default search action
Journal of Computer Science, Volume 11
Volume 11, Number 1, 2015
- Rony Baskoro Lukito, Cahya Lukito, Deddy Arifin:
Implementation Techniques of Search Engine Optimization in Marketing Strategies Through the Internet. 1-6 - K. Ratna Babu, K. V. N. Sunitha:
Enhancing Digital Images Through Cuckoo Search Algorithm in Combination with Morphological Operation. 7-17 - Yenny Sylvia, Djunaidy Santoso:
Transformation Box-Cox for Stabilisation of Diversity in Group Random Design. 18-29 - S. Vanaja, K. Rameshkumar:
Performance Analysis of Classification Algorithms on Medical Diagnoses-a Survey. 30-52 - Shanthini Pandiaraj, K. R. Shankar Kumar:
Speaker Identification Using Discrete Wavelet Transform. 53-56 - A. Rajamani, V. Krishnaveni:
An Efficient Denoising Algorithm for Impulse Noise Removal. 57-63 - Naya Nagy, Marius Nagy, Selim G. Akl:
Carving Secret Messages out of Public Information. 64-70 - A. Lekha, C. V. Srikrishna, Viji Vinod:
Fuzzy Association Rule Mining. 71-74 - Es-Said Chanigui, Abdelmalek Azizi:
A Modified Secure Scheme of Quantum Key Distribution Without Public Announcement Bases. 75-81 - S. Thayammal, D. Selvathi:
Edge Preserved Image Compression using Extended Shearlet transform. 82-88 - Mohsen Kakavand, Norwati Mustapha, Aida Mustapha, Mohd Taufik Abdullah, Hamed Riahi:
A Survey of Anomaly Detection Using Data Mining Methods for Hypertext Transfer Protocol Web Services. 89-97 - Manar AbuTalib, Muhammed AbuOdeh, Adhraa Almansoori, Arwa AlNauimi:
Enhancing Social Science Research in the UAE: An Open Source Software Solution University of Sharjah (UOS) Case Study. 98-108 - Abdulkareem Al-Alwani:
Improving Email Response in an Email Management System Using Natural Language Processing Based Probabilistic Methods. 109-119 - P. Jaganathan, T. Karthikeyan:
Highly Efficient Architecture for Scalable Focused Crawling Using Incremental Parallel Web Crawler. 120-126 - Amy Chiang, Simon X. Liao:
Image Analysis with Legendre Moment Descriptors. 127-136 - B. Booba, T. V. Gopal:
Efficient Scheduling of Packets in Wireless Sensor Networks Using Priority Based Scheduling Approach. 137-144 - Manar AbuTalib, Ashraf Elnagar:
A New Computer Science Student Recruitment Strategy University Of Sharjah (UOS) Case Study. 145-152 - C. Malathy, M. A. K. Sadiq, K. Annapurani:
An Innovative Approach for Person Identification by Detection and Extraction of Optic Disc from Retina and Concha from Ear. 153-165 - I. Joe Louis Paul, S. Radha, J. Raja:
Performance Analysis of Joint Degree Distribution (JDD) in Luby Transform Codes. 166-177 - Bareq Shaalan, Ravie Chandren Muniyandi:
Implementing Mitogen Activated Protein Kinases Cascade on Membrane Computing Using P-Lingua. 178-187 - J. S. Kanchana, S. Sujatha:
Recommendation Engine Formation Using Depth First Search and Genetic Approach. 188-194 - Saleheh Heidari, Muhamad Taufik Abdullah, Lili Nurliyana Abdullah:
A Novel Four-Directional Thresholding Approach for Lung Computed-Tomography Images by Using Similarity-Based Segmentation Technique. 195-203 - Mohd Kamir Yusof, Md. Yazid Mohd. Saman, Wan Nor Shuhadah Wan Nik:
Comparative of Mediator Approach for Database Integration. 204-217 - P. Kavitha Rani, E. Kannan:
Straight Line Routing on Next Hop Graph in Wireless Sensor Networks. 218-223 - R. Vijayalakshmi, V. Vasudevan:
Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid. 224-229 - Anas A. Abboud, Rahmita Wirza O. K. Rahmat, Suhaini B. Kadiman, Mohd Zamrin Dimon, Lili Nurliyana Abdullah, M. Iqbal Saripan, Hasan H. Khaleel:
Automatic Detection of the End-Diastolic and End-Systolic from 4D Echocardiographic Images. 230-240 - Naragain Phumchusri, Yanipa Chinsuwan:
Decision Support System for Open Vehicle Routing With Transhipments and Stopovers. 241-253 - P. Deivendran, E. R. Naganathan:
Scalability Services in Cloud Computing Using Eyeos. 254-261 - E. Dhiravidachelvi, V. Rajamani:
A Novel Approach for Diagnosing Diabetic Retinopathy in Fundus Images. 262-269 - Djunaidy Santoso:
The Benefits of Bezier, B-Spline Algorithm in the Industry World. 270-273
Volume 11, Number 2, 2015
- Alaa M. Elsayad, Mahmoud Fakhr:
Diagnosis of Cardiovascular Diseases with Bayesian Classifiers. 274-282 - R. Velayutham, D. Manimegalai:
CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA. 283-290 - M. Rajaram, J. Vijaya:
A Defense Mechanism for Differential Power Analysis Attack in AES. 291-296 - Larisa G. Gagarina, D. N. Kavtaradze, A. A. Mordovin, Evgeni M. Portnov, V. V. Slyusar, Kyaw Zaw Ye:
Modeling of a Dynamic Interaction of Motor Transport and Natural Systems in Order to Minimize the Risks of Project and Management Decisions. 297-303 - K. S. Selvanayaki, R. M. Somasundaram:
Hybrid Approach for Detection and Recognition of Vehicles. 304-314 - K. Thamizhchelvy, G. Geetha:
An Efficient Image Generation Algorithm Using Fractals and Chaos Theory. 315-324 - Ahmad Alqurneh, Aida Mustapha:
The Impact of Oath Writing Style on Stylometric Features and Machine Learning Classifiers. 325-329 - Nor Amalina Mohd Sabri, Abd. Samad Hasan Basari, Burairah Hussin, Khyrina Airin Fariza Abu Samah:
The Utilisation of Dijkstra's Algorithm to Assist Evacuation Route in Higher and Close Building. 330-336 - S. Sumalatha, G. Sreenivasulu, G. Uday Kiran Bhargava:
Multicast Node Communication Using Virtual Queue with Process Scheduling. 337-343 - M. Sayee Kumar, T. Purusothaman:
Hybrid Broadcast Group Management Protocol for Secure, Scalable and Efficient Group Communication. 344-350 - Nur Azman Abu, Ferda Ernawan, Fadzilah Salim:
Smooth Formant Peak Via Discrete Tchebichef Transform. 351-360 - M. Uma Devi, G. Meera Gandhi:
Wordnet and Ontology Based Query Expansion for Semantic Information Retrieval in Sports Domain. 361-371 - J. Vellingiri, S. Kaliraj, S. Satheeshkumar, T. Parthiban:
A Novel Approach for User Navigation Pattern Discovery and Analysis for Web Usage Mining. 372-382 - Thabit Sultan Mohammed, Laith Al-Jobouri:
A Comparative Study of Construction Techniques of t-Error Correction/All Unidirectional Error Detection Codes. 383-390 - S. Gopalakrishnan, P. Ganeshkumar:
Secure and Efficient Transmission in Mobile Ad hoc Network to Identify the Fake ID's Using Fake ID Detection Protocol. 391-399 - Joseph Gladwin Sekar, Salivahanan Sankarappan:
Enhanced Channel Estimation and Performance Analysis Using H-Infinity Filter for MIMO-Orthogonal Frequency Division Multiplexing Systems. 400-405 - Mohd Fadzli Marhusin, Muhammad Firdaus Zul Kafli, Rossilawati Sulaiman, Shaharudin Ismail, Zul Hilmi Abdullah:
A Framework for a Multi-Layered Security of an Automated Programming Code Assessment Tool. 406-415 - G. Nantha Kumar, A. Arokiasamy:
An Efficient Combined Call Admission Control and Scheduling Algorithm to Improve Quality of Service for Multimedia Services Over Next Generation Wireless Networks. 416-425 - Vitor Chaves de Oliveira, Gunnar Bedicks Junior, Cristiano Akamine:
Methodology to Asses Internet Protocol Connection Availability: A Prerequisite For Feasible Video Stream Through Content Delivery Networks. 426-437 - D. Ayyamuthukumar, S. Karthik:
Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks. 438-442 - J. Jeyachidra, M. Punithavalli:
A Novel Distinguishability Based Weighted Feature Selection Algorithms for Improved Classification of Gene Microarray Dataset. 443-452
Volume 11, Number 3, 2015
- Athraa Jasim Mohammed, Yuhanis Yusof, Husniza Binti Husni:
Document Clustering Based on Firefly Algorithm. 453-465 - Radhwan M. Abduallah, Zuriati Zukarnain, Farzaneh Masoumiyan, Azizol Abdullah:
Mobility and Handover Technique in Heterogeneous Wireless Networks. 466-473 - Simanta Kumar Nayak, Bikram Kesari Ratha, Payodhar Padhi, Santosh K. Nanda, Aparajeya Panda:
Investigation of Quantitative Plant Activity Relationship (QPAR) for Diabetics II Using Genetic Algorithm. 474-478 - Mani Arora, Derick Engles, Sandeep Sharma:
MDS Algorithm for Encryption. 479-483 - Basel Alshaikhdeeb, Kamsuriah Ahmad:
Integrating Correlation Clustering and Agglomerative Hierarchical Clustering for Holistic Schema Matching. 484-489 - Gothai Ekambaram, Balasubramanie Palanisamy:
A Modified Key Partitioning for BigData Using MapReduce in Hadoop. 490-497 - Suhad A. Yousif, Venus Wazeer Samawi, Islam Elkabani, Rached N. Zantout:
Enhancement of Arabic Text Classification Using Semantic Relations of Arabic WordNet. 498-509 - Abbas M. Ali, Shareef Maulod Shareef:
Spatial Representation to Support Visual Impaired People. 510-516 - Muhammad Asif Khan, Varun Jeoti:
On the Enlargement of Robust Region of Chaotic Tent Map for the Use in Key Based Substitution-Box (S-Box). 517-525 - Gayathri A., P. Narayanasamy:
Security in MANET's by Using Detective Signature Techniques. 526-533 - T. R. Vedhavathy, M. S. K. Manikandan:
A Novel Unique Node Based Clustering and Location-Key Pair Based Security for Wireless Networks. 534-539 - Fadi Herzallah, Muriati Mukhtar:
Organization Information Ecology and E-Commerce Adoption: Effect on Organizational SMEs Performance. 540-551 - Maurizio Palesi, Davide Patti, Giuseppe Ascia, Daniela Panno, Vincenzo Catania:
Coupling Routing Algorithm and Data Encoding for Low Power Networks on Chip. 552-566 - Dennise Adrianto, Violitta Yesmaya, Alvin Chandra:
Increasing Learning Frequency through Education Based Game. 567-572 - Ibrahim Mohamed, Mohammad Syuhaimi Ab-Rahman:
Analytical Analysis of In-Band Crosstalk, Out-of-Band Crosstalk and GVD-Based Power Penalties in DWDM and TDM/DWDM-PONS. 573-589 - Hala Albaroodi, Selvakumar Manickam, Mohammed Anbar:
A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift). 590-597
Volume 11, Number 4, 2015
- Sérgio Bimbi Junior, Vitor Chaves de Oliveira, Gunnar Bedicks Junior:
Software Defined Radio Implementation of a QPSK Modulator/Demodulator in an Extensive Hardware Platform Based on FPGAs Xilinx ZYNQ. 598-611 - Chansiri Singhtaun, Suriya Natsupakpong:
Applications of Parallel Computing for Facility Location-Transportation Problems for Disaster Response. 612-620 - Kelton de Souza Santiago, Anderson da Silva Soares, Telma Woerle de Lima, Clarimar José Coelho, Paulo Henrique Ribeiro Gabriel:
Genetic Algorithm for Variable and Samples Selection in Multivariate Calibration Problems. 621-626 - Mohammed M. Abu Shquier, Khaled M. Alhawiti:
Novel Prefix Tri-Literal Word Analyser: Rule-Based Approach. 627-638 - Ahmed Al-Saffar, Nazlia Omar:
Integrating a Lexicon Based Approach and K Nearest Neighbour for Malay Sentiment Analysis. 639-644 - Abu Bakar Marini, Surya Ismail, Sufian Bin Idris, Zarina Shukur:
seMeja API Design Based on CRUD+N Concept. 645-661 - Marcos V. O. de Assis, Mario Lemes Proença Jr.:
Scorpius: sFlow Network Anomaly Simulator. 662-674 - Anmar Abuhamdah:
Adaptive Acceptance Criterion (AAC) Algorithm for Optimization Problems. 675-691 - Jitendra Nath Singh, Sanjay K. Dwivedi:
Performance Evaluation of Search Engines Using Enhanced Vector Space Model. 692-698 - Inácio Yano, Vitor Chaves de Oliveira, Mauricio Becker, Andreiwid Sheffer Corrêa:
Applying a Hybrid Polling Approach by Software Implementation to Extend the Lifetime of a Wireless Sensor Network. 699-706
Volume 11, Number 5, 2015
- Ali Ahmad Milad, Zul Azri Bin Muhamad Noh, Abdul Samad Shibghatullah, Mustafa Almahdi Algaet, Aouache Mustapha:
Design a New Bidirectional Transmission Protocol to Improve the Performance of MAC Layer Based on Very High Speed WLANs. 707-722 - Mohamad Afendee Mohamed, Abdullah Muhammed, Mustafa Man:
A Secure Chat Application Based on Pure Peer-to-Peer Architecture. 723-729 - Filipe Hiluy Lima, Henrique Mariano Costa do Amaral, Denílson Moreira Santos:
Corporate Network Analysis with IPTV Traffic Insertion. 730-737 - Hussam Saad Adeen, Ayman Atia, Ahmad Amin, Andrew Victor, Abdelrahman Essam, Ehab Gharib, Mohamed Hussien:
RemoAct: Portable Projected Interface with Hand Gesture Interaction. 738-749 - Hazalina Hashim, Shahrul Azman Mohd. Noah:
Development of Domain Ontology for a Semantic Online Forum. 750-763 - Abdullatif Abolohom, Nazlia Omar:
A Hybrid Approach to Pronominal Anaphora Resolution in Arabic. 764-771 - Ahsan Abdullah, Sohayp Abo Alshamat, Ahmad Bakhashwain, Muhammad Ahtisham Aslam:
Automatic Text Removal and Replacement in Scanned Meteorological Thematic Maps. 772-783
Volume 11, Number 6, 2015
- Mohammed Nazeh Abdul Wahid, Azizol Abdullah:
Detecting an Anomaly Behavior through Enhancing the Mechanism of Packet Filtering. 784-793 - Douglas Hiura Longo, Beatriz Wilges, Patricia Vilain, Renato Cislaghi:
Fixture Setup through Object Notation for Implicit Test Fixtures. 794-803 - Saleh Atiewi, Salman Yussof, Mohd Ezanee:
A Comparative Analysis of Task Scheduling Algorithms of Virtual Machines in Cloud Environment. 804-812 - Jayasri Kotti, Seetha Ramaiah Panchumarthy:
A GQM Based Approach towards the Development of Metrics for Software Safety. 813-820 - Abdullah Soliman Alshra'a, Venus Wazeer Samawi:
Load Balancing Technique Based on Broadcasting and Residual Energy Using Adaptive Clustering Hierarchy Protocol (LBEACH). 821-838
Volume 11, Number 7, 2015
- Cheong Hee Park:
Prototype-Based Sample Selection for Active Hashing. 839-844 - Olalekan Bello, Hushairi Zen, Al-Khalid Othman, Khairuddin Abdul Hamid:
Utility-based Scheduling Frameworks for Efficient Quality-of-Service Differentiation in a Mixture of Real-time and Non-real-time Traffics. 845-854 - Parminder Singh Bawa, Selvakumar Manickam:
Critical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques. 855-862 - J. Chandra, M. Nachamai, Anitha S. Pillai:
Correlation Based ADALINE Neural Network for Commodity Trading. 863-871 - Mohammad Ehab Ragab:
Extended Kalman Filter versus Newton-Lowe's Method for Robot Pose Estimation. 872-879
Volume 11, Number 8, 2015
- Inderdeep Kaur Aulakh, Renu Vig:
Secondary User Sensing Time Optimization in Sensing-Transmission Scheduling for Dynamic Spectrum Access in Cognitive Radio. 880-891 - Taisir Eldos, Waleed Nazih, Aws Kanan:
Maximally Distant Codes Allocation Using Chemical Reaction Optimization and Ant Colony Optimization Algorithms. 892-901 - Shafique Ahmad Chaudhry:
On the Need of Source Address for Route-Error Delivery in 6LoWPAN. 902-914 - Andreas Zendler, Dieter Klaudt:
Instructional Methods to Computer Science Education as Investigated by Computer Science Teachers. 915-927 - Pallab Dutta, Mahesh Kumar, B. Sridharan, Vipin Tyagi:
Efficacy of Numeric Keypad for Computer Illiterates in Rural ICT. 928-935
Volume 11, Number 9, 2015
- Karam Dhafer Mayoof, Rosilah Hassan, Amjed Sid Ahmed, Ahmed Marwan:
Performance Evaluation of Handover in WiMax with TCP and UDP as Underlying Protocol. 936-942 - Buchanagandi Enock Nyamajeje, Huiqun Yu:
Reducing Network Bandwidth Cost on End User Resources Consumption in Cloud Environment. 943-956 - Samaneh Mazaheri, Rahmita Wirza, Puteri Suhaiza Sulaiman, Mohd Zamrin Dimon, Fatimah Khalid, Rohollah Moosavi Tayebi:
Segmentation Methods of Echocardiography Images for Left Ventricle Boundary Detection. 957-970 - Ammar Ali Neamah:
New Collisions to Improve Pollard's Rho Method of Solving the Discrete Logarithm Problem on Elliptic Curves. 971-975 - Andréia Alves dos Santos Schwaab, Silvia Modesto Nassar, Paulo José de Freitas Filho:
Automatic Methods for Generation of Type-1 and Interval Type-2 Fuzzy Membership Functions. 976-987
Volume 11, Number 10, 2015
- Alexander A. Galushkin:
Education in the Field of National Information Security in the Russian Federation and Abroad. 988-994 - Seitim Aiganym:
The Conceptual Principals of Bitcoin Crypto Currency. 995-999 - Thiripurasundari Sivakrishnakumar:
A Comprehensive Study on Mobility Issues in AODV. 1000-1004 - Achmad Rizal, Risanuri Hidayat, Hanung Adi Nugroho:
Signal Domain in Respiratory Sound Analysis: Methods, Application and Future Development. 1005-1016 - Hui-Hui Wang, Yin-Chai Wang, Soo-See Chai:
Towards Semantic User Query: A Review. 1017-1024
Volume 11, Number 11, 2015
- Siew Mooi Lim, Md Nasir Sulaiman, Norwati Mustapha, Abu Bakar Md Sultan:
Parameter Settings for New Generational Genetic Algorithms for Solving Global Optimization Problems. 1025-1031 - Manar AbuTalib:
Encouraging High School Student Interest in Computing Studies in GCC: UAE Case Study. 1032-1040 - Mohsen Kakavand, Norwati Mustapha, Aida Mustapha, Mohd Taufik Abdullah, Hamed Riahi:
Issues and Challenges in Anomaly Intrusion Detection for HTTP Web Services. 1041-1053 - Arif Muntasa:
The Human Facial Expression Classification Using the Center Kernel Subspace based the Ridge Regression. 1054-1059 - Er. Sumit Kaur, R. K. Bansal:
Chronological Advancement in Image Processing from Lime Stone Mofits to Superpixel Classification. 1060-1074
Volume 11, Number 12, 2015
- Inali Wisniewski Soares, Luciane Telinski Wiedermann Agner, Paulo Cézar Stadzisz, Jean Marcelo Simão:
Application of Platform Models in Model Driven Engineering of Embedded Software. 1075-1081 - Muhammad Arif Saifudin, Bib Paruhum Silalahi, Imas Sukaesih Sitanggang:
Star Catalog Generation for Satellite Attitude Navigation Using Density Based Clustering. 1082-1089 - Ahmad Yahya Dawod, Mohd Jan Nordin, Junaidi Abdullah:
Static Hand Gestures: Fingertips Detection Based on Segmented Images. 1090-1098 - Idawaty Ahmad, Mohamed Othman, Z. Ahmad Zulkarnain:
Enhanced Preemptive Global Utility Accrual Real Time Scheduling Algorithms in Multicore Environment. 1099-1107 - Daniel Strmecki, Andrija Bernik, Danijel Radosevic:
Gamification in E-Learning: Introducing Gamified Design Elements into E-Learning Systems. 1108-1117 - Edward David Moreno, Leila C. M. Buarque, Florêncio Natan, Gustavo Quirino, Ricardo J. P. de B. Salgueiro:
Impact of Asymmetric Encryption Algorithms in a VANET. 1118-1131
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.