Academic Journals Database
Disseminating quality controlled scientific knowledge

Advances in Computer Science : an International Journal

ISSN: 2322--5157
Publisher: ACSIJ Press


ADD TO MY LIST
 
A New Image Steganography Method Based on Pixel Neighbors and 6 Most Significant Bit(MSB) Compare PDF available

Author(s): Mashallah Abbasi Dezfouli | Sajad Nikseresht | Seyed.Enayatallah Alavi
Volume: 2
Issue: 5
Year: 2013
Prolonging sensor networks lifetime using convex clusters PDF available

Author(s): Payam Salehi | Mohammad Ebrahim Shiri Ahmad Abadi
Volume: 2
Issue: 5
Year: 2013
High-Speed Optical Home Network Using Graded Index Plastic Optical Fibers for a Smart House PDF available

Author(s): Tetsuya Toma | Hideo Asada | Tetsuro Ogi | Yasuhiro Koike
Volume: 2
Issue: 5
Year: 2013
Designing Expert System for Detecting Faults in Cloud Environment PDF available

Author(s): Marzieh Shabdiz | Alireza Mohammadrezaei | Hossein Bobarshad
Volume: 2
Issue: 5
Year: 2013
Optimized Method for Real-Time Face Recognition System Based on PCA and Multiclass Support Vector Machine PDF available

Author(s): Reza Azad | Babak Azad | Iman tavakoli kazerooni
Volume: 2
Issue: 5
Year: 2013
Real-Time and Robust Method for Hand Gesture Recognition System Based on Cross-Correlation Coefficient PDF available

Author(s): Reza Azad | Babak Azad | Iman tavakoli kazerooni
Volume: 2
Issue: 5
Year: 2013
Measuring Trust and Selecting Cloud Database Services PDF available

Author(s): W.P. Eureka Priyadarshani | Gihan N. Wikramanayake | E.M. Piyal Ekanayake
Volume: 2
Issue: 5
Year: 2013
An Ontology Design Pattern of the Multidisciplinary and Complex Field of Climate Change PDF available

Author(s): Ibrahima Diop | Moussa Lo
Volume: 2
Issue: 5
Year: 2013
The use of a Comprehensive Identification Infrastructure in Enhancing the lifetime of Sensor Networks PDF available

Author(s): Payam Salehi | Mohammad Ebrahim Shiri Ahmad Abadi
Volume: 2
Issue: 5
Year: 2013
Design Context Aware Activity Recommender System for Iranian Customer Mind Activism in Online Shopping PDF available

Author(s): Saber Pahlavan | Morteza Hajizadeh | Adel Azadkhah | Ali Ansarifard
Volume: 2
Issue: 5
Year: 2013
A Survey: variants of TCP in Ad-hoc networks PDF available

Author(s): Komal Zaman | Muddesar Iqbal | Muhammad Shafiq | Azeem Irshad | Saqib Rasool
Volume: 2
Issue: 5
Year: 2013
Application of Pre-evolution Genetic Algorithm in Fast Path Planning for UCAV PDF available

Author(s): Lu Cao | An Zhang
Volume: 2
Issue: 5
Year: 2013
Novel Feature Selection by Differential Evolution Algorithm PDF available

Author(s): Ali Ghareaghaji | Abdolhamid Sohrabi | Azim Rezaei Motlagh | Majid Tavakoli
Volume: 2
Issue: 5
Year: 2013
Software Architecture Viewpoint Models: A Short Survey PDF available

Author(s): Valiallah Omrani | Seyyed Ali Razavi Ebrahimi
Volume: 2
Issue: 5
Year: 2013
Economic growth models: symbolic and numerical computations PDF available

Author(s): P. B. Vasconcelos
Volume: 2
Issue: 5
Year: 2013
Performance assessment among hybrid algorithms in tuning SVR parameters to predict pipe failure rates PDF available

Author(s): Moosa Kalanaki | Jaber Soltani
Volume: 2
Issue: 5
Year: 2013
Text Mining and Image Anomaly Explanation with Machine Consciousness PDF available

Author(s): John Kontos | Polyxene Kasda
Volume: 2
Issue: 5
Year: 2013
Using Contourlet Transform and Discrete Cosine Transform and SVD for Digital Watermarking PDF available

Author(s): S. A. Hosseini | S. Ghofrani
Volume: 2
Issue: 5
Year: 2013
An Efficient Protocol for Target Tracking in Wireless Sensor Networks (WSNs) PDF available

Author(s): Shabnam Shoaee | Abolfazl Toroghi Haghighat
Volume: 2
Issue: 5
Year: 2013
A Review of Data Mining Techniques for Result Prediction in Sports PDF available

Author(s): Maral Haghighat | Hamid Rastegari | Nasim Nourafza
Volume: 2
Issue: 5
Year: 2013
A Novel Approach for Regenerating a Secure and Reliable Password using Iris and Fingerprint PDF available

Author(s): SOROUSH SHIEKHALHOKAMAII | MOHAMMAD AMIN PIRBONYEH
Volume: 2
Issue: 5
Year: 2013
Traffic-Aware Selection Strategy for Application-Specific 3D NoC PDF available

Author(s): Sanaz Azampanah | Azadeh Eskandari | Ahmad Khademzadeh | Fathollah Karimi
Volume: 2
Issue: 4
Year: 2013
A Mathematical Model for the Rainbow Vertex-Connection Number PDF available

Author(s): Fidan Nuriyeva | Onur Ugurlu | Hakan Kutucu
Volume: 2
Issue: 4
Year: 2013
Image Content Based Retrieval System using Cosine Similarity for Skin Disease Images PDF available

Author(s): Sukhdeep Kaur | Deepak Aggarwal
Volume: 2
Issue: 4
Year: 2013
Adaptive Majority-based Re-routing for Differentiated Delay in Wireless Sensor Networks PDF available

Author(s): Akram Golmohammadi | Sayyed Majid Mazinani
Volume: 2
Issue: 4
Year: 2013
Petro-physical characterization and 3D digital modeling for geometric reconstruction of the Neolithic PDF available

Author(s): Stefano Columbu | Giovanni Guccini | Giorgio Verdiani
Volume: 2
Issue: 4
Year: 2013
A cluster-based topology control algorithm for wireless sensor networks PDF available

Author(s): Abolfazl Toroghi Haghighat | Maryam Rashidi
Volume: 2
Issue: 4
Year: 2013
High Capacity Secure Image Steganography Based on Contourlet Transform PDF available

Author(s): Kolsoom Shahryari | Mehrdad Gholami
Volume: 2
Issue: 4
Year: 2013
Diffuse Objects Extraction in Coronal Holes Using Active Contour Means Model PDF available

Author(s): Hamid Reza Tajik | Javad Rahebi
Volume: 2
Issue: 4
Year: 2013
Comparative study of data fusion algorithms in P300 Based BCI PDF available

Author(s): Mohammed J. Alhaddad | Mahmoud Kamel | Noura Al-Otaibi
Volume: 2
Issue: 4
Year: 2013
Power and Energy Aware Design of an Autonomous Wireless Sensor Node PDF available

Author(s): Nicolas Ferry | Sylvain Ducloyer | Nathalie Julien | Dominique Jutel
Volume: 2
Issue: 4
Year: 2013
Blended Learning Resources in Constrained Bandwidth Environment: Considerations for Network and Multimedia Optimization PDF available

Author(s): Nazir Ahmad Suhail | Jude Lubega | Gilbert Maiga
Volume: 2
Issue: 4
Year: 2013
Design of Tunable Multiple- Cavity Filter for Optical Fiber Communication PDF available

Author(s): Vahideh Khadem Hosseini Ghasemi | Mohammad Orvatinia | Asghar Ebrahimi
Volume: 2
Issue: 3
Year: 2013
Efficient Area and Speed Optimized Multiplication Technique Using Vedic and Tree Addition Structure PDF available

Author(s): Namrata Mishra | Utsav Malviya
Volume: 2
Issue: 3
Year: 2013
Solving the Scheduling Problem in Computational Grid using Artificial Bee Colony Algorithm PDF available

Author(s): Seyyed Mohsen Hashemi | Ali Hanani
Volume: 2
Issue: 3
Year: 2013
Critical Factors in the Effective of Service-Oriented Architecture PDF available

Author(s): Sima Emadi | Raziye Hatami Hanza
Volume: 2
Issue: 3
Year: 2013
An Efficient Mechanism for Data Rate Adaptation in Wireless LAN's PDF available

Author(s): Mohsen Kohan | Hassan Khotanlou | Mohammad Nassiri
Volume: 2
Issue: 3
Year: 2013
A Mechanism to Mitigate Collision Rate in Wireless Local Networks PDF available

Author(s): Ahmad Habibi | Hassan Khotanlou | Mohammad Nassiri
Volume: 2
Issue: 3
Year: 2013
Performance Estimation of DS-CDMA Receivers Using Genetic Algorithm PDF available

Author(s): Ali Ghareaghaji
Volume: 2
Issue: 3
Year: 2013
The analysis of visual parallel programming languages PDF available

Author(s): Vladimir Averbukh | Mikhail Bakhterev
Volume: 2
Issue: 3
Year: 2013
A New Heuristic Constructing Minimal Steiner Trees inside Simple Polygons PDF available

Author(s): Alireza Khosravinejad | Alireza Bagheri | Vahid Khosravinejad
Volume: 2
Issue: 3
Year: 2013
A New Heuristic Algorithm for Constructing Steiner Trees inside Simple polygons in Presence of Obstacles PDF available

Author(s): Vahid Khosravinejad | Alireza Bagheri | Alireza Khosravinejad
Volume: 2
Issue: 3
Year: 2013
Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks PDF available

Author(s): Mohammad Reza Rohbanian | Mohammad Rafi Kharazmi | Alireza Keshavarz-Haddad | Manije Keshtgary
Volume: 2
Issue: 3
Year: 2013
A New Approach for Labeling Images Using CAPTCHA in Image Semantic Search Engines PDF available

Author(s): Amir Golchini | Abolfazl Toroghi Haghighat | Hasan Rashidi
Volume: 2
Issue: 3
Year: 2013
Designing a Clustering and Prediction-based Protocol for Target Tracking in Wireless Sensor Networks (WSNs) PDF available

Author(s): Vahid Hosseini | Abolfazl Toroghi Haghighat | Farshad Eshghi Esfahani
Volume: 2
Issue: 3
Year: 2013
A Hybrid Approach for Optimal Feature Selection based on Evolutionary Algorithms and Classic Approaches PDF available

Author(s): Hassan Abedi | Habib Rostami | Shiva Rahimi
Volume: 2
Issue: 3
Year: 2013
Security Architecture for Advanced Metering Infrastructure PDF available

Author(s): Seongho Ju | Moonsuk Choi | Chunghyo Kim | Yonghun Lim
Volume: 2
Issue: 3
Year: 2013
A novel and robust method for automatic license plate recognition system based on pattern recognition PDF available

Author(s): Reza Azad | Fatemeh Davami | Babak Azad
Volume: 2
Issue: 3
Year: 2013
Combination of SVM and FERN for GPU-assisted texture recognition on mobile devices PDF available

Author(s): Vsevolod Yugov | Itsuo Kumazawa
Volume: 2
Issue: 3
Year: 2013
Distributed Data Storage Model for Cattle Health Monitoring Using WSN PDF available

Author(s): Ankit R. Bhavsar | Disha J. Shah | Harshal A. Arolkar
Volume: 2
Issue: 2
Year: 2013
Strategic Evaluation of Web-based E-learning; a review on 8 articles PDF available

Author(s): Shahriar Mohammadi | Sajad Homayoun
Volume: 2
Issue: 2
Year: 2013
An Adaptive K-random Walks Method for Peer-to-Peer Networks PDF available

Author(s): Mahdi Ghorbani
Volume: 2
Issue: 2
Year: 2013
Presentation of an approach for adapting software production process based ISO/IEC 12207 to ITIL Service PDF available

Author(s): Samira Haghighatfar | Nasser Modiri | Amir Houshang Tajfar
Volume: 2
Issue: 2
Year: 2013
A Multi Hop Clustering Algorithm For Reduce Energy Consumption in Wireless Sensor Networks PDF available

Author(s): Mohammad Ahmadi | Mahdi Darvishi
Volume: 2
Issue: 2
Year: 2013
Applying a natural intelligence pattern in cognitive robots PDF available

Author(s): Seyedeh Negar Jafari | Jafar Jafari Amirbandi | Amir Masoud Rahmani
Volume: 2
Issue: 2
Year: 2013
Security-Aware Dispatching of Virtual Machines in Cloud Environment PDF available

Author(s): Mohammad Amin Keshtkar | Seyed Mohammad Ghoreyshi | Saman Zad Tootaghaj
Volume: 2
Issue: 2
Year: 2013
Proposed New Mechanism to Detect and Defend the Malicious Attackers in AODV PDF available

Author(s): Vijay Kumar | Ashwani Kush
Volume: 2
Issue: 2
Year: 2013
Enterprise Microblogging tool to increase employee participation in organizational knowledge management PDF available

Author(s): Jalal Rezaeenour | Mahdi Niknam
Volume: 2
Issue: 2
Year: 2013
Application of Bees Algorithm in Multi-Join Query Optimization PDF available

Author(s): Mohammad Alamery | Ahmad Faraahi | H. Haj Seyyed Javadi | Sadegh Nourossana | Hossein Erfani
Volume: 1
Issue: 1
Year: 2012
Task Scheduling problem in distributed systems considering communication cost and precedence by population-based ACO PDF available

Author(s): Hossein Erfani | Sadegh Nourossana | H.Haj seyed javadi
Volume: 1
Issue: 1
Year: 2012
Software Architecture in the Agile Life Cycle PDF available

Author(s): Diego Fontdevila | Martín Salías
Volume: 2
Issue: 1
Year: 2013
Evaluating Application Architecture, Quantitatively PDF available

Author(s): V. Gnanasekaran
Volume: 2
Issue: 1
Year: 2013
On Distributed Embedded Systems PDF available

Author(s): Arvindra Sehmi
Volume: 2
Issue: 1
Year: 2013
Key management in heterogeneous wireless sensor networks using Voronoi diagrams PDF available

Author(s): Ronak Tahmasbi | H.Haj seyed javadi | M.E.Shiri | Ahmad Allahyari
Volume: 2
Issue: 1
Year: 2013
Is SOA Being Pushed Beyond Its Limits? PDF available

Author(s): Grace A. Lewis
Volume: 2
Issue: 1
Year: 2013
Caching in the Distributed Environment PDF available

Author(s): Abhijit Gadkari
Volume: 2
Issue: 1
Year: 2013
Service Registry: A Key Piece for Enhancing Reuse in SOA PDF available

Author(s): Juan Pablo García-González | Verónica Gacitúa-Décar | Dr. Claus Pahl
Volume: 2
Issue: 1
Year: 2013
Semantic Enterprise Optimizer and Coexistence of Data Models PDF available

Author(s): P. A. Sundararajan | Anupama Nithyanand | S.V. Subrahmanya
Volume: 1
Issue: 1
Year: 2012
Surviving Turbulent Times: Prioritizing IT Initiatives Using Business Architecture PDF available

Author(s): Martin Sykes | Brad Clayton
Volume: 1
Issue: 1
Year: 2012
How the Cloud Stretches the SOA Scope PDF available

Author(s): Lakshmanan G | Manish Pande
Volume: 1
Issue: 1
Year: 2012
Engineering in the Cloud: An Engineering Software + Services Architecture Forged in Turbulent Times PDF available

Author(s): Peter Williams | Simon Cox
Volume: 1
Issue: 1
Year: 2012
Developing Parallel Programs PDF available

Author(s): Ranjan Sen
Volume: 1
Issue: 1
Year: 2012
A Foundation for the Pillars of Software Factories PDF available

Author(s): Tom Fuller
Volume: 1
Issue: 1
Year: 2012
Free Forms + CRM     Why do you need a reservation system?