IJCSI Open Access Publications
IJCSI Thesis Publications IJCSI Conference Special Issues Search Publications, Authors, More...
IJCSI Volume 12, Issue 6, November 2015
Javier Francisco Guerrero Rázuri
Download Full-Text
DSMO Sensorless Control of BLDCM Based on Exponential Approach Law
Fan Qigao, Sun Yan, Wu Yaheng and Sun Biwen
Download Full-Text
Real-world Deployment of a Smart and Green Wireless Sensor Network for Intrusion Detection
Maïssa Mbaye, Mohamed Aymen Chalouf, Francine Krief and Martin Peres
Download Full-Text
A Formal Definition of Model Composition Traceability
Youness Laghouaouta, Adil Anwar and Mahmoud Nassar
Download Full-Text
Representation Schemes Used by Various Classification Techniques-A Comparative Assessment
Abdallah Alashqur
Download Full-Text
Intergenerational Learning for the E-Inclusion of Senior Citizens through the prism of the GRANKIT Project
Athanasios Drigas and Yannis Papagerasimou
Download Full-Text
From Detection to Exposure: Critical Perspective ofEmotion Awareness Technology
Ohoud Alharbi and Sunakshi Gupta
Download Full-Text
Curbing cyber-crime and Enhancing e-commerce security with Digital Forensics
Israel D. Fianyi
Download Full-Text
Development of a university educational software used for teaching of computer networks addressing
Lizzie Edmea Narváez Díaz, Victor Manuel Chi Pech, Erika Rossana Llanes Castro and José Luis López Martínez
Download Full-Text
SRL based Plagiarism Detection System for Malayalam Documents
Sindhu.L and Sumam Mary Idicula
Download Full-Text
Towards an Interoperable Identity Management Framework: a Comparative Study
Samia El Haddouti and Mohamed Dafir Ech-Cherif El Kettani
Download Full-Text
Sustainable manufacturing in SMEs: Technology options
Rhythm Wadhwa
Download Full-Text
Ventral side of a Leaf Image: Another Alternative for Leaf Image Classification
Arun Kumar
Download Full-Text
Use of Educational Software in Mathematics Teaching: Case Yucatan, Mexico
Carlos Miranda-Palma, Maximiliano Canche-Euán and Erika Llanes-Castro
Download Full-Text
Towards addressing Legal Compliance in Manufacturing Automation Systems
Rhythm Wadhwa
Download Full-Text
Development and implementation of a mobile application for announcing academic activities
Alfonso Pool, José Luis López-Martínez, Sergio Alejandro González Segura and Victor Manuel Chi-Pech
Download Full-Text
Fuzz-PageRanking for Google Search Engine
Tahseen Jilani, Ubaida Fatima and Mirza Mahmood Baig
Download Full-Text
A Survey: Brain tumor detection techniques of Computer aided diagnosis through MRI image
Nikita Singh and Naveen Choudhary
Download Full-Text
Randomized Passcode Generation For Triple-Stegging Using DWT And ECC
Shivanand S. Gornale and Nuthan A.C
Download Full-Text
Challenges in implementing BI on Big Data
Palak Anand, Rachit Gupta and Abhishek Nigam
Download Full-Text
How Advanced Persistent Threats Exploit Humans
Mercy Bere-Chitauro, Fungai Bhunu-Shava, Attlee Gamundani and Isaac Nhamu
Download Full-Text
A New Outlier Detection Approach to Discover Low Hit Web Pages Using Sequential Frequent Pattern Mining to Improve Websites Design
K. Subramanian and S.Vasuki
Download Full-Text