


default search action
Journal of Computer Science, Volume 9
Volume 9, Number 1, 2013
- G. Madasamy Raja
, V. Sadasivam:
Optimized Local Ternary Patterns: a New texture Model with Set of Optimal Patterns for texture Analysis. 1-15 - Nor Fazlida Mohd Sani, Noor Afiza Mohd Ariffin
, Rodziah Binti Atan
:
Design of Object-Oriented Debugger Model by using Unified Modeling Language. 16-29 - P. S. Rama Praba, H. Ranganathan:
Wavelet transform based Automatic Lesion Detection in Cervix Images using Active Contour. 30-36 - S. Lakshmi
, S. Radha:
Selfish Scheduler for Packet Scheduling based on Packet Weighted Energy drain rate in MANETs. 37-42 - M. Nirmala, V. Palanisamy:
An Efficient Prediction of missing Itemset in Shopping cart. 55-62 - Sivasubramaniam Nandhini
, Senniappan Palaniammal:
Stateless Aggregate Fair Marking Scheduler for Differentiated Service Networks. 63-73 - Jess Nielsen, Sufyan Almajali
:
Collecting Data from Running Systems. 74-82 - R. Uma, K. Muneeswaran:
Efficacious Geospatial Information Retrieval using density Probabilistic Document Correlation Approach. 83-93 - Urmila Shrawankar
, Vilas M. Thakare
:
A Hybrid method for Automatic speech Recognition Performance Improvement in Real World noisy Environment. 94-104 - S. Madhavi, K. Duraiswamy:
Flooding Attack Aware Secure AODV. 105-113 - Petcharat Pattanasethanon, Kriangsak Chanthinok
:
An Evaluation of the Information Systems for Teaching and Learning Online of the Public University. 114-121 - Ravie Chandren Muniyandi
, Abdullah Mohd Zin
:
Membrane Computing as the Paradigm for Modeling Systems Biology. 122-127 - Adnan Mukred, Dalbir Singh, Nurhizam Safie
:
A Review on the Impact of Information Culture on the Adoption of Health Information System in Developing Countries. 128-138 - S. Vijayakumar Bharathi
, Dhanya Pramod
, Ramakrishnan Raman
:
A fuzzy Petri-Net based Conceptual Model for Risk Prediction in Enterprise Resource Planning Acquisition Decisions for Small and Medium Enterprises. 139-146
Volume 9, Number 2, 2013
- C. Sathiyakumar, K. Duraiswamy:
A Hybrid Approach for Node Co-Operation based Clustering in Mobile Ad Hoc Networks. 147-154 - Naveen Raman
, Thanushkodi Keppanagounder:
Gate Replacement Technique for Reducing Leakage current in Wallace Tree Multiplier. 155-158 - Mohammed Serrhini
, Abdelaziz Aït Moussa
:
Home Users Security and the Web Browser Inbuilt Settings, Framework to setup IT Automatically. 159-168 - J. Venkatesh
, C. Aarthy, S. Thenmozhi, P. Balasubramanie
:
Operation of Enterprise Resource Planning System Implementation Compatibility towards Technical Advancement. 169-175 - T. Sree Sharmila
, K. Ramar
, T. Sree Renga Raja:
Comparative Analysis of satellite Image pre-Processing Techniques. 176-182 - Danilo Pelusi, Raffaele Mascella:
Optimal control Algorithms for second order Systems. 183-197 - C. Sundar, M. Chitradevi, G. Geetharamani:
An Overview of Research Challenges for Classification of cardiotocogram Data. 198-206 - Godfrey Winster Sathianesan
, Swamynathan Sankaranarayanan:
Unified Semantic Blog Mining Framework and Summarized Blog Retrieval. 207-217 - Wikaria Gazali, Haryono Soeparno, Ngarap Im. Manik:
The Classification Model of Sandals Dhiif's Product with Back Propagation and Fourier Descriptors method. 218-224 - R. Sadasivam, K. Duraiswamy:
Efficient Approach to Discover interval-based Sequential Patterns. 225-234 - R. Kannan, S. Ravi:
Second-order Statistical Approach for Digital modulation Scheme Classification in Cognitive Radio using Support Vector Machine and k-Nearest Neighbor Classifier. 235-243 - Imas Sukaesih Sitanggang
, Razali Yaakob
, Norwati Mustapha, A. N. Ainuddin:
Classification Model for Hotspot Occurrences using Spatial Decision Tree Algorithm. 244-251 - Isam Azawi Mohialdeen:
Comparative Study of Scheduling al-Grotihms in Cloud Computing. 252-263 - Ali Maroosi
, Ravie Chandren Muniyandi
:
Membrane Computing Inspired Genetic Algorithm on Multi-Core Processors. 264-270 - S. Periyasamy, K. Duraiswamy:
A proficient Traceback Approach using Provincial Locality Aspects to Eliminate Denial of Service Attacks. 271-276
Volume 9, Number 3, 2013
- Prabakaran Ganesan, R. Bhavani:
A High Secure and robust Image Steganography using Dual wavelet and blending Model. 277-284 - K. Rajakumar, S. Muttan:
A Framework for MRI Image Retrieval using Curvelet transform and Euclidean Distance. 285-290 - Pitsanu Tongkhow, Nantachai Kantanantha:
Bayesian Models for Time Series with covariates, Trend, Seasonality, Autoregression and Outliers. 291-298 - Arun Bhaskar Mayilvaganan
, Subhransu Sekhar Dash
, Venkatesh Venkataramanan:
Grid voltage stability enhancement using Photovoltaic based Static Synchronous compensator. 299-307 - Igni Sabasti Prabu Siluvai, V. Jawahar Senthil Kumar:
A Framework for Simple Object Access Protocol Messages to Detect Expansion Attacks for Secure Webservice. 308-313 - Saad Elmansori:
Conditioned Slicing for Efficient Multiway Decision graphs Model-Checker. 314-326 - R. S. Somasundaram, R. Nedunchezhian:
Radial Basis function Network dependent Exclusive Mutual interpolation for missing Value imputation. 327-334 - Adib M. Monzer Habbal
, Suhaidi Hassan
:
A Model for Congestion control of Transmission control Protocol in Mobile Wireless Ad Hoc Networks. 335-342 - Karpagam Vilvanathan, Rangarajan Rangaswamy:
Bi-Level Classification of Color Indexed Image Histograms for Content based Image Retrieval. 343-349 - R. Beulah Jayakumari, V. Jawahar Senthilkumar:
Priority based Congestion Detection and avoidance in Wireless Sensor Networks. 350-357 - G. Tamil Pavai, S. Tamil Selvi
:
Identification of Proliferative Diabetic Retinopathy using texture Segmentation. 358-367 - V. Berlin Hency
, D. Sridharan:
Multicast-Supported Fast Handover for Proxy Mobile IPv6. 368-376 - Siddhartha Sankar Biswas, Bashir Alam
, Mohammad Najmud Doja:
Generalization of Dijkstra's Algorithm for Extraction of Shortest Paths in Directed multigraphs. 377-382 - Arief Ramadhan
, Dana Indra Sensuse, Muladno, Aniati Murni Arymurthy:
Success Factors for E-Livestock: an E-Government Initiative. 383-390 - Dahlia Asyiqin Ahmad Zainaddin, Zurina Mohd Hanapi
:
Hybrid of fuzzy Clustering Neural Network over NSL Dataset for Intrusion Detection System. 391-403
Volume 9, Number 4, 2013
- M. Krishnamoorthi, A. M. Natarajan:
Artificial Bee Colony Algorithm Integrated with fuzzy C-mean operator for Data Clustering. 404-412 - Mohammad Syuhaimi Ab-Rahman
, Hadiguna
, Latifah Sarah Supian:
Selection of spectral filters for optical Demultiplexer-same filter Different Source. 413-420 - Karim Al-Saedi, Selvakumar Manickam
, Sureswaran Ramadass, Wafaa A. H. Al-Salihy, Ammar Almomani
:
Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining. 421-426 - Waleed Halboob, Ali Mamat, Ramlan Mahmod, Muhammad Khurram Khan
:
Temporal, Delegable and Cheap Update Access control to published XML Documents. 427-432 - V. Ganesh Kumar, K. Muneeswaran:
Intelligent Apriori Algorithm for Complex Activity Mining in Supermarket Applications. 433-438 - T. Guru Baskar, D. Manimegalai:
Secured Routing with Authentication in Mobile Ad Hoc Networks. 439-448 - Mohammad Syuhaimi Ab-Rahman
, Hadiguna
, Latifah Sarah Supian, Malik Sulaiman:
Selection of spectral filters for optical Demultiplexer via same Source Different filters Testing Technique. 449-454 - Roswan Ismail
, Nor Asilah Wati Abdul Hamid
, Mohamed Othman, Rohaya Latip:
Performance Analysis of Message Passing Interface Collective Communication on Intel Xeon Quad-Core Gigabit Ethernet and InfiniBand Clusters. 455-462 - Noocharin Tippayawannakorn, Juta Pichitlamken:
Nelder-Mead method with Local Selection using Neighborhood and Memory for stochastic Optimization. 463-476 - Saravana Kumar Muthusamy, Thiyagarajan Purusothaman, Lavanya Selvaraj:
An Enhanced and Cost Effective Group Key Management Scheme for Multicast Network. 477-487 - Mohammed Abuhamad
, Masnizah Mohd, Juhana Salim:
Event-Driven Business Intelligence Approach for Real-Time Integration of Technical and fundamental Analysis in Forex Market. 488-499 - Kugalur Muthusamy Palaniswamy, Veerappa Gounder Palanisamy:
The Optimistic adaptive modulation Technique for Future Wireless Communication. 500-513 - K. Duraisamy, U. Ragavendran, Wathita Phachonpai, Supaporn Muchimapura, Terdthai Tong-Un, Jintanaporn Wattanathorn, Wipawee Thukhammee:
Low Power analog Multiplier using MIFGMOS. 514-520 - Vydeki Dharmar
, R. S. Bhuvaneswaran:
Effect of Clustering in Designing a fuzzy based Hybrid Intrusion Detection System for Mobile Ad Hoc Networks. 521-525 - C. Emilin Shyni
, S. Swamynathan:
Protecting the Online User's Information against Phishing Attacks using Dynamic Encryption Techniques. 526-533
Volume 9, Number 5, 2013
- Devarj Saravanan, Subramaniam Srinivasan:
Matrix based Indexing Technique for video Data. 534-542 - M. Raghini, N. Uma Maheswari, R. Venkatesh:
Overview on Key Distribution Primitives in Wireless Sensor Network. 543-550 - Ragb O. M. Saleh
, Md. Yazid Mohd. Saman, M. Nordin A. Rahman:
A New Policy for Path Selection in Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks. 551-557 - Mohanavalli Seetha Subramanian, Sheila Anand:
Fuzzy System to Authenticate Assisted Living patients in their Home Environment. 558-565 - J. Viji Priya, S. Suppiah:
Application of Newton Raphson Algorithm for Optimizing Transmission control Protocol Performance. 566-571 - M. Jasmine Pemeena Priyadarsini, K. Murugesan, Inabathini Srinivasa Rao
, Y. Saiteja, Vemana Janith:
Automatic target Recognition in cluttered visible imagery. 572-582 - Nurhizam Safie
, Syed Mohamed Aljunid
:
E-Learning Initiative Capacity Building for Healthcare Workforce of Developing Countries. 583-591 - Poonguzhali M., Shanmugavel S.:
A fuzzy based Mechanism for Allocation of Grid Resources. 592-606 - Salwa Aqeel Mahdi
, Mohamed Othman, Hamidah Ibrahim, Jalil M. Desa, Jumat Sulaiman
:
Protocols for Secure Routing and Transmission in Mobile Ad Hoc Network: a Review. 607-619 - Taghi Javdani Gandomani
, Hazura Zulzalil
, Abdul Azim Abdul Ghani, Abu Bakar Md Sultan
, Mina Ziaei Nafchi:
Obstacles in Moving to Agile Software Development methods; at a Glance. 620-625 - Bhavneet Kaur, Karanjeet Singh Kahlon, Sandeep Sharma
:
Safety criterion in Inter-Domain Routing Protocol with Pseudo Renewals. 626-634 - Qasem Abu Al-Haija
, Mohamed H. Shwehdi, Muhammad Banat:
Evaluation Metrics for Wireless Sensor Network Security: Algorithms Review and Software Tool. 635-645 - N. Thangadurai
, Dhanasekaran Raghavan
:
Optimal Energy Consumption to Extend the Lifetime of Wireless Sensor Networks. 646-653 - Albert Pravin
, Subramaniam Srinivasan:
Effective Test Case Selection and prioritization in Regression Testing. 654-659 - P. Vijaya Karthick, V. Vasudevan:
Dynamic souple Wireless Grid Applications for HORDE of jobs by sensible Centrality Scheduling with Redite. 660-670
Volume 9, Number 6, 2013
- G. Malathy, R. M. Somasundaram, K. Duraiswamy:
Performance Improvement in Cloud Computing using Resource Clustering. 671-677 - Akila, Uma Maheswari
:
Content based Medical Image Retrieval using Binary Association Rules. 678-689 - Walid Aly, Basheer Yousif, Bassem Zohdy:
A deoxyribonucleic acid Compression Algorithm using Auto-Regression and Swarm Intelligence. 690-698 - Hasan Al-Sakran:
Agent and Radio frequency identification based Architecture for Supermarket Information System. 699-707 - Budi Yulianto
, Muhsin Shodiq, Lusiana Citra Dewi:
Sound and Digital class Room: Smart Way to have a Language Laboratory. 708-715 - Ferda Ernawan
, Nur Azman Abu
, Nanna Suryana
:
Adaptive Tchebichef moment transform Image Compression using Psychovisual Model. 716-725 - J. Amjath Ali, J. Janet:
Mass Classification in Digital Mammograms based on discrete Shearlet transform. 726-732 - Octavia George, Maria Gorethi, Syerra Riswandi, Widodo Budiharto
:
The Development of Expert Mood Identifier System using fuzzy Logic on BlackBerry Platform. 733-739 - Kaushik Velusamy
, Shriram K. Vasudevan
, Sankari Gopalakrishnan, Subashri Vasudevan, Balachandran Arumugam:
Adapting Linux as Mobile Operating System. 740-748 - Andrews Jeyaraj, Thangappan Sasikala:
Evaluation of various Compiler Optimization Techniques Related to MiBench Benchmark Applications. 749-756 - Gokul Murugesan, Shriram K. Vasudevan
, Sivaraman Ramachandran, Subashri Vasudevan, Balachandran Arumugam:
Vehicle identification using fuzzy adaline neural network. 757-762 - Hussain Mohammad Abu-Dalbouh:
A Questionnaire Approach based on the Technology Acceptance Model for Mobile tracking on Patient progress Applications. 763-770 - Hussain Mohammad Abu-Dalbouh:
Fast Real Time Analysis of Web Server Massive Log Files using an Improved Web Mining Architecture. 771-779 - Wafaa Omar, Amr Badr, Abd El Fatah Hegazy:
Hybrid Ant-based Clustering Algorithm with Cluster Analysis Techniques. 780-793 - Ruki Harwahyu
, Alfa Sheffildi Manaf, Bayu Sri Ananto, Burhan Adi Wicaksana, Riri Fitri Sari
:
Implementation of Color-blind Aid System. 794-810
Volume 9, Number 7, 2013
- Nur Azman Abu
, Ferda Ernawan
, Nanna Suryana
:
An Image dithering via Tchebichef moment transform. 811-820 - Inácio Yano
, Vitor Chaves de Oliveira
, Eric Alberto de Mello Fagotto
, Alexandre de Assis Mota, Lia Toledo Moreira Mota:
Predicting battery charge Depletion in Wireless Sensor Networks using received signal strength indicator. 821-826 - Vitor Chaves de Oliveira
, Inácio Yano
, Alexandre de Assis Mota, Lia Toledo Moreira Mota:
Feasibility of Desktop Virtualization per Software Services and Local Hardware based on the Network Throughput. 827-837 - Venkata Ratnam Tatavolu, Seetha Ramaiah Panchumarthy:
Embedded Computer based Active vibration control System for vibration Reduction of flexible Structures. 838-846 - Siddhartha Sankar Biswas, Bashir Alam
, Mohammad Najmud Doja:
Real Time multigraphs for Communication Networks: an intuitionistic fuzzy Mathematical Model. 847-855 - Abdelhak Boulaalam
, El Habib Nfaoui
, Omar El Beqqali
:
Intelligent Product based on Mobile Agent to Accelerate the New Product Development Process. 856-865 - Mohammad Syuhaimi Ab-Rahman
, Hadiguna
, Latifah Sarah Supian:
Power Analysis on same filter Different Sources for Selection of spectral filters in optical Demultiplexer. 866-874 - Ethala Kamalanaban
, R. Shesadri, N. G. Renganathan:
The Use of Random Forest Classification and k-means Clustering Algorithm for Detecting Time stamped Signatures in the Active Networks. 875-882 - Jafreen Hossain, Nor Fazlida Mohd Sani, Aida Mustapha
, Lilly Suriani Affendey:
Using Feature Selection as accuracy Benchmarking in Clinical Data Mining. 883-888 - Zulaini Yahya, Muhamad Taufik Abdullah
, Azreen Azman, Rabiah Abdul Kadir
:
Query Translation using Concepts Similarity based on Quran Ontology for Cross-Language Information Retrieval. 889-897 - Wesam Bhaya
, Abdul Monem S. Rahma, Dhamyaa Al-Nasrawi:
Text Steganography based on Font Type in MS-Word Documents. 898-904 - Radityo Anggoro, Teruaki Kitasuka, Ryoji Nakamura, Masayoshi Aritsugi
:
Performance Evaluation of Probabilistic Relay in Ad Hoc on-demand Distance Vector and Ad Hoc on-demand multipath Distance Vector under Highly Dynamic Environments. 905-921 - Mohammed Aboaoga, Mohd Juzaiddin Ab Aziz:
Arabic Person Names Recognition by using a Rule based Approach. 922-927 - S. Balu, K. Amudha, C. Nelson Kennedy Babu
:
Human Visual sensitivity Guided bit Embedding for video Steganography. 928-934 - Mohammad Syuhaimi Ab-Rahman
, Farshad Nasimi Khameneh:
Cost-Effective wire-Harness Model by using Polymer optical Fiber. 935-942
Volume 9, Number 8, 2013
- Rose Al Qasem
, Taisir Eldos:
An Efficient cell Placement using gravitational Search Algorithms. 943-948 - Attariuas Hicham, Mohammed Bouhorma, Abdellah El-Fallahi:
A Novel Approach based on Genetic fuzzy Clustering and adaptive Neural Networks for Sales Forecasting. 949-966 - Ali Ahmad Milad, Zul Azri Bin Muhamad Noh, Abdul Samad Shibghatullah
, Shahrin Sahib, Rabiah Ahmad, Mustafa Almahdi Algaet:
Transmission control Protocol Performance Comparison using Piggyback Scheme in WLANs. 967-971 - Thangavel Prem Jacob, Thavasi Anandam Ravi:
Optimization of Test Cases by prioritization. 972-980 - Ashraph Sulaiman, S. V. Kasmir Raja, Sung Han Park:
On-the-Fly Key Generation for an Efficient Road Side Units based Authentication in Vehicular Networks. 981-989 - Prema Kannan, Senthil Kumar Natarajan
, Subhransu Sekhar Dash
:
Design of fuzzy Logic controller for Online Speed regulation of DC motor using PWM Technique based on Laboratory Virtual Instrument Engineering Workbench. 990-997 - Elangovan Uma
, Arputharaj Kannan
:
The Dynamic Nonce based Authentication Scheme to Defend Intermediary Attack for Web Services. 998-1007 - Norwati Mustapha, Wong Pei Voon
, Md Nasir Sulaiman:
User Recommendation Algorithm in Social Tagging System based on Hybrid User Trust. 1008-1018 - Moaiad Ahmad Khder
, Zulaiha Ali Othman, AbdullahMohdZin
, Salha Abdullah:
Improving Data Availability in Mobile Environment using Data Allocation. 1019-1029 - V. Kavitha
, V. Palanisamy:
New burst assembly and Scheduling Technique for optical burst switching Networks. 1030-1040 - Magesh, Thangaraj:
Comparing the Performance of Semantic Image Retrieval using SPARQL Query, Decision Tree Algorithm and LIRE. 1041-1050 - R. Surendran
, B. Parvatha Varthini:
Inject an elastic Grid Computing Techniques to Optimal Resource Management Technique Operations. 1051-1060 - Ahmed Farag Seddik
, Riham Amin Hassan, Mahmoud A. Fakhreldein:
Spectral Domain Features for Ovarian cancer Data Analysis. 1061-1068 - M. A. Berlin, Sheila Anand:
Formal Verification of Safety Message Dissemination Protocol for VANETs. 1069-1078 - Bashir Alam
:
Fuzzy Round Robin CPU Scheduling Algorithm. 1079-1085
Volume 9, Number 9, 2013
- B. Murugeshwari, C. Jayakumar, K. Sarukesi:
Preservation of the Privacy for Multiple Custodian Systems with Rule Sharing. 1086-1091 - Sangeetha Kuppusamy, Natarajan Mathaiyan:
Intellisense Cluster Management and Energy Efficient Routing in Mobile Ad Hoc Networks. 1092-1098 - Anindito, Bens Pardamean
, Robby Christian, Bahtiar Saleh Abbas:
Expert-System based Medical Stroke Prevention. 1099-1105 - D. Udaya Suriya Rajkumar, Rajamani Vayanaperumal:
A Leader based Monitoring Approach for sinkhole Attack in Wireless Sensor Network. 1106-1116 - D. Egfin Nirmala, A. Bibin Sam Paul, Vaidehi V.:
Improving Independent Component Analysis using Support Vector Machines for Multimodal Image fusion. 1117-1132 - SunithaKarnam Anantha, Senthil Kumar Natarajan, Subhransu Sekhar Dash:
Modeling and simulation of fuzzy based Automatic insulin Delivery System. 1133-1139 - Kelvinnicky Gunawan, Bens Pardamean
:
School Information Systems Design for Mobile phones. 1140-1145 - V. Nandalal
, S. Sophia:
An Efficient Power Reduction Technique in orthogonal frequency Division Multiplexing System using tone Reservation. 1156-1163 - Aditya Kurniawan
, Khaterini Mulyono, Mellyna, Stevan Gerardo:
E-Resources Geographic Information System System for Military Operation. 1164-1173 - Ethala Kamalanaban
, R. Seshadri, N. G. Renganathan, M. S. Saravanan:
Secret Handshake Issue and Validate Authority based Authentication System for Wireless Sensor Network. 1174-1180 - S. Sridevi
, V. R. Vijayakumar:
Medical Image Compression Technique using Listless Set Partitioning in Hierarchical Trees and Contextual Vector quantization for brain Images. 1181-1189 - Syed Mubashir Ali
, Tariq Rahim Soomro, Muhammad Nawaz Brohi
:
Mapping Information Technology Infrastructure Library with other Information Technology Standards and Best Practices. 1190-1196 - Praveena Murugesan, A. Shanmugam:
Enhanced Load Balancing Strategy in Heterogeneous Peer-to-Peer Networks. 1197-1204 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:
Improvement of Automatic Hemorrhages Detection Methods using Shapes Recognition. 1205-1210 - Srinath Doss
, Janet Jeyaraj:
Securing Mobile Ant Agent using Chinese Remainder Theorem. 1211-1216 - Derwin Suhartono
, Patricia Chitra, Steven Hendry, Kevin Hendry:
Prototype Design System for Mobile Web using Radio frequency identification at Parking Building. 1217-1223 - Usha Veerasamy Arivazhagu, Subramaniam Srinivasan:
Replacement Mechanism of Caching Technique for Query Routing in Peer to Peer Networks. 1224-1231 - Latha Shanmugam, M. Lilly Florence
:
Enhancement and Comparison of Ant Colony Optimization for Software reliability Models. 1232-1240 - Rajeev Kumar, M. Dilsath Fathima, K. Kiruthika, M. S. Saravanan:
Non-Cooperative Iris Recognition: a Novel Approach for Segmentation and Fake identification. 1241-1251
Volume 9, Number 10, 2013
- Sreekumar Pulakkazhy, R. V. Siva Balan
:
Data Mining in Banking and its Applications-a Review. 1252-1259 - M. Devi, S. Chenthur Pandian
:
An Efficient Autonomous Key Management with Reduced Communication/Computation Costs in Mobile Ad Hoc Network. 1260-1266 - Jess Nielsen, Michael Lykke:
A Tool Analysis in Architectural Reconstruction. 1267-1273 - T. Peer Meera Labbai, V. Rajamani:
Message Authentication Code based Secure Group Key Management Protocol for Mobile Ad Hoc Networks. 1274-1282 - R. S. Mohana
, P. Thangaraj:
Machine Learning Approaches in Improving Service Level Agreement-based Admission control for a Software-as-a-Service Provider in Cloud. 1283-1294 - Mohamad Faizal Ab Jabal
, Suhardi Hamid
, Salehuddin Shuib, Illiasaak Ahmad:
Leaf Features Extraction and Recognition Approaches to Classify plant. 1295-1304 - Sanaa Kabil, Raja Elassali, Fouzia Elbahhar
, Abdellah Ait Ouahman, Brahim Ait Essaid:
Analysis and solution for Multi-band orthogonal frequency-Division Multiplexing ultra Wide band System in Real Environment for Vehicle to Infrastructure Application. 1305-1317 - M. Senthil Kumaran, R. Rangarajan:
Dynamic Planning based Scheduling Approach for Wireless Sensor Networks. 1318-1322 - Agus Harjoko
, Tri Wahyu Supardi:
Acka 500 Watt Power amplifier for a 144 MHz channel based on a VHF Push-pull Power MOS transistor. 1323-1328 - K. Palani, P. Ramamoorthy:
Quality of Service Aware of Cross Layer Approach on adaptive Gateway Discovery Scheme for Mobile Ad Hoc Networks. 1329-1340 - Sami Ktata, Faouzi Benzarti, Hamid Amiri:
License plate localization using Gabor filters and Neural Networks. 1341-1347 - Mishra Suman, Ranganathan Hariharan:
Gaussian Mixture Model based Classification of Microcalcification in Mammograms using Dyadic wavelet transform. 1348-1355 - Teuku Yuliar Arif
, Riri Fitri Sari
:
Throughput Analysis of Aggregation with Fragment Retransmission plus Quality of Service Scheme. 1356-1368 - Ali Muftah Ben Omran, Mohd Juzaiddin Ab Aziz:
Automatic Essay Grading System for Short Answers in English Language. 1369-1382 - Widodo Budiharto
:
The Development of an Expert Car Failure Diagnosis System with Bayesian Approach. 1383-1388 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:
Blood Vessels Extraction using Mathematical Morphology. 1389-1395 - Jinhyung Kim, Myunggwon Hwang, Do-Heon Jeong, Sa-Kwang Song, Hanmin Jung:
Business Intelligence Service based on adaptive User Modeling and Grouping. 1396-1405 - Periyasamy Nirmaladevi, Ramasamy Asokan:
A modified adaptive wavelet shrinkage speckle filter for ultrasound Images. 1406-1413 - Settachai Chaisanit, Chiraphorn Chomyim, Samphan Chandee:
Intelligence Mobile and Digital Broadcasting Technology to Support Learning for Disabilities Students. 1414-1419 - J. Udhayan, M. Rajesh Babu:
Lightweight Vigilant procedure to Implement Security Measures in Highly Roving Military Operations. 1420-1426
Volume 9, Number 11, 2013
- Shrivakshan Gopal Thiruvangadan, Chandrasekar Chelliah
:
A Comparision of various Edge Detection Techniques in motion Picture for identifying a Shark fish. 1427-1434 - Hendy Yeremia, Niko Adrianus Yuwono, Pius Raymond, Widodo Budiharto
:
Genetic Algorithm and Neural Network for optical Character Recognition. 1435-1442 - Ali Darejeh, Dalbir Singh:
A Review on User Interface Design Principles to Increase Software Usability for Users with Less Computer Literacy. 1443-1450 - M. Vinoth Kumar
, G. Tholkappia Arasu
, V. Palanisamy:
Analysis of Intelligent Data Mining for Information Extraction using Java Agent Development Environment Platform. 1451-1455 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:
Automatic retinal vessel Tortuosity Measurement. 1456-1460 - Eisuke Kita, Young-Bin Shin:
Effectiveness of second Best Particle Information for Particle Swarm Optimization. 1461-1471 - Yogapriya Jaganathan
, Ila Vennila:
Feature Dimension Reduction for Efficient Medical Image Retrieval System using Unified Framework. 1472-1486 - Felipe Schneider Costa, Maria Marlene de Souza Pires, Silvia Modesto Nassar:
Analysis of Bayesian Classifier accuracy. 1487-1495 - Sutarman
, Mazlina Abdul Majid
, Jasni Mohamad Zain
:
A Review on the Development of Indonesian Sign Language Recognition System. 1496-1505 - Wei Lin Du, Luiz Fernando Capretz, Ali Bou Nassif
, Danny Ho:
A Hybrid Intelligent Model for Software Cost estimation. 1506-1513 - A. Venkatesh Kumar, S. Vengataasalam:
Cluster based Duplicate Detection. 1514-1518 - Uma Mani, Ramasamy Chandrasekaran
, V. R. Sarma Dhulipala
:
Study and Analysis of Routing Protocols in Mobile Ad-Hoc Network. 1519-1525 - Malarvezhi Pandy, Kumar Ramamoorthy
:
A Novel two stage carrier frequency offset estimation and compensation Scheme in Multiple input Multiple output-orthogonal frequency Division Multiplexing System using Expectation and Maximization Iteration. 1526-1533 - Dina EL-Gammal, Amr Badr, Mostafa A. El-Azeim:
New Binary Particle Swarm Optimization with Immunity-Clonal Algorithm. 1534-1542 - S. Karpagam, S. Gowri:
Prediction of glioma using Genetic Optimized Neural Network. 1543-1555 - S. Suma Christal Mary, M. Pallikonda Rajasekaran, Y. ChrisbinJeeva:
A Novel Approach for Information Security in Ad Hoc Networks through Secure Key Management. 1556-1565 - V. Ragavi
, G. Geetha:
Design of a Dual Keyboard. 1566-1574 - Maryam Golchin
, Fatimah Khalid
, Lili Nurliyana Abdullah
, Seyed Hashem Davarpanah:
Shadow Detection using Color and Edge Information. 1575-1588 - S. Prince Mary
, E. Baburaj
:
Constraint Informative Rules for Genetic Algorithm-based Web Page Recommendation System. 1589-1601 - Muthuraman Thangaraj, Vengatasubramanian Gayathri:
A Context-based Technique using Tag-Tree for an Effective Retrieval from a Digital literature Collection. 1602-1617 - J. Udhayan, M. Rajesh Babu:
Deteriorating Distributed Denial of Service Attack by Recovering Zombies using penalty Scheme. 1618-1625
Volume 9, Number 12, 2013
- Ismail Omar Hababeh
, Issa Khalil
, Abdallah Khreishah, Samir Bataineh:
Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks. 1626-1637 - Ryan Rahmansyah, Ford Lumban Gaol:
Service Oriented Architecture Governance Implementation in a Software Development Project as an Enterprise solutions. 1638-1647 - Yu Liu, Haipeng Wang, Wei Xiong, You He:
The error Registration Technique for maneuvering radar Network. 1648-1660 - Masnida Hussin, Rohaya Latip:
Adaptive Resource control Mechanism through Reputation-based Scheduling in Heterogeneous Distributed Systems. 1661-1668 - Faruku Umar Ambursa, Rohaya Latip:
A Survey: Particle Swarm Optimization-based Algorithms for Grid Computing Scheduling Systems. 1669-1679 - Paul Gardner-Stephen
, Andrew Bettison, Romana Challans
, Jeremy Lakeman:
The rational behind the Serval Network Layer for Resilient Communications. 1680-1685 - Majharul Talukder, Ali M. Quazi
, Dede Djatikusumol:
Impact of Social Influence on Individuals' Adoption of Social Networks in SMEs. 1686-1694 - Yu Liu, Haipeng Wang, You He, Kai Dong, Chuwan Xiao:
New Track-to-Track Correlation Algorithms based on Bithreshold in a Distributed multisensor Information fusion System. 1695-1709 - Zainab Rasheed Mirza, Muhammad Nawaz Brohi
:
An in-depth Analysis on Integrating Campus Radio frequency identification System on Clouds for Enhancing Security. 1710-1714 - Rashed Mustafa
, Dingju Zhu:
Objectionable Image Detection in Cloud Computing Paradigm-a Review. 1715-1721 - Raja Azlina Raja Mahmood, Zurina Mohd Hanapi
, Sazlinah Hasan
, Asad I. Khan
:
Effective Black Hole Attacks in MANETs. 1722-1733 - Zainab Rasheed Mirza, Muhammad Nawaz Brohi
:
Smart travelling with Radio frequency identification. 1734-1737 - Mohammud Ershadul Haque, Mohammud Fauzi Mohammud Zain, Maslina Jamil, Mahammad Abdul Hannan
, Abdulla Al Suman
:
M-array quadrature amplitude modulation Wireless Sensor Network modulator reliability and accuracy Analyze in Civil SHM. 1738-1746 - Yu Liu, Haipeng Wang, You He, Jian Shen:
A Novel Hybrid Node localization Algorithm for Wireless Sensor Networks. 1747-1760 - Khalid Abd
, Kazem Abhary
, Romeo M. Marian:
Development of a fuzzy-simulation Model of Scheduling robotic flexible assembly cells. 1761-1768 - Khalid Abd
, Kazem Abhary
, Romeo M. Marian:
Application of a fuzzy-simulation Model of Scheduling robotic flexible assembly cells. 1769-1777 - Faraj El Dabee, Romeo M. Marian, Yousef Amer
:
A Novel Optimization Model for simultaneous Cost-Risk Reduction in Multi-suppliers Just-in-Time Systems. 1778-1792 - Oi-Mean Foong, Suziah Sulaiman, Kiing Kiu Ling:
Text Signage Recognition in Android Mobile Devices. 1793-1802 - Huajian Liu
, Chris Saunders
, Sang-Heon Lee
:
Development of a Proximal Machine Vision System for off-Season Weed Mapping in Broadacre no-tillage Fallows. 1803-1821 - Atiya Al-Zuheri
:
Structural and Operational Complexity of Manual assembly Systems. 1822-1829 - Zeinab Haji Abolhasani, Romeo M. Marian, Lee H. S. Loung:
Optimization of Multi-commodities Consumer supply Chains for-Part I-Modeling. 1830-1846 - Lola Oktavia, Ford Lumban Gaol:
Information Technology Strategic Planning at Pt. Venturium System. 1847-1855

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.