| October 2011, Volume 3, Number 5 |
It Security Issues Within the Video Game Industry [Pdf]
Stephen Mohr1 And Syed (Shawon) Rahman1,2, 1Capella University, USA and 2University of Hawaii-Hilo, USA |
Adaptive Beamforming Algorithm for Interference Suppression in GNSS Receivers [Pdf]
Zhao hongwei1, Lian Baowang1 and Feng Juan1,2, 1Northwestern Polytechnical University, China, 2KIT- Karlsruhe Institute of Technology, Germany |
Minimize the False Positive Rate in a Database Intrusion Detection System [Pdf]
A. Rezk, H. Ali, M. El-Mikkawy and S. Barakat, Mansoura University, Egypt |
Design Pattern Management System: A Support Tool Based on Design Patterns Applicability [Pdf]
Zakaria Moudam, Radouan Belhissi and Noureddine Chenfour, University Sidi Mohammed Ben Abdellah Fez, Morocco |
Genetic Algorithm (GA) In Feature Selection For CRF Based Manipuri Multiword Expression (MWE) Identification [Pdf]
Kishorjit Nongmeikapam1 and Sivaji Bandyopadhyay2, 1Manipur University, India and 2Jadavpur University, India |
IRIS Recognition Based On LBP and Combined LVQ Classifier [Pdf]
M. Z. Rashad, M. Y. Shams, O. Nomir and R. M. El-Awady, Mansoura University, Egypt |
An IR-based Pedestrian Detection System Implemented with Matlab-Equipped Laptop and Low-Cost Microcontroller [Pdf]
Erwin Thomas Gilmore, Chukwunweike Ugbome and Charles Kim, Howard University, USA |
New Method for 3D Shape Retrieval [Pdf]
Abdelghni Lakehal and Omar El Beqqali, Sidi Mohamed Ben AbdEllah University, Morocco |
Research Review for Digital Image Segmentation Techniques [Pdf]
Ashraf A. Aly1, Safaai Bin Deris1 and Nazar Zaki2, 1Universiti Teknologi Malaysia and 2UAE University, UAE |
Stable Filtering for Artificial Pheromone Potential Field Constructed By Mobile Robots and Passive RFID Tags [Pdf]
Piljae Kim and Daisuke Kurabayashi, Tokyo Institute of Technology, Japan |
Evaluate the Performance of Optical Cross Connect Based on Fiber Bragg Grating Under Different Bit Rate [Pdf]
Bobby Barua, Ahsanullah University of Science and Technology, Bangladesh |
Optimized Fuzzy Logic Application for MRI Brain Images Segmentation [Pdf]
Indah Soesanti1, Adhi Susanto1, Thomas Sri Widodo1, Maesadji Tjokronagoro2, 1Gadjah Mada University, Indonesia and 1Gadjah Mada University, Indonesia |
Robust seed selection algorithm for k-means type algorithms [Pdf]
K. Karteeka Pavan1, Allam Appa Rao2, A.V. Dattatreya Rao3 and G.R.Sridhar4, 1Jagarlamudi Chadramouli College of Engineering, India, 2Jawaharlal Nehru Technological University, India, 3Acharya Nagarjuna University, India and 4Endocrine and Diabetes Centre, India |
Knowledge Based Methods for Video Data Retrieval [Pdf]
S.Thanga Ramya and P.Rangarajan, RMD Engineering College, India |
Analysis and Design Complex and Large Data Base using MySQL Workbench [Pdf]
Dedi Iskandar Inan and Ratna Juita, Papua State University, Indonesia |
Direct Manipulation of Web Browsing History [Pdf]
Gholam H. Khaksari, Pennsylvania State University, USA |
A Semantically Enriched Web Usage Based Recommendation Model [Pdf]
C.Ramesh1, K. V. Chalapati Rao1 and A.Goverdhan2, 1CVR College of Engineering,India and 2JNTUH College of Engineering, India |
Enhancing Confidentiality of Private Communication through Dual Compression [Pdf]
Kristipati Sudharshana Reddy, Munwar Sk and Rajesh Bhakthavatsalam, SVEC - JNTU, India |
Optimum Partition Parameter of Divide-And-Conquer Algorithm for Solving Closest-Pair Problem [Pdf]
Mohammad Zaidul Karim and Nargis Akter, Daffodil International University, Bangladesh |
Monitoring Software Reliability using Statistical Process Control: An MMLE Approach [Pdf]
R Satya Prasad1, Bandla Sreenivasa Rao2 and R.R. L Kantham1, 1Acharya Nagarjuna University, India and 2VRS & YRN College, India |
August 2011, Volume 3, Number 4 |
Automatic Application Level Set Approach In Detection Calcifications In Mammographic Image [Pdf]
Atef Boujelben1, Hedi Tmar2, Jameleddine Mnif1 and Mohamed Abid2, 1National School of Medicine of Sfax, Tunisia and 1National School of Engineers of Sfax, Tunisia |
A Robust Steganography Model Using Wavelet-Based Block-Partition Modification [Pdf]
Sherin Youssef, Ahmed Abu Elfarag and Reta Raouf, Arab Academy for Science & Tech - Alx., Egypt |
Cultural Influences on Explicit and Implicit Knowledge Sharing Behaviour in Virtual Teams [Pdf]
Xi Zhang, Chinese Academy of Sciences, P. R. China |
A Fuzzy Framework For Segmentation, Feature Matching And Retrieval Of Brain MR Images [Pdf]
Archana.S and Sridhar.S, College of Engineering - Guindy, India |
MDA-Based ATL Transformation To Generate MVC 2 Web Models [Pdf]
Mhamed Rahmouni and Samir Mbarki, Ibn Tofail University, Morocco |
Comprehensive Measurement Framework for Enterprise Architectures [Pdf]
Mahesh R. Dube1 and Shantanu K. Dixit2, 1VIT - Pune, India and 2WIT - Solapur, India |
Plants Images Classification Based on Textural Features using Combined Classifier [Pdf]
M.Z. Rashad, B.S.el-Desouky and Manal S .Khawasik, Mansoura University, Egypt |
Design and FPGA Implementation of DDR3 SDRAM Controller for High Performance [Pdf]
Shabana Aqueel and Kavita Khare, M.A.N.I.T - Bhopal, India |
Self-Adaptation Mechanism to Control the Diversity of the Population in Genetic Algorithm [Pdf]
Chaiwat Jassadapakorn and Prabhas Chongstitvatana, Chulalongkorn University - Bangkok, Thailand |
Packet Scheduling Of Two Classes Flow [Pdf]
Rabie Barhoun and Abdelwahed Namir, University Hassan II, Morocco |
Reduction Of Blocking Probability In Shared Protected Optical Network [Pdf]
Nirmala L Devi1 and V M Pandharipande2, 1Osmania University, India and 2Dr. Babasaheb Ambedkar Marathwada University, India |
DNA Lossless Differential Compression Alogorithm Based on Similarity of Genomic Sequence Database [Pdf]
Heba Afify, Muhammad Islam and Manal Abdel Wahed, Cairo University, Egypt |
Performance Analysis Of Various Data Mining Classification Techniques On Healthcare Data [Pdf]
Shelly Gupta1, Dharminder Kumar2 and Anand Sharma2, 1Banasthali University, India and 2GJUS&T - Hisar, India |
Towards A Model Of Maturity For Is Risk Management [Pdf]
Mina Elmaallam and Abdelaziz Kriouile, ENSIAS - Rabat, MOROCCO |
A Fuzzy Approach For Clustering Gene Expression Time Series Data [Pdf]
Sadiq Hussain and G.C. Hazarika, Dibrugarh University - Assam, India |
Novel Apporach for Speech Recognition by Using Self - Organized Maps [Pdf]
R.L.K.Venkateswarlu1, R. Vasantha Kumari2 and A.K.V.Nagayya1, 1Sasi Institute of Technology and Engineering, India and 2Perunthalaivar Kamarajar Arts College, India |
Special Issue on "ICCSEA - 2011" |
A New Trusted Third-Party Billing For Mobile Networks [Pdf]
Supriya Chakraborty1 and Nabendu Chaki2, 1JIS College of engineering - West Bengal, India and 2University of Calcutta, India |
Performance Evaluation And Impact Of Weighting Factors On An Energy And Delay Aware Dynamic Source Routing Protocol [Pdf]
Jihen Drira Rekik, Leila Baccouche and Henda Ben Ghezala,Manouba University,Manouba, Tunisia |
Indian Languages IR using Latent Semantic Indexing [Pdf]
A.P.SivaKumar1, P.Premchand2 and A.Govardhan1, 1JNTUACE, India and 2Osmania University - Hyderabad, India |
Active Controller Design For Global Choas Anti-Synchronization Of Li and Tigan Chaotic Systems [Pdf]
Sundarapandian Vaidyanathan1 and Karthikeyan Rajagopal2, 1Vel Tech Dr. RR & Dr. SR Technical University, India and 2Singhania University Rajasthan, India |
June 2011, Volume 3, Number 3 |
Information Security Plan for Flight Simulator Applications [Pdf]
Jason Slaughter1 and Syed (Shawon) M. Rahman1,2, 1Capella University, USA and 2University of Hawaii-Hilo, USA |
Common Phases of Computer Forensics Investigation Models [Pdf]
Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, Universiti Tenaga Nasional, Malaysia |
Comparison and Analysis of Watermarking Algorithms in Color Images - Image Security Paradigm [Pdf]
D. Biswas1, S. Biswas2, P.P. Sarkar2, D. Sarkar2, S. Banerjee1 and A. Pal1, 1Academy of Technology - Hoogly, India and 2University of Kalyani, India |
Evolutionary Neural Networks algorithm for the Dynamic Frequency Assignment Problem [Pdf]
Jamal Elhachmi and Zouhair Guennoun, Mohammadia School of Engineers (EMI), Morocco |
Optimal Self Correcting Fault Free Error Coding Technique in Memory Operation [Pdf]
Harikishore .Kakarla1, Madhavi Latha .M2 and Habibulla Khan1, 1KL University, India and 2JNTUH - Hyderabad, India |
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE) [Pdf]
Abderrahim BOUROUIS1,Mohamed FEHAM1 and Abdelhamid BOUCHACHIA2, 1Abou-bekr BELKAID University, Algeria and 2University of Klagenfurt, Austria |
A Review on Elliptic Curve Cryptography for Embedded Systems [Pdf]
Rahat Afreen1 and S.C. Mehrotra2, 1Tom Patrick Institute of Computer & I.T - Rauza Bagh, India and 2Dr. B.A.M. University, India |
Statistical Analysis on Software Metrics Affecting Modularity in Open Source Software [Pdf]
Andi Wahju Rahardjo Emanuel1, Retantyo Wardoyo2, Jazi Eko Istiyanto2 and Khabib Mustofa2, 1Maranatha Christian University, Indonesia and 2Gadjah Mada University, Indonesia |
Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government [Pdf]
Md.Headayetullah, G.K. Pradhan, Sanjay Biswas and B. Puthal, SOAU - Bhubaneswar, India |
Hybrid of Particle Swarm Optimization with Evolutionary Operators to Fragile Image Watermarking Based DCT [Pdf]
Sawsan Morkos Gharghory, Electronics Research Institute - Cairo, Egypt |
Image Retrieval using Bit-plane Pixel Distribution [Pdf]
N S T Sai1 and R C Patil2, 1Tech Mahindra Limited - Mumbai, India and 2NMIMS University, India |
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network [Pdf]
Al Mutaz M. Abdalla1, Safaai Dress1 and Nazar Zaki2, 1Universiti Teknologi - Malaysia, India and 2UAE University, UAE |
Effective Independent Quality Assessment using IV&V [Pdf]
Pathanjali Sastri Akella1 and K. Nageswara Rao2, 1V.R.Siddhartha Engineering College, India and 2P.V.P.Siddhartha Institute of Technology, India |
E-Learning personalization based on Dynamic learners' preference [Pdf]
Essaid El Bachari, El Hassan Abelwahed and Mohammed El Adnani, University Cadi Ayyad, Morocco |
An LMS Based Blind Source Separation Algorithm Using A Fast Nonlinear Autocorrelation Method [Pdf]
Behzad Mozaffari Tazehkand, University of Tabriz, Iran |
A Novel Technique for Back-Link Extraction and Relevance Evaluation [Pdf]
Pooja Gupta1, A.K. Sharma2 and Divakar Yadav3, 1MAIT - New Delhi, India, 2YMCA University of Science and Technology, India and 3JIITU - Noida, India |
Electronic Commerce in Web 3.0: The Evidence from Emerging Economics [Pdf]
Xi Zhang1 and Doug Vogel2, 1Chinese Academy of Sciences, China and 2City University of Hong Kong, China |
A Comparative Experiment of Several Shape Methods in Recognizing Plants [Pdf]
A. Kadir, L.E. Nugroho, A. Susanto and P.I. Santosa, Gadjah Mada University, Indonesia |
RCause - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems [Pdf]
Er. Anand Rajavat1 and Vrinda Tokekar2, 1Shri Vaishnav Institute of Technology and Science Indore, India and 2Institute of Engineering and Technology (DAVV) Indore, India |
Unsupervised horizontal collaboration based in SOM [Pdf]
Nadia Mesghouni Khaled Ghedira and Moncef Temani, University of Tunis Laboratory LI3 ISG Tunis, Tunisie |
April 2011, Volume 3, Number 2 |