default search action
Journal of Computer Science, Volume 9
Volume 9, Number 1, 2013
- G. Madasamy Raja, V. Sadasivam:
Optimized Local Ternary Patterns: a New texture Model with Set of Optimal Patterns for texture Analysis. 1-15 - Nor Fazlida Mohd Sani, Noor Afiza Mohd Ariffin, Rodziah Binti Atan:
Design of Object-Oriented Debugger Model by using Unified Modeling Language. 16-29 - P. S. Rama Praba, H. Ranganathan:
Wavelet transform based Automatic Lesion Detection in Cervix Images using Active Contour. 30-36 - S. Lakshmi, S. Radha:
Selfish Scheduler for Packet Scheduling based on Packet Weighted Energy drain rate in MANETs. 37-42 - M. Nirmala, V. Palanisamy:
An Efficient Prediction of missing Itemset in Shopping cart. 55-62 - Sivasubramaniam Nandhini, Senniappan Palaniammal:
Stateless Aggregate Fair Marking Scheduler for Differentiated Service Networks. 63-73 - Jess Nielsen, Sufyan Almajali:
Collecting Data from Running Systems. 74-82 - R. Uma, K. Muneeswaran:
Efficacious Geospatial Information Retrieval using density Probabilistic Document Correlation Approach. 83-93 - Urmila Shrawankar, Vilas M. Thakare:
A Hybrid method for Automatic speech Recognition Performance Improvement in Real World noisy Environment. 94-104 - S. Madhavi, K. Duraiswamy:
Flooding Attack Aware Secure AODV. 105-113 - Petcharat Pattanasethanon, Kriangsak Chanthinok:
An Evaluation of the Information Systems for Teaching and Learning Online of the Public University. 114-121 - Ravie Chandren Muniyandi, Abdullah Mohd Zin:
Membrane Computing as the Paradigm for Modeling Systems Biology. 122-127 - Adnan Mukred, Dalbir Singh, Nurhizam Safie:
A Review on the Impact of Information Culture on the Adoption of Health Information System in Developing Countries. 128-138 - S. Vijayakumar Bharathi, Dhanya Pramod, Ramakrishnan Raman:
A fuzzy Petri-Net based Conceptual Model for Risk Prediction in Enterprise Resource Planning Acquisition Decisions for Small and Medium Enterprises. 139-146
Volume 9, Number 2, 2013
- C. Sathiyakumar, K. Duraiswamy:
A Hybrid Approach for Node Co-Operation based Clustering in Mobile Ad Hoc Networks. 147-154 - Naveen Raman, Thanushkodi Keppanagounder:
Gate Replacement Technique for Reducing Leakage current in Wallace Tree Multiplier. 155-158 - Mohammed Serrhini, Abdelaziz Aït Moussa:
Home Users Security and the Web Browser Inbuilt Settings, Framework to setup IT Automatically. 159-168 - J. Venkatesh, C. Aarthy, S. Thenmozhi, P. Balasubramanie:
Operation of Enterprise Resource Planning System Implementation Compatibility towards Technical Advancement. 169-175 - T. Sree Sharmila, K. Ramar, T. Sree Renga Raja:
Comparative Analysis of satellite Image pre-Processing Techniques. 176-182 - Danilo Pelusi, Raffaele Mascella:
Optimal control Algorithms for second order Systems. 183-197 - C. Sundar, M. Chitradevi, G. Geetharamani:
An Overview of Research Challenges for Classification of cardiotocogram Data. 198-206 - Godfrey Winster Sathianesan, Swamynathan Sankaranarayanan:
Unified Semantic Blog Mining Framework and Summarized Blog Retrieval. 207-217 - Wikaria Gazali, Haryono Soeparno, Ngarap Im. Manik:
The Classification Model of Sandals Dhiif's Product with Back Propagation and Fourier Descriptors method. 218-224 - R. Sadasivam, K. Duraiswamy:
Efficient Approach to Discover interval-based Sequential Patterns. 225-234 - R. Kannan, S. Ravi:
Second-order Statistical Approach for Digital modulation Scheme Classification in Cognitive Radio using Support Vector Machine and k-Nearest Neighbor Classifier. 235-243 - Imas Sukaesih Sitanggang, Razali Yaakob, Norwati Mustapha, A. N. Ainuddin:
Classification Model for Hotspot Occurrences using Spatial Decision Tree Algorithm. 244-251 - Isam Azawi Mohialdeen:
Comparative Study of Scheduling al-Grotihms in Cloud Computing. 252-263 - Ali Maroosi, Ravie Chandren Muniyandi:
Membrane Computing Inspired Genetic Algorithm on Multi-Core Processors. 264-270 - S. Periyasamy, K. Duraiswamy:
A proficient Traceback Approach using Provincial Locality Aspects to Eliminate Denial of Service Attacks. 271-276
Volume 9, Number 3, 2013
- Prabakaran Ganesan, R. Bhavani:
A High Secure and robust Image Steganography using Dual wavelet and blending Model. 277-284 - K. Rajakumar, S. Muttan:
A Framework for MRI Image Retrieval using Curvelet transform and Euclidean Distance. 285-290 - Pitsanu Tongkhow, Nantachai Kantanantha:
Bayesian Models for Time Series with covariates, Trend, Seasonality, Autoregression and Outliers. 291-298 - Arun Bhaskar Mayilvaganan, Subhransu Sekhar Dash, Venkatesh Venkataramanan:
Grid voltage stability enhancement using Photovoltaic based Static Synchronous compensator. 299-307 - Igni Sabasti Prabu Siluvai, V. Jawahar Senthil Kumar:
A Framework for Simple Object Access Protocol Messages to Detect Expansion Attacks for Secure Webservice. 308-313 - Saad Elmansori:
Conditioned Slicing for Efficient Multiway Decision graphs Model-Checker. 314-326 - R. S. Somasundaram, R. Nedunchezhian:
Radial Basis function Network dependent Exclusive Mutual interpolation for missing Value imputation. 327-334 - Adib M. Monzer Habbal, Suhaidi Hassan:
A Model for Congestion control of Transmission control Protocol in Mobile Wireless Ad Hoc Networks. 335-342 - Karpagam Vilvanathan, Rangarajan Rangaswamy:
Bi-Level Classification of Color Indexed Image Histograms for Content based Image Retrieval. 343-349 - R. Beulah Jayakumari, V. Jawahar Senthilkumar:
Priority based Congestion Detection and avoidance in Wireless Sensor Networks. 350-357 - G. Tamil Pavai, S. Tamil Selvi:
Identification of Proliferative Diabetic Retinopathy using texture Segmentation. 358-367 - V. Berlin Hency, D. Sridharan:
Multicast-Supported Fast Handover for Proxy Mobile IPv6. 368-376 - Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
Generalization of Dijkstra's Algorithm for Extraction of Shortest Paths in Directed multigraphs. 377-382 - Arief Ramadhan, Dana Indra Sensuse, Muladno, Aniati Murni Arymurthy:
Success Factors for E-Livestock: an E-Government Initiative. 383-390 - Dahlia Asyiqin Ahmad Zainaddin, Zurina Mohd Hanapi:
Hybrid of fuzzy Clustering Neural Network over NSL Dataset for Intrusion Detection System. 391-403
Volume 9, Number 4, 2013
- M. Krishnamoorthi, A. M. Natarajan:
Artificial Bee Colony Algorithm Integrated with fuzzy C-mean operator for Data Clustering. 404-412 - Mohammad Syuhaimi Ab-Rahman, Hadiguna, Latifah Sarah Supian:
Selection of spectral filters for optical Demultiplexer-same filter Different Source. 413-420 - Karim Al-Saedi, Selvakumar Manickam, Sureswaran Ramadass, Wafaa A. H. Al-Salihy, Ammar Almomani:
Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining. 421-426 - Waleed Halboob, Ali Mamat, Ramlan Mahmod, Muhammad Khurram Khan:
Temporal, Delegable and Cheap Update Access control to published XML Documents. 427-432 - V. Ganesh Kumar, K. Muneeswaran:
Intelligent Apriori Algorithm for Complex Activity Mining in Supermarket Applications. 433-438 - T. Guru Baskar, D. Manimegalai:
Secured Routing with Authentication in Mobile Ad Hoc Networks. 439-448 - Mohammad Syuhaimi Ab-Rahman, Hadiguna, Latifah Sarah Supian, Malik Sulaiman:
Selection of spectral filters for optical Demultiplexer via same Source Different filters Testing Technique. 449-454 - Roswan Ismail, Nor Asilah Wati Abdul Hamid, Mohamed Othman, Rohaya Latip:
Performance Analysis of Message Passing Interface Collective Communication on Intel Xeon Quad-Core Gigabit Ethernet and InfiniBand Clusters. 455-462 - Noocharin Tippayawannakorn, Juta Pichitlamken:
Nelder-Mead method with Local Selection using Neighborhood and Memory for stochastic Optimization. 463-476 - Saravana Kumar Muthusamy, Thiyagarajan Purusothaman, Lavanya Selvaraj:
An Enhanced and Cost Effective Group Key Management Scheme for Multicast Network. 477-487 - Mohammed Abuhamad, Masnizah Mohd, Juhana Salim:
Event-Driven Business Intelligence Approach for Real-Time Integration of Technical and fundamental Analysis in Forex Market. 488-499 - Kugalur Muthusamy Palaniswamy, Veerappa Gounder Palanisamy:
The Optimistic adaptive modulation Technique for Future Wireless Communication. 500-513 - K. Duraisamy, U. Ragavendran, Wathita Phachonpai, Supaporn Muchimapura, Terdthai Tong-Un, Jintanaporn Wattanathorn, Wipawee Thukhammee:
Low Power analog Multiplier using MIFGMOS. 514-520 - Vydeki Dharmar, R. S. Bhuvaneswaran:
Effect of Clustering in Designing a fuzzy based Hybrid Intrusion Detection System for Mobile Ad Hoc Networks. 521-525 - C. Emilin Shyni, S. Swamynathan:
Protecting the Online User's Information against Phishing Attacks using Dynamic Encryption Techniques. 526-533
Volume 9, Number 5, 2013
- Devarj Saravanan, Subramaniam Srinivasan:
Matrix based Indexing Technique for video Data. 534-542 - M. Raghini, N. Uma Maheswari, R. Venkatesh:
Overview on Key Distribution Primitives in Wireless Sensor Network. 543-550 - Ragb O. M. Saleh, Md. Yazid Mohd. Saman, M. Nordin A. Rahman:
A New Policy for Path Selection in Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks. 551-557 - Mohanavalli Seetha Subramanian, Sheila Anand:
Fuzzy System to Authenticate Assisted Living patients in their Home Environment. 558-565 - J. Viji Priya, S. Suppiah:
Application of Newton Raphson Algorithm for Optimizing Transmission control Protocol Performance. 566-571 - M. Jasmine Pemeena Priyadarsini, K. Murugesan, Inabathini Srinivasa Rao, Y. Saiteja, Vemana Janith:
Automatic target Recognition in cluttered visible imagery. 572-582 - Nurhizam Safie, Syed Mohamed Aljunid:
E-Learning Initiative Capacity Building for Healthcare Workforce of Developing Countries. 583-591 - Poonguzhali M., Shanmugavel S.:
A fuzzy based Mechanism for Allocation of Grid Resources. 592-606 - Salwa Aqeel Mahdi, Mohamed Othman, Hamidah Ibrahim, Jalil M. Desa, Jumat Sulaiman:
Protocols for Secure Routing and Transmission in Mobile Ad Hoc Network: a Review. 607-619 - Taghi Javdani Gandomani, Hazura Zulzalil, Abdul Azim Abdul Ghani, Abu Bakar Md Sultan, Mina Ziaei Nafchi:
Obstacles in Moving to Agile Software Development methods; at a Glance. 620-625 - Bhavneet Kaur, Karanjeet Singh Kahlon, Sandeep Sharma:
Safety criterion in Inter-Domain Routing Protocol with Pseudo Renewals. 626-634 - Qasem Abu Al-Haija, Mohamed H. Shwehdi, Muhammad Banat:
Evaluation Metrics for Wireless Sensor Network Security: Algorithms Review and Software Tool. 635-645 - N. Thangadurai, Dhanasekaran Raghavan:
Optimal Energy Consumption to Extend the Lifetime of Wireless Sensor Networks. 646-653 - Albert Pravin, Subramaniam Srinivasan:
Effective Test Case Selection and prioritization in Regression Testing. 654-659 - P. Vijaya Karthick, V. Vasudevan:
Dynamic souple Wireless Grid Applications for HORDE of jobs by sensible Centrality Scheduling with Redite. 660-670
Volume 9, Number 6, 2013
- G. Malathy, R. M. Somasundaram, K. Duraiswamy:
Performance Improvement in Cloud Computing using Resource Clustering. 671-677 - Akila, Uma Maheswari:
Content based Medical Image Retrieval using Binary Association Rules. 678-689 - Walid Aly, Basheer Yousif, Bassem Zohdy:
A deoxyribonucleic acid Compression Algorithm using Auto-Regression and Swarm Intelligence. 690-698 - Hasan Al-Sakran:
Agent and Radio frequency identification based Architecture for Supermarket Information System. 699-707 - Budi Yulianto, Muhsin Shodiq, Lusiana Citra Dewi:
Sound and Digital class Room: Smart Way to have a Language Laboratory. 708-715 - Ferda Ernawan, Nur Azman Abu, Nanna Suryana:
Adaptive Tchebichef moment transform Image Compression using Psychovisual Model. 716-725 - J. Amjath Ali, J. Janet:
Mass Classification in Digital Mammograms based on discrete Shearlet transform. 726-732 - Octavia George, Maria Gorethi, Syerra Riswandi, Widodo Budiharto:
The Development of Expert Mood Identifier System using fuzzy Logic on BlackBerry Platform. 733-739 - Kaushik Velusamy, Shriram K. Vasudevan, Sankari Gopalakrishnan, Subashri Vasudevan, Balachandran Arumugam:
Adapting Linux as Mobile Operating System. 740-748 - Andrews Jeyaraj, Thangappan Sasikala:
Evaluation of various Compiler Optimization Techniques Related to MiBench Benchmark Applications. 749-756 - Gokul Murugesan, Shriram K. Vasudevan, Sivaraman Ramachandran, Subashri Vasudevan, Balachandran Arumugam:
Vehicle identification using fuzzy adaline neural network. 757-762 - Hussain Mohammad Abu-Dalbouh:
A Questionnaire Approach based on the Technology Acceptance Model for Mobile tracking on Patient progress Applications. 763-770 - Hussain Mohammad Abu-Dalbouh:
Fast Real Time Analysis of Web Server Massive Log Files using an Improved Web Mining Architecture. 771-779 - Wafaa Omar, Amr Badr, Abd El Fatah Hegazy:
Hybrid Ant-based Clustering Algorithm with Cluster Analysis Techniques. 780-793 - Ruki Harwahyu, Alfa Sheffildi Manaf, Bayu Sri Ananto, Burhan Adi Wicaksana, Riri Fitri Sari:
Implementation of Color-blind Aid System. 794-810
Volume 9, Number 7, 2013
- Nur Azman Abu, Ferda Ernawan, Nanna Suryana:
An Image dithering via Tchebichef moment transform. 811-820 - Inácio Yano, Vitor Chaves de Oliveira, Eric Alberto de Mello Fagotto, Alexandre de Assis Mota, Lia Toledo Moreira Mota:
Predicting battery charge Depletion in Wireless Sensor Networks using received signal strength indicator. 821-826 - Vitor Chaves de Oliveira, Inácio Yano, Alexandre de Assis Mota, Lia Toledo Moreira Mota:
Feasibility of Desktop Virtualization per Software Services and Local Hardware based on the Network Throughput. 827-837 - Venkata Ratnam Tatavolu, Seetha Ramaiah Panchumarthy:
Embedded Computer based Active vibration control System for vibration Reduction of flexible Structures. 838-846 - Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
Real Time multigraphs for Communication Networks: an intuitionistic fuzzy Mathematical Model. 847-855 - Abdelhak Boulaalam, El Habib Nfaoui, Omar El Beqqali:
Intelligent Product based on Mobile Agent to Accelerate the New Product Development Process. 856-865 - Mohammad Syuhaimi Ab-Rahman, Hadiguna, Latifah Sarah Supian:
Power Analysis on same filter Different Sources for Selection of spectral filters in optical Demultiplexer. 866-874 - Ethala Kamalanaban, R. Shesadri, N. G. Renganathan:
The Use of Random Forest Classification and k-means Clustering Algorithm for Detecting Time stamped Signatures in the Active Networks. 875-882 - Jafreen Hossain, Nor Fazlida Mohd Sani, Aida Mustapha, Lilly Suriani Affendey:
Using Feature Selection as accuracy Benchmarking in Clinical Data Mining. 883-888 - Zulaini Yahya, Muhamad Taufik Abdullah, Azreen Azman, Rabiah Abdul Kadir:
Query Translation using Concepts Similarity based on Quran Ontology for Cross-Language Information Retrieval. 889-897 - Wesam Bhaya, Abdul Monem S. Rahma, Dhamyaa Al-Nasrawi:
Text Steganography based on Font Type in MS-Word Documents. 898-904 - Radityo Anggoro, Teruaki Kitasuka, Ryoji Nakamura, Masayoshi Aritsugi:
Performance Evaluation of Probabilistic Relay in Ad Hoc on-demand Distance Vector and Ad Hoc on-demand multipath Distance Vector under Highly Dynamic Environments. 905-921 - Mohammed Aboaoga, Mohd Juzaiddin Ab Aziz:
Arabic Person Names Recognition by using a Rule based Approach. 922-927 - S. Balu, K. Amudha, C. Nelson Kennedy Babu:
Human Visual sensitivity Guided bit Embedding for video Steganography. 928-934 - Mohammad Syuhaimi Ab-Rahman, Farshad Nasimi Khameneh:
Cost-Effective wire-Harness Model by using Polymer optical Fiber. 935-942
Volume 9, Number 8, 2013
- Rose Al Qasem, Taisir Eldos:
An Efficient cell Placement using gravitational Search Algorithms. 943-948 - Attariuas Hicham, Mohammed Bouhorma, Abdellah El-Fallahi:
A Novel Approach based on Genetic fuzzy Clustering and adaptive Neural Networks for Sales Forecasting. 949-966 - Ali Ahmad Milad, Zul Azri Bin Muhamad Noh, Abdul Samad Shibghatullah, Shahrin Sahib, Rabiah Ahmad, Mustafa Almahdi Algaet:
Transmission control Protocol Performance Comparison using Piggyback Scheme in WLANs. 967-971 - Thangavel Prem Jacob, Thavasi Anandam Ravi:
Optimization of Test Cases by prioritization. 972-980 - Ashraph Sulaiman, S. V. Kasmir Raja, Sung Han Park:
On-the-Fly Key Generation for an Efficient Road Side Units based Authentication in Vehicular Networks. 981-989 - Prema Kannan, Senthil Kumar Natarajan, Subhransu Sekhar Dash:
Design of fuzzy Logic controller for Online Speed regulation of DC motor using PWM Technique based on Laboratory Virtual Instrument Engineering Workbench. 990-997 - Elangovan Uma, Arputharaj Kannan:
The Dynamic Nonce based Authentication Scheme to Defend Intermediary Attack for Web Services. 998-1007 - Norwati Mustapha, Wong Pei Voon, Md Nasir Sulaiman:
User Recommendation Algorithm in Social Tagging System based on Hybrid User Trust. 1008-1018 - Moaiad Khder, Zulaiha Ali Othman, AbdullahMohdZin, Salha Abdullah:
Improving Data Availability in Mobile Environment using Data Allocation. 1019-1029 - V. Kavitha, V. Palanisamy:
New burst assembly and Scheduling Technique for optical burst switching Networks. 1030-1040 - Magesh, Thangaraj:
Comparing the Performance of Semantic Image Retrieval using SPARQL Query, Decision Tree Algorithm and LIRE. 1041-1050 - R. Surendran, B. Parvatha Varthini:
Inject an elastic Grid Computing Techniques to Optimal Resource Management Technique Operations. 1051-1060 - Ahmed Farag Seddik, Riham Amin Hassan, Mahmoud A. Fakhreldein:
Spectral Domain Features for Ovarian cancer Data Analysis. 1061-1068 - M. A. Berlin, Sheila Anand:
Formal Verification of Safety Message Dissemination Protocol for VANETs. 1069-1078 - Bashir Alam:
Fuzzy Round Robin CPU Scheduling Algorithm. 1079-1085
Volume 9, Number 9, 2013
- B. Murugeshwari, C. Jayakumar, K. Sarukesi:
Preservation of the Privacy for Multiple Custodian Systems with Rule Sharing. 1086-1091 - Sangeetha Kuppusamy, Natarajan Mathaiyan:
Intellisense Cluster Management and Energy Efficient Routing in Mobile Ad Hoc Networks. 1092-1098 - Anindito, Bens Pardamean, Robby Christian, Bahtiar Saleh Abbas:
Expert-System based Medical Stroke Prevention. 1099-1105 - D. Udaya Suriya Rajkumar, Rajamani Vayanaperumal:
A Leader based Monitoring Approach for sinkhole Attack in Wireless Sensor Network. 1106-1116 - D. Egfin Nirmala, A. Bibin Sam Paul, Vaidehi V.:
Improving Independent Component Analysis using Support Vector Machines for Multimodal Image fusion. 1117-1132 - SunithaKarnam Anantha, Senthil Kumar Natarajan, Subhransu Sekhar Dash:
Modeling and simulation of fuzzy based Automatic insulin Delivery System. 1133-1139 - Kelvinnicky Gunawan, Bens Pardamean:
School Information Systems Design for Mobile phones. 1140-1145 - V. Nandalal, S. Sophia:
An Efficient Power Reduction Technique in orthogonal frequency Division Multiplexing System using tone Reservation. 1156-1163 - Aditya Kurniawan, Khaterini Mulyono, Mellyna, Stevan Gerardo:
E-Resources Geographic Information System System for Military Operation. 1164-1173 - Ethala Kamalanaban, R. Seshadri, N. G. Renganathan, M. S. Saravanan:
Secret Handshake Issue and Validate Authority based Authentication System for Wireless Sensor Network. 1174-1180 - S. Sridevi, V. R. Vijayakumar:
Medical Image Compression Technique using Listless Set Partitioning in Hierarchical Trees and Contextual Vector quantization for brain Images. 1181-1189 - Syed Mubashir Ali, Tariq Rahim Soomro, Muhammad Nawaz Brohi:
Mapping Information Technology Infrastructure Library with other Information Technology Standards and Best Practices. 1190-1196 - Praveena Murugesan, A. Shanmugam:
Enhanced Load Balancing Strategy in Heterogeneous Peer-to-Peer Networks. 1197-1204 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:
Improvement of Automatic Hemorrhages Detection Methods using Shapes Recognition. 1205-1210 - Srinath Doss, Janet Jeyaraj:
Securing Mobile Ant Agent using Chinese Remainder Theorem. 1211-1216 - Derwin Suhartono, Patricia Chitra, Steven Hendry, Kevin Hendry:
Prototype Design System for Mobile Web using Radio frequency identification at Parking Building. 1217-1223 - Usha Veerasamy Arivazhagu, Subramaniam Srinivasan:
Replacement Mechanism of Caching Technique for Query Routing in Peer to Peer Networks. 1224-1231 - Latha Shanmugam, M. Lilly Florence:
Enhancement and Comparison of Ant Colony Optimization for Software reliability Models. 1232-1240 - Rajeev Kumar, M. Dilsath Fathima, K. Kiruthika, M. S. Saravanan:
Non-Cooperative Iris Recognition: a Novel Approach for Segmentation and Fake identification. 1241-1251
Volume 9, Number 10, 2013
- Sreekumar Pulakkazhy, R. V. Siva Balan:
Data Mining in Banking and its Applications-a Review. 1252-1259 - M. Devi, S. Chenthur Pandian:
An Efficient Autonomous Key Management with Reduced Communication/Computation Costs in Mobile Ad Hoc Network. 1260-1266 - Jess Nielsen, Michael Lykke:
A Tool Analysis in Architectural Reconstruction. 1267-1273 - T. Peer Meera Labbai, V. Rajamani:
Message Authentication Code based Secure Group Key Management Protocol for Mobile Ad Hoc Networks. 1274-1282 - R. S. Mohana, P. Thangaraj:
Machine Learning Approaches in Improving Service Level Agreement-based Admission control for a Software-as-a-Service Provider in Cloud. 1283-1294 - Mohamad Faizal Ab Jabal, Suhardi Hamid, Salehuddin Shuib, Illiasaak Ahmad:
Leaf Features Extraction and Recognition Approaches to Classify plant. 1295-1304 - Sanaa Kabil, Raja Elassali, Fouzia Elbahhar, Abdellah Ait Ouahman, Brahim Ait Essaid:
Analysis and solution for Multi-band orthogonal frequency-Division Multiplexing ultra Wide band System in Real Environment for Vehicle to Infrastructure Application. 1305-1317 - M. Senthil Kumaran, R. Rangarajan:
Dynamic Planning based Scheduling Approach for Wireless Sensor Networks. 1318-1322 - Agus Harjoko, Tri Wahyu Supardi:
Acka 500 Watt Power amplifier for a 144 MHz channel based on a VHF Push-pull Power MOS transistor. 1323-1328 - K. Palani, P. Ramamoorthy:
Quality of Service Aware of Cross Layer Approach on adaptive Gateway Discovery Scheme for Mobile Ad Hoc Networks. 1329-1340 - Sami Ktata, Faouzi Benzarti, Hamid Amiri:
License plate localization using Gabor filters and Neural Networks. 1341-1347 - Mishra Suman, Ranganathan Hariharan:
Gaussian Mixture Model based Classification of Microcalcification in Mammograms using Dyadic wavelet transform. 1348-1355 - Teuku Yuliar Arif, Riri Fitri Sari:
Throughput Analysis of Aggregation with Fragment Retransmission plus Quality of Service Scheme. 1356-1368 - Ali Muftah Ben Omran, Mohd Juzaiddin Ab Aziz:
Automatic Essay Grading System for Short Answers in English Language. 1369-1382 - Widodo Budiharto:
The Development of an Expert Car Failure Diagnosis System with Bayesian Approach. 1383-1388 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:
Blood Vessels Extraction using Mathematical Morphology. 1389-1395 - Jinhyung Kim, Myunggwon Hwang, Do-Heon Jeong, Sa-Kwang Song, Hanmin Jung:
Business Intelligence Service based on adaptive User Modeling and Grouping. 1396-1405 - Periyasamy Nirmaladevi, Ramasamy Asokan:
A modified adaptive wavelet shrinkage speckle filter for ultrasound Images. 1406-1413 - Settachai Chaisanit, Chiraphorn Chomyim, Samphan Chandee:
Intelligence Mobile and Digital Broadcasting Technology to Support Learning for Disabilities Students. 1414-1419 - J. Udhayan, M. Rajesh Babu:
Lightweight Vigilant procedure to Implement Security Measures in Highly Roving Military Operations. 1420-1426
Volume 9, Number 11, 2013
- Shrivakshan Gopal Thiruvangadan, Chandrasekar Chelliah:
A Comparision of various Edge Detection Techniques in motion Picture for identifying a Shark fish. 1427-1434 - Hendy Yeremia, Niko Adrianus Yuwono, Pius Raymond, Widodo Budiharto:
Genetic Algorithm and Neural Network for optical Character Recognition. 1435-1442 - Ali Darejeh, Dalbir Singh:
A Review on User Interface Design Principles to Increase Software Usability for Users with Less Computer Literacy. 1443-1450 - M. Vinoth Kumar, G. Tholkappia Arasu, V. Palanisamy:
Analysis of Intelligent Data Mining for Information Extraction using Java Agent Development Environment Platform. 1451-1455 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:
Automatic retinal vessel Tortuosity Measurement. 1456-1460 - Eisuke Kita, Young-Bin Shin:
Effectiveness of second Best Particle Information for Particle Swarm Optimization. 1461-1471 - Yogapriya Jaganathan, Ila Vennila:
Feature Dimension Reduction for Efficient Medical Image Retrieval System using Unified Framework. 1472-1486 - Felipe Schneider Costa, Maria Marlene de Souza Pires, Silvia Modesto Nassar:
Analysis of Bayesian Classifier accuracy. 1487-1495 - Sutarman, Mazlina Abdul Majid, Jasni Mohamad Zain:
A Review on the Development of Indonesian Sign Language Recognition System. 1496-1505 - Wei Lin Du, Luiz Fernando Capretz, Ali Bou Nassif, Danny Ho:
A Hybrid Intelligent Model for Software Cost estimation. 1506-1513 - A. Venkatesh Kumar, S. Vengataasalam:
Cluster based Duplicate Detection. 1514-1518 - Uma Mani, Ramasamy Chandrasekaran, V. R. Sarma Dhulipala:
Study and Analysis of Routing Protocols in Mobile Ad-Hoc Network. 1519-1525 - Malarvezhi Pandy, Kumar Ramamoorthy:
A Novel two stage carrier frequency offset estimation and compensation Scheme in Multiple input Multiple output-orthogonal frequency Division Multiplexing System using Expectation and Maximization Iteration. 1526-1533 - Dina EL-Gammal, Amr Badr, Mostafa A. El-Azeim:
New Binary Particle Swarm Optimization with Immunity-Clonal Algorithm. 1534-1542 - S. Karpagam, S. Gowri:
Prediction of glioma using Genetic Optimized Neural Network. 1543-1555 - S. Suma Christal Mary, M. Pallikonda Rajasekaran, Y. ChrisbinJeeva:
A Novel Approach for Information Security in Ad Hoc Networks through Secure Key Management. 1556-1565 - V. Ragavi, G. Geetha:
Design of a Dual Keyboard. 1566-1574 - Maryam Golchin, Fatimah Khalid, Lili Nurliyana Abdullah, Seyed Hashem Davarpanah:
Shadow Detection using Color and Edge Information. 1575-1588 - S. Prince Mary, E. Baburaj:
Constraint Informative Rules for Genetic Algorithm-based Web Page Recommendation System. 1589-1601 - Muthuraman Thangaraj, Vengatasubramanian Gayathri:
A Context-based Technique using Tag-Tree for an Effective Retrieval from a Digital literature Collection. 1602-1617 - J. Udhayan, M. Rajesh Babu:
Deteriorating Distributed Denial of Service Attack by Recovering Zombies using penalty Scheme. 1618-1625
Volume 9, Number 12, 2013
- Ismail Omar Hababeh, Issa Khalil, Abdallah Khreishah, Samir Bataineh:
Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks. 1626-1637 - Ryan Rahmansyah, Ford Lumban Gaol:
Service Oriented Architecture Governance Implementation in a Software Development Project as an Enterprise solutions. 1638-1647 - Yu Liu, Haipeng Wang, Wei Xiong, You He:
The error Registration Technique for maneuvering radar Network. 1648-1660 - Masnida Hussin, Rohaya Latip:
Adaptive Resource control Mechanism through Reputation-based Scheduling in Heterogeneous Distributed Systems. 1661-1668 - Faruku Umar Ambursa, Rohaya Latip:
A Survey: Particle Swarm Optimization-based Algorithms for Grid Computing Scheduling Systems. 1669-1679 - Paul Gardner-Stephen, Andrew Bettison, Romana Challans, Jeremy Lakeman:
The rational behind the Serval Network Layer for Resilient Communications. 1680-1685 - Majharul Talukder, Ali M. Quazi, Dede Djatikusumol:
Impact of Social Influence on Individuals' Adoption of Social Networks in SMEs. 1686-1694 - Yu Liu, Haipeng Wang, You He, Kai Dong, Chuwan Xiao:
New Track-to-Track Correlation Algorithms based on Bithreshold in a Distributed multisensor Information fusion System. 1695-1709 - Zainab Rasheed Mirza, Muhammad Nawaz Brohi:
An in-depth Analysis on Integrating Campus Radio frequency identification System on Clouds for Enhancing Security. 1710-1714 - Rashed Mustafa, Dingju Zhu:
Objectionable Image Detection in Cloud Computing Paradigm-a Review. 1715-1721 - Raja Azlina Raja Mahmood, Zurina Mohd Hanapi, Sazlinah Hasan, Asad I. Khan:
Effective Black Hole Attacks in MANETs. 1722-1733 - Zainab Rasheed Mirza, Muhammad Nawaz Brohi:
Smart travelling with Radio frequency identification. 1734-1737 - Mohammud Ershadul Haque, Mohammud Fauzi Mohammud Zain, Maslina Jamil, Mahammad Abdul Hannan, Abdulla Al Suman:
M-array quadrature amplitude modulation Wireless Sensor Network modulator reliability and accuracy Analyze in Civil SHM. 1738-1746 - Yu Liu, Haipeng Wang, You He, Jian Shen:
A Novel Hybrid Node localization Algorithm for Wireless Sensor Networks. 1747-1760 - Khalid Abd, Kazem Abhary, Romeo M. Marian:
Development of a fuzzy-simulation Model of Scheduling robotic flexible assembly cells. 1761-1768 - Khalid Abd, Kazem Abhary, Romeo M. Marian:
Application of a fuzzy-simulation Model of Scheduling robotic flexible assembly cells. 1769-1777 - Faraj El Dabee, Romeo M. Marian, Yousef Amer:
A Novel Optimization Model for simultaneous Cost-Risk Reduction in Multi-suppliers Just-in-Time Systems. 1778-1792 - Oi-Mean Foong, Suziah Sulaiman, Kiing Kiu Ling:
Text Signage Recognition in Android Mobile Devices. 1793-1802 - Huajian Liu, Chris Saunders, Sang-Heon Lee:
Development of a Proximal Machine Vision System for off-Season Weed Mapping in Broadacre no-tillage Fallows. 1803-1821 - Atiya Al-Zuheri:
Structural and Operational Complexity of Manual assembly Systems. 1822-1829 - Zeinab Haji Abolhasani, Romeo M. Marian, Lee H. S. Loung:
Optimization of Multi-commodities Consumer supply Chains for-Part I-Modeling. 1830-1846 - Lola Oktavia, Ford Lumban Gaol:
Information Technology Strategic Planning at Pt. Venturium System. 1847-1855
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.