Data Warehouse and Big Data Integration
Sonia Ordoñez Salinas and Alba Consuelo Nieto Lemus,IJCSIT Journal, Vol 9, No 2, April 2017, PP. 1-17 DOI : 10.5121/ijcsit.2017.9201 |
An Integrated System Framework for Predicting Students' Academic Performance in Higher Educational Institutions
Olugbenga Adejo and Thomas Connolly, IJCSIT Journal, Vol 9, No 3, June 2017, PP. 149-157 DOI : 10.5121/ijcsit.2017.93013 |
A Systematic Mapping Study on Current Research Topics in Smart Contracts
Maher Alharby and Aad van Moorsel, IJCSIT Journal, Vol 9, No 5, October 2017, PP. 151-164 DOI : 10.5121/ijcsit.2017.9511 |
Image encryption techniques using fractal function: a review
Shafali Agarwal, IJCSIT Journal, Vol 9, No 2, April 2017, PP. 53-68 DOI : 10.5121/ijcsit.2017.9205 |
A Meliorated Kashida - Based Approach for Arabic Text Steganography
Ala'a M. Alhusban and Jehad Q. Odeh Alnihoud, IJCSIT Journal, Vol 9, No 2, April 2017, PP. 99-112 DOI : 10.5121/ijcsit.2017.9209 |
Environmental monitoring and controlling system for mushroom farm with online interface
Arjuna Marzuki and Soh Yan Ying , IJCSIT Journal, Vol 9, No 4, August 2017, PP. 17-28 DOI : 10.5121/ijcsit.2017.9402 |
Residual quotient and annihilator of intuitionistic fuzzy sets of ring and module
P.K. Sharma and Gagandeep Kaur, IJCSIT Journal, Vol 9, No 4, August 2017, PP. 1-15 DOI : 10.5121/ijcsit.2017.9401 |
Raspberry pi and arduino uno working together as a basic meteorological station
José Rafael Cortés León and Ricardo Francisco Martínez-González,Anilú Miranda Medinay and Luis Alberto Peralta-Pelaez, IJCSIT Journal, Vol 9, No 5, October 2017, PP. 97-104 DOI : 10.5121/ijcsit.2017.9508 |
Multilevel Analysis of Student’s Feedback Using Moodle Logs in Virtual Cloud Environment
Ashok Verma, Sumangla Rathore, Santosh Vishwakarma and Shubham Goswami, IJCSIT Journal, Vol 9, No 5, October 2017, PP. 15-28 DOI : 10.5121/ijcsit.2017.9502 |
Usability testing of fitness mobile application: case study Aded Surat app
Ryan Alturki and Valerie Gay , IJCSIT Journal, Vol 9, No 5, October 2017, PP. 105-125 DOI : 10.5121/ijcsit.2017.9509 |
Stock trend prediction using news sentiment analysis
Kalyani Joshi, Prof. Bharathi H. N., Prof. Jyothi Rao, IJCSIT Journal, Vol 8, No 3, June 2016, PP. 67-76 DOI : 10.5121/ijcsit.2016.8306 |
Automated test case generation and optimization: a comparative review
Rajesh Kumar Sahoo, Deeptimanta Ojha, Durga Prasad Mohapatra, Manas Ranjan Patra, IJCSIT Journal, Vol 8, No 5, October 2016, PP. 19-32 DOI : 10.5121/ijcsit.2016.8502 |
Eco-Strategy: Towards a New Generation Managerial Model Based on Green IT and CSR
Rachid Hba, Abderrazak Bakkas, Abdellah El Manouar, Mohammed Abdou Janati Idrissi,IJCSIT Journal, Vol 8, No 2, April 2016, PP. 51-62 DOI : 10.5121/ijcsit.2016.8204 |
Intrusion detection using feature selection and machine learning algorithm with misuse detection
Harvinder Pal Singh Sasan and Meenakshi Sharma, IJCSIT Journal, Vol 8, No 1, February 2016, PP. 17 -25 DOI : 10.5121/ijcsit.2016.8102 |
Extracting Arabic relations from the web
Shimaa M. Abd El-salam, Enas M.F. El Houby, A.K. Al sammak and T.A. El-shishtawy, IJCSIT Journal, Vol 8, No 1, February 2016, PP. 85 105 DOI : 10.5121/ijcsit.2016.8107 |
Amazigh part-of-speech tagging using markov models and decision trees
Samir AMRI, Lahbib ZENKOUAR, Mohamed OUTAHAJALA, IJCSIT Journal, Vol 8, No 5, October 2016, PP. 61 -71 DOI : 10.5121/ijcsit.2016.8505 |
Examine Website Quality on M-Banking Services Adoption in Bangladesh
Mohammad Abdullah Mahfuz, Liza Khanam and Wang Hu, IJCSIT Journal, Vol 8, No 2, April 2016, PP. 33 -50 DOI : 10.5121/ijcsit.2016.8203 |
The Importance of Neutral Class in Sentiment Analysis of Arabic Tweets
Hamed AL-Rubaiee, Renxi Qiu, and Dayou Li, IJCSIT Journal, Vol 8, No 2, April 2016, PP. 17 -31 DOI : 10.5121/ijcsit.2016.8202 |
A Study of the Reliability and Validity of the Leader-Member Exchange (LMX) Instrument in Arabic
AreejAlshamasi and NahlaAljojo, IJCSIT Journal, Vol 8, No 1, February 2016, PP. 55 -73 DOI : 10.5121/ijcsit.2016.8105 |
An Evaluation Study of General Software Project Risk Basedon Software Practitioners Experiences
Sahand Vahidnia and Ömer Özgür Tanrıöver and I. N. Askerzade, IJCSIT Journal, Vol 8, No 6, December 2016, PP. 1 -13 DOI : 10.5121/ijcsit.2016.8601 |
Cross Platform App : A Comparative Study
Paulo R. M. de Andrade and Adriano B. Albuquerque, IJCSIT Journal, Vol 7, No 1, February 2015, PP. 33-40 DOI : 10.5121/ijcsit.2015.7104 |
Review of Lane Detection and Tracking Algorithms in Advanced Driver Assistance System
Ammu M Kumar and Philomina Simon, IJCSIT Journal, Vol 7, No 4, August 2015, PP. 65-78 DOI : 10.5121/ijcsit.2015.7406 |
Applying the Technology Acceptance Model to Understand Social Networking Sites (SNS) Usage: Impact of Perceived
Social Capital
Waleed Al-Ghaith, IJCSIT Journal, Vol 7, No 4, August 2015, PP. 105-117 DOI : 10.5121/ijcsit.2015.7409 |
Iris Recognition for Personal Identification Using Lamstar Neural Network
Shideh Homayon, IJCSIT Journal, Vol 7, No 1, February 2015, PP. 01-08 DOI : 10.5121/ijcsit.2015.7101 |
Evaluation of Two-Level Global Load Balancing Framework in Cloud Environment
Po-Huei Liang and Jiann-Min Yang, IJCSIT Journal, Vol 7, No 2, April 2015, PP. 01-11 DOI : 10.5121/ijcsit.2015.7201 |
Instructor Perspectives of Mobile Learning Platform: An Empirical Study
Muasaad Alrasheedi, IJCSIT Journal, Vol 7, No 3, June 2015 PP. 27-40 DOI : 10.5121/ijcsit.2015.7303 |
Preprocessing for PPM: Compressing Utf-8 Encoded Natural Language Text
William J.Teahan and Khaled M.Alhawiti, IJCSIT Journal, Vol 7, No 2, April 2015 PP. 41-51 DOI : 10.5121/ijcsit.2015.7204 |
A Survivability Model for Saudi ICT Startups
Sara Almakenzi and Arif Bramantoro and Waleed Rashideh, IJCSIT Journal, Vol 7, No 2, April 2015 PP. 145-157 DOI : 10.5121/ijcsit.2015.7213 |
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Mohamad M. AL-Laham, IJCSIT Journal, Vol 7, No 5, October 2015 PP. 109-119 DOI : 10.5121/ijcsit.2015.7508 |
Map-Reduce Implementations: Survey and Performance Comparison
Zeba Khanam and Shafali Agarwal, IJCSIT Journal, Vol 7, No 4, August 2015 PP. 119-126 DOI : 10.5121/ijcsit.2015.7410 |
Performance Analysis of Wind Turbine as a Distributed Generation Unit in Distribution System
Ramadoni Syahputra, Imam Robandi and Mochamad Ashari, IJCSIT Journal, Vol 6, No 3, June 2014, PP. 39-56 DOI : 10.5121/ijcsit.2014.6303 |
Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method
Ming-Chang Lee, IJCSIT Journal, Vol 6, No1, February 2014, PP. 29-45 DOI : 10.5121/ijcsit.2014.6103 |
State of the art of learning styles-based adaptive educational hypermedia systems (LS-BAEHSs)
Ahmed Al-Azawei and Atta Badii, IJCSIT Journal, Vol 6, No 3, June 2014, PP. 01-19 DOI : 10.5121/ijcsit.2014.6301 |
State of the art of agile governance: a systematic review
Alexandre J. H. de O. Luna, Philippe Kruchten, Marcello L. G. do E.Pedrosa, Humberto R. de Almeida Neto and Hermano P. de Moura, IJCSIT Journal, Vol 6, No 5, October 2014, PP. 121-141 DOI : 10.5121/ijcsit.2014.6510 |
What Facilitates the Delivery of Citizen-Centric EGovernment Services in Developing Countries: Model Development and Validation Through Structural Equation Modeling
Yousef Elsheikh and Mohammad Azzeh, IJCSIT Journal, Vol 6, No1, February 2014 , PP. 77-98 DOI : 10.5121/ijcsit.2014.6106 |
Arabic text categorization algorithm using vector evaluation method
Ashraf Odeh, Aymen Abu-Errub, Qusai Shambour and Nidal Turab, IJCSIT Journal, Vol 6, No 6, December 2014, PP. 83-92 DOI : 10.5121/ijcsit.2014.6606 |
Business Bankruptcy Prediction Based on Survival Analysis Approach
Ming-Chang Lee, IJCSIT Journal, Vol 6, No 2, April 2014, PP. 103-119 DOI : 10.5121/ijcsit.2014.6207 |
Shape-Based Plagiarism Detection for Flowchart Figures in Texts
Senosy Arrish, Fadhil Noer Afif, Ahmadu Maidorawa and Naomie Salim, IJCSIT Journal, Vol 6, No 1, February 2014, PP. 113-124 DOI : 10.5121/ijcsit.2014.6108 |
A guide to deal with uncertainties in software project management
Marcelo Marinho, Suzana Sampaio, Telma Lima and Hermano de Moura, IJCSIT Journal, Vol 6, No 5, October 2014, PP. 01-20 DOI : 10.5121/ijcsit.2014.6501 |
A guide to deal with uncertainties in software project management
Heba A. Kurdi, IJCSIT Journal, Vol 6, No 2, April 2014, PP. 199-206 DOI : 10.5121/ijcsit.2014.6216 |
Security threats on cloud computing vulnerabilities
Te-Shun Chou, IJCSIT Journal, Vol 5, No 3, June 2013, PP. 79-88 DOI : 10.5121/ijcsit.2013.5306 |
A Neuro-Fuzzy Approach For the Fault Location Estimation of Unsynchronized Two-Terminal Transmission Lines
Ramadoni Syahputra, IJCSIT Journal, Vol 5, No 1, February 2013, PP. 23-37 DOI : 10.5121/ijcsit.2013.5102 |
Automatic Detection of Microaneurysms and Hemorrhages in Color Eye Fundus Images
Sérgio Bortolin Júnior and Daniel Welfer, IJCSIT Journal, Vol 5, No 5, October 2013, PP. 21-37 DOI : 10.5121/ijcsit.2013.5502 |
A systematic mapping study on business process variability
George Valença, Carina Alves, Vander Alves and Nan Niu, IJCSIT Journal, Vol 5, No 1, February 2013, PP. 01-21 DOI : 10.5121/ijcsit.2013.5101 |
Multi-topic multi-document summarizer
Fatma El-Ghannam and Tarek El-Shishtawy, IJCSIT Journal, Vol 5, No 6, December 2013, PP. 77-90 DOI : 10.5121/ijcsit.2013.5606 |
Comparative study of backpropagation algorithms in neural network based identification of power system
Sheela Tiwari, Ram Naresh, Rameshwar Jha, IJCSIT Journal, Vol 5, No 4, August 2013, PP. 93-107 DOI : 10.5121/ijcsit.2013.5407 |
Concept-based indexing in text information retrieval
Fatiha Boubekeur and Wassila Azzoug, IJCSIT Journal, Vol 5, No 1, February 2013, PP. 119-136 DOI : 10.5121/ijcsit.2013.5110 |
A Preliminary Survey on Optimized Multiobjective Metaheuristic Methods for Data Clustering Using Evolutionary Approaches
Ramachandra Rao Kurada, Dr. K Karteeka Pavan and Dr. AV Dattareya Rao, IJCSIT Journal, Vol 5, No 5, October 2013, PP. 57-77 DOI : 10.5121/ijcsit.2013.5504 |
Diagnosis of Some Diseases in Medicine via computerized Experts System
R.A. Soltan, M. Z. Rashad and B.El-Desouky, IJCSIT Journal, Vol 5, No 5, October 2013, PP. 79-90 DOI : 10.5121/ijcsit.2013.5505 |
AdaBoost ensemble with simple genetic algorithm for student prediction model
AhmedSharaf ElDen, Malaka A. Moustafa, Hany M. Harb and AbdelH.Emara, IJCSIT Journal, Vol 5, No 2, April 2013, PP. 73-85 DOI : 10.5121/ijcsit.2013.5207 |
Fuzzy multi-objective approach for the improvement of distribution network efficiency by considering DG
Ramadoni Syahputra, IJCSIT Journal, Vol 4, No 21, April 2012, PP. 57-68 DOI : 10.5121/ijcsit.2012.4205 |
Enhancement of images using morphological transformation
K.Sreedhar and B.Panlal, IJCSIT Journal, Vol 4, No 1, Feb 2012, PP. 33-50 DOI : 10.5121/ijcsit.2012.4103 |
A Qualitative Study of LP-ITS: Linear Programming Intelligent Tutoring System Samy S. Abu Naser, IJCSIT Journal, Vol 4, No 1, Feb 2012, PP. 209-220 DOI : 10.5121/ijcsit.2012.4116 |
Biometric authentication through a virtual keyboard for smartphones
Matthias Trojahn and Frank Ortmeier, IJCSIT Journal, Vol 4, No 5, October 2012, PP. 01-12 DOI : 10.5121/ijcsit.2012.4501 |
Cost breakdown of public cloud computing and private cloud computing and security issues
Swarnpreet Singh and Tarun Jangwa, IJCSIT Journal, Vol 4, No 2, April 2012, PP. 17- 31 DOI : 10.5121/ijcsit.2012.4202 |
Embedded controller for vehicle In-Front obstacle detection and cabin safety alert system
V.Ramya, B. Palaniappan, K. Karthick, IJCSIT Journal, Vol 4, No 2, April 2012, PP.117-131 DOI : 10.5121/ijcsit.2012.4210 |
Training a feed-forward neural network with artificial bee colony based backpropagation method
Sudarshan Nandy, Partha Pratim Sarkar and Achintya Das, IJCSIT Journal, Vol 4, No 4, August 2012, PP. 33-46 DOI : 10.5121/ijcsit.2012.4404 |
Evaluation of information retrieval systems
Keneilwe Zuva and Tranos Zuva, IJCSIT Journal, Vol 4, No 3, June 2012, PP. 35-43 DOI : 10.5121/ijcsit.2012.4304 |
A neuro-fuzzy inference model for breast cancer recognition
Bekaddour Fatima and Chikh Mohammed Amine, IJCSIT Journal, Vol 4, No 5, October 2012, PP. 163-173 DOI : 10.5121/ijcsit.2012.4513 |
An Approach for agile SOA development using agile principals
Majlesi Shahrbanoo, Mehrpour Ali and Mohsenzadeh Mehran, IJCSIT Journal, Vol 4, No 1, Feb 2012, PP. 237-244 DOI : 10.5121/ijcsit.2012.4118 |
IRIS Recognition Based On LBP and Combined LVQ Classifier
M. Z. Rashad, M. Y. Shams, O. Nomir and R. M. El-Awady IJCSIT Journal, Vol 3, No 5, October 2011, PP. 67-78 DOI : 10.5121/ijcsit.2011.3506 |
Common Phases of Computer Forensics Investigation Models
Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 17 - 31 DOI : 10.5121/ijcsit.2011.3302 |
Plants Images Classification Based on Textural Features using Combined Classifier
M. Z. Rashad,B.S.el-Desouky,Manal and S .Khawasik, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 93 - 100 DOI : 10.5121/ijcsit.2011.3407 |
Php Framework for Database Management Based on Mvc Pattern
Chanchai Supaartagorn, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 251 - 258 DOI : 10.5121/ijcsit.2011.3219 |
Wavelet Based Spectrum Sensing Techniques for Cognitive Radio - A Survey
Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 123 - 137 DOI : 10.5121/ijcsit.2011.3209 |
Research Review for Digital Image Segmentation Techniques
Ashraf A. Aly,Safaai Bin Deris and Nazar Zaki, IJCSIT Journal, Vol 3, No 5, Oct 2011, PP. 99-106 DOI : 10.5121/ijcsit.2011.3509 |
Machine Learning Methods for Spam E-Mail Classification
W.A. Awad and S.M. ELseuofi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 174-184 |
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network
Al Mutaz M. Abdalla, Safaai Dress and Nazar Zaki, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 176,186 DOI : 10.5121/ijcsit.2011.3312 |
Performance Analysis of Various Data Mining Classification Techniques on Healthcare Data
Shelly Gupta,Dharminder Kumar and Anand Sharma, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 155-169 DOI : 10.5121/ijcsit.2011.3413 |
Focused Web Crawling Using Decay Concept and Genetic Programming
Mahdi Bazarganigilani, Ali Syed and Sandid Burki Vol.1, No.1, January 2011, PP. 1-12 |
Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network
J.Pradeep,E.Srinivasan and S.Himavathi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 27-38 DOI : 10.5121/ijcsit.2011.3103 |
A Comparative Experiment of Several Shape Methods in Recognizing Plants
A. Kadir,L.E.NugrohoA.Susanto and P.I.Santosa, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 256-263 DOI : 10.5121/ijcsit.2011.3318 |
Ubiquitous Mobile Health Monitoring System for Elderly (Umhmse)
Abderrahim Bourouis,Mohamed Feham and Abdelhamid Bouchachia, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 74-82 DOI : 10.5121/ijcsit.2011.3306 |
Information Security Plan for Flight Simulator Applications
Jason Slaughter,Syed (Shawon) and M. Rahman, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 1-15 DOI : 10.5121/ijcsit.2011.3301 |
Improving the Character Recognition Efficiency of Feed Forward Bp Neural Network
Amit Choudhary and Rahul Rishi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 85-96 DOI : 10.5121/ijcsit.2011.3107 |
Hybrid GPS-GSM Localization of Automobile Tracking System
Mohammad A. Al-Khedher, IJCSIT Journal, Vol 3, No 6, Dec 2011, PP. 75-85 DOI : 10.5121/ijcsit.2011.3606 |
Dna Lossless Differential Compression Algorithm Based on Similarity of Genomic Sequence Database
Heba Afify,Muhammad Islam and Manal Abdel Wahed, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 145-154 DOI : 10.5121/ijcsit.2011.3412 |
An Efficient Gait Recognition System for Human Identification using Modified ICA
M.Pushpa Rani and G.Arumugam, IJCSIT Journal, Vol 2,no 1,february 2010, PP. 55 - 67 |
Human Facial Experssion Detection from Detected in Captured Image using Back Propagation Neural Network
Jagdish Lal Raheja and Umesh Kumar, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 116 - 123 |
A Mobility - Based Checkpointing Protocol for Mobile Computing System
Suparna Biswas and Sarmistha Neogy, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 135 - 151 |
A New Dct-Based Watermarking Method For Copyright Protection Of Digital Audio
Pranab Kumar Dhar,Mohammad Ibrahim Khan and Saif Ahmad, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 91 - 101 DOI : 10.5121/ijcsit.2010.2507 |
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy
S.Veeramalai,N.Jaisankar and A.Kannan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 60 - 74 DOI : 10.5121/ijcsit.2010.2406 |
Performance Evaluation of Routing Protocols in Wireless Sensor Networks
Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 64 - 73 DOI : 10.5121/ijcsit.2010.2206 |
Agent based trust management framework in distributed E-Business environment
E.Sathiyamoorthy,N.Ch.Sriman Narayana Iyenger and V.Ramachandran, IJCSIT Journal, vol 2, no 2, feb 2010, PP. 14 - 28 |
Use of Smart Antennas in Ad Hoc Networks
Mohammed Ali Hussain,P.Suresh Varma,K. Satya Rajesh,Hussain Basha Pathan and Leela Madhav Sarraju, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 47 - 54 DOI : 10.5121/ijcsit.2010.2605 |
An Optimized Distributed Association Rule Mining Algorithm In Parallel and Distributed Data Mining With Xml Data for Improved Response Time
Sujni Paul, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 88 - 101 DOI : 10.5121/ijcsit.2010.2208 |
Performance Analysis of Multimedia Compression Algorithms
Eman Abdelfattah and Asif Mohiuddin, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 1-10 DOI : 10.5121/ijcsit.2010.2501 |
A Survey of Qos Routing Protocols for Mobile Ad Hoc Networks
G. Santhi and Alamelu Nachiappan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 125-136 DOI : 10.5121/ijcsit.2010.2411 |
Some Observations on Open Source Software Development on Software Engineering Perspectives
Vinay Tiwari, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 113-125 DOI : 10.5121/ijcsit.2010.2611
M-Learning: A New Paradigm of Learning Mathematics in Malaysia
Saipunidzam Mahamad,Mohammad Noor Ibrahim and Shakirah Mohd Taib, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 76-86 DOI : 10.5121/ijcsit.2010.2407
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm
Sandeep Singh Rawat and Lakshmi Rajamani, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 28-37 DOI : 10.5121/ijcsit.2010.2403 |
Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms
Rahmat Widia Sembiring,Jasni Mohamad Zain and Abdullah Embong, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 162-170 DOI : 10.5121/ijcsit.2010.2414 |
An Applied Study On Educational Use Of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication
Murat Kayri and Ozlem Cakır, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 48,58 DOI : 10.5121/ijcsit.2010.2405 |
Low Power Shift and Add Multiplier Design
C.N.Marimuthu,P.Thangaraj and Aswathy Ramesan, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 12,22 DOI : 10.5121/ijcsit.2010.2302 |
Mining Target-Oriented Sequential Patterns With Time-Intervals
Hao-En Chueh, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 113-123 DOI : 10.5121/ijcsit.2010.2410 |
Implementing Evaluation a Wireless body sensor system for automated physiological data acquition at home
Chao Chen and Carlos Pomalaza-Raez, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 24-38 DOI : 10.5121/ijcsit.2010.2303 |
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Md.Headayetullah and G.K.Pradhan, IJCSIT Journal, Volume 2, Number 3, June 2010 , PP. 72-91 DOI : 10.5121/ijcsit.2010.2306 | | |
Thesaurus and Query Expansion
Hazra Imran and Aditi Sharan, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 89 - 97 |
Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach
A.Revathi,R.Ganapathy and Y.Venkataramani, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 30 - 42 |
Analysis On Deployment Cost And Network Performance for Heterogeneous Wireless Sensor Networks
Dilip Kumar,Trilok.C Aseri and R.B Patel, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 109 - 120 |
Ensemble Design for Intrusion Detection Systems
T. Subbulakshmi,A. Ramamoorthi and S.Mercy Shalinie, IJCSIT Journal, Vol 1, No 1, August 2009, PP. 1-9 |