Thursday 30th of March 2017                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 7, Issue 6, November 2010
Mobile agent driven by aspect
Youssef Hannad   Fabrice Mourlin   
Download Full-Text

A Modified Algorithm of Bare Bones Particle Swarm Optimization
Horng-I Hsieh   Tian-Shyug Lee   
Download Full-Text

Web Personalization of Indian e-Commerce Websites using Classification Methodologies
Agarwal Devendera   Tripathi S.P   Singh J.B.   
Download Full-Text

High Accuracy Myanmar Handwritten Character Recognition using Hybrid approach through MICR and Neural Network
Yadana Thein   San Su Su Yee   
Download Full-Text

Ontology Based Agent Communication in Resource Allocation and Monitoring
Manish Arora   M. Syamala Devi   
Download Full-Text

A Novel DSS Framework for E-government
A.M. Riad   Hazem M. El-Bakry   Gamal H. El-Adl   
Download Full-Text

Real-time Error Measurement System for MVB Protocol
Su Goog Shon   Soo Mi Yang   
Download Full-Text

General Database Infrastructure for Image Retrieval
Carlos Alvez   Aldo Vecchietti   
Download Full-Text

New approach using Bayesian Network to improve content based image classification systems
Khlifia Jayech   Mohamed Ali Mahjoub   
Download Full-Text

SbSAD: An Integrated Service-based Software Design Framework
Mohamed Dbouk   Hamid Mcheick   Ihab Sbeity   
Download Full-Text

Success Rules of OSS Projects using Datamining 3-Itemset Association Rule
Andi Wahju Rahardjo Emanuel   Retantyo Wardoyo   Jazi Eko Istiyanto   Khabib Mustofa   
Download Full-Text

Scalable Contents Delivery System with Dynamic Server Deployment
Yuko Kamiya   Toshihiko Shimokawa   Fuminori Tanizaki   Norihiko Yoshida   
Download Full-Text

A Survey on Performance Evaluation of Object Detection Techniques in Digital Image Processing
J. Komala Lakshmi   M. Punithavalli   
Download Full-Text

Optimal Provisioning of Resource in a Cloud Service
Yee Ming Chen   Shin-Ying Tsai   
Download Full-Text

Presenting a New Routing Protocol for increasing Lifetime of Sensor Network
Vahid Majid Nezhad   Bager Zarei   
Download Full-Text

A Knowledge Management Model to Improve Information Security
Yogesh Kumar Mittal   Santanu Roy   Manu Saxena   
Download Full-Text

TH*: Scalable Distributed Trie Hashing
Aridj Mohamed   Zegour Djamel Edinne   
Download Full-Text

Attacks in WEB Based Embedded Applications
C.Yaashuwanth    R. Ramesh   
Download Full-Text

A Tool for Qualitative Causal Reasoning On Complex Systems
Tahar Guerram   Ramdane Maamri   Zaidi Sahnoun   
Download Full-Text

Health Smart Home
Ahmad Choukeir   Batoul Fneish   Nour Zaarour   Walid Fahs   Mohammad Ayache   
Download Full-Text

SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network
Rajender Nath   Pankaj Kumar Sehgal   
Download Full-Text

A Radio Based Intelligent Railway Grade Crossing System to Avoid Collision
Sheikh Shanawaz Mostafa   Md. Mahbub Hossian   Khondker Jahid Reza   Gazi Maniur Rashid   
Download Full-Text

Effective Approaches For Extraction Of Keywords
Jasmeen Kaur   Vishal Gupta   
Download Full-Text

Image Splicing Detection Using Inherent Lens Radial Distortion
H. R. Chennamma   Lalitha Rangarajan   
Download Full-Text

Designing A Re-Configurable Fractional Fourier Transform Architecture Using Systolic Array
Anal Acharya   Soumen Mukherjee   
Download Full-Text

Syllables Selection for the Development of Speech Database for Punjabi TTS System
Parminder Singh   Gurpreet Singh Lehal   
Download Full-Text

Personalized access towards a mobile neuroscience
Youssouf El Allioui   Omar El Beqqali   
Download Full-Text

High Performance Direct Torque Control of Induction Motor Drives Using Space Vector Modulation
S. Allirani   V. Jagannathan   
Download Full-Text

A new Morphological Approach for Noise Removal cum Edge Detection
M. Rama Bai   V. Venkata Krishna   J. SreeDevi   
Download Full-Text

Modeling ODP Policies by using event-B
Belhaj Hafid   Mohamed Bouhdadi   Said Elhajji   
Download Full-Text

A New Security Paradigm of File Sharing
Seifedine Kadry   
Download Full-Text

An Enhanced Algorithm Of The Statistical Training Method In Boosting-Based Face Detection
Said Belkouch   Mounir Bahtat   Abdellah Ait Ouahman   M. M'rabet Hassani   
Download Full-Text

Personnel Audit Using a Forensic Mining Technique
Adesesan B. Adeyemo   Oluwafemi Oriola   
Download Full-Text

A RSS Based Adaptive Hand-Off Management Scheme In Heterogeneous Networks
Debabrata Sarddar   Shovan Maity   Arnab Raha   Ramesh Jana   Utpal Biswas   Mrinal Kanti Naskar   
Download Full-Text

A survey of Named Entity Recognition in English and other Indian Languages
Darvinder Kaur   Vishal Gupta   
Download Full-Text

A Framework for Prefetching Relevant Web Pages using Predictive Prefetching Engine (PPE)
Jyoti   Ashok Kale Sharma   Amit Goel   
Download Full-Text

Genetic Algorithms as Virtual User Managers
Rasmiprava Singh   Snehalata Baede   Sujata Khobragade   
Download Full-Text

Performance Analysis of Peak-to-Average Power Ratio Reduction Techniques for Wireless Communication Using OFDM Signals
Pawan Sharma   Seema Verma   
Download Full-Text

To Design Voice Control Keyboard System using Speech Application Programming Interface
Md. Sipon Mia   Tapan Kumar Godder   
Download Full-Text

Combining of Spatial and Frequency Domain Transformation With The Effect of Using and Non-Using Adaptive Quantization for Image Compression
Alan Anwer Abdulla   
Download Full-Text

Automatic Computation for Pressure Controlled Intermittent Coronary Sinus Occlusion
Loay Alzubaidi   Werner Mohl   Frank Rattay   
Download Full-Text

Computer Science in Education
Irshad Ullah   
Download Full-Text

WLAN Security Flaw: Cracking 64 bit WEP Key
Anil Kumar Singh   Bharat Mishra   Sandeep Singh   
Download Full-Text

Digitizing the Forest Resource Map Using ArcGIS
K. R. Manjula   S. Jyothi   S. Anand Kumar Varma   
Download Full-Text

Digital Watermarking in Discrete Wavelet Transformation - Survey
Rama Seshagiri Rao C.   Sampath Kumar M.   Prakasam T.   
Download Full-Text

A Methodology for Aiding Investment Decision between Assets in Stock Markets Using Artificial Neural Network
P. N. Kumar   Rahul Seshadri G.   A. Hariharan   V. P. Mohandas   P. Balasubramanian   
Download Full-Text

Use of XML to Persist and Transfer Offline Data For Personalized Profiles
Sandeep Chawla   Suchita Goyal   
Download Full-Text

Role of Knowledge Management in Enhancing Information Security
Yogesh Kumar Mittal   Santanu Roy   Manu Saxena   
Download Full-Text

Cloud Computing for Managing Apparel and Garment Supply Chains - an Empirical study of Implementation Frame Work
A.K. Damodaram   K. Ravindranath   
Download Full-Text

Retrieval of average sum of plans and degree coefficient between genes in distributed Query Processing
Sambit Kumar Mishra   Srikanta Pattnaik   
Download Full-Text

A Goal Based Approach for QFD Refinement in Systematizing and Identifying Business Process Requirements
Roger Atsa Etoundi   Marcel Fouda Ndjodo   Atouba Christian Lopez   
Download Full-Text

Application of some Retrieved Information Method on Internet
Vu Thanh Nguyen   Nguyen Quoc Thinh   
Download Full-Text

Mixed-Myanmar and English Character Recognition with Formatting
Yadana Thein   Cherry Maung   
Download Full-Text

Personalized Online Learning with Ontological Approach
Bernard Renaldy Suteja   Suryo Guritno   Retantyo Wardoyo   Ahmad Ashari   
Download Full-Text

IJCSI Volume 7, Issue 6, November 2010

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »