


default search action
Journal of Computer Science, Volume 9
Volume 9, Number 1, 2013
- G. Madasamy Raja

, V. Sadasivam:
Optimized Local Ternary Patterns: a New texture Model with Set of Optimal Patterns for texture Analysis. 1-15 - Nor Fazlida Mohd Sani, Noor Afiza Mohd Ariffin

, Rodziah Binti Atan
:
Design of Object-Oriented Debugger Model by using Unified Modeling Language. 16-29 - P. S. Rama Praba, H. Ranganathan:

Wavelet transform based Automatic Lesion Detection in Cervix Images using Active Contour. 30-36 - S. Lakshmi

, S. Radha:
Selfish Scheduler for Packet Scheduling based on Packet Weighted Energy drain rate in MANETs. 37-42 - M. Nirmala, V. Palanisamy:

An Efficient Prediction of missing Itemset in Shopping cart. 55-62 - Sivasubramaniam Nandhini

, Senniappan Palaniammal:
Stateless Aggregate Fair Marking Scheduler for Differentiated Service Networks. 63-73 - Jess Nielsen, Sufyan Almajali

:
Collecting Data from Running Systems. 74-82 - R. Uma, K. Muneeswaran:

Efficacious Geospatial Information Retrieval using density Probabilistic Document Correlation Approach. 83-93 - Urmila Shrawankar

, Vilas M. Thakare
:
A Hybrid method for Automatic speech Recognition Performance Improvement in Real World noisy Environment. 94-104 - S. Madhavi, K. Duraiswamy:

Flooding Attack Aware Secure AODV. 105-113 - Petcharat Pattanasethanon, Kriangsak Chanthinok

:
An Evaluation of the Information Systems for Teaching and Learning Online of the Public University. 114-121 - Ravie Chandren Muniyandi

, Abdullah Mohd Zin
:
Membrane Computing as the Paradigm for Modeling Systems Biology. 122-127 - Adnan Mukred, Dalbir Singh, Nurhizam Safie

:
A Review on the Impact of Information Culture on the Adoption of Health Information System in Developing Countries. 128-138 - S. Vijayakumar Bharathi

, Dhanya Pramod
, Ramakrishnan Raman
:
A fuzzy Petri-Net based Conceptual Model for Risk Prediction in Enterprise Resource Planning Acquisition Decisions for Small and Medium Enterprises. 139-146
Volume 9, Number 2, 2013
- C. Sathiyakumar, K. Duraiswamy:

A Hybrid Approach for Node Co-Operation based Clustering in Mobile Ad Hoc Networks. 147-154 - Naveen Raman

, Thanushkodi Keppanagounder:
Gate Replacement Technique for Reducing Leakage current in Wallace Tree Multiplier. 155-158 - Mohammed Serrhini

, Abdelaziz Aït Moussa
:
Home Users Security and the Web Browser Inbuilt Settings, Framework to setup IT Automatically. 159-168 - J. Venkatesh

, C. Aarthy
, S. Thenmozhi, P. Balasubramanie
:
Operation of Enterprise Resource Planning System Implementation Compatibility towards Technical Advancement. 169-175 - T. Sree Sharmila

, K. Ramar
, T. Sree Renga Raja:
Comparative Analysis of satellite Image pre-Processing Techniques. 176-182 - Danilo Pelusi, Raffaele Mascella:

Optimal control Algorithms for second order Systems. 183-197 - C. Sundar, M. Chitradevi

, G. Geetharamani:
An Overview of Research Challenges for Classification of cardiotocogram Data. 198-206 - Godfrey Winster Sathianesan

, Swamynathan Sankaranarayanan:
Unified Semantic Blog Mining Framework and Summarized Blog Retrieval. 207-217 - Wikaria Gazali, Haryono Soeparno, Ngarap Im. Manik:

The Classification Model of Sandals Dhiif's Product with Back Propagation and Fourier Descriptors method. 218-224 - R. Sadasivam, K. Duraiswamy:

Efficient Approach to Discover interval-based Sequential Patterns. 225-234 - R. Kannan, S. Ravi:

Second-order Statistical Approach for Digital modulation Scheme Classification in Cognitive Radio using Support Vector Machine and k-Nearest Neighbor Classifier. 235-243 - Imas Sukaesih Sitanggang

, Razali Yaakob
, Norwati Mustapha, A. N. Ainuddin:
Classification Model for Hotspot Occurrences using Spatial Decision Tree Algorithm. 244-251 - Isam Azawi Mohialdeen:

Comparative Study of Scheduling al-Grotihms in Cloud Computing. 252-263 - Ali Maroosi

, Ravie Chandren Muniyandi
:
Membrane Computing Inspired Genetic Algorithm on Multi-Core Processors. 264-270 - S. Periyasamy, K. Duraiswamy:

A proficient Traceback Approach using Provincial Locality Aspects to Eliminate Denial of Service Attacks. 271-276
Volume 9, Number 3, 2013
- Prabakaran Ganesan, R. Bhavani:

A High Secure and robust Image Steganography using Dual wavelet and blending Model. 277-284 - K. Rajakumar, S. Muttan:

A Framework for MRI Image Retrieval using Curvelet transform and Euclidean Distance. 285-290 - Pitsanu Tongkhow, Nantachai Kantanantha:

Bayesian Models for Time Series with covariates, Trend, Seasonality, Autoregression and Outliers. 291-298 - Arun Bhaskar Mayilvaganan

, Subhransu Sekhar Dash
, Venkatesh Venkataramanan:
Grid voltage stability enhancement using Photovoltaic based Static Synchronous compensator. 299-307 - Igni Sabasti Prabu Siluvai, V. Jawahar Senthil Kumar:

A Framework for Simple Object Access Protocol Messages to Detect Expansion Attacks for Secure Webservice. 308-313 - Saad Elmansori:

Conditioned Slicing for Efficient Multiway Decision graphs Model-Checker. 314-326 - R. S. Somasundaram, R. Nedunchezhian

:
Radial Basis function Network dependent Exclusive Mutual interpolation for missing Value imputation. 327-334 - Adib M. Monzer Habbal

, Suhaidi Hassan
:
A Model for Congestion control of Transmission control Protocol in Mobile Wireless Ad Hoc Networks. 335-342 - Karpagam Vilvanathan, Rangarajan Rangaswamy:

Bi-Level Classification of Color Indexed Image Histograms for Content based Image Retrieval. 343-349 - R. Beulah Jayakumari, V. Jawahar Senthilkumar:

Priority based Congestion Detection and avoidance in Wireless Sensor Networks. 350-357 - G. Tamil Pavai, S. Tamil Selvi

:
Identification of Proliferative Diabetic Retinopathy using texture Segmentation. 358-367 - V. Berlin Hency

, D. Sridharan:
Multicast-Supported Fast Handover for Proxy Mobile IPv6. 368-376 - Siddhartha Sankar Biswas, Bashir Alam

, Mohammad Najmud Doja:
Generalization of Dijkstra's Algorithm for Extraction of Shortest Paths in Directed multigraphs. 377-382 - Arief Ramadhan

, Dana Indra Sensuse, Muladno, Aniati Murni Arymurthy:
Success Factors for E-Livestock: an E-Government Initiative. 383-390 - Dahlia Asyiqin Ahmad Zainaddin, Zurina Mohd Hanapi

:
Hybrid of fuzzy Clustering Neural Network over NSL Dataset for Intrusion Detection System. 391-403
Volume 9, Number 4, 2013
- M. Krishnamoorthi, A. M. Natarajan:

Artificial Bee Colony Algorithm Integrated with fuzzy C-mean operator for Data Clustering. 404-412 - Mohammad Syuhaimi Ab-Rahman

, Hadiguna
, Latifah Sarah Supian:
Selection of spectral filters for optical Demultiplexer-same filter Different Source. 413-420 - Karim Al-Saedi, Selvakumar Manickam

, Sureswaran Ramadass, Wafaa A. H. Al-Salihy, Ammar Almomani
:
Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining. 421-426 - Waleed Halboob, Ali Mamat, Ramlan Mahmod, Muhammad Khurram Khan

:
Temporal, Delegable and Cheap Update Access control to published XML Documents. 427-432 - V. Ganesh Kumar, K. Muneeswaran:

Intelligent Apriori Algorithm for Complex Activity Mining in Supermarket Applications. 433-438 - T. Guru Baskar, D. Manimegalai:

Secured Routing with Authentication in Mobile Ad Hoc Networks. 439-448 - Mohammad Syuhaimi Ab-Rahman

, Hadiguna
, Latifah Sarah Supian, Malik Sulaiman:
Selection of spectral filters for optical Demultiplexer via same Source Different filters Testing Technique. 449-454 - Roswan Ismail

, Nor Asilah Wati Abdul Hamid
, Mohamed Othman, Rohaya Latip:
Performance Analysis of Message Passing Interface Collective Communication on Intel Xeon Quad-Core Gigabit Ethernet and InfiniBand Clusters. 455-462 - Noocharin Tippayawannakorn, Juta Pichitlamken:

Nelder-Mead method with Local Selection using Neighborhood and Memory for stochastic Optimization. 463-476 - Saravana Kumar Muthusamy, Thiyagarajan Purusothaman, Lavanya Selvaraj:

An Enhanced and Cost Effective Group Key Management Scheme for Multicast Network. 477-487 - Mohammed Abuhamad

, Masnizah Mohd, Juhana Salim:
Event-Driven Business Intelligence Approach for Real-Time Integration of Technical and fundamental Analysis in Forex Market. 488-499 - Kugalur Muthusamy Palaniswamy, Veerappa Gounder Palanisamy:

The Optimistic adaptive modulation Technique for Future Wireless Communication. 500-513 - K. Duraisamy, U. Ragavendran, Wathita Phachonpai, Supaporn Muchimapura, Terdthai Tong-Un, Jintanaporn Wattanathorn, Wipawee Thukhammee:

Low Power analog Multiplier using MIFGMOS. 514-520 - Vydeki Dharmar

, R. S. Bhuvaneswaran:
Effect of Clustering in Designing a fuzzy based Hybrid Intrusion Detection System for Mobile Ad Hoc Networks. 521-525 - C. Emilin Shyni

, S. Swamynathan:
Protecting the Online User's Information against Phishing Attacks using Dynamic Encryption Techniques. 526-533
Volume 9, Number 5, 2013
- Devarj Saravanan, Subramaniam Srinivasan:

Matrix based Indexing Technique for video Data. 534-542 - M. Raghini, N. Uma Maheswari, R. Venkatesh:

Overview on Key Distribution Primitives in Wireless Sensor Network. 543-550 - Ragb O. M. Saleh

, Md. Yazid Mohd. Saman, Mohd Nordin Abdul Rahman
:
A New Policy for Path Selection in Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks. 551-557 - Mohanavalli Seetha Subramanian, Sheila Anand:

Fuzzy System to Authenticate Assisted Living patients in their Home Environment. 558-565 - J. Viji Priya, S. Suppiah:

Application of Newton Raphson Algorithm for Optimizing Transmission control Protocol Performance. 566-571 - M. Jasmine Pemeena Priyadarsini, K. Murugesan, Inabathini Srinivasa Rao

, Y. Saiteja, Vemana Janith:
Automatic target Recognition in cluttered visible imagery. 572-582 - Nurhizam Safie

, Syed Mohamed Aljunid
:
E-Learning Initiative Capacity Building for Healthcare Workforce of Developing Countries. 583-591 - Poonguzhali M.

, Shanmugavel S.:
A fuzzy based Mechanism for Allocation of Grid Resources. 592-606 - Salwa Aqeel Mahdi

, Mohamed Othman, Hamidah Ibrahim, Jalil M. Desa, Jumat Sulaiman
:
Protocols for Secure Routing and Transmission in Mobile Ad Hoc Network: a Review. 607-619 - Taghi Javdani Gandomani

, Hazura Zulzalil
, Abdul Azim Abdul Ghani, Abu Bakar Md Sultan
, Mina Ziaei Nafchi:
Obstacles in Moving to Agile Software Development methods; at a Glance. 620-625 - Bhavneet Kaur, Karanjeet Singh Kahlon, Sandeep Sharma

:
Safety criterion in Inter-Domain Routing Protocol with Pseudo Renewals. 626-634 - Qasem Abu Al-Haija

, Mohamed H. Shwehdi, Muhammad Banat:
Evaluation Metrics for Wireless Sensor Network Security: Algorithms Review and Software Tool. 635-645 - N. Thangadurai

, Dhanasekaran Raghavan
:
Optimal Energy Consumption to Extend the Lifetime of Wireless Sensor Networks. 646-653 - Albert Pravin

, Subramaniam Srinivasan:
Effective Test Case Selection and prioritization in Regression Testing. 654-659 - P. Vijaya Karthick, V. Vasudevan:

Dynamic souple Wireless Grid Applications for HORDE of jobs by sensible Centrality Scheduling with Redite. 660-670
Volume 9, Number 6, 2013
- G. Malathy, R. M. Somasundaram, K. Duraiswamy:

Performance Improvement in Cloud Computing using Resource Clustering. 671-677 - Akila, Uma Maheswari

:
Content based Medical Image Retrieval using Binary Association Rules. 678-689 - Walid Aly, Basheer Yousif, Bassem Zohdy:

A deoxyribonucleic acid Compression Algorithm using Auto-Regression and Swarm Intelligence. 690-698 - Hasan Al-Sakran:

Agent and Radio frequency identification based Architecture for Supermarket Information System. 699-707 - Budi Yulianto

, Muhsin Shodiq, Lusiana Citra Dewi:
Sound and Digital class Room: Smart Way to have a Language Laboratory. 708-715 - Ferda Ernawan

, Nur Azman Abu
, Nanna Suryana
:
Adaptive Tchebichef moment transform Image Compression using Psychovisual Model. 716-725 - J. Amjath Ali, J. Janet:

Mass Classification in Digital Mammograms based on discrete Shearlet transform. 726-732 - Octavia George, Maria Gorethi, Syerra Riswandi, Widodo Budiharto

:
The Development of Expert Mood Identifier System using fuzzy Logic on BlackBerry Platform. 733-739 - Kaushik Velusamy

, Shriram K. Vasudevan
, Sankari Gopalakrishnan, Subashri Vasudevan, Balachandran Arumugam:
Adapting Linux as Mobile Operating System. 740-748 - Andrews Jeyaraj, Thangappan Sasikala:

Evaluation of various Compiler Optimization Techniques Related to MiBench Benchmark Applications. 749-756 - Gokul Murugesan, Shriram K. Vasudevan

, Sivaraman Ramachandran, Subashri Vasudevan, Balachandran Arumugam:
Vehicle identification using fuzzy adaline neural network. 757-762 - Hussain Mohammad Abu-Dalbouh:

A Questionnaire Approach based on the Technology Acceptance Model for Mobile tracking on Patient progress Applications. 763-770 - Hussain Mohammad Abu-Dalbouh:

Fast Real Time Analysis of Web Server Massive Log Files using an Improved Web Mining Architecture. 771-779 - Wafaa Omar, Amr Badr, Abd El Fatah Hegazy:

Hybrid Ant-based Clustering Algorithm with Cluster Analysis Techniques. 780-793 - Ruki Harwahyu

, Alfa Sheffildi Manaf, Bayu Sri Ananto, Burhan Adi Wicaksana, Riri Fitri Sari
:
Implementation of Color-blind Aid System. 794-810
Volume 9, Number 7, 2013
- Nur Azman Abu

, Ferda Ernawan
, Nanna Suryana
:
An Image dithering via Tchebichef moment transform. 811-820 - Inácio Yano

, Vitor Chaves de Oliveira
, Eric Alberto de Mello Fagotto
, Alexandre de Assis Mota, Lia Toledo Moreira Mota:
Predicting battery charge Depletion in Wireless Sensor Networks using received signal strength indicator. 821-826 - Vitor Chaves de Oliveira

, Inácio Yano
, Alexandre de Assis Mota, Lia Toledo Moreira Mota:
Feasibility of Desktop Virtualization per Software Services and Local Hardware based on the Network Throughput. 827-837 - Venkata Ratnam Tatavolu, Seetha Ramaiah Panchumarthy:

Embedded Computer based Active vibration control System for vibration Reduction of flexible Structures. 838-846 - Siddhartha Sankar Biswas, Bashir Alam

, Mohammad Najmud Doja:
Real Time multigraphs for Communication Networks: an intuitionistic fuzzy Mathematical Model. 847-855 - Abdelhak Boulaalam

, El Habib Nfaoui
, Omar El Beqqali
:
Intelligent Product based on Mobile Agent to Accelerate the New Product Development Process. 856-865 - Mohammad Syuhaimi Ab-Rahman

, Hadiguna
, Latifah Sarah Supian:
Power Analysis on same filter Different Sources for Selection of spectral filters in optical Demultiplexer. 866-874 - Ethala Kamalanaban

, R. Shesadri, N. G. Renganathan:
The Use of Random Forest Classification and k-means Clustering Algorithm for Detecting Time stamped Signatures in the Active Networks. 875-882 - Jafreen Hossain, Nor Fazlida Mohd Sani, Aida Mustapha

, Lilly Suriani Affendey:
Using Feature Selection as accuracy Benchmarking in Clinical Data Mining. 883-888 - Zulaini Yahya, Muhamad Taufik Abdullah

, Azreen Azman, Rabiah Abdul Kadir
:
Query Translation using Concepts Similarity based on Quran Ontology for Cross-Language Information Retrieval. 889-897 - Wesam Bhaya

, Abdul Monem S. Rahma, Dhamyaa Al-Nasrawi
:
Text Steganography based on Font Type in MS-Word Documents. 898-904 - Radityo Anggoro, Teruaki Kitasuka, Ryoji Nakamura, Masayoshi Aritsugi

:
Performance Evaluation of Probabilistic Relay in Ad Hoc on-demand Distance Vector and Ad Hoc on-demand multipath Distance Vector under Highly Dynamic Environments. 905-921 - Mohammed Aboaoga, Mohd Juzaiddin Ab Aziz

:
Arabic Person Names Recognition by using a Rule based Approach. 922-927 - S. Balu, K. Amudha, C. Nelson Kennedy Babu

:
Human Visual sensitivity Guided bit Embedding for video Steganography. 928-934 - Mohammad Syuhaimi Ab-Rahman

, Farshad Nasimi Khameneh:
Cost-Effective wire-Harness Model by using Polymer optical Fiber. 935-942
Volume 9, Number 8, 2013
- Rose Al Qasem

, Taisir Eldos:
An Efficient cell Placement using gravitational Search Algorithms. 943-948 - Attariuas Hicham, Mohammed Bouhorma, Abdellah El-Fallahi:

A Novel Approach based on Genetic fuzzy Clustering and adaptive Neural Networks for Sales Forecasting. 949-966 - Ali Ahmad Milad, Zul Azri Bin Muhamad Noh, Abdul Samad Shibghatullah

, Shahrin Sahib, Rabiah Ahmad, Mustafa Almahdi Algaet:
Transmission control Protocol Performance Comparison using Piggyback Scheme in WLANs. 967-971 - Thangavel Prem Jacob, Thavasi Anandam Ravi:

Optimization of Test Cases by prioritization. 972-980 - Ashraph Sulaiman, S. V. Kasmir Raja, Sung Han Park:

On-the-Fly Key Generation for an Efficient Road Side Units based Authentication in Vehicular Networks. 981-989 - Prema Kannan, Senthil Kumar Natarajan

, Subhransu Sekhar Dash
:
Design of fuzzy Logic controller for Online Speed regulation of DC motor using PWM Technique based on Laboratory Virtual Instrument Engineering Workbench. 990-997 - Elangovan Uma

, Arputharaj Kannan
:
The Dynamic Nonce based Authentication Scheme to Defend Intermediary Attack for Web Services. 998-1007 - Norwati Mustapha, Wong Pei Voon

, Md Nasir Sulaiman:
User Recommendation Algorithm in Social Tagging System based on Hybrid User Trust. 1008-1018 - Moaiad Ahmad Khder

, Zulaiha Ali Othman, AbdullahMohdZin
, Salha Abdullah:
Improving Data Availability in Mobile Environment using Data Allocation. 1019-1029 - V. Kavitha

, V. Palanisamy:
New burst assembly and Scheduling Technique for optical burst switching Networks. 1030-1040 - Magesh, Thangaraj:

Comparing the Performance of Semantic Image Retrieval using SPARQL Query, Decision Tree Algorithm and LIRE. 1041-1050 - R. Surendran

, B. Parvatha Varthini
:
Inject an elastic Grid Computing Techniques to Optimal Resource Management Technique Operations. 1051-1060 - Ahmed Farag Seddik

, Riham Amin Hassan, Mahmoud A. Fakhreldein:
Spectral Domain Features for Ovarian cancer Data Analysis. 1061-1068 - M. A. Berlin, Sheila Anand:

Formal Verification of Safety Message Dissemination Protocol for VANETs. 1069-1078 - Bashir Alam

:
Fuzzy Round Robin CPU Scheduling Algorithm. 1079-1085
Volume 9, Number 9, 2013
- B. Murugeshwari, C. Jayakumar, K. Sarukesi:

Preservation of the Privacy for Multiple Custodian Systems with Rule Sharing. 1086-1091 - Sangeetha Kuppusamy, Natarajan Mathaiyan:

Intellisense Cluster Management and Energy Efficient Routing in Mobile Ad Hoc Networks. 1092-1098 - Anindito, Bens Pardamean

, Robby Christian, Bahtiar Saleh Abbas:
Expert-System based Medical Stroke Prevention. 1099-1105 - D. Udaya Suriya Rajkumar, Rajamani Vayanaperumal:

A Leader based Monitoring Approach for sinkhole Attack in Wireless Sensor Network. 1106-1116 - D. Egfin Nirmala, A. Bibin Sam Paul, Vaidehi V.:

Improving Independent Component Analysis using Support Vector Machines for Multimodal Image fusion. 1117-1132 - SunithaKarnam Anantha, Senthil Kumar Natarajan

, Subhransu Sekhar Dash:
Modeling and simulation of fuzzy based Automatic insulin Delivery System. 1133-1139 - Kelvinnicky Gunawan, Bens Pardamean

:
School Information Systems Design for Mobile phones. 1140-1145 - V. Nandalal

, S. Sophia:
An Efficient Power Reduction Technique in orthogonal frequency Division Multiplexing System using tone Reservation. 1156-1163 - Aditya Kurniawan

, Khaterini Mulyono, Mellyna, Stevan Gerardo:
E-Resources Geographic Information System System for Military Operation. 1164-1173 - Ethala Kamalanaban

, R. Seshadri, N. G. Renganathan, M. S. Saravanan:
Secret Handshake Issue and Validate Authority based Authentication System for Wireless Sensor Network. 1174-1180 - S. Sridevi

, V. R. Vijayakumar:
Medical Image Compression Technique using Listless Set Partitioning in Hierarchical Trees and Contextual Vector quantization for brain Images. 1181-1189 - Syed Mubashir Ali

, Tariq Rahim Soomro, Muhammad Nawaz Brohi
:
Mapping Information Technology Infrastructure Library with other Information Technology Standards and Best Practices. 1190-1196 - Praveena Murugesan, A. Shanmugam:

Enhanced Load Balancing Strategy in Heterogeneous Peer-to-Peer Networks. 1197-1204 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:

Improvement of Automatic Hemorrhages Detection Methods using Shapes Recognition. 1205-1210 - Srinath Doss

, Janet Jeyaraj:
Securing Mobile Ant Agent using Chinese Remainder Theorem. 1211-1216 - Derwin Suhartono

, Patricia Chitra, Steven Hendry, Kevin Hendry:
Prototype Design System for Mobile Web using Radio frequency identification at Parking Building. 1217-1223 - Usha Veerasamy Arivazhagu, Subramaniam Srinivasan:

Replacement Mechanism of Caching Technique for Query Routing in Peer to Peer Networks. 1224-1231 - Latha Shanmugam, M. Lilly Florence

:
Enhancement and Comparison of Ant Colony Optimization for Software reliability Models. 1232-1240 - Rajeev Kumar, M. Dilsath Fathima, K. Kiruthika, M. S. Saravanan:

Non-Cooperative Iris Recognition: a Novel Approach for Segmentation and Fake identification. 1241-1251
Volume 9, Number 10, 2013
- Sreekumar Pulakkazhy, R. V. Siva Balan

:
Data Mining in Banking and its Applications-a Review. 1252-1259 - M. Devi, S. Chenthur Pandian

:
An Efficient Autonomous Key Management with Reduced Communication/Computation Costs in Mobile Ad Hoc Network. 1260-1266 - Jess Nielsen, Michael Lykke:

A Tool Analysis in Architectural Reconstruction. 1267-1273 - T. Peer Meera Labbai, V. Rajamani:

Message Authentication Code based Secure Group Key Management Protocol for Mobile Ad Hoc Networks. 1274-1282 - R. S. Mohana

, P. Thangaraj:
Machine Learning Approaches in Improving Service Level Agreement-based Admission control for a Software-as-a-Service Provider in Cloud. 1283-1294 - Mohamad Faizal Ab Jabal

, Suhardi Hamid
, Salehuddin Shuib, Illiasaak Ahmad:
Leaf Features Extraction and Recognition Approaches to Classify plant. 1295-1304 - Sanaa Kabil, Raja Elassali, Fouzia Elbahhar

, Abdellah Ait Ouahman, Brahim Ait Essaid:
Analysis and solution for Multi-band orthogonal frequency-Division Multiplexing ultra Wide band System in Real Environment for Vehicle to Infrastructure Application. 1305-1317 - M. Senthil Kumaran, R. Rangarajan:

Dynamic Planning based Scheduling Approach for Wireless Sensor Networks. 1318-1322 - Agus Harjoko

, Tri Wahyu Supardi:
Acka 500 Watt Power amplifier for a 144 MHz channel based on a VHF Push-pull Power MOS transistor. 1323-1328 - K. Palani, P. Ramamoorthy:

Quality of Service Aware of Cross Layer Approach on adaptive Gateway Discovery Scheme for Mobile Ad Hoc Networks. 1329-1340 - Sami Ktata, Faouzi Benzarti

, Hamid Amiri:
License plate localization using Gabor filters and Neural Networks. 1341-1347 - Mishra Suman, Ranganathan Hariharan:

Gaussian Mixture Model based Classification of Microcalcification in Mammograms using Dyadic wavelet transform. 1348-1355 - Teuku Yuliar Arif

, Riri Fitri Sari
:
Throughput Analysis of Aggregation with Fragment Retransmission plus Quality of Service Scheme. 1356-1368 - Ali Muftah Ben Omran, Mohd Juzaiddin Ab Aziz

:
Automatic Essay Grading System for Short Answers in English Language. 1369-1382 - Widodo Budiharto

:
The Development of an Expert Car Failure Diagnosis System with Bayesian Approach. 1383-1388 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:

Blood Vessels Extraction using Mathematical Morphology. 1389-1395 - Jinhyung Kim, Myunggwon Hwang, Do-Heon Jeong, Sa-Kwang Song, Hanmin Jung:

Business Intelligence Service based on adaptive User Modeling and Grouping. 1396-1405 - Periyasamy Nirmaladevi, Ramasamy Asokan:

A modified adaptive wavelet shrinkage speckle filter for ultrasound Images. 1406-1413 - Settachai Chaisanit, Chiraphorn Chomyim, Samphan Chandee:

Intelligence Mobile and Digital Broadcasting Technology to Support Learning for Disabilities Students. 1414-1419 - J. Udhayan, M. Rajesh Babu:

Lightweight Vigilant procedure to Implement Security Measures in Highly Roving Military Operations. 1420-1426
Volume 9, Number 11, 2013
- Shrivakshan Gopal Thiruvangadan, Chandrasekar Chelliah

:
A Comparision of various Edge Detection Techniques in motion Picture for identifying a Shark fish. 1427-1434 - Hendy Yeremia, Niko Adrianus Yuwono, Pius Raymond, Widodo Budiharto

:
Genetic Algorithm and Neural Network for optical Character Recognition. 1435-1442 - Ali Darejeh, Dalbir Singh:

A Review on User Interface Design Principles to Increase Software Usability for Users with Less Computer Literacy. 1443-1450 - M. Vinoth Kumar

, G. Tholkappia Arasu
, V. Palanisamy:
Analysis of Intelligent Data Mining for Information Extraction using Java Agent Development Environment Platform. 1451-1455 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:

Automatic retinal vessel Tortuosity Measurement. 1456-1460 - Eisuke Kita, Young-Bin Shin:

Effectiveness of second Best Particle Information for Particle Swarm Optimization. 1461-1471 - Yogapriya Jaganathan

, Ila Vennila:
Feature Dimension Reduction for Efficient Medical Image Retrieval System using Unified Framework. 1472-1486 - Felipe Schneider Costa, Maria Marlene de Souza Pires, Silvia Modesto Nassar:

Analysis of Bayesian Classifier accuracy. 1487-1495 - Sutarman

, Mazlina Abdul Majid
, Jasni Mohamad Zain
:
A Review on the Development of Indonesian Sign Language Recognition System. 1496-1505 - Wei Lin Du, Luiz Fernando Capretz, Ali Bou Nassif

, Danny Ho:
A Hybrid Intelligent Model for Software Cost estimation. 1506-1513 - A. Venkatesh Kumar, S. Vengataasalam:

Cluster based Duplicate Detection. 1514-1518 - Uma Mani, Ramasamy Chandrasekaran

, V. R. Sarma Dhulipala
:
Study and Analysis of Routing Protocols in Mobile Ad-Hoc Network. 1519-1525 - Malarvezhi Pandy, Kumar Ramamoorthy

:
A Novel two stage carrier frequency offset estimation and compensation Scheme in Multiple input Multiple output-orthogonal frequency Division Multiplexing System using Expectation and Maximization Iteration. 1526-1533 - Dina EL-Gammal, Amr Badr, Mostafa A. El-Azeim:

New Binary Particle Swarm Optimization with Immunity-Clonal Algorithm. 1534-1542 - S. Karpagam, S. Gowri:

Prediction of glioma using Genetic Optimized Neural Network. 1543-1555 - S. Suma Christal Mary, M. Pallikonda Rajasekaran, Y. ChrisbinJeeva:

A Novel Approach for Information Security in Ad Hoc Networks through Secure Key Management. 1556-1565 - V. Ragavi

, G. Geetha
:
Design of a Dual Keyboard. 1566-1574 - Maryam Golchin

, Fatimah Khalid
, Lili Nurliyana Abdullah
, Seyed Hashem Davarpanah:
Shadow Detection using Color and Edge Information. 1575-1588 - S. Prince Mary

, E. Baburaj
:
Constraint Informative Rules for Genetic Algorithm-based Web Page Recommendation System. 1589-1601 - Muthuraman Thangaraj, Vengatasubramanian Gayathri:

A Context-based Technique using Tag-Tree for an Effective Retrieval from a Digital literature Collection. 1602-1617 - J. Udhayan, M. Rajesh Babu:

Deteriorating Distributed Denial of Service Attack by Recovering Zombies using penalty Scheme. 1618-1625
Volume 9, Number 12, 2013
- Ismail Omar Hababeh

, Issa Khalil
, Abdallah Khreishah, Samir Bataineh:
Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks. 1626-1637 - Ryan Rahmansyah, Ford Lumban Gaol:

Service Oriented Architecture Governance Implementation in a Software Development Project as an Enterprise solutions. 1638-1647 - Yu Liu, Haipeng Wang, Wei Xiong, You He:

The error Registration Technique for maneuvering radar Network. 1648-1660 - Masnida Hussin, Rohaya Latip:

Adaptive Resource control Mechanism through Reputation-based Scheduling in Heterogeneous Distributed Systems. 1661-1668 - Faruku Umar Ambursa, Rohaya Latip:

A Survey: Particle Swarm Optimization-based Algorithms for Grid Computing Scheduling Systems. 1669-1679 - Paul Gardner-Stephen

, Andrew Bettison, Romana Challans
, Jeremy Lakeman:
The rational behind the Serval Network Layer for Resilient Communications. 1680-1685 - Majharul Talukder, Ali M. Quazi

, Dede Djatikusumol:
Impact of Social Influence on Individuals' Adoption of Social Networks in SMEs. 1686-1694 - Yu Liu, Haipeng Wang, You He, Kai Dong, Chuwan Xiao:

New Track-to-Track Correlation Algorithms based on Bithreshold in a Distributed multisensor Information fusion System. 1695-1709 - Zainab Rasheed Mirza, Muhammad Nawaz Brohi

:
An in-depth Analysis on Integrating Campus Radio frequency identification System on Clouds for Enhancing Security. 1710-1714 - Rashed Mustafa

, Dingju Zhu:
Objectionable Image Detection in Cloud Computing Paradigm-a Review. 1715-1721 - Raja Azlina Raja Mahmood, Zurina Mohd Hanapi

, Sazlinah Hasan
, Asad I. Khan
:
Effective Black Hole Attacks in MANETs. 1722-1733 - Zainab Rasheed Mirza, Muhammad Nawaz Brohi

:
Smart travelling with Radio frequency identification. 1734-1737 - Mohammud Ershadul Haque

, Mohammud Fauzi Mohammud Zain, Maslina Jamil, Mahammad Abdul Hannan
, Abdulla Al Suman
:
M-array quadrature amplitude modulation Wireless Sensor Network modulator reliability and accuracy Analyze in Civil SHM. 1738-1746 - Yu Liu, Haipeng Wang, You He, Jian Shen:

A Novel Hybrid Node localization Algorithm for Wireless Sensor Networks. 1747-1760 - Khalid Abd

, Kazem Abhary
, Romeo M. Marian:
Development of a fuzzy-simulation Model of Scheduling robotic flexible assembly cells. 1761-1768 - Khalid Abd

, Kazem Abhary
, Romeo M. Marian:
Application of a fuzzy-simulation Model of Scheduling robotic flexible assembly cells. 1769-1777 - Faraj El Dabee, Romeo M. Marian, Yousef Amer

:
A Novel Optimization Model for simultaneous Cost-Risk Reduction in Multi-suppliers Just-in-Time Systems. 1778-1792 - Oi-Mean Foong, Suziah Sulaiman, Kiing Kiu Ling:

Text Signage Recognition in Android Mobile Devices. 1793-1802 - Huajian Liu

, Chris Saunders
, Sang-Heon Lee
:
Development of a Proximal Machine Vision System for off-Season Weed Mapping in Broadacre no-tillage Fallows. 1803-1821 - Atiya Al-Zuheri

:
Structural and Operational Complexity of Manual assembly Systems. 1822-1829 - Zeinab Haji Abolhasani, Romeo M. Marian, Lee H. S. Loung:

Optimization of Multi-commodities Consumer supply Chains for-Part I-Modeling. 1830-1846 - Lola Oktavia, Ford Lumban Gaol:

Information Technology Strategic Planning at Pt. Venturium System. 1847-1855

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














