Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "IJCSIS"

Optimizing the Application-Layer DDoS Attacks for Networks

Author(s): P. Niranjan Reddy | K. Praveen Kumar | M. Preethi
Expert-Aware Approach: An Innovative Approach To Improve Network Data Visualization

Author(s): Doris Hooi-Ten Wong | Kok-Soon Chai | Sureswaran Ramadass | Nicolas Vavasseur
Intrusion Detection using Multi-Stage Neural Network

Author(s): Sahar Selim | Mohamed Hashem | Taymoor M. Nazmy
Classifying Maintenance Request in Bug Tracking System

Author(s): Naghmeh Mahmoodian | Rusli Abdullah | Masrah Azrifah Azim Murad
Secured Communication through Hybrid Crypto-Steganography

Author(s): A. Joseph Raphael | V.Sundaram
Reliable Routing With Optimized Power Routing For Wireless Adhoc Network

Author(s): T.K.Shaik Shavali | Dr T. Bhaskara Reddy | Sk fairooz
High Performance Fingerprint Identification System

Author(s): Dr. R. Seshadri | Yaswanth Kumar.Avulapati
Chunk Sort

Author(s): Syed Zaki Hassan Kazmi | Syeda Shehla Kazmi | Syeda Sobia Hassan Kazmi | Syed Raza Hussain Bukhari
Matching SHIQ Ontologies

Author(s): B.O. Akinkunmi | A.O. Osofisan | A.F. Donfack Kana
Wavelength Requirements for a Scalable Single-hop WDM Optical Network

Author(s): Rabi W. Yousif, | Borhanuddin Mohd Ali, | Mohd Khazani Abdullah, | Kamaruzzaman Bin Seman, | Mohd Dani Baba,
PC 2 Phone Event Announcer

Author(s): Behrang Parhizkar | Abdulbasit Mohammad Abdulrahman Alazizi | Mohammad Nabil Sadegh Ali | Anand Ramachandran | Sujata Navaratnam
Fingerprint Image Enhancement using Successive Mean Quantization Transform

Author(s): R. Seshadri | Yaswanth Kumar Avulapati
An Improvement of Link Failure Maintenance in Ad-Hoc Wireless Network on AODV Protocol

Author(s): Sayid Mohamed Abdule | Suhaidi Hassan | Mohammed M. Kadhum
Clinical Data Warehouse on Insect Vector Diseases to Human of Andhra Pradesh

Author(s): Dr.M. Usha Rani | M.Kalpana Devi | D.M. Mamatha | R.Seshadri | Yaswanth Kumar.Avulapti
Quality of Service Issues in Wireless Ad Hoc Network (IEEE 802.11b)

Author(s): Mohammed Ali Hussain | Mohammed Mastan | Syed Umar
Fuzzy Logic in a Low Speed Cruise-Controlled Automobile

Author(s): Mary Lourde R. | Waris Sami Misbah
Plant Classification Based on Leaf Recognition

Author(s): Abdolvahab Ehsanirad
Media Streaming using Multiple Description Coding in Overlay Networks

Author(s): Sachin Yadav | Ranjeeta Yadav | Shailendra Mishra
Survey on Fuzzy Clustering and Rule Mining

Author(s): D. Vanisri | Dr. C. Loganathan
Performance Analysis of Estimation of Distribution Algorithm and Genetic Algorithm in Zone Routing Protocol

Author(s): Mst. Farhana Rahman | S. M. Masud Karim | Kazi Shah Nawaz Ripon | Md. Iqbal Hossain Suvo
Feasibility Analysis of using Cannon Method to Perform Block Rhotrix Multiplication

Author(s): Abdullahi M. | Ezugwu El-Shamir Absalom | Ahmed B. I. | Tukur S. M.
A Novel Approach for Cardiac Disease Prediction and Classification Using Intelligent Agents

Author(s): Murugesan Kuttikrishnan | Manjula Dhanabalachandran
Haploid vs Diploid Genome in Genetic Algorithms for TSP

Author(s): Rakesh Kumar | Jyotishree
Survey – New Routing Technique for Grid Computing

Author(s): R. Rameshkumar | A. Damodaram
A Forager Bees Behaviour Inspired approach to predict the forthcoming navigation pattern of online users

Author(s): V. Mohanraj | R. Lakshmipathi | J Senthilkumar | Y. Suresh
Similarity Based Imputation Method For Time Variant Data

Author(s): F. Sagayaraj Francis | Saranya Kumari Potluri | Vinolin Deborah Delphin | Vishnupriya. B
Efficient Node Search in P2P Using Distributed Spanning Tree

Author(s): P. Victer Paul | T.Vengattaraman | M.S. Saleem Basha | P. Dhavachelvan | R. Baskaran
A new Peer to Peer Caching Techniques for Transmission The Video over Wireless Ad Hoc Network

Author(s): Saleh Ali K. Al-Omari | Putra Sumari | Mohammad Azmi Q. Al-Madi
Finding near optimal solution for Graph Coloring Problem using Parallel Genetic Algorithm

Author(s): Fardin Esmaeeli Sangari | Seyed Mostafa Mansourfar | Ali Hosseinalipour
New method for increase reliability in WSNs

Author(s): Saeid Aga alizadeh | Shahram Babaie | Ahmad Khadem Zade | Ali Hosseinalipour
Performance Counter Monitoring Mechanism for Measuring QoS Attributes in SOA

Author(s): Bahareh Sadat Arab | Abdul Azim Abd Ghani | Rodziah Binti Atan
Effective Packet Management Scheme in Wireless Ad-Hoc Networks using Distributed Spanning Tree

Author(s): J. Amudhavel | M.S.Saleem Basha | T. Vengattaraman | P. Dhavachelvan | R. Baskaran
MVDR an Optimum Beamformer for a Smart Antenna System in CDMA Environment

Author(s): M Yasin | Pervez Akhtar | M Junaid Khan
ISOR: Intelligent Secure On-Demand Routing Protocol

Author(s): Moitreyee Dasgupta | Gaurav Sandhu | Usha Banerjee
Secured and QoS based multicast routing in MANETs

Author(s): Maya Mohan | S.Mary Saira Bhanu
Multiple Values Bidirectional Square Root Search

Author(s): Syed Zaki Hassan Kazmi | Syeda Shehla Kazmi | Jamil Ahmad | Syeda Sobia Hassan Kazmi
Survey on Text Document Clustering

Author(s): M.Thangamani | Dr.P.Thangaraj
An Agent Based Approach for End-to-End QoS Guarantees in Multimedia IP networks

Author(s): A. Veerabhadra Reddy | Dr. D. Sreenivasa Rao
A Novel approach of Data Hiding Using Pixel Mapping Method (PMM)

Author(s): Souvik Bhattacharyya | Lalan Kumar | Gautam Sanyal
Parallel Genetic Algorithm System

Author(s): Nagaraju Sangepu | K.Vikram
Image Retrieval with Texture Features Extracted using Kekre’s Median Codebook Generation of Vector Quantization

Author(s): H.B.Kekre | Sudeep D. Thepade | Tanuja K. Sarode | Vaishali Suryavanshi
An Efficient Trust Establishment Framework for MANETs

Author(s): Mohammad Karami | Mohammad Fathian
A Compressed Video Steganography using Random Embedding Scheme

Author(s): Sherly A P | Sapna Sasidharan | Amritha P P
Selective Image Encryption Using DCT with Stream Cipher

Author(s): Sapna Sasidharan | Jithin R
Securing Web Communication with Quantum Cryptography

Author(s): R.K.Pateriya | R.K. Baghel | Anupriya Gupta
A Robust -knowledge guided fusion of clustering Ensembles

Author(s): Anandhi R J | Natarajan Subramaniyan
Overclocked Load Scheduling in Large Clustered Reservation Systems

Author(s): Tania Taami | Amir Masoud Rahmani | Ahmad Khademzade | Ismail Ataie
LDCP+: An Optimal Algorithm for Static Task Scheduling in Grid Systems

Author(s): Negin Rzavi | Safieh Siadat | Amir Masoud Rahmani
Comparison Of Neural Network And Multivariate Discriminant Analysis In Selecting New Cowpea Variety

Author(s): Adewole, Adetunji Philip | Sofoluwe, A. B. | Agwuegbo , Samuel Obi-Nnamdi
Blind Multiuser Detection in SDMA-aided MIMO OFDM Systems by FastICA Algorithm

Author(s): Yu Du | Kang Yen | Yechang Fang | Nansong Wu
Quality of Service Enhanced Routing in Mobile Ad Hoc Networks

Author(s): D.S. Thenmozhi | R. Lakshmipathi
A Review on Ontology-Driven Query-Centric Approach for INDUS Framework

Author(s): L. Senthilvadivu | Dr. K. Duraiswamy
Conversion of English Text to Braille Code vibration signal for Visually Impaired People

Author(s): M. Rajasenathipathi | M. Arthanari | M. Sivakumar
Study Of Multimedia Watermarking Techniques

Author(s): Chhaya S. Gosavi | C. S. Warnekar
A Scenario-Based Mobile Application for Robot-Assisted Smart Digital Homes

Author(s): Ali Reza Manashty | Amir Rajabzadeh | Zahra Forootan Jahromi
Predicting Students' Academic Performance Using Artificial Neural Networks: A Case Study

Author(s): Ghaleb A. El-Refae | Qeethara Kadhim Al-Shayea
Vast Educational Mobile Content Broadcasting using ARMrayan Multimedia Mobile CMS

Author(s): Somayeh Fatahi | Ali Reza Manashty | Zahra Forootan Jahromi
Density Based Clustering Algorithm using Sparse Memory Mapped File

Author(s): J. Hencil Peter | A. Antonysamy
Mapping Cloud Computing onto Useful e-Governance

Author(s): Ajay Prasad | Sandeep Chaurasia | Arjun Singh | Deepak Gour
Honey-Bee Mating based Bound Time Approach for Energy minimization in Wireless Sensor Networks

Author(s): J Senthilkumar | R. Lakshmipathi | V. Mohanraj | Y. Suresh
Convergence Time Evaluation of AODV and AODV+G in MANETs

Author(s): Annapurna P Patil | Harish. R
Development of an Expert System for Diagnosis and appropriate Medical Prescription of Heart Disease Using SVM and RBF

Author(s): Shaikh Abdul Hannan | V. D. Bhagile | R. R. Manza | R. J. Ramteke
Steganalysis of Reversible Vertical Horizontal Data Hiding Technique

Author(s): Thom Ho Thi Huong | Canh Ho Van | Tien Trinh Nhat
Automating the fault tolerance process in Grid Environment

Author(s): Inderpreet Chopra | Maninder Singh
A Computational Model for Bharata Natyam Choreography

Author(s): Sangeeta Jadhav | Sasikumar
Media changing the Youth Culture: An Indian Perspective

Author(s): Dr. Ritu Soni | Bharati Kamboj
A Dynamic Approach To Defend Against Anonymous DDoS Flooding Attacks

Author(s): R. Anurekha | K. Duraiswamy | A.Viswanathan | V. P. Arunachalam | A. Rajiv Kannan | K. Ganesh Kumar
Multidimensionality in Agile Software Development

Author(s): Ashima | Himanshu Aggarwal
Localization Accuracy Improved Methods Based on Adaptive Weighted Centroid Localization Algorithm in Wireless Sensor Networks

Author(s): Chang-Woo Song | Jun-Ling Ma | Jung-Hyun Lee | Kyung-Yong Chung | Kee-Wook Rim
Design of Novel Usability Driven Software Process Model

Author(s): Hina Gull | Farooque Azam | Sardar Zafar Iqbal
Performance Comparison Of Multicast Routing Protocols In Ad-Hoc Wireless Networks

Author(s): N. Veena | A. VinayaBabu | K. Madhukar | B. Sujatha | B. Anandkumar | S. Nagaprasad
An Interactive Visualization Methodology For Association Rules

Author(s): Mohammad Kamran | S. Qamar Abbas | Mohammad Rizwan Baig
An Empirical Study of Software Project Management among Some Selected Software Houses in Nigeria

Author(s): Olalekan Akinola | Funmilayo Ajao | Opeoluwa B. Akinkunmi
Bayesian Spam Filtering using Statistical Data Compression

Author(s): V. Sudhakar | CPVNJ.Mohan Rao | Satya Pavan Kumar Somayajula
Lossless Image Compression for Transmitting Over Low Bandwidth Line

Author(s): G. Murugan | E. Kannan | S. Arun
Advanced Routing Technology For Fast Internet Protocol Network Recovery

Author(s): S. Rajan | Althaf Hussain H.B. | K. Jagannath | G. Surendar Reddy | K.N.Dharanidhar
An Improvement Study Report of Face Detection Techniques using Adaboost and SVM

Author(s): Rajeev Kumar Singh | Alka Gulati | Anubhav Sharma | Harsh Vazirani
Risk Assessment of Authentication Protocol: Kerberos

Author(s): Pathan Mohd. Shafi | Abdul sattar | P. chenna Reddy
The History of Web Application Security Risks

Author(s): Fahad Alanazi | Mohamed Sarrab
A Hierarchical Overlay Design for Peer to Peer and SIP Integration

Author(s): Md. Safiqul Islam | Syed Ashiqur Rahman | Rezwan Ahmed | Mahmudul Hasan
Mobile Phone Augmented Reality Business Card

Author(s): Edmund Ng Giap Weng | Behrang Parhizkar | Teo Tzong Ren | Arash Habibi Lashkari
Augmented Reality For Museum Artifacts Visualization

Author(s): Edmund Ng Giap Weng | Behrang Parhizkar | Lina Chai Hsiao Ping | Arash Habibi Lashkari
Extended RR-scheduling algorithm

Author(s): Sunita Chand | Teshu Chaudhary | Manoj Kumar
Strategic Approach for Automatic Text Summarization

Author(s): Ramesh Vaishya | Surya Prakash Tripathi
Save time & money - Smart Internet Solutions      Why do you need a reservation system?