Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science and Information Security

ISSN: 1947--5500
Publisher: LJS Publisher and IJCSIS Press


ADD TO MY LIST
 
Cloned Agent based data computed in Homogeneous sensor networks

Author(s): S. Karthikeyan | S.Jayashri
Volume: 10
Issue: 9
Year: 2012
Hybrid Model of Rough Sets & Neural Network for Classifying Renal stones Patient

Author(s): Shahinda Mohamed Al Kholy | Ahmed Abo Al Fetoh Saleh | Aziza Asem | Khaled Z. Sheir
Volume: 10
Issue: 9
Year: 2012
Identifying Critical Features For Network Forensics Investigation Perspectives

Author(s): Ikuesan R. Adeyemi | Shukor Abd Razak | Nor Amira Nor Azhan
Volume: 10
Issue: 9
Year: 2012
Face Recognition By Fusing Subband Images And PCA

Author(s): T. Mohandoss | R. Thiyagarajan | S. Arulselvi
Volume: 10
Issue: 9
Year: 2012
Towards an Ontology based integrated Framework for Semantic Web

Author(s): Nora Y. Ibrahim | Sahar A. Mokhtar | Hany M. Harb
Volume: 10
Issue: 9
Year: 2012
Enhanced techniques for PDF Image Segmentation and Text Extraction

Author(s): D. Sasirekha | E. Chandra
Volume: 10
Issue: 9
Year: 2012
Comprehensive Analysis of π Base Exponential Functions as a Window

Author(s): Mahdi Nouri | Sepideh Lahooti | Sepideh Vatanpour | Negar Besharatmehr
Volume: 10
Issue: 9
Year: 2012
Performance Evaluation of Some Grid Programming Models

Author(s): W. A. Awad
Volume: 10
Issue: 9
Year: 2012
Web Test Integration and Performance Evaluation of E-Commerce web sites

Author(s): Md. Safaet Hossain | Md. Shazzad Hosain
Volume: 10
Issue: 9
Year: 2012
Creation of Digital Test Form for Prepress Department

Author(s): Jaswinder Singh Dilawari | Ravinder Khanna
Volume: 10
Issue: 9
Year: 2012
Comparison of Supervised Learning Techniques for Binary Text Classification

Author(s): Hetal Doshi | Maruti Zalte
Volume: 10
Issue: 9
Year: 2012
Contextual Ontology for Delivering Learning Material in an Adaptive E-learning System

Author(s): Kalla. Madhu Sudhana | V. Cyril Raj
Volume: 10
Issue: 9
Year: 2012
A Fast Accurate Network Intrusion Detection System

Author(s): Ahmed A. Elngar | Dowlat A. El A. Mohamed | Fayed F. M. Ghaleb
Volume: 10
Issue: 9
Year: 2012
Underwater Acoustic Channel Modeling: A Simulation Study

Author(s): Pallavi Kamal | Taussif Khanna
Volume: 10
Issue: 9
Year: 2012
Investigation of Hill Cipher Modifications Based on Permutation and Iteration

Author(s): Mina Farmanbar | Alexander G. Chefranov
Volume: 10
Issue: 9
Year: 2012
QoS Adoption And Protect It Against DoS Attack

Author(s): Manar Y. Kashmola | Rasha Saadallah Gargees
Volume: 10
Issue: 9
Year: 2012
Additive Update Algorithm for Nonnegative Matrix Factorization

Author(s): Tran Dang Hien | Do Van Tuan | Pham Van At
Volume: 10
Issue: 9
Year: 2012
Securing the Multilevel Information System

Author(s): Mohan H.S. | A. Raji Reddy
Volume: 9
Issue: 9
Year: 2011
A New Efficient Symbol Timing Synchronization Scheme for MB-OFDM UWB Systems

Author(s): Reza Shahbazian | Bahman Abolhassani
Volume: 9
Issue: 9
Year: 2011
Multithreaded Image Processing

Author(s): Jamil A. M. Saif | Hamid S. S. Alraimi
Volume: 9
Issue: 9
Year: 2011
Study of Neural Network Algorithm for Straight-Line Drawings of Planar Graphs

Author(s): Mohamed A. El-Sayed | S. Abdel-Khalek | Hanan H. Amin
Volume: 9
Issue: 9
Year: 2011
Virtual Education and its Importance as a New Method in Educational System

Author(s): Mohammad Behrouzian Nejad | Ebrahim Behrouzian Nejad
Volume: 9
Issue: 9
Year: 2011
Using Image Steganography to Establish Covert Communication Channels

Author(s): Keith L Haynes
Volume: 9
Issue: 9
Year: 2011
A Decision Tree Based Model to Identify the Career Focus of Computer Stream Students in ITES Industry

Author(s): T. Hemalatha | Ananthi Sheshasaayee
Volume: 9
Issue: 9
Year: 2011
Customer Relationship Management and its Implementation in E-Commerce

Author(s): Mohammad Behrouzian Nejad
Volume: 9
Issue: 9
Year: 2011
A Hierarchical View for Level Set Method Based on Segmentation of Non-Constant Intensity Objects

Author(s): M. Janani | D. Kavitha Devi
Volume: 9
Issue: 9
Year: 2011
Parallel Edge Projection and Pruning (PEPP) Based Sequence Graph protrude approach for Closed Itemset Mining

Author(s): kalli Srinivasa Nageswara Prasad | S. Ramakrishna
Volume: 9
Issue: 9
Year: 2011
Role Based Authentication Schemes to Support Multiple Realms for Security Automation

Author(s): Rajasekhar B. M | G. A. Ramachandra
Volume: 9
Issue: 9
Year: 2011
Empirical Study of Evolution of Decision making Factors from 1990-2010

Author(s): Mohammed Suliman Al-Shakkah | Wan Rozaini Sheik Osman
Volume: 9
Issue: 9
Year: 2011
A Method for Fingerprint Authentication for ATM Based Banking Application

Author(s): S. Koteswari | P. John Paul | V. Pradeep kumar | A.B.S.R. Manohar
Volume: 9
Issue: 9
Year: 2011
Streamed Coefficients Approach for Quantization Table Estimation in JPEG Images

Author(s): Salma Hamdy
Volume: 9
Issue: 9
Year: 2011
Lossless Image Compression for Transmitting Over Low Bandwidth Line

Author(s): G. Murugan | E. Kannan | S. Arun
Volume: 9
Issue: 9
Year: 2011
PAPR Reduction of OFDM Signal Using Error Correcting Code and Selective Mapping

Author(s): Anshu | Himanshu Sharma
Volume: 9
Issue: 9
Year: 2011
Performance of Input and Output Selection Techniques on Routing Efficiency in Network-On-Chip: A Review

Author(s): Mohammad Behrouzian Nejad | Amin Mehranzadeh | Mehdi Hoodgar
Volume: 9
Issue: 9
Year: 2011
Application of Honeypots to Study Character of Attackers Based on their Accountability in the Network

Author(s): Tushar Kanti | Vineet Richhariya
Volume: 9
Issue: 9
Year: 2011
A Multilevel Representation of Repository for Software Reuse

Author(s): C. V. Guru Rao | P. Niranjan
Volume: 9
Issue: 9
Year: 2011
System Integration for Smart Paperless Ship

Author(s): O. Sulaiman | A.H. Saharuddin | A.B.S. Kader
Volume: 8
Issue: 9
Year: 2010
A Survey on Minimizing Energy Consumption of VLSI Processors Using Multiple Supply Voltages

Author(s): B. Sathiyabama | S. Malarkkan
Volume: 8
Issue: 9
Year: 2010
A Survey on Static Power Optimization in VLSI

Author(s): A. Janaki Rani | S. Malarkkan
Volume: 8
Issue: 9
Year: 2010
Enhancing K-Means Algorithm with Semi-Unsupervised Centroid Selection Method

Author(s): R. Shanmugasundaram | S. Sukumaran
Volume: 8
Issue: 9
Year: 2010
Extracting Membership Functions Using ACS Method via Multiple Minimum Supports

Author(s): Ehsan Vejdani Mahmoudi | Masood Niazi Torshiz | Mehrdad Jalali
Volume: 8
Issue: 9
Year: 2010
An Innovated Server-Based Desktop Sharing Platform

Author(s): Ayad H. Abdulqader | Salah Noori Saleh | Omar Amer Abouabdalla | Sureswaran Ramadas | Hasan S. M. Al-Khaffaf
Volume: 8
Issue: 9
Year: 2010
Adaptive E-Learning System based on Semantic Web and Fuzzy Clustering

Author(s): Khaled M. Fouad | Mofreh A. Hogo | Shehab Gamalel-Din | Nagdy M. Nagdy
Volume: 8
Issue: 9
Year: 2010
Development of a Project-Based Learning Approach in Requirement Engineering

Author(s): Nor Azliana Akmal Jamaludin | Shamsul Sahibuddin | Kamaruzaman Jusoff | Nur Hafizah Hidayat
Volume: 8
Issue: 9
Year: 2010
Performance Comparison of Block Truncation Coding based Image Retrieval Techniques using Assorted Color Spaces

Author(s): H.B. Kekre | Sudeep D.Thepade | Varun Lodha | Pooja Luthra | Ajoy Joseph | Chitrangada Nemani
Volume: 8
Issue: 9
Year: 2010
Network Anomaly Detection and Visualization using Combined PCA and Adaptive Filtering

Author(s): Altyeb Altaher | Sureswaran Ramadass | Noureldien Abdelrahman | Ahmed Khalid
Volume: 8
Issue: 9
Year: 2010
Implementation of a new Fuzzy Based Load Balancing Algorithm for Hypercubes

Author(s): Sameena Naaz | Afshar Alam | Ranjit Biswas
Volume: 8
Issue: 9
Year: 2010
Building an Energy-Efficient Prediction S-MAC Protocol for Wireless Networks

Author(s): Mahmoud Abdel-Aziz El-Sakhawy Othman | Imane Aly Saroit Ismail
Volume: 8
Issue: 9
Year: 2010
Constructing Models For MicroArray Data with Swarm Algorithm

Author(s): Aruchamy Rajini | Vasantha Kalyani David
Volume: 8
Issue: 9
Year: 2010
Enchancing And Deriving Actionable Knowledge From Decision Trees

Author(s): P. Senthil Vadivu | Vasantha Kalyani David
Volume: 8
Issue: 9
Year: 2010
Descriptive System For Creating Awareness In The Electoral Process In Nigeria Using Information Technology

Author(s): B. A. Onyekwelu | D.T. Akomolafe
Volume: 8
Issue: 9
Year: 2010
Multiplayer Enhanced Make Square Game in the Net

Author(s): Md. Ekramul Hamid | Sudip Saha | Mohammed Qayyum
Volume: 8
Issue: 9
Year: 2010
Distributed Task Allocation in Multi-Agent System Based on Decision Support Module

Author(s): Sally M. El-Ghamrawy | Ali I. El-Desouky | Ahmed I. Saleh
Volume: 8
Issue: 9
Year: 2010
A Proposed Ontology Based Architecture to enrich the data semantics syndicated by RSS techniques in Egyptian Tax Authority

Author(s): Ibrahim M El-Henawy | Mahmoud M Abd El-latif | Tamer E Amer
Volume: 8
Issue: 9
Year: 2010
Performance Comparison Of Multicast Routing Protocols In Ad-Hoc Wireless Networks

Author(s): N. Veena | A. VinayaBabu | K. Madhukar | B. Sujatha | B. Anandkumar | S. Nagaprasad
Volume: 8
Issue: 9
Year: 2010
Generation of Mutation Operators for AOP

Author(s): Mayank Singh | Shailendra Mishra
Volume: 8
Issue: 9
Year: 2010
Parcel Management System using GPS Tracking Unit

Author(s): Tahmina Khatoon | Md. Musfique Anwar | Nasrin Sultana Shume | Md. Mizanur Rahman
Volume: 8
Issue: 9
Year: 2010
Using RFID to Enhance Mobile Banking Security

Author(s): Zakaria Saleh | Izzat Alsmadi
Volume: 8
Issue: 9
Year: 2010
Tracking The Face Movement Of Perceptual User Interface Using CAMSHIFT Algorithm

Author(s): B. Muthukumar | S. Ravi
Volume: 8
Issue: 9
Year: 2010
A Design and Execution Of Activity Based Applications In Distributed Environments Using Hermes Software Architecture

Author(s): B. Muthukumar | P. Banumathi | T.K.P. Rajagopal | R.Vidhya
Volume: 8
Issue: 9
Year: 2010
Hybrid Technique for Self Tuning PI Controller Parameters in HVDC Systems

Author(s): A.Srujana | S.V.Jayaram Kumar
Volume: 8
Issue: 9
Year: 2010
Hybrid Compression of Color Images with Larger Trivial Background by Histogram Segmentation

Author(s): M. Mohamed Sathik | K. Senthamarai Kannan | Y. Jacob Vetha Raj
Volume: 8
Issue: 9
Year: 2010
Improving Client-Server Response Time Using IPv6 Header Suppresion Over MPLS

Author(s): Imad J. Mohamad | Yung-Wey Chong | Tat-Chee Wan | Putra Sumari
Volume: 8
Issue: 9
Year: 2010
Pair Wise Sorting: A New Way of Sorting

Author(s): Md. Jahangir Alam | Muhammad Monsur Uddin | Mohammad Shabbir Hasan
Volume: 8
Issue: 9
Year: 2010
An Evaluation of Software Requirement Prioritization Techniques

Author(s): Mohammad Shabbir Hasan | Abdullah Al Mahmood | Md. Jahangir Alam | Sk. Md. Nahid Hasan | Farin Rahman
Volume: 8
Issue: 9
Year: 2010
Image Retrieval using Shape Texture Patterns generated from Walsh-Hadamard Transform and Gradient Image Bitmap

Author(s): H.B.Kekre | Sudeep D. Thepade | Varun K. Banura
Volume: 8
Issue: 9
Year: 2010
Structural Analysis of Bangla Sentences of Different Tenses for Automatic Bangla Machine Translator

Author(s): Md. Musfique Anwar | Nasrin Sultana Shume | Md. Al-Amin Bhuiyan
Volume: 8
Issue: 9
Year: 2010
The Innovative Application of Multiple Correlation Plane

Author(s): Julaluk Watthananon | Sageemas Na Wichian | Anirach Mingkhwan
Volume: 8
Issue: 9
Year: 2010
Design of Novel Usability Driven Software Process Model

Author(s): Hina Gull | Farooque Azam | Sardar Zafar Iqbal
Volume: 8
Issue: 9
Year: 2010
Impact of Guard Interval in Proposed MIMO-OFDM System for wireless communication

Author(s): M. P. Chitra | S. K. Srivatsa
Volume: 8
Issue: 9
Year: 2010
Fragmentation Investigation And Evaluation In Distributed DBMS Using JDBC and OGSA-DAI

Author(s): Ahmed Almadi | Ahmed Manasrah | Omer Abouabdalla | Homam El-Taj
Volume: 8
Issue: 9
Year: 2010
Reconfigurable Hardware Intelligent Memory Controller for H.264/AVC Encoders

Author(s): Kamel Messaoudi | El-Bay Bourennane | Salah Toumi
Volume: 8
Issue: 9
Year: 2010
Concept Measure Supported Aesthetics Ontology Construction for Videos

Author(s): Sunitha Abburu
Volume: 8
Issue: 9
Year: 2010
Design of Hybrid Ontologies for Mediation System Applied to the E-learning Platform

Author(s): Otman ABDOUN | Jaber EL BOUHDIDI | Mohamed GHAILANI | Abdelhadi FENNAN
Volume: 8
Issue: 9
Year: 2010
Adaptation of GQM Method for Evaluating the Performance of Software Project Manager

Author(s): Nagy Ramadan Darwish | Mahmoud M. Abd Ellatif
Volume: 8
Issue: 9
Year: 2010
A Two Dimensional Approach to Back and Forth Software Process Model

Author(s): Sameera Amjad | Wasi Haider Butt | Farooque Azam
Volume: 8
Issue: 9
Year: 2010
Towards a better assessment of the durations in PERT Method

Author(s): Nasser Eddine MOUHOUB | Hocine BELOUADAH | Abdelhak BOUBETRA
Volume: 8
Issue: 9
Year: 2010
Simulation of Grover’s Algorithm Quantum Search in a Classical Computer

Author(s): A.B. Mutiara | R. Refianti
Volume: 8
Issue: 9
Year: 2010
Improved Content Based Image Retrieval Using Color Histogram And Self Organizing Maps

Author(s): R. Priya | Vasantha Kalyani David
Volume: 8
Issue: 9
Year: 2010
Gaussian Process Model for Uncertain Data Classification

Author(s): G.V. Suresh | Shabbeer Shaik | E.V.Reddy | Usman Ali Shaik
Volume: 8
Issue: 9
Year: 2010
Nano-particle Characterization Using a Fast Hybrid Clustering Technique for TEM Images

Author(s): M.A. Abdou | Bayumy B.A. Youssef | W.M. Sheta
Volume: 8
Issue: 9
Year: 2010
Routing Fairness in Mobile Ad-Hoc Networks: Analysis and Enhancement

Author(s): M. Shiraz Ahmed | Haji Moinuddin | Fazeelatunnisa
Volume: 8
Issue: 9
Year: 2010
Chaotic Hash Function Based on MD5 and SHA-1 Hash Algorithm

Author(s): Mouad HAMRI | Jilali Mikram | Fouad Zinoun
Volume: 8
Issue: 9
Year: 2010
Power-Based Key Hopping (PBKH) and Associated Hardware Implementation

Author(s): Rabie A. Mahmoud | Magdy Saeb
Volume: 8
Issue: 9
Year: 2010
Runtime Monitoring and Controlling Of Information Flow

Author(s): Mohamed Sarrab | Helge Janicke
Volume: 8
Issue: 9
Year: 2010
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network

Author(s): Virendra Singh Kushwah | Gaurav Sharma
Volume: 8
Issue: 9
Year: 2010
Elimination of Weak Elliptic Curve Using Order of Points

Author(s): Nishant Sinha | Aakash Bansal
Volume: 10
Issue: 8
Year: 2012
Classification and Importance of Intrusion Detection System

Author(s): Rajasekaran K | Nirmala K
Volume: 10
Issue: 8
Year: 2012
Survey on Using GIS in Evacuation Planning Process

Author(s): Sara Shaker Abed El-Hamied | Ahmed Abou El-Fotouh Saleh | Aziza Asem
Volume: 10
Issue: 8
Year: 2012
Phases vs. Levels using Decision Trees for Intrusion Detection Systems

Author(s): Heba Ezzat Ibrahim | Sherif M. Badr | Mohamed A. Shaheen
Volume: 10
Issue: 8
Year: 2012
Network Intrusion Detection Using Improved Decision Tree Algorithm

Author(s): K. V. R. Swamy | K. S. Vijaya Lakshmi
Volume: 10
Issue: 8
Year: 2012
Fingerprint Hiding in True Color Image

Author(s): Shahd Abdul-Rhman Hasso | Maha Abdul-Rhman Hasso | Omar Saad
Volume: 10
Issue: 8
Year: 2012
Rule Based Hindi to English Transliteration System for Proper Names

Author(s): Monika Bhargava | M.Kumar | Sujoy Das
Volume: 10
Issue: 8
Year: 2012
Effect of AWGN & Fading (Raleigh & Rician) channels on BER performance of a WiMAX communication System

Author(s): Nuzhat Tasneem Awon | Md. Ashraful Islam | Md. Mizanur Rahman | A.Z.M. Touhidul Islam
Volume: 10
Issue: 8
Year: 2012
Virtual Investigation of Patients for Medical E-Learning

Author(s): A. M. Riad | Hazem M. El-Bakry | Samir M. Abd El-razek
Volume: 10
Issue: 8
Year: 2012
A Novel Data Hiding Scheme for Binary Images

Author(s): Do Van Tuan | Tran Dang Hien | Pham Van At
Volume: 10
Issue: 8
Year: 2012
Analysis of Examination Results Data Using Various Mining Techniques

Author(s): Devendra Singh Rajpoot | Kanak Saxena | Anubhuti Khare
Volume: 10
Issue: 8
Year: 2012
Text Hiding Based on True Color Image Classification

Author(s): Shahd Abdul-Rhman Hasso
Volume: 10
Issue: 8
Year: 2012
Decreasing defect rate of test cases by designing and analysis for recursive modules of a program structure: Improvement in test cases

Author(s): Muhammad Javed, Bashir Ahmad | Zaffar Abbas | Allah Nawaz | Muhammad Ali Abid | Ihsan Ullah
Volume: 10
Issue: 8
Year: 2012
Recent Advance in Multi-Carrier Underwater Acoustic Communications

Author(s): G. P. Harish
Volume: 10
Issue: 8
Year: 2012
Working in an Inter-Organisational Context: The Relevance of IT Governance and Business-IT Alignment

Author(s): Carl Stolze | Novica Zarvić | Oliver Thomas
Volume: 9
Issue: 8
Year: 2011
Protecting the Content - Using Digest Authentication System and Other Techniques

Author(s): Raman Kumar | Naman Kumar | Neetika Vats
Volume: 9
Issue: 8
Year: 2011
A System for Social Network Extraction of Web Complex Structures

Author(s): Amir Ansari | Mehrdad Jalali
Volume: 9
Issue: 8
Year: 2011
Performances Evaluation of Enhanced Basic Time Space Priority combined with an AQM

Author(s): Said El Kafhali | Mohamed Hanini | Abdelali El Bouchti | Abdelkrim Haqiq
Volume: 9
Issue: 8
Year: 2011
A General Architecture For Decision Making During Sports

Author(s): Mohammed Y Aalsalem | Wazir Zada Khan
Volume: 9
Issue: 8
Year: 2011
Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

Author(s): Turki Alghamdi | Hussien Zedan | Ali Alzahrani
Volume: 9
Issue: 8
Year: 2011
Secure Data Aggregation in Wireless Sensor Networks: State of the art and future works

Author(s): Merad Boudia Omar Rafik | Feham Mohammed
Volume: 9
Issue: 8
Year: 2011
Effects and Evaluation of a Pre-School Education Program Using an E-learning System

Author(s): Keiichi Shounai | Masahiko Sugimoto | Hidetaka Kobayashi | Mamoru Fujita | Satoshi Kotaki | Manabu Ishihara
Volume: 9
Issue: 8
Year: 2011
Constructivist-Based Framework for Teaching Computer Science

Author(s): Anuja Meetoo-Appavoo
Volume: 9
Issue: 8
Year: 2011
“Chain of Digital Evidence” Based Model of Digital Forensic Investigation Process

Author(s): Jasmin Ćosić | Zoran Ćosić | Miroslav Bača
Volume: 9
Issue: 8
Year: 2011
A New Expert System for Pediatric Respiratory Diseases by Using Neural Network

Author(s): A. A. Radwan | H. M. El Bakry | H. M. El Hadad
Volume: 9
Issue: 8
Year: 2011
Efficient Cryptographic Technique for Securing and Accessing Outsourced Data

Author(s): Hasan Omar Al-Sakran | Fahad Bin Muhaya | Irina Serguievskaia
Volume: 9
Issue: 8
Year: 2011
Comparision Analysis of Contrast Restoration of Weather Degraded Images using Histogram and MSRCR algorithm

Author(s): Charanpreet Kaur | Danvir Mandal
Volume: 9
Issue: 8
Year: 2011
Experimental Study of Various Data Masking Techniques with Random Replacement using Data Volume

Author(s): Ravikumar G K | B. Justus Rabi | Ravindra S. Hegadi | Manjunath T.N | Archana R A
Volume: 9
Issue: 8
Year: 2011
Neighbor Based Text Document Clustering

Author(s): Y. Sri Lalitha | N. Sandhya | K. Anuradha | A. Govardhan
Volume: 9
Issue: 8
Year: 2011
Data Mining and its Application in Banking Industry: A Survey

Author(s): Mohammad Behrouzian Nejad | Ebrahim Behrouzian Nejad | Mehdi Sadeghzadeh
Volume: 9
Issue: 8
Year: 2011
A Study about Developing Trends in Information Retrieval from Google to Swoogle

Author(s): S. Kalarani | G. V. Uma
Volume: 9
Issue: 8
Year: 2011
Implementation of Dynamic Time Warping for Video Indexing

Author(s): S. Prasanna | S. Purushothaman | A. Jothi
Volume: 9
Issue: 8
Year: 2011
Tag Recommendation System for Social Annotation System

Author(s): Ali Kohi | Mehrdad Jalali | Seyed Javad Ebrahimi
Volume: 9
Issue: 8
Year: 2011
Predictive Analytical Model for Requirement Volatility in ICT Projects

Author(s): Malaya Kumar Nayak | Sanghamitra Mohanty
Volume: 9
Issue: 8
Year: 2011
Electronic-City and its Importance to Achieve the Information Society

Author(s): Mohammad Behrouzian Nejad | Ebrahim Behrouzian Nejad
Volume: 9
Issue: 8
Year: 2011
Model Based Cancer Data Classification using Advanced ART Neural Network based Technique

Author(s): Sandhia Valsala | Dr. Sayed Sayeed Ahmed
Volume: 9
Issue: 8
Year: 2011
QoS enabled Cluster Based Routing Protocols in MANETs

Author(s): Narendar Reddy Mandhadi | Lakshmi Rajamani
Volume: 9
Issue: 8
Year: 2011
Design and Implementation of Extendable Media Streaming Application: Case Study of Windows 2003 Voice Recorder

Author(s): Ezekiel U. Okike | Ayorinde Afolayan
Volume: 9
Issue: 8
Year: 2011
Aspect-Oriented Approach for the Improvement of the Reliability and Time Performance of a Fault-Tolerant System

Author(s): Khalid Bouragba | Hicham Belhadaoui | Mohammed Ouzzif | Mounir Rifi
Volume: 9
Issue: 8
Year: 2011
Analysis of a Novel Hash Function Based upon Chaotic Nonlinear Map with Variable Parameter

Author(s): M. Nouri | S. Abazari Aghdam | P. Pourmahdi | M. Safarinia
Volume: 9
Issue: 8
Year: 2011
T-Fuzzy Subsemiautomata with Thresholds

Author(s): M. Basheer Ahamed | J. Michael Anna Spinneli
Volume: 9
Issue: 8
Year: 2011
Noise Reduction in Fast Fading Channel Using OFDM/TDM

Author(s): A. Sagaya selvaraj | R.S.D. Wahidabanu
Volume: 9
Issue: 8
Year: 2011
Simulation based review for analyzing the performance of routing protocols for MANETs

Author(s): Sonika Kandari | M.K. Pandey
Volume: 9
Issue: 8
Year: 2011
Facial Tracking Using Echostate Neural Network

Author(s): P. Mayilvahanan | S. Purushothaman | A. Jothi
Volume: 9
Issue: 8
Year: 2011
3D Parity Bit Structure: A novel technique to correct maximal number of bits in a simpler way

Author(s): Pushpa R. Suri | Sukhvinder Singh Deora
Volume: 9
Issue: 8
Year: 2011
Review of e-Government Policy and Outcomes in the kingdom of Saudi Arabia

Author(s): Mohammed Ateeq Alanezi | Ahmad Kamil Mahmood | Shuib Basri
Volume: 9
Issue: 8
Year: 2011
Biometrics In Fingerprint Recognition Using Distance Vector Method

Author(s): Sumeet Dhawan | Amit Makkar
Volume: 9
Issue: 8
Year: 2011
Hybrid JPEG Compression Using Histogram Based Segmentation

Author(s): M.Mohamed Sathik | K.Senthamarai Kannan | Y.Jacob Vetha Raj
Volume: 8
Issue: 8
Year: 2010
A Novel Hybridization of ABC with CBR for Pseudoknotted RNA Structure

Author(s): Ra’ed M. Al-Khatib | Nur’Aini Abdul Rashid | Rosni Abdullah
Volume: 8
Issue: 8
Year: 2010
Localization Accuracy Improved Methods Based on Adaptive Weighted Centroid Localization Algorithm in Wireless Sensor Networks

Author(s): Chang-Woo Song | Jun-Ling Ma | Jung-Hyun Lee | Kyung-Yong Chung | Kee-Wook Rim
Volume: 8
Issue: 8
Year: 2010
Evaluation of Vision based Surface Roughness using Wavelet Transforms with Neural Network Approach

Author(s): T.K. Thivakaran | RM. Chandrasekaran
Volume: 8
Issue: 8
Year: 2010
Aggregating Intrusion Detection System Alerts Based on Row Echelon Form Concept

Author(s): Homam El-Taj | Omar Abouabdalla, | Ahmed Manasrah | Moein Mayeh, | Mohammed Elhalabi
Volume: 8
Issue: 8
Year: 2010
Multidimensionality in Agile Software Development

Author(s): Ashima | Himanshu Aggarwal
Volume: 8
Issue: 8
Year: 2010
The Impact of Speed on the Performance of Dynamic Source Routing in Mobile Ad-Hoc Networks

Author(s): Naseer Ali Husieen | Osman B Ghazali | Suhaidi Hassan | Mohammed M. Kadhum
Volume: 8
Issue: 8
Year: 2010
3D Protein Structure Comparison and Retrieval Methods : Investigation Study

Author(s): Muhannad A. Abu-Hashem | Nur’Aini Abdul Rashid | Rosni Abdullah | Hesham A. Bahamish
Volume: 8
Issue: 8
Year: 2010
Optimization of work flow execution in ETL using Secure Genetic Algorithm

Author(s): Raman Kumar | Saumya Singla | Sagar Bhalla | Harshit Arora
Volume: 8
Issue: 8
Year: 2010
An Anomaly-Based Network Intrusion Detection System Using Fuzzy Logic

Author(s): R. Shanmugavadivu | N. Nagarajan
Volume: 8
Issue: 8
Year: 2010
A Survey on Designing Metrics suite to Asses the Quality of Ontology

Author(s): K. R. Uthayan | G. S. Anandha Mala
Volume: 8
Issue: 8
Year: 2010
A Survey on Digital Image Enhancement Techniques

Author(s): V. Saradhadevi | V. Sundaram
Volume: 8
Issue: 8
Year: 2010
Efficient Probabilistic Classification Methods for NIDS

Author(s): S.M. Aqil Burney | M. Sadiq Ali Khan | Jawed Naseem
Volume: 8
Issue: 8
Year: 2010
Implementation of Polynimial Neural Network in Web Usage Mining

Author(s): S. Santhi | S. Purushothaman
Volume: 8
Issue: 8
Year: 2010
A Generalization of the PVD Steganographic Method

Author(s): M. B. Ould MEDENI | El Mamoun SOUIDI
Volume: 8
Issue: 8
Year: 2010
A Comparative Study on Kakkot Sort and Other Sorting Methods

Author(s): Rajesh Ramachandran | E. Kirubakaran
Volume: 8
Issue: 8
Year: 2010
Steganography and Error-Correcting Codes

Author(s): M.B. Ould MEDENI | El Mamoun SOUIDI
Volume: 8
Issue: 8
Year: 2010
Retrieval of Bitmap Compression History

Author(s): Salma Hamdy | Haytham El-Messiry | Mohamed Roushdy | Essam Kahlifa
Volume: 8
Issue: 8
Year: 2010
A Novel LTCC Bandpass Filter for UWB Applications

Author(s): Thirumalaivasan K | Nakkeeran R.
Volume: 8
Issue: 8
Year: 2010
Intelligent Controller for Networked DC Motor Control

Author(s): B. Sharmila | N. Devarajan
Volume: 8
Issue: 8
Year: 2010
Fuzzy expert system for evaluation of students and online exams

Author(s): Mohammed E. Abd-Alazeem | Sherief I. Barakat
Volume: 8
Issue: 8
Year: 2010
A role oriented requirements analysis for ERP implementation in health care Organizations

Author(s): Kirti Pancholi | Durgesh Kumar Mishra
Volume: 8
Issue: 8
Year: 2010
SIP and RSW: A Comparative Evaluation Study

Author(s): Mahmoud Baklizi | Nibras Abdullah | Omar Abouabdalla | Sima Ahmadpour
Volume: 8
Issue: 8
Year: 2010
GA-ANN based Dominant Gene Prediction in Microarray Dataset

Author(s): Manaswini Pradhan | Sabyasachi Pattnaik | B. Mittra | Ranjit Kumar Sahu
Volume: 8
Issue: 8
Year: 2010
Performance Analysis Of Nonlinear Distortions For Downlink MC-CDMA Systems

Author(s): Labib Francis Gergis
Volume: 8
Issue: 8
Year: 2010
Low Complexity MMSE Based Channel Estimation Technique for LTE OFDMA Systems

Author(s): Md. Masud Rana | Abbas Z. Kouzani
Volume: 8
Issue: 8
Year: 2010
Off-Line Handwritten Signature Retrieval using Curvelet Transforms

Author(s): M. S. Shirdhonkar | Manesh Kokare
Volume: 8
Issue: 8
Year: 2010
A New Noise Estimation Technique of Speech Signal by Degree of Noise Refinement

Author(s): Md. Ekramul Hamid | Md. Zashim Uddin | Md. Humayun Kabir Biswas | Somlal Das
Volume: 8
Issue: 8
Year: 2010
The 2D Image-Based Anthropologic Measurement By Using Chinese Medical Acupuncture And Human Body Slice Model

Author(s): Sheng-Fuu Lin | Shih-Che Chien | Kuo-Yu Chiu
Volume: 8
Issue: 8
Year: 2010
An In-Depth Study on Requirement Engineering

Author(s): Mohammad Shabbir Hasan | Abdullah Al Mahmood | Farin Rahman | Sk. Md. Nahid Hasan
Volume: 8
Issue: 8
Year: 2010
Feed Forward Neural Network Algorithm for Frequent Patterns Mining

Author(s): Amit Bhagat | Sanjay Sharma | Dr. K.R.Pardasani
Volume: 8
Issue: 8
Year: 2010
Blemish Tolerance in Cellular Automata And Evaluation Reliability

Author(s): Rogheye parikhani | Mohmad teshnelab | Shahram babaye
Volume: 8
Issue: 8
Year: 2010
Improve the Test Case Design of Object Oriented Software by Refactoring

Author(s): Divya Prakash Shrivastava | R.C. Jain
Volume: 8
Issue: 8
Year: 2010
Implementation Of Wavelet And RBF For Power Quality Disturbance Classification

Author(s): Pramila P | Puttamadappa C | S. Purushothaman
Volume: 8
Issue: 8
Year: 2010
Survey: RTCP Feedback In A Large Streaming Sessions

Author(s): Adel Nadhem Naeem | Ali Abdulqader Bin Salem | Mohammed Faiz Aboalmaaly | Sureswaran Ramadass
Volume: 8
Issue: 8
Year: 2010
Scalable Video Coding in Online Video transmission with Bandwidth Limitation

Author(s): Sima Ahmadpour | Salah Noori Saleh | Omar Amer Abouabdalla | Mahmoud Baklizi | Nibras Abdullah
Volume: 8
Issue: 8
Year: 2010
A Fast Fractal Image Encoding Based On Haar Wavelet Transform

Author(s): Sofia Douda | Abdallah Bagri | Abdelhakim El Imrani
Volume: 8
Issue: 8
Year: 2010
An Improved Fuzzy Time Series Model For Forecasting

Author(s): Ashraf K. Abd-Elaal | Hesham A. Hefny | Ashraf H. Abd-Elwahab
Volume: 8
Issue: 8
Year: 2010
A Brief Survey on RFID Security and Privacy Issues

Author(s): Mohammad Tauhidul Islam
Volume: 8
Issue: 8
Year: 2010
Extraction of Information from Images using Dewrapping Techniques

Author(s): Khalid Nazim S. A. | M.B. Sanjay Pande
Volume: 8
Issue: 8
Year: 2010
Therapeutic Diet Prediction for Integrated Mining of Anemia Human Subjects using Statistical Techniques

Author(s): Sanjay Choudhary | Abha Wadhwa | Kamal Wadhwa | Anjana Mishra
Volume: 8
Issue: 8
Year: 2010
Channel Estimation Algorithms, Complexities and LTE Implementation Challenges

Author(s): Md. Masud Rana
Volume: 8
Issue: 8
Year: 2010
Secured Authentication Protocol System Using Images

Author(s): G. Arumugam | R. Sujatha
Volume: 8
Issue: 8
Year: 2010
ARP Cache Poisoning Attack and Detection

Author(s): Fatimah mohammed Al-Qarni
Volume: 10
Issue: 7
Year: 2012
Bio-thentic Card: Authentication Concept For RFID Card

Author(s): Ikuesan Richard Adeyemi | Norafida Bt, Ithnin
Volume: 10
Issue: 7
Year: 2012
The Agents scrutiny at Protocol Stack in NIDS

Author(s): M. Shiva Kumar | K. Krishnamoorthy
Volume: 10
Issue: 7
Year: 2012
Visualization for levels of animal diseases by integrating OLAP and GIS

Author(s): Hesham Ahmed Hassan | Hazem El-Bakry | Hamada Gaber Abd Allah
Volume: 10
Issue: 7
Year: 2012
Modeling and Control of CSTR using Model based Neural Network Predictive Control

Author(s): Piyush Shrivastava
Volume: 10
Issue: 7
Year: 2012
A Comparative Study between Using OWL Technology and Jess Rule Based For Applying Knowledge to Agent Based System

Author(s): Najla Badie Aldabagh | Ban Sharief Mustafa
Volume: 10
Issue: 7
Year: 2012
Log Analysis Techniques using Clustering in Network Forensics

Author(s): Imam Riadi | Jazi Eko Istiyanto | Ahmad Ashari
Volume: 10
Issue: 7
Year: 2012
Analysis & Selection of Requirements Elicitation Techniques for OSSD

Author(s): Munazza Ishtiaq | Fareeha Choudhry | Fahim Ashraf Awan | Aasia Khanum
Volume: 10
Issue: 7
Year: 2012
An Approach be Operational Security in 3 and 4 Phases of Developing Software Systems

Author(s): Saman Aleshi | Nasser Modiri | Hossein Fruzi
Volume: 10
Issue: 7
Year: 2012
A Low Cost PC-Controlled Electronic-Display Board

Author(s): M. G. Golam Faruque | Shamim Ahmad
Volume: 10
Issue: 7
Year: 2012
Analysis of Mobile Traffic based on Fixed Line Tele-Traffic Models

Author(s): Abhishek Gupta | Bhavana Jharia | Gopal Chandra Manna
Volume: 9
Issue: 7
Year: 2011
A Framework for Measuring External Quality of Web-sites

Author(s): Ritu Shrivastava | R. K. Pandey | M. Kumar
Volume: 9
Issue: 7
Year: 2011
Mitigating App-DDoS Attacks on Web Servers

Author(s): Manisha M. Patil | U. L. Kulkarni
Volume: 9
Issue: 7
Year: 2011
Decreasing Control Overhead of ODMRP by Using Passive Data Acknowledgement

Author(s): Robabeh Ghafouri
Volume: 9
Issue: 7
Year: 2011
Performance Comparison of Image Classifier Using DCT, Walsh, Haar and Kekre’s Transform

Author(s): H. B. Kekre | Tanuja K. Sarode | Meena S. Ugale
Volume: 9
Issue: 7
Year: 2011
Colorization of Gray Level Images by Using Optimization

Author(s): Hossein Ghayoumi Zadeh | Hojat Jafari | Alireza malvandi | Javad haddadnia
Volume: 9
Issue: 7
Year: 2011
A Combined Method for Finger Vein Authentication System

Author(s): Azadeh Noori Hoshyar | Ir.Riza Sulaiman | Afsaneh Noori Hoshyar
Volume: 9
Issue: 7
Year: 2011
Human Iris Recognition in Unconstrained Environments

Author(s): Mohammad Ali Azimi Kashani | Mohammad Reza Ramezanpoor Fini | Mahdi Mollaei Arani
Volume: 9
Issue: 7
Year: 2011
Contour Based Algorithm for Object Tracking

Author(s): A. M. Sallam | O. M. Elmouafy | R. A. Elbardany | A. M. Fahmy
Volume: 9
Issue: 7
Year: 2011
Recovery function of Components of Additive Model of Biometric System Reliability in UML

Author(s): Zoran Ćosić | Jasmin Ćosić | Miroslav Bača
Volume: 9
Issue: 7
Year: 2011
An Improvement Study Report of Face Detection Techniques using Adaboost and SVM

Author(s): Rajeev Kumar Singh | Alka Gulati | Anubhav Sharma | Harsh Vazirani
Volume: 9
Issue: 7
Year: 2011
Comparison study on AAMRP and IODMRP in MANETS

Author(s): Tanvir Kahlon | Sukesha Sharma
Volume: 9
Issue: 7
Year: 2011
Effective Classification Algorithms to Predict the Accuracy of Tuberculosis - A Machine Learning Approach

Author(s): Asha. T | S. Natarajan | K.N.B. Murthy
Volume: 9
Issue: 7
Year: 2011
Enhanced Fast and Secure Hybrid Encryption Algorithm for Message Communication

Author(s): Shaik Rasool | Md Ateeq ur Rahman | G. Sridhar | K. Hemanth Kunar
Volume: 9
Issue: 7
Year: 2011
2D Image Morphing With Wrapping Using Vector Quantization Based Colour Transition

Author(s): H. B. Kekre | Tanuja K. Sarode | Suchitra M. Patil
Volume: 9
Issue: 7
Year: 2011
An Analysis of GSM Handover based On Real Data

Author(s): Isha Thakur | Bhavana Jharia | Gopal Chandra Manna
Volume: 9
Issue: 7
Year: 2011
Development of Enhanced Token using Picture Password and Public Key Infrastructure Mechanism for Digital Signature

Author(s): Oghenerukevwe E. Oyinloye | Ayodeji .I. Fasiku | Boniface K.Alese | Akinbohun Folake
Volume: 9
Issue: 7
Year: 2011
Even Harmonious Graphs with Applications

Author(s): P.B. Sarasija | R. Binthiya
Volume: 9
Issue: 7
Year: 2011
A Security Generated Approach towards Mass Elections using Voting Software

Author(s): Aradhana Goutam | Ankit Kandi | Manish Wagh | Kashyap Shah | Prathamesh Tarkar
Volume: 9
Issue: 7
Year: 2011
Design of a Secure Information Sharing System for E-policing in Nigeria

Author(s): Alese B.K | Iyare O.M | Falaki S.O
Volume: 9
Issue: 7
Year: 2011
Design and Implementation of Internet Protocol Security Filtering Rules in a Network Environment

Author(s): Alese B.K. | Adetunmbi O.A. | Gabriel A.J.
Volume: 9
Issue: 7
Year: 2011
Advanced Routing Technology For Fast Internet Protocol Network Recovery

Author(s): S. Rajan | Althaf Hussain H.B. | K. Jagannath | G. Surendar Reddy | K.N.Dharanidhar
Volume: 9
Issue: 7
Year: 2011
Analysis of Educational Web Pattern Using Adaptive Markov Chain For Next Page Access Prediction

Author(s): Harish Kumar | Anil Kumar Solanki
Volume: 9
Issue: 7
Year: 2011
ERP-Communication Framework: Aerospace Smart factory & Smart R&D Campus

Author(s): M. Asif Rashid | Erol Sayin | Hammad Qureshi | Muiz-ud-Din Shami | Nawar Khan | Ibrahim H. Seyrek
Volume: 9
Issue: 7
Year: 2011
Clustering of Concept Drift Categorical Data using POur-NIR Method

Author(s): N. Sudhakar Reddy | K.V.N. Sunitha
Volume: 9
Issue: 7
Year: 2011
A Dynamic Approach To Defend Against Anonymous DDoS Flooding Attacks

Author(s): R. Anurekha | K. Duraiswamy | A.Viswanathan | V. P. Arunachalam | A. Rajiv Kannan | K. Ganesh Kumar
Volume: 8
Issue: 7
Year: 2010
Reliable and Energy Aware QoS Routing Protocol for Mobile Ad hoc Networks

Author(s): V. Thilagavathe | K. Duraiswamy
Volume: 8
Issue: 7
Year: 2010
Media changing the Youth Culture: An Indian Perspective

Author(s): Dr. Ritu Soni | Bharati Kamboj
Volume: 8
Issue: 7
Year: 2010
Simulation Modeling of Reactive Protocols for Adhoc Wireless Network

Author(s): Sunil Taneja | Ashwani Kush | Amandeep Makkar
Volume: 8
Issue: 7
Year: 2010
Vectorization Algorithm for Line Drawing and Gap filling of Maps

Author(s): Neeti Daryal | Vinod Kumar
Volume: 8
Issue: 7
Year: 2010
Self-Healing In Wireless Routing Using Backbone Nodes

Author(s): Urvi Sagar | Ashwani Kush
Volume: 8
Issue: 7
Year: 2010
Context Based Personalized Search Engine For Online Learning

Author(s): Ritu Soni | Preeti Bakshi
Volume: 8
Issue: 7
Year: 2010
A Computational Model for Bharata Natyam Choreography

Author(s): Sangeeta Jadhav | Sasikumar
Volume: 8
Issue: 7
Year: 2010
Automating the fault tolerance process in Grid Environment

Author(s): Inderpreet Chopra | Maninder Singh
Volume: 8
Issue: 7
Year: 2010
Mobile Embedded Real Time System (RTTCS) for Monitoring and Controlling in Telemedicine

Author(s): Dhuha Basheer Abdullah | Muddather Abdul-Alaziz | Basim Mohammed
Volume: 8
Issue: 7
Year: 2010
Improved Computer Networks resilience Using Social Behavior

Author(s): Yehia H. Khalil | Walaa M. Sheta | Adel S. Elmaghraby
Volume: 8
Issue: 7
Year: 2010
An approach to a pseudo real-time image processing engine for hyperspectral imaging

Author(s): Sahar Sabbaghi Mahmouei | Dr. Shattri Mansor | Abed Abedniya
Volume: 8
Issue: 7
Year: 2010
An Enhanced LEACH Protocol using Fuzzy Logic for Wireless Sensor Networks

Author(s): J. Rathi | G. Rajendran
Volume: 8
Issue: 7
Year: 2010
Blind Robust Transparent DCT-Based Digital Image Watermarking for Copyright Protection

Author(s): Hanan Elazhary | Sawsan Morkos
Volume: 8
Issue: 7
Year: 2010
Sector Mean with Individual Cal and Sal Components in Walsh Transform Sectors as Feature Vectors for CBIR

Author(s): H. B. Kekre | Dhirendra Mishra
Volume: 8
Issue: 7
Year: 2010
False Positive Reduction using IDS Alert Correlation Method based on the Apriori Algorithm

Author(s): Homam El-Taj | Omar Abouabdalla | Ahmed Manasrah | Mohammed Anbar | Ahmed Al-Madi
Volume: 8
Issue: 7
Year: 2010
Preventing Attacks on Fingerprint Identification System by Using Level-3 Features

Author(s): R. Seshadri | Yaswanth Kumar.Avulapati
Volume: 8
Issue: 7
Year: 2010
Combining Level- 1 ,2 & 3 Classifiers For Fingerprint Recognition System

Author(s): R. Seshadri | Yaswanth Kumar.Avulapati
Volume: 8
Issue: 7
Year: 2010
An Efficient Decision Algorithm For Vertical Handoff Across 4G Heterogeneous Wireless Networks

Author(s): S. Aghalya | P. Seethalakshmi
Volume: 8
Issue: 7
Year: 2010
Towards a More Mobile KMS

Author(s): Julius Olatunji Okesola | Oluwafemi Shawn Ogunseye | Kazeem Idowu Rufai
Volume: 8
Issue: 7
Year: 2010
The Evolution Of Chip Multi-Processors And Its Role In High Performance And Parallel Computing

Author(s): A. Neela madheswari | R.S.D. Wahida banu
Volume: 8
Issue: 7
Year: 2010
A multicast Framework for the Multimedia Conferencing System (MCS) based on IPv6 Multicast Capability

Author(s): Hala A. Albaroodi | Omar Amer Abouabdalla | Mohammed Faiz Aboalmaaly | Ahmed M. Manasrah
Volume: 8
Issue: 7
Year: 2010
An Extensive Survey on Gene Prediction Methodologies

Author(s): Manaswini Pradhan | Ranjit Kumar Sahu
Volume: 8
Issue: 7
Year: 2010
Point-to-Point IM Interworking session Between SIP and MFTS

Author(s): Mohammed Faiz Aboalmaaly | Omar Amer Abouabdalla | Hala A. Albaroodi | Ahmed M. Manasrah
Volume: 8
Issue: 7
Year: 2010
A Survey on Session Hijacking

Author(s): P. Ramesh Babu | D. Lalitha Bhaskari | CPVNJ Mohan Rao
Volume: 8
Issue: 7
Year: 2010
Machine Learning Approach for Object Detection - A Survey Approach

Author(s): N.V. Balaji | M. Punithavalli
Volume: 8
Issue: 7
Year: 2010
Trust challenges and issues of E-Government: E-Tax prospective

Author(s): Dinara Berdykhanova | Ali Dehghantanha | Andy Seddon
Volume: 8
Issue: 7
Year: 2010
RACHSU Algorithm based Handwritten Tamil Script Recognition

Author(s): C. Sureshkumar | T. Ravichandran
Volume: 8
Issue: 7
Year: 2010
On the Performance of Symmetrical and Asymmetrical Encryption for Real-Time Video Conferencing System

Author(s): Maryam Feily | Salah Noori | Sureswaran Ramadass
Volume: 8
Issue: 7
Year: 2010
Enterprise Crypto method for Enhanced Security over semantic web

Author(s): Talal Talib Jameel
Volume: 8
Issue: 7
Year: 2010
Combinatory CPU Scheduling Algorithm

Author(s): Saeeda Bibi | Farooque Azam | Yasir Chaudhry
Volume: 8
Issue: 7
Year: 2010
S-CAN: Spatial Content Addressable Network for Networked Virtual Environments

Author(s): Amira Soliman | Walaa Sheta
Volume: 8
Issue: 7
Year: 2010
Development of Cinema Ontology: A Conceptual and Context Approach

Author(s): Sunitha Abburu | Jinesh V N
Volume: 8
Issue: 7
Year: 2010
Minimizing the number of retry attempts in keystroke dynamics through inclusion of error correcting schemes

Author(s): Pavaday Narainsamy | K.M.S.Soyjaudah
Volume: 8
Issue: 7
Year: 2010
A Role-Oriented Content-based Filtering Approach: Personalized Enterprise Architecture Management Perspective

Author(s): Imran GHANI | Choon Yeul LEE | Seung Ryul JEONG | Sung Hyun JUHN | Mohammad Shafie Bin Abd Latiff
Volume: 8
Issue: 7
Year: 2010
Haploid vs Diploid Genome in Genetic Algorithms for TSP

Author(s): Rakesh Kumar | Jyotishree
Volume: 8
Issue: 7
Year: 2010
A Novel Approach for Hiding Text Using Image Steganography

Author(s): Sukhpreet Kaur | Sumeet Kaur
Volume: 8
Issue: 7
Year: 2010
Categories Of Unstructured Data Processing And Their Enhancement

Author(s): Vinodani Katiyar | Hemant Kumar Singh
Volume: 8
Issue: 7
Year: 2010
Using Fuzzy Support Vector Machine in Text Categorization Base on Reduced Matrices

Author(s): Vu Thanh Nguyen
Volume: 8
Issue: 7
Year: 2010
Data Group Anonymity: General Approach

Author(s): Oleg Chertov | Dan Tavrov
Volume: 8
Issue: 7
Year: 2010
Approximate String Search for Bangla: Phonetic and Semantic Standpoint

Author(s): Adeeb Ahmed | Abdullah Al Helal
Volume: 8
Issue: 7
Year: 2010
Supervised Learning approach for Predicting the Presence of Seizure in Human Brain

Author(s): Sivagami P | Sujitha V | Vijaya MS
Volume: 8
Issue: 7
Year: 2010
Source Initiated Energy Efficient Scheme for Mobile Ad Hoc Networks

Author(s): R. Bhuvaneswari | M. Viswanathan
Volume: 10
Issue: 6
Year: 2012
False Colour Composite Combination Based on the Determinant of Eigen Matrix

Author(s): Maha Abdul-Rhman Hasso
Volume: 10
Issue: 6
Year: 2012
The Evaluation of Performance in Flow Label and Non Flow Label Approach based on IPv6 technology

Author(s): Nevila Xoxa Resulaj | Nevila Baçi Kadzadej | Igli Tafa
Volume: 10
Issue: 6
Year: 2012
Non-Linear Attitude Simulator of LEO Spacecraft and Large Angle Attitude Maneuvers

Author(s): Azza El-S. Ibrahim | Ahamed M. Tobal | Mohammad A. Sultan
Volume: 10
Issue: 6
Year: 2012
Secure And Context-Aware Routing In Mobile Ad-Hoc Networks

Author(s): R. Haboub | M. Ouzzif
Volume: 10
Issue: 6
Year: 2012
Advanced Security-Based Data Sharing Model for the Cloud Service Providers

Author(s): Mohamed Meky | Amjad Ali
Volume: 10
Issue: 6
Year: 2012
Comparison of Data Mining Techniques Used To Predict Cancer Survivability

Author(s): Charles Edeki | Shardul Pandya
Volume: 10
Issue: 6
Year: 2012
A Web-Based System To Enchance The Management Of Acquired Immunodeficiency Syndrome (AIDS)/ Human Immunodeficiency Virus (HIV) In Nigeria

Author(s): Agbelusi Olutola | Makinde O.E | Aladesote O. Isaiah | Aliu, A. Hassan
Volume: 10
Issue: 6
Year: 2012
V-Diagnostic: A Data Mining System For Human Immuno- Deficiency Virus Diagnosis

Author(s): Omowunmi O. Adeyemo | Adenike O. Osofisan
Volume: 10
Issue: 6
Year: 2012
Integration of Floating Point Arithmetic User Library to Resource Library of the CAD Tool for Customization

Author(s): R. Prakash Rao | B. K. Madhavi
Volume: 10
Issue: 6
Year: 2012
Design of 16 bit Low Power Processor

Author(s): Khaja Mujeebuddin Quadry | Syed Abdul Sattar
Volume: 10
Issue: 6
Year: 2012
Multi-Pixel Steganography

Author(s): R. Sridevi | G. John Babu
Volume: 10
Issue: 6
Year: 2012
Extended Sakai-Kasahara Identity-Based Encryption Scheme to Signcryption Scheme

Author(s): Hussein Khalid Abd-Alrazzaq
Volume: 10
Issue: 6
Year: 2012
Intrusion Detection and Prevention Response based on Signature-Based and Anomaly-Based: Investigation Study

Author(s): Homam El_Taj | Firas Najjar | Hiba Alsenawi | Mohannad Najjar
Volume: 10
Issue: 6
Year: 2012
Assesment of Cobit Maturity Level With Existing Conditions From Auditor

Author(s): I Made Sukarsa | Maria Yulita Putu Dita | I Ketut Adi Purnawan
Volume: 10
Issue: 6
Year: 2012
Data Mining System For Quality Prediction Of Petrol Using Artificial Neural Network

Author(s): Omowumi O. Adeyemo | Adenike O. Osofisan | Ebunoluwa P. Fashina | Kayode Otubu
Volume: 10
Issue: 6
Year: 2012
Visualization of Fluid Flow Patterns in Horizontal Circular Pipe Ducts

Author(s): Olagunju, Mukaila | Taiwo, O. A
Volume: 9
Issue: 6
Year: 2011
A Novel Approach for Intranet Mailing For Providing User Authentication

Author(s): ASN Chakravarthy | A.S.S.D. Toyaza
Volume: 9
Issue: 6
Year: 2011
An Integrated Framework for Content Based Image Retrieval

Author(s): Ritika Hirwane | Nishchol Mishra
Volume: 9
Issue: 6
Year: 2011
A Low-Power CMOS Implementation of a Cellular Neural Network for Connected Component Detection

Author(s): S. El-Din | A.K. Abol El-Seoud | A. El-Fahar | M. El-Sayed Ragab
Volume: 9
Issue: 6
Year: 2011
Evolving Fuzzy Classification Systems from Numerical Data

Author(s): Pardeep Sandhu | Shakti Kumar | Himanshu Sharma | Parvinder Bhalla
Volume: 9
Issue: 6
Year: 2011
Analysing Assorted Window Sizes with LBG and KPE Codebook Generation Techniques for Grayscale Image Colorization

Author(s): H. B. Kekre | Tanuja K. Sarode | Sudeep D. Thepade | Supriya Kamoji
Volume: 9
Issue: 6
Year: 2011
Instigation of Orthogonal Wavelet Transforms using Walsh, Cosine, Hartley, Kekre Transforms and their use in Image Compression

Author(s): H. B.Kekre | Tanuja K. Sarode | Sudeep D. Thepade | Sonal Shroff
Volume: 9
Issue: 6
Year: 2011
Modeling and Analyze the Deep Web: Surfacing Hidden Value

Author(s): Suneet Kumar | Anuj Kumar Yadav | Rakesh Bharati | Rani Choudhary
Volume: 9
Issue: 6
Year: 2011
Abrupt Change Detection of Fault in Power System Using Independent Component Analysis

Author(s): Satyabrata Das | Soumya Ranjan Mohanty | Sabyasachi Pattnaik
Volume: 9
Issue: 6
Year: 2011
Evaluation of CPU Consuming, Memory Utilization and Time Transfering Between Virtual Machines in Network by using HTTP and FTP techniques

Author(s): Igli TAFA | Elinda KAJO | Elma ZANAJ | Ariana BEJLERI | Aleksandër XHUVANI
Volume: 9
Issue: 6
Year: 2011
A Hierarchical Overlay Design for Peer to Peer and SIP Integration

Author(s): Md. Safiqul Islam | Syed Ashiqur Rahman | Rezwan Ahmed | Mahmudul Hasan
Volume: 9
Issue: 6
Year: 2011
A Model for the Controlled Development of Software Complexity Impacts

Author(s): Ghazal Keshavarz | Nasser Modiri | Mirmohsen Pedram
Volume: 9
Issue: 6
Year: 2011
Why do you need a reservation system?      Save time & money - Smart Internet Solutions