Academic Journals Database
Disseminating quality controlled scientific knowledge

Advances in Computer Science : an International Journal

ISSN: 2322--5157
Publisher: ACSIJ Press


ADD TO MY LIST
 
Software Architecture Viewpoint Models: A Short Survey PDF available

Author(s): Valiallah Omrani | Seyyed Ali Razavi Ebrahimi
Volume: 2
Issue: 5
Year: 2013
Design Context Aware Activity Recommender System for Iranian Customer Mind Activism in Online Shopping PDF available

Author(s): Saber Pahlavan | Morteza Hajizadeh | Adel Azadkhah | Ali Ansarifard
Volume: 2
Issue: 5
Year: 2013
Application of Pre-evolution Genetic Algorithm in Fast Path Planning for UCAV PDF available

Author(s): Lu Cao | An Zhang
Volume: 2
Issue: 5
Year: 2013
Designing Expert System for Detecting Faults in Cloud Environment PDF available

Author(s): Marzieh Shabdiz | Alireza Mohammadrezaei | Hossein Bobarshad
Volume: 2
Issue: 5
Year: 2013
An Ontology Design Pattern of the Multidisciplinary and Complex Field of Climate Change PDF available

Author(s): Ibrahima Diop | Moussa Lo
Volume: 2
Issue: 5
Year: 2013
Measuring Trust and Selecting Cloud Database Services PDF available

Author(s): W.P. Eureka Priyadarshani | Gihan N. Wikramanayake | E.M. Piyal Ekanayake
Volume: 2
Issue: 5
Year: 2013
Using Contourlet Transform and Discrete Cosine Transform and SVD for Digital Watermarking PDF available

Author(s): S. A. Hosseini | S. Ghofrani
Volume: 2
Issue: 5
Year: 2013
Novel Feature Selection by Differential Evolution Algorithm PDF available

Author(s): Ali Ghareaghaji | Abdolhamid Sohrabi | Azim Rezaei Motlagh | Majid Tavakoli
Volume: 2
Issue: 5
Year: 2013
An Efficient Protocol for Target Tracking in Wireless Sensor Networks (WSNs) PDF available

Author(s): Shabnam Shoaee | Abolfazl Toroghi Haghighat
Volume: 2
Issue: 5
Year: 2013
A Review of Data Mining Techniques for Result Prediction in Sports PDF available

Author(s): Maral Haghighat | Hamid Rastegari | Nasim Nourafza
Volume: 2
Issue: 5
Year: 2013
A Survey: variants of TCP in Ad-hoc networks PDF available

Author(s): Komal Zaman | Muddesar Iqbal | Muhammad Shafiq | Azeem Irshad | Saqib Rasool
Volume: 2
Issue: 5
Year: 2013
A New Image Steganography Method Based on Pixel Neighbors and 6 Most Significant Bit(MSB) Compare PDF available

Author(s): Mashallah Abbasi Dezfouli | Sajad Nikseresht | Seyed.Enayatallah Alavi
Volume: 2
Issue: 5
Year: 2013
Performance assessment among hybrid algorithms in tuning SVR parameters to predict pipe failure rates PDF available

Author(s): Moosa Kalanaki | Jaber Soltani
Volume: 2
Issue: 5
Year: 2013
Optimized Method for Real-Time Face Recognition System Based on PCA and Multiclass Support Vector Machine PDF available

Author(s): Reza Azad | Babak Azad | Iman tavakoli kazerooni
Volume: 2
Issue: 5
Year: 2013
A Novel Approach for Regenerating a Secure and Reliable Password using Iris and Fingerprint PDF available

Author(s): SOROUSH SHIEKHALHOKAMAII | MOHAMMAD AMIN PIRBONYEH
Volume: 2
Issue: 5
Year: 2013
The use of a Comprehensive Identification Infrastructure in Enhancing the lifetime of Sensor Networks PDF available

Author(s): Payam Salehi | Mohammad Ebrahim Shiri Ahmad Abadi
Volume: 2
Issue: 5
Year: 2013
Real-Time and Robust Method for Hand Gesture Recognition System Based on Cross-Correlation Coefficient PDF available

Author(s): Reza Azad | Babak Azad | Iman tavakoli kazerooni
Volume: 2
Issue: 5
Year: 2013
Economic growth models: symbolic and numerical computations PDF available

Author(s): P. B. Vasconcelos
Volume: 2
Issue: 5
Year: 2013
Text Mining and Image Anomaly Explanation with Machine Consciousness PDF available

Author(s): John Kontos | Polyxene Kasda
Volume: 2
Issue: 5
Year: 2013
High-Speed Optical Home Network Using Graded Index Plastic Optical Fibers for a Smart House PDF available

Author(s): Tetsuya Toma | Hideo Asada | Tetsuro Ogi | Yasuhiro Koike
Volume: 2
Issue: 5
Year: 2013
Prolonging sensor networks lifetime using convex clusters PDF available

Author(s): Payam Salehi | Mohammad Ebrahim Shiri Ahmad Abadi
Volume: 2
Issue: 5
Year: 2013
High Capacity Secure Image Steganography Based on Contourlet Transform PDF available

Author(s): Kolsoom Shahryari | Mehrdad Gholami
Volume: 2
Issue: 4
Year: 2013
Petro-physical characterization and 3D digital modeling for geometric reconstruction of the Neolithic PDF available

Author(s): Stefano Columbu | Giovanni Guccini | Giorgio Verdiani
Volume: 2
Issue: 4
Year: 2013
A Mathematical Model for the Rainbow Vertex-Connection Number PDF available

Author(s): Fidan Nuriyeva | Onur Ugurlu | Hakan Kutucu
Volume: 2
Issue: 4
Year: 2013
Image Content Based Retrieval System using Cosine Similarity for Skin Disease Images PDF available

Author(s): Sukhdeep Kaur | Deepak Aggarwal
Volume: 2
Issue: 4
Year: 2013
Comparative study of data fusion algorithms in P300 Based BCI PDF available

Author(s): Mohammed J. Alhaddad | Mahmoud Kamel | Noura Al-Otaibi
Volume: 2
Issue: 4
Year: 2013
Power and Energy Aware Design of an Autonomous Wireless Sensor Node PDF available

Author(s): Nicolas Ferry | Sylvain Ducloyer | Nathalie Julien | Dominique Jutel
Volume: 2
Issue: 4
Year: 2013
Adaptive Majority-based Re-routing for Differentiated Delay in Wireless Sensor Networks PDF available

Author(s): Akram Golmohammadi | Sayyed Majid Mazinani
Volume: 2
Issue: 4
Year: 2013
Blended Learning Resources in Constrained Bandwidth Environment: Considerations for Network and Multimedia Optimization PDF available

Author(s): Nazir Ahmad Suhail | Jude Lubega | Gilbert Maiga
Volume: 2
Issue: 4
Year: 2013
A cluster-based topology control algorithm for wireless sensor networks PDF available

Author(s): Abolfazl Toroghi Haghighat | Maryam Rashidi
Volume: 2
Issue: 4
Year: 2013
Traffic-Aware Selection Strategy for Application-Specific 3D NoC PDF available

Author(s): Sanaz Azampanah | Azadeh Eskandari | Ahmad Khademzadeh | Fathollah Karimi
Volume: 2
Issue: 4
Year: 2013
Diffuse Objects Extraction in Coronal Holes Using Active Contour Means Model PDF available

Author(s): Hamid Reza Tajik | Javad Rahebi
Volume: 2
Issue: 4
Year: 2013
A novel and robust method for automatic license plate recognition system based on pattern recognition PDF available

Author(s): Reza Azad | Fatemeh Davami | Babak Azad
Volume: 2
Issue: 3
Year: 2013
Designing a Clustering and Prediction-based Protocol for Target Tracking in Wireless Sensor Networks (WSNs) PDF available

Author(s): Vahid Hosseini | Abolfazl Toroghi Haghighat | Farshad Eshghi Esfahani
Volume: 2
Issue: 3
Year: 2013
Efficient Area and Speed Optimized Multiplication Technique Using Vedic and Tree Addition Structure PDF available

Author(s): Namrata Mishra | Utsav Malviya
Volume: 2
Issue: 3
Year: 2013
Security Architecture for Advanced Metering Infrastructure PDF available

Author(s): Seongho Ju | Moonsuk Choi | Chunghyo Kim | Yonghun Lim
Volume: 2
Issue: 3
Year: 2013
Design of Tunable Multiple- Cavity Filter for Optical Fiber Communication PDF available

Author(s): Vahideh Khadem Hosseini Ghasemi | Mohammad Orvatinia | Asghar Ebrahimi
Volume: 2
Issue: 3
Year: 2013
A Mechanism to Mitigate Collision Rate in Wireless Local Networks PDF available

Author(s): Ahmad Habibi | Hassan Khotanlou | Mohammad Nassiri
Volume: 2
Issue: 3
Year: 2013
Solving the Scheduling Problem in Computational Grid using Artificial Bee Colony Algorithm PDF available

Author(s): Seyyed Mohsen Hashemi | Ali Hanani
Volume: 2
Issue: 3
Year: 2013
A New Approach for Labeling Images Using CAPTCHA in Image Semantic Search Engines PDF available

Author(s): Amir Golchini | Abolfazl Toroghi Haghighat | Hasan Rashidi
Volume: 2
Issue: 3
Year: 2013
A New Heuristic Algorithm for Constructing Steiner Trees inside Simple polygons in Presence of Obstacles PDF available

Author(s): Vahid Khosravinejad | Alireza Bagheri | Alireza Khosravinejad
Volume: 2
Issue: 3
Year: 2013
Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks PDF available

Author(s): Mohammad Reza Rohbanian | Mohammad Rafi Kharazmi | Alireza Keshavarz-Haddad | Manije Keshtgary
Volume: 2
Issue: 3
Year: 2013
A New Heuristic Constructing Minimal Steiner Trees inside Simple Polygons PDF available

Author(s): Alireza Khosravinejad | Alireza Bagheri | Vahid Khosravinejad
Volume: 2
Issue: 3
Year: 2013
Critical Factors in the Effective of Service-Oriented Architecture PDF available

Author(s): Sima Emadi | Raziye Hatami Hanza
Volume: 2
Issue: 3
Year: 2013
The analysis of visual parallel programming languages PDF available

Author(s): Vladimir Averbukh | Mikhail Bakhterev
Volume: 2
Issue: 3
Year: 2013
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Rapperswil
Tango Rapperswil