- Home
- ForthComing Papers
- Archives
- 2011 Volume 3, Number 6
- 2011 Volume 3, Number 5
- 2011 Volume 3, Number 4
- 2011 Volume 3, Number 3
- 2011 Volume 3, Number 2
- 2011 Volume 3, Number 1
- 2010 Volume 2
- 2009 Volume 1
December 2011, Volume 3, Number 6 |
From 3D Model Data to Semantics [Pdf] |
Recycling of Bandwidth in Metropolitan Area Networks(MAN) [Pdf] |
Adaptation AC to Improve Wireless Access Network Dependability [Pdf] |
A Comparative Study To Find A Suitable Method For Text Document Clustering [Pdf] |
Recognizing Bangla Grammar Using Predictive Parser [Pdf] |
Hybrid GPS-GSM Localization of Automobile Tracking System [Pdf] |
Network Intrusion Detection Using Data Mining and Network Behaviour Analysis [Pdf] |
Technical Analysis of Remote 3D Visualization on Mobile Devices [Pdf] |
Integrated Environment for Developing E-Learning Lectures [Pdf] |
Analysis of Different Privacy Preserving Cloud Storage Frameworks [Pdf] |
Investigating the Awareness of Applying the Important Web Application Development and Measurement Practices in Small Software Firms [Pdf] |
Flooding Attacks to Internet Threat Monitors(ITM): Modeling and Counter Measures Using Botnet and Honeypots [Pdf] |
Mobile Geographic Information Systems: A Case Study on Mansoura University, Egypt [Pdf] |
An Improved Neural Image Compression Approach With Cluster Based Pre-Processing [Pdf] |
From Learning Style of Webpage Content to Learner's Learning Style [Pdf] |
Image Labeling and Segmentation using Hierarchical Conditional Random Field Model [Pdf] |
Multi-Resolution Analysis For Medical Image Compression [Pdf] |
Introduction Of Knowledge Management Architecture Using Multi Agent [Pdf] |
Optimal Fuzzy Model Construction With Statistical Information Using Genetic Algorithm [Pdf] |
Edge Detection Techniques For Image Segmentation [Pdf] |
October 2011, Volume 3, Number 5 |
It Security Issues Within the Video Game Industry [Pdf] |
Adaptive Beamforming Algorithm for Interference Suppression in GNSS Receivers [Pdf] |
Minimize the False Positive Rate in a Database Intrusion Detection System [Pdf] |
Design Pattern Management System: A Support Tool Based on Design Patterns Applicability [Pdf] |
Genetic Algorithm (GA) In Feature Selection For CRF Based Manipuri Multiword Expression (MWE) Identification [Pdf] |
IRIS Recognition Based On LBP and Combined LVQ Classifier [Pdf] |
An IR-based Pedestrian Detection System Implemented with Matlab-Equipped Laptop and Low-Cost Microcontroller [Pdf] |
New Method for 3D Shape Retrieval [Pdf] |
Research Review for Digital Image Segmentation Techniques [Pdf] |
Stable Filtering for Artificial Pheromone Potential Field Constructed By Mobile Robots and Passive RFID Tags [Pdf] |
Evaluate the Performance of Optical Cross Connect Based on Fiber Bragg Grating Under Different Bit Rate [Pdf] |
Optimized Fuzzy Logic Application for MRI Brain Images Segmentation [Pdf] |
Robust seed selection algorithm for k-means type algorithms [Pdf] |
Knowledge Based Methods for Video Data Retrieval [Pdf] |
Analysis and Design Complex and Large Data Base using MySQL Workbench [Pdf] |
Direct Manipulation of Web Browsing History [Pdf] |
A Semantically Enriched Web Usage Based Recommendation Model [Pdf] |
Enhancing Confidentiality of Private Communication through Dual Compression [Pdf] |
Optimum Partition Parameter of Divide-And-Conquer Algorithm for Solving Closest-Pair Problem [Pdf] |
Monitoring Software Reliability using Statistical Process Control: An MMLE Approach [Pdf] |
August 2011, Volume 3, Number 4 |
Automatic Application Level Set Approach In Detection Calcifications In Mammographic Image [Pdf] |
A Robust Steganography Model Using Wavelet-Based Block-Partition Modification [Pdf] |
Cultural Influences on Explicit and Implicit Knowledge Sharing Behaviour in Virtual Teams [Pdf] |
A Fuzzy Framework For Segmentation, Feature Matching And Retrieval Of Brain MR Images [Pdf] |
MDA-Based ATL Transformation To Generate MVC 2 Web Models [Pdf] |
Comprehensive Measurement Framework for Enterprise Architectures [Pdf] |
Plants Images Classification Based on Textural Features using Combined Classifier [Pdf] |
Design and FPGA Implementation of DDR3 SDRAM Controller for High Performance [Pdf] |
Self-Adaptation Mechanism to Control the Diversity of the Population in Genetic Algorithm [Pdf] |
Packet Scheduling Of Two Classes Flow [Pdf] |
Reduction Of Blocking Probability In Shared Protected Optical Network [Pdf] |
DNA Lossless Differential Compression Alogorithm Based on Similarity of Genomic Sequence Database [Pdf] |
Performance Analysis Of Various Data Mining Classification Techniques On Healthcare Data [Pdf] |
Towards A Model Of Maturity For Is Risk Management [Pdf] |
A Fuzzy Approach For Clustering Gene Expression Time Series Data [Pdf] |
Novel Apporach for Speech Recognition by Using Self - Organized Maps [Pdf] |
Special Issue on "ICCSEA - 2011" |
A New Trusted Third-Party Billing For Mobile Networks [Pdf] |
Performance Evaluation And Impact Of Weighting Factors On An Energy And Delay Aware Dynamic Source Routing Protocol [Pdf] |
Indian Languages IR using Latent Semantic Indexing [Pdf] |
Active Controller Design For Global Choas Anti-Synchronization Of Li and Tigan Chaotic Systems [Pdf] |
June 2011, Volume 3, Number 3 |
Information Security Plan for Flight Simulator Applications [Pdf] |
Common Phases of Computer Forensics Investigation Models [Pdf] |
Comparison and Analysis of Watermarking Algorithms in Color Images - Image Security Paradigm [Pdf] |
Evolutionary Neural Networks algorithm for the Dynamic Frequency Assignment Problem [Pdf] |
Optimal Self Correcting Fault Free Error Coding Technique in Memory Operation [Pdf] |
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE) [Pdf] |
A Review on Elliptic Curve Cryptography for Embedded Systems [Pdf] |
Statistical Analysis on Software Metrics Affecting Modularity in Open Source Software [Pdf] |
Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government [Pdf] |
Hybrid of Particle Swarm Optimization with Evolutionary Operators to Fragile Image Watermarking Based DCT [Pdf] |
Image Retrieval using Bit-plane Pixel Distribution [Pdf] |
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network [Pdf] |
Effective Independent Quality Assessment using IV&V [Pdf] |
E-Learning personalization based on Dynamic learners' preference [Pdf] |
An LMS Based Blind Source Separation Algorithm Using A Fast Nonlinear Autocorrelation Method [Pdf] |
A Novel Technique for Back-Link Extraction and Relevance Evaluation [Pdf] |
Electronic Commerce in Web 3.0: The Evidence from Emerging Economics [Pdf] |
A Comparative Experiment of Several Shape Methods in Recognizing Plants [Pdf] |
RCause - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems [Pdf] |
Unsupervised horizontal collaboration based in SOM [Pdf] |
April 2011, Volume 3, Number 2 |
Clustering Posts in Online Discussion Forum Threads [Pdf] |
The Development of Electronic Payment System for Universities in Indonesia: On Resolving Key Success Factors [Pdf] |
Brightness Factor Matching for Gesture Recognition System Using Scaled Normalization [Pdf] |
Behavior Analysis in a learning Environment to Identify the Suitable Learning Style [Pdf] |
An Object-Oriented Modeling and Implementation of Spatio-Temporal Knowledge Discovery System [Pdf] |
An Effective CBVR System Based on Motion, Quantized Color and Edge Density Features [Pdf] |
Model Based System Engineering Approach of a Lightweight Embedded TCP/IP [Pdf] |
Model-Based Factors to Extract Quality Indications in Software Lines of Code [Pdf] |
Wavelet Based Spectrum Sensing Techniques for Cognitive Radio - A Survey [Pdf] |
Ontology Alignment Using Machine Learning Techniques [Pdf] |
A Novel Parallel Algorithm for Clustering Documents Based on the Hierarchical Agglomerative Approach [Pdf] |
Adaptive Team-Based Multi-Agent Organizational Model: A Case in Rescue Systems [Pdf] |
A Descriptive Model for Developing a Hydraulic Geodatabase by Using the GIS Softwares [Pdf] |
Application of PUF-Enabled RFID Tags in Electronic Banking [Pdf] |
Energy Efficient Task Scheduling of Send-Receive Task Graphs on Distributed Multi-Core Processors with Software Controlled Dynamic Voltage Scaling [Pdf] |
Special Issue on "CCSIT - 2011" |
A Design of a Computer-Aided Diagnostic Tool For Chest X-Ray Analysis [Pdf] |
Characterization and Validation of Requirements Management Measures Using Correlation and Regression Model [Pdf] |
An Automated Size Recognition Technique for Acetabular Implant in Total Hip Replacement [Pdf] |
PHP Framework for Database Management Based on MVC Pattern [Pdf] |
Importance of Data Collection and Validation for Systematic Software Development Process [Pdf] |
February 2011, Volume 3, Number 1 |
Affine Invariant Descriptors of 3D Object Using Multiple Regression Model [Pdf] |
Use-Case, Runtime and Deployment Views for Developing Subsidies Mobile Wallet [Pdf] |
Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network [Pdf] |
Electre Methods in Solving Group Decision Support System Bioinformatics on Gene Mutation Detection Simulation [Pdf] |
A Novel Super Resolution Reconstruction of Low Reoslution Images Progressively Using DCT and Zonal Filter Based Denoising [Pdf] |
Mining Target-Oriented Fuzzy Correlation Rules to Optimize Telecom Service Management [Pdf] |
Improving the Character Recognition Efficiency of Feed Forward BP Neural Network [Pdf] |
Initial Classification Through Back Propagation In a Neural Network Following Optimization Through GA to Evaluate the Fitness of an Algorithm [Pdf] |
Adaptive Fuzzy Filtering for Artifact Reduction in Compressed images and videos [Pdf] |
Channel Allocation for Direct Sequence Spread Spectrum Using Vertex Merge Algorithm [Pdf] |
Combining Speedup Techniques based on Landmarks and Containers with parallelised preprocessing in Random and Planar Graphs [Pdf] |
Machine Learning Methods for Spam E-Mail Classification [Pdf] |
A Formal Classification of Internet Banking Attacks and Vulnerabilities [Pdf] |
Characterization of Tumor Region Using SOM and Neuro Fuzzy Techniques in Digital Mammography [Pdf] |
Search-Based Software Test Data Generation Using Evolutionary Computation [Pdf] |
AIRCC | Contact Us