Thursday 30th of March 2017                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 7, Issue 3, May 2010
Distributed Maximality based CTL Model Checking
Djamel Eddine Saidouni   Zine EL Abidine Bouneb   
Download Full-Text

A Situational Approach for Web Applications Design
Naoufel Kraiem   Semia Sonia Selmi   Henda Hajjami Ben Ghezala   
Download Full-Text

Different Forms of Software Testing Techniques for Finding Errors
Mohd. Ehmer Khan   
Download Full-Text

Study of Airport Self-service Technology within Experimental Research of Check-in Techniques Case Study and Concept
Shady G. Abdelaziz   Abdelfatah A .Hegazy   Ahmed Elabbassy   
Download Full-Text

An Overview of Portable Distributed Techniques
Sanjay Bansal   Nirved Pandey   
Download Full-Text

Towards Corrosion Detection System
B.B.Zaidan   A.A.Zaidan   Hamdan.O.Alanazi   Rami Alnaqeib   
Download Full-Text

Application Integration and Semantic Integration in Electronic Prescription Systems
Juha Puustjärvi   Leena Puustjärvi   
Download Full-Text

The Vblogs: Towards a New Generation of Blogs
Boubker Sbihi   Kamal Eddine El Kadiri   Noura Aknin   
Download Full-Text

A Multi Swarm Particle Filter for Mobile Robot Localization
Ramazan Havangi   Mohammad Ali Nekoui   Mohammad Teshnehlab   
Download Full-Text

Development of Receiver Stimulator for Auditory Prosthesis
K. Raja Kumar   P. Seetha Ramaiah   
Download Full-Text

An Efficient Ball Detection Framework for Cricket
B.L. Velammal   P. Anandha Kumar   
Download Full-Text

Modeling and Simulation of Microcode-based Built-In Self Test for Multi-Operation Memory Test Algorithms
R. K. Sharma   Aditi Sood   
Download Full-Text

A Descriptive Classification of Causes of Data Quality Problems in Data Warehousing
Ranjit Singh   Kawaljeet Singh   
Download Full-Text

Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks
Jinho Ahn   
Download Full-Text

Multi Objective AODV Based On a Realistic Mobility Model
Hamideh Babaei   Morteza Romoozi   
Download Full-Text

Qualitative analysis of periodically forced nonlinear oscillators responses and stability areas in the vicinity of bifurcation cascade
Nizar Jabli   Hedi Khammari   Mohamed Faouzi Mimouni   
Download Full-Text

Extended Diffie-Hellman Technique to Generate Multiple Shared Keys at a Time with Reduced KEOs and its Polynomial Time Complexity
Nistala V.E.S. Murthy   Vankamamidi S. Naresh   
Download Full-Text

An Effective Technique for Clustering Incremental Gene Expression data
Sauravjyoti Sarmah   Dhruba K. Bhattacharyya   
Download Full-Text

A Nonblocking Coordinated Checkpointing Algorithm for Mobile Computing Systems
Rachit Garg   Praveen Kumar   
Download Full-Text

Testing the relational Database
Mitu Dhull   Archana Sharma   
Download Full-Text

Dynamic path-loss estimation using a particle filter
Javier Rodas   Carlos J. Escudero Cascón   
Download Full-Text

Grids Portals: Frameworks, Middleware or Toolkit
Xavier Medianero-Pasco   Belén Bonilla-Morales   Miguel Vargas-Lombardo   
Download Full-Text

Evaluation of JFlex Scanner Generator Using Form Fields Validity Checking
Ezekiel Okike   Maduka Attamah   
Download Full-Text

Kansei Colour Concepts to Improve Effective Colour Selection in Designing Human Computer Interfaces
Tharangie K G D   Irfan C M A   Yamad K   Marasinghe A   
Download Full-Text

An Efficient System Based On Closed Sequential Patterns for Web Recommendations
Utpala Niranjan   R.B.V. Subramanyam   V-Khana   
Download Full-Text

Energy Efficient Real-Time Scheduling in Distributed Systems
Santhi Baskaran   P. Thambidurai   
Download Full-Text

Exploration on Selection of Medical Images employing New Transformation Technique
J.Jaya   K.Thanushkodi   
Download Full-Text

Survey: Grid Computing and Semantic Web
Belén Bonilla-Morales   Xavier Medianero-Pasco   Miguel Vargas-Lombardo   
Download Full-Text

An Enterprise Architecture Framework for Mobile Commerce
Khawar Hameed   Hanifa Shah   Kamran Ahsan   Weijun Yang   
Download Full-Text

Performance Comparison between Active and Passive Queue Management
Arash Dana   Ahmad Malekloo   
Download Full-Text

A Minimum-Process Coordinated Checkpointing Protocol For Mobile Distributed System
Praveen Kumar   Ajay Khunteta   
Download Full-Text

Reputation Based Two Way Trust Model for Reliable Transactions in Grid Computing
Srivaramangai P   Renagaramanujam Srinivasan   
Download Full-Text

Soft-Checkpointing Based Coordinated Checkpointing Protocol for Mobile Distributed Systems
Parveen Kumar   Rachit Garg   
Download Full-Text

Domain-Independent Genotype to Phenotype Mapping through XML Rules
Daniela Xhemali   Christopher J. Hinde   Roger G. Stone   
Download Full-Text

Specifying Data Bases Management Systems by Using RM-ODP Engineering Language
Jalal Laassiri   Said Elhajji   Mohamed Bouhdadi   Ghizlane Orhanou   Youssef Balouki   
Download Full-Text

Performance Comparison of SVM and ANN for Handwritten Devnagari Character Recognition
Sandhya Arora   Debotosh Bhattacharjee   Mita Nasipuri   Latesh Malik   Mahantapas Kundu   Dipak Kumar Basu   
Download Full-Text

Improving Network Performance using ACO Based Redundant Link Avoidance Algorithm
B. Chandra Mohan   R. Baskaran   
Download Full-Text

An Investigation about Performance Comparison of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET
S. Karthik   Kannan.S   V. P. Arunachalam   T. Ravichandran   M. L. Valarmathi   
Download Full-Text

Latency Optimized Data Aggregation Timing Model for Wireless Sensor Networks
A. Sivagami   K. Pavai   D. Sridharan   
Download Full-Text

A practical application of software security in an undergraduate software engineering course
Cynthia Y. Lester   
Download Full-Text

Fingerprint recognition using standardized fingerprint model
Le Hoang Thai   Ha Nhat Tam   
Download Full-Text

Practical E-Payment Scheme
Mohammad Al-Fayoumi   Sattar J Aboud   Mustafa Al-Fayoumi   
Download Full-Text

RFID: Dynamic Surveillance Approach
Indraveer Singh   Harshawardhan Patil   
Download Full-Text

Minimization of Handoff Latency by Angular Displacement Method Using GPS Based Map
Debabrata Sarddar   Joydeep Banerjee   Tapas Jana   Souvik Kumar Saha   Utpal Biswas   Mrinal Kanti Naskar   
Download Full-Text

Object Oriented Information Computing over WWW
Pushpa R. Suri   Harmunish Taneja   
Download Full-Text

An Integrated Approach for Image Retrieval based on Content
Kavita Choudhary   Manish Pundlik   Dharmendra Choukse   
Download Full-Text

Agent-Based µ-Tools Integrated into a Co-Design Platform
Alain-Jérôme Fougères   
Download Full-Text

Model for Knowledge Bases of Computational Objects
Nhon Van Do   
Download Full-Text

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks
Prashant Kumar   Naveen Chauhan   Lalit Awasthi   Narottam Chand   
Download Full-Text

Visually Improved Image Compression by Combining EZW Encoding with Texture Modeling using Huffman Encoder
Vinay U. Kale   Shirish M. Deshmukh   
Download Full-Text

Parameterization and Controllability of Linear Time-Invariant Systems
Shirish M. Deshmukh   Seema S. Deshmukh   R. D. Kanphade   
Download Full-Text

Iris Recognition Using Modified Hierarchical Phase-Based Matching (HPM) Technique
C.Anand Deva Durai   M. Karnan   
Download Full-Text

A Coded Cooperative Networking MAC protocol in non transparent multihop WiMAX network
Lamia Chaari   Lotfi Kamoun   
Download Full-Text

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography
Wilayat Khan   Habib Ullah   
Download Full-Text

Touching Syllable Segmentation using Split Profile Algorithm
L.Pratap Reddy   T.Ranga Babu   N.Venkata Rao   B.Raveendra Babu   
Download Full-Text

Information Security and Sender's Rights Protection through Embedded Public Key Signature
Vineeta Khemchandani   G. N. Purohit   
Download Full-Text

Non linear Image segmentation using fuzzy c means clustering method with thresholding for underwater images
Ganapathi Padmavathi   M. Muthukumar   Suresh Kumar Thakur   
Download Full-Text

A Theoretical Approach to Link Mining for personalization
K. Srinivas   L. Kiran Kumar Reddy   A. Govardhan   
Download Full-Text

Image Compression Algorithms for Fingerprint System
Preeti Pathak   
Download Full-Text

Music Sound and Picture Perception: Topography of the Human Brain Electrical Activity
Wichian Sittiprapaporn   
Download Full-Text

Fast Clustering of Self-Similar Network Traffic Using Wavelet
Aqil Burney   Akhter Raza Syed   Afzal Saleemi   
Download Full-Text

Quotient Based Multiresolution Image Fusion of Thermal and Visual Images Using Daubechies Wavelet Transform for Human Face Recognition
Mrinal Kanti Bhowmik   Debotosh Bhattacharjee   Mita Nasipuri   Dipak Kumar Basu   Mahantapas Kundu   
Download Full-Text

Extraction of Dominant Attributes and Guidance Rules for Scholastic Achievement Using Rough Set Theory in Data Mining
P.G. JansiRani   R. Bhaskaran   
Download Full-Text

Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model
Harminder S. Bindra   Sunil K. Maakar   A. L. Sangal   
Download Full-Text

Policy based Decentralized Group key Security for Mobile Ad-hoc Networks
Sugandha Singh   Navin Rajpal   Ashok Kale Sharma   Ritu Pahwa   
Download Full-Text

Efficient Algorithm for Redundant Reader Elimination in Wireless RFID Networks
Nazish Irfan   Mustapha C.E. Yagoub   
Download Full-Text

On One Approach to Scientific CAD/CAE Software Developing Process
George Sergia   Alexander Demurov   George Petrosyan   Roman Jobava   
Download Full-Text

Modeling Throughput Performance in 802.11 WLAN
Moses Ekpenyong   Joseph Isabona   
Download Full-Text

Hello Flood Attack and its Countermeasures in Wireless Sensor Networks
Virendra Pal Singh   Sweta Jain   Jyoti Singhai   
Download Full-Text

Faster and Efficient Web Crawling with Parallel Migrating Web Crawler
Akansha Singh   Krishna Kant Singh   
Download Full-Text

The morphological analysis of Arabic verbs by using the surface patterns
A. Yousfi   
Download Full-Text

Real-Time Video Streaming Over Bluetooth Network Between Two Mobile Nodes
Sourav Banerjee   Dipansu Mondal   Sumit Das   Ramendu Bikash Guin   
Download Full-Text

A New Semantic Similarity Metric for Solving Sparse Data Problem in Ontology based Information Retrieval System
K. Saruladha   G. Aghila   Sajina Raj   
Download Full-Text

Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET)
V. D. Ambeth Kumar   M. Ramakrishnan   
Download Full-Text

IJCSI Volume 7, Issue 3, No 1, May 2010

Download Full-Text

IJCSI Volume 7, Issue 3, No 2, May 2010

Download Full-Text

IJCSI Volume 7, Issue 3, No 3, May 2010

Download Full-Text

IJCSI Volume 7, Issue 3, No 4, May 2010

Download Full-Text

IJCSI Volume 7, Issue 3, No 5, May 2010

Download Full-Text

IJCSI Volume 7, Issue 3, No 6, May 2010

Download Full-Text

IJCSI Volume 7, Issue 3, No 7, May 2010

Download Full-Text

IJCSI Volume 7, Issue 3, No 8, May 2010

Download Full-Text

IJCSI Volume 7, Issue 3, No 9, May 2010

Download Full-Text

IJCSI Volume 7, Issue 3, No 10, May 2010

Download Full-Text

IJCSI Volume 7, Issue 3, No 11, May 2010

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »