Tuesday 22nd of August 2017                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 12, Issue 4, July 2015
A Tool Support for Automatic Detection of Duplicate Features during Software Product Lines Evolution
Amal Khtira, Anissa Benlarabi and Bouchra El Asri
Download Full-Text

Tightly Coupled Model for Indoor Positioning based on UWB/INS
Fan Qigao, Sun Biwen and Wu Yaheng
Download Full-Text

A BBO based Procedure for Evolving Fuzzy Rules of Relaxed-criteria Negotiation in Grid Resource Allocation
Sepideh Adabi and Sahar Adabi
Download Full-Text

Combating against Web Spam through Content Features
Muhammad Iqbal and Malik Muneeb Abid
Download Full-Text

Localization for Fire Rescue Applications by Using Wireless Sensor Networks
Ahmed Elsayed Aboelhassab Brany, Sherine M.Abd El-Kader, Salwa Elramly and Hussein S. Eissa
Download Full-Text

TEC-MAC: Throughput and Energy aware Cooperative MAC Protocol in Wireless Sensor Networks
Aya Hossam
Download Full-Text

Image Segmentation Using Compound Normal with Gamma Mixture Model
Viziananda Row Sanapala, Sreenivasa Rao Kraleti and Srinivasa Rao Peri
Download Full-Text

Interestingness Measures for Classification Rule Mining: Model Selection Ability
Pannapa Changpetch and Dennis K. J. Lin
Download Full-Text

A novel probabilistic bit voter using genetic algorithm for fault-tolerant systems
Manizheh Mirsaeidi and Abbas Karimi
Download Full-Text

Segmentation by fusion of histogram-based K-means
Dalimi Hanane, Afifi Mohamed, Amar Said, Bahich Mustapha, Barj El Mostafa and Bentahar Youness
Download Full-Text

A Comparative Study on Energy Efficient Routing Protocols in Wireless Sensor Networks
Priyanka Sharma and Inderjeet Kaur
Download Full-Text

An Automated Approach to Detect Deauthentication and Disassociation Dos Attacks on Wireless 802.11 Networks
Haitham Ameen Noman, Shahidan M. Abdullah and Haydar Imad Mohammed
Download Full-Text

Facilitate Access ability and Provide Security for Handicap Person Computers
Farah Tareq Mohammed and Mohammad Tarik Mohammad
Download Full-Text

Computational Based Analysis for Internal Ribosome Entry Site (IRES) and Viral Replication in FMDV
Amr Badr, Ahmed Farouk Al-Sadek and Alaa Eldin Abdallah Yassin
Download Full-Text

New method of tumor detection using K-means classifier and thresholding process
Sara Sandabad, Achraf Benba, Yassine Sayd Tahri and Ahmed Hammouch
Download Full-Text

Storage and Bayesian modeling of data on the social resilience:Case of Orphans and Vulnerable Children (OVCs) in Cote dIvoire
Kouassi Bernard Saha, Odilon Yapo M. Achiepo, Konan Marcellin Brou and Souleymane Oumtanaga
Download Full-Text

A Proposed Analysis for User Behavior
Tamer Ahmed Abdellatif, Aziza S. Asem and Mahmoud M Abd El-Latif
Download Full-Text

Resilometrical modeling of interactions in social resilience dimensions
Coulibaly Kpinna Tiekoura, Odilon Yapo M. Achiepo, Brou Konan Marcellin and Michel Babri
Download Full-Text

Spectrum Occupancy Measurements in Nigeria: Results and Analysis
Bara'u Gafai Najashi, Mohammed Dikko Almustapha, Abdiaziz Sheik Abdi and Abubakar A. Shamsuddeen
Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »