Saturday 19th of August 2017                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 8, Issue 4, July 2011
Aspects of Assembly and Cascaded Aspects of Assembly: Logical and Temporal Properties
Nicolas Ferry, Jean-Yves Tigli, Stephane Lavirotte, Gaetan Rey and Michel Riveill
Download Full-Text

A New Weight Function for Constructing Field Association Terms using Concurrent Words
El-Sayed Atlam
Download Full-Text

A Security Framework for Buddy System based MANET Address Allocation Scheme
Abdelhafid Abdelmalek, Zohra Slimane, Mohammed Feham and Abdelmalik Taleb-Ahmed
Download Full-Text

Operational Strategies and Internal Logistic Costs Analysis in a Real Warehouse Based on Modeling and Simulation
Francesco Longo
Download Full-Text

An Introductory of a Content Provider Agent in Higher Learning Institutions
B A Jesica Malani and Abu Bakar Md Sultan
Download Full-Text

Fractional Identification of Rotor Skin Effect in Induction Machines
Abdelhamid Jalloul, Khaled Jelassi, Pierre Melchior and Jean-Claude Trigeassou
Download Full-Text

High Dynamic Range RNS Bases for Modular Multiplication
Shirin Rezaie, Mohammad Esmaeildoust, Marzieh Gerami, Keivan Navi and Omid Hashemipour
Download Full-Text

Analytical Model and Performance Evaluation for the TRIDNT protocol
Ahmed M Abd El-Haleem, Ihab A Ali and Ibrahim Ismail Ibrahim
Download Full-Text

TRIUMF-Trust Based Routing Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack
Ahmed M Abd El-Haleem and Ihab A Ali
Download Full-Text

A Quality Based Method to Analyze Software Architectures
Farzaneh Hoseini Jabali, Sayed Mehran Sharafi and Kamran Zamanifar
Download Full-Text

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
P Vijayalakshmi, V Saravanan, P Ranjit Jeba Thangaiah and J Abraham Dinakaran
Download Full-Text

An effective symmetric key recovery scheme for secure onboard satellite applications
A Ruhan Bevi and S Malarvizhi
Download Full-Text

Applying Fuzzy ID3 Decision Tree for Software Effort Estimation
Ali Idri and Sanaa Elyassami
Download Full-Text

Object-based Video compression using neural networks
Soumaya Ghorbel, Maher Ben Jemaa and Mohamed Chtourou
Download Full-Text

Dependence Analysis of Component Based Software through Assumptions
Ratneshwer and A K Tripathi
Download Full-Text

Designing Flexible Neuro-Fuzzy System Based on Sliding Mode Controller for Magnetic Levitation Systems
Zahra Mohammadi, Mohammad Teshnehlab and Mahdi Aliyari Shoorehdeli
Download Full-Text

The improvement of the semantic classification tool to a SOA to ensure a better tutoring
Saadia Lgarch, Mohammed Khalidi Idrissi and Samir Bennani
Download Full-Text

Fuzzy Logic Approach for Threat Prioritization in Agile Security Framework using DREAD Model
Sonia, Archana Singhal and Hema Banati
Download Full-Text

Ontology Based Qos Driven Web Service Discovery
R Suganyakala, M Aarthilakshmi, G R Karpagam and S Maheswari
Download Full-Text

Detection of Region Duplication Forgery in Digital Images Using SURF
B L Shivakumar and Santhosh Baboo
Download Full-Text

Minimizing the Switch and Link Conflicts in an Optical Multi-stage Interconnection Network
Ved Prakash Bhardwaj, Nitin and Vipin Tyagi
Download Full-Text

Design of an Energy Efficient Routing Protocol for MANETs based on AODV
Annapurna P Patil, K Rajani Kanth, Bathey Sharanya, M P Dinesh Kumar and J Malavika
Download Full-Text

The future of e-Service provision in Marginalised Areas-Online Negotiation
Nobert Rangarirai Jere, Mamello Thinyane and Alfredo Terzoli
Download Full-Text

A New Improved Particle Swarm Optimization Algorithm for Multiprocessor Job Scheduling
K.Thanushkodi and K Deeba
Download Full-Text

Decentralized Dynamic Load Balancing and Intersection Trust in Mobile Ad Hoc Grids
Don Abraham and VetriSelvi Vetrian
Download Full-Text

Enhanced Hierarchical Clustering for Genome Databases
Sadiq Hussain and Gopal Hazarika
Download Full-Text

Disjoint Paths Multi-stage Interconnection Networks Stability Problem
Ravi Rastogi, Nitin, Durg Singh Chauhan and Mahesh Chandra Govil
Download Full-Text

An Automatic Eye Detection Method for Gray Intensity Facial Images
M Hassaballah, Kenji Murakami and Shun Ido
Download Full-Text

Design of an Optical Character Recognition System for Camera-based Handheld Devices
Ayatullah Faruk Mollah, Nabamita Majumder, Subhadip Basu and Mita Nasipuri
Download Full-Text

Nonlinear Approach of Actuator Fault Accommodation
Sahbi Ghachem, Kamel Benothman and Mohamed Benrejeb
Download Full-Text

A Novel Approach for Periodic Assessment of Business Process Interoperability
Badr Elmir and Bouchaib Bounabat
Download Full-Text

A Novel Approach of Query Optimization for Distributed Database Systems
Deepak Sukheja and Umesh Kumar Singh
Download Full-Text

An Intelligent Mediating Model for Collaborative e-Learning Management Systems
Akanbi Caleb Olufisoye and Adagunodo E Rotimi
Download Full-Text

Application of artificial neural engineering and regression models for forecasting shelf life of instant coffee drink
Sumit Goyal and Gyanendra Kumar Goyal
Download Full-Text

Design of New Multiband Slotted PIFA Antennas
Yamina Belhadef and Noureddine Boukli-Hacene
Download Full-Text

Authenticated Hierarchy Double Signature protocol for MANET
Ali Bagherinia, Nik Mohammad Balouchzahi, Ali Jowharpour and Sohrab Hojatkhah
Download Full-Text

Multi FPGA Based Novel Reconfigurable Hybrid Architecture for High Performance Computing
Sunil Kr Singh, R K Singh, M P S Bhatia and Ratnakar Madan
Download Full-Text

A New IRIS Normalization Process For Recognition System With Cryptographic Techniques
S Nithyanandam, K S Gayathri and P L K Priyadarsini
Download Full-Text

Performance Study on Image Encryption Schemes
Jolly Shah and Vikas Saxena
Download Full-Text

Enhanced Authentication Schemes for Intrusion Prevention using Native Language Passwords
Sreelatha Malempati and Shashi Mogalla
Download Full-Text

Performance Analysis of AES and MARS Encryption Algorithms
H S Mohan and A Raji Reddy
Download Full-Text

Distributed Adaptive Clustering Algorithm for Improving Data Accessibility in MANET
A. Rajaram and S Vaithiyalingam
Download Full-Text

Dynamic User Interface Based on Cognitive Approach in Web Based Learning
L Jayasimman, A Nisha Jebaseeli, E George Dharma Prakashraj and J Charles
Download Full-Text

A Review of Power Conservation in Wireless Mobile Adhoc Network-MANET
Neeraj Tantubay, Dinesh Ratan Gautam and Mukesh Kumar Dhariwal
Download Full-Text

Inverted indexes-Types and techniques
Ajit Kumar Mahapatra and Sitanath Biswas
Download Full-Text

Empirical Study in the Security of Electronic Payment Systems
Mohammad AL-Maaitah, Abdallah Shatat and E Raj Kumar
Download Full-Text

Performance Evaluation of Image Fusion for Impulse Noise Reduction in Digital Images Using an Image Quality Assessment
M PremKumar, J Harikiran, B SaiChandana and P RajeshKumar
Download Full-Text

Local Linear Wavelet Neural Network and RLS for Usable Speech Classification
Suchismita Sahoo, Sushree Sangita Sahoo, M R Senapati and P K Dash
Download Full-Text

The Presentation of a New Method for Image Distinction with Robot by Using Rough Fuzzy Sets and Rough Fuzzy Neural Network Classifier
Maryam Shahabi Lotfabadi
Download Full-Text

GREEN IT- Why Developing Countries Should Care
Fatima Zahra Hanne
Download Full-Text

An alternative interpretation of linguistic variables as Linguistic Finite Automata
Supriya Raheja, Reena Dadhich and Smita Rajpal
Download Full-Text

Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm
D Tamilselvi, S Mercy Shalinie and M Hariharasudan
Download Full-Text

A Comprehensive Study of Commonly Practiced Heavy and Light Weight Software Methodologies
Asif Irshad Khan, M Rizwan Jameel Qureshi and Usman Ali Khan
Download Full-Text

Facebook and political communication - Macedonian case
Sali Emruli, Tahir Zejneli and Florin Agai
Download Full-Text

YouTube and political communication - Macedonian case
Sali Emruli, Tahir Zejneli and Florin Agai
Download Full-Text

Application of PSO Artificial Bee Colony and Bacterial Foraging Optimization algorithms to economic load dispatch-An analysis
Anant Baijal, Vikram Singh Chauhan and T Jayabarathi
Download Full-Text

A Survey on Web-based AR Applications
Behrang Parhizkar, Ashraf Abbas M. Al-Modwahi, Arash Habibi Lashkari, Mohammad Mehdi Bartaripou and Hossein Reza Babae
Download Full-Text

Gujarati Script Recognition-A Review
Mamta Maloo and Karbhari Vishwanath Kale
Download Full-Text

Structural Library of Natural Compounds
Subhash Chandra Bose Kotte, K V T S Pavan Kumar, T Ravi Kumar, Shriram Raghavan, P K Dubey and P M Murali
Download Full-Text

An Evolutionary Feature Selection Technique Using Polynomial Neural Network
Amit Saxena, Dovendra Patre and Abhishek Dubey
Download Full-Text

A Resolution for Shared Memory Conflict in Multiprocessor System-on-a-Chip
Shaily Mittal and Nitin
Download Full-Text

Using CSS XML Files in Representing Biological Data-Case of Congolese Metazoa
Kalonji Kalala Hercule, Mbuyi Mukendi Eugene, Mulopo Tona David, Malekani M Jean, Boale Bomolo Paulin, Lilongo Bokaletumba Joel and Kabamba Ilunga Richard
Download Full-Text

Denoising Of Mixed Noise in Ultrasound Images
Saraswathi Janaki Samusarma and Mary Brinda
Download Full-Text

Enterprise Mold Distinctiveness via Cloud Through Software-as-a-Service
R Gopinath and K Raja
Download Full-Text

Entropy Encoding EBCOT-Embedded Block Coding with Optimized Truncation-In JPEG2000
S Medouakh and Z E Baarir
Download Full-Text

An Analysis of Weakly Consistent Replication Systems in an Active Distributed Network
Amit Chougule and Pravin Ghewari
Download Full-Text

Jacobi Symbol Are Harder To Predict Than Legendre Symbol In Sylar Encryption System
Rajesh Kumar Sinha and Tanwir Uddin Haider
Download Full-Text

Area Efficient Design of Routing Node for Network-on-Chip
Rehan Maroofi, Vilas Nitnaware and Shyam Limaye
Download Full-Text

CONDCLOSE-new algorithm of association rules extraction
Hamida Amdouni and Mohamed Mohsen Gammoudi
Download Full-Text

Address Counter Generators for Low Power Memory BIST
Balwinder Singh, Sukhleen Bindra Narang and Arun Khosla
Download Full-Text

E-Government Program in Jordan-From Inception to Future Plans
Sahar Khasawneh, Yaser Jalghoum, Osama Harfoushi and Ruba Obiedat
Download Full-Text

Edge Detection Using Morphological Method and Corner Detection Using Chain Code Algorithm
Anjan Bikash Maity, Sandip Mandal and Ranjan Podder
Download Full-Text

Analysis and a Report of Wireless Sensor Networks and Applications
M Chithik Raja and V S Balasubramanian
Download Full-Text

A cooperative approach to ensure software product quality
M Sangeetha, C Arumugam, P G Sapna and Senthil Kumar K M
Download Full-Text

Multimodal Biometric Cryptosystem Involving Face Fingerprint and Palm Vein
B Prasanalakshmi, A Kannammal and R Sridevi
Download Full-Text

Embedded Wireless Based Communications and Security Application for Oilfield for Automatic Controlling
Ganesh V Padole and Sandip N Kamble
Download Full-Text

Implementation and Analysis of EFRS Technique for Intrusion Tolerance in Distributed Systems
A B Chougule and G A Patil
Download Full-Text

Postmodernism in e-Government
Arief Ramadhan, Dana Indra Sensuse and Aniati Murni Arymurthy
Download Full-Text

Mining Unstructured Data using Artificial Neural Network and Fuzzy Inference Systems Model for Customer Relationship Management
P Isakki and S P Rajagopalan
Download Full-Text

Video Surveillance Systems-A Survey
C Lakshmi Devasena, R Revathi and M Hemalatha
Download Full-Text

A Comparative Study of Various Routing Protocols in VANET
Rakesh Kumar and Mayank Dave
Download Full-Text

Prevention Of Cross-Site Scripting Attacks XSS On Web Applications In The Client Side
S Shalini and S Usha
Download Full-Text

Real Time Communication Capacity for Data Delivery in Wireless Se nsor Networks
Deepali Virmani and Satbir Jain
Download Full-Text

Bridging the Gap between Technical Heterogeneity of Context-Aware Platforms-Experimenting a Service Based Connectivity between Adaptable Android WComp and OpenORB
Valerie Monfort and Sihem Cherif
Download Full-Text

Color Casts Detection and Adjustment
Sheng-Fuu Lin, Huang-Tsun Chen and Tsung-Han Lin
Download Full-Text

Smart Cane-Assistive Cane for Visually-impaired People
Mohd Helmy Abd Wahab, Amirul A Talib, Herdawatie A Kadir, Ayob Johari, A Noraziah, Roslina M Sidek and Ariffin A Mutalib
Download Full-Text

Path Planning for Mobile Robots using Iterative Artificial Potential Field Method
Hossein Adeli, M H N Tabrizi, Alborz Mazloomian, Ehsan Hajipour and Mehran Jahed
Download Full-Text

A Watermarking of Medical Image-New Approach Based On Multi-Layer Method
Mohamed Ali Hajjaji, Abdellatif Mtibaa and El-bey Bourennane
Download Full-Text

A Review of Cluster-Based Congestion Control Protocols in Wireless Mesh Networks
Adebanjo Adekiigbe, Kamalrulnizam Abu Bakar and Ogunnusi Olumide Simeon
Download Full-Text

Efficient mining of association rules based on gravitational search algorithm
Fariba Khademolghorani, Ahmad Baraani and Kamran Zamanifar
Download Full-Text

Ad Hoc Protocols Via Multi Agent Based Tools
Ali Bazghandi and Mehdi Bazghandi
Download Full-Text

On Stability Problems of Omega and 3-Disjoint Paths Omega Multi-stage Interconnection Networks
Ravi Rastogi, Nitin, Durg Singh Chauhan and Mahesh Chandra Govil
Download Full-Text

A Dynamic Framework of Reputation Systems for an Agent Mediated e-market
Vibha Gaur and Neeraj Kumar Sharma
Download Full-Text

Hierarchical Segmentation of Falsely Touching Characters from Camera Captured Degraded Document Images
Satadal Saha, Subhadip Basu and Mita Nasipuri
Download Full-Text

New Approximated Method of Auxiliary Sources for large-size scatterer
Sami Hidouri, Hichem Naamen and Taoufik Aguili
Download Full-Text

Factors Influencing Employee Knowledge Sharing Capabilities in Electronic Government Agencies in Malaysia
Noorazah Md Noor and Juhana Salim
Download Full-Text

Kernel Dimensionality Reduction on Sleep Stage Classification using ECG Signal
Sani M Isa, Ito Wasito and Aniati Murni Arymurthy
Download Full-Text

Implementation of cooperative virtual MISO communication in underwater acoustic wireless sensor networks
Mohammad Javad Jannati, Abdollah Doosti Aref and Vahid Tabataba Vakily
Download Full-Text

Performance Analysis Cluster and GPU Computing Environment on Molecular Dynamic Simulation of BRV-1 and REM2 with GROMACS
Heru Suhartanto, Arry Yanuar and Ari Wibisono
Download Full-Text

Mining Concepts Relationship Based on Numeric Grades
Mohammed Al-Sarem, Mostafa Bellafkih and Mohammed Ramdani
Download Full-Text

Lexical Disambiguation in Natural Language Questions-NLQs
Omar Al-Harbi, Shaidah Jusoh and Norita Md Norwawi
Download Full-Text

Image Segmentation Method Based On Finite Doubly Truncated Bivariate Gaussian Mixture Model with Hierarchical Clustering
G V S Rajkumar, K. Srinivasa Rao and P. Srinivasa Rao
Download Full-Text

Enhanced-Location-Dependent Caching and Replacement Strategies in Mobile Environment
Kahkashan Tabassum, Mahmood Quadri Syed and Avula Damodaram
Download Full-Text

A 3D signal obstruction model for realistic mobility models in Mobile Ad Hoc Networks
Hamideh Babaei, Morteza Romoozi and Majid Rostmai
Download Full-Text

Improvement of Connectivity in Mobile Ad-hoc Networks by Adding Static Nodes Based on A Realistic Mobility Model
Morteza Romoozi and Hamideh Babaei
Download Full-Text

Performance Analysis of Metro Ethernet Network Services over Asynchronous Transfer Mode Services for
S I Eludiora, Oluwatobi Stephen Akinsiku and Dauda Ayanda
Download Full-Text

A Chaos Based Blind Digital Image Watermarking in The Wavelet Transform Domain
Jila Ayubi, Shahram Mohanna, Farahnaz Mohanna and Mehdi Rezaei
Download Full-Text

Towards the Formal Specification and Verification of Multi-agent Based Systems
Boucherit Ammar and Khebaba Abdallah
Download Full-Text

Texture-based Image Retrieval Based on FABEMD
M H Ould Mohamed Dyla and H Tairi
Download Full-Text

SINR Prediction in Mobile CDMA Systems by Linear and Nonlinear Artificial Neural-Network-Based Predictors
Nahid Ardalani
Download Full-Text

Hybrid GA for Straight-Line Drawings of Level Clustered Planar Graphs
Ahmed A. Radwan, Mohamed A El-Sayed and Nahla F Omran
Download Full-Text

CPU and Memory Utilization by improving performance in network by Live Migration technology
Igli Tafa, Elinda Kajo, Hakik Paci, Elma Zanaj and Aleksander Xhuvani
Download Full-Text

User Affinity of Choice-Features of Mobile Device Graphical Password Scheme Anti-Shoulder Surfing Mechanism
Lim Kah Seng, Norafida Ithnin and Hazinah Kutty Mammi
Download Full-Text

Designing a WISHBONE Protocol Network Adapter for an Asynchronous Network-on-Chip
Ahmed H M Soliman, E M Saad, M El Bably and Hesham M A M Keshk
Download Full-Text

The Aware Cricket Ground
Wazir Zada Khan, Mohammed Y Aalsalem and Quratul Ain Arshad
Download Full-Text

Application of Butler Matrix to a Tree Structure of Microstrip Antenna Array
Tomader Mazri, Fatima Riouch and Najiba El Amrani El Idrissi
Download Full-Text

An Experimental Survey on Parsing with Neural and Finite Automata Networks
Sanjay Bhargava and G. N. Purohit
Download Full-Text

A fusion algorithm for joins based on collections in Odra-Object Database for Rapid Application development
Laika Satish and Sami Halawani
Download Full-Text

A Novel Approach for Intrusion Detection
Vikram Chopra, Sunil Saini and Amit Kumar Choudhary
Download Full-Text

Performance Evaluation of Efficient MAC in Mobile Ad Hoc Wireless Networks
Soni Sweta, Arun Nahar and Sanjeev Sharma
Download Full-Text

Emerging Cloud Computing Paradigm
Abu Sarwar Zamani, Md Mobin Akhtar and Sultan Ahmad
Download Full-Text

FloadAutoRED-an AQM scheme to Increase the Overall Performance in Internet Routers
Chitra Kandaswamy and Ganapathi Padmavathi
Download Full-Text

Palmprint Enhancement Using Discrete Curvelet Transform
S Palanikumar, M Sasikumar and J Rajeesh
Download Full-Text

Packet Filtering using IP Tables in Linux
Bhisham Sharma and Karan Bajaj
Download Full-Text

On the Solutions to the Travelling Salesman Problem using Nature Inspired Computing Techniques
Hifza Afaq and Sanjay Saini
Download Full-Text

Ant Colony Based Approach for Solving FPGA routing
Vinay Chopra and Amardeep Singh
Download Full-Text

Multi-agent based decision Support System using Data Mining and Case Based Reasoning
S Srinivasan, Jagjit Singh and Vivek Kumar
Download Full-Text

Rule based Part of speech Tagger for Homoeopathy Clinical realm
Sanjay Kumar Dwivedi and Pramod P Sukhadeve
Download Full-Text

A new approach to supply chain management based on pooling ITIL and APICS Principles and Practices
Abdelaali Himi, Mustapha El Masbahi, Samir Bahsani and Alami Semma
Download Full-Text

Information Retrieval Based on Semantic Similarity Using Information Content
Kishor Wagh and Satish Kolhe
Download Full-Text

Emotion Extractor-AI based methodology to implement prosody features in Speech Synthesis
M B Chandak and R V Dharaskar
Download Full-Text

Design of optimal chamfered bends in Rectangular Substrate Integrated Waveguide
Rahali Bochra, Mohammed Feham and Junwu Tao
Download Full-Text

An Unsupervised Approach to Analyze Users Opinion on Products using Customer Reviews
Ravi Kumar V and K Raghuveer
Download Full-Text

River extraction from satellite image
Venu Shah, Archana Choudhary and Kavita Tewari
Download Full-Text

MR imaging contrast enhancement and segmentation using fuzzy clustering
A Djerouni, H Hamada and N Berrached
Download Full-Text

A Technique to Reduce Transition Energy for Data-Bus in DSM Technology
A Sathish, M. Madhavi Latha and K Lalkishor
Download Full-Text

An Efficient Switching Activity Reduction Technique for On-Chip Data Bus
A Sathish, M. Madhavi Latha and K Lalkishor
Download Full-Text

A Novel Architecture for Motion Estimation
Subarna Chatterjee
Download Full-Text

An Approach for Privacy Preservation of Distributed Data in Peer-to-Peer Network using Multiparty Computation
Hemanta Kumar Bhuyan, Narendra Kumar Kamila and Sanjit Kumar Dash
Download Full-Text

Towards a Matrix Based Approach for Analyzing the Impact of Change on ETL Processes
Ahmed Kabiri, Faouzia Wadjinny and Dalila Chiadmi
Download Full-Text

An approach to the Optimization of menu-based Natural Language Interfaces to Databases
Fiaz Majeed, M Shoaib and Fasiha Ashraf
Download Full-Text

Modified PTS with FECs for PAPR Reduction in MIMO-OFDM System with Different Subblocks and Subcarriers
Mukunthan Pandurangan and Dananjayan Perumal
Download Full-Text

Multiple Pattern Matching Algorithm using Pair-count
Raju Bhukya and D V L N Somayajulu
Download Full-Text

Graphical Approach to the Learning of Inter-conversion of Various Number Systems
Shahid Latif, Faheem Khan, Muhammad Lal, Shahzad Hameed and Fahad Masood
Download Full-Text

Fire Fly Based Feature Selection Approach
Hema Banati and Monika Bajaj
Download Full-Text

Towards an Autonomous System for QoS management of IMS networks
Mohammed Errais, Brahim Raouyane, Mostafa Bellafkih and Mohammed Ramdani
Download Full-Text

Formal Concept Analysis Based Association Rules Extraction
Ben Boubaker Saidi Ourida and Tebourski Wafa
Download Full-Text

Model-Driven transformation with approach by modeling-From UML to N-tiers Web Model
Redouane Esbai, Mohammed Erramdani, Samir Mbarki, Ibtissam Arrassen, Abdelouafi Meziane and Mimoun Moussaoui
Download Full-Text

E-learning in Higher Education-Design and Implementation
Ashit Kumar Dutta, Al-Adhaileh Mosley and Md Mobin Akhtar
Download Full-Text

Power Aware Routing for MANET Using On-demand Multipath Routing Protocol
A. Rajaram and J Sugesh
Download Full-Text

Time Contingency Assessment in Construction Projects in Egypt using Artificial Neural Networks Model
Hazem Yahia, Hossam Hosny and Mohammad E Abdel Razik
Download Full-Text

Self Tuning of Oracle Database Using SQL Scripts
Pooja Rani, Pariniyojit Kumar Singh and Hitesh Kumar Sharma
Download Full-Text

Recovery of ?n bytes of data using Backtracking Algorithm
Asha Rani K P, Saravana B, Raghu D R, Raghunandan Athreya and Sangamesh J C
Download Full-Text

Implementation of Elliptical Curve Cryptography
Randhir Kumar and Akash Anil
Download Full-Text

iWEDS-An Intelligent Explosive Detection and Terrorist Tracking System Using Wireless Sensor Network
Balaji Hariharan and Arjun Sasidharan
Download Full-Text

Process and Database Modelling of a University Bursary System-A Perspective of Cash Office
Friday Yakubu, Barroon Ismaeel Ahmad, Olugbemi Morenike Omowumi and Maria Abur Mngohol
Download Full-Text

Novel Data Encryption Algorithm
Rajat Goel, Ripu R Sinha and O P Rishi
Download Full-Text

Variable Chunk Based Parallel Switching To Minimizing File Download Time in P2P Network
Amit Chougule and Shambhuraj Deshmukh
Download Full-Text

MAS-SCM for Auto Sector-The Framework
Ritu Sindhu, Abdul Wahid and G. N. Purohit
Download Full-Text

Spatial Domain based Image Enhancement Techniques for Scanned Electron Microscope-SEM-images
Rakhi Chanana, Parneet Kaur Randhawa and Navneet Singh Randhawa
Download Full-Text

Integrated Hidden Markov Model and Bayes Packet Classifier for effective Mitigation of Application DDoS attacks
S Prabha and R Anitha
Download Full-Text

SRCDD-Secure Route Construction and Data Dissemination Protocol for Wireless Sensor Networks
Seyed Reza Taghizadeh and Shahriar Mohammadi
Download Full-Text

Using Case-Based Reasoning for detecting computer virus
Abdellatif Berkat
Download Full-Text

Application Domain of Wireless Sensor Network-A Paradigm in Developed and Developing Countries
S Taruna, Kusum Jain and G. N. Purohit
Download Full-Text

A full featured component object oriented based architecture testing tool
Sarita Singh Bhadauria, Abhay Kothari and Lalji Prasad
Download Full-Text

Design of Model For Restructure Transformation of Public Sector
Ashok Kumar and Anil Kumar
Download Full-Text

Seamless Handoff through Information Retrieval in VANET Using Mobile Agent
Himanshu Tyagi and A K Vatsa
Download Full-Text

Intelligent Optimization Techniques for Industrial applications
E Raj Kumar
Download Full-Text

IJCSI Volume 8, Issue 4, No 1, July 2011

Download Full-Text

IJCSI Volume 8, Issue 4, No 2, July 2011

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »