International Journal of Computer Science & Information Technology
December 2013, Volume 5, Number 6 |
The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and Security[ Pdf ] |
Molecular Solutions for the Set-Partition Problem on Dna-Based Computing[ Pdf ] |
Brazilian License Plate Detection Using Histogram of Oriented Gradients and Sliding Windows[ Pdf ] |
Distributed Cloud Computing Environment Enhanced With Capabilities for Wide-Area Migration and Replication Of Virtual Machines[Pdf] |
Study On Decision-Making for Cafe Management Alternatives[ Pdf ] |
Multi-Topic Multi-Document Summarizer[ Pdf ] |
An Sna-Bi Based System for Evaluating Virtual Teams: A Software Development Project Case[ Pdf ] |
Gesture Recognition Based Mouse Events[ Pdf ] |
A Prediction Model for Taiwan Tourism Industry Stock Index[ Pdf ] |
Performance Analysis of Round Trip Time in Narrowband RF Networks For Remote Wireless Communications[Pdf]
El miloud Ar reyouchi1, Kamal Ghoumid2, Koutaiba Ameziane1 and Otman El Mrabet1, 1Abdelmalek Essaadi university, Morroco and 2Informatics and Telecommunications, ENSAO, Morocco
Automatic Detection of Microaneurysms and Hemorrhages in Color Eye Fundus Images[Pdf]
Sergio Bortolin Junior and Daniel Welfer, Universidade Federal do Pampa, Brazil
Project Monitoring and Control Measures In CMMI[Pdf]
Mahmoud Khraiwesh, Zarqa University, Jordan
A Preliminary Survey on Optimized Multiobjective Metaheuristic Methods for Data Clustering Using Evolutionary Approaches[Pdf]
Ramachandra Rao Kurada1, K Karteeka Pavan2 and AV Dattareya Rao1, 1Acharya Nagarjuna University, India and 2RVR & JC College of Engineering, India
Diagnosis of Some Diseases in Medicine via computerized Experts System[Pdf]
R.A. Soltan, M. Z. Rashad and B.El-Desouky, Mansoura University, Egypt
Improving the Effectiveness of Information Retrieval System Using Adaptive Genetic Algorithm[Pdf]
Wafa Maitah1, Mamoun Al-Rababaa1 and Ghasan Kannan2, 1Al al-Bayt University, Jordan and 2Amman Arab University, Jordan
The Comparison of the Text Classification Methods to be Used for the Analysis of Motion Data in DLP Architect[Pdf]
Murat Topaloglu, Trakya University, Turkey
A Privacy - Learning Objects Identity System for Smartphones Based on a Virtual Learning Environment Database[Pdf]
LeThanhHieu, JinHai, DeQingZou and WangDaiBin, HuaZhong University of Science and Technology, China
Systems Variability Modeling: A Textual Model Mixing Class and Feature Concepts[Pdf]
Ola Younis1, Said Ghoul1 and Mohammad H. Alomari2, 1Philadelphia University, Jordan and 2Applied Science University, Jordan
Compact, "Fuzzy" Information[Pdf]
S.Balaji Vivek, Easwari Engineering College, India
The Principles of Humanism for MANETs[Pdf]
Md. Amir Khusru Akhtar1 and G. Sahoo2, 1Cambridge Institute of Technology, India and 2Birla Institute of Technology, India
The Application Wavelet Transform Algorithm in Testing ADC Effective Number of Bits[Pdf]
Emad A. Awada, Applied Science University, Jordan
Introducing a Novel Fault Tolerant Routing Protocol in Wireless Sensor Networks Using Fuzzy Logic[Pdf]
Mostafa Vakili Fard1, Sayyed Majid Mazinani2 and Sayyed Ahmad Hoseini3, 1Science and Research IAU, Iran, 2Imam Reza University, Iran and 3Payam Noor University, Iran
Data Mining Model for the Data Retrieval from Central Server Configuration[Pdf]
Srivatsan Sridharan, Kausal Malladi and Yamini Muralitharan,International Institute of Information Technology - Bangalore, India
A Review of Temporal Aspects of Hand Gesture Analysis Applied to Discourse Analysis and Natural Conversation[Pdf] |
A Tabu Search Algorithm With Efficient Diversification Strategy for High School Timetabling Problem[Pdf] |
Analysis of Elementary Cellular Automata Boundary Conditions[Pdf] |
Design and Implementation of Repair-aware Test Flow for Multi-Memory[Pdf] |
Vedivision – A Fast Bcd Division Algorithm Facilitated by Vedic Mathematics[Pdf] |
Integrations of ICT in Education Sector for the Advancement of the Developing Country: Some Challenges and Recommendations-Bangladesh Perspective[Pdf] |
Comparative Study of Backpropagation Algorithms in Neural Network Based Identification of Power System[Pdf] |
Matching Structure and the Evolution of Cooperation in the Prisoner’s Dilemma[Pdf] |
Survey of the Euro Currency Fluctuation by Using Data Mining[Pdf] |
GPS Tracking System Coupled With Image Processing in Traffic Signals to Enhance Life Security[Pdf] |
Following Car Algorithm With Multi Agent Randomized System[Pdf] |
Periocular Recognition Using Reduced Features[Pdf] |
Design and Development of Secure Navigation System for Visually Impaired People[Pdf] |
A Novel Perceptual Image Encryption Scheme Using Geometric Objects Based Kernel[Pdf] |
| Fuzzy Rule Base System for Software Classification [ Pdf ] Adnan Shaout and Juan C. Garcia, The University of Michigan - Dearborn, United States |
| Context-Based Barrier Notification Service Toward Outdoor Support for the Elderly [Pdf] Keisuke Umezu1, Takahiro Kawamura2 and Akihiko Ohsuga2, 1NEC Corporation, Japan and 2University of Electro-Communications, Japan |
| Hyper-Mspace; Multidimensional Evolutionary-Agents Modeling and Analysis [Pdf] Mohamed Dbouk1, Ihab Sbeity1, Hamid Mcheick2 and Haytham Douaihy3, 1Lebanese University, Beirut-Lebanon, 2Universite du Quebec a Chicoutimi, Canada and 3Lebanese University-DSST, Beirut-Lebanon |
| A Novel Hybrid Method for the Segmentation of the Coronary Artery Tree in 2d Angiograms [ Pdf ] Daniel S.D. Lara1, Alexandre W.C. Faria2, Arnaldo de A. Araujo1 and D. Menotti3, 1Univ. Fed. de Minas Gerais, Brazil, 2UFMG, Brazil and 3Universidade Federal de Ouro Preto, Brazil |
| Modified Heuristic Time Deviation Technique for Job Sequencing and Computation of Minimum Total Elapsed Time [ Pdf ] N.Nagamalleswara Rao1, O. Naga Raju2 and I. Ramesh Babu2, 1R.V.R & J. C. College of Engineering, India and 2Nagarjuna University, India |
| Security Threats on Cloud Computing Vulnerabilities [ Pdf ] Te-Shun Chou, East Carolina University, U.S.A |
| Handover Management Scheme in LTE Femtocell Networks [ Pdf ] Tijane Fatima Zohra Badri1,2, Saadane Rachid1, Mohammed Wahbi1 and MbarkiSamir2, 1SIR2C2S/LASI-EHTP Casablanca, Morocco and 2Ibn Tofail University Kenitra, Morocco |
| Saasquality - A Method for Quality Evaluation of Software as a Service (Saas) [ Pdf ] Nemesio Freitas Duarte Filho1, Clarindo Isaias Pereira da Silva e Padua1, Paulo Henrique de Souza Bermejo2, Andre Luiz Zambalde2, Urlan Salgado de Barros3, 1Federal University of Minas Gerais, Brazil, 2Federal University of Lavras, Brazil and 3Federal University of Parana, Brazil |
| An Efficient Approach to Wavelet Image Denoising [Pdf ] Alaa A. Hefnawy and Heba A. Elnemr, Electronics Research Institute, Egypt |
| Towards A Good ABS Design for More Reliable Vehicles on the Roads [ Pdf ] Afifa Ghenai, Mohamed Youcef Badaoui and Mohamed Benmohammed, University of Constantine, Algeria |
| Designing of an efficient algorithm for identifying Abbreviation definitions in biomedical Text [ Pdf ] Shashank Singh1, Gaurav Sharma2 Abdul Nazeer K A3 and Shalini Singh2, 1IBM India Private limited, India, 2School of Biochemical Engineering IIT (BHU), India and 3NIT, India |
| Labeled Generalized Stochastic Petri Net Based Approach for Web Services Composition [ Pdf ] Sofiane Chemaa, Mouna Bouarioua and Allaoua chaoui, University of Constantine, Algeria |
| Bounded Ant Colony Algorithm Fortask Allocation on Anetwork of Homogeneous Processorsusing a Primary Site (Bts-Aco) [ Pdf ] Buthayna Al-Sharaa and Tamara Al-Qublan, AL Balqa Applied University, Jordan |
| Biomedical Image Transmission Based on Modified Feistal Algorithm [ Pdf ] Jinu Elizabeth John, Saintgits College of Engineering, India |
| Intelligent Access Control Policies for Social Network Site [ Pdf ] Saung Hnin Pwint Oo, University of Technology (Yatanarpon Cyber City), Myanmar |
| Hybrid Optical and Electrical Network Flows Scheduling in Cloud Data Centres [ Pdf ] Ibrahim Kabiru Musa and Stuart Walker, University of Essex, UK |
| Obtaining Super-Resolution Images by Combining Low-Resolution Images with High-Frequency Information Derived from Training Images [ Pdf ] Emil Bilgazyev, Nikolaos Tsekos and Ernst Leiss, University of Houston, USA |
| An Investigation of the Energy Consumption by Information Technology Equipments [ Pdf ] Baharak Makki1 and Bahador Makki2, 1University of Agder, Norway and 2University of Bremen, Germany |
| Structural Coupling in Web 2.0 Applications [ Pdf ] Maya Samaha Rupert, Notre Dame University Louaize, Lebanon |
| APPBACS: An Application Behavior Analysis And Classification System [ Pdf ] Himanshu Pareek, P R L Eswari and Sarat Chandra Babu, Center for Development of Advanced Computing, India |
| An Effective Method for Information Security Awareness Raising Initiatives [ Pdf ] AliMaqousi1, TatianaBalikhina1 ans Michael Mackay2, 1Petra University, Jordan and 2Liverpool John Moores University, UK |
| Adaboost Ensemble with Simple Genetic Algorithm for Student Prediction Model [ Pdf ] AhmedSharaf ElDen1, Malaka A. Moustafa2, Hany M. Harb3 and AbdelH.Emara3, 1Helwan University, Egypt, 2Al-Alson Higher Institute of Tourism, Egypt and 3Azhar University, Egypt |
| Pixel Size Reduction Loss-Less Image Compression Algorithm [ Pdf ] Pralhadrao V Shantagiri and Saravanan K N, Christ University, India |
| Social Media News: Motivation, Purpose and Usage [ Pdf ] Samaneh Beheshti-Kashi and Baharak Makki, University of Agder, Norway |
| A Heuristic Approach for Web-Service Discovery and Selection [ Pdf ] Achraf Karray1, Rym Teyeb2 and Maher Ben Jemaa3, 1Najran University, KSA, 2Higher Institute of the Technological Studies of Tataouine, Tunisia and 3National School of Engineers of Sfax, Tunisia |
| Developing Mobile Agent for Intrusion Detection [ Pdf ] Bambang Sugiantoro1, Retantyo Wardoyo2, Sri Hartati2, Jazi Eko Istiyanto2, 1State Islamic University Sunan Kalijaga, Indonesia and 2Gadjah Mada University, Indonesia |
| Requirements Engineering of a Web Portal Using Organizational Semiotics Artifacts and Participatory Practices [ Pdf ] Flavia Linhalis Arantes, State University of Campinas (UNICAMP), Brazil |
| Shadow Detection Using Tricolor Attenuation Model Enhanced with Adaptive Histogram Equalization[Pdf] Jyothisree V. and Smitha Dharan, College of Engineering Chengannur, India |
| Performance Analysis of Parallel Pollard's Rho Factoring Algorithm [ Pdf ] Anjan K Koundinya, Harish G,Srinath N K, Raghavendra G E, Pramod Y V, Sandeep R and Punith Kumar G, R V College of Engineering, India |
| A Systematic Mapping Study on Business Process Variability[Pdf] George Valenca1, Carina Alves1, Vander Alves2, Nan Niu3, 1Federal University of Pernambuco (UFPE), Brazil, 2University of Brasilia,Brazil and 3Mississippi State University, USA. |
| A Neuro-Fuzzy Approach for the Fault Location Estimation of Unsynchronized Two-Terminal Transmission Lines [Pdf] Ramadoni Syahputra,Universitas Muhammadiyah Yogyakarta,Indonesia |
| Sobel Edge Detection Method to Identify and Quantify the Risk Factors for Diabetic Foot Ulcers [ Pdf ] Kunjam Nageswara Rao1, P srinivasa Rao1, Allam Appa Rao2, G R Sridhar3, 1Andhra university, India, 2University of Hydeabad, India and 3Endocrine & Diabetes centre,India. |
| Improving the Management of Cost and Scope in Software Projects Using Agile Practices [ Pdf ] Mariana de Azevedo Santos1, Paulo Henrique de Souza Bermejo2, Marcelo Silva de Oliveira2, Adriano Olimpio Tonelli2, Enio Junior Seidel3, 1Mitah Technologies, Lavras, Brazil, 2Universidade Federal de Lavras (UFLA), Brazil and 3Universidade Federal do Pampa (UNIPAMPA),Brazil. |
| An Evaluation Method of Research on Wearable Wireless Body Area Network in Healthcare [ Pdf ] Roberto Vito Rodrigues Filho1, Renato Freitas Bulcao Neto1, Bruno Oliveira Silvestre1, Leandro Luis Galdino de Oliveira1, Rogerio Orlow de Oliveira2 and Iwens Gervasio Sene Junior1, 1Universidade Federal de Goias, Brazil and 2Pontificia Universidade Catolica de Goias,Brazil. |
| Pre-Segmentation for the Computer Aided Diagnosis System [ Pdf ] Myat Mon Kyaw,University of Technology (Yatanarpon Cybercity), Myanmar |
| Extended Nymble: Method for Tracking Misbehaving Users Anonymosly While Blocking [ Pdf ] M.Durga Prasad1, P.Chenna Reddy2, Banoth Samya1, 1Vijay Institute of Tech & Sciences, India, 2JNTUCE, Pulivendula, India and 1,2Vijay college of Engineering for women,India |
| Correlation Based VMS Placement Resource Provision [ Pdf ] Zar Lwin Phyo and Thandar Thein,University of Computer Studies,Myanmar. |
| Classification Methods of Skin Burn Images [ Pdf ] Malini Suvarna1, Sivakumar2 and U C Niranjan3, 1Atria Institute of Technology, India, 2DR. AMBEDKAR INSTITUTE OF TECHNOLOGY, India and 3Director of Research, Manipal Dot, India |
| Concept-Based Indexing in Text Information Retrieval [ Pdf ] Fatiha Boubekeur1 and Wassila Azzoug2, 1Mouloud Mammeri University of Tizi-Ouzou, Algeria and 2M'Hamed Bouguera, University of Boumerdes,Algeria |
| Performance Analysis of Kernel-Based Virtual Machine [ Pdf ] Sudha M, Harish G M, Nandan A, Usha J, R V College of Engineering,India. |
| Analysis of Digital Images Using Morphlogical Operations [ Pdf ] Amalorpavam.G1, Harish Naik T2, Jyoti Kumari3 and Suresha M4, 1Sambhram Academy Of Mgmt. Studies,India, 2Presidency College,India and 3Acharya Institutes (Aigs),India and 4Jnana Sahyadri,Kuvempu University,India |
| An Ontology based Text Mining framework for R&D Project Selection [ Pdf ] N.Arunachalam, E.Sathya, S.Hismath Begum and M.Uma Makeswari, Sri Manakula Vinayagar Engineering College, India |
| Mining Closed Regular Patterns in Data Streams [ Pdf ] M.Sreedevi1 and L.S.S.Reddy2, 1K L University, India and 2LBR College of Engineering,Andhra Pradesh, India |
| Teaching Automated Test Data Generation Tools for C, C++ , and Java Programs [ Pdf ] Hitesh Tahbildar and Plabita Borbora, G. P. Khataniar, Assam Engineering Institute, India |
| Adaptive Design of Controller and Synchronizer for Lu-Xiao Chaotic System with Unknown Parameters [ Pdf ] Sundarapandian Vaidyanathan,Vel Tech Dr. RR & Dr. SR Technical University,India. |