Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science & Information Technology

ISSN: 0975--4660
Publisher: Academy & Industry Research Collaboration Center (AIRCC)


ADD TO MY LIST
 
Improved Spatial Gray Level Dependence Matrices for Texture Analysis PDF available

Author(s): Olfa Ben Sassi | Lamia sellami | Mohamed Ben Slima | Khalil Chtourou | Ahmed Ben Hamida
Volume: 4
Issue: 6
Year: 2013
Shaping of Location Conscious Information PDF available

Author(s): Palson Kennedy .R | Rajashekhara
Volume: 4
Issue: 6
Year: 2013
Denoising of Medical Ultrasound Images Using Spatial Filtering and Multiscale Transforms PDF available

Author(s): V N Prudhvi Raj | T Venkateswarlu
Volume: 4
Issue: 6
Year: 2013
R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2) PDF available

Author(s): Dhananjoy Dey | Noopur Shrotriya | Indranath Sengupta
Volume: 4
Issue: 6
Year: 2013
Computing Installation Parameters Of CCTV Cameras for Traffic Surveillance PDF available

Author(s): Pratishtha Gupta | G. N. Purohit
Volume: 4
Issue: 6
Year: 2013
Ear Recognition and Occlusion PDF available

Author(s): B. S. El-Desoky | M. Z. Rashad | Mahmoud M. Eid | M. El-Kady | Alaa Tharwat
Volume: 4
Issue: 6
Year: 2013
Multi-Homing Enabled Cognitive Radio Based Inter-Vehicle Communication System PDF available

Author(s): Faisal Riaz | Kaleem Ahmed | Iftikhar Ahmad | Muhammad Ibrahim | Samreen Ayaz | Rabia Rauf | Muhammad Kabeer | Naheed Akhtar | Jameel Ahmed | Sadat Dar
Volume: 4
Issue: 6
Year: 2013
An Efficient Passage Ranking Technique For a QA System PDF available

Author(s): Pooja A | Vinodh Krishnan | Geetha Manjunath
Volume: 4
Issue: 6
Year: 2013
A Novel and Single Chip Tri-Band Low-Noise Amplifier for Wlan, Wifi and Wimax Receivers PDF available

Author(s): I. Akhchaf | S. Khoulji | M. Essaidi | M.L. Kerkeb
Volume: 4
Issue: 6
Year: 2013
Design of Physical Games for Learning the Lotus Effect PDF available

Author(s): Wernhuar Tarng | Shih-Hsien Tsai | Chih Ming Lin | Chi-Young Lee | Hsin-Hun Liou
Volume: 4
Issue: 6
Year: 2013
Rotation Invariant Color Retrieval PDF available

Author(s): Swapna Borde | Udhav Bhosle
Volume: 4
Issue: 6
Year: 2013
An Information System to Support and Monitor Clinical Trial Process PDF available

Author(s): Daniela Luzi | Fabrizio Pecoraro
Volume: 4
Issue: 6
Year: 2013
Accessibility of Information Technologies in the Resting Home PDF available

Author(s): Ozlem Cakır
Volume: 4
Issue: 6
Year: 2013
OPTIMAL FUZZY MODEL CONSTRUCTION WITH STATISTICAL INFORMATION USING GENETIC ALGORITHM PDF available

Author(s): Amjad Hossain | Pintu Chandra Shill | Bishnu Sarker | Kazuyuki Murase
Volume: 3
Issue: 6
Year: 2012
INTRODUCTION OF KNOWLEDGE MANAGEMENT ARCHITECTURE USING MULTI AGENT PDF available

Author(s): Sheikh Amanur Rahman | Anamika Bhardwaj | Mukul Pathak | Shobhit Singh Rathore
Volume: 3
Issue: 6
Year: 2012
MULTI-RESOLUTION ANALYSIS FOR MEDICAL IMAGE COMPRESSION PDF available

Author(s): Mohammed Alhanjouri
Volume: 3
Issue: 6
Year: 2012
Image Labeling and Segmentation using Hierarchical Conditional Random Field Model PDF available

Author(s): Manoj K.Vairalkar | Sonali.Nimbhorkar
Volume: 3
Issue: 6
Year: 2012
From Learning Style of Webpage Content to Learner’s Learning Style PDF available

Author(s): Mohamed.G. Darwesh | Magdy .Z. Rashad | Abdelaziz. K. Hamada
Volume: 3
Issue: 6
Year: 2012
AN IMPROVED NEURAL IMAGE COMPRESSION APPROACH WITH CLUSTER BASED PREPROCESSING PDF available

Author(s): Ashanta Ranjan Routray | Munesh Chandra Adhikary
Volume: 3
Issue: 6
Year: 2012
MOBILE GEOGRAPHIC INFORMATION SYSTEMS: A CASE STUDY ON MANSOURA UNIVERSITY, EGYPT PDF available

Author(s): Asmaa Ahmed Hussein | Elkhedr Hassan Eibrahim | Aziza Asem
Volume: 3
Issue: 6
Year: 2012
FLOODING ATTACKS TO INTERNET THREAT MONITORS (ITM): MODELING AND COUNTER MEASURES USING BOTNET AND HONEYPOTS PDF available

Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | M.Ganesh Karthik
Volume: 3
Issue: 6
Year: 2012
INVESTIGATING THE AWARENESS OF APPLYING THE IMPORTANT WEB APPLICATION DEVELOPMENT AND MEASUREMENT PRACTICES IN SMALL SOFTWARE FIRMS PDF available

Author(s): Faudziah Ahmad | Fauziah Baharom | Moath Husni
Volume: 3
Issue: 6
Year: 2012
ANALYSIS OF DIFFERENT PRIVACY PRESERVING CLOUD STORAGE FRAMEWORKS PDF available

Author(s): Rajeev Bedi | Mohit Marwaha | Tajinder Singh | Harwinder Singh | Amritpal Singh
Volume: 3
Issue: 6
Year: 2012
Integrated Environment for Developing E-Learning Lectures PDF available

Author(s): Vladimir Bondarev | Alexander Ossyka | Alexander Ossyka
Volume: 3
Issue: 6
Year: 2012
TECHNICAL ANALYSIS OF REMOTE 3D VISUALIZATION ON MOBILE DEVICES PDF available

Author(s): Ms. U. S. Junghare | Dr. V. M. Thakare | R. V. Dharaskar | S. S. Sherekar
Volume: 3
Issue: 6
Year: 2012
NETWORK INTRUSION DETECTION USING DATA MINING AND NETWORK BEHAVIOUR ANALYSIS PDF available

Author(s): Ahmed Youssef | Ahmed Emam
Volume: 3
Issue: 6
Year: 2012
Hybrid GPS-GSM Localization of Automobile Tracking System PDF available

Author(s): Mohammad A. Al-Khedher
Volume: 3
Issue: 6
Year: 2012
RECOGNIZING BANGLA GRAMMAR USING PREDICTIVE PARSER PDF available

Author(s): K. M. Azharul Hasan | Al-Mahmud | Amit Mondal | Amit Saha
Volume: 3
Issue: 6
Year: 2012
A COMPARATIVE STUDY TO FIND A SUITABLE METHOD FOR TEXT DOCUMENT CLUSTERING PDF available

Author(s): Mrs.S.C.Punitha | Dr.M.Punithavalli
Volume: 3
Issue: 6
Year: 2012
Adaptation AC to Improve Wireless Access Network Dependability PDF available

Author(s): Olfa BEN AHMED | Zied CHOUKAIR
Volume: 3
Issue: 6
Year: 2012
Recycling of Bandwidth in Metropolitan Area Networks(MAN) PDF available

Author(s): Bhargava Devana | Sudharshana Kristipati | Raghava Nirati
Volume: 3
Issue: 6
Year: 2012
FROM 3D MODEL DATA TO SEMANTICS PDF available

Author(s): My Abdellah Kassimi | Omar El beqqali
Volume: 3
Issue: 6
Year: 2012
Automatic Induction of Rule Based Text Categorization PDF available

Author(s): D.Maghesh Kumar
Volume: 2
Issue: 6
Year: 2010
Network Intrusion Detection System Based On Machine Learning Algorithms PDF available

Author(s): Vipin Das | Vijaya Pathak | Sattvik Sharma | Sreevathsan | MVVNS.Srikanth | Gireesh Kumar T
Volume: 2
Issue: 6
Year: 2010
Data Mining Algorithms And Medical Sciences PDF available

Author(s): Irshad Ullah
Volume: 2
Issue: 6
Year: 2010
Dynamic Scheduling of Skippable Periodic Tasks With Energy Efficiency In Weakly Hard Real-Time System PDF available

Author(s): Santhi Baskaran | P. Thambidurai
Volume: 2
Issue: 6
Year: 2010
Pattern Recognition Using Neural Networks PDF available

Author(s): Santaji Ghorpade | Jayshree Ghorpade | Shamla Mantri
Volume: 2
Issue: 6
Year: 2010
Security In Wireless Sensor Networks Using Key Management Schemes PDF available

Author(s): Soundarya.P | Varalakshmi .L.M
Volume: 2
Issue: 6
Year: 2010
Security Enhencement & Solution for Authentication Frame work in IEEE 802.16 PDF available

Author(s): A.K.M. Nazmus Sakib
Volume: 2
Issue: 6
Year: 2010
Use of Smart Antennas In Ad Hoc Networks PDF available

Author(s): Mohammed Ali Hussain | P.Suresh Varma | K. Satya Rajesh | Hussain Basha Pathan | Leela Madhav Sarraju
Volume: 2
Issue: 6
Year: 2010
Adaptive Block Pinning Based: Dynamic Cache Partitioning for Multi-core Architectures PDF available

Author(s): Nitin Chaturvedi | Jithin Thomas | S Gurunarayanan
Volume: 2
Issue: 6
Year: 2010
Segmentation And Object Recognition Using Edge Detection Techniques PDF available

Author(s): Y.Ramadevi | T.Sridevi | B.Poornima | B.Kalyani
Volume: 2
Issue: 6
Year: 2010
EDGE DETECTION TECHNIQUES FOR IMAGE SEGMENTATION PDF available

Author(s): Muthukrishnan.R | M.Radha
Volume: 3
Issue: 6
Year: 2012
A Novel Embedded Statistical Scheduler for Realising High System-QoS PDF available

Author(s): Suman Paul | A. K. Jana | M. K. Pandit
Volume: 2
Issue: 6
Year: 2010
Inheritance Metrics for Object-Oriented Design PDF available

Author(s): Kumar Rajnish | Arbind Kumar Choudhary | Anand Mohan Agrawal
Volume: 2
Issue: 6
Year: 2010
Manipulating Multistage Interconnection Networks Using Fundamental Arrangements PDF available

Author(s): E. Gur | Z. Zalevsky
Volume: 2
Issue: 6
Year: 2010
Efficient Scheduling ff Real-Time Parallel Applications on Clusters PDF available

Author(s): Abeer Hamdy | Reda Ammar | Ahmed E. Youssef
Volume: 4
Issue: 5
Year: 2012
Biometric Authentication Through a Virtual Keyboard for Smartphones PDF available

Author(s): Matthias Trojahn | Frank Ortmeier
Volume: 4
Issue: 5
Year: 2012
ASP-SSN: An Effective Approach for Linking Semantic Social Networks PDF available

Author(s): Sanaa Kaddoura | Islam Elkabani
Volume: 4
Issue: 5
Year: 2012
Design of an Efficient MAC Protocol for Opportunistic Cognitive Radio Networks PDF available

Author(s): Mahfuzulhoq Chowdhury | Asaduzzaman | Mohammad Obaidur Rahman | Md. Fazlul Kader
Volume: 4
Issue: 5
Year: 2012
Fast Hue-Preserving Histogram Equalization Methods For Color Image Contrast Enhancement PDF available

Author(s): David Menotti | Laurent Najman | Jacques Facon | Arnaldo de A. Albuquerque
Volume: 4
Issue: 5
Year: 2012
Efficient Monitoring in Online Tests Using Esdv Method PDF available

Author(s): Sri Anusha.N | Sai Soujanya.T | Vasavi.S
Volume: 4
Issue: 5
Year: 2012
An Insight View of Kernel Visual Debugger in System Boot up PDF available

Author(s): Mohamed Farag
Volume: 4
Issue: 5
Year: 2012
Achieving the Benefits of Agility in Software Architecture-XP PDF available

Author(s): Zafar Karimi | Sajjad Behzady | Ali Broumandnia
Volume: 4
Issue: 5
Year: 2012
Machine Learning Algorithms in Web Page Classification PDF available

Author(s): W.A.AWAD
Volume: 4
Issue: 5
Year: 2012
Evolutionary Tuning of Fuzzy Rule Base Systems for Nonlinear System Modelling and Control PDF available

Author(s): Pintu Chandra Shill | Bishnu Sarker | Kazuyuki Murase
Volume: 4
Issue: 5
Year: 2012
An Analyzer-Based Security Measurement Model for Increasing Software Security PDF available

Author(s): Sen-Tarng Lai
Volume: 4
Issue: 5
Year: 2012
Skyline Sets Queries for Incomplete Data PDF available

Author(s): Mohammad Shamsul Arefin | Yasuhiko Morimoto
Volume: 4
Issue: 5
Year: 2012
Computational Analysis of Code Collaboration Pattern and Semantic Role PDF available

Author(s): Lei Wu | Sharon White | Yi Feng | James Helm | Nathanial Wiggins
Volume: 4
Issue: 5
Year: 2012
A P2P Botnet Virus Detection System Based on Data-Mining Algorithms PDF available

Author(s): Wernhuar Tarng | Cheng-Kang Chou | Kuo-Liang Ou
Volume: 4
Issue: 5
Year: 2012
A Neuro-Fuzzy Inference Model for Breast Cancer Recognitio PDF available

Author(s): Bekaddour Fatima | Chikh Mohammed Amine
Volume: 4
Issue: 5
Year: 2012
Building a Legal Expert System for Legal Reasoning in Specific Domain-A Survey PDF available

Author(s): Venkateswarlu Naik.M | Sushant Lokhanday
Volume: 4
Issue: 5
Year: 2012
Efficient Similarity Join Method Using Unsupervised Learning PDF available

Author(s): Bilal Hawashin | Farshad Fotouhi | William Grosky
Volume: 4
Issue: 5
Year: 2012
It Security Issues Within the Video Game Industry PDF available

Author(s): STEPHEN MOHR | SYED (SHAWON) RAHMAN,
Volume: 3
Issue: 5
Year: 2011
OPTIMUM PARTITION PARAMETER OF DIVIDE-AND-CONQUER ALGORITHM FOR SOLVING CLOSEST-PAIR PROBLEM PDF available

Author(s): Mohammad Zaidul Karim | Nargis Akter
Volume: 3
Issue: 5
Year: 2011
Monitoring Software Reliability using Statistical Process Control: An MMLE Approach PDF available

Author(s): Dr. R Satya Prasad | Bandla Sreenivasa Rao | R.R. L Kantham
Volume: 3
Issue: 5
Year: 2011
Enhancing Confidentiality of Private Communication through Dual Compression PDF available

Author(s): Kristipati Sudharshana Reddy | Munwar Sk | Rajesh Bhakthavatsalam
Volume: 3
Issue: 5
Year: 2011
A SEMANTICALLY ENRICHED WEB USAGE BASED RECOMMENDATION MODEL PDF available

Author(s): C.Ramesh | K. V. Chalapati Rao | K. V. Chalapati Rao
Volume: 3
Issue: 5
Year: 2011
Direct Manipulation of Web Browsing History PDF available

Author(s): Gholam H. Khaksari
Volume: 3
Issue: 5
Year: 2011
Analysis and Design Complex and Large Data Base using MySQL Workbench PDF available

Author(s): Dedi Iskandar Inan | Ratna Juita
Volume: 3
Issue: 5
Year: 2011
KNOWLEDGE BASED METHODS FOR VIDEO DATA RETRIEVAL PDF available

Author(s): S.Thanga Ramya | P.Rangarajan
Volume: 3
Issue: 5
Year: 2011
Robust seed selection algorithm for k-means type algorithms - Optimal centroids using high density object PDF available

Author(s): K. Karteeka Pavan | Allam Appa Rao | A.V. Dattatreya Rao | G.R.Sridhar
Volume: 3
Issue: 5
Year: 2011
OPTIMIZED FUZZY LOGIC APPLICATION FOR MRI BRAIN IMAGES SEGMENTATION PDF available

Author(s): Indah Soesanti | Adhi Susanto | Thomas Sri Widodo | Maesadji Tjokronagoro
Volume: 3
Issue: 5
Year: 2011
STABLE FILTERING FOR ARTIFICIAL PHEROMONE POTENTIAL FIELD CONSTRUCTED BY MOBILE ROBOTS AND PASSIVE RFID TAGS PDF available

Author(s): Piljae Kim | Daisuke Kurabayashi
Volume: 3
Issue: 5
Year: 2011
RESEARCH REVIEW FOR DIGITAL IMAGE SEGMENTATION TECHNIQUES PDF available

Author(s): Ashraf A. Aly | Safaai Bin Deris | Nazar Zaki
Volume: 3
Issue: 5
Year: 2011
NEW METHOD FOR 3D SHAPE RETRIEVAL PDF available

Author(s): Abdelghni Lakehal | Omar El Beqqali
Volume: 3
Issue: 5
Year: 2011
An IR-based Pedestrian Detection System Implemented with Matlab-Equipped Laptop and Low-Cost Microcontroller PDF available

Author(s): Erwin Thomas Gilmore | Chukwunweike Ugbome | Charles Kim
Volume: 3
Issue: 5
Year: 2011
IRIS RECOGNITION BASED ON LBP AND COMBINED LVQ CLASSIFIER PDF available

Author(s): M. Z. Rashad | M. Y. Shams | O. Nomir | R. M. El-Awady
Volume: 3
Issue: 5
Year: 2011
GENETIC ALGORITHM (GA) IN FEATURE SELECTION FOR CRF BASED MANIPURI MULTIWORD EXPRESSION (MWE) IDENTIFICATION PDF available

Author(s): Kishorjit Nongmeikapam | Sivaji Bandyopadhyay
Volume: 3
Issue: 5
Year: 2011
Design Pattern Management System: A Support Tool Based on Design Patterns Applicability PDF available

Author(s): Zakaria Moudam | Radouan Belhissi | Noureddine Chenfour
Volume: 3
Issue: 5
Year: 2011
MINIMIZE THE FALSE POSITIVE RATE IN A DATABASE INTRUSION DETECTION SYSTEM PDF available

Author(s): A. Rezk | H. Ali | M. El-Mikkawy | S. Barakat
Volume: 3
Issue: 5
Year: 2011
ADAPTIVE BEAMFORMING ALGORITHM FOR INTERFERENCE SUPPRESSION IN GNSS RECEIVERS PDF available

Author(s): Zhao hongwei | Lian Baowang | Feng Juan
Volume: 3
Issue: 5
Year: 2011
Soil Classification Using GATREE PDF available

Author(s): P.Bhargavi | Dr.S.Jyothi
Volume: 2
Issue: 5
Year: 2010
A Clustering Heuristic for Multiprocessor Environments Using Computation and Communication Loads of Modules PDF available

Author(s): Pramod Kumar Mishra | Kamal Sheel Mishra | Abhishek Mishra
Volume: 2
Issue: 5
Year: 2010
Energy Efficient Data Processing in Visual Sensor Network PDF available

Author(s): Harish. H. Kenchannavar | Sushma. S. Kudtarkar | U. P. Kulkarni
Volume: 2
Issue: 5
Year: 2010
Level Shifter Design for Low Power Applications PDF available

Author(s): Manoj Kumar | Sandeep K. Arya | Sujata Pandey
Volume: 2
Issue: 5
Year: 2010
A Multi -Perspective Evaluation of MA and GA for Collaborative Filtering Recommender System PDF available

Author(s): Hema Banati | Shikha Mehta
Volume: 2
Issue: 5
Year: 2010
A New DCT-Based Watermarking Method for Copyright Protection of Digital Audio PDF available

Author(s): Pranab Kumar Dhar | Mohammad Ibrahim Khan | Saif Ahmad
Volume: 2
Issue: 5
Year: 2010
Potential Security Attacks on Wireless Networks and their Countermeasure PDF available

Author(s): Sreedhar. C | S. Madhusudhana Verma | N. Kasiviswanath
Volume: 2
Issue: 5
Year: 2010
Design and Evaluation of XACML Conflict Policies Detection Mechanism PDF available

Author(s): Kamalbir Singh | Sarbjeet Singh
Volume: 2
Issue: 5
Year: 2010
A New Email Retrivel Ranking Approach PDF available

Author(s): Samir AbdelRahman | Basma Hassan | Reem Bahgat
Volume: 2
Issue: 5
Year: 2010
Performance Analysis of Contention Window Cheating Misbehaviors in Mobile Adhoc Networks PDF available

Author(s): R. Kalaiarasi | Getsy S. Sara | S. Neelavathy Pari | D. Sridharan
Volume: 2
Issue: 5
Year: 2010
Performance Analysis of Contention Window Cheating Misbehaviors in Mobile Adhoc Networks PDF available

Author(s): R. Kalaiarasi | Getsy S. Sara | S. Neelavathy Pari | D. Sridharan
Volume: 1
Issue: 5
Year: 2010
Ontology-Based Quality Attributes Prediction in Component-Based Development PDF available

Author(s): Chengpu Li | Rob Pooley | Xiaodong Liu
Volume: 2
Issue: 5
Year: 2010
A Plant Documentation Information System Design PDF available

Author(s): Bing Wang | Ma Feicheng
Volume: 2
Issue: 5
Year: 2010
Performance Analysis of Multimedia Compression Algorithms PDF available

Author(s): Eman Abdelfattah | Asif Mohiuddin
Volume: 2
Issue: 5
Year: 2010
Identifying Bank Frauds Using CRISP-DM and Decision Trees PDF available

Author(s): Bruno Carneiro da Rocha | Rafael Timóteo de Sousa Júnior
Volume: 2
Issue: 5
Year: 2010
Following Car Algorithm With Multi Agent Randomized System PDF available

Author(s): Mounir Gouiouez | Noureddine Rais | Mostafa Azzouzi Idrissi
Volume: 5
Issue: 4
Year: 2013
GPS Tracking System Coupled With Image Processing in Traffic Signals to Enhance Life Security PDF available

Author(s): Manoj Prabhakar k | Manoj Kumar S
Volume: 5
Issue: 4
Year: 2013
Design and Development of Secure Navigation System for Visually Impaired People PDF available

Author(s): Prashant Bhardwaj | Jaspal Singh
Volume: 5
Issue: 4
Year: 2013
Periocular Recognition Using Reduced Features PDF available

Author(s): Ambika D R, | Radhika K R | D Sehsachalam
Volume: 5
Issue: 4
Year: 2013
Genetic Algorithm with SRM SVM Classifier for Face Verification PDF available

Author(s): Safiya K.M | S.Bhuvana | P.TamijeSelvy | R. Radhakrishnan
Volume: 4
Issue: 4
Year: 2012
An Energy Aware Geocast Algorithm Using 2-Hop Neighbour Knowledge in Sensor Networks PDF available

Author(s): Young-Chul Shim | Sehun Noh
Volume: 4
Issue: 4
Year: 2012
A New Audio Watermarking Method Based on Discrete Cosine Transform with a Gray Image PDF available

Author(s): Mohammad Ibrahim Khan | Md. Iqbal Hasan Sarker | Kaushik Deb | Md.Hasan Furhad
Volume: 4
Issue: 4
Year: 2012
Comparison Study for Clonal Selection Algorithm and Genetic Algorithm PDF available

Author(s): Ezgi Deniz Ulker | Sadık Ulker
Volume: 4
Issue: 4
Year: 2012
Intelligent Mining Association Rules PDF available

Author(s): Sarjon Defit
Volume: 4
Issue: 4
Year: 2012
Applications of Wireless Sensor Networks in Fall Detection for Senior People PDF available

Author(s): Wernhuar Tarng | Chia-Hwei Lin | Hsin-Hun Liou
Volume: 4
Issue: 4
Year: 2012
Spatial Data Mining using Cluster Analysis PDF available

Author(s): Ch.N.Santhosh Kumar | V. Sitha Ramulu | Suresh Kotha | Ch and Mohan Kumar | K.Sudheer Reddy
Volume: 4
Issue: 4
Year: 2012
Redescription Mining With Three Primary Data Mining Functionalities PDF available

Author(s): M. Kamala Kumari | Suresh Varma
Volume: 4
Issue: 4
Year: 2012
Training a Feed-Forward Neural Network with Artificial Bee Colony based Backpropagation Method PDF available

Author(s): Sudarshan Nandy | Partha Pratim Sarkar | Achintya Das
Volume: 4
Issue: 4
Year: 2012
PSO Algorithm for IPD Game PDF available

Author(s): Xiaoyang Wang | Yibin Lin
Volume: 4
Issue: 4
Year: 2012
PCA - Wavelet Coefficients for T2 chart to Detect Endpoint in CMP process PDF available

Author(s): Sihem Ben Zakour | Hassen Taleb
Volume: 4
Issue: 4
Year: 2012
Applying Data Envelopment Analysis to Evaluation of Taiwanese Solar Cell Industry Operational Performance PDF available

Author(s): Hao-En Chueh | Jie-Yi Jheng
Volume: 4
Issue: 4
Year: 2012
Design and FPGA Implementation of DDR3 SDRAM Controller for High Performance PDF available

Author(s): Shabana Aqueel | Kavita Khare
Volume: 3
Issue: 4
Year: 2011
Plants Images Classification Based on Textural Features using Combined Classifier PDF available

Author(s): M. Z. Rashad | , B.S.el-Desouky | Manal S .Khawasik
Volume: 3
Issue: 4
Year: 2011
COMPREHENSIVE MEASUREMENT FRAMEWORK FOR ENTERPRISE ARCHITECTURES PDF available

Author(s): Mahesh R. Dube | Shantanu K. Dixit
Volume: 3
Issue: 4
Year: 2011
MDA-BASED ATL TRANSFORMATION TO GENERATE MVC 2 WEB MODELS PDF available

Author(s): M'hamed Rahmouni | Samir Mbarki
Volume: 3
Issue: 4
Year: 2011
A FUZZY FRAMEWORK FOR SEGMENTATION, FEATURE MATCHING AND RETRIEVAL OF BRAIN MR IMAGES PDF available

Author(s): Archana.S | Sridhar.S
Volume: 3
Issue: 4
Year: 2011
A ROBUST STEGANOGRAPHY MODEL USING WAVELET-BASED BLOCK-PARTITION MODIFICATION PDF available

Author(s): Sherin Youssef | Ahmed Abu Elfarag | Reta Raouf
Volume: 3
Issue: 4
Year: 2011
AUTOMATIC APPLICATION LEVEL SET APPROACH IN DETECTION CALCIFICATIONS IN MAMMOGRAPHIC IMAGE PDF available

Author(s): Atef Boujelben | Hedi Tmar | Jameleddine Mnif | Mohamed Abid
Volume: 3
Issue: 4
Year: 2011
NOVEL APPROACH FOR SPEECH RECOGNITION BY USING SELF – ORGANIZED MAPS PDF available

Author(s): R.L.K.VENKATESWARLU | R. VASANTHA KUMARI | A.K.V.NAGAYYA
Volume: 3
Issue: 4
Year: 2011
A Fuzzy Approach for Clustering Gene Expression Time Series Data PDF available

Author(s): Sadiq Hussain | G.C. Hazarika
Volume: 3
Issue: 4
Year: 2011
TOWARDS A MODEL OF MATURITY FOR IS RISK MANAGEMENT PDF available

Author(s): Mina ELMAALLAM | Abdelaziz KRIOUILE
Volume: 3
Issue: 4
Year: 2011
PERFORMANCE ANALYSIS OF VARIOUS DATA MINING CLASSIFICATION TECHNIQUES ON HEALTHCARE DATA PDF available

Author(s): Shelly Gupta | Dharminder Kumar | Anand Sharma
Volume: 3
Issue: 4
Year: 2011
DNA LOSSLESS DIFFERENTIAL COMPRESSION ALGORITHM BASED ON SIMILARITY OF GENOMIC SEQUENCE DATABASE PDF available

Author(s): Heba Afify | Muhammad Islam | Manal Abdel Wahed
Volume: 3
Issue: 4
Year: 2011
REDUCTION OF BLOCKING PROBABILITY IN SHARED PROTECTED OPTICAL NETWORK PDF available

Author(s): Nirmala L Devi | V M Pandharipande
Volume: 3
Issue: 4
Year: 2011
PACKET SCHEDULING OF TWO CLASSES FLOW PDF available

Author(s): Rabie BARHOUN | Abdelwahed NAMIR
Volume: 3
Issue: 4
Year: 2011
SELF-ADAPTATION MECHANISM TO CONTROL THE DIVERSITY OF THE POPULATION IN GENETIC ALGORITHM PDF available

Author(s): Chaiwat Jassadapakorn | Prabhas Chongstitvatana
Volume: 3
Issue: 4
Year: 2011
A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on Particle Swarm Theory With Arithmetic Crossover PDF available

Author(s): Md. Amjad Hossain | Md. Kowsar Hossain | M.M.A Hashem
Volume: 2
Issue: 4
Year: 2010
Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms PDF available

Author(s): Rahmat Widia Sembiring | Jasni Mohamad Zain | Abdullah Embong
Volume: 2
Issue: 4
Year: 2010
A Modified Structure for Feed Forward Active Noise Control Systems With Improved Performa PDF available

Author(s): P.Babu | A.Krishnan
Volume: 2
Issue: 4
Year: 2010
Spiking Neurons With ASNN Based-Methods for the Neural Block Cipher PDF available

Author(s): Saleh Ali K. Al-Omari | Putra Sumari
Volume: 2
Issue: 4
Year: 2010
A Survey of QOS Routing Protocols For Mobile Ad Hoc Networks PDF available

Author(s): G. Santhi | Alamelu Nachiappan
Volume: 2
Issue: 4
Year: 2010
Mining Target-Oriented Sequential Patterns With Time-Intervals PDF available

Author(s): Hao-En Chueh
Volume: 2
Issue: 4
Year: 2010
Clustering and Feature Specific Sentence Extraction Based Summarization of Multiple Documents PDF available

Author(s): A.Kogilavani | P.Balasubramani
Volume: 2
Issue: 4
Year: 2010
Utilizing Diagnosing Problems in a Probabilistic Domain to Build Student Models PDF available

Author(s): Nabila Khodeir | Nayer Wanas | Nevin Darwish | Nadia Hegazy
Volume: 2
Issue: 4
Year: 2010
M-Learning: A New Paradigm of Learning Mathematics in Malaysia PDF available

Author(s): Saipunidzam Mahamad | Mohammad Noor Ibrahim | Shakirah Mohd Taib
Volume: 2
Issue: 4
Year: 2010
Improvement in Delay of Information flow in Energy Efficiency Organization PDF available

Author(s): Elham Hasanzadeh | Reza Askari moghadam
Volume: 2
Issue: 4
Year: 2010
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm PDF available

Author(s): Sandeep Singh Rawat | Lakshmi Rajamani
Volume: 2
Issue: 4
Year: 2010
Diphone Speech Synthesis System for Arabic Using MARY TTS PDF available

Author(s): M. Z. Rashad | Hazem M. El-Bakry | Islam R. Isma'il,
Volume: 2
Issue: 4
Year: 2010
An Empirical Study on the Procedure to Derive Software Quality Estimation Models [ PDF available

Author(s): Jie Xu | Danny Ho | Luiz Fernando Capretz
Volume: 2
Issue: 4
Year: 2010
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy PDF available

Author(s): S.Veeramalai | N.Jaisankar | A.Kannan
Volume: 2
Issue: 4
Year: 2010
Improvement of Traffic Overhead and Reliability in Wireless Sensor Network PDF available

Author(s): G.M. Mashrur-E-Elahi | Din Mohammad Mobin | Md. Anwar Ul Islam Rajib
Volume: 4
Issue: 3
Year: 2012
Evaluation of Information Retrieval Systems PDF available

Author(s): Keneilwe Zuva | Tranos Zuva
Volume: 4
Issue: 3
Year: 2012
New-Fangled Method Against Data Flooding Attacks in MANET PDF available

Author(s): Kavuri Roshan | K.Reddi Prasad | Niraj Upadhayaya | A.Govardhan
Volume: 4
Issue: 3
Year: 2012
Dimension Reduction by Mutual Information Feature Extraction PDF available

Author(s): Ali Shadvar
Volume: 4
Issue: 3
Year: 2012
Steganography in Arabic Text Using Zero Width and Kashidha Letters PDF available

Author(s): Ammar Odeh | Khaled Elleithy
Volume: 4
Issue: 3
Year: 2012
A Rule Based Approach for Root Word Identification in Malayalam Language PDF available

Author(s): Meera Subhash | Wilscy. M | S.A Shanavas
Volume: 4
Issue: 3
Year: 2012
An Approach for Integration Testing in Online Retail Applications PDF available

Author(s): Roopa Singh | Imran Akhtar Khan
Volume: 4
Issue: 3
Year: 2012
Automatic Segmentation of Manipuri (Meiteilon) Word into Syllabic Units PDF available

Author(s): Kishorjit Nongmeikapam | Vidya Raj RK | Oinam Imocha Singh | Sivaji Bandyopadhyay
Volume: 4
Issue: 3
Year: 2012
Crawler Architecture Using Grid Computing PDF available

Author(s): M.E.ElAraby | M.M.Sakre | M.Z.Rashad | O.Nomir
Volume: 4
Issue: 3
Year: 2012
Critical Analysis of Ecm Applications in the Clouds: A Case Study PDF available

Author(s): James Xue | Amjad Yahya
Volume: 4
Issue: 3
Year: 2012
High Availability Solution: Resource Usage Management in Virtualized Software Aging PDF available

Author(s): Aye Myat Myat Paing | Ni Lar Thein
Volume: 4
Issue: 3
Year: 2012
Full Data Controlled Web-Based Feed Aggregator PDF available

Author(s): Haruna Isah
Volume: 4
Issue: 3
Year: 2012
A Hybrid Region Growing Algorithm for Medical Image Segmentation PDF available

Author(s): D. Muhammad Noorul Mubarak | K.Revathy | M. Mohamed Sathik | S.Zulaikha Beevi
Volume: 4
Issue: 3
Year: 2012
STATISTICAL ANALYSIS ON SOFTWARE METRICS AFFECTING MODULARITY IN OPEN SOURCE SOFTWARE PDF available

Author(s): Andi Wahju Rahardjo Emanuel | Retantyo Wardoyo | Jazi Eko Istiyanto | Khabib Mustofa
Volume: 3
Issue: 3
Year: 2011
A REVIEW ON ELLIPTIC CURVE CRYPTOGRAPHY FOR EMBEDDED SYSTEMS PDF available

Author(s): Rahat Afreen | S.C. Mehrotra
Volume: 3
Issue: 3
Year: 2011
UBIQUITOUS MOBILE HEALTH MONITORING SYSTEM FOR ELDERLY (UMHMSE) PDF available

Author(s): Abderrahim BOUROUIS | Mohamed FEHAM | Abdelhamid BOUCHACHIA
Volume: 3
Issue: 3
Year: 2011
OPTIMAL SELF CORRECTING FAULT FREE ERROR CODING TECHNIQUE IN MEMORY OPERATION PDF available

Author(s): Harikishore .Kakarla | Madhavi Latha .M | Habibulla Khan
Volume: 3
Issue: 3
Year: 2011
EVOLUTIONARY NEURAL NETWORKS ALGORITHM FOR THE DYNAMIC FREQUENCY ASSIGNMENT PROBLEM PDF available

Author(s): Jamal Elhachmi | Zouhair Guennoun
Volume: 3
Issue: 3
Year: 2011
COMPARISON AND ANALYSIS OF WATERMARKING ALGORITHMS IN COLOR IMAGES – IMAGE SECURITY PARADIGM PDF available

Author(s): D. Biswas | S. Biswas | P.P. Sarkar | D. Sarkar | S. Banerjee | A. Pal
Volume: 3
Issue: 3
Year: 2011
COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS PDF available

Author(s): Yunus Yusoff | Roslan Ismail | Zainuddin Hassan
Volume: 3
Issue: 3
Year: 2011
INFORMATION SECURITY PLAN FOR FLIGHT SIMULATOR APPLICATIONS PDF available

Author(s): Jason Slaughter | Syed (Shawon) M. Rahman
Volume: 3
Issue: 3
Year: 2011
UNSUPERVISED HORIZONTAL COLLABORATION BASED IN SOM PDF available

Author(s): Nadia Mesghouni | Khaled Ghedira | Moncef Temani
Volume: 3
Issue: 3
Year: 2011
RCAUSE – A ROOT CAUSE ANALYSIS MODEL TO IDENTIFY THE ROOT CAUSES OF SOFTWARE REENGINEERING PROBLEMS PDF available

Author(s): Er. Anand Rajavat | Dr. (Mrs.) Vrinda Tokekar
Volume: 3
Issue: 3
Year: 2011
A COMPARATIVE EXPERIMENT OF SEVERAL SHAPE METHODS IN RECOGNIZING PLANTS PDF available

Author(s): A. Kadir | L.E. Nugroho | A. Susanto | P.I. Santosa
Volume: 3
Issue: 3
Year: 2011
ELECTRONIC COMMERCE IN WEB 3.0: THE EVIDENCE FROM EMERGING ECONOMICS PDF available

Author(s): Xi Zhang | Doug Vogel
Volume: 3
Issue: 3
Year: 2011
A NOVEL TECHNIQUE FOR BACK-LINK EXTRACTION AND RELEVANCE EVALUATION PDF available

Author(s): Pooja Gupta | A. K. Sharma | Divakar Yadav
Volume: 3
Issue: 3
Year: 2011
AN LMS BASED BLIND SOURCE SEPARATION ALGORITHM USING A FAST NONLINEAR AUTOCORRELATION METHOD PDF available

Author(s): Behzad Mozaffari Tazehkand
Volume: 3
Issue: 3
Year: 2011
E-LEARNING PERSONALIZATION BASED ON DYNAMIC LEARNERS’ PREFERENCE PDF available

Author(s): Essaid El Bachari | El Hassan Abelwahed | Mohammed El Adnani
Volume: 3
Issue: 3
Year: 2011
EFFECTIVE INDEPENDENT QUALITY ASSESSMENT USING IV&V PDF available

Author(s): Pathanjali Sastri Akella | K. Nageswara Rao
Volume: 3
Issue: 3
Year: 2011
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network PDF available

Author(s): Al Mutaz M. Abdalla | Safaai Dress | Nazar Zaki
Volume: 3
Issue: 3
Year: 2011
IMAGE RETRIEVAL USING BIT-PLANE PIXEL DISTRIBUTION PDF available

Author(s): N S T Sai | R C Patil
Volume: 3
Issue: 3
Year: 2011
GENBIT COMPRESS TOOL(GBC): A JAVA-BASED TOOL TO COMPRESS DNA SEQUENCES AND COMPUTE COMPRESSION RATIO(BITS/BASE) OF GENOMES PDF available

Author(s): P.RAJA RAJESWARI | ALLAM APPARAO | V.K. KUMAR
Volume: 2
Issue: 3
Year: 2010
BIOMETRIC AUTHENTICATION USING NONPARAMETRIC METHODS PDF available

Author(s): S V Sheela | K R Radhika
Volume: 2
Issue: 3
Year: 2010
A novel technique for image steganography based on Block-DCT and Huffman Encoding PDF available

Author(s): A.Nag | S. Biswas | D. Sarkar | P.P. Sarkar
Volume: 2
Issue: 3
Year: 2010
AN ALGORITHM TO SELF-EXTRACT SECONDARY KEYWORDS AND THEIR COMBINATIONS BASED ON ABSTRACTS COLLECTED USING PRIMARY KEYWORDS FROM ONLINE DIGITAL LIBRARIES PDF available

Author(s): Natarajan Meghanathan | Nataliya Kostyuk | Raphael Isokpehi | Hari Cohly
Volume: 2
Issue: 3
Year: 2010
INTEROPERABILITY, TRUST BASED INFORMATION SHARING PROTOCOL AND SECURITY: DIGITAL GOVERNMENT KEY ISSUES PDF available

Author(s): Md.Headayetullah | G.K. Pradhan
Volume: 2
Issue: 3
Year: 2010
HYBRID SCENARIO BASED PERFORMANCE ANALYSIS OF DSDV AND DSR PDF available

Author(s): Koushik Majumder | Subir Kumar Sarkar
Volume: 2
Issue: 3
Year: 2010
A Parsing Scheme for Finding the Design Pattern and Reducing the Development Cost of Reusable Object Oriented Software PDF available

Author(s): K. M. Azharul Hasan | Mohammad Sabbir Hasan
Volume: 2
Issue: 3
Year: 2010
IMPLEMENTING AND EVALUATING A WIRELESS BODY SENSOR SYSTEM FOR AUTOMATED PHYSIOLOGICAL DATA ACQUISITION AT HOME PDF available

Author(s): Chao Chen | Carlos Pomalaza-Raez
Volume: 2
Issue: 3
Year: 2010
LOW POWER SHIFT AND ADD MULTIPLIER DESIGN PDF available

Author(s): C. N.Marimuthu | P. Thangaraj | Aswathy Ramesan
Volume: 2
Issue: 3
Year: 2010
Efficient Resource Matching in Heterogeneous Grid Using Resource Vector PDF available

Author(s): Srirangam V Addepallil | Per Andersen | George L Barnes
Volume: 2
Issue: 3
Year: 2010
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups PDF available

Author(s): Ruchira Naskar | Indranil Sengupta
Volume: 2
Issue: 3
Year: 2010
Survey on the Event Orderings Semantics Used for Distributed System PDF available

Author(s): Yaser Miaji Osman Gazali | Suhaidi Hassan
Volume: 2
Issue: 3
Year: 2010
GAME INFORMATION SYSTEM PDF available

Author(s): Spits Warnars
Volume: 2
Issue: 3
Year: 2010
An Application Behavior Analysis And Classification System PDF available

Author(s): Himanshu Pareek | P R L Eswari | Sarat Chandra Babu
Volume: 5
Issue: 2
Year: 2013
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS PDF available

Author(s): Maya Samaha Rupert
Volume: 5
Issue: 2
Year: 2013
AN INVESTIGATION OF THE ENERGY CONSUMPTION BY INFORMATION TECHNOLOGY EQUIPMENTS PDF available

Author(s): Baharak Makki | Bahador Makki
Volume: 5
Issue: 2
Year: 2013
OBTAINING SUPER-RESOLUTION IMAGES BY COMBINING LOW-RESOLUTION IMAGES WITH HIGH-FREQUENCY INFORMATION DERIVEDFROM TRAINING IMAGES PDF available

Author(s): Emil Bilgazyev | Nikolaos Tsekos | Ernst Leiss
Volume: 5
Issue: 2
Year: 2013
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES PDF available

Author(s): Ibrahim Kabiru Musa | Stuart Walker
Volume: 5
Issue: 2
Year: 2013
Performance Analysis of Parallel Pollard's Rho Factoring Algorithm PDF available

Author(s): Anjan K Koundinya | Harish G | Srinath N K | Raghavendra G E | Pramod Y V | Sandeep R | Punith Kumar G
Volume: 5
Issue: 2
Year: 2013
Shadow Detection Using Tricolor Attenuation Model Enhanced with Adaptive Histogram Equalization PDF available

Author(s): Jyothisree V. | Smitha Dharan
Volume: 5
Issue: 2
Year: 2013
Developing Mobile Agent for Intrusion Detection PDF available

Author(s): Bambang Sugiantoro | Retantyo Wardoyo | Sri Hartati | Jazi Eko Istiyanto
Volume: 5
Issue: 2
Year: 2013
A Heuristic Approach for Web-Service Discovery and Selection PDF available

Author(s): Achraf Karray | Rym Teyeb | Maher Ben Jemaa
Volume: 5
Issue: 2
Year: 2013
Social Media News: Motivation, Purpose and Usage PDF available

Author(s): Samaneh Beheshti-Kashi | Baharak Makki
Volume: 5
Issue: 2
Year: 2013
Pixel Size Reduction Loss-Less Image Compression Algorithm PDF available

Author(s): Pralhadrao V Shantagiri | Saravanan K N
Volume: 5
Issue: 2
Year: 2013
Adaboost Ensemble with Simple Genetic Algorithm for Student Prediction Mode PDF available

Author(s): AhmedSharaf ElDen | ElDen1Malaka A. Moustafa2Hany | M. Harb | AbdelH.Emara
Volume: 5
Issue: 2
Year: 2013
An Effective Method for Information Security Awareness Raising Initiatives PDF available

Author(s): AliMaqousi | TatianaBalikhina | Michael Mackay
Volume: 5
Issue: 2
Year: 2013
Prashnottar: A Hindi Question Answering System PDF available

Author(s): Shriya Sahu | Nandkishor Vasnik | Devshri Roy
Volume: 4
Issue: 2
Year: 2012
UNDERSTANDING the Concept of Geographic Information System and Modelling Formalisms PDF available

Author(s): Wembe Sop Diake Hubert
Volume: 4
Issue: 2
Year: 2012
Embedded Controller for Vehicle In-Front Obstacle Detection and Cabin Safety Alert System PDF available

Author(s): V.Ramya | B. Palaniappan | K. Karthick
Volume: 4
Issue: 2
Year: 2012
Signal Processing for MIMO Interference Networks PDF available

Author(s): Thanat Chiamwichtkun | Stephanie Soon | Ian Lim
Volume: 4
Issue: 2
Year: 2012
Dynamic Domain Classification for Fractal Image Compression PDF available

Author(s): K. Revathy | M. Jayamohan
Volume: 4
Issue: 2
Year: 2012
Review on Common Criteria as a Secure Software Development Model PDF available

Author(s): Mehmet Kara
Volume: 4
Issue: 2
Year: 2012
A Semi-Blind Reference Watermarking Scheme Using DWT-DCT-SVD for Copyright Protection PDF available

Author(s): Satyanarayana Murty. P | M.Uday Bhaskar | P. Rajesh Kumar
Volume: 4
Issue: 2
Year: 2012
Document Summarization Using Positive Pointwise Mutual Information PDF available

Author(s): Aji S | Ramachandra Kaimal
Volume: 4
Issue: 2
Year: 2012
Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues PDF available

Author(s): Swarnpreet Singh | Tarun Jangwal
Volume: 4
Issue: 2
Year: 2012
MppSoCGEN: A Framework for automatic generation of MppSoC Architecture PDF available

Author(s): Emna Kallel | Yassine Aoudni | Mouna Baklouti | Mohamed Abid
Volume: 4
Issue: 2
Year: 2012
Importance of Data Collection and Validation for Systematic Software Development Process PDF available

Author(s): Mala.V.Patil | A.M.Nageswara Yogi
Volume: 3
Issue: 2
Year: 2011
PHP Framework for Database Management Based on MVC Pattern PDF available

Author(s): Chanchai Supaartagorn
Volume: 3
Issue: 2
Year: 2011
An Automated Size Recognition Technique for Acetabular Implant in Total Hip Replacement PDF available

Author(s): A. Shapi’i | R. Sulaiman | M.K. Hasan | A.Y.M. Kassim
Volume: 3
Issue: 2
Year: 2011
Characterization and Validation of Requirements Management Measures Using Correlation and Regression Model PDF available

Author(s): S. Arun Kumar | T.Arun Kumar
Volume: 3
Issue: 2
Year: 2011
A Design of a Computer-Aided Diagnostic Tool For Chest X-Ray Analysis PDF available

Author(s): Kim Le
Volume: 3
Issue: 2
Year: 2011
A Novel Parallel Algorithm for Clustering Documents Based on the Hierarchical Agglomerative Approach PDF available

Author(s): Amal Elsayed Aboutabl | Mohamed Nour Elsayed
Volume: 3
Issue: 2
Year: 2011
Ontology Alignment Using Machine Learning Techniques PDF available

Author(s): Azadeh Haratian Nejhadi | Bita Shadgar | Alireza Osareh
Volume: 3
Issue: 2
Year: 2011
Wavelet Based Spectrum Sensing Techniques for Cognitive Radio - A Survey PDF available

Author(s): Karthik Divakaran | Naveen Manikandan P | Shri Hari R R
Volume: 3
Issue: 2
Year: 2011
An Effective CBVR System Based on Motion, Quantized Color and Edge Density Features PDF available

Author(s): Kalpana Thakre | Archana Rajurkar | Ramchandra Manthalkar
Volume: 3
Issue: 2
Year: 2011
An Object-Oriented Modeling and Implementation of Spatio-Temporal Knowledge Discovery System PDF available

Author(s): K.Venkateswara Rao | A.Govardhan | K.V.Chalapati Rao
Volume: 3
Issue: 2
Year: 2011
Behavior Analysis in a learning Environment to Identify the Suitable Learning Style PDF available

Author(s): Abdelaziz . K. Hamada | Magdy .Z. Rashad | Mohamed.G. Darwesh
Volume: 3
Issue: 2
Year: 2011
Brightness Factor Matching for Gesture Recognition System Using Scaled Normalization PDF available

Author(s): Mokhtar M. Hasan | Pramoud K. Misra
Volume: 3
Issue: 2
Year: 2011
The Development of Electronic Payment System for Universities in Indonesia: On Resolving Key Success Factors PDF available

Author(s): Veronica S. Moertini | Asdi A. Athuri | Hery M. Kemit | Nico Saputro
Volume: 3
Issue: 2
Year: 2011
Clustering Posts in Online Discussion Forum Threads PDF available

Author(s): Dina Said | Nayer Wanas
Volume: 3
Issue: 2
Year: 2011
THESAURUS AND QUERY EXPANSION PDF available

Author(s): Hazra Imran | Aditi Sharan
Volume: 1
Issue: 2
Year: 2009
Design and Implementation of 32-Bit Controller For Interfacing with reconfigurable computing systems. PDF available

Author(s): Ashutosh Gupta | Kota Solomon Raju
Volume: 1
Issue: 2
Year: 2009
Investigating the Performance of Various Vocoders for a Fair Scheduling Algorithm in WIMAX PDF available

Author(s): B. Kaarthick | V. J.Yeshwenth | P.M.Sudarsan | N.Nagarajan | Rajeev
Volume: 1
Issue: 2
Year: 2009
Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach PDF available

Author(s): A.Revathi | R.Ganapathy | Y.Venkataramani
Volume: 1
Issue: 2
Year: 2009
EFFECT OF VARIATION OF SEPARATION BETWEEN THE ULTRASONIC TRANSMITTER AND RECEIVER ON THE ACCURACY OF DISTANCE MEASUREMENT PDF available

Author(s): Ajay Kumar Shrivastava | Ashish Verma | S. P. Singh
Volume: 1
Issue: 2
Year: 2009
Model-Based Factors to Extract Quality Indications in Software Lines of Code PDF available

Author(s): Mohammed Abdullah H. Al-Hagery
Volume: 3
Issue: 2
Year: 2011
Model Based System Engineering Approach of a Lightweight Embedded TCP/IP PDF available

Author(s): M. Z. Rashed | Ahmed E. Hassan | Ahmed I. Sharaf
Volume: 3
Issue: 2
Year: 2011
Memory Management Technique for Paging on Distributed Shared Memory Framework PDF available

Author(s): Bal Gopal | Rizwan Beg | Pankaj Kumar
Volume: 2
Issue: 2
Year: 2010
Wrapper Generator using Java Native Interface PDF available

Author(s): V.S.Vairale | K.N.Honwadkar
Volume: 2
Issue: 2
Year: 2010
CRM System Using PA-AKD Approach of D3M PDF available

Author(s): Ajay kumar | A.Tejaswi | Lakshmi Prasad Koyi | G.Narasinga Rao | S.Srinivasa Rao Illapu
Volume: 2
Issue: 2
Year: 2010
Improved Lossless Embedding and Extraction - A Data Hiding Mechanism PDF available

Author(s): T. Venkat Narayana Rao | A.Govardhan | Syed Jahangir Badashah
Volume: 2
Issue: 2
Year: 2010
Performance Evaluation of Routing Protocols in Wireless Sensor Networks PDF available

Author(s): Laiali Almazaydeh | Eman Abdelfattah | Manal Al-Bzoor | Amer Al-Rahayfeh
Volume: 2
Issue: 2
Year: 2010
An Efficient Statistical Multiplexing Method for H.264 VBR Video Sources for Improved Traffic Smoothing PDF available

Author(s): T.Raghuveera | K.S.Easwarakumar
Volume: 2
Issue: 2
Year: 2010
Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock PDF available

Author(s): Hemen Patel | Syed S. Rizvi | Laiali Almazaydeh | Aasia Riasat
Volume: 2
Issue: 2
Year: 2010
Analysis of Telecommunication Management Technologies PDF available

Author(s): Khalil ur rehman Laghari | Imen Grida ben Yahia | Noel Crespi
Volume: 1
Issue: 2
Year: 2009
A collaborative PCE-Based mechanism for E2E recovery within MPLS-networks PDF available

Author(s): EL KAMEL Ali | Youssef Habi
Volume: 1
Issue: 2
Year: 2009
ANALYSIS ON DEPLOYMENT COST AND NETWORK PERFORMANCE FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS PDF available

Author(s): Dilip Kumar | Trilok. C Aseri | R.B Patel
Volume: 1
Issue: 2
Year: 2009
Optimal Curve Fitting of Speech Signal for Disabled Children PDF available

Author(s): Anandthirtha. B. GUDI | H. C. Nagaraj
Volume: 1
Issue: 2
Year: 2009
IDENTIFICATION OF TELUGU, DEVANAGARI AND ENGLISH SCRIPTS USING DISCRIMINATING FEATURES PDF available

Author(s): M C Padma | P A Vijaya
Volume: 1
Issue: 2
Year: 2009
A LOW INDEXED CONTENT BASED NEURAL NETWORK APPROACH FOR NATURAL OBJECTS RECOGNITION PDF available

Author(s): G.Shyama Chandra Prasad | Dr. A.Govardhan | Dr. T.V.Rao
Volume: 1
Issue: 2
Year: 2009
Multi-Focus Fusion Method Based on LADWT

Author(s): Shwu-Huey Yen | Yi-Ray Lin
Volume: 1
Issue: 2
Year: 2009
Application of PUF-Enabled RFID Tags in Electronic Banking PDF available

Author(s): Saeed Mehmandoust | Reza Ebrahimi Atani
Volume: 3
Issue: 2
Year: 2011
A Descriptive Model for Developing a Hydraulic Geodatabase by Using the GIS Softwares PDF available

Author(s): El khamlichi Ahmed Mortada | Kadiri Mohamed | El mahboul Abdellah | Merzouki Abderrahmane
Volume: 3
Issue: 2
Year: 2011
Adaptive Team-Based Multi-Agent Organizational Model: A Case in Rescue Systems PDF available

Author(s): Afsaneh Fatemi | Kamran Zamanifar | Naser Nematbakhsh
Volume: 3
Issue: 2
Year: 2011
ONTOLOGY BASED MODEL FOR THE ITU-T RECOMMENDATION G.805: TOWARDS THE SELF-MANAGEMENT OF TRANSPORT NETWORKS PDF available

Author(s): Maxwell E. Monteiro | Anilton Salles Garcia | Pedro Paulo F. Barcelos | Giancarlo Guizzardi
Volume: 2
Issue: 2
Year: 2010
Enhanced-DSR: A New Approach to Improve Performance of DSR Algorithm PDF available

Author(s): Sharmin Sultana | Salma Begum | Nazma Tara | Ahsan Raja Chowdhury
Volume: 2
Issue: 2
Year: 2010
Phenol Degradation: Numerical Simulation in a Stirred Tank Electrochemical Reactor PDF available

Author(s): Regalado-Mendez Alejandro | Peralta-Reyes Ever | Velazquez-Manzanares Miguel
Volume: 2
Issue: 2
Year: 2010
Analysis of Digital Images Using Morphlogical Operations PDF available

Author(s): Amalorpavam.G | Harish Naik T | Jyoti Kumari | Suresha M
Volume: 5
Issue: 1
Year: 2013
Performance Analysis of Kernel-Based Virtual Machine PDF available

Author(s): Sudha M | Harish G M | Nandan A | Usha J
Volume: 5
Issue: 1
Year: 2013
Concept-Based Indexing in Text Information Retrieval PDF available

Author(s): Fatiha Boubekeur | Wassila Azzoug
Volume: 5
Issue: 1
Year: 2013
Classification Methods of Skin Burn Images PDF available

Author(s): Malini Suvarna | Sivakumar | U C Niranjan
Volume: 5
Issue: 1
Year: 2013
Correlation Based VMS Placement Resource Provision PDF available

Author(s): Zar Lwin Phyo | Thandar Thein
Volume: 5
Issue: 1
Year: 2013
Extended Nymble: Method for Tracking Misbehaving Users Anonymosly While Blocking PDF available

Author(s): M.Durga Prasad | P.Chenna Reddy | Banoth Samya
Volume: 5
Issue: 1
Year: 2013
Pre-Segmentation for the Computer Aided Diagnosis System PDF available

Author(s): Myat Mon Kyaw
Volume: 5
Issue: 1
Year: 2013
An Evaluation Method of Research on Wearable Wireless Body Area Network in Healthcare PDF available

Author(s): Roberto Vito Rodrigues Filho | Renato Freitas Bulcao Neto | Bruno Oliveira Silvestre | Leandro Luis Galdino de Oliveira | Rogerio Orlow de Oliveira | Iwens Gervásio Sene Júnior
Volume: 5
Issue: 1
Year: 2013
Improving the Management of Cost and Scope in Software Projects Using Agile Practices PDF available

Author(s): Mariana de Azevedo Santos | Paulo Henrique de Souza Bermejo | Marcelo Silva de Oliveira | Adriano Olimpio Tonelli | Enio Junior Seidel
Volume: 5
Issue: 1
Year: 2013
Sobel Edge Detection Method to Identify and Quantify the Risk Factors for Diabetic Foot Ulcers PDF available

Author(s): Kunjam Nageswara Rao | P srinivasa Rao | Allam Appa Rao | G R Sridhar
Volume: 5
Issue: 1
Year: 2013
Adaptive Design of Controller and Synchronizer for Lu-Xiao Chaotic System with Unknown Parameters PDF available

Author(s): Sundarapandian Vaidyanathan,
Volume: 5
Issue: 1
Year: 2013
Teaching Automated Test Data Generation Tools for C, C++ , and Java Programs PDF available

Author(s): Hitesh Tahbildar | Plabita Borbora | G. P. Khataniar
Volume: 5
Issue: 1
Year: 2013
Mining Closed Regular Patterns in Data Streams PDF available

Author(s): M.Sreedevi | L.S.S.Reddy
Volume: 5
Issue: 1
Year: 2013
An Ontology based Text Mining framework for R&D Project Selection PDF available

Author(s): N.Arunachalam | E.Sathya | S.Hismath Begum | M . U m a M a k e s w ar i
Volume: 5
Issue: 1
Year: 2013
A Systematic Mapping Study on Business Process Variability PDF available

Author(s): George Valenca | Carina Alves | Vander Alves | Nan Niu
Volume: 5
Issue: 1
Year: 2013
Visual Analysis of Cost Based Database Optimizers Using Picasso Tool PDF available

Author(s): Neeraj Sharma | Syed Imran Ali | Banshilal Patidar | Kavindra Raghuwanshi
Volume: 4
Issue: 1
Year: 2012
Error Probability Analysis of Free-Space Optical Links with Different Channel Model under Turbulent Condition PDF available

Author(s): Bobby Barua | Tanzia Afrin Haque | Md. Rezwan Islam
Volume: 4
Issue: 1
Year: 2012
An Approach for Agile SOA Development using Agile Principals PDF available

Author(s): Majlesi Shahrbanoo | Mehrpour Ali | Mohsenzadeh Mehran
Volume: 4
Issue: 1
Year: 2012
Graph Based New Approach for Frequent Pattern Mining PDF available

Author(s): Anurag Choubey | Ravindra Patel | J.L. Rana
Volume: 4
Issue: 1
Year: 2012
A Qualitative Study of LP-ITS: Linear Programming Intelligent Tutoring System PDF available

Author(s): Samy S. Abu Naser
Volume: 4
Issue: 1
Year: 2012
SignsWorld; Deeping into the Silence World and Hearing Its Signs (StAte oF the Art) PDF available

Author(s): A.M. Riad | Hamdy K.Elmonier | Samaa.M.Shohieb | A.S. Asem
Volume: 4
Issue: 1
Year: 2012
Image Retrieval System Using Hybrid Feature Extraction Technique PDF available

Author(s): Vadhri Suryanarayana | M.V.L.N. Raja Rao | P. Bhaskara Reddy | G. Ravindra Babu
Volume: 4
Issue: 1
Year: 2012
Quality of Service Using PSO Algorithm PDF available

Author(s): S.M. ELseuofi
Volume: 4
Issue: 1
Year: 2012
Ranking Popular Items By Naive Bayes Algorithm PDF available

Author(s): Shiramshetty Gouthami | Golamari.Jose Mary | Pulluri Srinivas Rao
Volume: 4
Issue: 1
Year: 2012
Affiliate Program      Why do you need a reservation system?