IJCSI Open Access Publications
IJCSI Thesis Publications IJCSI Conference Special Issues Search Publications, Authors, More...
IJCSI Volume 9, Issue 6, November 2012
Alaa Hilal, Bassam Daya and Pierre Beauseroy
Download Full-Text
Dynamic Structural Modeling and Its Applications: An Analysis of Anxiety Structure
Keita Kinjo
Download Full-Text
Detection of the Concentration and Size Distribution of Indoor Inhalable Particle Based on Mathematical Morphology
Hongli Liu, Xiong Zhou and Lei Xiao
Download Full-Text
A Blind Detection Algorithm Utilizing Statistical Covariance in Cognitive Radio
Yingxue Li, Shuqun Shen and Qiucai Wang
Download Full-Text
Improve Downlink Burst Allocation to Achieve High Frame Utilization of Mobile WiMAX (802.16e)
Zaid Ghanim Ali, R. Badlishah Bin Ahmad, Abid Yahya, Layth Abdulkareem Hassnawi and Zeyad Tariq Ibrahim
Download Full-Text
Automated Extraction of Geospatial Features from Satellite Imagery: Computer Vision Oriented Plane Surveying
Usman Babawuro and Zou Beiji
Download Full-Text
A new meta-data driven data-sharing storage model for SaaS
Li Heng, Yang Dan and Zhang Xiaohong
Download Full-Text
Efficient Circuit Configuration for Enhancing Resolution of 8-bit flash Analog to Digital Convertor
Gururaj Balikatti, R.M Vani and P.V. Hunagund
Download Full-Text
The Harris Corner Detection Method Based on Three Scale Invariance Spaces
Yutan Wang, Huixin Wang, Jing Li and Biming Li
Download Full-Text
A Modelling Approach Based on Fuzzy Agents
Alain-Jérôme Fougères
Download Full-Text
Service Priority based Reliable Routing Path Select Method in Smart Grid Communication Network
Kaixuan Wang, Xuesong Qiu and Zhipeng Gao
Download Full-Text
Sales Forecasting Based on ERP System through Delphi, fuzzy Clustering and Back-Propagation Neural Networks with adaptive learning rate
Attariuas Hicham, Bouhorma Mohammed and El Fallahi Abdellah
Download Full-Text
An Empirical Evaluation of Off-line Arabic Handwriting And Printed Characters Recognition System
Firoj Parwej
Download Full-Text
Design and Implementation of Government Website Cluster
Wei Zhang
Download Full-Text
Performance Enhancement Evaluation in Database Decompression Using HIRAC Algorithm
Muthukumar Murugesan
Download Full-Text
Secure Data Exchange in P2P Data Sharing Systems in eHealth Perspective
Mehedi Masud and Sk. Md. Mizanur Rahman
Download Full-Text
A Compact Semantic Model for Characterization of Stochastic Temporal Properties of Concurrent Systems
Mokdad Arous, Jean-Michel Ilié and Djamel-Eddine Saïdouni
Download Full-Text
Reproducible Research in Speech Sciences
Kálmán Abari
Download Full-Text
Content-Centric Networking: Effect of Content Caching on Mitigating DoS Attack
Kai Wang, Jia Chen, Huachun Zhou and Yajuan Qin
Download Full-Text
Broad-band Circularly Polarized Patch Antenna for Multi-Mode Navigation Application
Wangencheng, Zhangchang and Zhangchangnian
Download Full-Text
Delay and Delay Variation Constrained Algorithm based on VNS Algorithm for RP Management in Mobile IPv6
Youssef Baddi and Mohamed Dafir Ech-Chrif El Kettani
Download Full-Text
Cultural Algorithm for Engineering Design Problems
Xuesong Yan
Download Full-Text
Implementing a Novel Approach an Convert Audio Compression to Text Coding via Hybrid Technique
Mazin Abed Mohammed
Download Full-Text
Design and Simulation of an IPv6 Network Using Two Transition Mechanisms
Lefty Valle Rosado, Lizzie Narváez Díaz, Cinhtia González Segura and Victor Chi Pech
Download Full-Text
Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks
M.A. Mohamed, F.W. Zaki and A.M. Elmohandes
Download Full-Text
Homemade Antennas Implementation: A Comparative Analysis of the Quality of Service
Josué Emmanuel Tec Castro, Cinhtia Maribel González Segura, Michel García García, Lizzie Edmea Narváez Díaz and Maximiliano Canché Euán
Download Full-Text
Design of an interactive game-based application for improving the resolution of common Computer Network issues
Mario Ciau Uitzil, Lizzie Narváez Díaz and Victor Chi Pech
Download Full-Text
Design and Implementation of a Component-based Concurrency Control Mechanism for a Distributed Database
Maximiliano Canché, Juan Lavariega and Erika Llanes
Download Full-Text
Research of Embedded Hardware Optimization Design Algorithm
Xuesong Yan
Download Full-Text
A Framework for Optimizing IP over Ethernet Naming System
Waleed Alzubaidi, Longzheng Cai and Shaymaa A. Alyawer
Download Full-Text
Innovative Way of Internet Voting - Secure On-line Vote - SOLV
Shalini Vermani and Neetu Sardana
Download Full-Text
Meta-data and Data Mart solutions for better understanding for data and information in E-government Monitoring
Mohammed Abdulameer Mohammed, Mohammed Anad, Anwar Mzher and Ahmed Hasson
Download Full-Text
A hybrid video quality metric for analyzing quality degradation due to frame drop
Manish K Thakur, Vikas Saxena and J P Gupta
Download Full-Text
Strongly Nonlinear Parabolic Unilateral Problems Without Sign Conditions and Three Unbounded Nonlinearities
Youssef Akdim, Jaouad Bennouna, A. Bouajaja and Mounir Mekkour
Download Full-Text
Enhanced Fractional Frequency Reuse (EFFR) Technique in WiMAX Cellular Network
M. K. Salman, R.B. Ahmed, Abid Yahya, Jaafar Adhab Al-Dhaibani and Zeyid T. Ibraheem
Download Full-Text
A Prelude Stride in Praxis and Usages of Healthcare Informatics
Murtaza Hussain Shaikh and Munazza Ahsan Shaikh
Download Full-Text
Feature Dimension Reduction of NaXi Pictographs Characters Recognition based on LDA
Hai Guo, Jinghua Yin and Jingying Zhao
Download Full-Text
Reconceptualization of Class-based Representation in UML
Sabah Al-Fedaghi
Download Full-Text
Overview of Visualization Tools for Web Browser History Data
Abdelhakim Herrouz, Chabane Khentout and Mahieddine Djoudi
Download Full-Text
An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary
Roohallah Rastaghi
Download Full-Text
On Reliability Modeling in Wireless Sensor Networks-A Review
Mamta Katiyar, H.P.Sinha and Dushyant Gupta
Download Full-Text
Motion Detection Real Time 3D Walkthrough in Limkokwing University of Creative Technology (Modet-Walk) using Kinect XBox
Behrang Parhizkar, Kanammal A/p Sandrasekaran and Arash Habibi Lashkari
Download Full-Text
Frequency Domain Soft-Decision Feedback Equalization for SC-FDMA with Insufficient Cyclic Prefix
Qiucai Wang, Chaowei Yuan, and Yingxue Li
Download Full-Text
Network traffic prediction based on ARFIMA model
Dingding Zhou, Songling Chen and Shi Dong
Download Full-Text
A New Color Image Watermarking Technique Using Hybrid Domain
Ghazali Bin Sulong, Harith Raad Hasna, Ali Selamat, Mohammed Ibrahim and Saparudin
Download Full-Text
RSSVM-based Multi-Instance Learning for Image Categorization
Daxiang Li
Download Full-Text
Intelligent Tutoring Systems Based on the Multi-Agent Systems (ITS-MAS): The Dynamic and Incremental Case Based Reasoning (DICBR) Paradigm and the Inverse Longest Common Sub-Sequence (ILCSS) in the CEHL
El Mokhtar En-Naimi, Abdelhamid Zouhair, Benaissa Amami, Hadhoum Boukachour, Patrick Person and Cyrille Bertelle
Download Full-Text
Dynamic service Allocation with Protection Path
Loay Alzubaidi
Download Full-Text
Matrix Access structure Policy used in Attribute-Based Proxy Re-encryption
Li Keying
Download Full-Text
A Conceptual and UML models of procurement process for simulation framework
Abdessamad Douraid, Saâd Lissane Elhaq and Hamid Ech-Cheikh
Download Full-Text
Study of a Planar Topology ButlerMatrix for Printed Multibeam Antenna
Guenad Boumediene
Download Full-Text
Software Evaluation for Crowd Evacuation - Case Study: Al-Masjid An-Nabawi
Fazilah Haron, Yasser M. Alginahi, Muhammad N. Kabir and Ali I. Mohamed
Download Full-Text
Identification of Adopted Pali Words in Myanmar Text
Zin Maung Maung
Download Full-Text
Performance and Comparison of Multi-Hop Ad-Hoc Routing Protocols - Quantitative Study
Tamilarasan S, G.Ezrasastry, M.Sathyam Reddy, Y.Suresh and K.Sreenath
Download Full-Text
A HMM-Based Method for Vocal Fold Pathology Diagnosis
Vahid Majidnezhad and Igor Kheidorov
Download Full-Text
Multimode FPGA with Flexible Embedded FPUS
G.Murugaboopathi, S.Hariharasitaraman and G.Sankar
Download Full-Text
Fuzzy-based Approach for Filling the Metabolic Pathway Hole
Ahmed Farouk Al-Sadek, Laila Mohamed Elfangary and Alaa Eldin Abdallah Yassin
Download Full-Text
Application of Inventory Management Principles for Efficient Data Placement in Storage Networks
Arokia Paul Rajan and Sagayaraj Francis
Download Full-Text
A discrete event simulation in an automotive service context
Alireza Rangraz Jeddi, Nafiseh Ghorbani Renani, Afagh Malek and Alireza Khademi
Download Full-Text
Grammar of Dance Gesture from Bali Traditional Dance
Yaya Heryadi, Mohamad Ivan Fanany and Aniati Murni Arymurthy
Download Full-Text
Part of speech Tagging in Manipuri with Hidden Markov Model
Kh Raju Singha, Bipul Syam Purkayastha and Kh Dhiren Singha
Download Full-Text
Microlearning of web fundamentals based on mobile learning
Aitchanov Bekmurza H., Zhaparov Meirambek K and Nussipbekov Abai
Download Full-Text
Face Gender Image Classification Using Various Wavelet Transform and Support Vector Machine with various Kernels
Amjath Fareeth Basha and Gul Shaira Banu Jahangeer
Download Full-Text
Perceptions Analysis on Service Delivery (SD) using ITIL version 3 framework in Ministerio Da Justica Ministry Dili Timor Leste
Edio Da Costa
Download Full-Text
Cognitive Internet of Things: Concepts and Application Example
Mingchuan Zhang, Haixia Zhao, Ruijuan Zheng, Qingtao Wu and Wangyang Wei
Download Full-Text
How using business intelligence can improve SCPMS project maturity: an empirical investigation in large sized Moroccan companies
Chafik Okar, Abderrahim El Amraoui, Faycal Fedouaki and Said Barrijal
Download Full-Text
A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing
Ruijuan Zheng, Mingchuan Zhang, Qingtao Wu, Wangyang Wei and Haixia Zhao
Download Full-Text
Towards a new approach of continuous process improvement based on CMMI and PMBOK
Rdiouat Yassine, Nakabi Naima, Kahtani Khadija and Semma Alami
Download Full-Text
An Empirical Study of COTS components Persuasion, Evaluation Selection and Integration in software houses Faisalabad, Pakistan
Zahid Javed, Ahsan Raza Sattar, Tasleem Mustafa and Muhammad Shakeel Faridi
Download Full-Text
On Permutation Capabilities of Fault Tolerant Multistage Interconnection Networks
Sandeep Sharma
Download Full-Text
Image-based Face Detection and Recognition: State of the Art
Faizan Ahmad, Aaima Najam and Zeeshan Ahmed
Download Full-Text
Autonomous Multilevel Policy Based Security Configuration in Distributed Database
Neera Batra and Hemant Aggarwal
Download Full-Text
Study and Optimization of Cooperative Spectrum Sensing in OFDM Cognitive Radio Networks
Yingxue Li, Shuqun Shen and Qiucai Wang
Download Full-Text
Meaning representation for automatic indexing of Arabic texts
Bakhouche Abdelali and Yamina Tlili-Guiassa
Download Full-Text
Towards a next generation of scientific computing in the Cloud
Yassine Tabaa and Abdellatif Medouri
Download Full-Text
Decision Feedback Blind Equalization Based on Recurrent Least Squares Algorithm for Underwater Acoustic Channels
Ying Xiao
Download Full-Text
A Bargaining based Scheduling for Resources Advanced Reservation Using Simulated Annealing into Grid System
Seyedeh Yasaman Rashida and Hamidreza Navidi
Download Full-Text
Performance of Network Coding Based Multipath Routing in Wireless Sensor Networks
Baolin Sun, Chao Gui, Ying Song and Ting Zhang
Download Full-Text
Generalized If ... Then … Else Inference Rules with Linguistic Modifiers for Approximate Reasoning
Le Anh Phuong and Tran Dinh Khang
Download Full-Text
Merging Data Mining Techniques for Web Page Access Prediction: Integrating Markov Model with Clustering
Triloknath Pandey, Ranjita Kumari Dash, Alkananda Tripathy and Barnali Sahu
Download Full-Text
A Self-Optimization Method for System Service Dependability based on Autonomic Computing
Qingtao Wu, Lina Zhu, Ying Lou and Ruijuan Zheng
Download Full-Text
The Agroecological Zone using Fuzzy Logic for Land Suitability and Regional Sustainable Food Insecurity in Boyolali, Central of Java Indonesia
Sri Yulianto Joko Prasetyo, Bistok Hasiholan Simanjuntak and Kristoko Dwi Hartomo
Download Full-Text
Improved Ensemble Empirical Mode Decomposition and its Applications to Gearbox Fault Signal Processing
Jinshan Lin
Download Full-Text
Combined coding and companding to reduce both PAPR and BER in OFDM systems
Hervé Koudougnon, Idriss Chana and Mostafa Belkasmi
Download Full-Text
Survey on Multi-Tenant Data Architecture for SaaS
Li Heng, Yang Dan and Zhang Xiaohong
Download Full-Text
Improved Time Aware Incremental PageRanking Using Personalized Link Structure Analysis
Shail K Dinkar and Hemant Kumar
Download Full-Text
Trading Signal Generation Using A Combination of Chart Patterns and Indicators
Chalothon Chootong and Ohm Sornil
Download Full-Text
A Novel Approach for Detecting QRS Complex of ECG signal
Sameer K Salih
Download Full-Text
Improving the Serving Motion in a Volleyball Game: A Design of Experiment Approach
Maryam Mohammadi and Afagh Malek
Download Full-Text
Research and Simulation on Drivers Route Choice Behavior Cognition Model
Na Lin, Hong-Dong Liu and Chang-Qing Gong
Download Full-Text
Based on the Cross Layer Integrated Metric and Change of the Trigger Mechanism WMN Routing Protocol Design and Simulation
Chen Fei, Xiao-Chun Hu and Chen Yan
Download Full-Text
A Reusable and Interoperable Semantic Classification Tool which Integrates Owl Ontology
Saadia Lgarch, Mohammed Khalidi Idrissi and Samir Bennani
Download Full-Text
Application of Fuzzy Association Rule Mining for Analysing Students Academic Performance
Olufunke O. Oladipupo, Olanrewaju. J. Oyelade and Dada. O. Aborisade
Download Full-Text
Multinomial Logit Models for Variable Response Categories Ordered
Malika Chikhi, Thierry Moreau and Michel Chavance
Download Full-Text
The Research on an Algorithm of Three-Dimensional Topology Control of Wireless Sensor Network
Xiao-Chun Hu, Chen Fei and Chen Yan
Download Full-Text
Middleware Approaches for Wireless sensor Networks: An Overview
J.Radhika and S.Malarvizhi
Download Full-Text
Finding Cyclic Frequent Itemsets
Mazarbhuiya, F. A., Shenify, M., Khan, A. and Farooq, A.
Download Full-Text
Evaluation of Performance of Background Traffic-based CMT-SCTP with Active Queue Management Algorithms
Meifang Shen, Yuanlong Cao, Mingchuan Zhang, Kaixuan Wang and Mingming Yu
Download Full-Text
Modelling the spread of HIV-AIDS in Morocco
Mohamed El Hia, O. Balatif, H. Ferjouchia, E. Labriji and M. Rachik
Download Full-Text
MP3 Steganography: Review
Mohammed Salem Atoum, Subariah Ibrahim, Ghazali Sulong and Ali M-Ahmad
Download Full-Text
3.51pJ pulse 1.2V CMOS IR-UWB Transmitter
Sagar K. Dhar, Shuvashis Chakraborty and Pranab Biswas
Download Full-Text
Intelligent Virtual Agents Architecture in Unknown Environment
Jiangfan Feng, Hu Song and Yan Li
Download Full-Text
Neural Network-Based Modeling of PEM fuel cell and Controller Synthesis of a stand-alone system for residential application
Khaled Mammar and Abdelkader Chaker
Download Full-Text
Multilevel Queue-Based Scheduling for Heterogeneous Grid Environment
Kumaresh.V.S, Prasidh.S, Arjunan.B, Subbhaash.S and Sandhya.M.K
Download Full-Text
A Classification of Microarray Gene Expression Data Using Hybrid Soft Computing Approach
Vaishali P Khobragade and A.Vinayababu
Download Full-Text
Development of Zaozhuang Tourism Information System Based on WebGIS
Xiaofei Yan and Yanqiu Wang
Download Full-Text
Performance Analysis of VoIP Codecs over WiMAX Networks
M.A. Mohamed, F.W. Zaki and A.M. Elfeki
Download Full-Text
ASL Fingerspelling Translator Glove
Jamal Haydar, Bayan Dalal, Shahed Hussainy, Lina El Khansa and Walid Fahs
Download Full-Text
Wifi-based Indoor Navigation with Mobile GIS and Speech Recognition
Jiangfan Feng and Yanhong Liu
Download Full-Text
Performance Analysis of Scheduling Algorithms For VoIP Services in IEEE 02.16 Systems
M.A. Mohamed, F.W. Zaki and A.M. Elfeki
Download Full-Text
Study on Quality control of CoPS Innovation Based on Quality Chain and Quality House
Wang Xiuhong
Download Full-Text
Solve Traveling Salesman Problem Using Particle Swarm Optimization Algorithm
Xuesong Yan
Download Full-Text
AODV and DSR energy-aware routing algorithms: a comparative study
Abdelwadood Mesleh, Nawal Al-Zabin, Jihad Abdel-Jalil, Hala Abu-Asbeh, Heba Abu-Matter, Maha Al-Hunati and Nesreen Al-Mutlaq
Download Full-Text
Setswana Speech Recognizer for Computer Based Applications
Oratile Leteane and Francis, J. Ogwu
Download Full-Text
A Novel Color Microscope Image Enhancement Method Based on HSV Color Space and Curvelet Transform
Chuancheng Ren and Jianguo Yang
Download Full-Text
Sparse Representation Approach for Variation-Robust Face Recognition Using Discrete Wavelet Transform
Rania Salah El-Sayed, Mohamedyoussri El-Nahas and Ahmed El Kholy
Download Full-Text
Orientation towards a Service Oriented Architecture for designing and building a Comprehensive Emergency System
Hamdan Al-Sabri and Samir El-Masri
Download Full-Text
Empirical Study and Model of Users Acceptance for Mobile Commerce in China
Hua Zheng, Ying Li and Dandan Jiang
Download Full-Text
TaxoGrid: Molecular Phylogeny on Garuda Grid
Amit Saxena, Rajendra Joshi, Sonal Dahale, Sankalp Jain, E. Ramakrishnan, Vivek Gavane, Renu Gadhari, Pankaj Vats, Sunitha Manjari K and Rashmi Mahajan
Download Full-Text
Query Optimization in Grid Databases Using with Particle Swarm Optimization
Mahdi Mahjour-Bonab and Javad Sohafi-Bonab
Download Full-Text
Simple and secure Image Encryption
V.V.Divya, S.K.Sudha and V.R.Resmy
Download Full-Text
Time-frequency Extraction Algorithm of Harmonic Signal from Lorenz Mixed Signal
Er-Fu Wang, Qiang Liu and Qun Ding
Download Full-Text
Assessing the Dimensions of Relationship Quality in B2C E-Banking Services: An Empirical Comparative Study
Ali Ahmad Alawneh
Download Full-Text
Reverse Game Theory Approach for Aggregator Nodes Selection with Ant Colony Optimization Based Routing in Wireless Sensor Network
Bharathi M A and B P Vijayakumar
Download Full-Text
Application of Statistical Process Control Methods for IDS
Muhammad Sadiq Ali Khan
Download Full-Text
Using Modified Partitioning Around Medoids Clustering Technique in Mobile Network Planning
Lamiaa Fattouh Ibrahim and Manal Hamed Al Harbi
Download Full-Text
A novel modular multiplication algorithm and its application to RSA decryption
G.A.V.Rama Chandra Rao, P.V.Lakshmi and N.Ravi Shankar
Download Full-Text
Design of Combined Antenna with Multiple Polarizations
Zineb Berkat, Noureddine Boukli Hacene and Abdellatif Berkat
Download Full-Text
Comparing Scoring and Fuzzy Logic Method for Teacher Certification DSS in Indonesia
Ida Ayu Purnama Dewi, A.A. Kompiang Oka Sudana, S.Kom, Mt and Dr. I Ketut Gede Darma Putra, S.Kom. Mt
Download Full-Text
FOREST GUARD: A complete safety for Wildlife using Mobile Agents and Sensor Clouds in WSN
Sumit Kumar Tetarave and Ashish Kumar Srivastava
Download Full-Text
Generation of Biometric key for use in DES
Rupam Kumar Sharma
Download Full-Text
A new method for the discovery of the best threshold value for finding positive or negative association rules using Binary Particle Swarm Optimization
Abdoljabbar Asadi, Azad Shojaei, Salar Saeidi, Salah Karimi and Ebad Karimi
Download Full-Text
On the controllability of a class of discrete distributed systems
Ahmed Abdelhak and Ahmed Abdelhak
Download Full-Text
Evaluation of Urban Park Service Quality Based on Factor Analysis
Yichuan Zhang and Lei Feng
Download Full-Text
In Media Streaming Security - Focus Data leakage and Modifiers in Mobile Environment
V.Saravanan and C.Chandrasekar
Download Full-Text
Control of Free-floating Space Robotic Manipulators base on Neural Network
Zhang Wenhui and
Download Full-Text
A Review on Virtual Reality
Pallavi Halarnkar, Sahil Shah, Harsh Shah, Hardik Shah and Anuj Shah
Download Full-Text
Implementation of photovoltaic technologies, a greatsolution to energetic situation in Albania
Anuela Prifti
Download Full-Text
Quality of Instructional Technology (IT) on Implementing Home Economics Curriculum (HEC) at the Primary School Level (PSL) in Botswana
Edna Nwanyiuzor Ogwu and Francis, J. Ogwu
Download Full-Text
Agent-Oriented Enterprise Architecture: new approach for Enterprise Architecture
Babak Darvish Rouhani and Fatemeh Nikpay
Download Full-Text
Applications Sharing using Binding Server for Distributed Environment
Kavita Kimmatkar and Urmila Shrawankar
Download Full-Text
An Adaptive Real Time Task Scheduler
Jashweeni Nandanwar and Urmila Shravankar
Download Full-Text
How to Green Windows Update?
Seifedine Kadry and Humam M Abdulsahib
Download Full-Text
Stability Analysis of Series Connected SEPICs
Arivukkannu Ezhilarasi and Muthiah Ramaswamy
Download Full-Text
Application of Analytics using R Programming for Forecasting Day-ahead Electricity Demand
Chandrabhushan Kesavabhotla, V V Haragopal and A. Vinay Babu
Download Full-Text
Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol
Pinki Nayak, Seema Verma and Rekha Agarwal
Download Full-Text
Research on Collaborative Knowledge Innovation Based on System Dynamics
Wang Xiuhong
Download Full-Text
Automation of J2EE Product Certification Process
Iddalgave Sandeep and Annapurna P. Patil
Download Full-Text
Using Quadtree Algorithm for Improving Fuzzy C-means Method in Image Segmentation
Zahra Ghorbanzad and Farshid Babapour
Download Full-Text
Extraction of Motif Patterns from Protein Sequences using SVD with Rough K-Means Algorithm
E.Elayaraja, K.Thangavel, Chitralegha and T.Chandrasekhar
Download Full-Text
Bagging Support Vector Machines for Leukemia Classification
Gokmen Zararsiz, Ferhan Elmali and Ahmet Ozturk
Download Full-Text
Ultra WideBand Matching of the Rectangular Microstrip Patch Antennas (RMPA) Using Microstrip Non Uniform Transmission Lines (MNUTL)
Ngendakumana Gaspard and Nabih El Ouazzani
Download Full-Text
The Simulated Annealing Algorithm Implemented by the MATLAB
Lin Lin and Chen Fei
Download Full-Text
ICT Offshore Outsourcing: Its Appeals and Impacts
Jameel Awadh Almalki
Download Full-Text
A Virtual Learning Community Based on Cloud Computing and Web 2.0
Hua Zheng
Download Full-Text
Towards an Optimized Design of Individualized Learning Paths: an Approach Based on Ontology and Multi-agents System
Jaber El Bouhdidi, Mohamed Ghailani and Abdelhadi Fennan
Download Full-Text
Influence of Customer Relationship Management on Online Shopping
Abdullah Nabeel Jalal and
Download Full-Text
Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS
Maithili Arjunwadkar and R.V.Kulkarni
Download Full-Text
Updated Pranata Mangsa : Recombination of Local Knowledge and Agro Meteorology using Fuzzy Logic for Determining Planting Pattern
Kristoko Dwi Hartomo, Eko Sediyono, Sri Yulianto and Bistok Hasiholan
Download Full-Text
A New Signal Denoising Method using Iterative Thresholding of the Spectral Intrinsic Decomposition
Oumar Niang, Abdoulaye Thioune, Mouhamed Cheikh El Gueirea, Eric Deléchelle and Jacques Lemoine
Download Full-Text
MuMoCo : a Framework for Improving Data Quality with Multi-modality Cooperation in Wireless Sensor Networks
Guo-Ying Wang and Shen-Ming Qu
Download Full-Text
GMM-UBM Based Speaker Verification in Multilingual Environments
Utpal Bhattacharjee and Kshirod Sarmah
Download Full-Text
A Review on Node Deployment of Wireless Sensor Network
Haitao Zhang and Cuiping Liu
Download Full-Text
A Survey of Routing Techniques for Mobile Collaborative Virtual Environment Applications
Anis Zarrad
Download Full-Text
Managing Buffer Cache by Block Access Pattern
Reetu Gupta and Urmila Shrawankar
Download Full-Text
Reducing the Complexity of Embedding by Applying the Reed Muller Codes
Houda Jouhari and
Download Full-Text
Facial Expression Recognition based on Affine Moment Invariants
Renuka R. Londhe and Vrushsen P. Pawar
Download Full-Text
Cache Based Query Optimization Approach in Distributed Database
Mantu Kumar, Neera Batra and Hemant Aggarwal
Download Full-Text
Study of the Nonlinear Physicals Systems by Optimal Derivative Applications
Lassouani Fatiha, Benouaz Tayeb, Chikhaoui Abdelhak and Bekkouche Sidi Mohamed Amine
Download Full-Text
Ranking Web Pages Based On Searching, Keywords and Incoming Links
S. M. Khalid Jamal and Babar
Download Full-Text
A self-configuration model for execution management in Grid computing
Mohamad Fadaeian and Mehdi N.Fesharaki
Download Full-Text
An Adaptive Algorithm for Dynamic Priority Based Virtual Machine Scheduling in Cloud
Subramanian S, Nitish Krishna G, Kiran Kumar M, Sreesh P and Karpagam G R
Download Full-Text
Prediction based Link Stability Scheme for Mobile Ad Hoc Networks
Geetha Nair and N.J.R.Muniraj
Download Full-Text
Advanced Methods for Localized Content Based Image Retrieval
Radhey Shyam and Pooja Srivastava
Download Full-Text
Methods of Identifying and Preventing SQL Attacks
Bojken Shehu, Aleksander Xhuvani and Shqiponja Ahmetaj
Download Full-Text
Precedence Based Preemption and Bandwidth Reservation Scheme in MANET
Sourabh Singh Verma, and
Download Full-Text
Intelligent Arrhythmia Diagnostics System
Dipti D. Patil, Vijay M. Wadhai, Dhanashri Patil, Trupti Mohol, Sharlin P. and Ruta Dhekane
Download Full-Text
RFID to enhance visibility in a Closed loop Supply chain: Case of Cylinders Management in a Moroccan LPG distribution chain
Abdelkhalek Nakabi, Zitouni Beidouri and Bouksour Otmane
Download Full-Text
A Robust Method for Solving Transcendental Equations
Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan
Download Full-Text
Prioritizing Test Cases in Regression Testing using Fault Based Analysis
Ashima Singh
Download Full-Text
A Study on Fractal Image Compression using Soft Computing Techniques
D.Sophin Seeli and Dr.M.K.Jeyakumar
Download Full-Text
Delay-aware Load Balanced Routing Protocol for IEEE 802.16 Wireless Mesh Networks
Sanjeev Jain, Vijay Shanker Tripathi and Sudarshan Tiwari
Download Full-Text
Research on Education and Computer Management Applications Based on Topology
Wang Yuanzhi and Ge Wengeng
Download Full-Text
The effect of using a thesaurus in Arabic information retrieval system
Mohammad Wedyan, Basim Alhadidi and Adnan Alrabea
Download Full-Text
Techniques, Applications and Challenging Issue in Text Mining
Shaidah Jusoh and Hejab M. Alfawareh
Download Full-Text
Information Entropy-based Ant Clustering Algorithm
Zhang Yi, Zhao Weili and Zhang Zhiguo
Download Full-Text
Robust Detection of copy move forgeries for scanned documents using multiple methods
Anirudh Srivijaya Prabhu, Zil Shah and Manan Shah
Download Full-Text
Adaptive Robust Control Free-Floating Space Robotic Manipulators based on RBF Neural Network
Hu Xiaoping, Zhang Wenhui and Ji Xiaoming
Download Full-Text
A study on the oil spill information extraction method based on MODIS remote sensing images
Yang Hong, Chen Jian, Ding Jun, Dai Guixiang and Zhao Ying
Download Full-Text
A Scientific Approach for Generation of Random Field for Image Enhancement and Reconstruction
B. R. S. Reddy and I.Ramesh Babu
Download Full-Text
Analysis of Rheumatoid Arthritis through Image Processing
Arpita Mittal and Sanjay Kumar Dubey
Download Full-Text
Improved grey derivative of grey Verhulst model and its application
Yi-Zhang
Download Full-Text
Cardiac health status implementation on mobile phone
Prasad Pomaji, Tejashree Chhajed, Abhinav Sharma and Bhagyshri Samanta
Download Full-Text
A New Revised DNA Cramp Tool Based Approach of Chopping DNA Repetitive and Non-Repetitive Genome Sequences
V.Hari Prasad and P.V. Kumar
Download Full-Text
An Anonymous Authenticated Protocol Based on Zero Knowledge Proof
Chao Jing
Download Full-Text
Data Glove For Note Taking
Akshay Mahajan, Aniruddha Bajaj, Ganesh Gore and Jayati Ambekar
Download Full-Text
Combating Anti-forensics of Jpeg Compression
Zhenxing Qian and Xinpeng Zhang
Download Full-Text
A Novel Method for Rice Production Forecasting Using Fuzzy Time Series
Sachin Kumar and Narendra Kumar
Download Full-Text
Study of Contemporary Digital Watermarking Techniques
Rama Seshagiri Rao Channapragada, Anil Srimanth Mantha and Munaga V.N.K. Prasad
Download Full-Text
The improvement of Live Migration in Data Center in different virtual environment
Julian Fejzaj, Igli Tafa and Elinda Kajo
Download Full-Text
A Flexible Scheme of Self Recovery for Digital Image Protection
Zhenxing Qian and Lili Zhao
Download Full-Text
A Novel Approach for Information Content Retrieval and Analysis of Bio-Images using Datamining techniques
Ayyagari Sri Nagesh, G.P.Saradhi Varma and A.Govardhan
Download Full-Text
Estimating Sectoral Pullution Load in Lagos, Nigeria using Data Mining Techniques
Adesesan. B Adeyemo, Adebola A Oketola, Emmanuel O. Adetula and O Osibanjo
Download Full-Text
Dual Image Watermarking Algorithm Based on Block Truncation Code
Minghui Shi and Bailiang Li
Download Full-Text
A Review on Classifiers used in Face Recognition Methods Under Pose and Illumination Variation
R.Rajalakshmi and M.K.Jeyakumar
Download Full-Text
The System of Water-Saving Irrigation based on WSN and MSIF
Zhao Li-Ming, Liu He-Ping and Zhang Bing
Download Full-Text
Energy Efficient Routing for Multi-hop Underwater Acoustic Networks
Chen Wang, Yanjun Fang and Zhengmin Kong
Download Full-Text
Parallelization Research of Circle Detection Based on Hough Transform
Suping Wu and Xiangjiao Liu
Download Full-Text
A Novel Method for Parallel Switching Power with Different Capacity
Zhu Jun-jie, Su Mei, Yang Long and Shen Jing
Download Full-Text
Based On Edge Extraction of ASM Automatic Landmark Placement
Zhang Liguo, Li Xiaolin and Li Huijuan
Download Full-Text
Gas Monitoring System Based on ZigBee Pro and a New Method for Safety Grade Evaluation
Shutao Wang, Meimei Li, Quanmin Zhu, Minghua Liu and Hongjin Li
Download Full-Text
Marginal Distribution in Copula Estimation of Distribution Algorithm Based Dynamic K-S test
Zhao Hui and Wang Lifang
Download Full-Text
The Research on University Library Services Based on Information Technology Environment
He Ping
Download Full-Text
IJCSI Volume 9, Issue 6, No 1, November 2012
Download Full-Text
IJCSI Volume 9, Issue 6, No 2, November 2012
Download Full-Text
IJCSI Volume 9, Issue 6, No 3, November 2012
Download Full-Text