Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Computer Science

ISSN: 1549--3636
Publisher: Science Publications


ADD TO MY LIST
 
PROTOTYPE DESIGN SYSTEM FOR MOBILE WEB USING RADIO FREQUENCY IDENTIFICATION AT PARKING BUILDING

Author(s): Derwin Suhartono | Chitra Patricia | Hendry Steven | Kevin
Volume: 9
Issue: 9
Year: 2013
SECURING MOBILE ANT AGENT USING CHINESE REMAINDER THEOREM

Author(s): Srinath Doss | Janet Jeyaraj
Volume: 9
Issue: 9
Year: 2013
IMPROVEMENT OF AUTOMATIC HEMORRHAGES DETECTION METHODS USING SHAPES RECOGNITION

Author(s): Nidhal Khdhair El Abbadi | Enas Hamood Al Saadi
Volume: 9
Issue: 9
Year: 2013
ENHANCED LOAD BALANCING STRATEGY IN HETEROGENEOUS PEER-TO-PEER NETWORKS

Author(s): P. Murugesan | A. Shanmugam
Volume: 9
Issue: 9
Year: 2013
MAPPING INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY WITH OTHER INFORMATION TECHNOLOGY STANDARDS AND BEST PRACTICES

Author(s): Syed Mubashir Ali | Tariq Rahim Soomro | Muhammad Nawaz Brohi
Volume: 9
Issue: 9
Year: 2013
SECRET HANDSHAKE ISSUE AND VALIDATE AUTHORITY BASED AUTHENTICATION SYSTEM FOR WIRELESS SENSOR NETWORK

Author(s): Kamalanaban Ethala | R. Seshadri | N. G. Renganathan | M. S. Saravanan
Volume: 9
Issue: 9
Year: 2013
E-RESOURCES GEOGRAPHIC INFORMATION SYSTEM SYSTEM FOR MILITARY OPERATION

Author(s): Aditya Kurniawan | Khaterini Mulyono | Mellyna | Stevan Gerardo
Volume: 9
Issue: 9
Year: 2013
TECHNICAL ANALYSIS OF FUZZY METAGRAPH BASED DECISION SUPPORT SYSTEM FOR CAPITAL MARKET

Author(s): Anbalagan Thirunavukarasu | Uma Maheswari
Volume: 9
Issue: 9
Year: 2013
SCHOOL INFORMATION SYSTEMS DESIGN FOR MOBILE PHONES

Author(s): Kelvinnicky Gunawan | Bens Pardamean
Volume: 9
Issue: 9
Year: 2013
MODELING AND SIMULATION OF FUZZY BASED AUTOMATIC INSULIN DELIVERY SYSTEM

Author(s): SunithaKarnam Anantha | Senthil Kumar Natarajan | Subransu Sekar Dash
Volume: 9
Issue: 9
Year: 2013
IMPROVING INDEPENDENT COMPONENT ANALYSIS USING SUPPORT VECTOR MACHINES FOR MULTIMODAL IMAGE FUSION

Author(s): D. Egfin Nirmala | A. Bibin Sam Paul | V. Vaidehi
Volume: 9
Issue: 9
Year: 2013
A LEADER BASED MONITORING APPROACH FOR SINKHOLE ATTACK IN WIRELESS SENSOR NETWORK

Author(s): D. Udaya Suriya Rajkumar | Rajamani Vayanaperumal
Volume: 9
Issue: 9
Year: 2013
EXPERT-SYSTEM BASED MEDICAL STROKE PREVENTION

Author(s): Anindito | Bens Pardamean | Robby Christian | Bahtiar Saleh Abbas
Volume: 9
Issue: 9
Year: 2013
INTELLISENSE CLUSTER MANAGEMENT AND ENERGY EFFICIENT ROUTING IN MOBILE AD HOC NETWORKS

Author(s): Sangeetha Kuppusamy | Natarajan Mathaiyan
Volume: 9
Issue: 9
Year: 2013
PRESERVATION OF THE PRIVACY FOR MULTIPLE CUSTODIAN SYSTEMS WITH RULE SHARING

Author(s): B. Murugeshwari | C. Jaya Kumar | K. Sarukesi
Volume: 9
Issue: 9
Year: 2013
NON-COOPERATIVE IRIS RECOGNITION: A NOVEL APPROACH FOR SEGMENTATION AND FAKE IDENTIFICATION

Author(s): M. Rajeev Kumar | M. Dilsath Fathima | K. Kiruthika | M. S. Saravanan
Volume: 9
Issue: 9
Year: 2013
ENHANCEMENT AND COMPARISON OF ANT COLONY OPTIMIZATION FOR SOFTWARE RELIABILITY MODELS

Author(s): Latha Shanmugam | Lilly Florence
Volume: 9
Issue: 9
Year: 2013
REPLACEMENT MECHANISM OF CACHING TECHNIQUE FOR QUERY ROUTING IN PEER TO PEER NETWORKS

Author(s): Usha Veerasamy Arivazhagu | Subramaniam Srinivasan
Volume: 9
Issue: 9
Year: 2013
A Block Cipher Algorithm for Multimedia Content Protection with Random Substitution using Binary Tree Traversal

Author(s): P. Vidhya Saraswathi | M. Venkatesulu
Volume: 8
Issue: 9
Year: 2012
A framework to Deal with Missing Data in Data Sets

Author(s): Luai A. Shalabi | Mohannad Najjar | Ahmad A. Kayed
Volume: 2
Issue: 9
Year: 2006
MFTPM: Maximum Frequent Traversal Pattern Mining with Bidirectional Constraints

Author(s): Jiadong Ren | Xiaojian Zhang | Huili Peng
Volume: 2
Issue: 9
Year: 2006
Analysis of Hierarchical Diff-EDF Schedulability over Heterogeneous Real-Time Packet Networks

Author(s): M. Saleh | Z. A. Othman
Volume: 3
Issue: 9
Year: 2007
Data-Driven Forecasting Schemes: Evaluation and Applications

Author(s): J. V. Jr | W. Wang
Volume: 3
Issue: 9
Year: 2007
Policy-Based Security for Wireless Components in High Assurance Computer Systems

Author(s): L. A. Wahsheh | J. Alves-Foss
Volume: 3
Issue: 9
Year: 2007
Utility Independent Privacy Preserving Data Mining on Vertically Partitioned Data

Author(s): E. Poovammal | M. Ponnavaikko
Volume: 5
Issue: 9
Year: 2009
Computer-Aided Design Data Extraction Approach to Identify Product Information

Author(s): Mohamad F.A. Jabal | Mohd. S.M. Rahim | Nur Z.S. Othman | Daut Daman
Volume: 5
Issue: 9
Year: 2009
An Efficient Method for Fetal Electrocardiogram Extraction from the Abdominal Electrocardiogram Signal

Author(s): Muhammad A. Hasan | Muhammad I. Ibrahimy | Mamun B.I. Reaz
Volume: 5
Issue: 9
Year: 2009
Statistical Analysis and Learning Method on Users' Feedbacks

Author(s): Doris H.T. Wong | Sureswaran Ramadass
Volume: 7
Issue: 9
Year: 2011
Data Mining: A Preprocessing Engine

Author(s): Luai A. Shalabi | Zyad Shaaban | Basel Kasasbeh
Volume: 2
Issue: 9
Year: 2006
Tolerances Applied in Combinatorial Optimization

Author(s): Boris Goldengorin | Gerold Jäger | Paul Molitor
Volume: 2
Issue: 9
Year: 2006
An Integrated Approach to Digital Objects Storage and Retrieval

Author(s): Khalil Shihab | Haider Ramadhan | Nida A. Chalabi
Volume: 2
Issue: 9
Year: 2006
Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

Author(s): A. Velmurugan | R. Rajaram
Volume: 2
Issue: 9
Year: 2006
A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking

Author(s): E. Ramaraj | S. Karthikeyan
Volume: 2
Issue: 9
Year: 2006
Combined DWT-DCT Digital Image Watermarking

Author(s): A. Al-Haj
Volume: 3
Issue: 9
Year: 2007
Feature Selection in Data-Mining for Genetics Using Genetic Algorithm

Author(s): V. N. Rajavarman | S. P. Rajagopalan
Volume: 3
Issue: 9
Year: 2007
A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks

Author(s): R. Asokan | A. M. Natarajan | A. Nivetha
Volume: 3
Issue: 9
Year: 2007
Adaptive Control of Networked Systems in the Presence of Bounded Disturbances

Author(s): A. H. Tahoun | F. Hua-Jing
Volume: 3
Issue: 9
Year: 2007
Control Techniques in Heating, Ventilating and Air Conditioning Systems

Author(s): H. Mirinejad | S. H. Sadati | M. Ghasemian | H. Torab
Volume: 4
Issue: 9
Year: 2008
A Survey of Protein Fold Recognition Algorithms

Author(s): M. S. Abual-Rub | R. Abdullah
Volume: 4
Issue: 9
Year: 2008
An Entropy Based Method for Removing Web Query Ambiguity in Hindi Language

Author(s): S. K. Dwivedi | P. Rastogi
Volume: 4
Issue: 9
Year: 2008
Architectural Review of Load Balancing Single System Image

Author(s): B. S. Ahmed | K. Samsudin | A. R. Ramli
Volume: 4
Issue: 9
Year: 2008
Parsing Arabic Texts Using Rhetorical Structure Theory

Author(s): H. I. Mathkour | A. A. Touir | W. A. Al-Sanea
Volume: 4
Issue: 9
Year: 2008
Bluetooth Wireless Network Authentication Using Radio Frequency Communication Protocol

Author(s): Ghossoon M. Waleed | M. Faizal | R. B. Ahmad | M. F.B.A. Malek | M. A. Ghani
Volume: 5
Issue: 9
Year: 2009
Integer Factorization: Solution via Algorithm for Constrained Discrete Logarithm Problem

Author(s): Boris S. Verkhovsky
Volume: 5
Issue: 9
Year: 2009
A Platform to Develop a Secure Instant Messaging Using Jabber Protocol

Author(s): Ghossoon M.W. Al-Saadoon
Volume: 5
Issue: 9
Year: 2009
Genome Sequence Analysis: A Survey

Author(s): Hassan Mathkour | Muneer Ahmad
Volume: 5
Issue: 9
Year: 2009
Iris Recognition Without Iris Normalization

Author(s): Lenina Birgale | M. Kokare
Volume: 6
Issue: 9
Year: 2010
Computation of Hahn Moments for Large Size Images

Author(s): A. Venkataramana | P. A. Raj,
Volume: 6
Issue: 9
Year: 2010
Radiometric Correction of Multitemporal Satellite Imagery

Author(s): S. G. Biday, | Udhav Bhosle,
Volume: 6
Issue: 9
Year: 2010
Human Behavior Classification Using Multi-Class Relevance Vector Machine

Author(s): Yogameena, B. | S. V. Lakshmi, | M. Archana | S. R. Abhaikumar,
Volume: 6
Issue: 9
Year: 2010
A Particle Swarm Optimization Based Edge Preserving Impulse Noise Filter

Author(s): S. M.M. Roomi, | P. L.M. Karuppi, | P. R | B. G. Revathi
Volume: 6
Issue: 9
Year: 2010
Support Vector Machine-Based Human Behavior Classification in Crowd through Projection and Star Skeletonization

Author(s): Yogameena, B. | E. Komagal | M. Archana | S. R. Abhaikumar
Volume: 6
Issue: 9
Year: 2010
Hand Gesture Recognition for Human-Computer Interaction

Author(s): S. M.M. Roomi, | R. J. Priya | H. Jayalakshmi
Volume: 6
Issue: 9
Year: 2010
Pan Correction through Overlap Estimation in a Multi-Camera Environment

Author(s): S. M.M. Roomi | V. Manojkumar | M. Senthilarasi
Volume: 6
Issue: 9
Year: 2010
Image Morphing Concept for Secure Transmission of Image Data Contents over Internet

Author(s): Anant N, Bagade | S. N, Talbar
Volume: 6
Issue: 9
Year: 2010
Motion Detection and Projection Based Block Motion Estimation Using the Radon Transform for Video Coding

Author(s): Shilpa P Metkar | Sanjay N. Talbar
Volume: 6
Issue: 9
Year: 2010
Successive Image Interpolation Using Lifting Scheme Approach

Author(s): Rohini S. Asamwar, | Kishor Bhurchandi | A S. Gandhi
Volume: 6
Issue: 9
Year: 2010
Skin Color Detection Model Using Neural Networks and its Performance Evaluation

Author(s): K. K. Bhoyar | O. G. Kakde
Volume: 6
Issue: 9
Year: 2010
Mobile Node Speed Detection Mechanism in Hierarchical Mobile Internet Protocol (IPv6)

Author(s): Zulkeflee Kusin | Mohamad S. Zakaria
Volume: 7
Issue: 9
Year: 2011
Novel Mechanism Control Algorithm for Wired Network

Author(s): V. B. Kirubanand | S. Palaniammal
Volume: 7
Issue: 9
Year: 2011
Logo Recognition System Using Angular Radial Transform Descriptors

Author(s): Omar M. Wahdan | Khairuddin Omar | Mohammad F. Nasrudin
Volume: 7
Issue: 9
Year: 2011
Surface Electromyography-Based Facial Expression Recognition in Bi-Polar Configuration

Author(s): Mahyar Hamedi | Sh-Hussain Salleh | Tan T. Swee | Kamarulafizam
Volume: 7
Issue: 9
Year: 2011
Consistent and Proficient Algorithm for Data Gathering in Wireless Sensor Networks

Author(s): P. Balamurugan | K. Duraiswamy
Volume: 7
Issue: 9
Year: 2011
Medical Image Compression Using Fuzzy C-Means Based Contourlet Transform

Author(s): M. Tamilarasi | V. Palanisamy
Volume: 7
Issue: 9
Year: 2011
A Review of Covering Arrays and Their Application to Software Testing

Author(s): Bestoun S. Ahmed | Kamal Z. Zamli
Volume: 7
Issue: 9
Year: 2011
Algorithms for the Detection of Defects in GUI Applications

Author(s): B. U. Maheswari | S. Valli
Volume: 7
Issue: 9
Year: 2011
Human Face Detection and Recognition using Web-Cam

Author(s): Petcharat Pattanasethanon | Charuay Savithi
Volume: 8
Issue: 9
Year: 2012
Ontology Mapping of Indian Medicinal Plants with Standardized Medical Terms

Author(s): G. Vadivu | S. Waheeta Hopper
Volume: 8
Issue: 9
Year: 2012
A Methodological Framework for Software Safety in Safety Critical Computer Systems

Author(s): P. V. Srinivas Acharyulu | P. Seetharamaiah
Volume: 8
Issue: 9
Year: 2012
Evaluation on Score Reliability for Biometric Speaker Authentication Systems

Author(s): Muhammad Hazim Hasan | Haryati Jaafar | Dzati Athiar Ramli
Volume: 8
Issue: 9
Year: 2012
Fetal Electrocardiogram Extraction Using Let Techniques

Author(s): S. Hemajothi | K. Helen Prabha
Volume: 8
Issue: 9
Year: 2012
Tasks Scheduling Using Ant Colony Optimization

Author(s): G. Umarani Srikanth | V. Uma Maheswari | A. P. Shanthi
Volume: 8
Issue: 9
Year: 2012
A Computational Trust Model for Collaborative Ventures

Author(s): Mohd Mokhtar | Weigang Wang
Volume: 8
Issue: 9
Year: 2012
A Study on Nuclear Blast Overpressure on Buildings and other infrastructures using Geospatial Technology

Author(s): C. Vijayaraghavan | D. Thirumalaivasan | R. Venkatesan
Volume: 8
Issue: 9
Year: 2012
End to End Delay Improvement in Heterogeneous Multicast Network using Genetic Optimization

Author(s): V. Chandrasekar | K. Baskaran
Volume: 8
Issue: 9
Year: 2012
Neural Networks Based Nonlinear Time Series Regression for Water Level Forecasting of Dungun River

Author(s): Siti Hajar Arbain | Antoni Wibowo
Volume: 8
Issue: 9
Year: 2012
An Effective Biogeography Based Optimization Algorithm to Slove Economic Load Dispatch Problem

Author(s): M. Vanitha | K. Thanushkodi
Volume: 8
Issue: 9
Year: 2012
Wireless Sensor Networks Fault Identification Using Data Association

Author(s): T. Abirami Kongu | P. Thangaraj | P. Priakanth Kongu
Volume: 8
Issue: 9
Year: 2012
Current Trust Inference Mechanisms in Web Based Social Networks

Author(s): Zeinab Dehghan | Yahya AlMurtadha | Lai Ngan Kuen | Zailan Abdul Salam
Volume: 8
Issue: 9
Year: 2012
Examination of Plastic Filter on 1×N Fused-Taper-Twisted Polymer Optical Fiber Demultiplexer

Author(s): Mohammad Syuhaimi Ab-Rahman | Latifah Sarah Supian
Volume: 8
Issue: 9
Year: 2012
Speed Control of Switched Reluctance Motor Using New Hybrid Particle Swarm Optimization

Author(s): T. V. Mahendiran | K. Thanushkodi | P. Thangam
Volume: 8
Issue: 9
Year: 2012
Impact of Algorithms for the Extraction of Minutiae Points in Fingerprint Biometrics

Author(s): Sudha S. Ponnarasi | M. Rajaram
Volume: 8
Issue: 9
Year: 2012
A Generic Charging Policy Based Accounting for Web Services

Author(s): V. MuthuLakshmi | Sheila Anand
Volume: 8
Issue: 9
Year: 2012
Poetry Classification Using Support Vector Machines

Author(s): Noraini Jamal | Masnizah Mohd | Shahrul Azman Noah
Volume: 8
Issue: 9
Year: 2012
Comparison of Question Answering Systems Based on Ontology and Semantic Web in Different Environment

Author(s): S. Kalaivani | K. Duraiswamy
Volume: 8
Issue: 9
Year: 2012
Decoupling and Linearizing of a pH Plant using Hirschorn’s and Genetic Algorithms

Author(s): D. Subbulekshmi | J. Kanakaraj
Volume: 8
Issue: 9
Year: 2012
Network Planning and Optimization for Multi-Hop Relay Placement in WiMAX Networks

Author(s): Chutima Prommak | Chitapong Wechtaison
Volume: 8
Issue: 9
Year: 2012
Fuzzy Cost Enabled Cluster Based Multipath Routing Algorithm for Mobile Ad-Hoc Networks

Author(s): M. Gomathi | G. Rajendran
Volume: 8
Issue: 9
Year: 2012
A New Approach for Sub-Channels Assignment in Downlink Fourth Generation Mobile Systems

Author(s): Fakhreddine Khelifa | Abdelaziz Samet
Volume: 7
Issue: 9
Year: 2011
Optimizing Title and Meta Tags Based on Distribution of Keywords; Lexical and Semantic Approaches

Author(s): Mohammad Farahmand, | Abu B.M.D. Sultan | Masrah A.A. Murad | Fatimah Sidi
Volume: 7
Issue: 9
Year: 2011
Handling Fragmented Database Replication through Binary Vote Assignment Grid Quorum

Author(s): Ainul A.C. Fauzi | A. Noraziah | Noriyani M. Zain | A. H. Beg | Nawsher Khan | Elrasheed I. Sultan
Volume: 7
Issue: 9
Year: 2011
An Automatic Topic Identification Algorithm

Author(s): Hossein S. Baghdadi | Bali Ranaivo-Malançon
Volume: 7
Issue: 9
Year: 2011
Finite Element Study of the Stress Response of Bi-Directional Corrugated-Strip Core Sandwich Beam

Author(s): Suphattharachai Chomphan | Manit Leekitwattana
Volume: 7
Issue: 9
Year: 2011
Fast Algorithms for Discovering Sequential Patterns in Massive Datasets

Author(s): S. Dharani | Justus Rabi | Nanda Kumar | Darly
Volume: 7
Issue: 9
Year: 2011
Koch Curves: Rewriting System, Geometry and Application

Author(s): Mamta Rani | Riaz Ul Haq | Norrozila Sulaiman
Volume: 7
Issue: 9
Year: 2011
Combined Heuristic Technique for Optimization of Bloom Filter in Spam Filtering

Author(s): Arulanand Natarajan | S. Subramanian | K. Premalatha
Volume: 7
Issue: 9
Year: 2011
Decoupling and Linearizing of a pH Plant using Hirschorn’s and Genetic Algorithms

Author(s): D. Subbulekshmi | J. Kanakaraj
Volume: 8
Issue: 9
Year: 2012
Examination of Plastic Filter on 1×N Fused-Taper-Twisted Polymer Optical Fiber Demultiplexer

Author(s): Mohammad Syuhaimi Ab-Rahman | Latifah Sarah Supian
Volume: 8
Issue: 9
Year: 2012
Optimization Techniques To Record Deduplication

Author(s): Deepa Karunakaran | Rangarajan Rangaswamy
Volume: 8
Issue: 9
Year: 2012
Accelerated Search for Gaussian Generator Based on Triple Prime Integers

Author(s): Boris S. Verkhovsky | Md S. Sadik
Volume: 5
Issue: 9
Year: 2009
Throughput-Delay Trade-Off for Slotted Aloha Multiple Access with Capture Effect

Author(s): A. Chehri | P. Fortier | P. M. Tardif
Volume: 5
Issue: 9
Year: 2009
Utility-Based Policy Management System for Virtual Organization

Author(s): Anas J.A. Husain | Chan H. Yong
Volume: 5
Issue: 9
Year: 2009
Impact of MD5 Authentication on Routing Traffic for the Case of: EIGRP, RIPv2 and OSPF

Author(s): K. A. Al-Saud | H. M. Tahir | M. Saleh | M. Saleh
Volume: 4
Issue: 9
Year: 2008
Object Oriented and Multi-Scale Image Analysis: Strengths, Weaknesses, Opportunities and Threats-A Review PDF available

Author(s): B. Naga Jyothi | G.R. Babu | I.V. Murali Krishna
Volume: 4
Issue: 9
Year: 2008
The Relationship between Exclusive-Or and the Unique Existential Quantifier

Author(s): M. A. Nabulsi | A. M. Abdalla
Volume: 4
Issue: 9
Year: 2008
Arabic Speech Pathology Therapy Computer Aided System

Author(s): Z. A. Benselama | M. Guerti | M. A. Bencherif
Volume: 3
Issue: 9
Year: 2007
Support Measure Admissibility Based on Operations on Instance Graphs

Author(s): F. L. Gaol
Volume: 3
Issue: 9
Year: 2007
Rotational Linear Discriminant Analysis Using Bayes Rule for Dimensionality Reduction

Author(s): Alok Sharma | Kuldip K. Paliwal
Volume: 2
Issue: 9
Year: 2006
A Backpropagation Neural Network for Computer Network Security

Author(s): Khalil Shihab
Volume: 2
Issue: 9
Year: 2006
Design of an IP Library for the Synthesis of Image Compression Systems

Author(s): Chokri Souani | Ihsen Gazzah | Kamel Besbes
Volume: 2
Issue: 9
Year: 2006
A Large Block Cipher Using Modular Arithmetic Inverse of a Key Matrix and Mixing of the Key Matrix and the Plaintext

Author(s): V. U.K.. Sastry | S. U. Kumar | A. V. babu
Volume: 2
Issue: 9
Year: 2006
Modified Hill Cipher with Key Dependent Permutation and Circular Rotation

Author(s): V. U.K. Sastry
Volume: 3
Issue: 9
Year: 2007
FUZZY ROUND ROBIN CPU SCHEDULING ALGORITHM

Author(s): Bashir Alam
Volume: 9
Issue: 8
Year: 2013
FORMAL VERIFICATION OF SAFETY MESSAGE DISSEMINATION PROTOCOL FOR VANETS

Author(s): M. A. Berlin | Sheila Anand
Volume: 9
Issue: 8
Year: 2013
SPECTRAL DOMAIN FEATURES FOR OVARIAN CANCER DATA ANALYSIS

Author(s): Ahmed Farag Seddik | Riham Amin Hassan | Mahmoud A. Fakhreldein
Volume: 9
Issue: 8
Year: 2013
INJECT AN ELASTIC GRID COMPUTING TECHNIQUES TO OPTIMAL RESOURCE MANAGEMENT TECHNIQUE OPERATIONS

Author(s): R. Surendran | B. Parvatha Varthini
Volume: 9
Issue: 8
Year: 2013
NEW BURST ASSEMBLY AND SCHEDULING TECHNIQUE FOR OPTICAL BURST SWITCHING NETWORKS

Author(s): V. Kavitha | V. Palanisamy
Volume: 9
Issue: 8
Year: 2013
IMPROVING DATA AVAILABILITY IN MOBILE ENVIRONMENT USING DATA ALLOCATION

Author(s): Moaiad Ahmad Khder | Zulaiha Ali Othman | AbdullahMohdZin | Salha Abdullah
Volume: 9
Issue: 8
Year: 2013
USER RECOMMENDATION ALGORITHM IN SOCIAL TAGGING SYSTEM BASED ON HYBRID USER TRUST

Author(s): Norwati Mustapha | Wong Pei Voon | Nasir Sulaiman
Volume: 9
Issue: 8
Year: 2013
THE DYNAMIC NONCE BASED AUTHENTICATION SCHEME TO DEFEND INTERMEDIARY ATTACK FOR WEB SERVICES

Author(s): Elangovan Uma | Arputharaj Kannan
Volume: 9
Issue: 8
Year: 2013
DESIGN OF FUZZY LOGIC CONTROLLER FOR ONLINE SPEED REGULATION OF DC MOTOR USING PWM TECHNIQUE BASED ON LABORATORY VIRTUAL INSTRUMENT ENGINEERING WORKBENCH

Author(s): Prema Kannan | Senthil Kumar Natarajan | Subhransu Sekar Dash
Volume: 9
Issue: 8
Year: 2013
ON-THE-FLY KEY GENERATION FOR AN EFFICIENT ROAD SIDE UNITS BASED AUTHENTICATION IN VEHICULAR NETWORKS

Author(s): Ashraph Sulaiman | S. V. Kasmir Raja | Sung Han Park
Volume: 9
Issue: 8
Year: 2013
OPTIMIZATION OF TEST CASES BY PRIORITIZATION

Author(s): T. Prem Jacob | T. Ravi
Volume: 9
Issue: 8
Year: 2013
TRANSMISSION CONTROL PROTOCOL PERFORMANCE COMPARISON USING PIGGYBACK SCHEME IN WLANS

Author(s): Ali Ahmad Milad | Zul Azri Bin Muhamad Noh | Abdul Samad Shibghatullah | Shahrin Sahib | Rabiah Ahmad | Mustafa Almahdi Algaet
Volume: 9
Issue: 8
Year: 2013
A NOVEL APPROACH BASED ON GENETIC FUZZY CLUSTERING AND ADAPTIVE NEURAL NETWORKS FOR SALES FORECASTING

Author(s): Attariuas Hichama | Bouhorma Mohameda | El Fallahi Abdellahb
Volume: 9
Issue: 8
Year: 2013
AN EFFICIENT CELL PLACEMENT USING GRAVITATIONAL SEARCH ALGORITHMS

Author(s): Rose Al Qasem | Taisir Eldos
Volume: 9
Issue: 8
Year: 2013
Microcontroller Based Power Supply

Author(s): Tanvir S. Mundra | Er. S.S. Sachdeva | K. S. Kahlon
Volume: 2
Issue: 8
Year: 2006
A Novel Service Mobility Architecture for SIP Environments

Author(s): Thierno Bah | Samuel Pierre | Roch Glitho
Volume: 3
Issue: 8
Year: 2007
Operational Semantics for Lazy Evaluation

Author(s): Mahmoud A. AbouGhaly | Sameh S. Daoud | Azza A. Taha | Salwa M. Aly
Volume: 3
Issue: 8
Year: 2007
An Innovative Technique of Texture Classification and Comparison Based on Long Linear Patterns

Author(s): V. V. Kumar | B. E. Reddy | U. S.N. Raju | K. C. Sekharan
Volume: 3
Issue: 8
Year: 2007
Automated Breast Cancer Diagnosis based on GVF-Snake Segmentation, Wavelet Features Extraction and Neural Network Classification

Author(s): Abderrahim Sebri | Jihène Malek | Rached Tourki
Volume: 3
Issue: 8
Year: 2007
Information Extraction from Hypertext Mark-Up Language Web Pages

Author(s): Mahmoud Shaker | Hamidah Ibrahim | Aida Mustapha | Lili N. Abdullah
Volume: 5
Issue: 8
Year: 2009
Wavelet-Based Geometry Coding for Three Dimensional Mesh Using Space Frequency Quantization

Author(s): Shymaa T. El-Leithy | Walaa M. Sheta
Volume: 5
Issue: 8
Year: 2009
An Improved Genetic Algorithm Based on Adaptive Repair Operator for Solving the Knapsack Problem

Author(s): Sunanda Gupta | M. L. Garg
Volume: 5
Issue: 8
Year: 2009
A Hybrid Model for Load Aware Trust Management in Grid

Author(s): K. Selvi | R. S.D. Wahida Banu
Volume: 7
Issue: 8
Year: 2011
Data Relay Clustering Algorithm for Wireless Sensor Networks: A Data Mining Approach

Author(s): S. Nithyakalyani | S. Suresh Kumar
Volume: 8
Issue: 8
Year: 2012
A Network Management Framework Using Mobile Agents

Author(s): Jonathan Lefebvre | Steven Chamberland | Samuel Pierre
Volume: 2
Issue: 8
Year: 2006
Improving the Ranking Capability of the Hyperlink Based Search Engines Using Heuristic Approach

Author(s): Haider A. Ramadhan | Khalil Shihab | Jafar H. Ali
Volume: 2
Issue: 8
Year: 2006
Some Enabling Technologies for Ubiquitous Systems

Author(s): Junaid A. Chaudhry | Chaudhry S. Hussain | Seungkyu Park
Volume: 2
Issue: 8
Year: 2006
A Web-Based E-Learning System Using Semantic Web Framework

Author(s): Fayed F.M. Ghaleb | Sameh S. Daoud | Ahmad M. Hasna | Jihad M. Jaam | Hosam F. El-Sofany
Volume: 2
Issue: 8
Year: 2006
Parallelisation of Algorithms of Mathematical Morphology

Author(s): Abdallah Boukerram | Samira A.K. Azzou
Volume: 2
Issue: 8
Year: 2006
Teaching Computer Organization and Architecture Using Simulation and FPGA Applications

Author(s): D. K.M. Al-Aubidy
Volume: 3
Issue: 8
Year: 2007
Recovery in Distributed Systems from Transient and Permanent Faults

Author(s): M. Aliouat | Z. Aliouat
Volume: 3
Issue: 8
Year: 2007
Rule Extraction from Radial Basis Functional Neural Networks by Using Particle Swarm Optimization

Author(s): M. R. Senapati | I. Vijaya | P. K. Dash
Volume: 3
Issue: 8
Year: 2007
Ad Hoc Mobile Wireless Networks Routing Protocols - A Review

Author(s): Geetha Jayakumar | G. Gopinath
Volume: 3
Issue: 8
Year: 2007
An Improved Resource Reservation Protocol

Author(s): Desire Oulai | Steven Chamberland | Samuel Pierre
Volume: 3
Issue: 8
Year: 2007
Efficient Technique to Detect the Region of Interests in Mammogram Images

Author(s): Moussa H. Abdallah | Ayman A. AbuBaker | Rami S. Qahwaji | Mohammed H. Saleh
Volume: 4
Issue: 8
Year: 2008
Multi Directional Geographical Traceback with n Directions Generalization

Author(s): S. Karthik | V. P. Arunachalam | T. Ravichandran
Volume: 4
Issue: 8
Year: 2008
An Efficient Algorithm for Mining Maximal Frequent Item Sets

Author(s): A. M.J.M.Z. Rahman | P. Balasubramanie
Volume: 4
Issue: 8
Year: 2008
Genetic Algorithm Based Probabilistic Motif Discovery in Unaligned Biological Sequences

Author(s): M. Hemalatha | K. Vivekanandan
Volume: 4
Issue: 8
Year: 2008
Graph Based Segmentation in Content Based Image Retrieval

Author(s): P. S. Suhasini | K. S.R. Krishna | I. V.M. Krishna
Volume: 4
Issue: 8
Year: 2008
Constructing a Grid Simulation for E-Governance Applications Using GridSim

Author(s): Mrs. P. Sumathi | M. Punithavalli
Volume: 4
Issue: 8
Year: 2008
Classification by Discriminant Analysis of Energy in View of the Detection of Accented Syllables in Standard Arabic

Author(s): Chentir | A. M. Guerti | D. J. Hirst
Volume: 4
Issue: 8
Year: 2008
Detection of Respiratory Abnormalities Using Artificial Neural Networks

Author(s): Mahdi J. Baemani | Amirhasan Monadjemi | Payman Moallem
Volume: 4
Issue: 8
Year: 2008
Memory Tracing

Author(s): Eva Cogan | Chaya Gurwitz
Volume: 5
Issue: 8
Year: 2009
Personal Computer Based Clinical Programming Software for Auditory Prostheses

Author(s): K. Rajakumar | P. S. Ramaiah
Volume: 5
Issue: 8
Year: 2009
Separable Watermarking Technique Using the Biological Color Model

Author(s): David Nino | Moussa Abdallah | Bassam Hammo
Volume: 5
Issue: 8
Year: 2009
Message Based Random Variable Length Key Encryption Algorithm

Author(s): Hamid Mirvaziri | Kasmiran J.M. Ismail | Zurina M. Hanapi
Volume: 5
Issue: 8
Year: 2009
Reducing Broadcast Overhead Using Clustering Based Broadcast Mechanism in Mobile Ad Hoc Network

Author(s): N. Karthikeyan | V. Palanisamy | K. Duraiswamy
Volume: 5
Issue: 8
Year: 2009
Digital Video Watermarking in the Discrete Cosine Transform Domain

Author(s): Sadik A.M. Al-Taweel | Putra Sumari | Saleh A.K. Alomari | Anas J.A. Husain
Volume: 5
Issue: 8
Year: 2009
Sensorization of Robotic Hand Using Optical Three-Axis Tactile Sensor: Evaluation with Grasping and Twisting Motions

Author(s): Hanafiah Yussof | Jiro Wada | Masahiro Ohka
Volume: 6
Issue: 8
Year: 2010
Stroke Motion Learning for a Humanoid Robotic Ping-Pong Player Using a Novel Motion Capture System

Author(s): C. H. Lai | T. I.J. Tsay
Volume: 6
Issue: 8
Year: 2010
A New Approach in Design and Operating Principle of Silicone Tactile Sensor

Author(s): Bakri Ali | Rozaini Othman | Rasdi Deraman | Muhammad A. Ayub
Volume: 6
Issue: 8
Year: 2010
Response of SAI Afferents May Play a Role in the Perception of Velvet Hand Illusion

Author(s): Abdullah Chami | Masahiro Ohka | Yuji Kawabe | Hanafiah B. Yussof
Volume: 6
Issue: 8
Year: 2010
Underactuated Anthropomorphic Finger Mechanism for Grasping and Pinching with Optimized Parameter

Author(s): Norsinnira Z. Azlan | Yamaura Hiroshi
Volume: 6
Issue: 8
Year: 2010
Lower-Dimensional Feature Sets for Template-Based Motion Recognition Approaches

Author(s): M.D. A.R. Ahad | J. Tan | H. Kim | S. shikawa
Volume: 6
Issue: 8
Year: 2010
Rehabilitation of a Human Arm Supported by a Robotic Manipulator: A Position/Force Cooperative Control

Author(s): Haifa Mehdi | Olfa Boubaker
Volume: 6
Issue: 8
Year: 2010
Development of an Ultra-Miniaturized Inertial Measurement Unit for Jaw Movement Analysis during Free Chewing

Author(s): Zhuohua Lin | Massimiliano Zecca | Salvatore Sessa | Hiroyuki Ishii | Atsuo Takanishi
Volume: 6
Issue: 8
Year: 2010
Control of a Step Walking Combined to Arms Swinging for a Three Dimensional Humanoid Prototype

Author(s): Amira Aloulou | Olfa Boubaker
Volume: 6
Issue: 8
Year: 2010
Design of a Distributed Control System Using a Personal Computer and Micro Control Units for Humanoid Robots

Author(s): Mitsuhiro Yamano | Akihiro Ochiai | Yuichi Suzukawa | Hanafiah Yussof | Masahiro Ohka | Yasuo Nasu
Volume: 6
Issue: 8
Year: 2010
Programmable System on Chip Distributed Communication and Control Approach for Human Adaptive Mechanical System

Author(s): Ahmad A.M. Faudzi | K. Suzumori
Volume: 6
Issue: 8
Year: 2010
Model Predictive Approach to Precision Contouring Control for Feed Drive Systems

Author(s): A. E. M. | N. Uchyiama,
Volume: 6
Issue: 8
Year: 2010
Design For Test Technique for Leakage Power Reduction in Nanoscale Static Random Access Memory

Author(s): N. M. Sivamangai | Gunavathi
Volume: 7
Issue: 8
Year: 2011
Multilingual Database Management System: A Performance Evaluation

Author(s): Nurul H.M. Saad | Hamidah Ibrahim
Volume: 7
Issue: 8
Year: 2011
Improvement of Image Matching by using the Proximity Criterion: Application to Omnidirectional and Perspective Images

Author(s): Ibrahim Guelzim | Ahmed Hammouch | Driss Aboutajdine
Volume: 7
Issue: 8
Year: 2011
Implementing Rede Universitaria de Telemedicina Usability-the Brazilian Telemedicine University Network

Author(s): Wilson Coury | Jose L.R. Filho | Luiz A. Messina | Nelson Simoes
Volume: 7
Issue: 8
Year: 2011
Flooding Distributed Denial of Service Attacks-A Review

Author(s): Khadijah W.M. Ghazali | Rosilah Hassan
Volume: 7
Issue: 8
Year: 2011
An Effective Contributory Re-Keying Approach to Compute Conference Key

Author(s): D. Thilagavathy | M. Rajaram
Volume: 7
Issue: 8
Year: 2011
Enhancing the Color Set Partitioning in Hierarchical Tree (SPIHT) Algorithm Using Correlation Theory

Author(s): a a a | M. Santhi | R. S.D. Wahida Banu
Volume: 7
Issue: 8
Year: 2011
An Enhanced Approach for Medical Brain Image Enhancement

Author(s): J. Umamaheswari | G. Radhamani
Volume: 8
Issue: 8
Year: 2012
Feature Fusion in Improving Object Class Recognition

Author(s): Noridayu Manshor | Amir Rizaan Abdul Rahiman | Mandava Rajeswari | Dhanesh Ramachandram
Volume: 8
Issue: 8
Year: 2012
Tasks Scheduling using Ant Colony Optimization

Author(s): G. Umarani Srikanth | V. Uma Maheswari | A. P. Shanthi | Arul Siromoney
Volume: 8
Issue: 8
Year: 2012
Automatic Detection of Exudates in Diabetic Retinopathy Images

Author(s): Kittipol Wisaeng | Nualsawat Hiransakolwong | Ekkarat Pothiruk
Volume: 8
Issue: 8
Year: 2012
Sleeping Cluster based Medium Access Control Layer Routing Protocol for Wireless Sensor Networks

Author(s): T. Nagamalar | T. R. Rangaswamy
Volume: 8
Issue: 8
Year: 2012
Arabic Named Entity Recognition Using Artificial Neural Network

Author(s): Naji F. Mohammed | Nazlia Omar
Volume: 8
Issue: 8
Year: 2012
Blind Digital Image Watermarking Robust Against Histogram Equalization

Author(s): G. S. Kalra | R. Talwar | H. Sadawarti
Volume: 8
Issue: 8
Year: 2012
Dynamic Route Shortening and Route Repairing Mechanism for Mobile Ad Hoc Networks

Author(s): S. Revathi | T. R. Rangaswamy
Volume: 8
Issue: 8
Year: 2012
Model Refinement in the Model Driven Architecture Context

Author(s): Luciane Telinski Wiedermann Agner | Inali Wisniewski Soares | Paulo Cezar Stadzisz | Jean Marcelo Simao
Volume: 8
Issue: 8
Year: 2012
A Fuzzy Logic Based Power Control for Wideband Code Division Multiple Access Wireless Networks

Author(s): N. Mohan | T. Ravichandran
Volume: 8
Issue: 8
Year: 2012
An Efficient Bayesian Nearest Neighbor Search Using Marginal Object Weight Ranking Scheme in Spatial Databases

Author(s): K. Balasaravanan | K. Duraiswamy
Volume: 8
Issue: 8
Year: 2012
Testing Randomness: Poker Test with Hands of Three Numbers

Author(s): Wael Mohamed Fawaz Abdel-Rehim | Ismail Amr Ismail | Ehab Morsy
Volume: 8
Issue: 8
Year: 2012
Empirical Performance Metrics Study of Execution of Database Queries in Implementation of Web Services

Author(s): K. Velmurugan | M. A. Maluk Mohamed
Volume: 8
Issue: 8
Year: 2012
A Policy Based Scheme for Combined Data Security in Mobile Ad hoc Networks

Author(s): L. Kartheesn | S. K. Srivatsa
Volume: 8
Issue: 8
Year: 2012
A Comparative Study of Enterprise Resource Planning Vs Service Oriented Architecture in Small Medium Enterprises

Author(s): Ali Taei Zadeh | Muriati Mukhtar | Shahnorbanun Sahran
Volume: 8
Issue: 8
Year: 2012
Minimizing Interference in Wireless Mesh Networks Based Telemedicine System

Author(s): Mohammad Siraj | Kamalrulnizam Abu Bakar
Volume: 8
Issue: 8
Year: 2012
Factors Affecting the Choice of Software Life Cycle Models in the Software Industry-An Empirical Study

Author(s): Rupa Mahanti | M. S. Neogi | Vandana Bhattacherjee
Volume: 8
Issue: 8
Year: 2012
Application of Near Field Communication Technology for Mobile Airline Ticketing

Author(s): Wayan Suparta
Volume: 8
Issue: 8
Year: 2012
Performances of Partition Utility Accrual Real Time Scheduling Algorithm

Author(s): Idawaty Ahmad | Shamala Subramaniam | Mohamed Othman | Zuriati Zulkarnain
Volume: 8
Issue: 8
Year: 2012
Online Forums Hotspot Prediction Based on Sentiment Analysis

Author(s): K. Nirmala Devi | V. Murali Bhaskarn
Volume: 8
Issue: 8
Year: 2012
Context Aware Middleware Model for Handling Vehicular Safety Issues

Author(s): Arunkumar Thangavelu | R. A.K. Saravanaguru
Volume: 8
Issue: 8
Year: 2012
The Public User's Role in Breast Self-Examination Teleconsultation System Development: Modified User-Created Content Approach

Author(s): Norayu A. Talib | Nasriah Zakaria | Sureswaran Ramadass | Faten Damanhoori
Volume: 7
Issue: 8
Year: 2011
A Stringent Authorization using Principles and Policy for Grid Computing

Author(s): A. R. Jayasudha | T. Purusothaman
Volume: 7
Issue: 8
Year: 2011
Evaluating the Performance of Equitable Dominating based Content Distribution Network Design

Author(s): Amutharaj Joyson | Radhakrishnan Shanmugasundaram
Volume: 7
Issue: 8
Year: 2011
A Quality of Service Broker Based Process Model for Dynamic Web Service Composition

Author(s): Maya Rathore | Ugrasen Suman
Volume: 7
Issue: 8
Year: 2011
Automatic Boundary Detection of Wall Motion in Two-dimensional Echocardiography Images

Author(s): Faten A.A. Dawood | Rahmita W. Rahmat | Mohd Z. Dimon | Lili Nurliyana | Suhaini B. Kadiman
Volume: 7
Issue: 8
Year: 2011
An Appearance based Method for Eye Gaze Tracking

Author(s): S. V. Sheela | P. A. Vijaya
Volume: 7
Issue: 8
Year: 2011
Fault Tolerant Control Using Proportional-Integral-Derivative Controller Tuned by Genetic Algorithm

Author(s): S. Kanthalakshmi | V. Manikandan
Volume: 7
Issue: 8
Year: 2011
Performance Analysis of Different Optical Switching Architectures

Author(s): Salman A. Al-Qahtani
Volume: 7
Issue: 8
Year: 2011
Development of Wideband Planar Inverted-F Antennas for Wireless Application

Author(s): Saida Ibnyaich | Abdelilah Ghammaz | Moha M.R. Hassani
Volume: 7
Issue: 8
Year: 2011
Integrating Components in Software Product Line to Build High Quality Products

Author(s): Lena Khaled
Volume: 7
Issue: 8
Year: 2011
Acknowledgment based Reputation Mechanism to Mitigate the Node Misbehavior in Mobile Ad Hoc Networks

Author(s): K. Gopalakrishnan | V. R. Uthariaraj
Volume: 7
Issue: 8
Year: 2011
A Secure Simple Authenticated Key Exchange Algorithm based Authentication for Social Network

Author(s): P. Venkateswari | T. Purusothaman
Volume: 7
Issue: 8
Year: 2011
A Neuro Fuzzy Technique for Process Grain Scheduling of Parallel Jobs

Author(s): S. V. Sudha | K. Thanushkodi
Volume: 7
Issue: 8
Year: 2011
Deduction of Oral Cancer Using Fuzzy Linear Regression

Author(s): S. Arulchinnappan | K. Karunakaran | G. Rajendran
Volume: 7
Issue: 8
Year: 2011
A Discrete Event Simulation Framework for Utility Accrual Scheduling Algorithm in Uniprocessor Environment

Author(s): Idawaty Ahmad | Shamala Subramaniam | Mohamed Othman | Zuriati Zulkarnain
Volume: 7
Issue: 8
Year: 2011
Edge Tracing Manipulation of Clothes Based on Different Gripper Types

Author(s): Khairul S.M. Sahari | H. Seki | Y. Kamiya | M. Hikizu
Volume: 6
Issue: 8
Year: 2010
Evolution of Neural Controllers for Robot Navigation in Human Environments

Author(s): Genci Capi | Hideki Toda
Volume: 6
Issue: 8
Year: 2010
Hybrid Algorithm for Lossless Image Compression using Simple Selective Scan order with Bit Plane Slicing

Author(s): A. Pasumpon Pandian | S. N. Sivanandam
Volume: 8
Issue: 8
Year: 2012
Shot Detection Using Genetic Edge Histogram and Object Based Video Retrieval Using Multiple Features

Author(s): R. Kanagavalli | K. Duraiswamy
Volume: 8
Issue: 8
Year: 2012
Comparison of Speech Features on the Speech Recognition Task

Author(s): Iosif Mporas | Todor Ganchev | Mihalis Siafarikas | Nikos Fakotakis
Volume: 3
Issue: 8
Year: 2007
An Efficient Algorithm for Capacitated Multifacility Location Problems

Author(s): Chansiri Singhtaun | Peerayuth Charnsethikul | Chansiri Singhtaun | Peerayuth Charnsethikul
Volume: 3
Issue: 8
Year: 2007
Mathematical Attacks on RSA Cryptosystem

Author(s): Imad K. Salah | Abdullah Darwish | Saleh Oqeili
Volume: 2
Issue: 8
Year: 2006
Comparison of Approaches for Predicting Break Indices in Mandarin Speech Synthesis

Author(s): Shao Yan-qiu | Zhao Yong-zhen | Han Ji-qing | Liu Ting
Volume: 2
Issue: 8
Year: 2006
Contour Following Task with Dual Sensor Logic Algorithm for Adept Selective Compliant Assembly Robot Arm Robot

Author(s): Anton S. Prabuwono | Samsi M. Said | Riza Sulaiman | Elankovan Sundararajan
Volume: 5
Issue: 8
Year: 2009
Some Enabling Technologies for Ubiquitous Networks PDF available

Author(s): Junaid Ahsenali Chaudhry | Seungkyu Park | Chaudhry Sajjad Hussain
Volume: 2
Issue: 8
Year: 2006
COST-EFFECTIVE WIRE-HARNESS MODEL BY USING POLYMER OPTICAL FIBER

Author(s): Mohammad Syuhaimi Ab-Rahman | Farshad Nasimi Khameneh
Volume: 9
Issue: 7
Year: 2013
HUMAN VISUAL SENSITIVITY GUIDED BIT EMBEDDING FOR VIDEO STEGANOGRAPHY

Author(s): S. Balu | K. Amudha | D. C. Nelson Kennedy Babu
Volume: 9
Issue: 7
Year: 2013
ARABIC PERSON NAMES RECOGNITION BY USING A RULE BASED APPROACH

Author(s): Mohammed Aboaoga | Mohd Juzaiddin Ab Aziz
Volume: 9
Issue: 7
Year: 2013
PERFORMANCE EVALUATION OF PROBABILISTIC RELAY IN AD HOC ON-DEMAND DISTANCE VECTOR AND AD HOC ON-DEMAND MULTIPATH DISTANCE VECTOR UNDER HIGHLY DYNAMIC ENVIRONMENTS

Author(s): Radityo Anggoro | Teruaki Kitasuka | Ryoji Nakamura | Masayoshi Aritsugi
Volume: 9
Issue: 7
Year: 2013
TEXT STEGANOGRAPHY BASED ON FONT TYPE IN MS-WORD DOCUMENTS

Author(s): Wesam Bhaya | Abdul Monem Rahma | Dhamyaa AL-Nasrawi
Volume: 9
Issue: 7
Year: 2013
QUERY TRANSLATION USING CONCEPTS SIMILARITY BASED ON QURAN ONTOLOGY FOR CROSS-LANGUAGE INFORMATION RETRIEVAL

Author(s): Zulaini Yahya | Muhamad Taufik Abdullah | Azreen Azman | Rabiah Abdul Kadir
Volume: 9
Issue: 7
Year: 2013
USING FEATURE SELECTION AS ACCURACY BENCHMARKING IN CLINICAL DATA MINING

Author(s): Jafreen Hossain | Nor FazlidaMohdSani | Aida Mustapha | Lilly SurianiAffendey
Volume: 9
Issue: 7
Year: 2013
THE USE OF RANDOM FOREST CLASSIFICATION AND K-MEANS CLUSTERING ALGORITHM FOR DETECTING TIME STAMPED SIGNATURES IN THE ACTIVE NETWORKS

Author(s): Kamalanaban Ethala | R. Shesadri | N. G. Renganathan
Volume: 9
Issue: 7
Year: 2013
POWER ANALYSIS ON SAME FILTER DIFFERENT SOURCES FOR SELECTION OF SPECTRAL FILTERS IN OPTICAL DEMULTIPLEXER

Author(s): Mohammad Syuhaimi Ab-Rahman | Hadiguna | Latifah Sarah Supian
Volume: 9
Issue: 7
Year: 2013
INTELLIGENT PRODUCT BASED ON MOBILE AGENT TO ACCELERATE THE NEW PRODUCT DEVELOPMENT PROCESS

Author(s): Abdelhak Boulaalam | El Habib Nfaoui | Omar El Beqqali
Volume: 9
Issue: 7
Year: 2013
REAL TIME MULTIGRAPHS FOR COMMUNICATION NETWORKS: AN INTUITIONISTIC FUZZY MATHEMATICAL MODEL

Author(s): Siddhartha Sankar Biswas | Bashir Alam | Mohammad Najmud Doja
Volume: 9
Issue: 7
Year: 2013
EMBEDDED COMPUTER BASED ACTIVE VIBRATION CONTROL SYSTEM FOR VIBRATION REDUCTION OF FLEXIBLE STRUCTURES

Author(s): Venkata Ratnam Tatavolu | Seetha Ramaiah Panchumarthy
Volume: 9
Issue: 7
Year: 2013
FEASIBILITY OF DESKTOP VIRTUALIZATION PER SOFTWARE SERVICES AND LOCAL HARDWARE BASED ON THE NETWORK THROUGHPUT

Author(s): Vitor Chaves De Oliveira | Inacio Henrique Yano | Alexandre De Assis Mota | Lia Toledo Moreira Mota
Volume: 9
Issue: 7
Year: 2013
PREDICTING BATTERY CHARGE DEPLETION IN WIRELESS SENSOR NETWORKS USING RECEIVED SIGNAL STRENGTH INDICATOR

Author(s): Inacio Henrique Yano | Vitor ChavesDe Oliveira | Eric Alberto de Mello Fagotto | Alexandre De Assis Mota | Lia Toledo Moreira Mota
Volume: 9
Issue: 7
Year: 2013
AN IMAGE DITHERING VIA TCHEBICHEF MOMENT TRANSFORM

Author(s): Nur Azman Abu | Ferda Ernawan | Nanna Suryana
Volume: 9
Issue: 7
Year: 2013
Integration of Voxel Colouring Technique in the Volumetric Textures Representation Based on Image Layers

Author(s): Babahenini M. Chaouki | Hemidi Djallel | Djedi Noureddine
Volume: 2
Issue: 7
Year: 2006
An Enhanced Secure and Scalable Model for Enterprise Applications using Automated Monitoring

Author(s): A. Kannammal | V. Ramachandran | N. Ch.S.N. Iyengar
Volume: 2
Issue: 7
Year: 2006
Performance Comparison of Sub Phonetic Model with Input Signal Processing

Author(s): Dr E. Ramaraj | E. Chandra
Volume: 2
Issue: 7
Year: 2006
2D Object Description with Discrete Segments

Author(s): Nbhan D. Salih | David C.L. Ngo | Hakim Mellah
Volume: 2
Issue: 7
Year: 2006
Design of Output Codes for Fast Covering Learning using Basic Decomposition Techniques

Author(s): Aruna Tiwari | Narendra S. Chaudhari
Volume: 2
Issue: 7
Year: 2006
Task Collaborative Resolution Tool for Elearning Environment

Author(s): Samir Zidat | Mahieddine Djoudi
Volume: 2
Issue: 7
Year: 2006
A Secure Time-Stamp Based Concurrency Control Protocol For Distributed Databases

Author(s): Shashi Bhushan | R. B. Patel | Mayank Dave
Volume: 3
Issue: 7
Year: 2007
Security Manager - Key to Restrict the Attacks in Bluetooth

Author(s): Pushpa Suri | Sona Rani
Volume: 3
Issue: 7
Year: 2007
A Web-based Interactive Real Laboratory for Process Engineering Education

Author(s): Maher Chaabene | Kamel Mkaouar | Mohamed Ouali
Volume: 3
Issue: 7
Year: 2007
High-precision Detection of Facial Landmarks to Estimate Head Motions Based on Vision Models

Author(s): Xiaohong W. Gao | Sergey Anishenko | Dmitry Shaposhnikov | Lubov Podlachikova | Stephen Batty | John Clark
Volume: 3
Issue: 7
Year: 2007
Efficient Physical Organization of R-Trees Using Node Clustering

Author(s): F. S. Francis | P. Thambidurai
Volume: 3
Issue: 7
Year: 2007
SSM: Slot Scheduling Mechanisms in a Multihop Wireless Hotspot Network

Author(s): Maan Y. Abdullah
Volume: 3
Issue: 7
Year: 2007
Distributed Clusterhead Architecture for Mobile Ad Hoc Networks

Author(s): Emad Qaddoura | Wesam AlMobaideen | Ahmad Omari
Volume: 2
Issue: 7
Year: 2006
Classification of Squamous Cell Carcinoma Based On Color and Textural Features in Microscopic Images of Esophagus Tissues

Author(s): P. S. Hiremath | Humnabad Y. Iranna | Jagadeesh D. Pujari
Volume: 3
Issue: 7
Year: 2007
Optical Character Recognition System for Arabic Text Using Cursive Multi-Directional Approach

Author(s): Mansoor Al-A'ali | Jamil Ahmad
Volume: 3
Issue: 7
Year: 2007
Proximity Aware Routing in Ad Hoc Networks

Author(s): Valerie Alandzi | Alejandro Quintero
Volume: 3
Issue: 7
Year: 2007
Removing Useless Productions of a Context Free Grammar through Petri Net

Author(s): Mansoor Al-A'ali | Ali A. Khan
Volume: 3
Issue: 7
Year: 2007
Artificial Intelligence Based Three-Phase Unified Power Quality Conditioner

Author(s): Moleykutty George
Volume: 3
Issue: 7
Year: 2007
Semantic Web on Scope: A New Architectural Model for the Semantic Web

Author(s): Haytham T. Al-Feel | Magdy Koutb | Hoda Suoror
Volume: 4
Issue: 7
Year: 2008
Skeleton Primitive Extraction Method on Textures with Different Nonlinear Wavelets

Author(s): V. V. Kumar | U. S.N. Raju | P. Premchand | A. Suresh
Volume: 4
Issue: 7
Year: 2008
Effect of Hidden Layer Neurons on the Classification of Optical Character Recognition Typed Arabic Numerals

Author(s): Nidal F. Shilbayeh | Mahmoud Z. Iskandarani
Volume: 4
Issue: 7
Year: 2008
An Empirical Validation of Object-Oriented Design Metrics for Fault Prediction

Author(s): Jie Xu | Danny Ho | Luiz F. Capretz
Volume: 4
Issue: 7
Year: 2008
A New Enhancement for Security Mechanism in Routers

Author(s): Khalid Khanfar | Riyad Khanfar | Walid Al-Ahmad | Eyas El-Qawasmeh
Volume: 4
Issue: 7
Year: 2008
Human Computer Interaction Approach in Developing Customer Relationship Management

Author(s): Mohd H.N.M. Nasir | Mustaffa Kamal | Wan A.W. Rozali
Volume: 4
Issue: 7
Year: 2008
Implementation of Phonetic Context Variable Length Unit Selection Module for Malay Text to Speech

Author(s): Tian-Swee Tan | Sh-Hussain
Volume: 4
Issue: 7
Year: 2008
Implementation of Low-Memory Reference FFT on Digital Signal Processor

Author(s): Yi-Pin Hsu | Shin-Yu Lin
Volume: 4
Issue: 7
Year: 2008
A Novel Routing Technique against Packet Dropping Attack in Adhoc Networks

Author(s): N. Bhalaji | Sinchan banerjee | A. Shanmugam
Volume: 4
Issue: 7
Year: 2008
Synthesizing Behavioral Model of Event-Based Requirements

Author(s): Seyyed M. Babamir
Volume: 4
Issue: 7
Year: 2008
Solving Protein Folding Problem using Elitism-Based Compact Genetic Algorithm

Author(s): Amr Badr | Ibtehal M. Aref | Basma M. Hussien | Yosr Eman
Volume: 4
Issue: 7
Year: 2008
Dynamic Traffic Light Sequence Algorithm Using RFID

Author(s): Khalid A.S. Al-Khateeb | Jaiz A.Y. Johari | Wajdi F. Al-Khateeb
Volume: 4
Issue: 7
Year: 2008
An Improved Handwritten Tamil Character Recognition System using Octal Graph

Author(s): R. J. Kannan | R. Prabhakar
Volume: 4
Issue: 7
Year: 2008
Animation of Natural Language Specifications of Authentication Protocols

Author(s): Mabroka A. Mayouf | Zarina Shukur
Volume: 4
Issue: 7
Year: 2008
Why do you need a reservation system?      Affiliate Program