Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "IJCSI"

ADD TO MY LIST
 
Secure Authentication using Anti-Screenshot Virtual Keyboard

Author(s): Ankit Parekh | Ajinkya Pawar | Pratik Munot | Piyush Mantri
X-ray view on a Class using Conceptual Analysis in Java Environment

Author(s): Gulshan Kumar | Mritunjay Kumar Rai
A fast multi-class SVM learning method for huge databases

Author(s): Djeffal Abdelhamid | Taleb-Ahmed Abdelmalik
Fast FPGA Implementation of EBCOT block in JPEG2000 Standard

Author(s): Anass Mansouri | Ali Ahaitouf | Farid Abdi
Reliable Communication in Wireless Body Area Sensor Network for Health Monitoring

Author(s): Saeid Bahanfar | Ladan Darougaran | Helia Kousha | Shahram Babaie
An Efficient I-MINE Algorithm for Materialized Views in a data Warehouse Environment

Author(s): T.Nalini | Dr. A. Kumaravel | Dr.K.Rangarajan
A Review of Clustering Techniques Based on Machine learning Approach in Intrusion Detection Systems

Author(s): Ala' Yaseen Ibrahim Shakhatreh | Kamalrulnizam Abu Bakar
Secure Geographic Routing Protocols: Issues and Approaches

Author(s): Mehdi sookhak | Ramin Karimi | NorafidaIthnin | Mahboobeh Haghparast | Ismail FauziISnin
Design of a new model of miniature antenna quasi-isotropic coverage

Author(s): Abdellatif Berkat | Noureddine Boukli-Hacene | F. Tarik Bendimerad
A Study on Cyber Crimes and protection

Author(s): Loganathan M | Dr.E.Kirubakaran
SWOT Analysis of Software Development Process Models

Author(s): Ashish B. Sasankar | Dr. Vinay Chavan
Object-Oriented Software Methodologies: Roadmap to the Future

Author(s): Usman Ali Khan | Dr. Ibrahim A. Al-Bedewi | Kunal Gupta
Corporate Customers Usage of Internet Banking in East Africa

Author(s): Nelson Jagero | Silvance O. Abeka
Dynamic unlicensed bands access based on the decentralized resource distribution approach

Author(s): Souleymane Oumtanaga | Zamble Raoul | Michel Babri
An Alternative Process Documentation for Data Warehouse Projects

Author(s): Jyothi Prasad K S S | G Hima Bindu | G Lakshmeeswari
Analysis and Improvement of DSDV Protocol

Author(s): Nayan Ranjan Paul | Laxminath Tripathy | Pradipta Kumar Mishra
Fuzzy Kernel and Fuzzy Subsemiautomata with Thresholds

Author(s): M. Basheer Ahamed | J. Michael Anna Spinneli
Classification of Load Balancing Conditions for parallel and distributed systems

Author(s): Mohammad Zubair Khan | R. Singh | J. Alam | S. Saxena
Power Optimization in Wireless Sensor Networks

Author(s): Debmalya Bhattacharya | R. Krishnamoorthy
A study for Issues of the Location ManagementIn Mobile Networks

Author(s): Sami M. Halawani | Dr. Ab Rahman bin Ahmad | M. Z. Khan
ZigBee Based Electric Meter Reading System

Author(s): S. Arun | R. Krishnamoorthy | Dr. VenuGopala Rao.M
Comparative Performance Analysis Of Different Radio Channel Modelling For Bluetooth Localization System

Author(s): Idigo Victor | Okezie C.C | Akpado Kenneth | Ohaneme C.O
High Throughput and Low Power NoC

Author(s): Magdy A. El-Moursy | Mohamed Abdelgany
Adverse Conditions and ASR Techniques for Robust Speech User Interface

Author(s): Urmila Shrawankar | Dr. Vilas Thakare
Data Visualization Technique Framework for Intrusion detection

Author(s): Alaa El - Din Riad | Ibrahim Elhenawy | Ahmed Hassan | Nancy Awadallah
Generation of Random Fields for Image Enhancement and Reconstruction

Author(s): B.Srinivasa Rao | K.Srinivas | Dr.LSS Reddy
Query Optimization Using Genetic Algorithms in the Vector SpaceModel

Author(s): Eman Al Mashagba | Feras Al Mashagba | Mohammad Othman Nassar
Cluster Based Hybrid Niche Mimetic and Genetic Algorithm for Text Document Categorization

Author(s): A. K. Santra | C. Josephine Christy | B. Nagarajan
Modeling Component-based Bragg gratings Application: tunable lasers

Author(s): Hedara Rachida | Mohammed Chikh-Bled
Weighted Bit Rate Allocation in JPEG2000 Tile Encoding

Author(s): Singara Singh | R. K. Sharma | M. K. Sharma
A Routing Algorithm based on Cellular Automata for Mobile Ad-hoc Networks

Author(s): Azadeh Ghalavand | Ahmad khademzadeh | Arash Dana | Golnoosh Ghalavand
WiBro Mobility Simulation Model

Author(s): Junaid Qayyum | Shahid Latif | Faheem Khan | Muhammad LaL | Shahzad Hameed | Asad Malook
Research on effective factors on Verification Results in Software Systems

Author(s): Alireza Souri | Mohammad ali Sharifloo | Monire Norouzi
Implementing and Managing framework for PaaS in Cloud Computing

Author(s): Junaid Qayyum | Faheem Khan | Muhammad LaL | Fayyaz Gul | Muhammad Sohaib | Fahad Masood
Development of MIL-STD-1553B Synthesizable IP Core for Avionic Applications

Author(s): Enumala Srikrishna | P.H.S.T.Murthy | L.MadanMohan
Multimedia-based Medicinal Plants Sustainability Management System

Author(s): Zacchaeus Omogbadegun | Charles Uwadia | Charles Ayo | Victor Mbarika | Nicholas Omoregbe | Efe Otofia | Frank Chieze
A framework for dynamic indexing from hidden web

Author(s): Hasan Mahmud | Moumie Soulemane | Mohammad Rafiuzzaman
Rise of Data Mining: Current and Future Application Areas

Author(s): Dharminder Kumar | Deepak Bhardwaj
Energy Efficient Clustering Algorithms in Wireless Sensor Networks: A Survey

Author(s): Vinay Kumar | Sanjeev Jain | Sudarshan Tiwari
Modelling An Enhanced Routing Protocol For Wireless Sensor Networks Using Implicit Clustering Technique

Author(s): Idigo Victor | Azubogu A.C.O | Oguejiofor Obinna samuel | Nnebe Scholar
Genetic programming approach on evaporation losses and its effect on climate change for Vaipar Basin

Author(s): K.S.Kasiviswanathan | R. Soundhara Raja Pandian | S.Saravanan | Avinash Agarwal
Filtration Of Artifacts In ECG Signal Using Rectangular Window-Based Digital Filters

Author(s): Mbachu C.B | Idigo Victor | Ifeagwu Emmanuel | Nsionu I. I
Improved Exemplar Based Texture Synthesis Method for Natural Scene Image Completion

Author(s): K. Sangeetha | Dr. P. Sengottuvelan | E. Balamurugan
Study of Performance of the combined MIM0 MMSE VBLAST-OFDM for Wi-Fi (802.11n)

Author(s): Souhila Ferouani | G. Abdellaoui | F. Debbat | F. T. Bendimerad
Neural networks for error detection and data aggregation in wireless sensor network

Author(s): Saeid Bahanfar | Helia Kousha | Ladan Darougaran
Performance of MIMO VBLAST-OFDM in Ka-Band

Author(s): Souhila Ferouani | G. Abdellaoui | F. Debbat | F. T. Bendimerad
Automatic image clustering using a swarm intelligence approach

Author(s): Ouadfel Salima | Batouche Mohamed | Abdlemalik Ahmed-Taleb
A Cryptographic Algorithm based onBilinear Transformation

Author(s): Phani krishna kishore M | Venugopal IVS
Encrypted IT Auditing and Log Management on Cloud Computing

Author(s): Rajiv R Bhandari | Nitin Mishra
Low Power NoC Switch using Novel Adaptive Virtual Channels

Author(s): Rabab Ezz-Eldin | Magdy A. El-Moursy | Amr M. Refaat
Emotion Recognition using Dynamic Time Warping Technique for Isolated Words

Author(s): N. Murali Krishna | P.V. Lakshmi | Y. Srinivas | J. Sirisha Devi
A New Routing Algorithm for a Three-Stage Clos Interconnection Networks

Author(s): Zahra sadat Ghandriz | Esmaeil Zeinali Khasraghi
Image Mining for Mammogram Classification by Association Rule Using Statistical and GLCM features

Author(s): Aswini Kumar Mohanty | Sukanta Kumar Swain | Pratap Kumar Champati | Saroj Kumar Lenka
Development Strategy using Cognitive Domain in e-Requirement Engineering Learning System

Author(s): Nor Azliana Akmal Jamaludin | Shamsul Sahibuddin
Study of the Master-Slave replication in a distributed database

Author(s): Kalonji Kalala Hercule | Mbuyi Mukendi Eugene | Boale Bomolo Paulin | Lilongo Bokaletumba Joel
Survey on Power Optimization for Disk Based Systems

Author(s): G. Ravikumar | Dr.N. Nagarajan
Automatic Keywords Extraction for Punjabi Language

Author(s): Vishal Gupta | Gurpreet Singh Lehal
Bandwidth Estimation For Mobile Ad hoc Network (MANET)

Author(s): Rabia Ali | Dr. Fareeha Zafar
Autonomic Management for Multi-agent Systems

Author(s): Nadir kamal Salih | G. K. Viju | Abdelmotalib A.Mohamed
Performance Enhancement of a Dynamic System Using PID Controller Tuning Formulae

Author(s): Jyotiprakash Patra | Dr.Partha Sarathi Khuntia
A Fuzzy Neural Clustering approach for Fingerprint Recognition

Author(s): Mahendra Kondekar | Uday Kulkarni | Santosh Chowhan
Using Bee Colony Optimization to Solve the Task Scheduling Problem in Homogenous Systems

Author(s): Vahid Arabnejad | Ali Moeini | Nasrollah Moghadam
Analysis of Stemming Algorithm for Text Clustering

Author(s): N.Sandhya | Y.Srilalitha | V.Sowmya | Dr.K.Anuradha | Dr.A.Govardhan
Image Transference and Retrieval over SMS

Author(s): Muhammad Fahad Khan | Saira Beg | Fakhra Kashif
Process of Reverse Engineering of Enterprise Information System Architecture

Author(s): Mohammed Abdul Bari | Shahanawaj Ahamad
Dynamic Reputation Based Trust Management Using Neural Network Approach

Author(s): Reza Azmi | Mahdieh Hakimi | Zahra Bahmani
High Capacity and Resistance to Additive Noise Audio Steganography Algorithm

Author(s): Haider Ismael Shahadi | Razali Bin Jidin
Medicinal Plants Database and Three Dimensional Structure of the Chemical Compounds from Medicinal Plants in Indonesia

Author(s): Arry Yanuar | Abdul Mun'im | Akma Bertha Aprima Lagho | Rezi Riadhi Syahdi | Marjuqi Rahmat | Heru Suhartanto
A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions

Author(s): Javad Alizadeh | Abdolrasoul Mirghadri
Efficient Online Tutoring Using Web Services

Author(s): Mr.M.Balakrishnan | Dr.K.Duraiswamy
Image Independent Filter for Removal of Speckle Noise

Author(s): K. Bala Prakash | R.Venu Babu | B.VenuGopal
Simulation of Thermal Comfort of a Residential House

Author(s): Masine Md. Tap | Haslinda Mohamed Kamar | Abdul Kadir Marsono | Nazri Kamsah | Khairul Amry Mohd Salimin
Evaluation Of Scheduling And Load Balancing Techniques In Mobile Grid Architecture

Author(s): Debabrata Singh | Sandeep Nanda | Sarbeswara Hota | Manas Kumar Nanda
Optimized Fuzzy Logic Based Segmentation for Abnormal MRI Brain Images Analysis

Author(s): Indah Soesanti | Thomas Sri Widodo | Maesadji Tjokronagoro
Intelligent Scheduling in Health Care Domain

Author(s): Srividya Bhat | Ravi S Malashetty | Nandini S Sidnal
Modify LEACH Algorithm for Wireless Sensor Network

Author(s): Mortaza | Mohammad Ali
Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking

Author(s): Abduljabbar Shaamala | Shahidan M. Abdullah | Azizah A. Manaf
The Descriptive Study of Knowledge Discovery from Web Usage Mining

Author(s): Yogish H K | Dr. G T Raju | Manjunath T N
Improved Free-Form Database Query Language for Mobile Phones

Author(s): Shiramshetty Gouthami | Pulluri Srinivas Rao | Jayadev Gyani
Architectural Model of Localization in Multi-Scale Communication for Wireless Sensor Networks

Author(s): S Swapna Kumar | Dr M. Nanda Kumar | Dr V.S Sheeba
FinFET Architecture Analysis and Fabrication Mechanism

Author(s): Sarman K Hadia | , Rohit R. Patel | Dr. Yogesh P. Kosta
Indication of Efficient Technique for Detection of Check Bits in Hamming Code

Author(s): Rahat Ullah | Jahangir Khan | Shahid Latif | Inayat Ullah
Affiliate Program      Why do you need a reservation system?