IJCSI Open Access Publications
IJCSI Thesis Publications IJCSI Conference Special Issues Search Publications, Authors, More...
IJCSI Volume 8, Issue 4, July 2011
Nicolas Ferry, Jean-Yves Tigli, Stephane Lavirotte, Gaetan Rey and Michel Riveill
Download Full-Text
A New Weight Function for Constructing Field Association Terms using Concurrent Words
El-Sayed Atlam
Download Full-Text
A Security Framework for Buddy System based MANET Address Allocation Scheme
Abdelhafid Abdelmalek, Zohra Slimane, Mohammed Feham and Abdelmalik Taleb-Ahmed
Download Full-Text
Operational Strategies and Internal Logistic Costs Analysis in a Real Warehouse Based on Modeling and Simulation
Francesco Longo
Download Full-Text
An Introductory of a Content Provider Agent in Higher Learning Institutions
B A Jesica Malani and Abu Bakar Md Sultan
Download Full-Text
Fractional Identification of Rotor Skin Effect in Induction Machines
Abdelhamid Jalloul, Khaled Jelassi, Pierre Melchior and Jean-Claude Trigeassou
Download Full-Text
High Dynamic Range RNS Bases for Modular Multiplication
Shirin Rezaie, Mohammad Esmaeildoust, Marzieh Gerami, Keivan Navi and Omid Hashemipour
Download Full-Text
Analytical Model and Performance Evaluation for the TRIDNT protocol
Ahmed M Abd El-Haleem, Ihab A Ali and Ibrahim Ismail Ibrahim
Download Full-Text
TRIUMF-Trust Based Routing Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack
Ahmed M Abd El-Haleem and Ihab A Ali
Download Full-Text
A Quality Based Method to Analyze Software Architectures
Farzaneh Hoseini Jabali, Sayed Mehran Sharafi and Kamran Zamanifar
Download Full-Text
Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
P Vijayalakshmi, V Saravanan, P Ranjit Jeba Thangaiah and J Abraham Dinakaran
Download Full-Text
An effective symmetric key recovery scheme for secure onboard satellite applications
A Ruhan Bevi and S Malarvizhi
Download Full-Text
Applying Fuzzy ID3 Decision Tree for Software Effort Estimation
Ali Idri and Sanaa Elyassami
Download Full-Text
Object-based Video compression using neural networks
Soumaya Ghorbel, Maher Ben Jemaa and Mohamed Chtourou
Download Full-Text
Dependence Analysis of Component Based Software through Assumptions
Ratneshwer and A K Tripathi
Download Full-Text
Designing Flexible Neuro-Fuzzy System Based on Sliding Mode Controller for Magnetic Levitation Systems
Zahra Mohammadi, Mohammad Teshnehlab and Mahdi Aliyari Shoorehdeli
Download Full-Text
The improvement of the semantic classification tool to a SOA to ensure a better tutoring
Saadia Lgarch, Mohammed Khalidi Idrissi and Samir Bennani
Download Full-Text
Fuzzy Logic Approach for Threat Prioritization in Agile Security Framework using DREAD Model
Sonia, Archana Singhal and Hema Banati
Download Full-Text
Ontology Based Qos Driven Web Service Discovery
R Suganyakala, M Aarthilakshmi, G R Karpagam and S Maheswari
Download Full-Text
Detection of Region Duplication Forgery in Digital Images Using SURF
B L Shivakumar and Santhosh Baboo
Download Full-Text
Minimizing the Switch and Link Conflicts in an Optical Multi-stage Interconnection Network
Ved Prakash Bhardwaj, Nitin and Vipin Tyagi
Download Full-Text
Design of an Energy Efficient Routing Protocol for MANETs based on AODV
Annapurna P Patil, K Rajani Kanth, Bathey Sharanya, M P Dinesh Kumar and J Malavika
Download Full-Text
The future of e-Service provision in Marginalised Areas-Online Negotiation
Nobert Rangarirai Jere, Mamello Thinyane and Alfredo Terzoli
Download Full-Text
A New Improved Particle Swarm Optimization Algorithm for Multiprocessor Job Scheduling
K.Thanushkodi and K Deeba
Download Full-Text
Decentralized Dynamic Load Balancing and Intersection Trust in Mobile Ad Hoc Grids
Don Abraham and VetriSelvi Vetrian
Download Full-Text
Enhanced Hierarchical Clustering for Genome Databases
Sadiq Hussain and Gopal Hazarika
Download Full-Text
Disjoint Paths Multi-stage Interconnection Networks Stability Problem
Ravi Rastogi, Nitin, Durg Singh Chauhan and Mahesh Chandra Govil
Download Full-Text
An Automatic Eye Detection Method for Gray Intensity Facial Images
M Hassaballah, Kenji Murakami and Shun Ido
Download Full-Text
Design of an Optical Character Recognition System for Camera-based Handheld Devices
Ayatullah Faruk Mollah, Nabamita Majumder, Subhadip Basu and Mita Nasipuri
Download Full-Text
Nonlinear Approach of Actuator Fault Accommodation
Sahbi Ghachem, Kamel Benothman and Mohamed Benrejeb
Download Full-Text
A Novel Approach for Periodic Assessment of Business Process Interoperability
Badr Elmir and Bouchaib Bounabat
Download Full-Text
A Novel Approach of Query Optimization for Distributed Database Systems
Deepak Sukheja and Umesh Kumar Singh
Download Full-Text
An Intelligent Mediating Model for Collaborative e-Learning Management Systems
Akanbi Caleb Olufisoye and Adagunodo E Rotimi
Download Full-Text
Application of artificial neural engineering and regression models for forecasting shelf life of instant coffee drink
Sumit Goyal and Gyanendra Kumar Goyal
Download Full-Text
Design of New Multiband Slotted PIFA Antennas
Yamina Belhadef and Noureddine Boukli-Hacene
Download Full-Text
Authenticated Hierarchy Double Signature protocol for MANET
Ali Bagherinia, Nik Mohammad Balouchzahi, Ali Jowharpour and Sohrab Hojatkhah
Download Full-Text
Multi FPGA Based Novel Reconfigurable Hybrid Architecture for High Performance Computing
Sunil Kr Singh, R K Singh, M P S Bhatia and Ratnakar Madan
Download Full-Text
A New IRIS Normalization Process For Recognition System With Cryptographic Techniques
S Nithyanandam, K S Gayathri and P L K Priyadarsini
Download Full-Text
Performance Study on Image Encryption Schemes
Jolly Shah and Vikas Saxena
Download Full-Text
Enhanced Authentication Schemes for Intrusion Prevention using Native Language Passwords
Sreelatha Malempati and Shashi Mogalla
Download Full-Text
Performance Analysis of AES and MARS Encryption Algorithms
H S Mohan and A Raji Reddy
Download Full-Text
Distributed Adaptive Clustering Algorithm for Improving Data Accessibility in MANET
A. Rajaram and S Vaithiyalingam
Download Full-Text
Dynamic User Interface Based on Cognitive Approach in Web Based Learning
L Jayasimman, A Nisha Jebaseeli, E George Dharma Prakashraj and J Charles
Download Full-Text
A Review of Power Conservation in Wireless Mobile Adhoc Network-MANET
Neeraj Tantubay, Dinesh Ratan Gautam and Mukesh Kumar Dhariwal
Download Full-Text
Inverted indexes-Types and techniques
Ajit Kumar Mahapatra and Sitanath Biswas
Download Full-Text
Empirical Study in the Security of Electronic Payment Systems
Mohammad AL-Maaitah, Abdallah Shatat and E Raj Kumar
Download Full-Text
Performance Evaluation of Image Fusion for Impulse Noise Reduction in Digital Images Using an Image Quality Assessment
M PremKumar, J Harikiran, B SaiChandana and P RajeshKumar
Download Full-Text
Local Linear Wavelet Neural Network and RLS for Usable Speech Classification
Suchismita Sahoo, Sushree Sangita Sahoo, M R Senapati and P K Dash
Download Full-Text
The Presentation of a New Method for Image Distinction with Robot by Using Rough Fuzzy Sets and Rough Fuzzy Neural Network Classifier
Maryam Shahabi Lotfabadi
Download Full-Text
GREEN IT- Why Developing Countries Should Care
Fatima Zahra Hanne
Download Full-Text
An alternative interpretation of linguistic variables as Linguistic Finite Automata
Supriya Raheja, Reena Dadhich and Smita Rajpal
Download Full-Text
Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm
D Tamilselvi, S Mercy Shalinie and M Hariharasudan
Download Full-Text
A Comprehensive Study of Commonly Practiced Heavy and Light Weight Software Methodologies
Asif Irshad Khan, M Rizwan Jameel Qureshi and Usman Ali Khan
Download Full-Text
Facebook and political communication - Macedonian case
Sali Emruli, Tahir Zejneli and Florin Agai
Download Full-Text
YouTube and political communication - Macedonian case
Sali Emruli, Tahir Zejneli and Florin Agai
Download Full-Text
Application of PSO Artificial Bee Colony and Bacterial Foraging Optimization algorithms to economic load dispatch-An analysis
Anant Baijal, Vikram Singh Chauhan and T Jayabarathi
Download Full-Text
A Survey on Web-based AR Applications
Behrang Parhizkar, Ashraf Abbas M. Al-Modwahi, Arash Habibi Lashkari, Mohammad Mehdi Bartaripou and Hossein Reza Babae
Download Full-Text
Gujarati Script Recognition-A Review
Mamta Maloo and Karbhari Vishwanath Kale
Download Full-Text
Structural Library of Natural Compounds
Subhash Chandra Bose Kotte, K V T S Pavan Kumar, T Ravi Kumar, Shriram Raghavan, P K Dubey and P M Murali
Download Full-Text
An Evolutionary Feature Selection Technique Using Polynomial Neural Network
Amit Saxena, Dovendra Patre and Abhishek Dubey
Download Full-Text
A Resolution for Shared Memory Conflict in Multiprocessor System-on-a-Chip
Shaily Mittal and Nitin
Download Full-Text
Using CSS XML Files in Representing Biological Data-Case of Congolese Metazoa
Kalonji Kalala Hercule, Mbuyi Mukendi Eugene, Mulopo Tona David, Malekani M Jean, Boale Bomolo Paulin, Lilongo Bokaletumba Joel and Kabamba Ilunga Richard
Download Full-Text
Denoising Of Mixed Noise in Ultrasound Images
Saraswathi Janaki Samusarma and Mary Brinda
Download Full-Text
Enterprise Mold Distinctiveness via Cloud Through Software-as-a-Service
R Gopinath and K Raja
Download Full-Text
Entropy Encoding EBCOT-Embedded Block Coding with Optimized Truncation-In JPEG2000
S Medouakh and Z E Baarir
Download Full-Text
An Analysis of Weakly Consistent Replication Systems in an Active Distributed Network
Amit Chougule and Pravin Ghewari
Download Full-Text
Jacobi Symbol Are Harder To Predict Than Legendre Symbol In Sylar Encryption System
Rajesh Kumar Sinha and Tanwir Uddin Haider
Download Full-Text
Area Efficient Design of Routing Node for Network-on-Chip
Rehan Maroofi, Vilas Nitnaware and Shyam Limaye
Download Full-Text
CONDCLOSE-new algorithm of association rules extraction
Hamida Amdouni and Mohamed Mohsen Gammoudi
Download Full-Text
Address Counter Generators for Low Power Memory BIST
Balwinder Singh, Sukhleen Bindra Narang and Arun Khosla
Download Full-Text
E-Government Program in Jordan-From Inception to Future Plans
Sahar Khasawneh, Yaser Jalghoum, Osama Harfoushi and Ruba Obiedat
Download Full-Text
Edge Detection Using Morphological Method and Corner Detection Using Chain Code Algorithm
Anjan Bikash Maity, Sandip Mandal and Ranjan Podder
Download Full-Text
Analysis and a Report of Wireless Sensor Networks and Applications
M Chithik Raja and V S Balasubramanian
Download Full-Text
A cooperative approach to ensure software product quality
M Sangeetha, C Arumugam, P G Sapna and Senthil Kumar K M
Download Full-Text
Multimodal Biometric Cryptosystem Involving Face Fingerprint and Palm Vein
B Prasanalakshmi, A Kannammal and R Sridevi
Download Full-Text
Embedded Wireless Based Communications and Security Application for Oilfield for Automatic Controlling
Ganesh V Padole and Sandip N Kamble
Download Full-Text
Implementation and Analysis of EFRS Technique for Intrusion Tolerance in Distributed Systems
A B Chougule and G A Patil
Download Full-Text
Postmodernism in e-Government
Arief Ramadhan, Dana Indra Sensuse and Aniati Murni Arymurthy
Download Full-Text
Mining Unstructured Data using Artificial Neural Network and Fuzzy Inference Systems Model for Customer Relationship Management
P Isakki and S P Rajagopalan
Download Full-Text
Video Surveillance Systems-A Survey
C Lakshmi Devasena, R Revathi and M Hemalatha
Download Full-Text
A Comparative Study of Various Routing Protocols in VANET
Rakesh Kumar and Mayank Dave
Download Full-Text
Prevention Of Cross-Site Scripting Attacks XSS On Web Applications In The Client Side
S Shalini and S Usha
Download Full-Text
Real Time Communication Capacity for Data Delivery in Wireless Se nsor Networks
Deepali Virmani and Satbir Jain
Download Full-Text
Bridging the Gap between Technical Heterogeneity of Context-Aware Platforms-Experimenting a Service Based Connectivity between Adaptable Android WComp and OpenORB
Valerie Monfort and Sihem Cherif
Download Full-Text
Color Casts Detection and Adjustment
Sheng-Fuu Lin, Huang-Tsun Chen and Tsung-Han Lin
Download Full-Text
Smart Cane-Assistive Cane for Visually-impaired People
Mohd Helmy Abd Wahab, Amirul A Talib, Herdawatie A Kadir, Ayob Johari, A Noraziah, Roslina M Sidek and Ariffin A Mutalib
Download Full-Text
Path Planning for Mobile Robots using Iterative Artificial Potential Field Method
Hossein Adeli, M H N Tabrizi, Alborz Mazloomian, Ehsan Hajipour and Mehran Jahed
Download Full-Text
A Watermarking of Medical Image-New Approach Based On Multi-Layer Method
Mohamed Ali Hajjaji, Abdellatif Mtibaa and El-bey Bourennane
Download Full-Text
A Review of Cluster-Based Congestion Control Protocols in Wireless Mesh Networks
Adebanjo Adekiigbe, Kamalrulnizam Abu Bakar and Ogunnusi Olumide Simeon
Download Full-Text
Efficient mining of association rules based on gravitational search algorithm
Fariba Khademolghorani, Ahmad Baraani and Kamran Zamanifar
Download Full-Text
Ad Hoc Protocols Via Multi Agent Based Tools
Ali Bazghandi and Mehdi Bazghandi
Download Full-Text
On Stability Problems of Omega and 3-Disjoint Paths Omega Multi-stage Interconnection Networks
Ravi Rastogi, Nitin, Durg Singh Chauhan and Mahesh Chandra Govil
Download Full-Text
A Dynamic Framework of Reputation Systems for an Agent Mediated e-market
Vibha Gaur and Neeraj Kumar Sharma
Download Full-Text
Hierarchical Segmentation of Falsely Touching Characters from Camera Captured Degraded Document Images
Satadal Saha, Subhadip Basu and Mita Nasipuri
Download Full-Text
New Approximated Method of Auxiliary Sources for large-size scatterer
Sami Hidouri, Hichem Naamen and Taoufik Aguili
Download Full-Text
Factors Influencing Employee Knowledge Sharing Capabilities in Electronic Government Agencies in Malaysia
Noorazah Md Noor and Juhana Salim
Download Full-Text
Kernel Dimensionality Reduction on Sleep Stage Classification using ECG Signal
Sani M Isa, Ito Wasito and Aniati Murni Arymurthy
Download Full-Text
Implementation of cooperative virtual MISO communication in underwater acoustic wireless sensor networks
Mohammad Javad Jannati, Abdollah Doosti Aref and Vahid Tabataba Vakily
Download Full-Text
Performance Analysis Cluster and GPU Computing Environment on Molecular Dynamic Simulation of BRV-1 and REM2 with GROMACS
Heru Suhartanto, Arry Yanuar and Ari Wibisono
Download Full-Text
Mining Concepts Relationship Based on Numeric Grades
Mohammed Al-Sarem, Mostafa Bellafkih and Mohammed Ramdani
Download Full-Text
Lexical Disambiguation in Natural Language Questions-NLQs
Omar Al-Harbi, Shaidah Jusoh and Norita Md Norwawi
Download Full-Text
Image Segmentation Method Based On Finite Doubly Truncated Bivariate Gaussian Mixture Model with Hierarchical Clustering
G V S Rajkumar, K. Srinivasa Rao and P. Srinivasa Rao
Download Full-Text
Enhanced-Location-Dependent Caching and Replacement Strategies in Mobile Environment
Kahkashan Tabassum, Mahmood Quadri Syed and Avula Damodaram
Download Full-Text
A 3D signal obstruction model for realistic mobility models in Mobile Ad Hoc Networks
Hamideh Babaei, Morteza Romoozi and Majid Rostmai
Download Full-Text
Improvement of Connectivity in Mobile Ad-hoc Networks by Adding Static Nodes Based on A Realistic Mobility Model
Morteza Romoozi and Hamideh Babaei
Download Full-Text
Performance Analysis of Metro Ethernet Network Services over Asynchronous Transfer Mode Services for
S I Eludiora, Oluwatobi Stephen Akinsiku and Dauda Ayanda
Download Full-Text
A Chaos Based Blind Digital Image Watermarking in The Wavelet Transform Domain
Jila Ayubi, Shahram Mohanna, Farahnaz Mohanna and Mehdi Rezaei
Download Full-Text
Towards the Formal Specification and Verification of Multi-agent Based Systems
Boucherit Ammar and Khebaba Abdallah
Download Full-Text
Texture-based Image Retrieval Based on FABEMD
M H Ould Mohamed Dyla and H Tairi
Download Full-Text
SINR Prediction in Mobile CDMA Systems by Linear and Nonlinear Artificial Neural-Network-Based Predictors
Nahid Ardalani
Download Full-Text
Hybrid GA for Straight-Line Drawings of Level Clustered Planar Graphs
Ahmed A. Radwan, Mohamed A El-Sayed and Nahla F Omran
Download Full-Text
CPU and Memory Utilization by improving performance in network by Live Migration technology
Igli Tafa, Elinda Kajo, Hakik Paci, Elma Zanaj and Aleksander Xhuvani
Download Full-Text
User Affinity of Choice-Features of Mobile Device Graphical Password Scheme Anti-Shoulder Surfing Mechanism
Lim Kah Seng, Norafida Ithnin and Hazinah Kutty Mammi
Download Full-Text
Designing a WISHBONE Protocol Network Adapter for an Asynchronous Network-on-Chip
Ahmed H M Soliman, E M Saad, M El Bably and Hesham M A M Keshk
Download Full-Text
The Aware Cricket Ground
Wazir Zada Khan, Mohammed Y Aalsalem and Quratul Ain Arshad
Download Full-Text
Application of Butler Matrix to a Tree Structure of Microstrip Antenna Array
Tomader Mazri, Fatima Riouch and Najiba El Amrani El Idrissi
Download Full-Text
An Experimental Survey on Parsing with Neural and Finite Automata Networks
Sanjay Bhargava and G. N. Purohit
Download Full-Text
A fusion algorithm for joins based on collections in Odra-Object Database for Rapid Application development
Laika Satish and Sami Halawani
Download Full-Text
A Novel Approach for Intrusion Detection
Vikram Chopra, Sunil Saini and Amit Kumar Choudhary
Download Full-Text
Performance Evaluation of Efficient MAC in Mobile Ad Hoc Wireless Networks
Soni Sweta, Arun Nahar and Sanjeev Sharma
Download Full-Text
Emerging Cloud Computing Paradigm
Abu Sarwar Zamani, Md Mobin Akhtar and Sultan Ahmad
Download Full-Text
FloadAutoRED-an AQM scheme to Increase the Overall Performance in Internet Routers
Chitra Kandaswamy and Ganapathi Padmavathi
Download Full-Text
Palmprint Enhancement Using Discrete Curvelet Transform
S Palanikumar, M Sasikumar and J Rajeesh
Download Full-Text
Packet Filtering using IP Tables in Linux
Bhisham Sharma and Karan Bajaj
Download Full-Text
On the Solutions to the Travelling Salesman Problem using Nature Inspired Computing Techniques
Hifza Afaq and Sanjay Saini
Download Full-Text
Ant Colony Based Approach for Solving FPGA routing
Vinay Chopra and Amardeep Singh
Download Full-Text
Multi-agent based decision Support System using Data Mining and Case Based Reasoning
S Srinivasan, Jagjit Singh and Vivek Kumar
Download Full-Text
Rule based Part of speech Tagger for Homoeopathy Clinical realm
Sanjay Kumar Dwivedi and Pramod P Sukhadeve
Download Full-Text
A new approach to supply chain management based on pooling ITIL and APICS Principles and Practices
Abdelaali Himi, Mustapha El Masbahi, Samir Bahsani and Alami Semma
Download Full-Text
Information Retrieval Based on Semantic Similarity Using Information Content
Kishor Wagh and Satish Kolhe
Download Full-Text
Emotion Extractor-AI based methodology to implement prosody features in Speech Synthesis
M B Chandak and R V Dharaskar
Download Full-Text
Design of optimal chamfered bends in Rectangular Substrate Integrated Waveguide
Rahali Bochra, Mohammed Feham and Junwu Tao
Download Full-Text
An Unsupervised Approach to Analyze Users Opinion on Products using Customer Reviews
Ravi Kumar V and K Raghuveer
Download Full-Text
River extraction from satellite image
Venu Shah, Archana Choudhary and Kavita Tewari
Download Full-Text
MR imaging contrast enhancement and segmentation using fuzzy clustering
A Djerouni, H Hamada and N Berrached
Download Full-Text
A Technique to Reduce Transition Energy for Data-Bus in DSM Technology
A Sathish, M. Madhavi Latha and K Lalkishor
Download Full-Text
An Efficient Switching Activity Reduction Technique for On-Chip Data Bus
A Sathish, M. Madhavi Latha and K Lalkishor
Download Full-Text
A Novel Architecture for Motion Estimation
Subarna Chatterjee
Download Full-Text
An Approach for Privacy Preservation of Distributed Data in Peer-to-Peer Network using Multiparty Computation
Hemanta Kumar Bhuyan, Narendra Kumar Kamila and Sanjit Kumar Dash
Download Full-Text
Towards a Matrix Based Approach for Analyzing the Impact of Change on ETL Processes
Ahmed Kabiri, Faouzia Wadjinny and Dalila Chiadmi
Download Full-Text
An approach to the Optimization of menu-based Natural Language Interfaces to Databases
Fiaz Majeed, M Shoaib and Fasiha Ashraf
Download Full-Text
Modified PTS with FECs for PAPR Reduction in MIMO-OFDM System with Different Subblocks and Subcarriers
Mukunthan Pandurangan and Dananjayan Perumal
Download Full-Text
Multiple Pattern Matching Algorithm using Pair-count
Raju Bhukya and D V L N Somayajulu
Download Full-Text
Graphical Approach to the Learning of Inter-conversion of Various Number Systems
Shahid Latif, Faheem Khan, Muhammad Lal, Shahzad Hameed and Fahad Masood
Download Full-Text
Fire Fly Based Feature Selection Approach
Hema Banati and Monika Bajaj
Download Full-Text
Towards an Autonomous System for QoS management of IMS networks
Mohammed Errais, Brahim Raouyane, Mostafa Bellafkih and Mohammed Ramdani
Download Full-Text
Formal Concept Analysis Based Association Rules Extraction
Ben Boubaker Saidi Ourida and Tebourski Wafa
Download Full-Text
Model-Driven transformation with approach by modeling-From UML to N-tiers Web Model
Redouane Esbai, Mohammed Erramdani, Samir Mbarki, Ibtissam Arrassen, Abdelouafi Meziane and Mimoun Moussaoui
Download Full-Text
E-learning in Higher Education-Design and Implementation
Ashit Kumar Dutta, Al-Adhaileh Mosley and Md Mobin Akhtar
Download Full-Text
Power Aware Routing for MANET Using On-demand Multipath Routing Protocol
A. Rajaram and J Sugesh
Download Full-Text
Time Contingency Assessment in Construction Projects in Egypt using Artificial Neural Networks Model
Hazem Yahia, Hossam Hosny and Mohammad E Abdel Razik
Download Full-Text
Self Tuning of Oracle Database Using SQL Scripts
Pooja Rani, Pariniyojit Kumar Singh and Hitesh Kumar Sharma
Download Full-Text
Recovery of √n bytes of data using Backtracking Algorithm
Asha Rani K P, Saravana B, Raghu D R, Raghunandan Athreya and Sangamesh J C
Download Full-Text
Implementation of Elliptical Curve Cryptography
Randhir Kumar and Akash Anil
Download Full-Text
iWEDS-An Intelligent Explosive Detection and Terrorist Tracking System Using Wireless Sensor Network
Balaji Hariharan and Arjun Sasidharan
Download Full-Text
Process and Database Modelling of a University Bursary System-A Perspective of Cash Office
Friday Yakubu, Barroon Ismaeel Ahmad, Olugbemi Morenike Omowumi and Maria Abur Mngohol
Download Full-Text
Novel Data Encryption Algorithm
Rajat Goel, Ripu R Sinha and O P Rishi
Download Full-Text
Variable Chunk Based Parallel Switching To Minimizing File Download Time in P2P Network
Amit Chougule and Shambhuraj Deshmukh
Download Full-Text
MAS-SCM for Auto Sector-The Framework
Ritu Sindhu, Abdul Wahid and G. N. Purohit
Download Full-Text
Spatial Domain based Image Enhancement Techniques for Scanned Electron Microscope-SEM-images
Rakhi Chanana, Parneet Kaur Randhawa and Navneet Singh Randhawa
Download Full-Text
Integrated Hidden Markov Model and Bayes Packet Classifier for effective Mitigation of Application DDoS attacks
S Prabha and R Anitha
Download Full-Text
SRCDD-Secure Route Construction and Data Dissemination Protocol for Wireless Sensor Networks
Seyed Reza Taghizadeh and Shahriar Mohammadi
Download Full-Text
Using Case-Based Reasoning for detecting computer virus
Abdellatif Berkat
Download Full-Text
Application Domain of Wireless Sensor Network-A Paradigm in Developed and Developing Countries
S Taruna, Kusum Jain and G. N. Purohit
Download Full-Text
A full featured component object oriented based architecture testing tool
Sarita Singh Bhadauria, Abhay Kothari and Lalji Prasad
Download Full-Text
Design of Model For Restructure Transformation of Public Sector
Ashok Kumar and Anil Kumar
Download Full-Text
Seamless Handoff through Information Retrieval in VANET Using Mobile Agent
Himanshu Tyagi and A K Vatsa
Download Full-Text
Intelligent Optimization Techniques for Industrial applications
E Raj Kumar
Download Full-Text
IJCSI Volume 8, Issue 4, No 1, July 2011
Download Full-Text
IJCSI Volume 8, Issue 4, No 2, July 2011
Download Full-Text