IJCSI Open Access Publications
IJCSI Thesis Publications IJCSI Conference Special Issues Search Publications, Authors, More...
IJCSI Volume 7, Issue 6, November 2010
Youssef Hannad Fabrice Mourlin
Download Full-Text
A Modified Algorithm of Bare Bones Particle Swarm Optimization
Horng-I Hsieh Tian-Shyug Lee
Download Full-Text
Web Personalization of Indian e-Commerce Websites using Classification Methodologies
Agarwal Devendera Tripathi S.P Singh J.B.
Download Full-Text
High Accuracy Myanmar Handwritten Character Recognition using Hybrid approach through MICR and Neural Network
Yadana Thein San Su Su Yee
Download Full-Text
Ontology Based Agent Communication in Resource Allocation and Monitoring
Manish Arora M. Syamala Devi
Download Full-Text
A Novel DSS Framework for E-government
A.M. Riad Hazem M. El-Bakry Gamal H. El-Adl
Download Full-Text
Real-time Error Measurement System for MVB Protocol
Su Goog Shon Soo Mi Yang
Download Full-Text
General Database Infrastructure for Image Retrieval
Carlos Alvez Aldo Vecchietti
Download Full-Text
New approach using Bayesian Network to improve content based image classification systems
Khlifia Jayech Mohamed Ali Mahjoub
Download Full-Text
SbSAD: An Integrated Service-based Software Design Framework
Mohamed Dbouk Hamid Mcheick Ihab Sbeity
Download Full-Text
Success Rules of OSS Projects using Datamining 3-Itemset Association Rule
Andi Wahju Rahardjo Emanuel Retantyo Wardoyo Jazi Eko Istiyanto Khabib Mustofa
Download Full-Text
Scalable Contents Delivery System with Dynamic Server Deployment
Yuko Kamiya Toshihiko Shimokawa Fuminori Tanizaki Norihiko Yoshida
Download Full-Text
A Survey on Performance Evaluation of Object Detection Techniques in Digital Image Processing
J. Komala Lakshmi M. Punithavalli
Download Full-Text
Optimal Provisioning of Resource in a Cloud Service
Yee Ming Chen Shin-Ying Tsai
Download Full-Text
Presenting a New Routing Protocol for increasing Lifetime of Sensor Network
Vahid Majid Nezhad Bager Zarei
Download Full-Text
A Knowledge Management Model to Improve Information Security
Yogesh Kumar Mittal Santanu Roy Manu Saxena
Download Full-Text
TH*: Scalable Distributed Trie Hashing
Aridj Mohamed Zegour Djamel Edinne
Download Full-Text
Attacks in WEB Based Embedded Applications
C.Yaashuwanth R. Ramesh
Download Full-Text
A Tool for Qualitative Causal Reasoning On Complex Systems
Tahar Guerram Ramdane Maamri Zaidi Sahnoun
Download Full-Text
Health Smart Home
Ahmad Choukeir Batoul Fneish Nour Zaarour Walid Fahs Mohammad Ayache
Download Full-Text
SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network
Rajender Nath Pankaj Kumar Sehgal
Download Full-Text
A Radio Based Intelligent Railway Grade Crossing System to Avoid Collision
Sheikh Shanawaz Mostafa Md. Mahbub Hossian Khondker Jahid Reza Gazi Maniur Rashid
Download Full-Text
Effective Approaches For Extraction Of Keywords
Jasmeen Kaur Vishal Gupta
Download Full-Text
Image Splicing Detection Using Inherent Lens Radial Distortion
H. R. Chennamma Lalitha Rangarajan
Download Full-Text
Designing A Re-Configurable Fractional Fourier Transform Architecture Using Systolic Array
Anal Acharya Soumen Mukherjee
Download Full-Text
Syllables Selection for the Development of Speech Database for Punjabi TTS System
Parminder Singh Gurpreet Singh Lehal
Download Full-Text
Personalized access towards a mobile neuroscience
Youssouf El Allioui Omar El Beqqali
Download Full-Text
High Performance Direct Torque Control of Induction Motor Drives Using Space Vector Modulation
S. Allirani V. Jagannathan
Download Full-Text
A new Morphological Approach for Noise Removal cum Edge Detection
M. Rama Bai V. Venkata Krishna J. SreeDevi
Download Full-Text
Modeling ODP Policies by using event-B
Belhaj Hafid Mohamed Bouhdadi Said Elhajji
Download Full-Text
A New Security Paradigm of File Sharing
Seifedine Kadry
Download Full-Text
An Enhanced Algorithm Of The Statistical Training Method In Boosting-Based Face Detection
Said Belkouch Mounir Bahtat Abdellah Ait Ouahman M. M'rabet Hassani
Download Full-Text
Personnel Audit Using a Forensic Mining Technique
Adesesan B. Adeyemo Oluwafemi Oriola
Download Full-Text
A RSS Based Adaptive Hand-Off Management Scheme In Heterogeneous Networks
Debabrata Sarddar Shovan Maity Arnab Raha Ramesh Jana Utpal Biswas Mrinal Kanti Naskar
Download Full-Text
A survey of Named Entity Recognition in English and other Indian Languages
Darvinder Kaur Vishal Gupta
Download Full-Text
A Framework for Prefetching Relevant Web Pages using Predictive Prefetching Engine (PPE)
Jyoti Ashok Kale Sharma Amit Goel
Download Full-Text
Genetic Algorithms as Virtual User Managers
Rasmiprava Singh Snehalata Baede Sujata Khobragade
Download Full-Text
Performance Analysis of Peak-to-Average Power Ratio Reduction Techniques for Wireless Communication Using OFDM Signals
Pawan Sharma Seema Verma
Download Full-Text
To Design Voice Control Keyboard System using Speech Application Programming Interface
Md. Sipon Mia Tapan Kumar Godder
Download Full-Text
Combining of Spatial and Frequency Domain Transformation With The Effect of Using and Non-Using Adaptive Quantization for Image Compression
Alan Anwer Abdulla
Download Full-Text
Automatic Computation for Pressure Controlled Intermittent Coronary Sinus Occlusion
Loay Alzubaidi Werner Mohl Frank Rattay
Download Full-Text
Computer Science in Education
Irshad Ullah
Download Full-Text
WLAN Security Flaw: Cracking 64 bit WEP Key
Anil Kumar Singh Bharat Mishra Sandeep Singh
Download Full-Text
Digitizing the Forest Resource Map Using ArcGIS
K. R. Manjula S. Jyothi S. Anand Kumar Varma
Download Full-Text
Digital Watermarking in Discrete Wavelet Transformation - Survey
Rama Seshagiri Rao C. Sampath Kumar M. Prakasam T.
Download Full-Text
A Methodology for Aiding Investment Decision between Assets in Stock Markets Using Artificial Neural Network
P. N. Kumar Rahul Seshadri G. A. Hariharan V. P. Mohandas P. Balasubramanian
Download Full-Text
Use of XML to Persist and Transfer Offline Data For Personalized Profiles
Sandeep Chawla Suchita Goyal
Download Full-Text
Role of Knowledge Management in Enhancing Information Security
Yogesh Kumar Mittal Santanu Roy Manu Saxena
Download Full-Text
Cloud Computing for Managing Apparel and Garment Supply Chains - an Empirical study of Implementation Frame Work
A.K. Damodaram K. Ravindranath
Download Full-Text
Retrieval of average sum of plans and degree coefficient between genes in distributed Query Processing
Sambit Kumar Mishra Srikanta Pattnaik
Download Full-Text
A Goal Based Approach for QFD Refinement in Systematizing and Identifying Business Process Requirements
Roger Atsa Etoundi Marcel Fouda Ndjodo Atouba Christian Lopez
Download Full-Text
Application of some Retrieved Information Method on Internet
Vu Thanh Nguyen Nguyen Quoc Thinh
Download Full-Text
Mixed-Myanmar and English Character Recognition with Formatting
Yadana Thein Cherry Maung
Download Full-Text
Personalized Online Learning with Ontological Approach
Bernard Renaldy Suteja Suryo Guritno Retantyo Wardoyo Ahmad Ashari
Download Full-Text
IJCSI Volume 7, Issue 6, November 2010
Download Full-Text