COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

International Journal of Computer Science & Information Technology

ISSN : 0975 - 3826[online]; 0975 - 4660[Print]

December 2015, Volume 7, Number 6

A Preprocessing Model for Hand-Written Arabic Texts Based on Voronoi Diagrams[Pdf]
Atallah M.Al-Shatnawi, Al al-Bayt University, Jordan

An Entropic Optimization Technique in Heterogeneous Grid Computing Using Bionic Algorithms[Pdf]
Saad M.Darwish, Adel A.El-zoghabi and Moustafa F.Ashry, Institute of Graduate Studies and Research, Egypt

New Symmetric Encryption System Based on Evolutionary Algorithm[Pdf]
A.Mouloudi, Ibn Tofail University, Morocco

UML Modeling and System Architecture for Agent Based Information Retrieval[Pdf]
D.Muhammad Noorul Mubarak and Philomina Simon, University of Kerala, India

The Effect of Implementing of Nonlinear Filters for Enhancing Medical Images Using MATLAB[Pdf]
Mohamed Y.Adam1, Mozamel M.Saeed2 and Al Samani A.Ahmed3, 1King Saud University, KSA, 2Prince Sattam Bin Abdul-Aziz University, KSA and 3Al Neelain University College of Computer Science & Information Technology, Sudan

Two-Layer Secure Prevention Mechanism for Reducing E-Commerce Security Risks[Pdf]
Sen-Tarng Lai, Shih Chien University, Taiwan

Congestion Aware Spray and Wait Protocol: A Congestion Control Mechanism for the Vehicular Delay Tolerant Network[Pdf]
Chuka Oham and Milena Radenkovic, University of Nottingham, United Kingdom

Automated Management of Pothole Related Disasters Using Image Processing and Geotagging[Pdf]
Manisha Mandal, Madhura Katageri, Mansi Gandhi, Navin Koregaonkar and Sharmila Sengupta, Vivekanand Education Society's Institute of Technology, India

A Routing Mechanism Based on Social Networks and Betweenness Centrality in Delay-Tolerant Networks[Pdf]
Zhang Huijuan and Liu Kai, Tongji University, China

Comparative Analysis of Single-Core and Multi-Core Systems[Pdf]
Ogundairo Johnson1 and Omosehinmi Dinyo2, 1National Open University of Nigeria (NOUN), Nigeria and 2Federal University of Technology, Nigeria

Reducing Security Concerns when Using Cloud Computing in Online Exams Case Study: General Associate Degree Examination (Shamel) in Jordan[Pdf]
Mohamad M. Al-Laham, Al-Balqa Applied University, Jordan

A Software Tool for Experimental Study Leap Motion[Pdf]
Georgi Krastev and Magdalena Andreeva, Ruse University, Bulgaria

Service Oriented Quality Requirement Framework for Cloud Computing[Pdf]
Madhushi Rathnaayke and Janaka I Wijayanayake, University of Kelaniya, Sri Lanka

A Database System Security Framework[Pdf]
Habiba Muhammad Sani1 and Muhammad Mika'ilu Yabo2, 1Usmanu Danfodiyo University, Nigeria and 2Shehu Shagari College of Education, Nigeria

October 2015, Volume 7, Number 5

Hadoop Mapreduce Performance Enhancement Using In-Node Combiners[Pdf]
Woo-Hyun Lee, Hee-Gook Jun and Hyoung-Joo Kim, Seoul National University, South Korea

Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One[Pdf]
Mohammad Ehab Ragab1 and Kin Hong Wong2, 1The Electronics Research Institute, Egypt and 2Computer Science and Engineering Department, Shatin, Hong Kong

Integrated Project Management Measures in CMMI[Pdf]
Mahmoud Khraiwesh, Zarqa University, Jordan

Formal Verification of Distributed Checkpointing Using Event-B[Pdf]
Girish Chandra1, Raghuraj Suryavanshi2 and Divakar Yadav1, 1Institute of Engineering & Technology, India and 2Pranveer Singh Institute of Technology, India

Validation Study of Dimensionality Reduction Impact on Breast Cancer Classification[Pdf]
Nezha Hamdi1, Khalid Auhmani2, Moha M'rabet Hassani1, 1Cadi Ayyad University, Morocco and 2National School of Applied Sciences, Morocco

Formal Specification and Verification of Total Order Broadcast through Destination Agreement Using Event-B[Pdf]
Arun Kumar Singh and Divakar Yadav, Institution of Engineering and Technology, India

Automatic Extraction of Spatio-Temporal Information from Arabic Text Documents[Pdf]
Abdelkoui Feriel1 and Kholladi Mohamed Khireddine2, 1MENTOURI 2 University, Algeria and 2El oued University, Algeria

Encryption-Decryption RGB Color Image Using Matrix Multiplication[Pdf]
Mohamad M.AL-Laham, Zarqa University, Jordan

A New Approach to Parts of Speech Tagging in Malayalam[Pdf]
D.Muhammad Noorul Mubarak, Sareesh Madhu and S A Shanavas, University of Kerala, India

Predictive and Statistical Analyses for Academic Advisory Support[Pdf]
Mohammed AL-Sarem, Taibah University, Kingdom of Saudi Arabia

An Overview on the Use of Data Mining and Linguistics Techniques for Building Microblog-Based Early Detection Systems in the Healthcare Sector[Pdf]
Haider M. Habeeb1 and Nabeel Al-A'araji2, 1University of Babylon, Iraq and 2Ministry of Higher Education and Scientific Research, Iraq

Clustering of Deep WebPages: A Comparative Study[Pdf]
Muhunthaadithya C, Rohit J.V, Sadhana Kesavan1 andE.Sivasankar, National Institute of Technology Trichy, India

August 2015, Volume 7, Number 4

Applying an Arabic Conversational Agent in the Jordanian E-Government[Pdf]
Mohammad Hijjawi and Hesham Abusaimeh, Applied Science University, Jordan

Collaborative Bibliographic System for Review/Survey Articles[Pdf]
Mutaz Beraka, Abdullah Al-Dhelaan and Mznah Al-Rodhaan, King Saud University, Saudi Arabia

Unique Fundamentals of Software Measurement and Software Metrics in Software Engineering[Pdf]
K.P.Srinivasan, C.B.M.College, India

Sensitivity Analysis of Information Retrieval Metrics[Pdf]
Marina Marjanovic-Jakovljevic, Singidunum University, Serbia

Consideration of Human Computer Interaction in Robotic Field[Pdf]
Tarek Toumi and Abdelmadjid Zidani, University of Batna, Algeria

Review of Lane Detection and Tracking Algorithms in Advanced Driver Assistance System[Pdf]
Ammu M Kumar and Philomina Simon, University of Kerala, India

On the Image Quality and Encoding Times of LSB, MSB and Combined LSB-MSB Steganography Algorithms Using Digital Images[Pdf]
Solomon O.Akinola and Adebanke A.Olatidoye, University of Ibadan, Nigeria

Symmetrical Weighted Subspace Holistic Approach for Expression Recognition[Pdf]
G.P.Hegde1, M.Seetha2 and Nagaratna Hegde3, 1Shree Dharmasthala Manjunatheshwara Institute of Technology, India and 2G.Narayanamma Institute of Technology and Science, India and 3Vasavi College of Engineering, India

Applying the Technology Acceptance Model to Understand Social Networking Sites (SNS) Usage: Impact of Perceived Social Capital[Pdf]
Waleed Al-Ghaith, Shaqra University, Saudi Arabia

Map-Reduce Implementations: Survey and Performance Comparison[Pdf]
Zeba Khanam and Shafali Agarwal, JSS Academy of Technical Education, India

A Hybrid Copy-Move Forgery Detection Technique Using Regional Similarity Indices[Pdf]
Rani Susan Oommen1 and Jayamohan M2, 1Sree Buddha College of Engineering for Women, India and 2College of Applied Science, India

An Effective and Efficient Feature Selection Method for Lung Cancer Detection[Pdf]
R.Kishore, K.L.N College of Engineering, India

June 2015, Volume 7, Number 3

Arabic Language Challenges in Text Based Conversational Agents Compared to The English Language[Pdf]
Mohammad Hijjawi and Yousef Elsheikh, Applied Science University, Jordan

Fuzzy Image Segmentation Using Validity Indexes Correlation[Pdf]
Daniel Fernando Tello Gamarra, Universidade Federal de Santa Maria (UFSM), Brazil

Instructor Perspectives of Mobile Learning Platform: An Empirical Study[Pdf]
Muasaad Alrasheedi, Luiz Fernando Capretz and Arif Raza, Western University, Canada

A Study on Weed Discrimination Through Wavelet Transform, Texture Feature Extraction and Classification[Pdf]
D.Ashok Kumar1 and P.Prema2, 1Government Arts College, India and 2Agricultural College and Research Institute, India

Corrosion Control Approach Using Data Mining[Pdf]
StephenDapiap, Gregory Wajiga, Michael Egwurube, Musa Kadzai, Nathaniel Oye and ThankGodAnazodo, Federal University of Technology Yola, Nigeria

A Clustering Technique for Email Content Mining[Pdf]
Deepa Patil and Yashwant Dongre, Vishwakarma Institute of Information Technology, India

Comparison of Wavelet Network and Logistic Regression in Predicting Enterprise Financial Distress[Pdf]
Ming-Chang Lee1 and Li-Er Su2, 1National Kaohsiung University of Applied Sciences, Taiwan and 2Shih Chien University, Taiwan

Increasing the Transistor Count by Constructing A Two-Layer Crystal Square on A Single Chip[Pdf]
Haissam El-Aawar, Lebanese International University - LIU, Lebanon

Comparison of Different Transmitters Using 1550nm and 10000nm in FSO Communication Systems[Pdf]
Poonam Singal, Saloni Rai, Rahul Punia and Dhrove Kashyap, Deenbandhu Chhotu Ram University of Science & Technology, India

Multi-Parameter Based Performance Evaluation of Classification Algorithms[Pdf]
Saurabh Kr.Srivastava and Sandeep Kr.Singh, JIIT University, India

April 2015, Volume 7, Number 2

Evaluation of Two-Level Global Load Balancing Framework in Cloud Environment[Pdf]
Po-Huei Liang and Jiann-Min Yang, National Cheng Chi University, Taiwan

An Extension of Protege for an Automatic Fuzzy-Ontology Building Using Clustering and FCA[Pdf]
Aloui Amira and Grissa Touzi Amel, Universite Tunis El Manar, Tunisia

Towards a System Dynamics Modeling Method Based on Dematel[Pdf]
Fadwa Chaker, Abdellah El Manouar and Mohammed Abdou Janati Idrissi, Mohammed V University, Morocco

Preprocessing for PPM: Compressing Utf-8 Encoded Natural Language Text[Pdf]
William J.Teahan1 and Khaled M.Alhawiti2, 1University of Wales, Bangor, UK and 2University of Tabuk, KSA

Thermal Control in 3D Liquid Cooled Processors Via Hotspot Separation And Thermoelectric Cooling[Pdf]
Yue Hu, Shaoming Chen, Lu Peng, Edward Song and Jin-Woo Choi, Louisiana State University, USA

SFAMSS:A Secure Framework for ATM Machines Via Secret Sharing[Pdf]
Zeinab Ghafari, Taha Arian and Morteza Analoui, University of Science and Technology, Iran

Performance Measurements of Feature Tracking and Histogram Based Traffic Congestion Algorithms[Pdf]
Ozgur Altun and Kenan Aksoy, Proline Bilisim Sistemleri, Turkey

Research on Decision Making Regarding High-Business-Strategy Café Menu Selection[Pdf]
Cheng-I Hou1, Han-Chen Huang2, Yao-Hsu Tsai2 and Chih-Yao Lo1, 1Yu Da University of Science and Technology, Taiwan and 2Chung Hua University, Taiwan

Prefix-Based Labeling Annotation for Effective Xml Fragmentation[Pdf]
Kok-Leong Koong, Su-Cheng Haw, Lay-Ki Soon and Samini Subramaniam, Multimedia University, Malaysia

PROP - Patronage of PHP Web Applications[Pdf]
Sireesha C, Jyostna G, Raghu Varan P and P R L Eswari, Centre for Development of Advanced Computing, India

Quantum Clustering-Based Feature Subset Selection for Mammographic Image Classification[Pdf]
N.Hamdi, K.Auhmani and M.M.Hassani, Cadi Ayyad University, Morocco

Taxonomy of Optimization Approaches of Resource Brokers in Data Grids[Pdf]
Rafah M.Almuttairi, University of Babylon, Iraq

A Survivability Model for Saudi ICT Startups[Pdf]
Sara Almakenzi, Arif Bramantoro and Waleed Rashideh, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia

Emotion Interaction with Virtual Reality Using Hybrid Emotion Classification Technique toward Brain Signals[Pdf]
Faris A.Abuhashish1, Jamal Zraqou2, Wesam Alkhodour2, Mohd S.Sunar1 and Hoshang Kolivand1, 1Universiti Teknologi Malaysia, Malaysia and 2Isra University, Jordan

Prediction for Short-Term Traffic Flow Based on Optimized Wavelet Neural Network Model[Pdf]
Tao Li and Liu Sheng, Shanghai University of Engineering Science, China

February 2015, Volume 7, Number 1

Iris Recognition for Personal Identification Using Lamstar Neural Network[ Pdf ] 
Shideh Homayon, University of California, USA

An Employing a Multistage Fuzzy Architecture for Usability of Open Source Software[ Pdf ] 
Roba Al-Soub, Mutah University, Jordan

Analysis of Selection Indicators of Badminton Players by the Delphi Method and Analytic Hierarchy Process[ Pdf ] 
Han-Chen Huang1, Chun-Ta Lin2 and Chia-Sen Hu3, 1Chung Hua University, Taiwan, 2Yu Da University of Science and Technology, Taiwan and 3Guang Hua Junior High School, Taiwan

Cross Platform App : A Comparative Study[ Pdf ] 
Paulo R.M.de Andrade1, Adriano B.Albuquerque1, Otávio F. Frota2, Robson V Silveira2 and Fatima A. da Silva2, 1University of Fortaleza - UNIFOR Fortaleza - CE, Brazil and 2College Estacio FIC of Ceara Fortaleza - CE, Brazil

Performance Comparison Of Hybrid Wavelet Transforms Formed Using Dct, Walsh, Haar and DKT in Watermarking[ Pdf ] 
H.B.Kekre1, Tanuja Sarode2 and Shachi Natu1, 1NMIMS University, India and 2Mumbai University, India

Improving Initial Generations in PSO Algorithm for Transportation Network Design Problem[ Pdf ] 
Navid Afkar and Abbas Babazadeh, University of Tehran, Iran

New Approach in Symmetric Block Cipher Security Using a New Cubical Technique[ Pdf ] 
Ali M Alshahrani and Stuart Walker, University of Essex, United Kingdom

The Analysis of the Time Table Structure Within a Student Information System (Sis)[ Pdf ] 
Issa S.I.Ottoum, Alzaytoonah University of Jordan, Jordan

A Rule Based Approach towards Detecting Human Temperament[ Pdf ] 
Shomoye Abiodun R1 and ShomoyeAdekunle I2, 1Oduduwa University, Nigeria and 2Federal Polytechnic, Nigeria

An Iterative Morphological Decomposition Algorithm for Reduction Of Skeleton Points[ Pdf ] 
A.Sri Krishna1 and G.L.K.Vasista2, N.Neelima1, 1R.V.R& J.C College of Eng. India and 2AMRITA School of Eng., India

Analysis of Key Considerations of the Public When Choosing Recreational Activities[ Pdf ] 
Han-Chen Huan11, Chun-Ta Lin2 and Chi-Han Chuang3, 1Chung Hua University, Taiwan, 2Yu Da University of Science and Technology, Taiwan and 3Da-Tung Elementary School, Taiwan

Efficient Data Protection for Enterprise Data Centers[ Pdf ] 
Khaled Aldossari, EXPEC Computer Center, Saudi Arabia

Authoring System of Drill & Practice Elearning Modules for Hearing Impaired Students[ Pdf ] 
Karim Q Hussein, Mustansiriyah University, Iraq

A Novel Methodology for Constructing Rule-Based Naïve Bayesian Classifiers[ Pdf ] 
Abdallah Alashqur, Applied Science University, Jordan

Testability Measurement Model for Object Oriented Design (Tmmood)[ Pdf ] 
Abdullah1, M.H.Khan2, Reena Srivastava3, 1BBD University, India, 2I.E.T, India and 3BBD University, India

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN