Monday 20th of February 2017                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 8, Issue 6, November 2011
Using Cryptography in Trust Computing for Networked Communications
Dang-Quan Nguyen and Louise Lamont
Download Full-Text

Wavelet Based Color Image Compression and Mathematical Analysis of Sign Entropy Coding
Mbainaibeye Jérôme, Noureddine Ellouze and Christian Olivier
Download Full-Text

A Tunable Checkpointing Algorithm for Distributed Mobile Applications
Sungchae Lim
Download Full-Text

Modelling and simulation of complex systems: an approach based on multi-level agents
Alain-Jerome Fougeres
Download Full-Text

Implementation of MDA Method into SOA Environment for Enterprise Integration
Wiranto Herry Utomo
Download Full-Text

Testability Analysis Approach For Reactive Systems
Nguyen Thanh Binh and Chantal Robach
Download Full-Text

SMARTNotes: Semantic annotation system for a collaborative learning
Driss Bouzidi, Rachid Elouahabi and Noreddine Abghour
Download Full-Text

Comparison and Application of Metaheuristic Population-Based Optimization Algorithms in Manufacturing Automation
Rhythm Suren Wadhwa
Download Full-Text

Learning Mechanisms and Local Search Heuristics for the Fixed Charge Capacitated Multicommodity Network Design
Ilfat Ghamlouche, Teodor Gabriel Crainic, Michel Gendreau and Ihab Sbeity
Download Full-Text

An Ensemble Method for Validation of Cluster Analysis
Sunghae Jun
Download Full-Text

An Efficient Method for Mining Event-Related Potential Patterns
Seyed Aliakbar Mousavi, Muhammad Rafie Hj Arshad, Hasimah Hj Mohamed and Saleh Ali Alomari
Download Full-Text

A System to Detect Residential Area in Multispectral Satellite Images
Seyfallah Bouraoui
Download Full-Text

GSAT Enhanced with Learning Automata and Multilevel Paradigm
Noureddine Bouhmala and Ole-Christoffer Granmo
Download Full-Text

LR-WPAN Formation Topologies using IEEE 802.15.4
Salman Naseer and S R Chaudhary
Download Full-Text

Dewy Index Based Arabic Document Classification with Synonyms Merge Feature Reduction
Amal Alajmi, Elsayed M Saad and Medhat H Awadalla
Download Full-Text

Electromagnet Gripping in Iron Foundry Automation Part I: Principles and Framework
Rhythm Suren Wadhwa and Terje-Lien
Download Full-Text

A Novel Architecture for Quantum-Dot Cellular Automata Multiplexer
Arman Roohi, Hossein Khademolhosseini, Samira Sayedsalehi and Keivan Navi
Download Full-Text

QGRP: A Novel QoS-Geographic Routing Protocol for Multimedia Wireless Sensor Networks
Mohammed-Amine Koulali, Mohammed El Koutbi, Abdellatif Kobbane and Mostafa Azizi
Download Full-Text

Conception and Use of Ontologies for Indexing and Searching by Semantic Contents of Video Courses
Merzougui Ghalia, Djoudi Mahieddine and Behaz Amel
Download Full-Text

A Collaborative Algorithm for Ontological Matching in E-Learning Courseware Domain Knowledge Network
Akanbi C. Olufisoye, Adagunodo E. Rotimi, Omotosho Lawrence O and Adigun Adepeju A
Download Full-Text

Enhancing Web Search with Semantic Identification of User Preferences
Naglaa Fathy, Nagwa Badr, Mohamed Hashem and Tarek F. Gharib
Download Full-Text

Diagnosis of Fish Diseases Using Artificial Neural Networks
J.N.S. Lopes, A.N.A. Gonçalves, R.Y. Fujimoto and J.C.C. Carvalho
Download Full-Text

Blind Recognition Algorithm of Turbo Codes for Communication Intelligence Systems
Ali Naseri, Omid Azmoon and Samad Fazeli
Download Full-Text

BPISG: A Batching Heuristic Scheduling Algorithm With Taking Index Parameters for Mapping Independent Tasks on Heterogenous Computing Environment
Arash Ghorbannia Delavar, Ali Reza Kalili Boroujeni and Javad Bayrampoor
Download Full-Text

A Review of Burst Scheduling Algorithm in WDM Optical Burst Switching Network
Sanjay.N.Sharma and R.P.Adgaonkar
Download Full-Text

Performance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks
Abeer Ghandar, Eman Shabaan and Zaky Taha Fayed
Download Full-Text

Real-Time Projection Shadow with Respect to Sun Position in Virtual Environments
Hoshang Kolivand, Azam Amirshakarami and Mohd Shahrizal Sunar
Download Full-Text

Design Approaches to Enhance Usability for E-Commerce Sites
Mohiuddin Ahmed, Jonayed Kaysar and Nafis Rahman
Download Full-Text

Designing an Improved Fuzzy Multi Controller
Saeed Barzideh, Arash Dana, Ahmad Ali Ashrafian and Gh.Sajedy Abkenar
Download Full-Text

Cross Layer Implementation of Key Establishment and Configuration Protocols in WSN
Ozgur Saglam and Mehmet Emin Dalkilic
Download Full-Text

DTN Routing Protocols for VANETs: Issues and Approaches
Ramin Karimi, Norafida Ithnin, Shukor Abd Razak and Sara Najafzadeh
Download Full-Text

Design of a New Model of Multiband Miniature Antenna Near Isotropic
Abdellatif Berkat and Noureddine Boukli-Hacene
Download Full-Text

Theoretical analysis of VoIP transmission through different Wireless access technologies
Emna Charfi, Lamia Chaari and Lotfi Kamoun
Download Full-Text

Performance Evaluation and Analytical Validation of Internet Gateway Discovery Approaches in MANET
Rakesh Kumar, Anil K. Sarje and Manoj Misra
Download Full-Text

Application of Quantitative Models, MNLR and ANN in Short Term Forecasting of Ship Data
P.Oliver Jayaprakash and K. Gunasekaran
Download Full-Text

Comparing Methods for segmentation of Microcalcification Clusters in Digitized Mammograms
Hajar Moradmand, Saeed Setayeshi and Hossein Khazaei Targhi
Download Full-Text

Enhancing the Quality of E-learning Systems via Multimedia Learning Tools
Haroon Tarawneh, Mohammad Tarawneh and Farid Alzboun
Download Full-Text

Scalable Symmetric Key Cryptography Using Asynchronous Data Exchange in Enterprise Grid
Medhat Awadallah and Ahmed Youssef
Download Full-Text

Grayscale Image Compression Based on Min Max Block Truncating Coding
Hilal Almarabeh, Khalil Barhoum and Majdi Ahed
Download Full-Text

A Model for Crises Management in Software Projects
Mohammad Tarawneh, Haroon Tarawneh and Farid Alzboun
Download Full-Text

The Conception and the Study of a Triple-band Planar Inverted-F Antenna
Ibnyaich Saida, Ghammaz Abdelilah and Hassani Moha Mrabet
Download Full-Text

A Luenberger State Observer for Simultaneous Estimation of Speed and Rotor Resistance in sensorless Indirect Stator Flux Orientation Control of Induction Motor Drive
Mabrouk Jouili, Mabrouk Jouili and Mabrouk Jouili
Download Full-Text

Exploring a Hybrid of Geospatial Semantic Information in Ubiquitous Computing Environments
Raghda A. Fouad, Mohamed Hashem, Nagwa Badr and Hanaa Talha
Download Full-Text

HASoC for Developing a Software System
Salah Eldin Abdelrahman and Mohammed Badawy
Download Full-Text

A Multimodal Biometric System Using Linear Discriminant Analysis For Improved Performance
Aamir Khan, Muhammad Farhan, Aasim Khurshid and Adeel Akram
Download Full-Text

FHESMM: Fuzzy Hybrid Expert System for Marketing Mix Model
Mehdi Neshat, Ahmad Baghi, Ali Akbar Pourahmad, Ghodrat Sepidnam, Mehdi Sargolzaei and Azra Masoumi
Download Full-Text

Nurture IDR Segmentation and Multiple Instruction Queues in Superscalar Pipelining Processor
J.Nandini Meeraa, N.Indhuja, S.Devi Abirami and K.Rathinakumar
Download Full-Text

A Simple Technique for Enhancing Conversion Speed of Successive Approximation ADC
Gururaj Balikatti, R.M Vani and P.V. Hunagund
Download Full-Text

Design of a High Performance Reversible Multiplier
Md.Belayet Ali, Hosna Ara Rahman and Md. Mizanur Rahman
Download Full-Text

Automated Classification of SAR Images Using Moment
Debabrata Samanta and Gautam Sanyal
Download Full-Text

Design and Characterization of Tapered Transition and Inductive Window Filter Based on Substrate Integrated Waveguide Technology
Nouri Keltouma, Nouri Keltouma, Feham Mohammed, Feham Mohammed, Adnan Saghir and Adnan Saghir
Download Full-Text

Marginal Object Weight Ranking for Nearest Neighbor Search in Spatial Databases
K. Balasaravanan and K. Duraiswamy
Download Full-Text

Indirect DNS Covert Channel based on Base 16 Matrix for Stealth Short Message Transfer
Md Asri Ngadi, Syaril Nizam Omar and Ismail Ahmedy
Download Full-Text

A Block Cipher using Rotation and Logical XOR Operations
D. Sravan Kumar, Ch. Suneetha and A. Chandra Sekhar
Download Full-Text

A Dynamic Model for Sharing Reputation of Sellers Among Buyers for Enhancing Trust in Agent Mediated E-Market
Vibha Gaur, Neeraj Kumar Sharma and Punam Bedi
Download Full-Text

Framework for Ethernet Network Functionality Testing
Mirza Aamir Mehmood, Ahthasham Sajid and Amir Shehzad
Download Full-Text

DNS ID Covert Channel based on Lower Bound Steganography for Normal DNS ID Distribution
Abdulrahman H. Altalhi, Md Asri Ngadi, Syaril Nizam Omar and Zailani Mohamed Sidek
Download Full-Text

A New Weather Forecasting Technique using Back Propagation Neural Network with Modified Levenberg-Marquardt Algorithm for Learning
I.Kadar Shereef and S. Santhosh Baboo
Download Full-Text

Incorporating Security in Embedded System - A critical analysis
Mirza Aamir Mehmood, Amir Shahzad and Mazhar Ali
Download Full-Text

Integrated Circuit of CMOS DC-DC Buck Converter with Differential Active Inductor
Kaoutar Elbakkar and Khadija Slaoui
Download Full-Text

Implementing VoIP over Fatima Jinnah Women University
Ammara Asif, Ammara Asif, and Tahira Mahboob
Download Full-Text

Comparing Online Analytical Processing and Data Mining Tasks In Enterprise Resource Planning Systems
Tamer Salah, Mohamed Abo Elsoud and Hesham Arafat
Download Full-Text

Improving Security Levels Of IEEE802.16e Authentication By Diffie-Hellman Method
Mohammad Zabihi, Ramin Shaghaghi and Mohammad Esmail Kalantari
Download Full-Text

Analysis of Image Denoising using Wavelet Coefficient and Adaptive Subband Thresholding Technique
S.Kalavathy and R.M.Suresh
Download Full-Text

PPNOCS: Performance and Power Network on Chip Simulator based on SystemC
El Sayed M. Saad, Sameh A. Salem, Medhat H. Awadalla and Ahmed M. Mostafa
Download Full-Text

Strategical Modelling with Virtual Competition for Analyzing Behavior of Malicious Node in Mobile Adhoc Network to Prevent Decamping
Anil G.N and A. Venugopal Reddy
Download Full-Text

Realization of a Dual Transmission Band Conjugate Omega Shaped Metamaterial
Asit Kumar Panda and Ashutosh Mohanty
Download Full-Text

RDWSN: To offer Reliable Algorithm for Routing in Wireless Sensor Network
Arash Ghorbannia Delavar, Tayebeh Backtash and Leila Goodarzi
Download Full-Text

Cloud Services for Collaborative Web Based Project Management System
Chetan Yuvraj Dhembre, Parvez Javed Shaikh, Sushant Anant Gawali and Ahmad Raza Khan
Download Full-Text

Authentication of DICOM Medical Images using Multiple fragile watermarking Techniques in Wavelet Transform Domain
A Kannammal, A. Kannammal, S. Subha Rani and S. Subha Rani
Download Full-Text

Towards a pooling of ITIL V3 and COBIT
Samir Bahsani, Abdelaali Himi, Hassan Moubtakir and Alami Semma
Download Full-Text

Automated PolyU Palmprint sample Registration and Coarse Classification
Dhananjay D M, C. V. Guru Rao and I. V. Muralikrishna
Download Full-Text

E-Business: Application of software and technology in selected Ethiopian banks - Issues and challenges
Bhaskar Reddy Muvva Vijay and Tewdros Sisay Asefa
Download Full-Text

Virtual Shopping and Impulse Purchasing Strengths and Weaknesses in Pakistan
Muhammad Ali Hussain, Muhammad Zeeshan Anwar, Humna Mehboob, Ayesha Majeed and Tanzila Samin
Download Full-Text

Color Features Integrated with Line Detection for Object Extraction and Recognition in Traffic Images Retrieval
Hui Hui Wang, Dzulkifli Mohamad and N. A. Ismail
Download Full-Text

Comprehensive Analysis of Web Log Files for Mining
Vikas Verma, A. K. Verma and S. S. Bhatia
Download Full-Text

Design and Implementation of Memory-less Forbidden Transition Free Crosstalk Avoidance CODECs for On-Chip Buses
J.Venkateswara Rao and P.Sudhakara Rao
Download Full-Text

A Critical Simulation of CPU Scheduling Algorithm using Exponential Distribution
Abur Maria Mngohol, Mohammed Aminu Umar, Sani Danjuma and Saleh Abdullahi
Download Full-Text

Efficient Web Usage Mining With Clustering
K. Poongothai, M. Parimala and S. Sathiyabama
Download Full-Text

Extending XACML to support Credential Based Hybrid Access Control
Nirmal Dagdee and Ruchi Vijaywargiya
Download Full-Text

Implementation of Portion Approach in Distributed Firewall Application for Network Security Framework
Harleen Kaur, Omid Mahdi Ebadati E. and M. Afshar Alam
Download Full-Text

Multi databases in Health Care Networks
Nadir Kamal Salih and Tianyi Zang
Download Full-Text

New Channel Assignment Method for Access Points in Wireless LANs
Mohammed Fawzi Al-Hunaity
Download Full-Text

Pseudonymous Privacy Preserving Buyer-Seller Watermarking Protocol
Neelesh Mehra and Madhu Shandilya
Download Full-Text

Reduction of Measuring Items- Contemporary Issue in Assessing Internal Consistency
Oluwaseun Gbenga Fadare, Hezekiah Oluleye Babatunde, Gbenga Olayinka Ojo, John Niyi Iyanda and Fisayo Caleb Sangogboye
Download Full-Text

User Navigation Pattern Discovery using Fast Adaptive Neuro-Fuzzy Inference System
J Vellingiri and S. Chenthur Pandian
Download Full-Text

Comparison of Routing Protocols to Assess Network Lifetime of WSN
Owais Ahmed, Ahthsham Sajid and Mirza Aamir Mehmood
Download Full-Text

Fault Localization for Java Programs Using Probabilistic Program Dependence Graph
A. Askarunisa, T. Manju and B. Giri Babu
Download Full-Text

Approach to a conceptual model of indexation in a weak ontology described in RDFS
Traore Issa, Souleymane Oumtanaga, Babri Michel and Claude Lischou
Download Full-Text

Unsupervised Graph-based Word Sense Disambiguation Using Lexical Relation of WordNet
Ehsan Hessami, Faribourz Mahmoudi and
Download Full-Text

Collaborative Personalized Web Recommender System using Entropy based Similarity Measure
Harita Mehta, Shveta Kundra Bhatia, Punam Bedi and V. S. Dixit
Download Full-Text

Search content via Cloud Storage System
Haytham Al-Feel and Mohamed Khafagy
Download Full-Text

A Novel Approach to Fast Image Filtering Algorithm of Infrared Images based on Intro Sort Algorithm
Kapil Kumar Gupta, Kapil Kumar Gupta, M. Rizwan Beg, M. Rizwan Beg, Jitendra Kumar Niranjan and Jitendra Kumar Niranjan
Download Full-Text

Performance Evaluation of Bionomic Algorithm (BA) in Comparison with Genetic Algorithm (GA) for Shortest Path Finding Problem
Saira Beg, Azam Khan, Umar Nauman and Sajjad Mohsin
Download Full-Text

Hierarchal Object Oriented Fault Tolerant Secured and Atomic Mobile Agent Model
Mayank Aggarwal and Nipur
Download Full-Text

A New Factorization Method to Factorize RSA Public Key Encryption
Bhagvant Ram Ambedkar and Sarabjeet Singh Bedi
Download Full-Text

Comparison of Cloud Database: Amazon SimpleDB and Google Bigtable
Shalini Ramanathan, Savita Goel and Subramanian Alagumalai
Download Full-Text

Increasing DGPS Navigation Accuracy using Kalman Filter Tuned by Genetic Algorithm
M. R. Mosavi, M. Sadeghian and S. Saeidi
Download Full-Text

Six layers Architecture Model for Object Oriented Database
Mansaf Alam
Download Full-Text

A Classical Fuzzy Approach for Software Effort Estimation on Machine Learning Technique
S.Malathi and S. Sridhar
Download Full-Text

A Survey on Design Pattern Recovery Techniques
Ghulam Rasool and Detlef Streitfdert
Download Full-Text

Performance Analysis of Enhanced Clustering Algorithm for Gene Expression Data
T. Chandrasekhar, K. Thangavel and E. Elayaraja
Download Full-Text

Intelligent Paging Strategy for Multi-Carrier CDMA System
Sheikh Shanawaz Mostafa, Khondker Jahid Reza, Md. Ziaul Amin and Mohiuddin Ahmad
Download Full-Text

Phishing Attack Protection-PAP-Approaches for Fairness in Web Usage
Mohiuddin Ahmed and Jonayed Kaysar
Download Full-Text

Apply Multi-Layer Perceptrons Neural Network for Off-Line Signature Verification and Recognition
Suhail Odeh and Manal Khalil
Download Full-Text

An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing
Syam Kumar P and Subramanian R
Download Full-Text

Study of Image Processing, Enhancement and Restoration
Bhausaheb Shivajirao Shinde, D.K. Mhaske and Sachin Macchindra Chavan
Download Full-Text

Why banks and financial institutions in Pakistan are turning towards Internet banking?
Sajjad Nazir, Muhammad Naseer Akhtar and Muhammad Zohaib Irshad
Download Full-Text

Principal Component Analysis-Linear Discriminant Analysis Feature Extractor for Pattern Recognition
Aamir Khan and Hasan Farooq
Download Full-Text

A New Local Adaptive Thresholding Technique in Binarization
T.Romen Singh, T.Romen Singh, Sudipta Roy, O.Imocha Singh, Tejmani Sinam and Kh.Manglem Singh
Download Full-Text

An Authoring System for Editing Lessons in Phonetic English in SMIL3.0
Merzougui Ghalia and Djoudi Mahieddine
Download Full-Text

Performance Evaluation of Fingerprint Identification Based on DCT and DWT using Multiple Matching Techniques
Lavanya B. N. and Raja K.B.
Download Full-Text

Implementation of Wireless Group Support System in Mobile Healthcare
Karupothula Madhavi Latha, Pogaku Ranjith Kumar and Jayadev Gyani
Download Full-Text

TBEE: Tier Based Energy Efficient Protocol Providing Sink and Source Mobility in Wireless Sensor Networks
Siddhartha Chauhan and Lalit Awasthi
Download Full-Text

Improvement in Gain and Bandwidth of Rectangular and U Slot Loaded Patch
Aruna Rani and A. K. Gautam
Download Full-Text

FLoMSqueezer: An Effective Approach For Clustering Categorical Data Stream
Marpe Sora, Swarup Roy and S I Singh
Download Full-Text

A Synthetic Heuristic Algorithm for Independent Task Scheduling in Cloud Systems
Arash Ghorbannia Delavar and Yalda Aryan
Download Full-Text

Implementation of Variable Least Significant Bits Stegnographyusing DDDB Algorithm
Sahib Khan, Muhammad Haroon Yousaf and Jamal Akram
Download Full-Text

iAgile: A Tool for Database Generation Guided by Graphical User Interface
Shaimaa Galal and Ehab Hassanein
Download Full-Text

Study of Reputation Based Defense Mechanism in Peer To Peer Live Streaming
M. A. Mottalib, Md. Ali-Al Mamun, Reazul Hoque, Md. Ehsanuzzaman and Jonayed Kaysar
Download Full-Text

Voice Recognition Using HMM with MFCC for Secure ATM
Shumaila Iqbal, Tahira Mahboob and Malik Sikandar Hayat Khiyal
Download Full-Text

Enhancing E-Learning with VRML Techniques
Sangeetha Senthilkumar and E. Kirubakaran
Download Full-Text

System Performance Ratings of High Speed Nano Devices Using Fuzzy Logic
Ak. Ashakumar Singh, Y. Surjit Singh and K. Surchandra Singh
Download Full-Text

Information Extraction and Webpage Understanding
M.Sharmila Begum, L.Dinesh and P.Aruna
Download Full-Text

Knowledge Acquisition and Knowledge Management through E-Learning
V.Thennarasu and E. Kirubakaran
Download Full-Text

Impact of Data Mining in Drought Monitoring
Anil Rajput, Ritu Soni, Ramesh Prasad Aharwal and Rajesh Sharma
Download Full-Text

A Survey of Web Crawler Algorithms
Pavalam S M, S V Kashmir Raja, Felix K Akorli and Jawahar M
Download Full-Text

Literature Survey on Design and Implementation of Processing Model for Polarity Identification on Textual Data of English Language
Aparna Trivedi, Ingita Singh, Apurva Srivastava, Karishma Singh and Suneet Kumar Gupta
Download Full-Text

Data Mining in Sequential Pattern for Asynchronous Periodic Patterns
Thodeti Srikanth
Download Full-Text

Construction of Learning Path Using Ant Colony Optimization from a Frequent Pattern Graph
Souvik Sengupta, Sandipan Sahu and Ranjan Dasgupta
Download Full-Text

Cost-Benefit Analysis of a Redundant System with Inspection and Priority Subject to Degradation
Jitender Kumar
Download Full-Text

A Partitioning Strategy for OODB
Sudesh Rani
Download Full-Text

A Review of Data Mining Classification Techniques Applied for Diagnosis and Prognosis of the Arbovirus-Dengue
A. Shameem Fathima, D. Manimegalai and Nisar Hundewale
Download Full-Text

Developing an Intelligent User Interaction Development Engine
Ashit Kumar Dutta
Download Full-Text

Water Marking on Digital Image using Genetic Algorithm
Cauvery N K
Download Full-Text

Minimal Feature Set for Unsupervised Classification of Knee MR Images
Rajneet Kaur, Rajneet Kaur and Naveen Aggarwal
Download Full-Text

An Integrative Study on Bioinformatics Computing Concepts, Issues and Problems
Muhammad Zakarya, Izaz Ur Rahman, Nadia Dilawar and Reshma Sadaf
Download Full-Text

Acoustic Phonetic Characteristics of Kannada Language
Hemakumar G
Download Full-Text

An Analysis of MIPS Group Based Job Scheduling Algorithm with other Algorithms in Grid Computing
S.Gomathi
Download Full-Text

Automatic Fracture Detection Using Classifiers- A Review
S.K.Mahendran and S. Santhosh Baboo
Download Full-Text

CAPTCHA Celebrating its Quattuordecennial- A Complete Reference
Ragavi V and G.Geetha
Download Full-Text

Operating System Performance Analyzer for Embedded Systems
Shahzada Khayyam Nisar, Maqsood Ahmed, Huma Ayub and Iram Baig
Download Full-Text

Automatic Histogram Threshold with Fuzzy Measures using C-means
K. Srinivas and V. Srikanth
Download Full-Text

Transmission System Planning in Competitive and Restructured Environment using Artificial Intelligence
Badar Ul Islam and Syed Amjad Ahmed
Download Full-Text

Semantic Analysis of Energy Consumption for Estimating SLA Violation with Virtual Machine Provisioning Schema using DVFS
Arunadevi M and R. S. D Wahidabanu
Download Full-Text

Modified LRU Algorithm To Implement Proxy Server With Caching Policies
Jitendra Singh Kushwah and Brijesh Patel
Download Full-Text

A Detailed Study of Resource Scheduling and Fault Tolerance in Grid
Radha.B, B. Radha and V. Sumathy
Download Full-Text

Classification of Speech for Clinical Data using Artificial Neural Network
C.R.Bharathi and V. Shanthi
Download Full-Text

Robust RSA for Digital Signature
Virendra Kumar and Puran Krishen Koul
Download Full-Text

Vowel-Plosive of English Word Recognition using HMM
Hemakumar G
Download Full-Text

Social Networks Research Aspects: A Vast and Fast Survey Focused on the Issue of Privacy in Social Network Sites
Mohammad Soryani and Behrooz Minaei
Download Full-Text

Effective Business Value of Bal Information System
Muhammad Awais, Tanzila Samin and Muhammad Bilal
Download Full-Text

Efficient Retrieval of Text for Biomedical Domain using Expectation Maximization Algorithm
Sumit Vashishtha and Yogendra Kumar Jain
Download Full-Text

Four Layered Approach to Non-Functional Requirements Analysis
A. Anandarao and M. Gopichand
Download Full-Text

Symmetrical Dispersion Compensation For High Speed Optical Links
Ojuswini Arora, Amit Kumar Garg and Savita Punia
Download Full-Text

Hybrid Multiobjective Evolutionary Algorithms: A Survey of the State-of-the-art
Wali Khan Mashwani
Download Full-Text

Improvement the Flatness, Gain and Bandwidth of Cascaded Raman Amplifiers for Long-Haul UW-WDM Optical Communications Systems
Fathy M. Mustafa, Ashraf A. Khalaf and F. A. El-Geldawy
Download Full-Text

A Robust Client Verification in Cloud Enabled m-Commerce using Gaining Protocol
Chitra Kiran N. and G. Narendra Kumar
Download Full-Text

Fuzzy Priority CPU Scheduling Algorithm
Bashir Alam, M.N. Doja, R. Biswas and Mansaf Alam
Download Full-Text

Blood Vessel Segmentation For High Resolution Retinal Images
J. Benadict Raja and C. G. Ravichandran
Download Full-Text

Dynamic Gesture Recognition Using Hidden Markov Model in Static Background
Malvika Bansal, Shivin Saxena, Devendra Desale and Dnyaneshwar Jadhav
Download Full-Text

Reengineering Multi Tiered Enterprise Business Applications for Performance Enhancement and Reciprocal or Rectangular Hyperbolic Relation of Variation of Data Transportation Time with Row Pre-fetch Size of Relational Database Drivers
Sridhar Sowmiyanarayanan
Download Full-Text

Performance Comparison Of Routing Protocols For Zigbee Wpan
A. Narmada and P. Sudhakara Rao
Download Full-Text

Image Compression Using Partitioning Around Medoids Clustering Algorithm
Valmik B Nikam, Vinod J Kadam and B.B.Meshram
Download Full-Text

Lanes and Road Signs Recognition for Driver Assistance System
Ahmed Hechri and Abdellatif Mtibaa
Download Full-Text

Digital Image Watermarking Algorithm Based on Wavelet Packet
A. Geetha, B.Vijayakumari, C.Nagavani and T.Pandiselvi
Download Full-Text

Cleaning of Ancient Document Images Using Modified Iterative Global Threshold
N.Venkata Rao, A.Venkata Srinivasa Rao, S.Balaji and L.Pratap Reddy
Download Full-Text

Modeling a Distributed Database System for Voters Registration in Nigeria
Olabode Olatubosun
Download Full-Text

Operating System Based Analysis of Security Tools for Detecting Suspicious Events in Network Traffic
Fasee Ullah and Waqas Tariq
Download Full-Text

A Comparison Between Data Mining Prediction Algorithms for Fault Detection-Case study Ahanpishegan Co.
Golriz Amooee, Behrouz Minaei-Bidgoli and Malihe Bagheri-Dehnavi
Download Full-Text

A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols
Kavita Pandey and Abhishek Swaroop
Download Full-Text

IJCSI Volume 8, Issue 6, No 1, November 2011

Download Full-Text

IJCSI Volume 8, Issue 6, No 2, November 2011

Download Full-Text

IJCSI Volume 8, Issue 6, No 3, November 2011

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »