首页
OALib 期刊
OALib 预印
快速投稿通道
排名
新闻
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Computer Science and Information Security
ISSN Print: 1947-5500
ISSN Online:
主页:
http://sites.google.com/site/ijcsis/
分享:
Go
Student Modeling using Case-Based Reasoning in Conventional Learning System
Indriana Hidayah
,
Alvi Syahrina
,
Adhistya Erna Permanasari
V-Diagnostic: A Data Mining System For Human Immuno- Deficiency Virus Diagnosis
Omowunmi O. Adeyemo
,
Adenike O. Osofisan
Mapping Relational Database into OWL Structure with Data Semantic Preservation
Noreddine GHERABI
,
Khaoula ADDAKIRI
,
Mohamed BAHAJ
Fingerprint Feature Extraction and Identification using Direction Oriented Matrix with Color Band
T. Vidhya
,
T. K. Thivakaran
Information Security on The Communication Network In Nigeria Based On Digital Signature
O. S. Adebayo
,
V. O. Waziri
,
J.A Ojeniyi
,
S. A. Bashir
Frankenstein’s other Monster: Toward a Philosophy of Information Security
Paul D. Nugent
,
Amjad Ali
Phases vs. Levels using Decision Trees for Intrusion Detection Systems
Heba Ezzat Ibrahim
,
Sherif M. Badr
,
Mohamed A. Shaheen
Comprehensive Analysis of π Base Exponential Functions as a Window
Mahdi Nouri
,
Sepideh Lahooti
,
Sepideh Vatanpour
,
Negar Besharatmehr
Analysis & Selection of Requirements Elicitation Techniques for OSSD
Munazza Ishtiaq
,
Fareeha Choudhry
,
Fahim Ashraf Awan
,
Aasia Khanum
STX Scheme for Reducing Latency with Centralized Matching Algorithms
G. Ramesh Kumar
,
S. Tharani
Analysis of Stock Marketing with SOAP service using Python
P. Asha
,
T. Jebarajan
,
Kathiresan
Implementation of Dynamic Time Warping for Video Indexing
S. Prasanna
,
S. Purushothaman
,
A. Jothi
Adaptive MIMO-OFDM Scheme with Reduced Computational Complexity and Improved Capacity
L. C. Siddanna Gowd
,
A. R. Rajini
,
A. R. Rajini
Even Harmonious Graphs with Applications
P.B. Sarasija
,
R. Binthiya
Facial Tracking Using Radial Basis Function
P. Mayilvahanan
,
S. Purushothaman
,
A. Jothi
Performance Comparison of TCP Variants in Mobile Ad- Hoc Networks
Mandakini Tayade
,
Sanjeev Sharma
A Multi-criteria Decision Model For EOL Computers in Reverse Logistics
K.ArunVasantha Geethan
,
S.Jose
,
R.Devisree
,
S.Godwin Barnabas
Highly Dynamic Nature of Mobile AD-HOC Networks (MANETs): Requirement of Stringent Security Measures
P. Balagangadhar Rao
Secure Communication with Flipping Substitute Permutation Algorithm for Electronic Copy right Management System
C. Parthasarathy
,
G. Ramesh Kumar
,
S. K. Srivatsa
Email Authorship Identification Using Radial Basis Function
A. Pandian
,
Md. Abdul Karim Sadiq
Analysis and Comparison of Medical Image Fusion Techniques: Wavelet based Transform and Contourlet based Transform
C G Ravichandran
,
R. Rubesh Selvakumar
,
S. Goutham
PAPR Reduction of OFDM Signal Using Error Correcting Code and Selective Mapping
Anshu
,
Himanshu Sharma
Image Processing: The Comparison of the Edge Detection Algorithms for Images in Matlab
Ehsan Azimirad
,
Javad Haddadnia
Information Agents in Database Systems as a New Paradigm for Software Developing Process
Eva Cipi
,
Betim Cico
An Empirical Comparison of Boosting and Bagging Algorithms
R. Kalaichelvi Chandrahasan
,
Angeline Christobel Y
,
Usha Rani Sridhar
,
Arockiam L
A Framework for Identifying Software Vulnerabilities within SDLC Phases
Zeinab Moghbel
,
Nasser Modiri
Detection and Tracking of objects in Analysing of Hyper spectral High-Resolution Imagery and Hyper spectral Video Compression
T. Arumuga Maria Devi
,
Nallaperumal Krishnan
,
K.K Sherin
,
Mariadas Ronnie C.P
Performance Evaluation of TCP over Mobile Ad-hoc Networks
Foez Ahmed
,
Sateesh Kumar Pradhan
,
,
Nayeema Islam
,
,
Sumon Kumar Debnath
Multicast Routing and Wavelength Assignment for Capacity Improvement in Wavelength Division Multiplexing Networks
N. Kaliammal
,
G. Gurusamy
SAR Image Segmentation using Vector Quantization Technique on Entropy Images
Dr. H. B. Kekre
,
Saylee Gharge
,
,
Tanuja K. Sarode
Hybrid Fingerprint Image compression and Decompression Technique
R.Seshadri
,
Yaswanth Kumar.Avulapti
,
M.Usha Rani
The Impact of Speed on the Performance of Dynamic Source Routing in Mobile Ad-Hoc Networks
Naseer Ali Husieen
,
Osman B Ghazali
,
Suhaidi Hassan
,
Mohammed M. Kadhum
Simulation of Grover’s Algorithm Quantum Search in a Classical Computer
A.B. Mutiara
,
R. Refianti
Effective Packet Management Scheme in Wireless Ad-Hoc Networks using Distributed Spanning Tree
J. Amudhavel
,
M.S.Saleem Basha
,
T. Vengattaraman
,
P. Dhavachelvan
Off-line Handwritten Signature Recognition Using Wavelet Neural Network
Mayada Tarek
,
Taher Hamza
,
Elsayed Radwan
Ultra Fast Computing Using Photonic Crystal Based Logic Gates
X. Susan Christina
,
A. P. Kapilan
,
P. Elizabeth Caroline
EFRRA: An Efficient Fault-Resilient-Replica-Algorithm for Content Distribution Networks
Amutharaj. J
,
Radhakrishnan. S.
Analytical Comparison of Fairness Principles for Resource Sharing in Packet-Based Communication Networks
Yaser Miaji
,
Suhaidi Hassan
FP-tree and COFI Based Approach for Mining of Multiple Level Association Rules in Large Databases
Virendra Kumar Shrivastava
,
Dr. Parveen Kumar
,
Dr. K. R. Pardasani
Secure Framework for Mobile Devices to Access Grid Infrastructure
Kashif Munir
,
Lawan Ahmad Mohammad
A Framework for Validation of Object-Oriented Design Metrics
Devpriya Soni
,
Ritu Shrivastava
,
M. Kumar
Genealogical Information Search by Using Parent Bidirectional Breadth Algorithm and Rule Based Relationship
Sumitra Nuanmeesri
,
Chanasak Baitiang
,
,
Phayung Meesad
A Wide-range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns
Arash Habibi Lashkari
,
Dr. Rosli Saleh
,
Samaneh Farmand
,
Dr. Omar Bin Zakaria
An Efficient Inter Carrier Interference Cancellation Schemes for OFDM Systems
B. Sathish Kumar
,
K. R. Shankar Kumar
,
R. Radhakrishnan
An Extension for Combination of Duty Constraints in Role-Based Access Control
Ali Hosseini
,
,
Mohammad Abdollahi Azgomi
High-Precision Half-Wave Rectifier Circuit In Dual Phase Output Mode
Theerayut Jamjaem
,
Bancha Burapattanasiri
A New Method to Extract Dorsal Hand Vein Pattern using Quadratic Inference Function
Maleika Heenaye- Mamode Khan
,
Naushad Ali Mamode Khan
Web-Based Expert System for Civil Service Regulations: RCSES
Mofreh Hogo
,
Khaled Fouad
,
Fouad Mousa
Architecture of Network Management Tools for Heterogeneous System
Rosilah Hassan
,
Rozilawati Razali
,
Shima Mohseni
,
Ola Mohamad
Call Admission Control performance model for Beyond 3G Wireless Networks
Ramesh Babu H.S
,
Gowrishankar
,
Satyanarayana P.S
Go