authors, More...
IJCSI Volume 11, Issue 4, July 2014
Jacques Saraydaryan, Fabrice Jumel and Adrien Guenard
Download Full-Text
FPGA-based load test accelerator
Anton Borodin
Download Full-Text
Adaptive Information Provisioning in Distributed Context Centric Architectures
Jamie Walters, Theo Kanter and Rahim Rahmani
Download Full-Text
Digital Educational Resource to support the Computer Networks Course
Lizzie Narváez Díaz, Victor Chi Pech, Carlos Miranda Palma and José López Martínez
Download Full-Text
Adapting eSpeak for converting text into speech in Albanian
Me Ntor Hamiti and Ramiz Kastrati
Download Full-Text
Tensity Research Based on the Information of Eye Movement
Yi Wang and Zhiliang Wang
Download Full-Text
A new Watermarking Technique for Medical Image using Hierarchical Encryption
Med Karim Abdmouleh, Ali Khalfallah and Med Salim Bouhlel
Download Full-Text
A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and their Prevention and Detection Techniques
Bojken Shehu and Aleksander Xhuvani
Download Full-Text
Clustered Hierarchical Concept Based Semantic Closeness Between Two Concepts Using WordNet
Boddu Bhaskara Rao and V. Valli Kumari
Download Full-Text
An Efficient Protective Layer Against SQL Injection Attacks
Bojken Shehu and Aleksander Xhuvani
Download Full-Text
Human Action Recognition based on MSVM and Depth Images
Ahmed Taha, Hala H. Zayed, M. E. Khalifa and El-Sayed El-Horbaty
Download Full-Text
Boosting Facial Expression Recognition in a Noisy Environment Using LDSP-Local Distinctive Star Pattern
Mohammad Shahidul Islam, Tarikuzzaman Emon and Tarin Kazi
Download Full-Text
Elaboration of implicative graph according to measure MGK
Bemarisika Parfait and Totohasina André
Download Full-Text
Image Compression Using Wavelets
Tarlok Singh, Pooja and Pammy Manchanda
Download Full-Text
Performance Analysis of LTE Physical Layer based on 3GPP-Release-8
M.A. Mohamed, M.M. Abdel-Razzak and A.N. Gamal
Download Full-Text
Performance Evaluation of some Routing Protocols using TCP Traffic Types in Mobile Ad Hoc Networks
Hassan Al-Mahdi, Mohamed Wahed, Tarek M Mahmoud and Hassan Shaban
Download Full-Text
Performance Evaluation of Three Node Tandem Communication Network Model with feedback for first two nodes having Homogeneous Poisson arrivals
G.Naga Satish, Ch.V.Raghavendran, M.V.Rama Sundari and P.Suresh Varma
Download Full-Text
Performance Evaluation of HEVC Over Broadband Networks
Saeed Ur Rehman and Gulistan Raja
Download Full-Text
Analysis of Competence Level and the Attendance of the Lecturer in Its Effects on Students Grade Using Fuzzy Quantification Theory
Hindayati Mustafidah and Suwarsito
Download Full-Text
Particle Swarm Optimized Fuzzy Controller for Indirect Vector Control of Multilevel Inverter fed Induction Motor
Sanjaya Kumar Sahu, T.V. Dixit and D.D. Neema
Download Full-Text
Calculation of Unpredictable Time Deviation from Defined Enterprise Information System Recovery Effort in Emergency Situations
Athanasios Podaras
Download Full-Text
An Automatic Sleep-Wake Classifier Using ECG Signals
Werteni Hayet, Slim Yacoub and Noureddine Ellouze
Download Full-Text
Implementing a Prototype Diabetic Telemedicine System
Ladan Soltanzadeh, Arezou Taheri and Mohammad Rabiee
Download Full-Text
Temporal Absence in Recommendations: a survey of Temporal Patterns in Netflix Prize Data
Mulang\' Isaiah Onando and Waweru Ronald Mwangi
Download Full-Text
A Martingale Approach to Detect Peak of News in Social Network
Saba Babakhani, Niloofar Mozaffari and Ali Hamzeh
Download Full-Text
Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment
Er.Navreet Singh
Download Full-Text
Image Features As a Feed To Rough Sets for Fire/Smoke Detection
Jean Paul Dukuzumuremyi, Beiji Zou and Damien Hanyurwimfura
Download Full-Text
Application of robotic assisted technology and imaging devices in autopsy and virtual autopsy
Ladan Soltanzadeh
Download Full-Text
A Survey of VPN Security Issues
M.A. Mohamed, Mohy Abo-Elsoud and A.M. El-Feki
Download Full-Text
Algorithmic Solution To Reduce Storage Overhead On Cloud Based System
Dhanashri P. Joshi and N. P. Kulkarni
Download Full-Text
Streaming Algorithm For Multi-path Secure Routing in Mobile Networks
As\'ad Mahmoud As\'ad Alnaser
Download Full-Text
WaSS: A Novel Hybrid Method for Object Recognition Using Wavelet based Statistical and Structural Approaches
G.Karuna, B.Sujatha and P.Chandrasekhar Reddy
Download Full-Text
Email Filtering and Analysis Using Classification Algorithms
Akanksha Pandey, Akshay Iyer, Karmanya Pathak, Dipti Pamnani and Jayshree Hajgude
Download Full-Text
Mobile Based System for Palestine Exchange Management
Aseel Kmail and Osama Salameh
Download Full-Text
Optical Encryption Techniques: An Overview
M.A. Mohamed, A.S.M. Samrah and M.I. Fath Allah
Download Full-Text
Software Architectures: A Comparative Study for Web Based Applications
Raheela Nasim
Download Full-Text
Design of an Ultra-Wideband Antenna using Split Ring Resonator
Abdelghani Nacer and Noureddine Boukli Hacene
Download Full-Text
Analysis of Various Crop Yields in Different Spatial Locations of Karimnagar District in AP
Ch.Mallikarjuna Rao, A.Ananda Rao and N.Madhusudhana Reddy
Download Full-Text
Extracting Essential Business Entities from BPMN Models
Rana Yousef
Download Full-Text
Investigation Of Multi Joint Jumping Robot Movement
Jamil Al Azzeh, Ludmila U. Vorochaeva, Vadim V. Serebrovskiy and Sergey F. Yatsun
Download Full-Text
Performance of COFDM Technology for the Fourth Generation (4G) of Mobile System with Convolutional Coding and Viterbi Decoding
Djamel Slimani and Mohammed F. Alsharekh
Download Full-Text
Incorporating Information Technology in a Nigerian Learning Environment: the case for a Courseware Solution
Denye .N. Ogeh and Segun .A. Fatumo
Download Full-Text
SN2SMS - Location-Aware Social Network Based Health-Care Recommendation System
Tareef Ali Khan, Hina Asmat, Faisal Shahzad, M. Faheem Mushtaq, Malik Muhammad Saad Missen and Nadeem Akhtar
Download Full-Text
VideoWatermarking using Discrete Slantlete Transform
Arwa Hameed Mohammed Taqi and Ahmed Toman Thahab
Download Full-Text
Calculation of Multiconductor transmission line capacitance of elliptical shape using numerical method
, Saih Mohamed, , Rouijaa Hicham, and Ghammaz Abdelilah
Download Full-Text
Performance Analysis of the Proxy Mobile IPv6 (PMIPv6) and Multiprotocol Label Switching (MPLS) Integration
Juan P. Pantoja, Danny A. Solano, Oscar J. Calderón, Bazil Taha Ahmed and Jesus Hamilton Ortiz
Download Full-Text
FHAMIPv6/AHRA vs FHAMIPV6/AODV
Jesús Hamilton Ortiz Monedero, Bazil Taha Ahmed and Jaime Daniel Mejía Castro
Download Full-Text
Factors Affecting the Adoption of ICT in the Hospitality Industry in Imo State
Nwakanma Ifeanyi Cosmas, Ubani E.C., Asiegbu B.C. and Nwokonkwo O.C
Download Full-Text
Finding Correlation between Content Based Features and the Popularity of a Celebrity on Twitter
Muhammad Asghar, M. Faheem Mushtaq, Hina Asmat, Malik Muhammad Saad Missen, Tareef Ali Khan and Saleem Ullah
Download Full-Text