Thursday 25th of April 2024                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 8, Issue 5, September 2011
An efficient algorithm for the nearest neighbourhood search for point clouds
Luca Di Angelo and Luigi Giaccari
Download Full-Text

Graph Colouring Algorithm for Validating Labelled 2D Line Drawing Objects
M.Z. Matondang, A.A.Samah, H. Haron and H. A. Majid
Download Full-Text

Document Representation and Clustering with WordNet Based Similarity Rough Set Model
Nguyen Chi Thanh and Koichi Yamada
Download Full-Text

Attention Driven Face Recognition, Learning from Human Vision System
Fang Fang
Download Full-Text

Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research
Paola Di Maio
Download Full-Text

A Collective Intelligence Based Approach to Business-to-Business E-Marketplaces
Youssef Iguider and Hiroyoshi Morita
Download Full-Text

Host-based Web Anomaly Intrusion Detection System, an Artificial Immune System Approach
Iman Khalkhali, Reza Azmi, Mozhgan Azimpour-Kivi and Mohammad Khansari
Download Full-Text

A PKI-based Track and Trace Network for Cross-boundary Container Security
S.L. Ting, W.H. Ip, W.H.K. Lam and E.W.T. Ngai
Download Full-Text

Artificial Neural Network for Transfer Function Placental Development: DCT and DWT Approach
Mohammad Ayache, Mohamad Khalil and Francois Tranquart
Download Full-Text

An agent-based and semantic service oriented approach for service discovery in Network Centric Warfare (NCW)
Masoud Barati and Mohammad Sajjad Khaksar Fasaei
Download Full-Text

Adaboost Ensemble with Genetic Algorithm Post Optimization for Intrusion Detection
Hany M. Harb and Abeer S. Desuky
Download Full-Text

Time Series based Temperature Prediction using Back Propagation with Genetic Algorithm Technique
Shaminder Singh, Pankaj Bhambri and Jasmeen Gill
Download Full-Text

Obstacle based Range-Free Localization-Error Estimation for WSN
S. Swapna Kumar, M. Nanda Kumar and V.S Sheeba
Download Full-Text

Colored Satellites Image Enhancement Using Wavelet and Threshold Decomposition
Muna F. Al-Samaraie and Nedhal Abdul Majied Al Saiyd
Download Full-Text

Multi-objective Numeric Association Rules Mining via Ant Colony Optimization for Continuous Domains without Specifying Minimum Support and Minimum Confidence
Parisa Moslehi, Behrouz Minaei Bidgoli, Mahdi Nasiri and Afshin Salajegheh
Download Full-Text

An auto detection system for Electrocardiogram of Foetal heart Issues
Mahmoud Ahmed Suliman Ali
Download Full-Text

A Fuzzy Realistic Mobility Model for VANET
Alireza Amirshahi, Mahmood Fathi, Morteza Romoozi and Mohammad Assarian
Download Full-Text

A new Color Feature Extraction method Based on Dynamic Color Distribution Entropy of Neighbourhoods
Fatemeh Alamdar and Mohammad Reza Keyvanpour
Download Full-Text

Developing Spring-Roll Dielectric Elastomer Actuator System Based on Optimal Design Parameters
Besada Adeeb Anees and Medhat Hussein Ahmed Awadalla
Download Full-Text

A Review of Congestion Control Algorithm for Event-Driven Safety Messages in Vehicular Networks
Mohamad Yusof Darus and Kamalrulnizam Abu Bakar
Download Full-Text

A Conceptual Framework of Knowledge Transfer in Malaysia E-Government IT Outsourcing: An Integration with Transactive Memory System (TMS)
Nor Aziati Abdul Hamid and Juhana Salim
Download Full-Text

RGWSN: Presenting a genetic-based routing algorithm to reduce energy consumption in wireless sensor network
Arash Gorbannia Delavar, Amir Abbas Baradaran and Javad Artin
Download Full-Text

Performance Modeling and Analysis of Distributed-Based Polling Networks
Salman Ali Qahtani
Download Full-Text

Clustering Web Access Patterns Based on Learning Automata
Babak Anari, Mohammad Reza Meybodi and Zohreh Anari
Download Full-Text

Comparison of the elastic coefficients and Calculation Models of the Mechanical Behavior one- Dimensional Composites
Saleh Alsubari and Hassan Chaffoui
Download Full-Text

Statistical Sign Language Machine Translation: from English written text to American Sign Language Gloss
Achraf Othman and Mohamed Jemni
Download Full-Text

Improving the User Query for the Boolean Model UsingGenetic Algorithms
Mohammad Othman Nassar, Feras Al Mashagba and Eman Al Mashagba
Download Full-Text

Subword Unit Concatenation for Malay Speech Synthesis
Sabrina Tiun, Rosni Abdullah and Tang Enyakong
Download Full-Text

A New Algorithm Based Entropic Threshold for Edge Detection in Images
Mohamed A. El-Sayed
Download Full-Text

Minutiae Extraction from Fingerprint Images - a Review
Roli Bansal, Priti Sehgal and Punam Bedi
Download Full-Text

Nonlinear Robust Regression Using Kernel Principal Component Analysis and R-Estimators
Antoni Wibowo and Mohammad Ishak Desa
Download Full-Text

An Enhanced Two-Stage Impulse Noise Removal Technique based on Fast ANFIS and Fuzzy Decision
V. Saradhadevi
Download Full-Text

A Metric for Measuring Degree of Service Cohesion in Service Oriented Designs
Mohammad Daghaghzadeh, Ahmad Baraani Dastjerdi and Hossein Daghaghzadeh
Download Full-Text

Non DTN Geographic Routing Protocols for Vehicular Ad Hoc Networks
Ramin Karimi, Norafida Ithnin, Shukor Abd Razak and Sara Najafzadeh
Download Full-Text

Comparative Analysis of Congestion Control Algorithms Using ns-2
Sanjeev Patel, P. K. Gupta, Arjun Garg, Prateek Mehrotra and Manish Chhabra
Download Full-Text

Grammatical Relations of Myanmar Sentences Augmented by Transformation-Based Learning of Function Tagging
Win Win Thant, Tin Myat Htwe and Ni Lar Thein
Download Full-Text

Developing Adaptive Elearning: An Authoring Tool Design
Said Talhi and Mahieddine Djoudi
Download Full-Text

Bidirectional Agglomerative Hierarchical Clustering using AVL Tree Algorithm
Hussain Abu-Dalbouh and Norita Md Norwawi
Download Full-Text

Asynchronous Hybrid Kogge-Stone Structure Carry Select Adder Based IEEE-754 Double-Precision Floating-Point Adder
Abhijith Kini G.
Download Full-Text

Fuzzy-Genetic Classifier algorithm for bank's customers
Rashed Mokhtar Elawady, Aziza Asim and Sara Mahmoud Sweidan
Download Full-Text

Graph based E-Government web service composition
Hajar Elmaghraoui, Imane Zaoui, Dalila Chiadmi and Laila Benhlima
Download Full-Text

3D Model Classification and Retrieval Based on Semantic and Ontology
My Abdellah Kassimi and Omar El Beqqali
Download Full-Text

Feature Selection for Generator Excitation Neurocontroller Development Using Filter Technique
Abdul Ghani Abro and Junita Mohamad Saleh
Download Full-Text

Mining Frequent Ranges of Numeric Attributes via Ant Colony Optimization for Continuous Domain without Specifying Minimum Support
Parisa Moslehi, Behrouz Minaei, Mahdi Nasiri and Erfan Nazari Fazel
Download Full-Text

Dual Transform based Feature Extraction for Face Recognition
Ramesha K and K B Raja
Download Full-Text

Sine-Cosine-Taylor-Like Method for Hole-Filler ICNN Simulation
Sukumar Senthilkumar and Abd Rahni Mt Piah
Download Full-Text

An Enhanced Indexing And Ranking Technique On The Semantic Web
Ahmed Tolba, Nabila Eladawi and Mohammed Elmogy
Download Full-Text

A Dynamic Load Balancing Algorithm in Computational Grid Using Fair Scheduling
U.Karthick Kumar
Download Full-Text

Color and Texture Feature for Remote Sensing – Image Retrieval System: A Comparative Study
Retno Kusumaningrum and Aniati Murni Arymurthy
Download Full-Text

An Effective Intelligent Model for Medical Diagnosis
Mohamed El-Rashidy, Taha E. Taha, Nabil Ayad and Hoda Sroor
Download Full-Text

On Tandem Communication Network Model with DBA and Modified Phase Type Transmission Having NHP Arrivals for First Node and Poisson Arrival for Second Node
M.V.Rama Sundari, K.Srinivas Rao, P.Srinivasa Rao and P.Suresh Varma
Download Full-Text

Solving touristic trip planning problem by using taboo search approach
Kadri Sylejmani and Agni Dika
Download Full-Text

Selecting Features of Single Lead ECG Signal for Automatic Sleep Stages Classification using Correlation-based Feature Subset Selection
Ary Noviyanto, Sani M. Isa, Ito Wasito and Aniati Murni Arymurthy
Download Full-Text

A Graphical Password Based System for Small Mobile Devices
Wazir Zada Khan, Mohammed Y Aalsalem and Yang Xiang
Download Full-Text

Specification and Verification of Uplink Framework for Application of Software Engineering using RM-ODP
Krit Salahddine, Laassiri Jalal and El Hajji Said
Download Full-Text

Web Services Non-Functional Classification to Enhance Discovery Speed
Mamoun Mohamad Jamous and Safaai Bin Deris
Download Full-Text

3D Graphical User Interface on Personal Computer using P5 Data Glove
Ms Khyati R. Nirmal
Download Full-Text

POCS Based Super-Resolution Image Reconstruction Using an Adaptive Regularization Parameter
S.S.Panda, M S R S Prasad and Dr.G Jena
Download Full-Text

Mingling Multipath Routing With Quality Of Service
Dr. Shuchita Upadhyaya and Gaytri Devi
Download Full-Text

Real-Time Blood Donor Management Using Dashboards Based on Data Mining Models
Santhanam T and Shyam Sundaram
Download Full-Text

Dynamic Reputation Based Trust Management Using Neural Network Approach
Reza Azmi, Mahdieh Hakimi and Zahra Bahmani
Download Full-Text

Comparative Analysis for Discrete Sine Transform as a suitable method for noise estimation
Swati Dhamija and Dr. Priyanka Jain
Download Full-Text

Reliable Energy Conservation in Wireless Sensor Networks using Flooding Techniques
L. Nalini Joseph and Dr.S.Shanmugavel
Download Full-Text

Picture Collage with Genetic Algorithm and Stereo vision
Hesam Ekhtiyar, Mahdi Sheida and Mahmood Amintoosi
Download Full-Text

Farsi/Arabic Document Image Retrieval through Sub -Letter Shape Coding for mixed Farsi/Arabic and English text
Zahra Bahmani and Reza Azmi
Download Full-Text

An Efficient Secure Biometric System with Non-Invertible Gabor Transform
N.Radha and Dr.S.Karthikeyan
Download Full-Text

Multi agent Simulation: A Unified Framework for the analysis of viral infections within a bovine population
Dr. Tahar Guerram and Nour El Houda Dehimi
Download Full-Text

A Subnet Based Intrusion Detection Scheme for Tracking down the Origin of Man-In-The-Middle Attack
S.Vidya and R.Bhaskaran
Download Full-Text

High Capacity and Resistance to Additive Noise Audio Steganography Algorithm
Haider Ismael Shahadi and Razali Bin Jidin
Download Full-Text

A Comparative Study of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET
Tamilarasan
Download Full-Text

Medicinal Plants Database and Three Dimensional Structure of the Chemical Compounds from Medicinal Plants in Indonesia
Arry Yanuar, Abdul Munim, Akma Bertha Aprima Lagho, Rezi Riadhi Syahdi, Marjuqi Rahmat and Heru Suhartanto
Download Full-Text

A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions
Javad Alizadeh and Abdolrasoul Mirghadri
Download Full-Text

Identifying Clusters of Concepts in a Low Cohesive Class for Extract Class Refactoring Using Metrics Supplemented Agglomerative Clustering Technique
A. Ananda Rao and K. Narendar Reddy
Download Full-Text

Named Entity Identifier for Malayalam Using Linguistic Principles Employing Statistical Methods
Bindu.M.S and Sumam Mary Idicula
Download Full-Text

Efficient Online Tutoring Using Web Services
Mr.M.Balakrishnan and Dr.K.Duraiswamy
Download Full-Text

An Automated Approach to Embrace Changes During Use case Model Evolution
Amer N. Abuali
Download Full-Text

Amalgamation of Automated Testing and Data Mining: A Novel Approach in Software Testing
Sarita Sharma and Anamika Bhargava
Download Full-Text

Simulation of Thermal Comfort of a Residential House
Masine Md. Tap, Haslinda Mohamed Kamar, Abdul Kadir Marsono, Nazri Kamsah and Khairul Amry Mohd Salimin
Download Full-Text

Improved Datagram Transport Protocol over Wireless Sensor Networks- TCP Fairness
Senthil Kumaran .M and Dr. R. Rangarajan
Download Full-Text

Evaluation Of Scheduling And Load Balancing Techniques In Mobile Grid Architecture
Debabrata Singh, Sandeep Nanda, Sarbeswara Hota and Manas Kumar Nanda
Download Full-Text

Optimized Fuzzy Logic Based Segmentation for Abnormal MRI Brain Images Analysis
Indah Soesanti, Adhi Susanto, Thomas Sri Widodo and Maesadji Tjokronagoro
Download Full-Text

A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key
Tanmay Bhattacharya, Sirshendu Hore and S. R. Bhadra Chaudhuri
Download Full-Text

A Study of Library Databases by Translating Those SQL Queries into Relational Algebra and Generating Query Trees
Santhi Lasya and Sreekar Tanuku
Download Full-Text

Intelligent Scheduling in Health Care Domain
Srividya Bhat, Ravi S Malashetty and Nandini S Sidnal
Download Full-Text

Fast Hybrid PSO and Tabu Search Approach for Optimization of a Fuzzy Controller
Nesrine Talbi
Download Full-Text

Modify LEACH Algorithm for Wireless Sensor Network
Mortaza and Mohammad Ali
Download Full-Text

Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking
Abduljabbar Shaamala, Shahidan M. Abdullah and Azizah A. Manaf
Download Full-Text

The Descriptive Study of Knowledge Discovery from Web Usage Mining
Yogish H K, Dr. G T Raju and Manjunath T N
Download Full-Text

Robust Model for Text Extraction from Complex Video Inputs Based on SUSAN Contour Detection and Fuzzy C Means Clustering
Narasimha Murthy K N
Download Full-Text

A Robust Watermarking Algorithm Based on Image Normalization and DC Coefficients
Tumula Sridevi and V. Vijaya Kumar
Download Full-Text

Improved Free-Form Database Query Language for Mobile Phones
Shiramshetty Gouthami, Pulluri Srinivas Rao and Jayadev Gyani
Download Full-Text

Architectural Model of Localization in Multi-Scale Communication for Wireless Sensor Networks
S Swapna Kumar, M. Nanda Kumar and V.S Sheeba
Download Full-Text

FinFET Architecture Analysis and Fabrication Mechanism
Sarman K Hadia, , Rohit R. Patel and Dr. Yogesh P. Kosta
Download Full-Text

A Novel Method for Efficient Text Extraction from Real Time Images with Diversified Background using Haar Discrete Wavelet Transform and K-Means Clustering
Narasimha Murthy K N
Download Full-Text

Classification of EEG data using FHT and SVM based on Bayesian Network
V. Baby Deepa and Dr. P. Thangaraj
Download Full-Text

Indication of Efficient Technique for Detection of Check Bits in Hamming Code
Rahat Ullah, Jahangir Khan, Shahid Latif and Inayat Ullah
Download Full-Text

Feature Extraction and Classification of Oil Spills in SAR Imagery
Radhika V and G.Padmavathi
Download Full-Text

Configuration of FPGA For Computerized Speech/Sound Processing For Bio-Computing Systems
V. Hanuman Kumar and P. Seetha Ramaiah
Download Full-Text

Corpus Based Context Free Grammar Design for Natural Language Interface to Database
Avinash J. Agrawal and Dr. O.G. Kakde
Download Full-Text

A framework for dynamic indexing from hidden web
Hasan Mahmud, Moumie Soulemane and Mohammad Rafiuzzaman
Download Full-Text

Comparative Study of 3G and 4G in Mobile Technology
Kumaravel Krishnan
Download Full-Text

Rise of Data Mining: Current and Future Application Areas
Dharminder Kumar and Deepak Bhardwaj
Download Full-Text

Energy Efficient Clustering Algorithms in Wireless Sensor Networks: A Survey
Vinay Kumar, Sanjeev Jain and Sudarshan Tiwari
Download Full-Text

Effect of different defuzzification methods in a fuzzy based load balancing application
Sameena Naaz, Afshar Alam and Ranjit Biswas
Download Full-Text

Modelling An Enhanced Routing Protocol For Wireless Sensor Networks Using Implicit Clustering Technique
Idigo Victor, Azubogu A.C.O, Oguejiofor Obinna Samuel and Nnebe Scholar
Download Full-Text

Visualising Pipeline Sensor Datasets with Modified Incremental Orthogonal Centroid Algorithm
Folorunso Olufemi Ayinde and Mohd Shahrizal Sunar
Download Full-Text

Genetic programming approach on evaporation losses and its effect on climate change for Vaipar Basin
K.S.Kasiviswanathan, R. Soundhara Raja Pandian, S.Saravanan and Avinash Agarwal
Download Full-Text

Models of Growth Heterogeneous Cancer Cells with Chains Markoviens and Estimation of Their Fractal Dimension
Abdelhamid Zerroug and Labib Sadek Terrissa
Download Full-Text

A Framework to Enhance Quality of Service for Content Delivery Network Using Web Services: A Review
K.Manivannan and C.G.Ravichandran
Download Full-Text

Filtration Of Artifacts In ECG Signal Using Rectangular Window-Based Digital Filters
Mbachu C.B, Idigo Victor, Ifeagwu Emmanuel and Nsionu I. I
Download Full-Text

Object Recognition Using Support Vector Machine Augmented by RST Invariants
Muralidharan R and Dr.C.Chandrasekar
Download Full-Text

Improved Exemplar Based Texture Synthesis Method for Natural Scene Image Completion
K. Sangeetha, Dr. P. Sengottuvelan and E. Balamurugan
Download Full-Text

Study of Performance of the combined MIM0 MMSE VBLAST-OFDM for Wi-Fi (802.11n)
Souhila Ferouani, G. Abdellaoui, F. Debbat and F. T. Bendimerad
Download Full-Text

Neural networks for error detection and data aggregation in wireless sensor network
Saeid Bahanfar, Helia Kousha and Ladan Darougaran
Download Full-Text

Aspect-Oriented Requirements Engineering for Advanced Separation of Concerns: A Review
Narender Singh and Nasib Singh Gill
Download Full-Text

Performance of MIMO VBLAST-OFDM in Ka-Band
Souhila Ferouani, G. Abdellaoui, F. Debbat and F. T. Bendimerad
Download Full-Text

Automatic image clustering using a swarm intelligence approach
Ouadfel Salima, Batouche Mohamed and Abdlemalik Ahmed-Taleb
Download Full-Text

Energy Efficient Adaptive Protocol for Clustered Wireless Sensor Networks
K.Padmanabhan and P. Kamalakkannan
Download Full-Text

A Cryptographic Algorithm based onBilinear Transformation
Phani Krishna Kishore M and Venugopal Ivs
Download Full-Text

Encrypted IT Auditing and Log Management on Cloud Computing
Rajiv R Bhandari and Nitin Mishra
Download Full-Text

Low Power NoC Switch using Novel Adaptive Virtual Channels
Rabab Ezz-Eldin, Magdy A. El-Moursy and Amr M. Refaat
Download Full-Text

GPRS and Bluetooth Based Devices/Mobile Connectivity Shifting From Manual To Automation For Performance Optimization
Nazia Bibi, Tahira Mahboob and Malik Sikander Hayat Khiyal
Download Full-Text

Emotion Recognition using Dynamic Time Warping Technique for Isolated Words
N. Murali Krishna, P.V. Lakshmi, Y. Srinivas and J. Sirisha Devi
Download Full-Text

A New Routing Algorithm for a Three-Stage Clos Interconnection Networks
Zahra Sadat Ghandriz and Esmaeil Zeinali Khasraghi
Download Full-Text

Image Mining for Mammogram Classification by Association Rule Using Statistical and GLCM features
Aswini Kumar Mohanty, Sukanta Kumar Swain, Pratap Kumar Champati and Saroj Kumar Lenka
Download Full-Text

Decentralized Lifetime Maximizing Tree with Clustering for Data Delivery in Wireless Sensor Networks
Deepali Virmani and Satbir Jain
Download Full-Text

Application of Neural Networks for Noise and Filter Classification to enhance the Image Quality
Dr. T. Santhanam and S. Radhika
Download Full-Text

Development Strategy using Cognitive Domain in e-Requirement Engineering Learning System
Nor Azliana Akmal Jamaludin and Shamsul Sahibuddin
Download Full-Text

Proposing Cluster_Similarity Method in Order to Find as Much Better Similarities in Databases
Mohammad-Reza Feizi-Derakhshi and Azade Roohany
Download Full-Text

Study of the Master-Slave replication in a distributed database
Kalonji Kalala Hercule, Mbuyi Mukendi Eugene, Boale Bomolo Paulin and Lilongo Bokaletumba Joel
Download Full-Text

An Image Compression Approach using Wavelet Transform and Modified Self Organizing Map
G. Boopathi
Download Full-Text

Survey on Power Optimization for Disk Based Systems
G. Ravikumar and Dr.N. Nagarajan
Download Full-Text

Automatic Keywords Extraction for Punjabi Language
Vishal Gupta and Gurpreet Singh Lehal
Download Full-Text

Bandwidth Estimation For Mobile Ad hoc Network (MANET)
Rabia Ali and Dr. Fareeha Zafar
Download Full-Text

Impact of Outlier Removal and Normalization Approach in Modified k-Means Clustering Algorithm
Vaishali Rajeev Patel and Rupa G. Mehta
Download Full-Text

Knowledge Collaboration in Higher Educational Institutions in India: Charting a Knowledge Management Solution
Mamta Bhusry and Jayanti Ranjan
Download Full-Text

Energy Efficient Routing Scheme for Sensor Networks Using Connected Dominating Set
K. P. Sampoornam and Dr. K. Rameshwaran
Download Full-Text

Autonomic Management for Multi-agent Systems
Nadir Kamal Salih, G. K. Viju and Abdelmotalib A.Mohamed
Download Full-Text

Performance Enhancement of a Dynamic System Using PID Controller Tuning Formulae
Jyotiprakash Patra and Dr.Partha Sarathi Khuntia
Download Full-Text

Application of Cluster Analysis In Expert System - A Brief Survey
Mamta Tiwari and Bharat Misra
Download Full-Text

A Fuzzy Neural Clustering approach for Fingerprint Recognition
Mahendra Kondekar, Uday Kulkarni and Santosh Chowhan
Download Full-Text

A Framework for Picture Extraction on Search Engine: Improved and Meaningful Result
Anamika Sharma and Sarita Sharma
Download Full-Text

Using Bee Colony Optimization to Solve the Task Scheduling Problem in Homogenous Systems
Vahid Arabnejad, Ali Moeini and Nasrollah Moghadam
Download Full-Text

Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris
Mr.P.Balakumar and Dr.R.Venkatesan
Download Full-Text

Analysis of Stemming Algorithm for Text Clustering
N.Sandhya, Y.Srilalitha, V.Sowmya, Dr.K.Anuradha and Dr.A.Govardhan
Download Full-Text

Enhancing Information Systems Security in Educational Organizations in KSA through proposing security model
Hussain A.H. Awad and Fadi M. Battah
Download Full-Text

Image Transference and Retrieval over SMS
Muhammad Fahad Khan, Saira Beg and Fakhra Kashif
Download Full-Text

Process of Reverse Engineering of Enterprise Information System Architecture
Mohammed Abdul Bari and Shahanawaj Ahamad
Download Full-Text

An Adaptive Notch Filter For Noise Reduction and Signal Decomposition.
Vikas S. Mane and Amrita A. Agashe
Download Full-Text

Object-Net Approach for Data Extraction and Reporting
M.Munusamy
Download Full-Text

Reliable Communication in Wireless Body Area Sensor Network for Health Monitoring
Saeid Bahanfar, Ladan Darougaran, Helia Kousha and Shahram Babaie
Download Full-Text

An Efficient I-MINE Algorithm for Materialized Views in a data Warehouse Environment
T.Nalini, Dr. A. Kumaravel and Dr.K.Rangarajan
Download Full-Text

Implementation of re-configurable Digital front end module of MIMO-OFDM module using NCO
Veena M.B. and Dr. M.N. Shanmukha Swamy
Download Full-Text

A Review of Clustering Techniques Based on Machine learning Approach in Intrusion Detection Systems
Ala’ Yaseen Ibrahim Shakhatreh and Kamalrulnizam Abu Bakar
Download Full-Text

A new method for classification of Brachiopods based on the radon transformation
Youssef Ait Khouya and Noureddine Alaa
Download Full-Text

Development of CAD System Based on Enhanced Clustering Based Segmentation Algorithm for Detection of Masses in Breast DCE-MRI
D. Janaki Sathya
Download Full-Text

Secure Geographic Routing Protocols: Issues and Approaches
Mehdi Sookhak, Ramin Karimi, Norafidaithnin, Mahboobeh Haghparast and Ismail Fauziisnin
Download Full-Text

A Detailed Study on Energy Efficient Techniques for Mobile Adhoc Networks
S. Suganya and S. Palaniammal
Download Full-Text

Design of a new model of miniature antenna quasi-isotropic coverage
Abdellatif Berkat, Noureddine Boukli-Hacene and F. Tarik Bendimerad
Download Full-Text

A Study on Cyber Crimes and protection
Loganathan M and Dr.E.Kirubakaran
Download Full-Text

SWOT Analysis of Software Development Process Models
Ashish B. Sasankar and Dr. Vinay Chavan
Download Full-Text

Object-Oriented Software Methodologies: Roadmap to the Future
Usman Ali Khan, Dr. Ibrahim A. Al-Bedewi and Kunal Gupta
Download Full-Text

Corporate Customers Usage of Internet Banking in East Africa
Nelson Jagero and Silvance O. Abeka
Download Full-Text

Dynamic unlicensed bands access based on the decentralized resource distribution approach
Souleymane Oumtanaga, Zamble Raoul and Michel Babri
Download Full-Text

Image Restoration Using Thresholding Techniques on Wavelet Coefficients
Rubeena Vohra and Akash Tayal
Download Full-Text

An Alternative Process Documentation for Data Warehouse Projects
Jyothi Prasad K S S, G Hima Bindu and G Lakshmeeswari
Download Full-Text

Enrich the E-publishing Community Website with Search Engine Optimization Technique
Vadivel Rangasamy and Dr. K. Baskaran
Download Full-Text

The Regulatory Challenges and Opportunities of IP Telephony: Perspective on Malaysia
Md Khaled Shukran
Download Full-Text

Analysis and Improvement of DSDV Protocol
Nayan Ranjan Paul, Laxminath Tripathy and Pradipta Kumar Mishra
Download Full-Text

Fuzzy Kernel and Fuzzy Subsemiautomata with Thresholds
M. Basheer Ahamed and J. Michael Anna Spinneli
Download Full-Text

Classification of Load Balancing Conditions for parallel and distributed systems
Mohammad Zubair Khan, R. Singh, J. Alam and S. Saxena
Download Full-Text

Power Optimization in Wireless Sensor Networks
Debmalya Bhattacharya and R. Krishnamoorthy
Download Full-Text

Towards Maximum Spanning Tree Model in Web 3.0 Design and Development for Students using Discriminant Analysis
S.Padma and Ananthi Seshasaayee
Download Full-Text

A study for Issues of the Location ManagementIn Mobile Networks
Sami M. Halawani, Dr. Ab Rahman Bin Ahmad and M. Z. Khan
Download Full-Text

ZigBee Based Electric Meter Reading System
S. Arun, R. Krishnamoorthy and Dr. Venugopala Rao.M
Download Full-Text

Comparative Performance Analysis Of Different Radio Channel Modelling For Bluetooth Localization System
Idigo Victor, Okezie C.C, Akpado Kenneth and Ohaneme C.O
Download Full-Text

Entropy of Data Compression Using Object Oriented Data Warehousing
Pushpa Suri and Meenakshi Sharma
Download Full-Text

High Throughput and Low Power NoC
Magdy A. El-Moursy and Mohamed Abdelgany
Download Full-Text

Establishing Relationship between Complexity and Faults for Object-Oriented Software Systems
Usha Chhillar and Sucheta Bhasin
Download Full-Text

Adverse Conditions and ASR Techniques for Robust Speech User Interface
Urmila Shrawankar and Dr. Vilas Thakare
Download Full-Text

Data Visualization Technique Framework for Intrusion detection
Alaa El - Din Riad, Ibrahim Elhenawy, Ahmed Hassan and Nancy Awadallah
Download Full-Text

Novel information security model using proposed e-cipher method with combining the features of cryptic-steganography
Prof. R. Venkateswaran and Prof. Dr.V. Sundaram
Download Full-Text

Generation of Random Fields for Image Enhancement and Reconstruction
B.Srinivasa Rao, K.Srinivas and Dr.Lss Reddy
Download Full-Text

Query Optimization Using Genetic Algorithms in the Vector SpaceModel
Eman Al Mashagba, Feras Al Mashagba and Mohammad Othman Nassar
Download Full-Text

Cluster Based Hybrid Niche Mimetic and Genetic Algorithm for Text Document Categorization
A. K. Santra, C. Josephine Christy and B. Nagarajan
Download Full-Text

Rahul Fixed Priority Enhance Classes Bandwidth Exploitation in TDM EPON
Muhammad Bilal
Download Full-Text

Modeling Component-based Bragg gratings Application: tunable lasers
Hedara Rachida and Mohammed Chikh-Bled
Download Full-Text

Weighted Bit Rate Allocation in JPEG2000 Tile Encoding
Singara Singh, R. K. Sharma and M. K. Sharma
Download Full-Text

A Routing Algorithm based on Cellular Automata for Mobile Ad-hoc Networks
Azadeh Ghalavand, Ahmad Khademzadeh, Arash Dana and Golnoosh Ghalavand
Download Full-Text

Research on effective factors on Verification Results in Software Systems
Alireza Souri, Mohammad Ali Sharifloo and Monire Norouzi
Download Full-Text

Identifying Reference Objects by Hierarchical Clustering in Java Environment
Rahul Saha and G. Geetha
Download Full-Text

Development of MIL-STD-1553B Synthesizable IP Core for Avionic Applications
Enumala Srikrishna, P.H.S.T.Murthy and L.Madanmohan
Download Full-Text

Multimedia-based Medicinal Plants Sustainability Management System
Zacchaeus Omogbadegun, Charles Uwadia, Charles Ayo, Victor Mbarika, Nicholas Omoregbe, Efe Otofia and Frank Chieze
Download Full-Text

Comparison of Conventional and Modern Load Forecasting Techniques Based on Artificial Intelligence and Expert Systems
Badar Ul Islam
Download Full-Text

A New Approach to Encoding and Hiding Information in an Image
Fadhil Salman Abed
Download Full-Text

Design and implementation of a platform for location-based services: a case study of GIS of archaeological and handicraft of Fez Medina
Essayad Abdesslam
Download Full-Text

A Methodological Review for the Analysis of Divide and Conquer Based Sorting/ Searching Algorithms
Deepak Abhyankar and Maya Ingle
Download Full-Text

Secure Authentication using Anti-Screenshot Virtual Keyboard
Ankit Parekh, Ajinkya Pawar, Pratik Munot and Piyush Mantri
Download Full-Text

X-ray view on a Class using Conceptual Analysis in Java Environment
Gulshan Kumar and Mritunjay Kumar Rai
Download Full-Text

A fast multi-class SVM learning method for huge databases
Djeffal Abdelhamid, and Taleb-Ahmed Abdelmalik
Download Full-Text

Fast FPGA Implementation of EBCOT block in JPEG2000 Standard
Anass Mansouri, Ali Ahaitouf and Farid Abdi
Download Full-Text

IJCSI Volume 8, Issue 5, No 1, September 2011

Download Full-Text

IJCSI Volume 8, Issue 5, No 2, September 2011

Download Full-Text

IJCSI Volume 8, Issue 5, No 3, September 2011

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Email: info@ijcsi.org

More contact details »