Friday 20th of January 2017                  
 

IJCSI Open Access Publications


IJCSI Thesis Publications       IJCSI Conference Special Issues       Search Publications, Authors, More...

IJCSI Volume 9, Issue 1, January 2012
Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking
Sajjad Dadkhah, Azizah Abd Manaf and Somayeh Sadeghi
Download Full-Text

Development Model for Knowledge Management System (KMS) to Improve University Performance(Case Studies in Indonesia University of Education)
Munir and Dedi Rohendi
Download Full-Text

A Clustering Method of Highly Dimensional Patent Data Using Bayesian Approach
Sunghae Jun
Download Full-Text

A Method using Language Grid and Concept Base for Japanese-English Cross-language Information Retrieval
Pham Huy Anh and Yukawa Takashi
Download Full-Text

Solving Problems in Software Applications through Data Synchronization in Case of Absence of the Network
Isak Shabani, Betim Cico and Agni Dika
Download Full-Text

A hybrid algorithm of Harmony Search and Bees Algorithm for a University Course Timetabling Problem
Khang Nguyen, Phuc Nguyen and Nuong Tran
Download Full-Text

Enriching Soft Systems Methodology (SSM) With Hermeneutic in e-Government Systems Development Process
Dana Indra Sensuse and Arief Ramadhan
Download Full-Text

Inversion of Web Service Invocation using Publish/Subscribe Push-Based Architecture
Thanisa Numnonda and Rattakorn Poonsuph
Download Full-Text

Applying Genetic Algorithms for Inventory Lot-Sizing Problem with Supplier Selection under Storage Capacity Constraints
Chirawat Woarawichai, Kritsana Kuruvit and Paitoon Vashirawongpinyo
Download Full-Text

Reuse of Use Cases Diagrams: An Approach based on Ontologies and Semantic Web Technologies
Belen Bonilla-Morales, Sergio Crespo and Clifton Clunie
Download Full-Text

An Agile Method for E-Service Composition
Pouya Fatehi and Seyyed Mohsen Hashemi
Download Full-Text

Design of a Conceptual Reference Framework for Reusable Software Components based on Context Level
V. Subedha and S. Sridhar
Download Full-Text

3D Media over Future Internet: Current Status and Future Research Directions
Tasos Dagiuklas
Download Full-Text

A Survey on Steganography Techniques in Real Time Audio Signals and Evaluation
Abdulaleem Z. Al-Othmani, Azizah Abdul Manaf and Akram M. Zeki
Download Full-Text

Integrated three-dimensional reconstruction using reflectance fields
Maria-Luisa Rosas and Miguel-Octavio Arias
Download Full-Text

Reasoning in Graph-based Clausal Form Logic
Alena Lukasova, Martin Zacek and Marek Vajgl
Download Full-Text

The Adaptability of Conventional Data Mining Algorithms through Intelligent Mobile Agents in Modern Distributed Systems
Dost Muhammad Khan and Nawaz Mohamudally
Download Full-Text

Determining Semantically Equivalent Questions in a Vietnamese Language Based Document Retrieval System
Dang Tuan Nguyen and Trung Tran
Download Full-Text

Extraction of Facial Feature Points Using Cumulative Histogram
Sushil Kumar Paul, Mohammad Shorif Uddin and Saida Bouakaz
Download Full-Text

Handover Priority Schemes for Multi-Class Traffic in LEO Mobile Satellite Systems
Amr Salah El-Din Hashem Matar, Gamal Abd-Elfadeel, Ibrahim Ismail Ibrahim and Hesham Mahmoud Zarif Badr
Download Full-Text

Principal Objects Detection Using Graph-Based Segmentation and Normalized Histogram
Pham The Bao and Bui Ngoc Nam
Download Full-Text

Correlated Node Behavior Model based on Semi Markov Process for MANETS
A.H Azni, Rabiah Ahmad, Zul Azri Muhamad Noh, Abd Samad Hasan Basari and Burairah Hussin
Download Full-Text

Validity Index and number of clusters
Mohamed Fadhel Saad and Adel M. Alimi
Download Full-Text

HCTE: Hierarchical Clustering based routing algorithm with applying the Two cluster heads in each cluster for Energy balancing in WSN
Nasrin Azizi, Jaber Karimpour and Farid Seifi
Download Full-Text

An Accurate Arabic Root-Based Lemmatizer for Information Retrieval Purposes
Tarek El-Shishtawy and Fatma El-Ghannam
Download Full-Text

An Application of Genetic Algorithm with Iterative Chromosomes for Image Clustering Problems
R. Balakrishnan and U. Karthick Kumar
Download Full-Text

Factors Influencing ICT Adoption in Halal Transportations: A Case Study of Malaysian Halal Logistics Service Providers
Mohd Iskandar Illyas Tan, Raziah Noor Razali and Mohammad Ishak Desa
Download Full-Text

Synthesis of Quantum Multiplexer Circuits
Arijit Roy, Dibyendu Chatterjee and Subhasis Pal
Download Full-Text

Automatic System to Remove Unpleasant Images Detected by Pupil-Size Changes
Koji Kashihara
Download Full-Text

Design of Efficient Dynamic Replica Control Algorithm for Periodic/Aperiodic Transactions in Distributed Real-Time Databases
Hala Abdel Hameed, Hazem El-Bakry and Torky Sultan
Download Full-Text

A Discussion on Elliptic Curve Cryptography and Its Applications
Sharad Kumar Verma and D. B. Ojha
Download Full-Text

Multi-Objective Evolutionary Computation Solution for Chocolate Production System Using Pareto Method
Alaa Sheta, Abdel Karim Baareh, Mohamed Ababna and Noor Khrisat
Download Full-Text

A Hand Finding and Segmenting in a Partially Cluttered Scene
R. M. Farouk, Gamal F. Elhadi and Abdalhakeem. T. Issa
Download Full-Text

Performance Evaluation of QoS Parameters in Dynamic Spectrum Sharing for Heterogeneous Wireless Communication Networks
R.Kaniezhil, C. Chandrasekar and S. Nithya Rekha
Download Full-Text

A Novel Seven Input Majority Gate in Quantum-dot Cellular Automata
Keivan Navi, Amir Mokhtar Chabi and Samira Sayedsalehi
Download Full-Text

Improve and Compact Population in XCSFCA using Polynomial Equation
Saeid Goodarzian, Ali Hamzeh and Sattar Hashemi
Download Full-Text

Self Organizing Map-based Document Clustering Using WordNet Ontologies
Tarek F. Gharib, Mohammed M. Fouad, Abdulfattah Mashat and Ibrahim Bidawi
Download Full-Text

A Priority Based Bandwidth Reservation Protocol for Wireless Mesh Networks
K. Valarmathi and N. Malmurugan
Download Full-Text

High-Performance Low-Power Digital Linear Interpolation Filter
Magdy El-Moursy and Ahmed G. Abdellatif
Download Full-Text

Analysis of the Similarities and Differences between MPLS Label Distribution Protocols RSVP and CR-LDP
Muhammad Asif, Zahid Farid, Muhammad Lal and Junaid Qayyum
Download Full-Text

Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)
Sadaqat Ur Rehman, Muhammad Bilal, Basharat Ahmad, Khawaja Muhammad Yahya, Anees Ullah and Obaid Ur Rehman
Download Full-Text

Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks
Surraya Khanum, Muhammad Usman and Alaa Alwabel
Download Full-Text

Fuzzy-controlled Load-balanced Broadcasting (FLB) In Clustered Mobile Ad Hoc Networks
Anuradha Banerjee
Download Full-Text

Annotating Speech Corpus for Prosody Modeling in Indian Language Text to Speech Systems
Kiruthiga S and Krishnamoorthy K
Download Full-Text

New method to parse invoice as a type the document
Mohammed Moujabbir and Mohammed Ramdani
Download Full-Text

A Novel Algorithm for Manets using Ant Colony
Javad Pashaei Barbin, Majid Taghipoor and Vahid Hosseini
Download Full-Text

Employee Likelihood of Purchasing Health Insurance using Fuzzy Inference System
Lazim Abdullah and Mohd Nordin Abd Rahman
Download Full-Text

An efficient algorithm for generating AoA networks
Nasser Eddine Mouhoub and Abdelhamid Benhocine
Download Full-Text

Techniques, Advantages and Problems of Agent Based Modeling for Traffic Simulation
Ali Bazghandi
Download Full-Text

Robust Iris Recognition Based on Statistical Properties of Walsh Hadamard Transform Domain
Sunita V. Dhavale
Download Full-Text

Optimization Parameters of tool life Model Using the Taguchi Approach and Response Surface Methodology
Kompan Chomsamutr and Somkiat Jongprasithporn
Download Full-Text

Modify the uCS-51 Architecture to SIMD, VLIW and Superscalar uC
Abdelmoneim M. Fouda, Assem Badr and Abdelsamie Kodb
Download Full-Text

Building MultiView Analyst Profile From Multidimensional Query Logs: From Consensual to Conflicting Preferences
Eya Ben Ahmed, Ahlem Nabli and Faiez Gargouri
Download Full-Text

Temperature effects on the Drain Current in GaN Dual-Gate MESFET using Two-Dimensional Device Simulation
Hamida Djelti, Mohammed Feham, Achour Ouslimani and Abed-Elhak Kasbari
Download Full-Text

A Strategic Framework for Designing E-Learning System with Focus on University Entrepreneurship
Masoud Asgarimehr, Babak Shirazi, Meisam Jafari Eskandari and Salman Rostami
Download Full-Text

Improving Multi agent Systems Based on Reinforcement Learning and Case Base Reasoning
Sara Esfandiari, Behrooz Masoumi, Mohammadreza Meybodi and Abdolkarim Niazi
Download Full-Text

Ultra-Wide-Band Microstrip Concentric Annular Ring Antenna for Wireless Communications
Salima Azzaz-Rahmani and Noureddine Boukli-Hacene
Download Full-Text

Adaptation of learning resources based on the MBTI theory of psychological types
Amel Behaz and Mahieddine Djoudi
Download Full-Text

EQNM2L: Towards a Metamodel for Extended Queuing Networks
Abdelhabib Bourouis and Brahim Belattar
Download Full-Text

Peer to Peer Networks Management Survey
Mourad Amad, Ahmed Meddahi and Djamil Aissani
Download Full-Text

Province Based Design and Simulation of Indonesian Education Grid Topology
Heru Suhartanto, Ivo B. Nurgoho and Anisa Herdiani
Download Full-Text

An Enhanced Backoff Method used between Mobiles Moving in Industrial 802.11
Walid Fahs, Hassan Kabalan, Jamal Haydar, Abbas Hijazi and Mourad Gueroui
Download Full-Text

Human Iris Segmentation for Iris Recognition in Unconstrained Environments
Mahmoud Mahlouji and Ali Noruzi
Download Full-Text

Evaluation of coordination contracts for a two stage Supply Chain under price dependent demand
Noureddine Labiad, Zitouni Beidouri and Othmane Bouksour
Download Full-Text

Privacy Preserving RFE-SVM for Distributed Gene Selection
Fode Camara, Mouhamadou Lamine Samb, Samba Ndiaye and Yahya Slimani
Download Full-Text

Proposition of Model for CSIRT: Case Study of Telecommunication Company in a Province of Iran
Ali Naseri and Omid Azmoon
Download Full-Text

Steady State and Transient Study of The Electron Transport In N-Type GaSb Using Three Valley Monte Carlo Model
Belhadji Youcef and Bouazza Benyounes
Download Full-Text

A Two Phase Approach for Process Mining in Incomplete and Noisy Logs
Roya Zareh Farkhady and Seyyed Hasan Aali
Download Full-Text

Protein sequence for clustering DNA based on Artificial Neural Networks
Gamal. F. Elhadi, R. M. Farouk and Abdalhakeem. T. Issa
Download Full-Text

Comparison of Phase Only Correlation and Neural Network for Iris Recognition
Yogendra Kumar Jain and Manoj Kumar Verma
Download Full-Text

A Conventional Authentication in Key Management using Progressive Approach
Sandosh Sakkarapany and Uthayashangar Sundaramourty
Download Full-Text

Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks
Rakesh Kumar and Mahesh Kumar
Download Full-Text

Comparative Analysis of Feature Extraction Methods for the Classification of Prostate Cancer from TRUS Medical Images
Manavalan Radhakrishnan and Thangavel Kuttiannan
Download Full-Text

A modified Kernelized Fuzzy C-Means (KFCM) algorithm for noisy images segmentation: Application to MRI images
Abdenour Mekhmoukh, Karim Mokrani and Mohamed Cheriet
Download Full-Text

Serious Security Weakness in RSA Cryptosystem
Majid Bakhtiari and Mohd Aizaini Maarof
Download Full-Text

Gossip Based Routing Protocol Design for Ad Hoc Networks
Toqeer Mahmood, Tabbassam Nawaz, Rehan Ashraf and Syed M. Adnan Shah
Download Full-Text

Two Automated Mechanisms to Create Electures and to Videotape Regular Lectures
Nael Hirzallah
Download Full-Text

An Overview of Applications, Standards and Challenges in Futuristic Wireless Body Area Networks
Ragesh G K and Baskaran K
Download Full-Text

Design and Implementation of Mobile IPv6 Data Communication in Dual Networks
Chaman Singh, Sanjeev Kumar, Sanjeev Kumar and K.L.Bansal
Download Full-Text

Rigorous Description Of Design Components Functionality: An Approach Based Contract
Abdelhafid Zitouni
Download Full-Text

Secure Routing in Wireless Sensor Networks
Soumyashree Sahoo, Pradipta Mishra and R. N. Satpathy
Download Full-Text

A Data Transfer in Wireless Sensor Networks Using AODV Protocol
B.Manimekala and M.Kayalvizhi
Download Full-Text

A New Spectral Based Characterization of Electrocardiogram Signals in SuddenCardiac Death
Hedi Khammari
Download Full-Text

Method of operational diagnostic state of flow and calculation of calibration Coefficients using artificial neural networks
Safarini Osama
Download Full-Text

An Advanced Survey on Cloud Computing and State-of-the-art Research Issues
Mohiuddin Ahmed, Abu Sina Md. Raju Chowdhury, Mustaq Ahmed and Md. Mahmudul Hasan Rafee
Download Full-Text

USABILITY of Collaborative Web Surfing Systems in e-Research
Akhtar Ali Jalbani, Aneela Yasmin, Gordhan Das Menghwar and Mukhtiar Memon
Download Full-Text

Improve Data Warehouse Performance by Preprocessing and Avoidance of Complex Resource Intensive Calculations
Muhammad Saqib, Muhammad Arshad, Mumtaz Ali, Nafees Ur Rehman and Zahid Ullah
Download Full-Text

Search engine optimization with Google
Vinit Kumar Gunjan
Download Full-Text

Ontology Based Feature Driven Development Life Cycle
Farheen Siddiqui and M. Afshar Alam
Download Full-Text

An Empirical Study of Underwater Acoustic Sensor Network and Terrestrial Wireless Network
Mohd. Ehmer Khan and Farmeena Khan
Download Full-Text

Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure
Shahram Babaie and Seyed Sajad Pirahesh
Download Full-Text

Application of Decision Tree in Analysis of Intra College Festival Data set
Sumit Srivastava, Megha Yadav and Sandeep Devra
Download Full-Text

DSP Implementation of a Power Factor Correction Strategy for BLDC Motor Drive
R. Vijayarajeswaran
Download Full-Text

Evolutionary Modular Neural Network Approach for Breast Cancer Diagnosis
Bipul Pandey, Tarun Jain, Vishal Kothari and Tarush Grover
Download Full-Text

String Matching and its Applications in Diversified Fields
Vidya Saikrishna, Akhtar Rasool and Nilay Khare
Download Full-Text

Modified Secret Sharing over a Single Path in VoIP with Reliable Data Delivery
K.Maheswari and M. Punithavalli
Download Full-Text

Numerical simulation of groundwater level in a fractured porous medium and sensitivity analysis of the hydrodynamic parameters using grid computing: application of the plain of Gondo (Burkina Faso)
Wenddabo Olivier Sawadogo, Noureddine Alaa and Blaise Some
Download Full-Text

Spoken Word Recognition Strategy for Tamil Language
An. Sigappi and S. Palanivel
Download Full-Text

A study on the behavior of a neural network for grouping the data
Suneetha Chittineni and Raveendra Babu Bhogapathi
Download Full-Text

Implementation of Genetic Algorithm in Predicting Diabetes
S.Sapna, A. Tamilarasi and M.Pravin Kumar
Download Full-Text

Performance Evaluation of Bluetooth andZigbee Using Monte Carlo Simulation
Shoaib Ur Rehman, Obaid Ur Rehman, Zeshan Akbar and Javed Iqbal
Download Full-Text

Implementation of Location based Services in Android using GPS and Web Services
Manav Singhal and Anupam Shukla
Download Full-Text

Cloud Load Balancing Techniques: A Step Towards Green Computing
Nidhi Jain Kansal and Inderveer Chana
Download Full-Text

Influence of Side Effect of EBG Structures on the Far-Field Pattern of Patch Antennas
Fethi Benikhlef and Nourdinne Boukli Hacen
Download Full-Text

MC-CDMA Scheme in Wi-Fi Environment
Nacera Larbi, Fatima Debbat and A. Boudghen Stambouli
Download Full-Text

Intelligent Video Object Classification Scheme using Offline Feature Extraction and Machine Learning based Approach
Chandra Mani Sharma, Alok Kumar Singh Kushwaha, Rakesh Roshan, Rabins Porwal and Ashish Khare
Download Full-Text

Wind Turbine Micrositing: Comparison of Finite Difference Method and Computational Fluid Dynamics
Samina Rajper and Imran Amin
Download Full-Text

A new path algorithm for the weighted multi-graphs WMGPA-application to the Direct Topological Method
Abderrahmane Euldji, Abderrahim Tienti and Amine Boudghene Stambouli
Download Full-Text

Comparative Study between Various Aspects of the Academic and Nonacademic Institutions Websites
Khalid Samy Mohamed Husain
Download Full-Text

Arabic Interface Analysis Based on Cultural Markers
Mohammadi Akheela Khanum, Shameem Fatima and Mousmi A. Chaurasia
Download Full-Text

An Extensible and Secure Framework for Distributed Applications
Aneesha Sharma and Shilpi Gupta
Download Full-Text

Hybrid framework for mitigating illegitimate Peer Nodes in Multimedia file sharing in P2P
Ramesh Shahabadkara and Ramachandra V. Pujeri
Download Full-Text

Image Processing and Analysis for DTMRI
Kondapalli Srinivasa Vara Prasad, Manike Chiranjeevi, Kundan Kumar Mishra and Kdbs Tanuja
Download Full-Text

A SLA-Aware Scheduling Architecture in Grid System Using Learning Techniques
Seyedeh Yasaman Rashida and Amir Masoud Rahmani
Download Full-Text

A Comparative Study on Performance Benefits of Multi-core CPUs using OpenMP
Vijayalakshmi Saravanan
Download Full-Text

Sensitivity Analysis of EADARP Multicast Protocol
Dina Darwish
Download Full-Text

Mobility Metrics Estimation and Categorization for SNET Protocols
Anita Sethi, Anita Sethi, J. P. Saini, J. P. Saini, Shailendra Mishra and Shailendra Mishra
Download Full-Text

Improving Internet Quality of Service through Active Queue Management in Routers
Gamal Attiya and Heba El-Khobby
Download Full-Text

Using Petri Nets For Resource Management Modeling In The Operating Systems
Adalat Karimov and Shahram Moharrami
Download Full-Text

An Improved Approach for Working outside the MANET by Extending MANET Routing Protocol
and Rashween Kuar Saluja
Download Full-Text

Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing
Anju Bala and Inderveer Chana
Download Full-Text

MPLS - A Choice of Signaling Protocol
Muhammad Asif, Zahid Farid, Muhammad Lal and Junaid Qayyum
Download Full-Text

A Study of Edge Detection Method for different Climate Condition Images using Digital Image Processing
P. Balakrishnan, S. Muruganand and K. Sriram
Download Full-Text

Block Based Video Watermarking Scheme Using Wavelet Transform and Principle Component Analysis
Nisreen I. Yassin, Nancy M. Salem and Mohamed I. El Adaway
Download Full-Text

Pattern Design for Software Testing BaseFinit Automato Machines
Seyyede Roya Alavi
Download Full-Text

Survey of Tolerant Network in Mobile Communication
M.Chithik Raja, N. Mohame Yasin and M.S.Durai Rajan
Download Full-Text

Analysis of Quality of Service Performances of Connection Admission Control Mechanisms in OFDMA IEEE 802.16 Network using BMAP Queuing
Abdelali El Bouchti, Abdelkrim Haqiq and Said El Kafhali
Download Full-Text

Tools for decision support in planning academic needs of actors
Oubedda Latifa, Erraha Brahim and Khalfaoui Mohamed
Download Full-Text

Outlier Detection: Applications And Techniques
Karanjit Singh and Shuchita Upadhyaya
Download Full-Text

An analytical model for Energy Consumption in Y-MAC Protocol
Ramchand V and D. K. Lobiyal
Download Full-Text

Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network
Chitra Kiran N and G Narendra Kumar
Download Full-Text

Performance Based Novel Techniques for Semantic Web Mining
Mahendra Thakur and Geetika S. Pandey
Download Full-Text

Genetic Algorithm and Confusion Matrix for Document Clustering
A. K. Santra and C. Josephine Christy
Download Full-Text

Pair of Iris Recognition for Personal Identification Using Artificial Neural Networks
K.Saminathan, M.Chithra Devi and T.Chakravarthy
Download Full-Text

Optimized Energy-Aware Algorithm for Collaboration in Visual Sensor Networks
Harish H.Kenchannavar and Umakant P.Kulkarni
Download Full-Text

A New Approach to the Data Aggregation in Wireless Sensor Networks
Chamran Asgari and Javad Akbari Torkestani
Download Full-Text

Implication of Secure Micropayment System Using Process Oriented Structural Design by Hash chaining in Mobile Network
Chitra Kiran N. and G. Narendra Kumar
Download Full-Text

A 100 mA Low Voltage Linear Regulators for Systems on Chip Applications Using 0.18 um CMOS Technology
Krit Salah-Ddine, Zared Kamal, Qjidaa Hassan and Zouak Mohcine
Download Full-Text

Comment on-Quantum Multiplexer Designing and Optimization applying Genetic Algorithm
Subhasis Pal, Arijit Roy and Dibyendu Chatterjee
Download Full-Text

Software Size Estimation Using Fuzzy Backpropagation Network Method
B V A N S S Prabhakar Rao and P Seetha Ramaiah
Download Full-Text

Semantic Probabilistic Modelling of novel routing Protocol with Implication of Cumulative Routing Attack in Mobile adhoc network
Anil G. N. and A. Venugopal Reddy
Download Full-Text

Automated Text Summarization Base on Lexicales Chain and graph Using of WordNet and Wikipedia Knowledge Base
Mohsen Pourvali and Mohammad Saniee Abadeh
Download Full-Text

Improving Web Performance by a Differencing and Merging System
Aleksandar Jevremovic, Ranko Popovic, Dejan Zivkovic, Mladen Veinovic and Goran Shimic
Download Full-Text

Performance Tuning of Data Transfer in Vehicular Networks
Dinakaran M and P. Balasubramanie
Download Full-Text

Designing Debugging Models for Object Oriented Systems
Sujata Khatri and R. S. Chhillar
Download Full-Text

Verdict Accuracy of Quick Reduct Algorithm using Clustering and Classification Techniques for Gene Expression Data
T.Chandrasekhar, K.Thangavel and E.N.Sathishkumar
Download Full-Text

Design of Miniature Patch Antenna Around the Frequency 3.5 GHz for WIMAX Technology
Adnane Latif
Download Full-Text

Designing of RF Single Balanced Mixer with a 65 nm CMOS Technology Dedicated to Low Power Consumption Wireless Applications
Raja Mahmou and Khalid Faitah
Download Full-Text

Ordinal Classification Method for the Evaluation of Thai Non-life Insurance Companies
Phaiboon Jhonpita, Sukree Sinthupinyo and Thitivadee Chaiyawat
Download Full-Text

A Quantitative Study and Comparison of AODV, OLSR and TORA Routing Protocols in MANET
Tamilarasan Santhamurthy
Download Full-Text

Analyzing the Complexity of Java Programs using Object-Oriented Software Metrics
Arti Chhikara and R.S.Chhillar
Download Full-Text

Uniform Fiber Bragg Grating modeling and simulation used matrix transfer method
Abdallah Ikhlef, Rachida Hedara and Mohamed Chikh-Bled
Download Full-Text

Proposal of a New Block Cipher reasonably Non-Vulnerable against Cryptanalytic Attacks
Abhijit Chowdhury, Angshu Kumar Sinha and Saurabh Dutta
Download Full-Text

Semantic Malware Detection by Deploying Graph Mining
Fatemeh Karbalaie, Ashkan Sami and Mansour Ahmadi
Download Full-Text

Hybridizing PSM and RSM Operator for Solving NP-Complete Problems: Application to Traveling Salesman
Chakir Tajani, Otman Abdoun and Jaafar Abouchabaka
Download Full-Text

Valuable Internet Advertising and Customer Satisfaction Cycle(VIACSC)
Muhammad Awais, Tanzila Samin and Muhammad Bilal
Download Full-Text

Toward an example-based machine translation from written text to ASL using virtual agent animation
Mehrez Boulares and Mohamed Jemni
Download Full-Text

A Multi-agent Approach for Space Occupation Problems
Jamila Boussaa, Mohammed Sadgal and Aziz Elfazziki
Download Full-Text

Classification of Web Log Data to Identify Interested Users Using Na´ve Bayesian Classification
A. K. Santra and S. Jayasudha
Download Full-Text

Design and Development of Artificial Neural Network Based Tamil Unicode Symbols Identification System
Karthick Anand Babu
Download Full-Text

Mercator as web crawler
Priyanka Saxena
Download Full-Text

Tradeoff Analysis of Bit-Error-Rate (BER) inCognitive Radio Based on Genetic Algorithm
Shrikrishan Yadav and Krishna Chandra Roy
Download Full-Text

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents
M.A. Mohamed and A.M. El-Mohandes
Download Full-Text

Evaluation Strategy for Ranking and Rating of Knowledge Sharing Portal Usability
D. Venkata Subramanian and Angelina Geetha
Download Full-Text

Noncooperative Iris Segmentation
Elsayed Mostafa, Maher Mansour and Heba Saad
Download Full-Text

Vehicular Ad-hoc Networks
Asad Maqsood and Rehanullah Khan
Download Full-Text

IPTV-Internet Protocol Televisions Key Broadcast Building Blocks
Muhammad Asif, Zahid Farid, Muhammad Lal, Junaid Qayyum and Fayyaz Gul
Download Full-Text

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
Gunjan Nehru and Puja Dhar
Download Full-Text

Design of Power Efficient Schema for Energy Optimization in Data Center With Massive Task Execution Using DVFS
Arunadevi.Ma and R.S.D Wahidabanub
Download Full-Text

Video Authentication: Issues and Challenges
Saurabh Upadhyay and Sanjay Kumar Singh
Download Full-Text

A Review of QoS in Mobility Phillic Communication
Sumit Joshi and Rajeev Kumar
Download Full-Text

Helpful Business Value of Advance Bal Information System
Muhammad Awais, Muhammad Irfan, Muhammad Bilal and Tanzila Samin
Download Full-Text

Novel Design of A Compact Proximity Coupled Fed Antenna
Mahdi Ali, Abdennaceur Kachouri and Mounir Samet
Download Full-Text

Conceptualizing of Social Networking Sites
J. S. Sodhi and Shilpi Sharma
Download Full-Text

Covering Space and Van Kampen theory methods of Fundamental Group
Gbenga Olayinka Ojo, Ajuebishi Patient Adetunji, Oluwaseun Gbenga Fadare, Fisayo Caleb Sangogboye, Hezekiah Oluleye Babatunde and Funmilayo Ruth Abodunrin
Download Full-Text

ECG Analysis based on Wavelet Transform and Modulus Maxima
Mourad Talbi, Akram Aouinet, Riadh Baazaoui and Adnane Cherif
Download Full-Text

Email Mining: A Survey
Pranjal S. Bogawar and Kishor K. Bhoyar
Download Full-Text

Cloud computing and its applications in the world of networking
Puja Dhar
Download Full-Text

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment
V. Thavavel and S. Siva Kumar
Download Full-Text

Data optimization from a multiple species network using modified SFLA(Shuffled Frog Leaping Algorithm)
N. Kannaiya Raja, N. Kannaiya Raja, K. Arulanandam, K. Arulanandam, and S. K. Sugunedham
Download Full-Text

Presentation an approach for scientific workflow distribution on cloud computing data centers servers to optimization usage of computational resource
Ahmad Faraahi, Rohollah Esmaeli Manesh, Ahmad Zareie, Mir Mohsen Pedram and Meysam Khosravi
Download Full-Text

High Performance Charge Pump Phase-Locked Loop with Low Current Mismatch
V. Sujatha and R. S. D. Wahida Banu
Download Full-Text

Fuzzy ID3 Decision Tree Approach for Network Reliability Estimation
Ak.Ashakumar Singh and Momtaz Thingujam
Download Full-Text

A novel chaotic encryption scheme based on pseudorandom bit padding
Sodeif Ahadpour, Yaser Sadra and Zahra Arasteh Fard
Download Full-Text

Implementation and Throughput Analysis of Perfect Difference Network (PDN) in Wired Environment
Yogesh Golhar, R.K.Krishna and Mahendra A. Gaikwad
Download Full-Text

Comparison of Routing Protocols for Locating moving object in Large Scale Cellular Wireless Sensor Network
Ola A. Al-Sonosy, Mohammed A. Hashem and Nagwa Badr
Download Full-Text

Control Logic Algorithm for Medium Scale Wind Turbines
Osama Abdel Hakeem Abdel Sattar, R. R. Darwish, Saad Mohamed Ali Eid and Elsayed Mostafa Saad
Download Full-Text

The application of methods of nonlinear dynamics for ECG in Normal Sinus Rhythm
Nisar Hundewale
Download Full-Text

Security Analysis of Routing Protocols in Wireless Sensor Networks
Mohammad Sadeghi, Farshad Khosravi, Kayvan Atefi and Mehdi Barati
Download Full-Text

Adaptive and Reliable Control Algorithm for Hybrid System Architecture
Osama Abdel Hakeem Abdel Sattar, R. R. Darwish, Saad Mohamed Ali Eid and Elsayed Mostafa Saad
Download Full-Text

Performance evaluation of Statistical Approaches for Automatic Text-Independent Speaker Recognition using Robust Features
R. Rajeswara Rao, A. Prasad and Ch. Kedari Rao
Download Full-Text

Skin-color Based Videos Categorization
Rehanullah Khan, Asad Maqsood, Zeeshan Khan, Muhammad Ishaq and Arsalan Arif
Download Full-Text

Quantitative Multiscale Analysis using Different Wavelets in 1D Voice Signal and 2D Image
Niraj Shakhakarmi
Download Full-Text

Secured Distributed Cognitive MAC and Complexity Reduction in Channel Estimation for the Cross Layer based Cognitive Radio Networks
Niraj Shakhakarmi
Download Full-Text

Network Threat Ratings in Conventional DREAD Model Using Fuzzy Logic
Ak.Ashakumar Singh and K.Surchandra Singh
Download Full-Text

Using Jquery with Snort to Visualize Intrusion
Alaa El - Din Riad, Ibrahim Elhenawy, Ahmed Hassan and Nancy Awadallah
Download Full-Text

Performance Evaluation of AODV and DSR with Varying Pause Time and Speed Time Over TCP and CBR Connections in VANET
Bijan Paul, Md.Ibrahim and Md. Abu Naser Bikas
Download Full-Text

Assessment of Water Quality in Coastal Environments of Mohammedia Applying Responses of Biochemical Biomarkers in the Brown Mussel Perna perna
Laila El Jourmi and Abdessamad Amine
Download Full-Text

IJCSI Volume 9, Issue 1, No 1, January 2012

Download Full-Text

IJCSI Volume 9, Issue 1, No 2, January 2012

Download Full-Text

IJCSI Volume 9, Issue 1, No 3, January 2012

Download Full-Text


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »