IJCSI Open Access Publications
IJCSI Thesis Publications IJCSI Conference Special Issues Search Publications, Authors, More...
IJCSI Volume 9, Issue 5, September 2012
Feng Tian, Wenjian Chai, Chuanyun Wang and Xiaoping Sun
Download Full-Text
Edge Dominating Capability based Backbone Construction in Wireless Networks
Congcong Chen, Jiguo Yu and Xiujuan Zhang
Download Full-Text
Relational Analysis based Concurrent Multipath Transfer over Heterogeneous Vehicular Networks
Yuanlong Cao, Changqiao Xu, Jianfeng Guan, Jia Zhao, Wei Quan, Mingchuan Zhang and Hongke Zhang
Download Full-Text
The solution algorithms for problems on the minimal vertex cover in networks and the minimal cover in Boolean matrixes
Sergey Listrovoy and Sergii Minukhin
Download Full-Text
A Study on Preference of Interface Design Techniques for Web Survey
Wisitmon Srinilta, Pongpun Anuntavoranich, Settapong Malisuwan and Suppawan Taraphokakul
Download Full-Text
An Efficient Function Optimization Algorithm based on Culture Evolution
Xuesong Yan, Qinghua Wu, Can Zhang, Wei Chen, Wenjing Luo and Wei Li
Download Full-Text
Image Compression Using Harmony Search Algorithm
Ryan Rey M. Daga and John Paul T. Yusiong
Download Full-Text
Evaluating on Performance of Single-source Single-relay Sr-carq protocol in Tdma Networks with Raleigh Fading
Suoping Li, Junru Wang and Yongqiang Zhou
Download Full-Text
Design of an enhanced Integrated Management System with Customer Experience Focus: The Business Process Framework (also known as eTOM) and ISO9001 Together
Mounire Benhima, John P. Reilly and Hamid Benhima
Download Full-Text
Microseism Monitoring System for Coal and Gas Outburst
Li Zhenbi and Zhao Baiting
Download Full-Text
Application of Combination Forecast Model in the Medium and Long term Power Load Forecast
Ke Zhao, Lin Gan, Hong Wang and Ai Hua Ye
Download Full-Text
An Efficient Collision Detection Scheme for Generation-2 RFID Systems
Cheng Jin and Sung Ho Cho
Download Full-Text
Application of Wavelet De-noising in Vibration Torque Measurement
Hao Zhao
Download Full-Text
High Accuracy Speed-fed Grating Angular Acceleration Measurement System Based on FPGA
Hao Zhao
Download Full-Text
Non-negative Matrix Factorization and Support Vector Data Description Based One Class Classification
Liyong Ma, Naizhang Feng and Qi Wang
Download Full-Text
Formalized Security Model of Identity-Based Multi-Proxy Signature
Wang Tao and Li Mingxiang
Download Full-Text
An agent oriented information system: an MDA based development
Abdelaziz Elfazziki, Nouzri Sana and Mohamed Sadgal
Download Full-Text
Research of Knowledge Supply Chain Coordination Mechanism based on the View of Fuzzy Demand
Wang Xiu-hong
Download Full-Text
A Novel Automatic Summarization Method from Chinese Document
Xinglin Liu, Qilun Zheng, Qianli Ma and Guli Lin
Download Full-Text
Researches of Water Bloom Emergency Management Decision-making Method and System Based on Fuzzy Multiple Attribute Decision Making
Zaiwen Liu, Lin Li, Xiaoyi Wang and Chen Chen
Download Full-Text
Error Analysis and Reduction for Shearer Positioning using the Strapdown Inertial Navigation System
Qigao Fan, Wei Li and Chengming Luo
Download Full-Text
Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm
Linan Zhu, Qingshui Li and Lingna He
Download Full-Text
Improving Handover Performance in Wireless Mobile Networks
Saied M. Abd El-Atty and Konstantinos Lizos
Download Full-Text
Research of Texture Extraction and Mapping based on 3D Building Reconstruction
Chen Xiaogang and Zhou Zhuoyun
Download Full-Text
A Lossless Data Hiding Technique based on AES-DWT
Francisco Rubén Castillo Soria, Gustavo Fernández Torres2 and Ignacio Algredo-Badillo
Download Full-Text
Adaptive Iterative Learning Control for a Class of Linear Time-varying Systems
Jianmin Xing and Wei Shao
Download Full-Text
The Research on Optimal Control of Hvac Refrigeration System
He Bingqiang and Liao Chunling
Download Full-Text
Mesh Geometric Editing Approach Based on Gpu Texture
Guiping Qian and Yue Wang
Download Full-Text
Designing a High Efficiency Pulse Width Modulation Step-Down DC/DC Converter for Mobile Phone Applications
Benlafkih Abdessamad, Krit Salah-Ddine and Chafik Elidrissi Mohamed
Download Full-Text
A Semi-Structured Tailoring-Driven Approach for ERP Selection
Abdelilah Khaled and Mohammed Abdou Janati Idrissi
Download Full-Text
A parametric and indexing method for faces and textures recognition
Tarek Frikha, Yamen Siala, Kais Loukil, Wijden Rekik and Mohamed Abid
Download Full-Text
An Agent-based framework for cooperation in Supply Chain
Benaissa Ezzeddine, Benabdelhafid Abdellatif and Benaissa Mounir
Download Full-Text
A Use Case Driven Approach for System Level Testing
Zahid Hussain Qaisar and Muhammad Touseef
Download Full-Text
Wired and Wireless Parallel Simulation of Fluid Flow Problem on Heterogeneous Network Cluster
Fariha Quratulain Baloch and Mahera Erum Baloch
Download Full-Text
An Energy aware Spatial Correlation Method in Event driven Wireless Sensor Networks
Samira Nemati, Reza Azmi and M.A.S. Monfared
Download Full-Text
Three Models Based Data Fusion Approach for the Segmentation ofMR Images: A Comparative Study
Lamiche Chaabane and Moussaoui Abdelouahab
Download Full-Text
On the sensitivity of a discrete linear system with perturbed dynamics
Ailane Abdellah
Download Full-Text
Performance Analysis of ANFIS in short term Wind Speed Prediction
Ernesto Cortes Perez, Ignacio Algredo-Badillo and Vãctor Hugo Garcãa Rodrãguez
Download Full-Text
Context-Awareness for Service Oriented Systems
Hatim Hafiddi, Hicham Baidouri, Mahmoud Nassar and Abdelaziz Kriouile
Download Full-Text
AUV Localization Process using Computing Cells on FPGA
M. H. Al-Doori, R. Badlishah Ahmad, Abid Yahya and Mohd. Rizal Arshad
Download Full-Text
A Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands
Abdur Shahid, Shahriar Badsha, Md. Rethwan Kabeer, Junaid Ahsan and Mufti Mahmud
Download Full-Text
Quantum secret sharing and quantum operations
Heling Xiao, Wangmei Guo and Xiao Wang
Download Full-Text
\'An Adaptive Approach for Modifying Inertia Weight using Particle Swarm Optimisation
Rajesh Kumar Ojha and Madhabananda Das
Download Full-Text
Research on Barcode Image Binarization in Barcode Positioning System
Weijun Zhang and Dongli Li
Download Full-Text
Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm
Roohallah Rastaghi and Hamid R. Dalili Oskouei
Download Full-Text
Probabilistic Checkpointing Protocol to Sensor Network Fault-Tolerant
Titouna Faiza, Titouna Chafiq and Benferhat Salem
Download Full-Text
Innovative Machine Vision Technique for 2D/3D Complex and Irregular Surfaces Modelling
Shahzad Anwar, Lyndon N. Smith and Melvyn L. Smith
Download Full-Text
Design and Implementation of Reconfigurable Embedded Processor (REP) for AUV using FPGA
M. H. Al-Doori, R. Badlishah Ahmad, Abid Yahya and Mohd. Rizal Arshad
Download Full-Text
Precise BER Analysis of 1/2 and 2/3 rated RS-CC Concatenated Coded for Digital Image Transmission in OFDM System
Md. Zahid Hasan, Nur-E-Zaman Ayshik and Md. Hasibur Rahman
Download Full-Text
A Simple Method to Recover 3-D Rigid Structure from Motion using SIFT, RANSAC and the Tomasi-Kanade Factorization
Samir H. Abdul-Jauwad, Rehmat Ullah and Farman Ullah
Download Full-Text
Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS
Amr Salah El-Din Hashem Matar, Gamal Abd-Elfadeel, Ibrahim Ismail Ibrahim and Hesham M. Z. Badr
Download Full-Text
Automatic Part Primitive Feature Identification Based on Faceted Models
Gandjar Kiswanto and Muizuddin Azka
Download Full-Text
Review of Knowledge Management System as Socio-Technical System
Setiawan Assegaff and Ab Razak Che Hussin
Download Full-Text
Study of Face Recognition Approach Based on Similarity Measures
Mohamed A. El-Sayed and Noha Aboelwafa
Download Full-Text
Several AES Variants under VHDL language In FPGA
Sliman Arrag, Abdellatif Hamdoun, Abderrahim Tragha and Salah Eddine Khamlich
Download Full-Text
Education Policy Development With Development Strategy Application Of National Test Exercises For Vocational High SchoolCase Study Vocational High School Bina Taruna Masaran Sragen
Maryono and Bambang Eka Purnama
Download Full-Text
MMBSM: A Meta Model for Biological System Modeling
Touraj Banirostam and Mehdi N. Fesharaki
Download Full-Text
The PerTOHS Theory for On-Line Handwriting Segmentation
Sourour Njah, Mahmoud Ltaief, Hala Bezine and Adel M. Alimi
Download Full-Text
Enhancing Packet-level Forward Error Correction for Streaming Video in Wireless Networks
Chi-Huang Shih
Download Full-Text
Brain emotional learning based Brain Computer Interface
Abdolreza Asadi Ghanbari, Ehsan Heidari and Saeed Setayeshi
Download Full-Text
Modelling of VoIP Based Tele-teaching System: A Petri Net Based Approach
Animesh Dutta, Ranjan Dasgupta and Swapan Bhattacharya
Download Full-Text
FIDRS: A Novel Framework for Integrated Distributed Reliable Systems
Mehdi Zekriyapanahgashti
Download Full-Text
Implementation of Tile Based Geographic Information System in Indonesia E-Government
Imairi Eitiveni and Dana Indra Sensuse
Download Full-Text
Endemic Outbreaks of Brown Planthopper (Nilaparvata lugens Stal) in Indonesia using Exploratory Spatial Data Analysis
Sri Yulianto Joko Prasetyo, Subanar, Edi Winarko and Budi Setiadi Daryono
Download Full-Text
Blood Glucose Prediction Algorithms for Hypoglycemic and/or Hyperglycemic Alerts
C. Gireesh and V. Punna Rao
Download Full-Text
Improved Sentiment Classification From Meeting Transcripts
J.I.Sheeba and K.Vivekanandan
Download Full-Text
Iris Recognition System with Frequency Domain Features optimized with PCA and SVM Classifier
K N Pushpalatha, Aravind Kumar Gautham, D.R.Shashikumar and K B Shivakumar
Download Full-Text
Hair Loss Diagnosis Using Artificial Neural Networks
Ahmad Esfandiari, Kimia Rezaei Kalantari and Abdorreza Babaei
Download Full-Text
Impact of Collaboration and Coordination among E-Government: A Case Study of Jordan
Ahmad Mousa Odat
Download Full-Text
Enterprise Resource Planning (ERP) and Integration of Purchase, Inventory and Sale processes:Proposition of a Common Minimal Model
Mustapha El Masbahi, Samir Bahsani and Alami Semma
Download Full-Text
Design and Implementation of Multitier Authentication Scheme in Cloud
Maninder Singh and Sarbjeet Singh
Download Full-Text
A Novel Technique Based on Node Registration in MANETs
Rashid Jalal Qureshi, Khalid Haseeb, Muhammad Arshad, Huma Javed and Haleem Farman
Download Full-Text
Assessment of Information Technology and Data Communication and Management within Community Health Services in Jakarta
Aan Kardiana, Sri Puji Utami Atmoko, Hendriawan Widiatmoko, Dana Indra Sensuse and Heru Suhartanto
Download Full-Text
Iterative decoding of Generalized Parallel Concatenated Block codes using cyclic permutations
Hamid Allouch, Idriss Chana and Mostafa Belkasmi
Download Full-Text
Contextual Query Perfection by Affective Features Based Implicit Contextual Semantic Relevance Feedback in Multimedia Information Retrieval
Karm Veer Singh and Anil K. Tripathi
Download Full-Text
Efficient Processing Power Reservation Approach to Imporove Real-Time Task Schedulability and Relaibaility
Ahmed E. Youssef, Abeer Hamdy and Reda Ammar
Download Full-Text
Informal Aggregation Technique for Software Engineering Experiments
Babatunde K. Olorisade
Download Full-Text
Evaluation of Activity Recognition Algorithms for Employee Performance Monitoring
Mehreen Mumtaz and Hafiz Adnan Habib
Download Full-Text
An Image Enhancement Technique of X-Ray CarryonLuggage for Detection of Contraband Illicit Object(s)
Sajid Ullah Khan and Wang Yin Chai
Download Full-Text
A Framework for Semantic Map Construction
Basem Ibrahim, Abeer Hamdy and Nevien Darwish
Download Full-Text
Mining Association Rules in Students Assessment Data
Anupama Chadha and Varun Kumar
Download Full-Text
Aspect-oriented programming with AspectJ
Daniela Gotseva and Mario Pavlov
Download Full-Text
Extending Refusal Testing by Stochastic Refusals for Testing Non-deterministic Systems
Kenza Bouaroudj
Download Full-Text
Neonatal Disease Diagnosis: AI Based Neuro-Genetic Hybrid Approach
Dilip Roy Chowdhury, Rahul Majumder and Dipanwita Bhattacharjee(roy Chowdhury)
Download Full-Text
Mammographic Images Interpretation Using Neural-Evolutionary Approach
Belgrana Fatima Zohra and Benamrane Nacera
Download Full-Text
New Capabilities of Visual Cryptography
Maged Hamada Ibrahim
Download Full-Text
The Parameters affecting on Raman Gain and Bandwidth for Distributed Multi-Raman Amplifier
Fathy M. Mustafa, Ashraf A. Khalaf and F. A. El-Geldawy
Download Full-Text
Snapshot Based Virtualization Mechanism for Cloud Computing
P.Pradeep Kumar, A.Rajashekar Reddy and A.Rupa
Download Full-Text
On Web Services Based Cloud Interoperability
Devi Prasad Bhukya, Reeta Sony A.L and Gautam Muduganti
Download Full-Text
A Theoretical Paradigm of Information Retrieval in Information Science and Computer Science
Shailesh Pancham Khapre and M. S. Saleem Basha
Download Full-Text
Haptics:State of the Art Survey
Varalakshmi B D, Thriveni J, K R Venugopal and L M Patnaik
Download Full-Text
Requirement Defect Identification: An Early Stage Perspective
Sandeep Kumar Nayak, Raees A. Khan and Md. Rizwan Beg
Download Full-Text
A CDMA Based Scalable Hierarchical Architecture for Network-On-Chip
Ahmed A. El Badry and Mohamed A. Abd El Ghany
Download Full-Text
Exploitation and use of social annotations in information search
Vu Thanh Nguyen and Tran Anh Dung
Download Full-Text
A Stable Distributed Clustering Algorithm For Mobile Adhoc Networks
Fereydoun Ramezani Zangi, Sajjad Mavizy and Javad Badali
Download Full-Text
Breast Fine Needle Tumor Classification using Neural Networks
Yasmeen M. George, Bassant Mohamed Elbagoury, Hala H. Zayed and Mohamed I. Roushdy
Download Full-Text
Profile Hidden Markov Model for Detection and Prediction of Hepatitis C Virus Mutation
Mohamed El Nahas, Samar Kassim and Nabila Shikoun
Download Full-Text
Selecting Optimal Subset of Features for Student Performance Model
Hany M. Harb and Malaka A. Moustafa
Download Full-Text
Market Basket Analysis for a Supermarket based on Frequent Itemset Mining
Loraine Charlet Annie M.C. and D Ashok Kumar
Download Full-Text
Towards Identification and Recognition of Trace Associations in Software Requirements Traceability
Hussain Saleem, Muhammad Zamin Ali Khan and Shiraz Afzal
Download Full-Text
Proposal of a New High Step-Up Hybrid Switch Converter with Reduced Switch Voltage Stress
Muhammad Saleem, Obaid Ur Rehman and Hashmat Khan
Download Full-Text
Diagrammatization of the Transmission Control Protocol
Sabah Al-Fedaghi
Download Full-Text
Spam Filtering by Quantitative Profiles
Marian Grendar, Jana Skutova and Vladimir Spitalsky
Download Full-Text
A Comparison of various Edge Detection Techniques used in Image Processing
G.T. Shrivakshan and C. Chandrasekar
Download Full-Text
Random Forests and Decision Trees
Jehad Ali, Rehanullah Khan, Nasir Ahmad and Imran Maqsood
Download Full-Text
The virtual information: a case study
Ginevra Gravili
Download Full-Text
Low Complexity DCT-based DSC approach forHyperspectral Image Compression with Arithmetic Code
Meena Babu Vallakati and R. R. Sedamkar
Download Full-Text
Real-time Covert Communications Channel for Audio Signals
Ashraf Seleym and Dina Darwish
Download Full-Text
A Novel Approach for Automatic Web Page Classification using Feature Intervals
J. Alamelu Mangai, Dipti D Kothari and V. Santhosh Kumar
Download Full-Text
Sequential Pattern Mining With Multiple Minimum Supports by MS-SPADE
K.M.V.Madan Kumar, P.V.S.Srinivas and C. Raghavendra Rao
Download Full-Text
Software Defect Prediction Models for Quality Improvement: A Literature Study
Mrinal Singh Rawat and Sanjay Kumar Dubey
Download Full-Text
Requirements Engineering Methodology in Agile Environment
Waleed Helmy, Amr Kamel and Osman Hegazy
Download Full-Text
SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks
B.M.G.Prasad and P.V.S.Srinivas
Download Full-Text
Capacitance-Voltage Analysis for Al2O3 based High-K Dielectric Based MOS Devices
Niladri Pratap Maity, A. K. Pandeya and Reshmi Maity
Download Full-Text
Content-Based Image Retrieval using Color Moment and Gabor Texture Feature
S. Mangijao Singh and K. Hemachandran
Download Full-Text
Semantic Resource Discovery with Resource Usage Policies in Grid Environment
Mandeep Kaur
Download Full-Text
Prevention of Attacks under DDoS Using Target Customer Behavior
S.Malathi and K.Kuppusamy
Download Full-Text
Internet Intrusion Detection System Service in a Cloud
Amirreza Zarrabi and Alireza Zarrabi
Download Full-Text
Indigenous Patch Clamp Technique: Design of highly sensitive amplifier circuit for measuring and monitoring of real time ultra low ionic current through cellular gates
Moez Ul Hassan, Bushra Noman, Sarmad Hameed, Shahab Mehmood and Asma Bashir
Download Full-Text
The Integration of user knowledge to learn a specialized decision tree from a real-life data: an empirical and computational study
Semghouni Redouane, Rahal Sid Ahmed and Benyoucef Othmane
Download Full-Text
Fuzzy C-means with Bi-dimensional Empirical Mode Decomposition for Segmentation of Microarray Image
J.Harikiran, D.Ramakrishna, K.Phanendar, P. V. Lakshmi and Reddi Kiran Kumar
Download Full-Text
Sequential Pattern Mining Using Formal Language Tools
Sunil Joshi, R. S. Jadon and R. C. Jain
Download Full-Text
A Fuzzy expert system for goalkeeper quality recognition
Mohammad Bazmara, Shahram Jafari and Fatemeh Pasand
Download Full-Text
Using Hybrid Particle Swarm Optimization to solve Machine Time Scheduling Problem with Random Starting Time
M. A. Shohla, A. A. El-Sawy, M. Nofal and S. F. El-Zoghdy
Download Full-Text
Improving automatic image annotation: Approach by Bag-Of-Key Point
Merad Boudia Mohammed Abdelaziz and Zaoui Lynda
Download Full-Text
Transportation problem with plant closure and relocation of machines
Lmariouh Jamal, Jamali Anouar, Elhachemi Nizar and Bouami Driss
Download Full-Text
Agent Virus of Cooperation (Avicoop): an Intelligent Model of Cooperation and Collaboration Based on the MAS for Data Exchange in Ad hoc Network
Thomas Djotio Ndie and Claude Tangha
Download Full-Text
Electronic Health Record Data Model Optimized for Knowledge Discovery
Shaker H. El-Sappagh, Samir El-Masri, Alaa M. Riad and Mohammed Elmogy
Download Full-Text
Work Integrated Learning (WIL) In Virtual Reality (VR)
Waleed Abdullah Al Shehri
Download Full-Text
Privacy-Preserving Data Mining (PPDM) Method for Horizontally Partitioned Data
Mohamed Awad Ouda, Sameh A. Salem, Ihab A. Ali and El-Sayed M. Saad
Download Full-Text
The Impact of Imagery Therapy on Rheumatoid Arthritis Patients
Wadee Alhalabi
Download Full-Text
Study of parametric sensitivity of the general model of transmission line
Kaoutar Senhaji Rhazi and Mohamed Najmouddine
Download Full-Text
An Improved Image Segmentation Algorithm Based on MET Method
Z. A. Abo-Eleneen and Gamil Abdel-Azim
Download Full-Text
Feature Extraction for Collaborative Filtering: A Genetic Programming Approach
Deepa Anand
Download Full-Text
Tool for Automatic Discovery of Ambiguity in Requirements
Ayan Nigam, Neeraj Arya, Bhawna Nigam and Deepika Jain
Download Full-Text
Enhanced ATM Security System using Biometrics
Selina Oko and Jane Oruh
Download Full-Text
A proposed OEIC circuit with two metal layer silicon waveguide and low power photonic receiver circuit
Shiraz Afazal, Muhammad Zamin Ali Khan and Hussain Saleem
Download Full-Text
Link budget analysis in the network designed mobile WiMAX technology in the territory of the urban area of the city of Gjakova
Shkelzen S. Nuza and Artan Z. Mazrekaj
Download Full-Text
Service Oriented Architecture Role In The Comprehensive Systems Integration
Oldooz Karimi
Download Full-Text
A trust-based security mechanism for nomadic users in pervasive systems
Mohammed Nadir Djedid
Download Full-Text
E-Government Challenges and Opportunities:A Case Study of Jordan
Ahmad Mousa Odat and Mutaz Khazaaleh
Download Full-Text
Remote computer access through Android mobiles
Jaya Bharathi Chintalapati
Download Full-Text
Image Classification and Optimized Image Reproduction
Jaswinder Singh Dilawari and Ravinder Khanna
Download Full-Text
A Rapid and Robust Method for Shot Boundary Detection and Classification in Uncompressed MPEG Video Sequences
Chunmei Ma, Jiguo Yu and Baogui Huang
Download Full-Text
Reconstruction of Image after Anti Aliasing
Sujogya Mishra, Pratyusabhanu Khuntia, Santosh Kumar Bisoi and Chidananda Bhagabati
Download Full-Text
An Efficient authentication By Iris Using Log Gabor Filter and Neural network
M.Suganthy and P.Ramamoorthy
Download Full-Text
Cloud Computing: A General Users Perceptions and Security Issues at Universities of Faisalabad, Pakistan
Muhammad Haris Abid, Fahad Jan, Tasleem Mustafa and Muhammad Shakeel Faridi
Download Full-Text
Secured Directed Digital Signature over Non-CommutativeDivision Semirings and Allocation of Experimental Registration Number
G.S.G.N.Anjaneyulu and D.U.M.Reddy
Download Full-Text
Data Mining and Neural Networks II - DMX use for Risk Assessment of Complications of Arterial High Blood Pressure
Mbuyi Mukendi Eugène, Kafunda Katalayi Pierre and Mbelu Mutoba Bevi
Download Full-Text
Requirement Defect Mitigation Technique: An Early Stage Implementation
Sandeep Kumar Nayak, Raees A. Khan and Md. Rizwan Beg
Download Full-Text
Computer Proficiency Skills and Implication for curriculum transformation among Fresh Undergraduateof Botswana University
Francis Joseph Ogwu and Edna Nwanyiuzor Ogwu
Download Full-Text
Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques
Utkarsh Dixit, Shivali Gupta and Om Pal
Download Full-Text
18-Pulse Converter Using 3/9 Auto-Transformer
Ahmad Hoteit and Gaitov Hamidovich
Download Full-Text
Design and Implementation of an IP-Based Security Surveillance System
Cletus O. Ohaneme, James Eke, Augustine C.O. Azubogu, Emmanuel N. Ifeagwu and Louisa C. Ohaneme
Download Full-Text
Developing Service Oriented Computing Model Based On Context-Aware
Hamid Mcheick, Mohamad Dbouk and Ahamd Karawash
Download Full-Text
A Framework for governance of Post-Construction Activities in IS development Projects (Case Study in Egyptian Environment)
Esmat M.Abdelmoniem, Sherif A. Mazen and Ehab E. Hassanein
Download Full-Text
E-Government Success in Malaysia Through Government Portal and Website Assessment
Gayah Gulam Haidar and Ahmad Zaki Bin Abu Bakar
Download Full-Text
Feasibility Evaluation of VANET using Directional-Location Aided Routing (D-LAR) Protocol
Ram Shringar Raw, Sanjoy Das, Nanhay Singh, Sanjeet Kumar and Shailender Kumar
Download Full-Text
Credit Card Fraud Detection using Decision Tree for Tracing Email and IP
R.Dhanapal and Gayathiri.P
Download Full-Text
Proposal of a Performance Model based on the Balanced Scorecard for the Moroccan Textile Industry
Adil Chriyha, Zitouni Beidouri and Otmane Bouksour
Download Full-Text
An Integrated HCI Framework for Interpreting Meaningful Expressions
Omer Rashid and Ayoub Al-Hamadi
Download Full-Text
Executive Enhance Business Value of BAL Information System
Muhammad Bilal and Muhammad Awais
Download Full-Text
Forecast Global Carbon Dioxide Emission By Use of Genetic Algorithm (GA)
Hassan Kavoosi, Maryam Kavoosi, Mohammad Hassan Saidi and Korresh Kavoosi Rekati
Download Full-Text
Statistical Moments Extracted from Eight Bins Formed by CG Partitioning of Histogram Modified using Linear Equations
H. B. Kekre and Kavita Sonawane
Download Full-Text
Expert System Design for Mode and Route Selection
Madhavi Dhingra and Nainy Jain
Download Full-Text
Governance of Post-Construction Activities in IS Development Projects
Esmat M. Abdelmoniem, Sherif A. Mazen and Ehab E. Hassanein
Download Full-Text
An Efficient Soft Decoder of Block Codes Based on Compact Genetic Algorithm
Ahmed Azouaoui, Ahlam Berkani and Mostafa Belkasmi
Download Full-Text
A computer based model for lung cancer analysis
Fatma Ayari, Mekki Ksouri and Ali Alouani
Download Full-Text
A Hybrid Approach for Scheduling and Replication based on Multi-criteria Decision Method in Grid Computing
Nadia Hadi, Ghalem Belalem, Nawel Doudou and Amina Benzouak
Download Full-Text
Image processing and Finite Element modelling for analysis of a metal matrix composite
Fatma Ayari, Fayza Ayari, Chokri Ben Amar and Emin Bayraktar
Download Full-Text
Query Optimization Architecture for Data Grid Environment
Ayouni Houssam Eddine and Belbachir Hafida
Download Full-Text
New Heuristics for Interfacing Human Motor System using Brain Waves
Mohammed El-Dosuky, Ahmed El-Bassiouny, Taher Hamza and Magdy Rashad
Download Full-Text
Analysis of AODV over increased density and mobility in Intelligent Transportation System
Muhammad Ziad Nayyer
Download Full-Text
Coordinate Calibration and Automatic Punch Design of Flexible Printed Circuit
Dibin Zhou
Download Full-Text
IJCSI Volume 9, Issue 5, No 1, September 2012
Download Full-Text
IJCSI Volume 9, Issue 5, No 2, September 2012
Download Full-Text
IJCSI Volume 9, Issue 5, No 3, September 2012
Download Full-Text