Google Scholar Alerts

New Citation Alerts [IJCSIS]

This Google Scholar Alert is brought to you by Google.

R AOUAMI, R Mounir

Page 1. (IJCSIS) International Journal of Computer Science and Information Security,

Vol. 13, No. 11, November 2015 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Abstract—This paper presents a simple approximation ...

T Kokkonen - International Conference on Next Generation Wired/ …, 2016

... Inf. Secur. (IJCSIS) 13(1) (2015). 13. Blasch, E., Steinberg, A., Das, S., Llinas, J., Chong, C.,

Kessler, O., Waltz, E., White, F.: Revisiting the JDL model for information exploitation. In:

Proceedings of the 16th International Conference on Information Fusion (FUSION), Istanbul, pp. ...

A Al Sulaimani, E Kosba, Y El-Sonbaty

... Developing Agent Oriented Mobile Learning System. (IJCSIS) International Journal of Computer

Science and Information Security, Vol. ... Developing Agent Oriented Mobile Learning System.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. ...

H Pervaiz

Page 1. Journal of Innovative Research and Technology Volume 1 Issue 1. 10

Fingerprint Recognition Hina Pervaiz University of Management and Technology

14024050018@umt.edu,pk Abstract Fingerprint recognition is part ...

A Agnihitri, B Mishra

... [10] Bharadwaj BK and Pal S., (2011). “Data Mining: A prediction for performance improvement

using classification”, International Journal of Computer Science and Information Security

(IJCSIS),Vol. 9, No. 4, pp. 136-140. [11] Brabazon A., and Keenan P.. (2004). ...

AC Jose, R Malekian, N Ye - IEEE Access

Page 1. 2169-3536 (c) 2016 IEEE. Translations and content mining are permitted

for academic research only. Personal use is also permitted, but republication/

redistribution requires IEEE permission. See http://www.ieee.org ...

G Mandloi, A Raghuvanshi

... Lee, and Kyoung Mu Lee,“Reweighted Random Walks for Graph Matching”, Computer

Vision–ECCV 2010, 2010 – Springer [3] Priti Maheswary, Dr. Namita Srivastava, “Retrieval of

Remote Sensing Images Using Colour & Texture Attribute”,(IJCSIS) International Journal of ...

M Tariq, SW Akbar

Page 1. Journal of Innovative Research and Technology Volume 1 Issue 1. 1 Event

Ordering and FIFO Allocation of Resources in Distributed Systems Muhammad Tariq,

Syed Wasim Akbar University of Management and technology ...

K Zainal, MZ Jali - International Conference on Soft Computing in Data …, 2016

... Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 13(3), 66–74 (2015). http://​sites.​google.​com/​site/​

ijcsis/​. 30. Almeida, TA, María, J., Hidalgo, G., Silva, TP: Towards SMS spam filtering: results

under a new dataset. Int. J. Inf. Secur. Sci. 2(1), 1–18 (2012). 31. ...

J Amudha, SR Reddy, YS Reddy - The International Symposium on Intelligent …, 2016

... "Vision based game development using human computer interaction." International

Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp.

147-153, January 2010, USA [14] Wu, Junwen, and Mohan M. Trivedi. ...

MR Thakare, SW Mohod, AN Thakare

... [5] Oyelade, O. J, Oladipupo, O. O, Obagbuwa, I. C” Application of k- means Clustering

algorithm for prediction of Students Academic Performance” (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 7, 2010. ...

S Patel, M Shelke, A Rakhara, P Sharma, YK Jain

... Model" International Conference on Software and Computer Applications-IPCSIT vol.9 (2011)

[9] RAJU BARSKAR, ANJANA JAYANT DEEN"The Algorithm Analysis of E-Commerce Security

Issues for Online Payment Transaction System in Banking Technology"(IJCSIS)-Vol. ...

P Sharma

... 20-22, 2006 ICACT2006, ISBN 89- 5519-129-4. [5] Dr. G. Padmavathi, Mrs. D. Shanmugapriya,

“A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks”, (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 4, No. ...

S Sharma, K Sachdeva

... 5518. [21] Dr.SBThorat, SKNayak and Miss.Jyoti P Dandale, “Facial Recognition

Technology: An analysis with scope in India”, (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 8, No. 1, 2010. ...

L Choridah

... 3, pp. 176-186. [14] S. 'Uyun, S. Hartati, A. Harjoko & Subanar, Selection mammogram texture

descriptors based on statistics properties backpropagation structure, International Journal of

Computer Science and Information Security (IJCSIS), 2013, Vol. 11, No. 5, pp. ...

KA Naaz, I Rizvi, MM Kadam

Page 1. International Journal of Computer Applications (0975 – 8887) Volume 129 –

No.16, November2015 44 Performance Analysis on Different Images using Reversible

Data Hiding Technique and its Application Khan Amrin ...

MT CSE

... 19, no. 2, 2005. 4) Brijesh Kumar Bhardwaj, Saurabh Pal “Data Mining: A prediction

for performance improvement using classification” (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 9, No. ...

T Dodiya, S Jain

... vol. 2, Issue 2, May 2011. [2] MA Anusuya, S. K Katti, “Speech recognition by Machine –

A review”, (IJCSIS), International Journal of Computer Science and Information Security,

Vol.6, No.3, 2009, ISSN 1947-5500. [3] Samudravijaya ...

[PDF] Bi-orthogonal Wavelet Transform Based Video Watermarking Using Optimization Techniques

A Sake, R Tirumala - 2016

... Rep., University of California, CA, 1997. [7] Cox IJ, Miller, ML and Bloom JA, “Digital Watermarking”,

Morgan Kaufmann Publishers, USA, 2002 [8] Neeta Deshpande, Archana Rajurkar, R Manthalkar,

"Review of Robust Video Watermarking Algorithms", IJCSIS, Vol. 7 No. ...

IM Ahmed, MHM Baban

... Conference on Neural Networks. 4. Mahmod SM and Alnaish ZAH ,2015, Hybrid

Intrusion Detection System Using Artificial Bee Colony Algorithm and Multi-Layer

Perceptron, IJCSIS, , Pittsburgh PA, USA. 5. Daniel Graupe, 2007 ...

MM Saafan, MM Abdelsalam, MS Elksas, SF Saraya… - Chinese Journal of …, 2016

This paper introduces the mathematical model of ammonia and urea reactors and suggested

three methods for designing special propose controller. The first propos.

A Manjunath, TN Manjunath, KT Chandrashekar

... paper,Brazil. [16]. Ravindra S Hegadi, et.al Experimental Study Of Various Data

Masking Techniques with Random Replacement using data volume, IJCSIS ISSN

1947-5500,Vol. 9 No. 8, August 2011. (IC=5) [17]. Yogish HK ...

S Singh, D Remenyi

... 3. International Journal of Computer and Information Technology http://www.ijcit.com/index.php

4. International Journal of Computer Science and Information Security https://sites.google.com/

site/ijcsis/ 5. International Journal of Computer Science and Information Technologies ...

A Formal Approach to Designing Reliable Advisory Systems

LJW Martin, A Romanovsky - International Workshop on Software Engineering for …, 2016

... Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 3(1), 123–128 (2009). 5. Chu, SCW, Ng, HS,

Lam, KP: Intelligent trading advisor. In: Proceedings of the 2000 IEEE International

Conference on Management of Innovation Technology, pp. ...

A Hamdi, N Monmarché, M Slimane, AM Alimi

Page 1. Fuzzy rules for ant based clustering algorithm Amira Hamdi1,2, Nicolas Monmarché2,

Mohamed Slimane2 and Adel M. Alimi1 1REGIM-Lab.: REsearch Groups in Intelligent

Machines, University of Sfax, ENIS, BP 1173, Sfax, 3038, Tunisia ...

[PDF] The Rise of Smart Justice: on the Role of AI in the Future of Legal Logistics

N Netten, S van den Braak, S Choenni, F Leeuw - AI4J–Artificial Intelligence for …, 2016

... [4] MS Bargh, J. van Dijk & S. Choenni,“Dynamic data quality management using issue tracking

systems,” In the IADIS International Journal on Computer Science and Information Systems

(IJCSIS, ISSN: 1646-3692), ed. [5] Bower, JL, and CM Christensen. ...

Construction of a Jacobi matrix by given n eigenpairs

SAS Fazeli, SK Nejad, M Babaie - International Journal of Computer Science and …, 2016

... x x ,x ,…,x , x x ,x ,…,x , …, x x ,x ,…,x be 2n+1 real J = International Journal of Computer

Science and Information Security (IJCSIS), Vol. 14, No. 7, July 2016 775

https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. orthogonal ...

N Hasan, SECE Deptt, UTU Dehradun, SC Gupta… - International Journal of …, 2016

... Polarization Linear Table 1. Various dimensions of Patch antenna International Journal of

Computer Science and Information Security (IJCSIS), Vol. 14, No. 7, July 2016 153

https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. Fig.1 Microstrip Patch Antenna at ...

H El Ouarrak, M Rachik, M Mestari - International Journal of Computer Science and …, 2016

... function. The SOP is then solved by mapping the differential International Journal of

Computer Science and Information Security (IJCSIS), Vol. 14, No. 7, July 2016 265

https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. equations ...

O Selt, T Benslimane, T Abdelkrim - International Journal of Computer Science and …, 2016

... otherwise, go to Step 3. International Journal of Computer Science and Information

Security (IJCSIS), Vol. 14, No. 7, July 2016 879 https://sites.google.com/site/ijcsis/

ISSN 1947-5500 Page 2. IV. FORMAL STATEMENT 2 It must ...

KW Mahmoud, AHA Al-Rukab - International Journal of Computer Science and …, 2016

... More International Journal of Computer Science and Information Security (IJCSIS), Vol.

14, No. 7, July 2016 28 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2.

invariance these features are the more robustness the detector is. ...

M Gasmi, M Bourahla - International Journal of Computer Science and …, 2016

... much, enormously. International Journal of Computer Science and Information

Security (IJCSIS), Vol. 14, No. 7, July 2016 462 https://sites.google.com/site/ijcsis/

ISSN 1947-5500 Page 2. • rarely, frequently, often. • cold, warm ...

A Hamdi, N Monmarché, M Slimane, AM Alimi - International Journal of Computer …, 2016

... 2Polytech Tours, University of Tours, France Tours, France International Journal of Computer

Science and Information Security (IJCSIS), Vol. 14, No. 7, July 2016 275 https://sites.google.com/site/ijcsis/

ISSN 1947-5500 Page 2. cells in its neighborhood. ...

J Akhter, MI Islam, MR Amin - International Journal of Computer Science and …, 2016

... A large neighbour Femtocell list causes unnecessary scanning for the handover. International

Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 7, July 2016

52 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

H Brahmi, B Ammar, F Cherif, AM Alimi, A Abraham - neural networks, 2016

... Hence, we shall study the asymptotically almost-automorphic solution for International

Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 7, July 2016

284 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

M Bourahla - International Journal of Computer Science and …, 2016

... International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 7, July

2016 381 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. as we show later, the

verification would not change signifi- cantly with the addition of new instructions. ...

Rule Extraction Algorithm for Deep Neural Networks: A Review

T Hailesilassie - … of Computer Science and Information Security (IJCSIS), 2016

Abstract Despite the highest classification accuracy in wide varieties of application areas,

artificial neural network has one disadvantage. The way this Network comes to a decision is

not easily comprehensible. The lack of explanation ability reduces the acceptability of ...

V Lakhno, H Mohylnyi, V Donchenko, O Smahina… - Eastern-European Journal …, 2016

Page 1. Information and controlling system 27  V. Lakhno, H. Mohylnyi, V. Donchenko,

O. Smahina, M. Pyroh, 2016 1. Introduction Active expansion of information and

communication systems (ICS) and mission-critical information ...

I Viktoratos, A Tsadiras, N Bassiliades - Pervasive and Mobile Computing, 2016

In this paper, a novel geosocial networking service called “G-SPLIS” (Geosocial Semantic

Personalized Location Information System) is presented. The paper p.

MOF PATIENT, N Axak - Journal of Experimental Psychology

... 16. Selim, S., Hashem, M., Nazmy, TM (2010). Intrusion De- tection using Multi-Stage

Neural Network, International Journal of Computer Science and Information Security

(IJCSIS), 8 (4), 14–20. 17. Pawar, SN (2013). Intrusion ...

Updating Performance of the Execution of BWOCN

A Singh - Journal of Optical Fibre Communications, 2016

... Transmission Performance Analysis of Digital Wire and Wireless Optical Links in Local and Wide

Areas Optical Networks. IJCSIS International Journal of Computer Science and Information

Security. 2009; 3(1): 106–115p. Jafar M, OBrien DC, Stevens CJ, Edwards DJ. ...

RVK Reddy, KP Raju, MJ Kumar - 2016

... International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com)

99 Compression" IJCSIS Vol. 11, No. 10, October 2013 [3] Sachin Dawan "a review of image

compression and comparison of its algorithms" IJCET Vol.2, Issue 1, March 2011. ...

A Srivastava, NK Chaurasia

... [5] SMRamesh, Dr.A.Shanmugam. “Medical Image Compression using Wavelet Decomposition

for Prediction Method”. International Journal of Computer Science and Information Security

(IJCSIS). Vol. 7, No. 1, 2010. [6] Shalini Prasad, Prashant Ankur Jain and Satendra Singh. ...

A Rozumnyi

... Available: http://www.yannisassael.com/publications/assael uom dissertation.pdf [8]

A. Rasool, N. Khare, ”Generalized Parallelization of String Matching Algorithms on

SIMD Architecture”, IJCSIS, vol. 11, no. 5, pp. 6-16, May, 2013. ...

[PDF] Modulated Intensity Gradient and Texture Gradient Based Image Segmentation

M Patel, M Soni

... [10]. D.Sasirekha, Dr.E.Chandra, “Enhanced Techniques for PDF Image

Segmentation and Text Extraction”, (IJCSIS) International Journal of Computer

Science and Information Security Vol. 10, No. 9, September 2012. [11]. ...

[HTML] Color Image Compression Using Vector Quantization and Hybrid Wavelet Transform

HB Kekre, P Natu, T Sarode - Procedia Computer Science, 2016

... Tanuja Sarode and Prachi Natu, Performance Comparison of Column Hybrid Row Hybrid and

full Hybrid Wavelet Transform on Image compression using Kekre Transform as Base Transform,

International Journal of Computer Science and Information Security, (IJCSIS), vol. ...

L Pascoe, JW Mwangoka - International Journal of Telemedicine and Clinical …, 2016

Page 1. Int. J. Telemedicine and Clinical Practices, Vol. 1, No. 4, 2016 323 Copyright © 2016

Inderscience Enterprises Ltd. A smartphone-based reporting application for routine health data:

system requirements, analysis and design Luba Pascoe* and Joseph W. Mwangoka ...

T Benazzouz, A Echchatbi, A Bellabdaoui

... 1, No. 1, 2016, pp. 1-7 http://www.aiscience.org/journal/ijcsis * Corresponding author

Paper-Android-Based Health Care Management System

FM Kundi, A Habib, MZ Asghar - … Science and Information Security (IJCSIS), 2016

... rate, blood volume, diabetes [22]. International Journal of Computer Science and

Information Security (IJCSIS), Vol. 14, No. 7, July 2016 77 https://sites.google.com/

site/ijcsis/ ISSN 1947-5500 Page 3. We also provide the data ...

AO Enikuomehin, MA Rahman, AF Zubair, A Ahmed… - Advances in Computing, 2016

... 5., Page (509-515). [14], Oyelade OJ, Oladipupo OO, Obagbuwa IC, (2010) Application of

k-Means Clustering algorithm for prediction of Students' Academic Performance. (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 7. ...

G Santhosh Kumar - 2016

... 3, pp. 1177–1182, IEEE, 2004. 19. E. Javed Kashi, Kashi Asifa, “Implementation of spin model

checker for formal verification of distance vector routing protocol,” (IJCSIS) International Journal

of Computer Science and Information Security, vol. 8, no. 3, 2010. 20. ...

AA Barrett, M Matthee - 2016

... Thaw, YY, Mahmood, AK & Dominic, PDD (2009). A Study on the Factors that Influence the

Consumers' Trust on E-commerce Adoption. International Journal of Computer Science and

Information Security (IJCSIS), 4(1), pp 153-159. Thorsteinsson, G. & Page, T. (2014). ...

A Vajdi, G Zhang, Y Wang, T Wang

Page 1. 1530-437X (c) 2016 IEEE. Personal use is permitted, but republication/

redistribution requires IEEE permission. See http://www.ieee.org/

publications_standards/publications/rights/index.html for more information. This ...

AJ Vattakunnel, NS Kumar, GS Kumar - Procedia Computer Science, 2016

... 1177-1182, IEEE, 2004. [19]; E. Javed Kashi; Kashi Asifa, “Implementation of spin model checker

for formal verification of distance vector routing protocol. (IJCSIS) International Journal of Computer

Science and Information Security, 8 (3) (2010). [20]; SM Islam, MH Sqalli, S. Khan ...

KS Gaeid, AM Murshid, ZH Salih - Journal of Engineering Science and Technology …, 2016

Page 1. Journal of Engineering Science and Technology Review 9 (2) (2016) 50 – 58

Research Article Direct Torque Control of Induction Motor with Matrix Converter Khalaf

Salloum Gaeid1,*, Asim Majeed Murshid 2 and Ziad Hussein Salih3 ...

HD Korde, J More

... of mail server Advanced Communication Control and Computing Technologies (ICACCCT), 2014

[11] Arash Habibi Lashkari Samaneh Farmand Dr. Omar Bin Zakaria Dr. Rosli Saleh Shoulder

Surfing attack in graphical password authentication (IJCSIS) International Journal of ...

S Aluvala, KR Sekhar, D Vodnala - Procedia Computer Science, 2016

... 41–48 ISSN: 2151-9617. [3]; V. Palanisamy, P. Annadurai; Impact of Rushing attack on

Multicast in Mobile Ad-hoc Network. (IJCSIS) International Journal of Computer Science and

Information Security, 4 (1 & 2) (2009), pp. 183–189 ISSN: 1947–5500. ...

S Mewada, P Sharma, SS Gautam, S Sharma, P Agiwal… - Research Journal of Computer …

... 8. Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar (2011). An

Overview and Study of Security Issues in Mobile Adhoc Networks, Int. Journal of Computer Science

and Information Security (IJCSIS) USA, 9(4), 106-111. 9. Cunha A., Polytech. Inst. ...

AKMF Haque, MM Rahman, A Khatun

... VOL.10, NO.4, DECEMBER, 2010. [7] S.Karpagachelvi, Dr.M.Arthanari, Prof. & Head, M.Sivakumar,

“ECG Feature Extraction Techniques - A Survey Approach”, (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 8, No. 1, April 2010. ...

MS Hossain, MS Hosain

... org. [7] Md. SafaetHossain, Md. ShazzadHosain “Web Test Integration and Performance

Evaluation of E-Commerce Web Sites”, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 10, No. 9, September ...

M Imran, AM Al-Abdullatif, BS Al-Awwad… - 2016

... J. Res. Eng. Technol., vol. 3, no. 03, pp. 6-8, 2013. [8] CB Jones, SS Kumar, and S.

Purushothaman, “identification of diabetic retinopathy using fuzzy logic and back

propagation neural network,” IJCSIS, vol. 11, no. 11, p. 88, 2013. ...

YEM Youssef, R Yadav - 2016

... Survey on Several Secure Data Aggregation Schemes in WSN 1159| International Journal of

Current Engineering and Technology, Vol.6, No.4 (Aug 2016) Sensor Networks , (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 4, No. ...

I Rizvi, MM Kadam - International Journal of Scientific Research, 2016

... York (2003) | [19] Image Steganography Based on Wavelets Families by Sushil Kumar Azad

and muttoo in journal of Computer Engineering and Information Technology () | [20]

Stegnanography Based on contourlet Transform by Sushil kumar and SK Muttoo in IJCSIS, Vol ...

SV Lakshmi, J Janet

... specific variables for prediction stock price in Tehran stock exchange”, Int. J. of

Comput. Sci. and Inform. Security (IJCSIS), vol. 7, no. 2, Feb. 2010. [10] I.

Anagnostopoulos, C. Anagnostopoulos, A. Rouskas, G. Kormentzas and ...

E Azimirad, J Haddadnia - International Journal of Advances in Intelligent …, 2016

... 2002. E. Azimirad and J. Haddadnia, “A New Data Fusion Instrument for Threat

Evaluation Using of Fuzzy Sets Theory”, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 13, No. 4, April 2015. ...

S Bansal, S Sharma

... [30] Bansal, S., Kumar, S., Sharma, H. and Bhalla, P. 2011. Golomb Ruler Sequences

Optimization: A BBO Approach. International Journal of Computer Science and Information

Security (IJCSIS), Pittsburgh, PA, USA, Vol. 9, No. 5, pp. 63–71. ...

AN Amroudi, I Isfahan, A Zaghian, M Sajadieh… - International Journal of …, 2016

... Finally, we present an example of the scheme in section 4. International Journal of Computer

Science and Information Security (IJCSIS), Vol. 14, No. 6, June 2016 303 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. II. PRELIMINARIES ...

A Zeineb, C Chaala, T Gabes, T Frikha, A Hadriche… - International Journal of …, 2016

... processing tool to make it. R International Journal of Computer Science and

Information Security (IJCSIS), Vol. 14, No. 6, June 2016 449 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. This tool should provide real ...

ZK Pourtaheri, SH Zahiri, SM Razavi - International Journal of Computer Science and …, 2016

... Nevertheless, most studies have been International Journal of Computer Science and

Information Security (IJCSIS), Vol. 14, No. 6, June 2016 548 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. negligent of this important criterion. ...

M El Alaoui, K El Moutaouakil, M Ettaouil - International Journal of Computer Science …, 2016

... Hoceima International Journal of Computer Science and Information Security (IJCSIS),

Vol. 14, No. 6, June 2016 216 https://sites.google.com/site/ijcsis/ ISSN 1947-5500

Page 2. researchers attention to work with this model. The ...

BA Buran, SH Caglar, OK Sahingoz - International Journal of Computer Science and …, 2016

... solve this problem [3], [4]. International Journal of Computer Science and Information

Security (IJCSIS), Vol. 14, No. 6, June 2016 491 https://sites.google.com/site/ijcsis/

ISSN 1947-5500 Page 2. 2 After the determination of priority ...

YEA Al-Salhi, S LUb - International Journal of Computer Science and …, 2016

... The IWT is converted to another interval of time and used in the same way. So with IWT, sub-bands

be scaled International Journal of Computer Science and Information Security (IJCSIS), Vol. 14,

No. 6, June 2016 191 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

DR Lakshmi, SS Begum - International Journal of Computer Science and …, 2016

... Some of the recent related works regarding the segmentation are reviewed and its International

Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 6, June 2016

454 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

WA Narejo, JA Mahar, SA Mahar, FA Surahio… - International Journal of …, 2016

... nouns International Journal of Computer Science and Information Security (IJCSIS),

Vol. 14, No. 6, June 2016 293 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page

2. with respect to the dialects used in Sindhi language. He ...

SGV Scholar

... Carte, James, & Ardery, 2004). International Journal of Computer Science and

Information Security (IJCSIS), Vol. 14, No. 6, June 2016 141 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. This is the main kingdom ...

A Yasin, H Hijawi

... been discussed. A performance analysis of MPTCP International Journal of Computer

Science and Information Security (IJCSIS), Vol. 14, No. 6, June 2016 10

https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. have been ...

MH Miraz, M Ali, PS Excell

... young users and those with limiting technologies such as users with small screens, no screens

and slow network International Journal of Computer Science and Information Security (IJCSIS),

Vol. 14, No. 6, June 2016 516 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 ...

AF Yasin, N Zidan

... In this paper we are proposing a solution for detection and prevention of SQL Injection Attack

(SQLIA) using S International Journal of Computer Science and Information Security (IJCSIS),

Vol. 14, No. 6, June 2016 479 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

M Ulman, NS Ualiyev, MB Toregozhina - 2016

Page 1. [121] Agris on-line Papers in Economics and Informatics Volume VIII Number 2, 2016

Do Digital Public Services Matter? A Comparative Study of the Czech Republic and the

Republic of Kazakhstan M. Ulman1, NS Ualiyev2, MB Toregozhina3 ...

A Fathima, D Priyadharshini, S Justin Samual

... IN MOBILE NETWOKS – Authors S.Malathy G.Sudhasadasivam K.Murugan S.Lokesh-

PSG College of Technology Coimbatore (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 8, No. 1, 2010. ...

V Kralev, R Kraleva, B Yurukov - arXiv preprint arXiv:1607.05601, 2016

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. ...

Knowledge- based approaches use an expert system of rules with pre- defined strategies (for

instance, "Depth-first search" [20]. 222 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 ...

M Sarrab, M Elbasir

... Computing, pp. 198-201 48. Sarrab, M. and Janicke, H (2010) 'Runtime monitoring

and controlling of information flow', International Journal of Computer Science and

Information Security (IJCSIS), Vol. 8,No. 9, pp. 37-45 49. Sarrab ...

A Andalib, F Andalib, M Jamshidi, D Momeni

... 299-302, year 2003. [3] Padmavathi G. and shanmugapriya D, "A survey of attacks, security

mechanisms and Challenges in Wireless sensor networks", in: Proceedings of the International

Journal of Computer Science And Information Security (IJCSIS), Vol. 4, No. ...

MS Aghaei - Proceedings of the 9th International Conference on …, 2016

... Applications, 2012. 25. Lanjewar.A and Gupta.N, "Optimizing Cost,Delay,Packet Loss

and Network Load in AODV Routing Protocol," International Journal of Computer

Science and Information Security(IJCSIS), vol. 11, 2013. 26. ...

SO Slim, A Atia, MSM Mostafa

... Science, vol. 2888, pp. 986-996, 2003. [30] N. Bhatia and A. Vandana,"Survey of

Nearest Neighbor Techniques", (IJCSIS) International Journal of Computer Science

and Information Security , vol. 8, no. 2, pp. 302-305, 2010. [31 ...

POFI ELEMENTS - Science & Technology

... doi: 10.1109/iacs.2014. 6841978 17. Selim, S., Hashem, M., Nazmy, TM (2010). Detection

using multi-stage neural network. International Journal of Computer Science and

Information Security (IJCSIS), 8 (4), 14–20. 18. Pawar, SN (2013). ...

M Bouraoui, H Bezzezi, AG Touzi - International Conference in Swarm Intelligence, 2016

... Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 7(3), 116–121 (2010). 8. Cheung, DW, Han, J., Ng, VT,

Fu, AW, Fu, Y.: A fast distributed algorithm for mining association rules. In: Proceedings of the

Fourth International Conference on Parallel and Distributed Information Systems, pp. ...

ML Odedra, A Revar, MH Lunagaria

... ICWCSC 2010. International Conference on, pp. 1-6. IEEE, 2010. [15] Rekha Kaushik, Dr. Jyoti

Singhai, “Simulation Analysis of Node Misbehavior in an Ad-hoc Network using NS2”, International

Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. ...

A Jabeen, R Syeda

... IEEE Conf. Computer Vision and Pattern Recognition (CVPR), 2007. [12] Facial

Recognition Technology: An analysis with scope in India …(IJCSIS) International

Journal of Computer Science and Information Security, Vol. 8, No. ...

PS Oo, ZM Tun, HM Tun

... 19, pp.21– 26, 2006. [3] B. Ramamurthy, S. Bhargavi and R. Shashikumar, ―Design and

Implementation of GSM based Remote Monitoring and Control system for Industrial process

Parameters,‖ International Journal of Computer Science and Internet Security (IJCSIS) , vol. ...

P Kitukale, S Hajare

... India. [7] Rajiv Kumar Sharma, ”Smart Interactive Voice”White paper Infosys. [8]

Mohsen Gerami “WIRELESS IP TELEPHONY “,(IJCSIS) International Journal of

Computer Science and Information Security, Vol. 7, No. 2, 2010

B Samal, M Panda

... 48–55, 2013. [8]. Hassan Seif, “Naïve Bayes and J48 Classification Algorithms on

Swahili Tweets: Perfomance Evaluation((IJCSIS) International Journal of Computer

Science and Information Security, Vol. 14, No. 1,)”, January 2016 . ...

L Shrivastava, GS Tomar - 2016

... [14] SS Baboo and B. Narasimhan, “A Hop-by-Hop Congestion-Aware Routing Protocol

for Heterogeneous Mobile Ad-hoc Networks”, (IJCSIS) International Journal of Computer

Science and Information Security, vol. 3, no. 1, (2009). ...

B Sathyanarayana, CK Priya

... 4 (5), p.450- 550. [14]. V. PALANISAMY, P.ANNADURAI2. (2009). Impact of Rushing attack on

Multicast in Mobile Ad Hoc Network. (IJCSIS) International Journal of Computer Science and

Information Security. 4 (1), p.1-9. [15]. Chinkit Suthar, Bakul Panchal. (2014). ...

B Modi, HB Jethva - Proceedings of First International Conference on …, 2016

... In: 2011 International Conference on Mechatronic Science, Electric Engineering and Computer

(2011). 3. Asadi, R., Mustapha, N., Sulaiman, N.: A framework for intelligent multi agent system

based neural network classification model. (IJCSIS) Int. J. Comput. Sci. Inf. Secur. ...

N Shreyas, GH Kumar

... 1, 4-6 Aug. 2004 [6]. MaleikaHeenaye- Mamode Khan and Naushad Ali Mamode Khan, “A New

Method to Extract Dorsal Hand Vein Patternusing Quadratic Inference Function”, (IJCSIS)

International Journal of Computer Science and Information Security,Vol. 6, No. 3, 2009. ...

T Kokkonen, J Hautamäki, J Siltanen, T Hämäläinen - 2016 23rd International …, 2016

... Cognitive Methods in Situation Awareness and Decision Support (CogSIMA) 2012 , pp.198-201,

6-8 March 2012 [6] E. Azimirad and J. Haddadnia, “The Comprehensive Review On JDL Model

In Data Fusion Networks: Techniques and Methods”, (IJCSIS) International Journal ...

E Stavrou, A Pitsillides - 2016 23rd International Conference on …, 2016

... 38, no. 4, pp. 393-422. [4] Padmavathi, G. and Shanmugapriya, D. 2009. A Survey of Attacks,

Security Mechanisms and Challenges in Wireless Sensor Networks, (IJCSIS) International

Journal of Computer Science and Information Security, vol. 4, no. ...

V Vanitha

... Tableau public is a publicly hosted version of Tableau Dashboard made accessible to everyone.

A International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5,

May 2016 316 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

R Sonia, V Shanthi - Indian Journal of Science and Technology, 2016

Page 1. Abstract Objectives: Nuchal Translucency (NT) thickness measurement

is a Down syndrome marker for chromosomal abnormalities which is detected by

non-invasive test during first trimester. Methods: In this paper, a ...

G Hossein, S Shokoufeh, S Abozar - Indian Journal of Science and Technology, 2016

... 2010. 16. Abu-Alhaj M, Halaiyqah M, Muhannad A, Manasrah M. An innovative platform to improve

the performance of ex- act-string compatibility algorithms. (IJCSIS) International Journal of

Computer Science and Information Security. 2010 Jun; 7(1):280-83. 17. ...

R Kumar, R Chadha

... Tutorials, Vol. 7, No. 4, 4th Quarter 2005. [14] A. Mary Anita and V. Vasudevan,

“Performance Evaluation of mesh based multicast reactive routing protocol under

black hole attack”, IJCSIS, Vol.3, No.1, 2009. [15] Al-Shurman ...

A SHAMANDY, ELS AMA, SAA AHMED - 2016

... The two disease strains, 1 International Journal of Computer Science and Information

Security (IJCSIS), Vol. 14, No. 5, May 2016 597 https://sites.google.com/site/ijcsis/

ISSN 1947-5500 Page 2. infect only one population (prey). ...

F Roohi, M Romoozi

... with the event. The parameters and the International Journal of Computer Science

and Information Security (IJCSIS), Vol. 14, No. 5, May 2016 707 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. simulation results are ...

ELY Ahmed, MD ELKETTANI

... International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5, May

2016 677 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. • Bootstrapping: This step

consists of removing the noise resulted by multiplications in order to allow ...

B Saichandana, J Kakinada, IJ Harikiran, K Srinivas…

... conclusions. International Journal of Computer Science and Information Security

(IJCSIS), Vol. 14, No. 5, May 2016 437 https://sites.google.com/site/ijcsis/ ISSN

1947-5500 Page 2. II. EMPIRICAL MODE DECOMPOSITION Empirical ...

M Esmaeilpour, H Yasinian, K Esmaeilpour…

... concepts in this area (Yada, International Journal of Computer Science and Information

Security (IJCSIS), Vol. 14, No. 5, May 2016 520 https://sites.google.com/site/ijcsis/ ISSN

1947-5500 Page 2. 2006). Using tags and surveying the ...

M Sarfraz, I Hussain, F Ali, A Rasheed

... the Construction of Cryptographically Strong 131028 S-Boxes Having Highly Nonlinear

International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5,

May 2016 611 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

MW Azeem, MS Sarfraz, U Shoaib, P Gujrat

... threats and bugs. We presented a detailed review of existing malware detection techniques along

with their International Journal of Computer Science and Information Security (IJCSIS), Vol. 14,

No. 5, May 2016 642 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

MS Iqbal, M Sidaq, M Shabbir, AR Muhammad

... review of automated inspection tools. Section III gives a brief review of IEEE standard for software

reviews and International Journal of Computer Science and Information Security (IJCSIS), Vol.

14, No. 5, May 2016 622 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

DS Rajput, R Gour

... For better description, a general eHealth checking system is given in Figure 1, which contains

the accompanying significant segments. International Journal of Computer Science and

Information Security (IJCSIS), Vol. ... 451 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 ...

N Din, AI Umar, A Waheed, N ul Amin, MA Khan

... NUST), Islamabad International Journal of Computer Science and Information Security

(IJCSIS), Vol. 14, No. 5, May 2016 432 https://sites.google.com/site/ijcsis/ ISSN

1947-5500 Page 2. 3. PROPOSED SCHEME Proposed MGSCF ...

N Masood - complexity, 2016

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 14,

No. 5, May 2016 ... 351 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 14, No. 5, May 2016 ...

RK Kumar, SVA Rao - framework, 2016

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 14,

No. 5, May 2016 ... The proposed 392 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page

2. (IJCSIS) International Journal of Computer Science and Information Security, Vol. ...

MM Abbassy, AA Mohamed

... university Mobile Expert System to Detect Liver Disease Kind M International Journal

of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5, May 2016 320

https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. The ...

V Krishna, A Basu

... We looked at several factors that can lead to failure. Below are three important factors ie p(f):

1) Complexity International Journal of Computer Science and Information Security (IJCSIS), Vol.

14, No. 5, May 2016 192 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

T Hassan, APM Shoaib Hassan, MA Yar

... Section 4 describes the results that are based on presented methodology. In Section 5,

International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5,

May 2016 212 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

VH Shah, A Shah

... 1) Sequential fit 2) Buddy allocator system 3) Indexed fit 4) Bitmapped fit [3] International

Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5, May 2016

236 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

SN Mishra, DR Lama - management

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 14,

No. 5, May 2016 ... It is an important step ahead in the process of predictive analytics. International

Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. ...

NB Amor, FB Taher, M Jallouli

... International Journal of Computer Science and Information Security (IJCSIS), Vol. 14,

No. 5, May 2016 273 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. Figure

1. The general scheme of the proposed navigation system ...

P Bansal, B Kaur

... demonstration for the shape analysis and is useful for many pattern recognitions application.

The skeleton International Journal of Computer Science and Information Security (IJCSIS), Vol.

14, No. 5, May 2016 205 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

M Radhika, D Raj, MV Ramesh

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 14,

No. 5, May 2016 ... 338 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 14, No. 5, May 2016 ...

PA Kokate, GL Bodhe, AD Shelotkar

... Vc = 2( + ) Where e =1.602x 10-19 Coulomb International Journal of Computer Science

and Information Security (IJCSIS), Vol. 14, No. 5, May 2016 129 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. Ce= Equivalent capacitance ...

S Kadry, A Lakkis, A Kalakech

... While Google Scholar finds different types of sources, including journal papers, conference papers,

books, theses and reports [6]. International Journal of Computer Science and Information Security

(IJCSIS), Vol. ... 116 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

AOA Salem, H Awwad

... the analysis International Journal of Computer Science and Information Security

(IJCSIS), Vol. 14, No. 5, May 2016 125 https://sites.google.com/site/ijcsis/ ISSN

1947-5500 Page 2. methods mentioned in advance. In assigning ...

VH Kalmani, D Goyal, S Singla

... As of late, a few analysts have proposed distinctive varieties of remote International

Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5, May 2016

121 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

T Mahmood, T Nawaz, M Shah, Z Khan, R Ashraf…

... University Mansehra, Pakistan D a b International Journal of Computer Science

and Information Security (IJCSIS), Vol. 14, No. 5, May 2016 156 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. follows. In Section 2 ...

H Bhavsar, A Ganatra - Audiology

... and decreased comprehensibility. In [7], International Journal of Computer Science

and Information Security (IJCSIS), Vol. 14, No. 5, May 2016 142 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. the comparison of ...

EM Abdelmoniem - Commitment

... finally conclusion [1]. International Journal of Computer Science and Information

Security (IJCSIS), Vol. 14, No. 5, May 2016 104 https://sites.google.com/site/ijcsis/

ISSN 1947-5500 Page 2. 2- Literature review: Based on "The ...

HS Mohammed, YG Gouda, MH Khafagy

... exploration and query optimization [14]. International Journal of Computer Science and

Information Security (IJCSIS), Vol. 14, No. 5, May 2016 54 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. B. S2MART S2MART SQL to ...

A Magdich, YH Kacem, A Mahfoudhi, M Abid

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 14,

No. 5, May 2016 ... 79 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 14, No. 5, May 2016 ...

A Abdellaoui, YI Khamlichi, H Chaoui

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 14,

No.5, May 2016 A BYOD method for enhancing authentication in the ... Page 2. (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 14, No.5, May 2016 ...

FR Sayed, M Khafagy

... Map function uses a key value pair, and a Reduce function International Journal

of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5, May 2016

42 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

B Rao, SN Mishra

... network. Various * Corresponding author International Journal of Computer Science

and Information Security (IJCSIS), Vol. 14, No. 5, May 2016 85 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. enhancements ...

C Spanakis, E Mathioudakis, N Kampanis, M Tsiknakis…

... In medical imaging, we need to align pairs of images, often acquired from different modalities

with varying degree of details present. International Journal of Computer Science and Information

Security (IJCSIS), Vol. ... 1 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

B Campus

... Now, the information is prepared to allow queries from the datauser. International Journal

of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5, May 2016 69

https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

KA Meerja, K Almustafa

... The users are increasingly spending their time online accessing International Journal of Computer

Science and Information Security (IJCSIS), Vol. 14, No. 5, May 2016 31 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. 2 services from the Internet. ...

FA Rafrastara, Q Deyu

... Literature Review Fauzi Adi Rafrastara, Graduate Student Member, IEEE, Qi Deyu R International

Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5, May 2016 12

https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. [9][5][8][12][10]. ...

M Nidhi, K Gunaseelan - Journal of Medical Imaging and Health Informatics, 2016

... Optical Society of America 20, 14906 (2012). 15. R. Bhuvana and S. Purushothoman,

Application of combined radial basis function and echo state neural network (RBFESNN) for

mining hamilton rating scale depression data. IJCSIS 11, 103 (2013). 16. ...

P Sambyal, V Sambyal

... York, USA, September 1st - 3rd, 1998. [19] Sushil Kumar and SKMuttoo (2011),

―Steganography based on Contourlet Transform‖, (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 9, No. 6.

AK Dwivedi, GS Prajapati

... [6] S.Santhosh baboo and B.Narasimhan, “ A Hop-by-Hop Congestion-Aware Routing

Protocol for Heterogeneous Mobile Ad-hoc Networks”, International Journal of Computer

Science and Information Security (IJCSIS), Vol. 3, No. 1, 2009. ...

PS Kale, MM Bartere - International Journal of Engineering Science, 2016

... 2008. [10] Amanpreet Kaur, “A New Image Steganography Based On First Component

Alteration Technique”, (IJCSIS) International Journal of Computer Science and

Information Security, Volume 6, No. 3, pp. 53-56, 2009. [11 ...

W Lee, S Cho, P Chu, H Vu, S Helal, W Song… - Neurocomputing, 2016

In order to evaluate the quality of Internet of Things (IoT) environments in smart houses, large

datasets containing interactions between people and ubiquitous.

KS Patel, JS Shah - International Journal of Information Security and …, 2016

Page 1. DOI: 10.4018/IJISP.2016040103 Copyright © 2016, IGI Global. Copying or distributing

in print or electronic forms without written permission of IGI Global is prohibited. International

Journal of Information Security and Privacy Volume 10 • Issue 2 • April-June 2016 ...

J Naren, K Ashokkumar, V Raghavendran, M Saran

... [14]. Saurabh Pal, Brijesh Kumar Bhardwaj. (2011).” Data Mining: A prediction for

performance improvement using classification”, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 9, No. 4, Apr, pp. 136-140. [15]. ...

M Togan, M Koulinas

Page 1. PROPRIETARY RIGHTS STATEMENT This document contains information,

which is proprietary to the ReCRED Consortium. Neither this document nor the information

contained herein shall be used, duplicated or communicated ...

AM Adam, RM Farouk, ME El-aziz - arXiv preprint arXiv:1605.03624, 2016

... For examples of such models, the generalized Gaussian density International Journal

of Computer Science and Information Security (IJCSIS), Vol. 14, No. 3, March 2016

434 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

R Kraleva, A Stoimenovski, D Kostadinova, V Kralev - arXiv preprint arXiv: …, 2016

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol.

14, No. 4, April 2016 ... This is a small number compared to the markets of Google and Apple.

51 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

G Badr, A Algobail, H Almutairi, M Almutery - Procedia Computer Science, 2016

... 5]; B. Bhardwaj, S. Pal; Data Mining: A prediction for performance improvement

using classification. International Journal of Computer Science and Information

Security (IJCSIS), 9 (4) (2011), pp. 136–140. ...

A Spalka, J Lehnhardt - US Patent 20,160,117,521, 2016

... on Encrypted Data”, in Proc. of the 2000 IEEE Symposium on Security and Privacy

(S&P 2000), 2000. And (IJCSIS) International Journal of Computer Science and

Information Security, Vol. 9, No. 8, August 2011, Efficient Cryptographic ...

S Manna, S Dutta - arXiv preprint arXiv:1605.03353, 2016

... [6] Manas Paul, Tanmay Bhattacharya, Suvajit Pal, Ranit Saha, “A Novel Generic Session Based

Bit Level Encryption Technique to Enhance Information Security”, (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 3, No. 1, 2009. ...

D Yimam, EB Fernandez - Journal of Internet Services and Applications, 2016

S Mahjoub, H Vojoudi - The Journal of Supercomputing, 2016

Page 1. J Supercomput DOI 10.1007/s11227-016-1725-8 The UTFLA: uniformization of

non-uniform iteration spaces in two-level perfect nested loops using SFLA Shabnam Mahjoub1 ·

Hakimeh Vojoudi1 © Springer Science+Business Media New York 2016 ...

S Gupta, KBC Saxena, AK Saini

... 2009. [21] Qamar, S., Lal, N., Singh, M., (2010). Internet Ware Cloud Computing:

Challenges. [22] (IJCSIS) International Journal of Computer Science and Information

Security, Vol. 7, No. 3, March 2010. Page 6. Proceedings ...

AEE ElAlfi, Y Elhelaly, FRM Selima - future, 2016

Page 1. IRACST - International Journal of Computer Science and Information Technology &

Security (IJCSITS), ISSN: 2249-9555 Vol.6, No.2, Mar-April 2016 112 An Intelligent Advisory

System For Optimal Choice To Build Local Area Networks AEE ElAlfi Dept. ...

S Pushpalatha, P Jaganathan - Int J Adv Engg Tech/Vol. VII/Issue II/April-June, 2016

... 1186/1687-1499-2012-96”. 8. S.Santhosh baboo and B.Narasimhan, ”A Hop-by-Hop

Congestion-Aware Routing Protocol for Heterogeneous Mobile Ad-hoc Networks,” (IJCSIS)

International Journal of Computer Science and Information Security, 2009.Vol. ...

AS Bhoir, A Gulati

... Conference on Asian Language Processing, 2010. [12] Ladda Suanmali1, Naomie

Salim and Mohammed Salem Binwahlan, ”Fuzzy Logic Based Method for Improving

Text ”,IJCSIS, Vol. 2, No. 1, 2009. [13] Arman Kiani -B and ...

I ŢĂRANU

... [3] Bushinak, H., AbdelGaber, S., & AlSharif, FK (2011). Recognizing The Electronic Medical

Record Data From Unstructured Medical Data Using Visual Text Mining TechniquesProf. Hussain

Bushinak. (IJCSIS) International Journal of Page 7. Database Systems Journal vol. ...

DA Durães, FJH Lucena

... Porto: Porto Editora. [11.] Meetoo-Appavoo, A. Constructivist-Based Framework for

Teaching Computer Science. In-ternational Journal of Computer Science and Information

Security (IJCSIS), 9(8):25–31, 2011. [12.] PAPERT, S. (1994). ...

MF Karaaba, O Surinta, LRB Schomaker, MA Wiering

... Jemaa, YB and Khanfir, S. (2009). Automatic lo- cal Gabor features extraction for face recogni-

tion. International Journal of Computer Science and Information Security (IJCSIS)), 3(1).

Karaaba, MF, Surinta, O., Schomaker, LRB, and Wiering, MA (2015). ...

VK Verma, K Saxena - International Journal of Computer Science and …, 2016

... Kanak Saxena Samrat Ashok Technological Institute Department of Computer Applications Vidisha

MP India International Journal of Computer Science and Information Security (IJCSIS), Vol. 14,

No. 4, April 2016 541 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

VG Biradar, H Sarojadevi, HC Nagaraj - International Journal of Computer Science …, 2016

... HC Nagaraj Department of ECE NMIT Bangalore, India International Journal of

Computer Science and Information Security (IJCSIS), Vol. 14, No. 4, April 2016 168

https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

İM Orak, A Çelik - International Journal of Computer Science and …, 2016

... Regional Defects Point Defects Cracks Defects Pre-Cleaning Potential Defect Region Detection

International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 4, April

2016 45 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

CK Tiekoura, A Boko - International Journal of Computer Science and …, 2016

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 14,

No. 4, April 2016 ... 37 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 14, No. 4, April 2016 ...

T Shah, A Qureshi

... Finally, we conclude in section 5. International Journal of Computer Science and Information

Security (IJCSIS), Vol. 14, No. 4, April 2016 440 https://sites.google.com/site/ijcsis/ ISSN

1947-5500 Page 2. 2 S8 S-boxes and the logistic map 2.1 S8 S-boxes: In [4], Hussain et al. ...

M Kaushik

... Considering these concepts web application enriches International Journal of Computer Science

and Information Security (IJCSIS), Vol. 14, No. 4, April 2016 102 https://sites.google.com/site/ijcsis/

ISSN 1947-5500 Page 2. navigation through web pages and links. ...

TN Coimbatore

... generation. These outcomes are International Journal of Computer Science and

Information Security (IJCSIS), Vol. 14, No. 4, April 2016 552 https://sites.google.com/site/ijcsis/

ISSN 1947-5500 Page 2. accepted in the crossover. From ...

N Kumar, BS Sohi Sr - channels

... Naresh Kumar, Member, IEEE and BS Sohi, Sr. Member, IEEE U International Journal of Computer

Science and Information Security (IJCSIS), Vol. 14, No. 4, April 2016 347 https://sites.google.com/site/ijcsis/

ISSN 1947-5500 Page 2. , ( ) = { 2 ( −∆− ≤ 1) 0, ℎ (2) ...

GB Tra, B Michel

... As the concept of equity it was developed in the 17th century by Pascal and Ferma [10] further

to fairly sharing out of International Journal of Computer Science and Information Security (IJCSIS),

Vol. 14, No. 4, April 2016 381 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 ...

ELY Ahmed, MD ELKETTANI

... In specific terms, these schemes Fully homomorphic encryption: state of art and comparison

International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 4, April

2016 159 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

M Khan, S Khusro, I Ullah

... To deal with this issue, a number of video annotation International Journal of Computer Science

and Information Security (IJCSIS), Vol. 14, No. 3, March 2016 https://dx.doi.org/10.6084/m9.

figshare.3153937 198 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

Z Fan, Y Wen - 2016

Page 1. Decipher with Tempered MCMC Zhenan Fan, Yeming Wen Supervisor: Prof. Jefferey

S. Rosenthal University of Toronto April 17, 2016 STA496H Reading in Statistics Winter 2016

1 Page 2. Contents 1 Introduction 3 2 MCMC Algorithm for Optimization 3 ...

M Omari, SO Jaafri, N Karour - … International Conference on Industrial Informatics and …, 2016

... REFERENCES [1] Gaurav Vijayvargiya, Sanjay Silakari, and Rajeev Pandey, “A Survey:

Various Techniques of Image Compression”, International Journal of Computer Science

and Information Security (IJCSIS), Vol. 11, No. 10, October 2013. ...

K Leelavathi, T Sudha

... REFERENCES [1] K Perumal and R Bhaskaran , “SVM-Based Effective Land Use Classification

System For Multispectral Remote Sensing Images”, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 6, No. 2, pp.95-107, 2009. ...

M Agrawal, T Raikwar

... 2 No. 1, pp.1-7, WCSIT, July 2012. [4] Santosh K.Gaikwad, et.al,” A Review on Speech

Recognition Technique”, IJCA, Volume 10– No.3, November 2010 [5] MA Anusuya, SKKatti,

“Speech Recognition by Machine: A Review “, IJCSIS, Vol. 6, No. 3, 2009. ...

H Kaur, M Scholor, R Vashisht

... pour, Saeid Saryazdi “GSA: A Gravitational Search Algorithm”, Information Sciences 179 (2009)

2232– 2248 [12] Bhaskar Nandi, Subhabrata Barman, Soumen Paul “Genetic Algorithm Based

Optimization of Clustering in Ad-Hoc Networks”, (IJCSIS) International Journal of ...

XS Lu, MC Zhou

... using k-means clustering, EM and Normalized Cuts Department of EECS, 2008, 1: 1-7. [10] OJ

Oyelade, OO Oladipupo, and IC Obagbuwa, “Application of k Means Clustering algorithm for

prediction of Students Academic Performance,” (IJCSIS) International Journal of ...

VK Chenchela, P Vijayasanthi, N Kapileswar…

Page 1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN:

2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. III (Mar. – Apr. 2016), PP 17-27

www.iosrjournals.org DOI: 10.9790/1676-1102031727 www.iosrjournals.org 17 | Page ...

S Elango, G Thirugnanam, R Shankari - Middle-East Journal of Scientific Research, 2016

... 9. Neeta Deshpande, Dr. Archana Rajurkar, Dr. R. and Manthalkar, 2010. Review of

Robust Video Watermarking Algorithms, (IJCSIS) International Journal of

ComputerScience and Information Security, Vol. 7, No. 3, March2010. 10. ...

S SOCIAL

... References. [1] Thorat, S., Nayak, S. and Dandale, J. (2010). Facial Recognition

Technology: An analysis with scope in India. (IJCSIS) International Journal of Computer

Science and Information Security, 8(1). [2] Zhang, D. (2002). ...

NM Lutimath, L Suresh, C Naikodi

... [8] AP Patil and Harish R, “Performance Evaluation of AODV andAODV+G Algorithms

in MANETs Using Convergence Time,” inProc. of (IJCSIS) International Journal

of Computer Science and Information Security, vol. 8, no. ...

M ZULKIFLEE, MS AZMI, SSS AHMAD, S SAHIB…

Page 1. A Framework of Features Selection for IPv6 Network Attacks Detection

ZULKIFLEE M., MS AZMI, SSS AHMAD, S SAHIB, MKA GHANI Faculty of Information

and Communication Technology (FTMK) Universiti Teknikal ...

D Richardson

Page 1. Walden University ScholarWorks Walden Dissertations and Doctoral Studies

2016 The Successful Implementation of Electronic Health Records at Small Rural

Hospitals Daniel Richardson Walden University Follow ...

SS Indrakumar, MS Shashidhara

... 8. Vishwaratana Nigam, Divakar Yadav and Manish K Thakur, “A-Novel-Approach-

for-9. Hand-Analysis-UsingImage- Processing-Techniques”, (IJCSIS) International

Journal Of Computer Science and Information Security,Vol. 8, No. ...

S Sharma, J Kumar, KS Gaur

... 5, pp. 22-25, Jan 2012. [3] Ashutosh Lanjewar, Neelesh Gupta, “Optimizing Cost, Delay, Packet

Loss and Network Load in AODV Routing Protocol”, (IJCSIS) International Journal of Computer

Science and Information Security,Vol. 11, No. 4,April2013. ...

SA Pawar, MJ Gaikwad, VN Nayakwadi

... 636-639, 2011. [9] G.Padmavathi, and D.Shanmugapriya,“A Survey of Attacks, Security

Mechanisms and Challenges in Wireless Sensor Networks,” (IJCSIS‟09) International Journal

of Computer Science and Information Security, Vol.4, No.1&2, 2009. ...

AMA Rahman, S Sultana, F Ahmed

... 4487 [10] Lokesh Kumar Bansal and AdityaTrivedi, Performance Evaluation of Space-Time Turbo

Code Concatenated With Block Code MC-CDMA Systems, International Journal of Computer

Science and Information Security (IJCSIS), vol. 9(1), pp.108-115, 2011. ...

D Eshetie Kassegn, A Thakur, N Haregot…

Page 1. Eshetie.et al / REST Journal on Emerging trends in Modelling and Manufacturing 2(1)

2016, 1–9 Copyright@ REST Publisher, All rights reserved 1 REST Journal on Emerging trends

in Modelling and Manufacturing Vol:2(1),2016 REST Publisher ISSN: 2455-4537 ...

N Pareek

... Model" International Conference on Software and Computer Applications- IPCSIT vol.9 (2011)

[9]. RAJU BARSKAR, ANJANA JAYANT DEEN"The Algorithm Analysis of E-Commerce Security

Issues for Online Payment Transaction System in Banking Technology"(IJCSIS)-Vol. ...

C Anil, S Anuradha, V Arpita, S Sridevi, M Guruprasad

... and Teddy S. Gunawan, “ Novel Framework for Hidden Data in the Image Page within Executable

File Using Computation between Advance Encryption Standared and Distortion Techniques”,

International Journal of Computer Science and Information Security (IJCSIS), Vol. ...

N Netten, MS Bargh, S van den Braak, S Choenni… - Proceedings of the 17th …, 2016

... 24. MS Bargh, J. van Dijk & S. Choenni, "Dynamic data quality management using

issue tracking systems," In the IADIS International Journal on Computer Science

and Information Systems (IJCSIS, ISSN: 1646-3692), ed. 25. ...

I Mhadhbi, SBEN OTHMAN, SB Saoud

... embedded system. The co-design International Journal of Computer Science and

Information Security (IJCSIS), Vol. 14, No. 3, March 2016 263 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. methodology includes ...

LA Rodrigues, L Arantes, EP Duarte - 2016 IEEE 30th International Conference on …, 2016

Page 1. An Autonomic Majority Quorum System Luiz A. Rodrigues Department of

Computer Science Western Paraná State University Cascavel – PR, Brazil E-mail:

luiz.rodrigues@unioeste.br Luciana Arantes CNRS, INRIA, LIP6 ...

I Feddaoui, F Felhi, IH Bergi, J Akaichi - Intelligent Interactive Multimedia Systems and …, 2016

... 9. Thor, A., Rahm, E.: AWESOME A Data Warehouse-based System for Adaptive Website

Recommendations. 10. Pozveh, MH, Nematbakhsh, M., Movahhedinia, N.: A multidimensional

approach for context-aware recommendation in mobile commerce. (IJCSIS) Int. J. Comput. ...

MZ Asghar, A Habib, A Habib, SR Zahra, S Ismail - arXiv preprint arXiv:1605.02304, 2016

... As the COCOMO II model is the simplest model so it is commonly used model International Journal

of Computer Science and Information Security (IJCSIS), Vol. 14, No. 4, April 2016 192

https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. among different other models. ...

ES Singh - 2016

... [9]. B.Sathish Kumar KRShankar Kumar R.Radhakrishnan ―An Efficient Inter Carrier

Interference Cancellation Schemes for OFDM Systems‖, (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 6, No. 3, 2009. [10]. ...

S Manna, S Dutta - arXiv preprint arXiv:1605.02954, 2016

... [7] Manas Paul, Tanmay Bhattacharya, Suvajit Pal, Ranit Saha, “A Novel Generic Session Based

Bit Level Encryption Technique to Enhance Information Security”, (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 3, No. 1, 2009. ...

MDD Patil, RP Singh

... 669 – 672, September 2010. [14] S. Karpagachelvi, Dr. M. Arthanari, M. Sivakumar, “ECG

Feature Extraction Techniques - A Survey Approach”, International Journal of Computer

Science and Information Security (IJCSIS), Vol. 8, No. 1, April 2010. ...

CS Gosavi, SN Mali - Global Journal of Pure and Applied Mathematics, 2016

... 4, pp. 624–627,2005 [11] Mrs Neeta Deshpande, Dr. Archana rajurkar, Dr. R. manthalkar,

“Review of Ro- bust Video Watermarking Algorithms,” (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 7, No. 3, March 2010. ...

JR Jayantilal

... System Modeling (ICCASM 2010). [6] Nighat Mir, “Robust Techniques of Web

Watermarking Using Verbs, Articles and Prepositions”, (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 9, No. 2, 2011

D Singh

... Institute for Software Research.1999 [7] Saleem Basha, Dhavachelvan P.,” Analysis

of Empirical Software Effort Estimation Models” (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 7, No. 3, 2010. ...

M Swamidas, A Govardhan, D Vijayalakshmi - arXiv preprint arXiv:1605.00918, 2016

... Special issue on “Computing Applications and Data Mining” International Journal

of Computer Science and Information Security (IJCSIS), Vol. 14 S1, February 2016

55 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

JS Chouhan, G Gupta - Int. J. of Engg. Sci& Mgmt.(IJESM), 2016

... ZahidHasan, “RiazUddinMondal(corresponding author), Performance Evaluation of Wimax

Physical Layer under Adaptive Modulation Techniques and Communication Channel”s, (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 5, No.1, 2009. ...

S Saini, A Kumar - International Journal Of Scientific Research And …, 2016

... 5. G. Ramesh and S. SundaraVadivelu, 2009. “A Reliable and Fault-Tolerant Routing

for Optical WDM Networks” International Journal of Computer Science and Information

Security (IJCSIS), Vol. 6, No. 2. 6. Ornan (Ori) Gerstei, 1998. ...

DV Ramana, PN Rao

... [6]. Amanpreet Kaur1, Renu Dhir2, and Geeta Sikka3 .A New Image Steganography

Based On First Component Alteration Technique ((IJCSIS) International Journal of

Computer Science and Information Security, Vol. 6, No.3, 2009)

S Warhade, P Dahiwale, MM Raghuwanshi

... 378-383. [2] Sheida Dayyani and Mohammad Reza Khayyambashi, “A Comparatives study

of Replication Technique in Grid Computing Study,” in (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 11, No. 9, September 2013. ...

K Babbar, D Chaudhary

... 5, pp. 22-25, Jan 2012. [19] AshutoshLanjewar, Neelesh Gupta, “Optimizing Cost, Delay, Packet

Loss and Network Load in AODV Routing Protocol”, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 11, No. 4,April2013. ...

S Thenmozhia, M Chandrasekaranb

... 1308-1313. [12] Kumar, S. and Multoo, S. 2011. “Steganography based on contourlet Transform,”

International Journal of Compute Science and Information Security (IJCSIS), 9 (6), PP. 215220.

[13] Kumar, KS, Raja, KB, Chhotaray, RK, and Pattnaik, S. 2011. ...

M Ilic, P Spalevic, M Veinovic, WS Alatresh

... 3, Issue 8, August 2013, pp. 117-120. [8] O. Oyelade, O. Oladipupo, I. Obagbuwa, “Application

of k-Means clustering algorithm for prediction of students' academic performance” (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 7, num. ...

S Banerjee, R Bag, A Das - … and Frontiers in Computer, Communication and …, 2016

... REFERENCES Amin, H., Khan, AR (2009). Acquiring Knowledge for Evaluation of Teachers

'Performance in Higher Educa- tion—using a Questionnaire. Int. Journal of Computer Science

and Information Security (IJCSIS), 2180–187. Djam, X., Mishra, A.(2013). ...

K Vijiyakumar, VS Reddy, M Manikandan… - 2016

... IEEE, 2009, pp. 207–212. 8) Okal Christopher Otieno “Managing & Analyzing Large Volumes of

Dynamic & Diverse Data” Department of Information Technology (IJCSIS) International Journal

of Computer Science and Information Security, August 2015, Vol. 13 No. ...

JK Sandhu, S Saxena - Proceedings of the International Conference on Recent …, 2016

... Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 4(1), 1–9 (2009). 24. Pathan, A.-SK, Lee, H.-W., Hong,

CS: Security in wireless sensor networks: issues and challenges. In: ICACT (2006). 25. Qian,

Y., Lu, K., Tipper, D.: Towards survivable and secure wireless sensor networks. In: IEEE, pp. ...

S Thapar, A Kalla - Proceedings of the International Conference on Recent …, 2016

... 34. Kumar, A., Singh, P., Kumar, V., Tyagi, N.: Performance analysis of AODV, CBRP, DSDV and

DSR MANET routing protocol using NS2 simulation. IJCSIS J. MECS 9, 45–50 (2013). 35. Nilsson.

A. Performance analysis of traffic load and node density in ad hoc networks. ...

K VijiyaKumar, S Chandni, T Esther, BU Maheswari - 2016

... [9] Okal Christopher Otieno “Managing & Analyzing Large Volumes of Dynamic & Diverse

Data” Department of Information Technology (IJCSIS) International Journal of Computer

Science and Information Security, August 2015, Vol. 13 No. ...

P Sharma, S Sharma, PG Scholar - International Journal of Engineering Science, 2016

... [5] Dr.SBThorat, SKNayak and Miss.Jyoti P Dandale, “Facial Recognition Technology: An

analysis with scope in India”, (IJCSIS) International Journal of Computer Science and

Information Security, Vol. 8, No. 1, 2010. [6] Mr. Hamid M. Hasan, Prof. ...

W Guebli, A Belkhir - Proceedings of the International Conference on …, 2016

... 257--266. 9. Zahra Forootan Jahromi, Amir Rajabzadeh, 'A Multi-Purpose Scenario-based

Simulator for Smart House Environments', (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 9, No. 1, January 2011. ...

S Rathi, R Soni - Proceedings of Fifth International Conference on Soft …, 2016

... In: Proceedings of ACM SIGMOD'00, pp: 439–450, Dallas, Texas, USA (2000). 8.

Boora, RK, Shukla, R., Misra, AK: An improved approach to high level privacy

preserving itemset mining. (IJCSIS) Int. J. Comput. Sci. Inf. Secur. ...

TA Rashid, HA Ahmad - Computer Applications in Engineering Education, 2016

... 3 HU Amin and AR Khan, Acquiring knowledge for evaluation of teachers' performance

in higher education—Using a questionnaire, (IJCSIS) Int J Comput Sci Info Secur 2 ( 2009),

1–7. 4 AIZ Abidin, IA Setu, SP Yong, OM Foong, and J. Ahmad,.

S Rasane, DV Patil - IJETT, 2016

... ECML-98, 10th European Conf. Machine 1998. [22] Vidhya. KA G.Aghila, “A Survey of Naive

Bayes Machine Learning approach in Text Document Classification”, (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 7, 2010. ...

B Davarcioglu - IJETT, 2016

Page 1. IJETT ISSN: 2455-0124 (Online) | 2350 – 0808 (Print) | April 2016 | Volume

3 | Issue 1 | 4001 Abstract— This paper establishes the classical linear model of signal

of the multiple-input multiple-output (MIMO) radar system ...

IA Patwekar, VC Kotak - 2016

... [11] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor

Networks,” IEEE Commun. Surveys Tutorials, vol. 8, pp. 2–23, year 2006. (IJCSIS) International

Journal of Computer Science and Information Security,Vol. 4, No. 1 & 2, 2009. ...

SS Saranya, N Abinaya

... Volume 4, Issue 8, August-2013. [12] Nitin Bhatia, Vandana Survey of Nearest

Neighbours Techniques (IJCSIS) International Journal of Computer Science and

Information Security, Vol. 8, No. 2, 2010. [13] Yufei Tao Cheng Sheng ...

K SaiSanathKumar, KNK Reddy, V Pushpavathy… - International Journal of …, 2016

... Professor) and M. Manjula (Lab assistant) for their help in our paper. References [1] MA

Alim, MM Rahman, MM Hossain, A. Al- Nahid, ” Analysis of Large-Scale Propagation Models

for Mobile Communications in Urban Area” IJCSIS, Vol. 7, No. ...

MB Borkar, MS Sheikh, PD Kaware

... Research (IJSER). [3]Farnaz Towhidi and Maslin Masrom, “A Survey On

Recognition-Based Graphical User Authentication Algorithms”, in International Journal

Of Computer Science And Information Security( IJCSIS). [4] Harsh ...

S Nefti, M Sedrati - arXiv preprint arXiv:1604.03217, 2016

... In our work, we investigate the performance of MANET routing protocols in video streaming

International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 3,

March 2016 1 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

SH Halili, H Sulaiman - The Online Journal of Distance Education and e- …, 2016

... Reaching the unreached: A Role of ICT in Sustainable Rural Development. International

Journal of ComputerScience and Information Security (IJCSIS). Retrieved fro m

http://sites.google.com/site/ijcsis/ 1-14 Noor Sharifah.(2006). ...

SS More, PP Gaikwad - Procedia Computer Science, 2016

... [7]; Y. Robiah, S. Siti Rahayu, M. Mohd Zaki, S. Shahrin, MA Faizal, R. Marliza; A New

Generic Taxonomy on Hybrid Malware Detection Technique. “International Journal of

Computer Science and Information Security (IJCSIS), 5 (1) (2009). ...

M Meena, VA Bharadi - Procedia Computer Science, 2016

... [14]; HB Kekre, Tanuja Sarode, Sudeep Thepade, “Inception of Hybrid Wavelet Transform using

Two Orthogonal Transforms and It‟s use For Image Compression”, International Journal of

Computer Science and Information Security(IJCSIS),Vol. 9, No. 6, 2011, pp. 80-87. ...

SP Meshram, AD Thakare, S Gudadhe - Procedia Computer Science, 2016

... [10]; Mr. Kondekar VH, Mr. Kolkure VS, Prof.Kore SN, “Image Retrieval Techniques based

on Image Features: A State of Art approach for CBIR”, (IJCSIS) International Journal of

Computer Science and Information Security,Vol. 7, No. 1, 2010. ☆ ...

V Yadav, V Bharadi, SK Yadav - Procedia Computer Science, 2016

... “Inception of Hybrid Wavelet Transform using Two Orthogonal Transforms and It's use for Image

Compression”, (IJCSIS) International Journal of Computer Science and Information Security,

9 (6) (2011). [19]; HB Kekre, VA Bharadi, PP Janrao, VI Singh; ...

V Yadav, V Bharadi, SK Yadav - Procedia Computer Science, 2016

... Sudeep, Thepade; “Inception of Hybrid Wavelet Transform using Two Orthogonal

Transforms and It's use for Image Compression”. (IJCSIS) International Journal of

Computer Science and Information Security, 9 (6) (2011). [19]; HB ...

K Taifi, S Safi, M Fakir, R Ahdid - Proceedings of the Mediterranean Conference on …, 2016

... 2, 80–85 (2005). 2. Fondation Lalla Salma Prévention et traitement “Axe Epidemiologie Situation

et Actions” Vol. 2. 3. Balakumaran, T., Vennila, ILA., Shankar, CG: Detection of microcalcification

in mammograms using wavelet transform and fuzzy(IJCSIS). Int. J. Comput. Sci. Inf. ...

VD Kumar, P Chyne, D Kandar, BS Paul - Microsystem Technologies, 2016

... doi:10.1109/ IEEESTD.2009.5062485 Islam Md, Mondal RU, Hasan Md (2009) Performance

evaluation of WiMAX physical layer under adaptive modulation techniques and communication

channels, (IJCSIS) Int J Computer Sci Inf Secur 5(1):0910.0819 Kandar D, Dhilip kumar V ...

R Chudasama, A Joglekar

... 2(2), pp.686-690, ISSN:0975-9646, 2011. [10] BK Bharadwaj and S. Pal. “Data Mining: A prediction

for performance improvement using classification”, International Journal of Computer Science

and Information Security (IJCSIS), Vol. 9, No. 4, pp. 136-140, 2011.

A Agrawal

... [4] IETF Working Group: Mobile Adhoc Networks (MANET). http://www.ietf.org/html.

charters/manet- charter.html. [5] Meeu Chawla , Jyoti Singhai, JLRana “Clustering

in Mobile Ad Hoc Networks: A Review”, IJCSIS, Vol 8, No.2,2010 ...

MS Mahmood

Page 1. Mahmood Iraqi Journal of Science, 2016, Vol. 57, No.1A, pp: 241-252 _____

241 Hybrid Fuzzy Logic and Artificial Bee

Colony Algorithm for Intrusion Detection and Classification ...

SB Tambe, RC Thool, VR Thool - Procedia Computer Science, 2016

... On wireless commun., 14 (5) (May 2015), pp. 2769–2777. [8]; V. Kavitha, M. Punithavalli;

Clustering Time Series Data Stream – A Literature Survey, in: (IJCSIS) International Journal of

Computer Science and Information Security, 8 (1) (April 2010), pp. 289–294. ...

V Sundaram - International Journal of Applied Engineering Research, 2016

... 3972, 2011. [25] PS Revenkar, Anisa Anjum, WZ Gandhare, "Secure Iris

Authentication Using Visual Cryptography", (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 7, No. 3, 2010. [26] Chih ...

W Gharibi, H Ktaiman

... 8, Issue 1, 2011. [16] Wajeb Gharibi, Abdulrahman Mirza, “Security Risks and Modern

Cyber Security Technologies for Corporate Networks”, International Journal of Computer

Science and Information Security (IJCSIS), Vol. 9, No. 1, 2011. ...

R Priyadharsini

... 7, JULY 2009. [6] Dr.G.Padmavathi, Dr.P.Subashini, Mr.M.Muthu Kumar and Suresh Kumar

Thakur,“Performance analysis of Non Linear Filtering Algorithms for underwater images,” (IJCSIS)

International Journal of Computer Science and Information Security, Vol.6, No. 2, 2009. ...

A Ahmad, MM Rathore, A Paul, WH Hong, HC Seo

... 15-18, 2009 ICACT 2009 pp.1828-1833. [3] Zahra Forootan Jahromi and Amir Rajabzadeh, Ali

Reza Manashty “A Multi-Purpose Scenario-based Simulator for Smart House Environments”

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. ...

SD Gaikwad, K Rajpure, S Patil, S Kasare, O Parange

... 2010.. [3]. T. Vengattaraman, P. Dhavachelvan, R. Baskaran, ―Model of Cloud Based

Application Environment for Software Testing,‖ (IJCSIS)International Journal of Computer

Science and Information Security , Vol. 7, No. 3,2010. Page 4. ...

A Agarwal, SN Mehta

... 5, pp. 917-923, 2011. [9] H. Zerrouki and M. Feham “High Throughput of WiMAX MIMO- OFDM

Including Adaptive Modulation and Coding”, in proceedings of 2010 International Journal of

Computer Scienc and Information Security (IJCSIS), vol. 7, No. 1, pp. 86-91, 2010. ...

DK Gaikwad, CN Mahender

... Database Theory and Application, 2011. 11. Ladda Suanmali, Salim Naomie, and

Mohammed Salem Binwahlan, “Fuzzy Logic Based Method for Improving Text

summarization” IJCSIS, 2009. 12. Ibrahim Imam, Nihal Nounou ...

M Sarfraz, I Hussain, F Ali - International Journal of Computer Science and …, 2016

... International Journal of Computer Science and Information

Security (IJCSIS), Vol. 14, No. 2, February 2016 187 https://sites.google.com/site/ijcsis/ ISSN

1947-5500 Page 2. boxes and to increase their confusion ability. ...

H Kaur, S Ahamad, GN Verma - LEGACY, 2016

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 14,

No. ... Different methodologies may be taken in measuring complexity characteristics, for example

Baird and 30 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

M AlShaikh, L Laouamer, L Nana, A Christine - International Journal of Computer …, 2016

... Digital watermarking consists of two parts; one part that International Journal of

Computer Science and Information Security (IJCSIS), Vol. 14, No. 2, February 2016

261 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

A Tayyar

... TYPE=f(x,y)*( + ) Ahmad Tayyar1 G Special issue on “Computing Applications and Data Mining”

International Journal of Computer Science and Information Security (IJCSIS), Vol. 14 S1, February

2016 19 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

H Rastegari

... making in critical organizational situations [4]. Identification International Journal of

Computer Science and Information Security (IJCSIS), Vol. 14, No. 2, February 2016

46 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

MISS Model

... Cloud Computing is not the ultimate solution for every organization, Special issue on “Computing

Applications and Data Mining” International Journal of Computer Science and Information Security

(IJCSIS), Vol. ... 32 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

S Meenakshi, RM Suresh - International Journal of Applied Engineering Research, 2016

... Semantic concepts, local information space Online learning Linked pages Dr. Ritu Soni, Mrs.

Preeti Bakshi, “Context Based Personalized Search Engine for online learning”, IJCSIS,

International Journal of Computer Science and Information security, Vol. 8-No. 7, October 2010 ...

G SureshReddy, TV Rajinikanth, A AnandaRao

... The proposed measure is applied to supervised learning process and also for Special issue on

“Computing Applications and Data Mining” International Journal of Computer Science and

Information Security (IJCSIS), Vol. ... 39 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 ...

BE Rate

... 2, No.4, July 2012 Nuzhat Tasneem Awon, Md. Mizamur RAhman, Md, Ashraful Islam, AZM

Touhidul Islam,”IJCSIS: Effect of AWGN & Fading (Rayleigh and Rician) channels on BER

performance of a WMAX system”. Nuzhat Tasneem Awon, Md. ...

FMH Fernandez, R Ponnusamy - Indian Journal of Science and Technology, 2016

... 6. References 1. Chitraa V, Selvdoss DA. A survey on preprocessing meth- ods for web usage

data. International Journal of Computer Science and Information Security (IJCSIS). 2010;

7(3):78- 83. 2. Domenech JM, Lorenzo J. A tool for web usage mining. ...

SL KASAR, MS JOSHI - Journal of Theoretical and Applied Information …, 2016

Page 1. Journal of Theoretical and Applied Information Technology 20th March 2016.

Vol.85. No.2 © 2005 - 2016 JATIT & LLS. All rights reserved. ISSN: 1992-8645

www.jatit.org E-ISSN: 1817-3195 183 ABSTRACT Complexities ...

GR Kumar, G Mangathayaru Nimmala

... Gunupudi RajeshKumar, N. Mangathayaru, G. Narsimha (2016) ―Intrusion Detection – A Text

Mining Based Approach‖ Special issue on ―Computing Applications and Data Mining‖,

International Journal of Computer Science and Information Security (IJCSIS), 14 (1),pp. ...

A Mojahed, B de la Iglesia - Knowledge and Information Systems, 2016

Page 1. Knowl Inf Syst DOI 10.1007/s10115-016-0930-3 REGULAR PAPER An adaptive

version of k-medoids to deal with the uncertainty in clustering heterogeneous data using an

intermediary fusion approach Aalaa Mojahed1,2 · Beatriz de la Iglesia1 ...

C Devaraj Verma, MV Vijayakumar, PK Swamy

... [2] Dr. G. Padmavathi, Mrs. D. Shanmugapriya “ A Survey of Attacks, Security Mechanisms

and Challenges in Wireless Sensor Networks” (IJCSIS) International Journal of Computer

Science and Information Security.Vol. 4, No. 1 & 2, (2009). ...

G RajeshKumar, N Mangathayaru, G Narsimha - arXiv preprint arXiv:1603.03837, 2016

... Special issue on “Computing Applications and Data Mining” International Journal of Computer

Science and Information Security (IJCSIS), Vol. 14 S1, February 2016 76 https://sites.google.com/site/ijcsis/

ISSN 1947-5500 Page 2. optimize the output results. ...

S Chidambaranathan

... 336-340. [11] T.Balakumaran, Dr.ILA.Vennila, and C.Gowri Shankar,"Detection of Microcalcification

in Mammograms Using Wavelet Transform and Fuzzy Shell Clustering", (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010. ...

EW Rusdah, R Wardoyo

... 409–412. [38] T. Asha, S. Natarajan, dan KNB Murthy, “Effective Classification Algorithms to Predict

the Accuracy of Tuberculosis-A Machine Learning Approach,” International Journal of Computer

Science and Information Security (IJCSIS), vol. 9, no. 7, pp. 89–94, 2011. ...

Y UshaRani, P Sammulal - arXiv preprint arXiv:1603.03281, 2016

... Special issue on “Computing Applications and Data Mining” International Journal

of Computer Science and Information Security (IJCSIS), Vol. 14 S1, February 2016

23 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

J SEETHALAKSHMI, C JAYAKUMAR - Journal of Theoretical & Applied Information …, 2016

... [14] A. Azizi and HR Pourreza , “ Efficient voice Recognition Through Improvement of

Feature Extraction and subset Selection” , (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 2, No.1, June 2009. [15]. ...

M Janaki, P Geetha

... IPCSIT vol.9 (2011). [9] RAJU BARSKAR, ANJANA JAYANT DEEN"The Algorithm

Analysis of E-Commerce Security Issues for Online Payment Transaction System

in Banking Technology"(IJCSIS)-Vol. 8, No. 1, April 2010. [10] Dr ...

S Singh, R Kumar

... [14] Harsh Kumar Verma, Abhishek Narain Singh and Raman Kumar, "Robustness of the Digital

Watermarking Techniques against Brightness and Rotation Attack", International Journal of

Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 36-40, 2009. ...

A Hajraoui, M Sabri, M Fakir

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, February

2016 issue (Vol. 14 No. 2) 1 ... 12.3 34.2 25.9 Page 2. (IJCSIS) International Journal of Computer

Science and Information Security, February 2016 issue (Vol. 14 No. 2) 2 II. ...

BK Selvi, LMI Sheela - Middle-East Journal of Scientific Research, 2015

... Internet Ware 14. Martin Randles, David Lamb and A. Taleb-Bendiab, Cloud Computing:

Challenges. (IJCSIS) International 2010. A Comparative Study into Distributed Load Journal

of Computer Science and Information Balancing Algorithms for Cloud Computing, ...

MS Aliyu

... Reference Amin, HU, & Khan, AR (2009). Acquiring knowledge for evaluation of teacher's

performance in higher education – Using a questionnaire. (IJCSIS) International Journal of

Computer Science and Information Security, 2(1), 18-27. Al-Hakim, LAY, & Hassan, S. (2011). ...

H Singh, KS Kaswan

... Recognizing The Electronic Medical Record Data From Unstructured Medical Data

Using Visual Text Mining TechniquesProf. Hussain Bushinak. (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 9, No. ...

N Daimiwal, M Sundhararajan, R Shriram

... Neonate at Birth”. [5] Nivedita Daimiwal, “Non Invasive FNIR and FMRI system for

Brain Mapping” (IJCSIS) International Journal of Computer Science and Information

Security, Vol. 10, No. 11, November 2012. [6] Mohamed ...

AP Idowu, K Williams, E Olonade, KO Williams…

Page 1. Page 2. TABLE OF CONTENTS EDITORIAL ADVISORY BOARD

DISCLAIMER I II Designing Networks with Low Structural Congestion via Game

Theory and Linear Programming Ahmad Askarian and Andras Farago 1 ...

A Roy, JD Schaffer, CB Laramee - Applied Soft Computing, 2016

We introduce a novel approach to signal classification based on evolving temporal pattern

detectors (TPDs) that can find the occurrences of embedded temporal st.

MA Rathi, A Raipurkar

... [5] Chitraa, Dr. Antony Selvdoss Davamani, A Survey on Preprocessing Methods for Web Usage

Data, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No.

3, 2010. [6] Shahnaz Parvin Nina, Md. Mahamudur Rahaman, Md. ...

S Bhagvatula, KJ Shreyas, S Gupta, M Singh

... Englewood Cliffs, NJ.: Educational Technology Publications, 1995. [7] Brijesh Kumar Bhardwaj,

Saurabh Pal,” Data Mining: A prediction for performance improvement using classification”, (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 9, No. ...

AS Jadhav, D Kulkarni

... 9, NO. 2, FEBRUARY 2014 [11] Purvag Patel, Chet Langin, Feng Yu, and Shahram

Rahimi, "Network Intrusion Detection Types and Computation" (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 10, No. ...

NN Pawar, K Rajeswari - International Journal of Computer Applications, 2016

... [2] Anshika Pal, Deepak Singh Tomar, SC Shrivastava, Effective Focused Crawling

Based on Content and Link Structure Analysis, (IJCSIS) International Journal of

Computer Science and Information Security,Vol. 2, No. 1, June 2009. ...

SA Akar - Applied Soft Computing, 2016

Noise elimination is an important pre-processing step in magnetic resonance (MR) images

for clinical purposes. In the present study, as an edge-preserving metho.

MM Jadhav, AJ Ingale, SN Hiranwale, UM Bhavsar

... Obagbuwa, IC from Department of Computer Science Lagos State University, Lagos, Nigeria

“Application of k-Means Clustering algorithm for prediction of Student's Academic Performance”

in(IJCSIS)International Journal of Computer Science and Information Security,Vol.7,No.1 ...

DN Ribeiro, GRE Cabral - 2016

Page 1. Universidade Federal de Pernambuco Centro de Informática BS - Computer Science

Graduation Thesis SyncMySub - An Automatic Subtitle Synchronization Tool Author: Danilo Neves

Ribeiro dnr2@cin.ufpe.br Supervisor: Giordano Ribeiro Eulalio Cabral ...

HSH Aliwi, P Sumari

... 19. Kolhar M., Abu-Alhaj M., Abouabdalla O., Wan TC and Manasrah A. Comparative

evaluation and analysis of IAX and RSW. International Journal of Computer Science and

Information Technology (IJCSIS), USA, 6(3), 2013, 250–252. 20. ...

I BOUDIAF, A BENTERKI

Page 1. Ilyes BOUDIAF, Azzedine BENTERKI 113 The correlation between Knowledge

management applications and management performance progression Empirical study: knowledge

from university and progression of companies' management performance Ilyes BOUDIAF ...

M Pradhan

... Recognizing The Electronic Medical Record Data From Unstructured Medical Data Using Visual

Text Mining TechniquesProf. Hussain Bushinak. (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 9, No. 6 , 25-35. [4] Eapen, AG (2004). ...

K Sukhija - 2015

... IEEE conference publication, pp 27-33, July 2013. [12] BK Bharadwaj and S. Pal. ―Data Mining:

A prediction forperformance improvement using classification‖, International Journalof Computer

Science and Information Security (IJCSIS), Vol- 9, No.4, pp. 136-140, 2011. ...

R Manro, TDS Dua, AS Joshi - International Journal of Applied Engineering …, 2016

... 2011. [12] Ajay Prasad, Sandeep Chaurasia, Arjun Singh, Deepak Gour, “Mapping

Cloud Computing onto Useful e- Governance”, (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 8, No. 5, 2010. ...

A Khobzaoui, A Yousfate - International Journal of Computer Network and …, 2016

Page 1. IJ Computer Network and Information Security, 2016, 1, 35-42 Published Online January

2016 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.01.05 Copyright © 2016

MECS IJ Computer Network and Information Security, 2016, 1, 35-42 ...

SVV Sudhakar, KK Kiran, GB Rao, KS Raju, MU Rao…

... [7] Mr. Wankhede Vishal A, Prof. Dr. Upena Dalal, Mr. Jha Rakesh “A Survey of

Mobile WiMAX IEEE 802.16m Standard” (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 8, No. 1, April 2010. ...

BM Onywoki, ET Opiyo - arXiv preprint arXiv:1602.04620, 2016

... 1, Issue 4, October 2012 Koteswari S., Paul J., Kumar V., Manohar A., 2011, A Method for

fingerprint authentication for ATM based banking application, (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 9, No. 9, September 2011 ...

ED Kaur, ES Dogra, ES Grover

Page 1. IJIREEICE ISSN (Online) 2321 – 2004 ISSN (Print) 2321 – 5526 INTERNATIONAL

JOURNAL OF INNOVATIVE RESEARCH IN ELECTRICAL, ELECTRONICS,

INSTRUMENTATION AND CONTROL ENGINEERING Vol. 4, Issue 1, January 2016 ...

Y Himeur, KA Sadi

... Content based Zero-Watermarking Algorithm for Authentication of Text Documents. Int. J. of

Computer Science and Info. Security (IJCSIS), 7(2), 2010. [6] JM Guo, Yun-Fu Liu, Zong-Jhe

Wu. Duplication forgery detection using improved DAISY descriptor. ...

NS Al-Seelawi, TZ Ismaeel, YE Majeed - IJRCCT, 2016

... AW Naji, et al., " Novel Framework for Hidden Data in the Image Page within Executable File

Using Computation Between Advance Encryption Standard and Distortion Techniques ",

International Journal of Computer Science and Information Security (IJCSIS), Volume 3, No. ...

T THILAGAM, R VINOTH

... 37- 40. [4]. Bedi, R., Wadhai, VM, Sugandhi, R., Mirajkar, A.: Watermarking Social

Networking Relational Data using Non-numeric Attribute. International Journal of Computer

Science and Information Security (IJCSIS) 9(4), 2011, pp 74– 77. ...

J Yadav, M Kumar - Proceedings of International Conference on ICT for …, 2016

... A survey of attacks, security mechanisms and challenges in wireless sensor networks.

International Journal of Computer Science and Information Security (IJCSIS), 4(1 &

2). 3. Hanapi, ZM, Ismail, M., Jumari, K., & Mahdavi, M. (2009). ...

RP Ghom, MM Bartere

... 152, No. 5, October 2005. [3] BeenishMehboob and Rashid Aziz Faruqui,” A Stegnography

Implementation”, IEEE 2008 [4] AmanpreetKaur, “A New Image Steganography Based On First

Component Alteration Technique”, (IJCSIS) International Journal of Computer Science and ...

G Vasumathi

... 52, No. 11, November 2014. [13] HB Kekre, et al (2010) “SAR Image Segmentation using

Vector Quantization Technique on Entropy Images” (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 7, No. 3, March 2010. ...

P Shedashale, VV Patil - Analysis, 2016

... Nee and R. Prasad, “OFDM for Wireless Multimedia Communication,” Artech house Publisher,

London, 2000 [3] Bader HamadAlhasson, Mohammad A. Matin, “PAPR Performance analysis

of DFT-spread OFDM for LTE Uplink transmission” IJCSIS Volume 09 – No.10, October ...

HSH Aliwi, P Sumari - IJCSNS, 2016

... the IEEE, 1495 –1517, 2002. [2] Haj Aliwi, HS and Sumari P.: A Comparative Study

of VoIP Protocols, International Journal of Computer Science and Information Security

(IJCSIS), USA, 11(4), 97-101, 2013. [3] Haj Aliwi, HS ...

YD Hermawan, R Reningtyas, SD Kholisoh… - International Journal of …, 2016

... Comments on “Routh Stability Criterion”. International Journal of Computer Science and

Information Security (IJCSIS) 7(2): 77–78. http://arxiv.org/ftp/arxiv/papers/1003/1003.1473.

pdf; Sigal, R. 1990. Algorithms for the Routh-Hurwitz Stability Test. ...

NA Hamad - International Journal of Applied Engineering Research, 2015

... [2] JG Andrews, A. Ghosh, and R. Muhamed, Fundamentals to WIMAX Understanding Broadband

Wireless Networking, Prentice-Hall, 2007. [3] M. Gerami, “A Survey on WiMax”, International

Journal of Computer Science and Information Security (IJCSIS), Vol. 8, 2010. ...

RP Manohar, E Baburaj - IJCSNS, 2016

... [10] Prof. Arabinda Nanda, Prof (Dr) Amiya Kumar Rath, Prof. Saroj Kumar Rout, “Node Sensing

& Dynamic Discovering Routes for Wireless Sensor Networks” (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 7, No. 3, March 2010. ...

P Kale, P Dahiwale

... and Computing (ITCC). 2005; 2: 503-508. [14] Anshika Pal, Deepak Singh Tomar,

SCShrivastava, “Effective Focused Crawling Based on Content and Link Structure

Analysis”, IJCSIS Volume 2, In June 2009. [15] Qiang Zhu ...

AH Mohamed, MH El-Fouly

... [20] Hidayah, I. , Syahrina, A. and Permanasari, AE 2012. "Student Modeling using

Case-Based Reasoning in Conventional Learning System", (IJCSIS) International Journal

of Computer Science and Information Security, 10(10):21-27. ...

AT Raslan, NR Darwish

... 6. Atef Tayh Raslan, Nagy Ramadan Darwish, and Hesham Ahmed Hefny, “Towards a Fuzzy

based Framework for Effort Estimation in Agile Software Development”, International Journal

of Computer Science and Information Security, (IJCSIS) 01/2015; 13(1):37-45. ...

PB Burshi, DA Kulkarni

... [11] T.Balakumaran, Dr.ILA.Vennila , C.Gowri Shankar –“Detection of Micro calcification in

Mammograms Using Wavelet Transform and Fuzzy Shell Clustering” (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010. ...

N Zalpuri

... 5.611 Volume 5 Issue 1 January 2016 www.ijsr.net Licensed Under Creative

Commons Attribution CC BY Survey",(IJCSIS) International Journal of Computer

Science and Information Security,Vol. 13, No. 1, January 2015. [13 ...

RF AL-msie'deen - arXiv preprint arXiv:1601.07742, 2016

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. 5, 2015 Visualizing Object-oriented Software for ... 2 aka, "program understanding" or "source

code comprehension". 18 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

S Sridhar - IJITR, 2016

... Context Level – A Systematic Approach, ICMOC 2012. . S.Sridhar, S.Malathi, Estimation

of effort in software cost analysis for heterogeneous dataset using fuzzy analogy,

IJCSIS,2012, vol 10, No.10. . S.Sridhar, S.Malathi, A Novel ...

P Ranjeet, T Prakash, S Amruta, S Monali - Imperial Journal of Interdisciplinary …, 2016

... Institute of Technology, Atlanta. 4) MAAnusuya and SKKatti, “Speech Recognition

by Machine: A Review”, (IJCSIS) International Journal of Computer Science and

Information Security, vol. 6, no. 3, pp. 181-205, 2009. 5) Mohit Dua ...

A Sudiya - IOP Conference Series: Materials Science and …, 2016

... 2, No. 6, page 63 Baradwaj K Brijesh, Pal Saurabh, 2011, Data Mining: A Prediction

For Performance Improvement Using Classifica-tion, (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 9, No. 4 ...

J Wang, J Zhang, J Zhao

... IEEE Trans. Image Process. 8, 1572-1585 (1973) 22. Bhatia, N., Vandana: Survey

of nearest neighbor techniques. In: International Journal of Computer Science and

Information Security (IJCSIS), 2010, 8, 2, pp. 302-305. 23. ...

HH Aliwi, P Sumari - Indian Journal of Science and Technology, 2015

Page 1. Abstract In the last few years, multimedia communications has been

developed and improved rapidly in order to enable users to communicate between

each other over the internet. In general, the multimedia techniques ...

AA Nwaokoro, N Chukwuchekwa, KC Emerole - International Journal of Engineering …, 2016

... Transmission performance Analysis of Digital wire and wireless optical links in local and

wide Areas optical Network. (IJCSIS) International Journal of computer science and

information security, vol.3, N01 [4] Meng, YS, Lee, YH; and Ng, BC (2009). ...

M Karaaba, O Surinta, L Schomaker, MA Wiering - Computational Intelligence, 2015 …, 2015

... 19, no. 7, pp. 711–720, Jul 1997. [10] YB Jemaa and S. Khanfir, “Automatic local

Gabor features extraction for face recognition,” International Journal of Computer

Science and Information Security (IJCSIS)), vol. 3, no. 1, 2009. ...

K Swain, M Prasad, A Dash

... 3] Pallavi Verma, Namit Gupta, “Fingerprint Based Student Attendance System Using GSM”, IJSR,

Volume 2 Issue 10, October 2013 [4] R. Josphineleela, M.Ramakrishnan, “An Efficient Automatic

Attendance System Using Fingerprint Reconstruction Technique”, IJCSIS, Vol. ...

D Priyanka¹, J Malhotra

... 2, Issue. 9, September 2013. [14] Md. Ashraful Islam, Md. Zahid Hasan, “Performance

Evaluation of Wimax Physical Layer under Adaptive Modulation Techniques and

Communication Channels” IJCSIS, Vol. 5, No.1, 2009. [15 ...

N Kaur, H Aggarwal

... revenue. 6. REFRENCES [1] V.Chitraa, Dr. Antony Selvdoss Davamani, A Survey

on Preprocessing Methods for Web Usage Data, (IJCSIS) International Journal of

Computer Science and Information Security,Vol. 7- No. 3, 2010 ...

S Rathore, A Saxena, M Manoria

... [21] Ram Kumar Singh, Prof. T. Ramanujam,” Intrusion Detection System Using Advanced

Honeypots”, IJCSIS 2009. Sonali Rathore et al, / (IJCSIT) International Journal of Computer

Science and Information Technologies, Vol. 6 (4) , 2015, 3345-3348 www.ijcsit.com 3348

G Mandloi, K Pathak

... Jungmin Lee, and Kyoung Mu Lee,“Reweighted Random Walks for Graph Matching”, Computer

Vision–ECCV 2010, 2010 – Springer [3] PritiMaheswary, Dr.NamitaSrivastava, “Retrieval of

Remote Sensing Images Using Color & Texture Attribute”,(IJCSIS) International Journal ...

V Sharma, ML Sharma

... 2, April 2011. [2] Pawan Meena, Arun Jhapate & Parmalik Kumar,"Framework for Query

Optimization", (IJCSIS) International Journal of Computer Science and Information

Security Vol. 9, No. 10, October 2011. [3] Davide Martinenghi ...

YA Amgahd, R Yadav - 2016

Page 1. International Journal of Current Engineering and Technology E-ISSN 2277 –

4106, P-ISSN 2347 – 5161 ©2016 INPRESSCO®, All Rights Reserved Available

at http://inpressco.com/category/ijcet Research Article 126 ...

S Patil, P Singh

... 9, No. 1, April 2011. [4] Abbas Karimi, FaranehZarafshan, Adznan b. Jantan, AR Ramli, M.Iqbal

b.Saripan, “A New Fuzzy Approach for Dynamic Load Balancing Algorithm”, (IJCSIS) International

Journal of ComputerScience and Information Security, Vol. 6, No. 1, 2009. ...

RUI Mahdi, H Homyara, F Enam, AFMZ Abadin

... References 1. TT Aown, MA Islam, MM Rahman and AZMT Islam, “Effect of AWGN & Fading

(Rayleigh & Rician) channels on BER performance of a WiMAX communication System,”

International Journal of Computer Science and formation Security, IJCSIS, Vol. 10(8), 2012, pp. ...

MSTPB Dahikar

... August, Vol. 2 No. 2 8. Barskar, Deen, Ahemed and Bharti, “The Algorithm Analysis

of E-commerce Security Issues for Online Payment Transaction System in Banking

Technology” IJCSIS, Vol.8, no.1, April 2010. 9. GunajitSarma ...

MN Pathak, A Rajavat

... [4] Durgesh Kumar Mishra, Rashid Sheikh, Beerendra Kumar, “Privacy- Preserving k-Secure

Sum Protocol”. (IJCSIS) International Journal of Computer Science and Information Security,

Vol. ... (IJCSIS) International Journal of Computer Science and Information Security, Vol. ...

MO Hegazi - International Journal of Computer Science and …, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. ... The rest of the paper is organized as the following: Section II present the suggested model,

in section III the 59 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

MI El-Gohary, TAA Al-Zohairy, AMM Eissa… - International Journal of …, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. 12, December 2015 ... 24 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 13, No. ...

A Gupta, S Shakya

... As per Symantec, Organizations should address following four main types of ICT risks and they

are International Journal of Computer Science and Information Security (IJCSIS), Vol. 13, No.

11, November 2015 1 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

AA Hussien, NR Darwish

... Research, Cairo University, International Journal of Computer Science and

Information Security (IJCSIS), Vol. 13, No. 11, November 2015 60

https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. frequency is different ...

SL Kasar, MS Joshi - International Journal of Computer Applications, 2016

... pp. 481-489. [21] S. Karpagachelvi, Dr.M.Arthanari, M.Sivakumar,ECG Feature

Extraction Techniques - A Survey Approach, (IJCSIS) International Journal of

Computer Science and information Security, Vol. 8, No. 1, April 2010. ...

K Hassan, K Michael, SI Mrutu - International Journal of Computer Science and …, 2015

... 42. Mrutu, SI, A. Sam, and NH Mvungi, Assessment of Non Transmittable Codewords

Enhancement to 57. Viterbi Algorithm Decoding. International Journal of Communication Science

and Information Security (IJCSIS), 2014. 12: p. 9. 43. Singh, S. and S. Sujana. ...

A Khmag, AR Ramli, SJ bin Hashim, SAR Al‐Haddad - IEEJ Transactions on …, 2016

Skip to Main Content. Wiley Online Library. Log in / Register. Log In E-Mail

Address Password Forgotten Password? Remember Me. ...

B Samia, K Assia - Proceedings of the International Conference on …, 2015

... 2009. “Retrieval of Remote Sensing Images Using Colour & Texture Attribute'',

(IJCSIS) International Journal of Computer Science and Information Security,Vol.

4, No. 1 & 2, 2009. [10] Mmaheshwary, P., Srivastava, N. 2010. ...

JS Challa, P Goyal, S Nikhil, S Balasubramaniam… - … of the 8th Annual ACM India …, 2015

... 13,1(Sep 1967), 21-27. [2] N. Bhatia and Vandana. 2010. Survey of Nearest Neighbor Techniques.

International Journal of Computer Science & Information Security (IJCSIS'10) 8, 2 (2010),

302-305. [3] A. Guttman. 1984. R-trees: a dynamic index structure for spatial searching. ...

OU Ofili - European Scientific Journal, ESJ, 2015

... Retrieved from http://edition.cnn.com/2012/01/10/business/funke-opeke-cable-internet/ Qamar,

S., Lal, N., Singh, M., (2010). Internet Ware Cloud Computing: Challenges. (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 7, No. 3, March 2010. ...

R Ali

... Security, Vol.9, No. 4, 2009. [35] V.Chitraa, ASD, "A Survey on Preprocessing Methods

for Web Usage Data," (IJCSIS) International Journal of Computer Science and

Information Security, Vol. 7, No. 3, 2010. [36] Arshi Shamsi ...

BSS Zamenjani - Journal of Communications Technology, Electronics …, 2015

... dtree18.pdf. BK Bharadwaj and S. Pal. ; Data Mining: A prediction for performance

improvement using classification ; International Journal of Computer Science and

Information Security (IJCSIS), Vol. 9,No.4,pp.136-140 ; 2011.

B Barry, M Hassouna, E Bashier - 2015

... An integrated public key infrastructure model based on certificateless crytography. International

Journal of Computer Science and Information Security (IJCSIS), 11, 2013.] by proposing a new

provable secure digital signature scheme to provide true non-repudiation. ...

P Phartade, V Nawale

... Available: http://hacks-galore.org/guille/pubs/is-otm-07.pdf [5] S. Saha, “Consideration

Points: Detecting Cross-Site Scripting,” (IJCSIS) International Journal of Computer

Science and Information Security,Vol. 4, No. 1 & 2, 2009. ...

MA Mansore, MS Koushik

... No. 2, April (2012) 3. Marianne Azer, Sherif El-Kassas and Magdy El-Soudani

―A Full Image of the Wormhole Attacks towards Introducing Complex Wormhole

Attacksin wireless Ad Hoc Networks‖ in (IJCSIS) International ...

A Rengarajan, R Sugumar, C Jayakumar

... 203-211, 2008. [10] Hosam A., Mustafa A., Ahmad S., and Abbas M., “Exception Agent

Detection System for IP Spoofing Over Online Environments,” International Journal of

Computer Science and Information Security, (IJCSIS), vol. 6, no. 1, 2009. ...

NS Ahamad, JB Rao - Microelectronics, Electromagnetics and …, 2016

... Int. J. Comput. Sci. Inf. Secur. (IJCSIS). 1(1–22) (2009) Analysis and Detection of Surface

Defects in Ceramic Tile … 581 Page 8. 7. Ž. Hocenski, T. Keser, Failure detection and

isolation in ceramic tile edges based on contour descriptor analysis. ...

AJ Al-Assady, BT Shabana, HM El-Bakry - 2015

... ESRI February 2008. [3] Alharaki, OO, Alaieri, FS, Zeki,AM(2010), The Integration of GPS

Navigator Device with Vehicles Tracking System for Rental Cars Firms, (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 8, No. ...

MC Anil, SD Shirbahadurkar - Advances in Signal Processing and Intelligent …, 2016

... Page 9. Phoneme Selection Rules for Marathi Text to Speech Synthesis 509 4. Rama, N.,

Lakshmanan, M.: A Computational Algorithm based on Empirical Analysis, that Composes Sanskrit

Poetry. (IJCSIS) International Journal of Computer Science and Information Security 7(2 ...

G Kaur, D Sharma - 2015

... phase of Software Development Life Cycle. References [1] SK Dubey, A. Rana and

Mridu, “Fuzzy Model for Quantifying Usability Of Object Oriented Software System”,

IJCSIS, vol. 10, no. 4, (2012), pp. 79-83. [2] A. Desai and A ...

V Deepa, CC Benson, VL Lajish - 2015

... [24] Shofwatul Uyun, Sri Hartati, Agus Harjoko and Subanar, “Selection Mammogram Texture

Descriptors Based on Statistics Properties Back propagation Structure”, (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 11, No. 5, May 2013. ...

R Yadav, K Garg

... [22]. K. Shrivastava, P. kumar and KR pardasani, “FP-Tree and COFI Based Approach for Mining

of Multiple Level Association Rules in Large database,” International Journal of Computer

Science and Information Security (IJCSIS), Vol.7, No. 2, 2010. [23]. ...

SA Jaju, SS Chowhan - … ), 2015 International Conference and Workshop on, 2015

... [2] [3] [4] [5] Abari Ovye, John PB, Shola Simon Philip, Comparative Analysis Of Discrete

Logarithm and Rsa Algorithm In Data Cryptography, (IJCSIS) Information International

Security,Vol. Journal of Computer Science and 13, No. 2,( 2015). ...

KV Shriram, PLK Priyadarsini, A Baskar - International Journal of Advanced …, 2015

... 1, No. 2, pp.33–36, ISSN: 2231-2307. Kondekar, VH, Kolkure, VS and Kore, SN (2010) 'Image

retrieval techniques based on image features: a state of art approach for CBIR', International

Journal of Computer Science and Information Security, IJCSIS, January, Vol. 7, No. ...

AJ Hussain, D Al-Jumeily, H Al-Askar, N Radi - Neurocomputing, 2015

This paper presents a novel type of recurrent neural network, the regularized dynamic

self-organized neural network inspired by the immune algorithm. The regula.

K El Fahssi, A Elmoufidi, A Abenaou, S Jai-Andaloussi… - RECENT ADVANCES in …, 2015

... [9] T. Balakumaran, Dr. Ila. Vennila, C. Gowri Shankar, Detection of microcal- cification

in mammograms using wavelet transform and fuzzy shell clus- tering,(ijcsis) international

journal of computer science and information security, vol. 7, no. ...

H Alsaiari, M Papadaki, P Dowland, S Furnell - Information Security Journal: A Global …, 2015

... Lashkari, AH, Farmand, S., Zakaria, D., Bin, O., & Saleh, D. (2009). Shoulder surfing attack

in graphical password authentication. International Journal of Computer Science and

Information Security (IJCSIS), 6(2), 145–154. View all references). ...

A Sergeev, V Minchenkov, V Bashun - … (AICT), 2015 9th International Conference on, 2015

... Intel, USA (2007) [2] AMD64 Virtualization Codenamed "Pacifica" Technology, Secure Virtual

Machine Architecture Reference Manual. AMD, USA (2005) [3] K. Biswas, "Hardware Virtualization

Support In INTEL, AMD And IBM Power Processors", IJCSIS, Vol. 4, No. ...

JA Gallian, D Stewart - AKCE International Journal of Graphs and …, 2015

A graph G with q edges is said to be harmonious if there is an injection f from the vertices

of G to the group of integers modulo q such that when each edge xy.

MS Yadav, MS Singh, MA Awasthi

... 12, no.1, PP. 58. [09] HB Kekre, Tanuja Sarode, Sudeep Thepade, “Inception of Hybrid Wavelet

Transform using Two Orthogonal Transforms and It‟s use For Image Compression”, International

Journal of Computer Science and Information Security(IJCSIS),Vol. 9, No. ...

AL Norton - International Journal of Computer Science and …, 2015

... Page 2. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. 11, November 2015 ... 5 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 3. (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 13, No. ...

N Yadav, S Chaudhary - 2015

... Systems, 2008. [14] Mohammad A. Mikki “Energy Efficient Location Aided Routing

Protocol for Wireless MANETs”,(IJCSIS) International Journal of Computer Science

and Information Security Vol. 4, No. 1 & 2, 2009. [15] Sujatha ...

E Gajendra, MJ Kumar

... Based Cardiac Arrhythmia Classification From Ecg Signal Data”. [14] S.Karpagachelvi,

Dr.M.Arthanari, M.Sivakumar, “Ecg Feature Extraction Techniques - A Survey Approach”, IJCSIS)

International Journal of Computer Science and Information Security,Vol. 8, No. 1, April 2010. ...

P Vahdani Amoli - 2015

Page 1. 231 JYV Ä SKYL Ä STUDIESINCOMPUTING Unsupervised Network Intrusion Detection

Systems for Zero-Day Fast-Spreading Network Attacks and Botnets Payam Vahdani Amoli Page

2. JYVÄSKYLÄ STUDIES IN COMPUTING 231 Payam Vahdani Amoli ...

A Khan, Z Ansari

... [3] S.Zulaikha Beevi , M.Mohammed Sathik , K.Senthamaraikannan, “A Robust Fuzzy Clustering

Technique with Spatial Neighborhood Information for Effective Medical Image Segmentation”

(IJCSIS) International Journal of Computer Science and Information Security, Vol. ...

AALA Rahman, S Islam - Maintenance and Evolution of Service-Oriented and …, 2015

... Applications, pp. 28-33, 2010 [15] S. Qamar, LN Lal and M. Singh, “ Internetware

cloud computing challenges”, IJCSIS International Journal of Computer Science

Information Security, vol.7, no.3, March 2010. [16] T. Schaefer ...

N Bajpai, R Alawadhi, A Thakare, S Avhad, S Gandhat - medical science

... [10]Vishwaratana Nigam, Divakar Yadav and Manish K Thakur, “A-Novel-Approach-for-

Hand-Analysis-UsingImage-Processing- Techniques”, (IJCSIS) International Journal Of

Computer Science and Information Security,Vol. 8, No. 2, 2010 ...

S Kohli, KS Dhindsa, R Khanna

... He has reviewed several referred journals of national and international repute such as

IJCSIS (USA), JECR (USA), IJCTE(Singapore), JAIT of Academy Publisher (Finland),

IJCA (USA) and IAENG International Journal of Computer Science ...

S Sharma, SS Mehta, S Kulshrestha - Proceedings of the World Congress on …, 2015

... [10] Karpagachelvi S., Arthanari M., Sivakumar M., “ECG Feature Extraction

Techniques - A Survey Approach”, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 8, No. 1, pp: 76-80, April 2010. ...

MGK Cheema - system

... Tech. Mag., vol. 1,no. 3, Sep. 2006. [4] B.SathishKumar,KRShankar Kumar and R.Radhakrishnan,“

An Efficient Inter Carrier Interference Cancellation Schemes for OFDM Systems,”(IJCSIS)

International Journal of Computer Science and Information Security,Vol. 6, No. 3, 2009. ...

A Vinay, D Hebbar, VS Shekhar, KNB Murthy… - Procedia Computer Science, 2015

... [30]; S. Jain, M. Chouhan; Content Based Image Retrieval By Clustering using (SIFT) Algorithm.

In the Proceedings of International Journal of Computer Science and Information Security

(IJCSIS), 1 (1) (June 2013). [31]; Morel, Jean-Michel, Yu. Guoshen; ...

S Koprda, Z Balogh, D Hruby, M Turcam - … Systems and Informatics (SISY), 2015 IEEE …, 2015

... 1828-1833. [3] ZF Jahromi, A. Rajabzadeh, and AR Manashty, "A Multi- Purpose

Scenario-based Simulator for Smart House Environments," International Journal of

Computer Science and Information Security (IJCSIS), vol. 9, pp. 13-18, 2011. ...

S Kumar, A Chauhan

... Lee, and Kyoung Mu Lee,“Reweighted Random Walks for Graph Matching”, Computer

Vision–ECCV 2010, 2010 – Springer [3] Priti Maheswary, Dr. Namita Srivastava, “Retrieval of

Remote Sensing Images Using Colour & Texture Attribute”,(IJCSIS) International Journal of ...

HS SWATI

... protocol in MANET. REFERENCES [1] Palanisamy, P.Annadurai, “Impact Of Rushing

Attack On Multicast In Mobile Ad Hoc Network”, (IJCSIS) International Journal Of

Computer Science And Information Security, Vol. 4, No. 1 & ...

C SAADI, H CHAOUI

... [11]. Ram Kumar Singh : Intrusion Detection System Using Advanced Honeypots,

(IJCSIS) International Journal of Computer Science and Information Security, Vol.

2, No. 1, 2009 [12]. S. Riebach, B. Toedtmann, E. Rathgeb. ...

C Sanga

... (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 5, May

2015 1 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 3. The following subsections

discuss the techniques use in MintRoute protocol and AODV protocol in launching ...

A Gupta, S Shakya - 2015

... August 2009. [12] A. Gupta, S. Shakya, “Information System Audit; A study for security

and challenges”, 2015, International Journal for Computer Science and Information

Security, IJCSIS November 2015 Volume 13, No. 11. [13 ...

S Bouteldja, A Kourgli - Systems, Signals and Image Processing (IWSSIP), …, 2015

... performance. REFERENCES [1] P.Mmaheshwary, N.Srivastava, “Retrieval of remote

sensing images using colour & texture attribute'', (IJCSIS) International Journal of

Computer Science and Information Security,Vol. 4, No. 1 & 2, 2009. ...

J Basha, D Rajesh

... Recognizing The Electronic Medical Record Data From Unstructured Medical Data Using Visual

Text Mining TechniquesProf. Hussain Bushinak. (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 9, No. 6 , 25-35. [4] Eapen, AG (2004). ...

R Guha, P Prasad, S Acharya

... 19, 2004. [6]. A.Rajaram, Dr.S.Palaniswami, “A Trust-Based Cross-Layer Security

Protocol for Mobile Ad hoc Networks”, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 6, No. 1, 2009. [7]. Cross ...

E Kouzari, VC Gerogiannis, I Stamelos, G Kakarontzas

... Viju, GK, Elsalam, MMMA, Ibrahim, KA, & Jassim, MJM, 2013. Important Problems in Adopting

Software Process Improvement by the Small and Medium Enterprises–A Comparative Analysis.

International Journal of Computer Science and Information Security (IJCSIS). 1(1), 16. ...

S Beygbabaei - International Journal of Computer Science and …, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. ... We have Training data set D includes n elements that can be defined as follows: = {( , 1,1}}

=1 (1) 181 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

OC Otieno - International Journal of Computer Science and …, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. 10, October 2015 ... There will be an overview of the functions of knowledge-based systems

and 173 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

M Mohibullah, MZ Hossain, M Hasan - International Journal of Computer Science and …, 2015

... 4. Repeat steps 1 to 3 until there is no change in the medoid. International Journal of Computer

Science and Information Security (IJCSIS), Vol. 13, No. 10, October 2015 61 https://sites.google.

com/site/ijcsis/ ISSN 1947-5500 Page 2. IV. DEMONSTRATION OF K-MEDOIDS ...

C Mouli, S Agrawal - International Journal of Computer Science and …, 2015

... Each packet has a fixed packet size ie ps=1500, which is the maximum International Journal

of Computer Science and Information Security (IJCSIS), Vol. 13, No. 10, October 2015

10 https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

OA Dawood, AMS Rahma, AMJA Hossen - International Journal of Computer Science …, 2015

... [17] Karim Sultan and Umar Ruhi, "Overcoming Barriers to Client-Side Digital Certificate

Adoption", (IJCSIS) International Journal of Computer Science and Information Security, Vol.

13, No. 8, August 2015. Ph. D Research Scholar Omar A. Dawood1. Prof. ...

SA Khan, DM Sable

... [13] K. Kumar, J. Nafeesa Begum, Dr.V. Sumathy, “A Novel Approach towards Cost Effective

Region-Based Group Key Agreement Protocol for Secure Group Communication”,in (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 8, No. 2, 2010. ...

AP Nirmala, R Sridaran

... 4262. [26] APNirmala, Dr. R. Sridaran,“A Novel architecture for improving performance

under virtualized environments” (IJCSIS) International Journal of Computer Science

and Information Security, Vol. 13, No. 1, January 2015. ...

FA Mazarbhuiya, Y Perwej

... Vol 1(1), Nov 2010, Japan. [6] FA Mazarbhuiya (2014); Discovering Yearly Fuzzy Patterns,

International Journal of Computer Science and Information security (IJCSIS) Vol. 12,

No. 9, September 2014. [7] M. Shenify and FA Mazarbhuiya ...

KM Senagi, G Okeyo, W Cheruiyot, M Kimwele - Service Oriented Computing and …

... Minaei B, Saadat P (2009) SOAP serialization performance enhancement design and

implementation of a middleware. IJCSIS Int J Comput Sci Inf Secur 6(1):106–110. 15.

AbuGhazaleh N, Lewis M (2005) Differential deserialization for optimized soap performance. ...

S Bonarrigo, V Carchiolo, A Longheu, MP Loria… - MATEC Web of …, 2015

... 199–209, 2013. 6. Carchiolo, V., Longheu, A., Malgeri, M. & Mangioni, G., Search for overlapped

communities by parallel genetic algorithms. IJCSIS, 6, no.2, 2009. 7. Leskovec, J., Adamic, LA

& Huberman, BA, The dynamics of viral mar-keting. ACM Trans Web, 1(1), 2007. ...

OS Adebayo, M Olalere, JN Ugwu - 2015

... References Adebayo, OS, Waziri, VO, Ojeniyi, JA, Bashir, SA and Mishra, A. (2012), 'Information

security on the communication network in Nigeria based on digital signature', International Journal

of Computer Science & Information Security (IJCSIS), Vol. 10, No. 11, pp. 57-63. ...

DB Abdullah - International Journal of Computer Science Issues ( …, 2015

... B., Yaseen A.," An Approach for Designing Distributed Real time Database", International Journal

of Computer Science and Information Security ISSN: 19475500 Volume: 8 Issue: 6 Pages:

78-87 Provider: LJS Publisher and IJCSIS Press- DOAJ Publisher: LJS Publisher and ...

V Yadav, VA Bharadi

... [17] HB Kekre, Tanuja K. Sarode and Sudeep D. Thepade, “. Inception of Hybrid Wavelet

Transform using Two Orthogonal Transforms and It's use for Image Compression”, (IJCSIS)

International Journal of Computer Science and Information Security,Vol. 9, No. 6, 2011. ...

P KAUR, S KUMAR, AP SINGH - Journal of Multiple-Valued Logic & Soft Computing, 2015

Page 1. 357 J. of Mult.-Valued Logic & Soft Computing, Vol. 25, pp. 357–377 Reprints

available directly from the publisher Photocopying permitted by license only ©2015

Old City Publishing, Inc. Published by license under the ...

SJ AL-SARDIA

... Amin, HU, & Khan, AR (2009). Acquiring knowledge for evaluation of teachers' performance in

higher education – Using a questionnaire. (IJCSIS) International Journal of Computer Science

and Information Security, 2(1). Anderson, L., Jackson, SE, & Russell, SV (2013). ...

L Kumar, PK Dahiya - International Journal of Applied

... Service Science (NISS), 2010, pp. 393-398. EA Mary Anita and V. Vasudevan,

"Performance Evaluation of mesh based multicast reactive routing protocol under black

hole attack," IJCSIS, Vol. 3, No. 1, 2009. Payal N. Raj, Prashant ...

RR Borgohain, B Goswami

... Power Syst., vol.5, no. 4, pp. 1535–1550, Nov. 1990. [4] Mrs. JP Rothe, Dr. AK Wadhwani and

Mrs. S. Wadhwani, “Short Term Load Forecasting Using Multi Parameter Regression”, (IJCSIS)

International Journal of Computer Science and Information Security,Vol. 6, No. ...

MR Deore, RV Patil

... sensor networks,” International Journal of Peer to Peer Networks (IJP2P), Vol.2, No.2, April 2011

[6] Dr. G. Padmavathi and Mrs. D. Shanmugapriya,” A Survey of Attacks, Security Mechanisms

and Challenges in Wireless Sensor Networks”, (IJCSIS) International Journal of ...

P Lipar, MČPŠJ Prezelj

Page 1. Strojniškivestnik - Journal of Mechanical Engineering Volume(Year)No,

StartPage-EndPage Paper received: 00.00.200x UDC xxx.yyy.z Paper accepted:

00.00.200x *Corr. Author's Address: University of Ljubljana, Faculty ...

R Sharma, J Malhotra - 2015

... 2011. [12] Md. Mizanur Rahman and Nuzhat Tasneem Awon ―Effect of AWGN & Fading (Rayleigh

& Rician) channels on BER performance of a VANET communication System‖, (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 10, No. ...

MS Yadav, MS Singh

... 12, no.1, PP. 58. [09] HB Kekre, Tanuja Sarode, Sudeep Thepade, “Inception of Hybrid Wavelet

Transform using Two Orthogonal Transforms and It‟s use For Image Compression”, International

Journal of Computer Science and Information Security(IJCSIS),Vol. 9, No. ...

G Jagdev, S Singh, T Singh, DS Joshi

... 10, no. 6, pp. 536-545 , 2013. [13] Dr. SB Thorat, SK Nayak, and JP Dandale, “Facial

recognition technology: an analysis with scope in India,” International Journal of Computer

Science and Information Security(IJCSIS), vol. 8, no. 1, pp. 325- 330, 2010 ...

N Yadav, SD Thepade

... Dr. Tanuja K. Sarode, Dr. SudeepD.Thepade, Ms.Sonal Shroff, “Instigation of OrthogonalWavelet

Transforms using Walsh, Cosine, Hartley, KekreTransforms and their use in ImageCompression”,

International Journal of Computer Science and Information Security (IJCSIS), Vol 9 ...

HR El-Taj - International Journal of Computer Science and …, 2015

... 27-33, 2010. [7] Homam El-Taj, Firas Najjar, Iliba Alsenawi, Mohannad Najjar, "Intrusion Detection

and Prevention Response based on Signature-Based and Anomaly-Based: Investigation Study"

(IJCSIS) International Journal of Computer Science and Information Security, Vol. ...

A Srivastava, A Banoudha

... [20]. RS Kasana, Ratnesh Kumar Jain, Suresh Jain, "Visualization of Mined Pattern and its

Human Aspects", IJCSIS, Vol. 4, No. 1 & 2, 2009. [21]. O. Hoeber, Joshua Gorner,"BrowseLine:

2D Timeline Visualization of Web Browsing Histories.” 2009. [22]. ...

F Thiel, M Esche, D Peters, U Grottker - 17th International Congress of Metrology, 2015

... Security Alliance, “The Notorious Nine Cloud Computing Top Threats in 2013” 2013, Avaliable

from: https://cloudsecurityalliance.org/research/top- threats/ [13] CMR da Silva et al., Systematic

Mapping Study On Security Threats in Cloud Computing (IJCSIS) International Journal ...

NM Zaitoun, MJ Aqel - Procedia Computer Science, 2015

... (2012, September). “Enhanced Techniques for PDF Image Segmentation and Text Extraction”.

International Journal of Computer Science and Information Security (IJCSIS). Volume 10 (issue

9). [5]; Rajeshwar Dass, Priyanka, Swapna Devi. (2012, January-March). ...

K Sankareswari, SA Jothi - International Journal, 2015

... IEEE Region 10 Conf., Nov. 2008, pp.1–5. 12. P. Revenkar, A. Anjum, and W. Gandhare,

Secure iris authentication using visual cryptography, Int. J. Comput. Sci. (IJCSIS), vol.

7, no. 3, pp. 217–221, Mar. 2010. AUTHOR(S) PROFILE ...

R Yadav, K Garg - International Journal of Computer Science and …, 2015

... 21. Shrivastava VK, kumar P. and pardasani KR, "FP-Trce and COFI Based Approach for Mining

of Multiple Level Association Rules in Large database". International Journal of Computer

Science and Information Security (IJCSIS), Vol.7, No. 2, 2010. 22. ...

S Deepthi Kavila - International Journal of Modern Education & Computer …, 2015

... Methods 39 Copyright © 2015 MECS IJ Modern Education and Computer Science,

2015, 10, 33-39 Text Summarization‖, (IJCSIS) International Journal of Computer

Science and Information Security, Vol2 No1 2009. [8] Rasim ...

AM Nikam, SN Shelke

... Network Security, vol. 1, no. 3, pp. 163-170, Aug. 2012. [10] “Shoulder Surfing attack

in graphical password Authentication” (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 6, No. 2, 2009 [11 ...

MS AN, RA Dhumal

... ACM, vol. 22, no.11,pp. 612–613, 1979. [2] Dr. Durgesh Kumar Mishra, Neha Koria, Nikhil Kapoor,

Ravish Bahety,”A Secure Multi-Party Computation Protocol for Malicious Computation Prevention

for preserving privacy during Data Mining”, IJCSIS) International Journal of ...

AS Bhoir, A Gulati

... conference on Asian Language Processing, 2010. [13] Ladda Suanmali, Naomie Salim and

Mohammed Salem Binwahlan, ”Fuzzy Logic Based Method for Improving Text Summarization”,

International Journal of Computer Science and Information Security (IJCSIS), Vol. 2, No. ...

VK Singh, DS Kushwaha, R Sujane, M Taram

... [7] S.Santhosh baboo and B.Narasimhan, “ A Hop-by-Hop Congestion-Aware Routing

Protocol for Heterogeneous Mobile Ad- hoc Networks”, International Journal of Computer

Science and Information Security (IJCSIS), Vol. 3, No. 1, 2009. ...

OO Adeosun, OS Folaranmi, IA Adeyanju, OI Omotosho… - International Journal of …, 2015

... http://www.informit.com/ articles/article.aspx, Accessed 9th March, 2015. [3] Rathi, S. and

Thanuskodi, K. (2009). A Secure and Fault-tolerant framework for Mobile IPv6 based networks.

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 5, No. 1. ...

MY Kharaji, FS Rizi - arXiv preprint arXiv:1510.00805, 2015

... (IJCSIS) International Journal of Computer Science and Information Security, Vol.

12, No. 4, April 2014 59 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page

2. choice because it causes some problems in many systems. ...

S Kabeer, AK Singh - International Journal for Innovative Research in …, 2015

... and JC Birget, ―Graphical Passwords‖, The Rutgers Schloar, An Electronic Bulletin for

Undergraduate Research, vol 4, 2002 [3] Farnaz Towhidi , Maslin Masrom ,‖ A Survey on

Recognition-Based Graphical User Authentication Algorithms‖, (IJCSIS) International Journal ...

M Tavfeeq, AX Das, AK Jaiswal - 2015

... IEEE Trans. Broadcasting, vol. 53, no. 1, pp. 8-13. B. Sathish Kumar, KR Shankar

Kumar, and R.Radhakrishnan (2009), An Efficient Inter Carrier Interference

Cancellation Schemes for OFDM Systems, IJCSIS, Vol. 6, No. 3. Yong ...

R Pal, S Pal

... 208- 217, 2013. [25] BK Bharadwaj and S. Pal. “Data Mining: A prediction for performance

improvement using classification”, International Journal of Computer Science and

Information Security (IJCSIS), Vol. 9, No. 4, pp. 136-140, 2011.

N Narwal, SK Sharma, AP Singh - Proceedings of the Third International Symposium …, 2015

... [15] Neetu Narwal, Mayank Singh, 2013. Web Content Extraction A Heuristic Approach,

International Journal Of Computer Science and Information Security, Vol 11, No 1 pp

1-4. DOI= https://sites.google.com/site/ijcsis/vol-11-no-1-jan- 2013. 594

Y Amsalem, A Puzanov, A Bedinerman, M Kutcher… - SPIE Optical Engineering+ …, 2015

... [5] Harsh, KV, Abhishek, NS and Raman K., "Robustness of the Digital Image Watermarking

Techniques against Brightness and Rotation Attack", International Journal of Computer

Science and Information Security, IJCSIS, Vol. 5, No. 1 (2009). ...

R Kaur, R Tiwari - International Journal of Research, 2015

... 150-153. [2] Kumar, S. and Multoo, S. 2011. “Steganography based on contourlet

Transform,” International Journal of Computer Science and Information Security (IJCSIS),

9 (6), PP. 215-220. | [3] Kumar, KS, Raja, KB, &Pattnaik, S. 2011. ...

S Chatterjee, AK Kar - … Informatics (ICACCI), 2015 International Conference on, 2015

... [31] Raju Barskar, Anjkna Jayant Deen: The Algorithm Analysis of E-Commerce Security Issues

for Online Payment Transaction System in Banking Technology (IJCSIS) 8(1) (2010) [32] Source:

A recent study on Smart Metering Project, given by Bracknwell Forest Homes [33 ...

M Kala, M Sumathi

... Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS

2011) December 20-22, 2011 [7] Dr. G. Padmavathi, and Mrs. D. Shanmugapriya ―Simulation

of a Secure Ad Hoc Network Routing Protocol‖- (IJCSIS) International Journal of ...

K Mittal, P Garg

... [7] DE Tim Lienmullar, Dr. G. Padmavathi, Mrs. D. Shanmugapriya, ―A Survey of Attacks, Security

Mechanisms and Challenges in Wireless Sensor Networks‖. In proceedings of (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 4, No. ...

I Thamarai, S Murugavalli

... 1,2079-8407,2010. [10] Saleem Basha, Dhavachelvan P, “Analysis of Empirical

Software Effort Estimation Models”, International Journal of Computer Science and

Information Security (IJCSIS), 1947- 5500,Vol. 7, No. 3, 2010. ...

KS Babu, C Sathvik

... 1, Page.262 269. 6.K.Suresh Babu, K.ChandraSekhariah, “Securing AODV with Authentication

Mechanism Using Cryptographic Pair Of Keys”, International Journal of Computer Science and

Information Security(IJCSIS), USA, Vol 11 No. 2, pp 42-45, February 2013. ...

PA Sawakare, RR Deshmukh, PP Shrishrimal

... [4] MA Anusuya, SK Katti, “Speech Recognition by Machine: A Review”, (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 6, No. 3, 2009.

[5] XD Huang, "A Study on Speaker - Adaptive Speech Recognition", Proc. ...

H Gull, S Alrashed, SZ Iqbal - Procedia Computer Science, 2015

... Web Engineering: Modelling and Implementing Web Applications, Springer (2008).

[2]; Hina G., Farooque A., Zafar I. “(IJCSIS) International Journal of Computer Science

and Information Security”, Vol. 8, No. 9, December 2010. ...

I Al Rassan, H Alyahya - Procedia Computer Science, 2015

... References. [1]; Minaei, B., Saadat, P. (2009). SOAP Serialization Performance Enhancement

Design and implementation of a middleware. International Journal of Computer Science and

Information Security, IJCSIS, Vol. 6, No. 1, pp. 105-110, October 2009, USA. ...

C Wang, X Wu - Digital Signal Processing (DSP), 2015 IEEE …, 2015

... REFERENCES [1] S. Karpagachelvi, M.Arthanari, M. Sivakumar, "ECG feature

extraction techniques—a survey approach," International Journal of Computer

Science and Information Security,(IJCSIS), vol. 8, pp. 76-80, 2010. ...

A Kushwaha, P Joshi

... challenges in wireless sensor networks,” International Journal of Computer Science

and Information Security(IJCSIS), Vol.4, No.1 & 2, 2009. [4] Kalpana Sharma and

MK Ghose, “Wireless Sensor Net- works: An Overview on its ...

OC Otieno - arXiv preprint arXiv:1509.02073, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13

No. 8, August 2015 Managing & Analyzing Large Volumes of ... Page 2. (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 13 No. 8, August 2015 ...

J OWOLABI, AO ADEDAYO, AO AMAO-KEHINDE… - GLOBAL JOURNAL OF …, 2015

... Jegede, PO (2009). Predictors of JAVA Programming self-efficacy among engineering

students in Nigeria University. International Journal of Computer Science and information

security (IJCSIS), 4 (1-2), 1-7. Retrieved from https://archive. ...

S Singh, ES Singh

... REFERENCES [1]. Gaurav Vijayvargiya, Dr. Sanjay Silakari, Dr. Rajeev Pandey “A Survey:

Various Techniques of Image Compression,” International Journal of Computer Science

and Information Security (IJCSIS), Issue No. 10, vol. 11, Oct.2013. ...

KIASMM Salih

... Volume 8– No.9. [11] Sushil Kumar & SKMuttoo (2011). “Steganography based on

Contourlet Transform “ ,(IJCSIS) International Journal of Computer Science and

Information Security,Vol. 9, No. 6 . [12] Jianping Zhou; Cunha ...

T Kamalakis - 2015

Page 1. Curriculum Vitae & Description of Publications Dr. Thomas Kamalakis Assistant Professor

Department of Informatics and Telematics Harokopio University of Athens August, 2015 Page 2.

CV and Description of Publications: Dr. Thomas Kamalakis Page 2 / 48 ...

D Zurale, H Tankaria, M Mandalia, R Sheth

... [5] Steven w. Smith, Digital Signal processing-A practical guide for engineers and Scientists,

Demystifying Technology Series. [6] Mary Lourde R, Anjali Kuppayil Saji ; “ A Digital Guitar Tuner”

[J]. (IJCSIS) International Journal of Computer Science and Information Security, (Vol. ...

MYM AL-SABAAWI

... [8]. Garg, Poonam,(2010), Critical Success factors for Enterprise Resource Planning

implementation in Indian Retail Industry: An Exploratory study,(IJCSIS) International

Journal of Computer Science and Information Security,Vol. ...

A Candelieri, D Soldi, F Archetti - Procedia Engineering, 2015

... Analysis, WDSA, 2014 (Procedia Engineering). [18]; V. Kavitha, M. Punithavalli;

Clustering Time Series Data Stream – A Literature Sur-vey. (IJCSIS) International

Journal of Computer Science and Information Security, 8 (2010), p. 1. ...

RR Patil, PS Mohod - International Journal of Computer Science and …, 2015

... 28, No. 12, December 2006. 4. Yousra BEN JEMAA and Sana KHANFIR "Automatic

local Gabor features extraction for face recognition" (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 3, No. 1, 2009. ...

V Agrawal, V Shrivastava - 2015

... less prediction. REFERENCES [1] S.Basha and P.Dhavachelvan, ―Analysis of

Empirical Software Effort Estimation Models‖ in International Journal of Computer

Science and Information Security (IJCSIS), Vol. 7, 2010. [2] B ...

AA Ali, RM Shafi - International Journal of Computer Science and …, 2015

... 557-564, Nov 2010. [19], T. Vengattaraman, P. Dhavachelvan, R. Baskaran, "Model of Cloud

Based Application Environment for Software Testing", (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 7, No. 3,2010. Althaf Ali A. Research Scholar. ...

NIPSRIM SURYANI, GMA SASMITA, IK ADI - Journal of Theoretical and Applied …, 2015

Page 1. Journal of Theoretical and Applied Information Technology 31st August 2015. Vol.78.

No.3 © 2005 - 2015 JATIT & LLS. All rights reserved. ISSN: 1992-8645 E-ISSN:

1817-3195 456 AUDIT OF ACCOUNTING INFORMATION SYSTEM USING ...

KS Babu, S Saikumar

... 13. K.Suresh Babu, K.Chandra Sekhariah, “Securing AODV With Authentication Mechanism

Using Cryptographic Pair Of Keys”, International Journal of Computer Science and Information

Security (IJCSIS), USA, Vol 11 No. 2, pp 42-45, February 2013. 14. ...

D RAJAKUMARI, C JAYANTHI

... [11] Rajakumari D. An Efficient Classification Using Machine Learning Approach on Breast Cancer

Datasets. IJCSIS, ISSN 1947-5500 [12] Rajakumari D. A Weightinh Based Feature Selection

and Monotonic Classification (WFSMC) for the Effective Prediction of Outliers. ...

S Choudhary, S Devraj, N Gargote

... REFERENCES [1] Kondekar VH, Kolkure VS, Kore S. N, “Image Retrieval Techniques based

on Image Features: A State of Art approach for CBIR,” (IJCSIS) International Journal of

Computer Science and Information Security,Vol. 7, No. 1, 2010. ...

L Kumar, PK Dahiya - Performance Evaluation, 2015

... Science (NISS), 2010, pp. 393-398. [18] EA Mary Anita and V. Vasudevan,

”Performance Evaluation of mesh based multicast reactive routing protocol under

black hole attack,” IJCSIS, Vol.3, No.1, 2009. [19] Payal N. Raj, Prashant ...

MJH Landage, MMP Wankhade

Page 1. COMPUSOFT, An international journal of advanced computer technology,

3 (10), October-2014 (Volume-III, Issue-X) 1116 Ensemble-based Malware Detection

with Different Voting Schemes Ms. Jyoti H. Landage1, Prof. ...

P Dahiwale, MM Raghuwanshi, L Malik

... and Computing (ITCC). 2005; 2: 503-508. [16] Anshika Pal, Deepak Singh Tomar,

SCShrivastava, “Effective Focused Crawling Based on Content and Link Structure

Analysis”, IJCSIS Volume 2, In June 2009. [17] Qiang Zhu ...

Z Baharudin, P Nallagownden - Applied Mechanics and Materials, 2015

... PER-7, pp.56-57, (1987). 10.1109/mper.1987.5527072 [3] D. Mrs. J. p. Rothe, AK Wadhwani,

Short Term Load Forecasting Using Multi Parameter Regression, International Journal of

Computer Science and Information Security (IJCSIS), Vol 6, (2009). ...

K HIMAJA, MR KUMAR - 2015

... 1113 [6] B.Sathish Kumar KRShankar Kumar “An Efficient Inter Carrier Interference

Cancellation Schemes for OFDM Systems”. (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 6, No. 3, 2009. ...

K HIMAJA, MR KUMAR - 2015

... 2005. [6] B.Sathish Kumar KRShankar Kumar “An Efficient Inter Carrier Interference

Cancellation Schemes for OFDM Systems”. (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 6, No. 3, 2009. ...

MP Saxena

... Ad -Hoc Network Routing Protocols”, WiSe 2003, September 19, 2003, San Diego, California,

USA.Copyright 2003 ACM 1581137699/03/0009 [6] V. Palanisamy1, P.Annadurai2, “Impact of

rushing attack on Multicast in Mobile Ad Hoc Network”, (IJCSIS) International Journal of ...

L Molligoda, PG Wijayarathna

... 2):257-286.February 1989. [3] MA Anusuya, SK Katti, “Speech Recognition by Machine:

A Review”, International Journal of Computer Science and Information Security

(IJCSIS), Vol. 6, No. 3, 189-196, 2009 [4] JF Mark JF Gales ...

P SRILATHA, JV LAKSHMI - 2015

... [5] S. Saha, “Consideration Points: Detecting Cross-Site Scripting,”(IJCSIS) International Journal of Computer

Science and Information Security,Vol. 4, No. 1 & 2, 2009. ...

CR Rubi - 2015

... 2. MAAnusuya and SKKatti ,Department of Computer Science and Engineering,Sri

Jayachamarajendra College of Engineering, Mysore, India, (IJCSIS) International

Journal of Computer Science and Inform4 ation Security,2009. ...

VV Deotare, DD Jain, DV Padole

... 2009 [10] Ms. Shilpa Kale, FPGA-based Controller for a Mobile Robot (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 3, No. 1,

2009 [11] J. Gonzalez-Gomez, E. AguayoE. Boemo. Locomotion ...

GVR Babu, M Padmavathamma

... 2011). “Recognizing The Electronic Medical Record Data From Unstructured Medical

Data Using Visual Text Mining Techniques”, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 9, No. 6, 25-35. ...

S Singh

... [13] Shahid Hussain, Muhammad Zubair Asghar, Bashir Ahmad and Shakeel Ahmad. A Step

towards Software Corrective Maintenance: Using RCM model.(IJCSIS) International Journal of

Computer Science and Information Security Vol. 4, No. 1 & 2, 2009. [14]Ch. ...

A Galwash, A Youssif, RA Abdulmunem

... 2009. [8] Mohit Soni ,Sandesh Gupta, MS Rao, Phalguni Gupta, “ A New Vein

Pattern-based Verification System”, International Journal of Computer Science and

Information Security (IJCSIS),vol. 8, issue. 1, pp 58-63, 2010. ...

ND SWATHI, T SAIKUMAR - 2015

... 3483, pp.1159 -1168, 2005. [5]. M. Deriche, “ GCC License Plates Detection and

Recognition Using Morphological Filtering and Neural Networks,” Int J. on Comp. Sci.

and Info Security, IJCSIS, vol. 8, No. 8, pp. 263-269, Dec, 2010. ...

S Chinthaluri, P Reddy, K Nara

... Venice, Italy: Università Ca' Foscari. Pp.43– 50. 2003. [8] L. Suanmali, Salim N. and MS

Binwahlan, “Fuzzy Logic Method for Improving Text Summarization.” International Journal of

Computer Science and Information Security (IJCSIS), vol. 2(1), pp. 65- 70. ...

A Kaur, R Kaur - International Journal, 2015

... 2011, pp. 222–225. 16. V. Ashok, T. Balakumaran, C. Gowrishankar, Dr. ILA.Vennila, Dr.A.Nirmal

kumar, “The Fast Haar Wavelet Transform for Signal & Image Processing”, (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 7, issue 1, 2010. 17. ...

SY Nivedita - International Journal, 2015

... 5, issue 1, Mar. 2010. [14] V. Ashok, T. Balakumaran, C. Gowrishankar, Dr. ILA.Vennila,

Dr.A.Nirmal kumar, “The Fast Haar Wavelet Transform for Signal & Image Processing”, (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 7, issue 1, 2010. ...

M Suchithra, OK Sikha - Security in Computing and Communications, 2015

... In: Proceedings of the XXVIII International Convention MIPRO 2005, pp. 205–210, Rijeka (2005)

6. Jagadeesan, A., Duraiswamy, K.: Secured cryptographic key generation from multimodal

biometrics: feature level fusion of fingerprint and iris. (IJCSIS) Int. J. Comput. Sci. Inf. ...

KU Khan, U Qamar - Complex, Intelligent, and Software Intensive Systems ( …, 2015

Page 1. Improved Single-Label Text Categorization by Instance Filtration Kashif Ullah Khan

Department of Computer Engineering, College of EME, National University of Sciences and

Technology (NUST), Islamabad, Pakistan ...

M Mirsaeidi, A Karimi

... and Technology), IAJIT (the International Arab Journal of Information Technology), Engineering

Letters, Entertainment ACM (Association of Computer Machinery), IJACSA (International Journal

of Advanced Computer Science and Applications), and IJCSIS (International Journal ...

N Mduma, K Kalegele - arXiv preprint arXiv:1508.03441, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. 7, July 2015 ... 34 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 13, No. 7, July 2015 ...

AV Mbaziira, E Abozinadah, JH Jones Jr - arXiv preprint arXiv:1508.04123, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No.7, July 2015 Evaluating Classifiers in Detecting 419 Scams in ... Page 2. (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 13, No.7, July 2015 ...

A Deokar, K Dhok, K Kakkar, S Dighe

... also be applied. V. REFERENCES 1. PSRevenkar, Anisa Anjum, WZGandhare,

“Secure Iris Authentication Using Visual Cryptography”, (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 7, No.3 ...

P Mulak, N Talhar

... [2] Pang-Nang Tan, Michael Steinbach, Vipin Kumar, “Data Mining". [3] Nitin Bhatia ,

Vandana, “Survey of Nearest Neighbor Techniques” (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 8, No. ...

T Karthikeyan, S Archana

... Distributed System Security Symposium, NDSS, 2003. [5] V. Palanisamy and P.

Annadurai, Impact of Rushing attack on Multicast in Mobile Ad Hoc Network, IJCSIS,

Vol. 4, No. 1 & 2, August 2009, USA. [6] YihChun Hu, Adrian Perrig ...

MA Thakare, MS Chaudhari

... 1, Issue 4, June 2013, ISSN:2320-9798, PP 925-929. [7] V.Chitraa, Dr. Antony Selvdoss

Davamani,” A Survey on Preprocessing Methods for Web Usage Data”, in International Journal

of Computer Science and Information Security (IJCSIS), Vol. 7, No. ...

S Al-iesawi, MA Rajab, IA Ahmed

Page 1. IJCCCE Vol.15, No.1, 2015 80 Joint Hybrid Compression Techniques and

Convolutional Coding for Wireless Lossy Image Transmissions Salah Al-iesawi

1 , Maha Abd Rajab 2 , and Ahmed IA 3 1 Computer Science ...

M Saeb - In other words, 2015

... References: 1. Rabie Mahmoud, Magdy Saeb, "Power-based Key Hopping (PBKH) and

Associated Hardware Implementation," International Journal of Computer Science & Information

Security (IJCSIS), VOL.8 No.9, Dec. ... http://sites.google.com/site/ijcsis/vol-8-no-9-dec-2010. ...

MR Thakare, SW Mohod, AN Thakare

... Oyelade, O. J, Oladipupo, O. O, Obagbuwa, I. C” Application of k- means Clustering

algorithm for prediction of Students Academic Performance” (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 7, 2010. ...

JAJ Prabu - 2015

... [5] Dr. S Qamar, Niranjan Lal, Mrityunjay Singh, “Internet Ware Cloud Computing :Challenges”,

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No.

3, March 2010. [6] Palivela Hemant, Nitin.P.Chawande, Avinash ...

SW Mohod, CA Dhote, VM Thakare

... 3–12. [5] Vidhya.KA, G.Aghila “A Survey of Naïve Bayes Machine Learning approach

in Text Document Classification” (IJCSIS) International Journal of Computer Science

and Information Security, Vol. 7, No. 2, 2010. [6] Tom ...

OK Girija, MS Elayidom

... Image Mining TechniqueFor Brain Tumour Classification Using Efficient classifier.

(IJCSIS)International Journal of Computer Science and Information Security, Vol.6,

No. 3, 2009. [16] S.-F. Chang, A. Eleftheriadis, and R. McClintock ...

L Fang - Control, Automation and Robotics (ICCAR), 2015 …, 2015

... REFERENCES [1] Fang Li, Maylor KH Leung, Cheng Shao Chian, Making Palm Print Matching

Mobile, (IJCSIS) International Journal of Computer Science and Information Security, vol.6,

no. 2, 2009. ...

MA Bode, SA Oluwadare, BK Alese, AFB Thompson - Cyber Situational Awareness, …, 2015

Page 1. RISK ANALYSIS IN CYBER SITUATION AWARENESS USING BAYESIAN APPROACH

Moyinoluwa Abidemi Bode Department of Planning/ICT Engineering Materials Development

Institute Akure, Ondo State, Nigeria ...

A Elgohary, TS Sobh, SA Nouh, M Zaki

... 9239 [12] A. Sabari, K.Duraiswamy, "Ant Based Adaptive Multicast Routing Protocol

(AAMRP) for Mobile Ad Hoc Networks ", International Journal of Computer Science

and Information Security (IJCSIS), Vol.6, No. 2, 2009. [13 ...

A Aboshosha, AE Authority, KA ElDahshan…

... Section IV gives the implementation and security analysis. Finally, Section V contains the

conclusion remarks. (IJCSIS) International Journal of Computer Science and Information Security,

Vol. 13, No. 6, June 2015 14 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

RK Nayak, ASDM Manoria

... Rafiqul Islam, AW Naji, AAZaidan, BBZaidan “ New System for Secure Cover File of Hidden Data

in the Image Page within Executable File Using Statistical Ste- ganography Techniques”,

International Journal of Com- puter Science and Information Security (IJCSIS), ISSN: 1947 ...

A Rathore, R Srivastava

... University, 2008. [13] V. Palanisamy, P.Annadurai, “Impact of Rushing Attack on

Multicast in Mobile Ad Hoc Network”, International Journal of Computer Science and

Information Security (IJCSIS), Volume: 04, No. 1 and 2, 2009.

AP Alfiani, FA Wulandari - International Conference on Agro-industry (IcoA): …, 2015

... References. Bhardwaj and Pal, 2011a; Bhardwaj Brijesh Kumar, Pal Saurabh (2011) Data

Mining: A Prediction For Performance Improvement Using Classification, (IJCSIS) International

Journal Of Computer Science And Information Security, Vol. 9, No. ...

D Devidas Bobade, VR Mankar - Global Journal of Researches In Engineering, 2015

Page 1. © 2015. Sunil Devidas Bobade & Dr.Vijay R. Mankar. This is a

research/review paper, distributed under the terms of the Creative Commons

Attribution-Noncommercial 3.0 Unported License http://creativecommons.org ...

P Patil, B Sunag - Advance Computing Conference (IACC), 2015 IEEE …, 2015

... by 22%. • Hence, CBIR using texture-color features is efficient and boosts

performance. X. REFERENCES [1] (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 9, No. 2, February 2011. Content ...

S Jendoubi, A Martin, L Liétard, BB Yaghlane, HB Hadji - Symbolic and Quantitative …

... IJCSIS 8 (2), 302–305 (2010) 6. Bunke, H., Foggia, P., Guidobaldi, C., Sansone, C., Vento, M.:

A comparison of algorithms for maximum common subgraph on randomly connected graphs.

In: Caelli, T., Amin, A., Duin, RPW, de Ridder, D., Kamel, M.(eds.) SSSPR 2002. ...

G SCHUH, A BRÄKLING, T DRESCHER - 2015

... 231-262. Berlin: Springer. Pal, A., Tomar, DS, Shrivastava, SC, (2009), Effective

Focused Crawling Based on Content and Link Structure Analysis. International Journal

of Computer Science and Information Security (IJCSIS) 2(1). ...

G Sriram, Y Srinivas, KT Reddy

... REFERENCES [1] Brijesh Kumar Bhardwaj, Saurabh pal, “A prediction for

performance improvement using classification”, (IJCSIS) International Journal of

Computer science and Information Security, vol. 9, No.4, APRIL 2011. ...

APSP Singh - Australian Journal of Information Technology and …

... 29-36. [9] Umesh Kumar Singh, Shivlal Mewada, Lokeshla ddhani, Kamal Bunkar,

"An Overview and Study of Security Issues &Challenges in Mobile Ad-hoc Networks

(MANET)",IJCSIS,2011,pp.106-111. [10] SinaHamedheidari ...

J Ruby, K David

... 10 Issue 2 (Ver 1.0), April 2010. [9]. Bharadwaj. BK & S. Pal. “Data Mining: A prediction for

performance improvement using classification”, International Journal of Computer Science

and Information Security (IJCSIS), Vol. 9, No. 4, pp. 136-140, 2011. [10]. ...

R Sendre

... [3] F. Johnson & S. Kumar, “Web content mining using genetic algorithm”, In Proc. Springer,

CCIS 361, pp. 82-93, 2013. [4] V. Chitraa and Dr. AS Davamani, “A Survey on Preprocessing

Methods for Web Usage Data”, IJCSIS, Vol. 7, No. 3, pp. 78-83, 2010. ...

NA Shelke, PN Chatur

... 54, no. 4, april 2006. [8] Mrs Neeta Deshpande and Dr. Archana rajurkar “Review

of Robust Video Watermarking Algorithms” ( IJCSIS) International Journal of Computer

Science and Information Security, Vol. 7, No. 3, March 2010. ...

A Kajirunga, K Kalegele - arXiv preprint arXiv:1507.00176, 2015

... Section five provides discussion. The last section is conclusion and recommendation where we

provide some (IJCSIS) International Journal of Computer Science and Information Security, Vol.

13, No. 6, June 2015 49 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

CSE HOD, I Chhattisgarh - 2015

... (2009). A new image steganography based on first component alteration technique. International

Journal of Computer Science and Information Security (IJCSIS), 6, 53-56. ... (IJCSIS) International

Journal of Computer Science and Information Security, 8(7), October. ...

S Thakur, S Rana, V Thakur - technology, 2015

... Their guidance and motivation conceived a direction in me. REFERENCES [1] AziziA., H.

Reza,.”Efficient IRIS Recognition through Improvement of Feature Extraction and subset Selection”,

(IJCSIS) International Journal of Computer Science and Information Security, 2009. ...

M Saini, P Singh - 2015

... Lett., vol. 38, no. 5, pp. 246–247, Feb. 2002. [17] BSKumar KRSKumar,An Efficient Inter Carrier

Interference Cancellation Schemes for OFDM Systems,(IJCSIS) International Journal of

Computer Science and Information Security, Vol. 6, No. 3, 2009. ...

M Al-Saleem, N Al-Kathiry, S Al-Osimi, G Badr - Machine Learning and Data Mining in …, 2015

A Prakash, DM Urs, S Lahari, HS Preetish…

... Recognition and Verification Using MFCC & VQ”, International Journal of Emerging Science and

Engineering (IJESE) ISSN: 2319–6378, Volume-1, Issue-7, May 2013 [2] MAAnusuya and

SKKatti, “Speech Recognition by Machine: A Review”, (IJCSIS) International Journal of ...

KM Alhawiti

... publication/254198356_Software_Engineering_Usin g_Artificial_Intelligence_Techniques_

Current_State_and_Open_Proble ms/links/544771110cf2f14fb811f118.pdf [2] Anusuya, AM and

Katti, KS “Speech Recognition by Machine: A Review”, (IJCSIS) International Journal of ...

N Al-Saati, R Abdul-Jaleel - arXiv preprint arXiv:1506.08789, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. 5, 2015 Requirement Tracing using Term Extraction ... Page 2. (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 13, No. 5, 2015 ...

DM Daniel, B Monica - 2015

... 47 nr. 3, pp 38-43, ISSN: 1221-6542, 2008; 16. A. Jagadeesan, K. Duraiswamy, “Secured

Cryptographic Key Generation From Multimodal Biometrics”, (IJCSIS) International Journal of

Computer Science and Information Security, IJCSIS, Volume 7, No. 2, Febuary 2010; 17. ...

S Vijayalakshmi, S Geetha - Wireless Communication, 2015

... Supp. Syst., vol. 51, pp. 176–189, 2011. T. Vengattaraman, P. Dhavachelvan, R. Baskaran,

―Model of Cloud Based Application Environment for Software Testing,‖ (IJCSIS) International

Journal of Computer Science and Information Security , Vol. 7, No. 3, 2010. ...

C Saadi, H Chaoui, H Erguig - International Review on Computers and Software ( …, 2015

... Vol. 6 (1) 597-602, 2015, Prof. T. Ramanujam Ram Kumar Singh Intrusion Detection

System Using Advanced Honeypots (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 2, No. 1, 2009. Vinila ...

K Singh, M Singh - 2015

... J. Comput. Sci. Inf. Secur. (IJCSIS), 2009, 4, (1), pp. 1–9 [10] Hero Modares, Rosli Salleh and

Amirhossein Moravejosharieh, “Overview of security Issues in Wireless Sensor Networks”, IEEE

2011 Third Int. Conf. on Computational Int., modeling & simulation, pp. 308-311 ...

G Kaur - Journal of Network Communications and Emerging …, 2015

... Tech. Mag., vol. 1, no. 3, Sep. 2006. [4] B.SathishKumar,KRShankar Kumar and

R.Radhakrishnan,“An Efficient Inter Carrier Interference Cancellation Schemes for OFDM

Systems,”(IJCSIS) International Journal of Computer Science and Information Security,Vol. 6, ...

A Varma, YS Chouhan - 2015

... [10]. Bharadwaj, BK & Pal, S. (2011). Data mining: a prediction for performance

improvement using classification. International Journal of Computer Science and

Information Security (IJCSIS), 9(4), 136-140. [11]. Bezdek, JC (2011). ...

HA Mahmoud, HMRE Hadad - International Journal of Image Mining, 2015

... 22, No. 2, pp.121–142. El-Henawy, I., Mahmoud, HA, El Bakry, HM and El Hadad, HM (2014)

'Bovines muzzle identification using box-counting', (IJCSIS) International Journal of Computer

Science and Information Security, May, Vol. 12, No. 5, pp.29–34, USA. ...

P Sambyal

... September 1st - 3rd, 1998. [14] Sushil Kumar and SKMuttoo (2011), “Steganography

based on Contourlet Transform”, (IJCSIS) International Journal of Computer Science

and Information Security, Vol. 9, No. 6. [15] Ankita Gangwar ...

MH Talukder, MM Rahman

... Aminul Islam, Md. Azmal Absar Dalim. “An Optimized Perona- Malik Anisotropic Diffusion

Function for Denoising Medical Image”. International Journal of Computer Science

and Information Security (IJCSIS), Vol. 11, No. 4, April 2013. ...

MS Rajalakshmi, P Sampath, MK Anitha

... 958-9618, 2008. 4. DilipKumar SM and Vijaya Kumar BP ,'Energy-Aware Multicast

Routing in MANETs: A Genetic Algorithm Approach', International Journal of Computer

Science and Information Security (IJCSIS), Vol. 2, 2009. ...

KA Dharshini, CS Kumar, EBT Alwar

... [2] Faizal MA, Mohd Zaki M., Shahrin S., Robiah Y, Siti Rahayu S., Nazrulazhar B.: “Threshold

Verification Technique for Network Intrusion Detection System”, (IJCSIS) International Journal

of Computer Science and Information Security,Vol. 2, No. 1, 2009. ...

J Ramkumar, R Murugeswari

... Timothy J.Ross Mcgraw Hill, Inc, ”Fuzzy Logic with Engineering applications“ [15]. A. Baddache,

A. Belmehdi, “Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks,”

International Journal of Computer Science and Information Security (IJCSIS). ...

P RAVI, A ASHOKKUMAR

... Behrouz Forouzan and Firouz Mosharraf, Foundation of computer Science . [8] (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 11, No. 10,

October 2013 “ A Survey: Various Techniques of Image ...

SB Magre, RR Deshmukh, PP Shrishrimal

... International Journal Of Computer Applications In Engineering, Technology and Sciences

(IJCAETS), 6 May 2013 [3] MA Anusuya, S. K .Katti “Speech Recognition by Machine: A Review”

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. ...

D Khattab, HM Ebied, AS Hussein, MF Tolba - Computational Science and Its …, 2015

... Beevi, SZ, Sathik, MM, Senthamaraikannan, K.: A robust fuzzy clustering technique with spatial

neighborhood information for effective medical image segmentation. Interna- tional Journal of

Computer Science and Information Security (IJCSIS) 7(3), 132–138 (2010) 22. ...

B Iswarya, T Sathyapriya

... [6] J. Smola, B. Scholkopf, A tutorial on support vector regression, Stat Comput 14 (2004)

199–222. [7] Vidhya.KA, G.Aghila‖ A Survey of Naïve Bayes Machine Learning approach

in Text Document Classification‖ (IJCSIS) Vol. 7, No.2, 2010.

PV Anoop, VP Arulkumar

... REFERENCES [1] Hossein Rouhani Zeidanloo and Azizah Bt Abdul Manaf, “ Botnet

Detection by Monitoring Similar Communication Patterns”, (IJCSIS) International Journal

of Computer Science and Information Security, Vol. 7, No. 3, 2010. ...

FB Salem - International Journal of Modelling, Identification and …, 2015

Page 1. Int. J. Modelling, Identification and Control, Vol. 23, No. 3, 2015 213

DTC-SVM-based position regulation of an induction motor: a comparison between

different strategies Fatma Ben Salem Sfax Engineering School, University ...

O Holland, H Bogucka, A Medeisis - 2015

Page 1. Oliver HOlland, Hanna BOgucka, and arturas Medeisis HOlland BOgucka

Medeisis details the paradigms of opportunistic spectrum sharing and white space

access as effective means to satisfy increasing demand for ...

SRS Sree, N Radha

... 2012. 10. Nazmeen bibi boodoo, RKSubramanian, “Robust multi-biometric recognition

using face and ear images”, IJCSIS-International journal of computer science and

information security, Vol.6, No.2, 2009. 11. Nageshkumar ...

SD Thepade, RH Garg, SA Ghewade, PA Jagdale…

... HBKekre, Dr. Tanuja K. Sarode, Sudeep D. Thepade and Ms. Sonal Shroff, "Instigation of

Orthogonal Wavelet Vector quantization methods using Walsh, Cosine, Hartley, Kekre's Vector

quantization methods and their use in Image Compression", (IJCSIS) International Journal of ...

S Roy, R Bose, D Sarddar

... ACM Computer Network Performance Symposium, 1982, pp. 47-55. [16] A. Karimi,

F. Zarafshan, A. b. Jantan, AR Ramli, and MI b. Saripan, “A New Fuzzy Approach for

Dynamic Load Balancing Algorithm,” IJCSIS, vol. 6, no. 1, 2009. ...

A Zingerle, L Kronman

... Massachusetts Institute of Technology. [18] Longe, OB, Mbarika, V., Kourouma, M.,

Wada, F., Isabalija, R., 2009, “Seeing Beyond the Surface: Understanding and

Tracking Fraudulent Cyber Activities”. IJCSIS Vol.6, No.3, 2009. ...

S Parthiban, P Rodrigues

... References [1] Rizvi, S and Elleithy, M, (2009) 'A new scheme for minimizing malicious behavior

of mobile nodes in Mobile Ad Hoc Networks', IJCSIS Internation Journal of computer Science

and Information Security. Vol.3, No.1, pp. 45-54. 10 15 20 25 30 35 40 45 50 40 45 50 ...

MS Gowtham, M Sudha - 2015

... Congestion-Aware Routing Protocol for Heterogeneous Mobile Ad-hoc

Networks”,International Journal of Computer Science and InformationSecurity (IJCSIS),

Vol. 3, No. 1, 2009. [9] V. Thilagavath, Dr. K. Duraiswamy,“Cross Layer ...

M Danasekar, V Venkatachalam - 2015

... controller for active queue management supporting TCP flows”, Information Sciences, Elsevier,

Jan 2010 [8] N. Saravana Selvam., Dr. S. Radhakrishnan,” Processor Based Active Queue

Management for providing QoS in Multimedia Application”, (IJCSIS) International Journal ...

D Priyanka¹, J Malhotra

... 2, Issue. 9, September 2013. [14] Md. Ashraful Islam, Md. Zahid Hasan, “Performance

Evaluation of Wimax Physical Layer under Adaptive Modulation Techniques and

Communication Channels” IJCSIS, Vol. 5, No.1, 2009. [15 ...

K BOUKRI, H CHAOUI

... management and security (IJCSIS) International Journal of Computer Science and

Information Security, Vol. 13, No. 5, May 2015 91 http://sites.google.com/site/ijcsis/ ISSN

1947-5500 Page 2. information with others. This shortage reduces ...

R Kaur, J Kumar - 2015

... [10] Harsh K Verma, Abhishek Narain Singh and Raman Kumar, “Robustness of the Digital

Image Watermarking Techniques against Brightness and Rotation Attack,” International Journal

of Computer Science and Information Security (IJCSIS), 2009. ...

S Bhattacharyyaa, G Sanyalb

... Data Hiding using Pixel Mapping Method (pmm), International Journal of Com- puter Science

and Information Security (IJC- SIS), 8, 2010 ... Approach of Data Hiding using Pixel Mapping Method,

International Journal of Computer Science and Information Security (IJCSIS), 8, 2010 ...

D Samantaa, G Sanyalb

... 13. HB Kekre, Saylee Gharge, Tanuja K Sarode. SAR Image Segmentation using Vector Quanti-

zation Technique on Entropy Images, Interna- tional Journal of Computer Science and Infor-

mation Security (IJCSIS), 7(3), March 2010. 14. G Moser, J Zerubia and SB Serpico. ...

K Zainal, NF Sulaiman, MZ Jali

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol.

13, No. 3, March 2015 ... This research is funded by RAGS, under Ministry of Education, Malaysia.

66 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

SKA Shah, Z Ali, N Ali - Journal for Studies in Management and Planning, 2015

... Company, Inc 8. Amin, H. & Khan, AR. (2009). Acquiring Knowledge for Evaluation of Teachers'

Performance in Higher Education – using a Questionnaire. International Journal of Computer

Science and Information Security (IJCSIS), Vol. 2, No. 1. Page 12. ...

SB Dhonde, SM Jagade

... Volume. 55, Issue 2, Pages 237-251 February 2013. [2] MAAnusuya, SKKatti,

“Speech Recognition by Machine: A Review”, International Journal of Computer

Science and Information Security (IJCSIS), Vol. 6, No. 3, 2009. [3 ...

O Pomorova, O Savenko, S Lysenko, A Kryshchuk… - Computer Networks, 2015

... Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 6(1), 97–104 (2009). 10. Choi, H., Lee, H.: Identifying

botnets by capturing group activities in DNS traffic. Comput. Netw. 56, 20–33 (2012). 11. Roshna,

RS, Vinodh, E.: Botnet detection using adaptive neuro Fuzzy inference system. Int. ...

SD Bobade, VR Mankar - 2015

... 21, NO. 12, pp: 2330- 2333, Dec.2013. Sunil Devidas Bobade and Dr. Vijay R.Mankar,” Low

footprint Hybrid Finite field multiplier for Embedded cryptography”, International Journal of

Computer Science and Information Security(IJCSIS) , Vol. 13, No. 3, pp: 28- 32,March 2015. ...

J Patel, ND Patel, NS Patel - 2015

... 4, No. 2, 2012, pp. 1-9. 12. PS Vadivu and VK David, “Enhancing and Deriving Actionable

Knowledge from Decision Trees,” Interna- tional Journal of Computer Science and Information

Se- curity (IJCSIS), Vol. 8, No. 9, 2010, pp. 230-236. 13. Prof. ...

M Goga, S Kuyoro, N Goga - Procedia-Social and Behavioral Sciences, 2015

... Sheffield Hallam University, UK (2001). Yadav et al., 2012; SK Yadav, BK Bhardwaj, S. Pal; Mining

Education Data to Predict Student's Retention: A comparative Study. International Journal of

Computer Science and Information Security (IJCSIS), 10 (2) (2012), pp. 113–117. ...

A Pranav, S Chauhan - 2015

... [3] Anshika Pal, Deepak Singh Tomar, SC Shrivastava, “Effective Focused Crawling

Based on Content and Link Structure Analysis” (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 2, No. 1, June 2009. ...

N Goyal, R Bajaj - Journal of Network Communications and Emerging …, 2015

... REFERENCES [1] Nazmeen Bibi Boodoo, RK Subramanian, “Robust Multi-biometric

Recognition Using Face and Ear Images,” in (IJCSIS) International Journal of Computer

Science and Information Security,Vol. 6, No. 2, 2009 [2] PD Garje1, Prof. ...

Z Milevski, E Gelova, Z Zdravev - Yearbook-Faculty of Computer Science, 2015

... 2, no. 6 (2011). Yadav SK, Bharadwaj B., Pal S.:Mining Education Data to Predict

Student's Retention - A comparative Study, (IJCSIS) International Journal of Computer

Science and Information Security, vol. 10, no. 2 (2012). ...

GN Prabhu, K Jain, N Lawande, N Kumar, Y Zutshi…

... Ahybridintrusiondetections ystemdesignfor computer network security”, Computer and Electrical

Engineering, vol.35,pp.517–526,2009 [7] Euge`neC.Ezin,HervéAkakpoDjihountry,

”Java-BasedIntrusionDetectionSystemina Wired Network”,](IJCSIS) International Journal of ...

A Tiwari

... REFERENCES [1] A Karimi, Z Faraneh , A Jantan and AR Ramli, “A New Fuzzy

App.roach for Dynamic Load Balancing Algorithm,” International Journal of Computer

Science and Information Security (IJCSIS), Vol. 6, No 1, 2009, pp. ...

A Tiwari

... REFERENCES [1] A Karimi, Z Faraneh , A Jantan and AR Ramli, “A New Fuzzy

App.roach for Dynamic Load Balancing Algorithm,” International Journal of Computer

Science and Information Security (IJCSIS), Vol. 6, No 1, 2009, pp. ...

MKR RANGA

... graph below. References: 1. Niraimathi .S, M. Arthanari, M. Sivakumar , A Fuzzy

Approach to Prevent Headlight Glare, IJCSIS) International Journal of Computer

Science and Information Security,Vol. 9, No. 2, February 2011. 2 ...

MS Chaudhary, MP Thanvi

... [4] Dr. G. Padmavathi and Mrs. D. Shanmugapriya, A Survey of Attacks, ―Security Mechanisms

and Challenges in Wireless Sensor Networks‖, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 4, No. 1 & 2, 2009. [5] Md. ...

AS Abdullah

... 9, Issue 2, No 1,ISSN (Online): 1694-0814 . [6] Sushil Kumar and SKMuttoo (2011).

“Steganography based on Contourlet Transform “ ,(IJCSIS) International Journal of Computer

Science and Information Security, Vol. 9, No. 6 . [7] Chang C. et al., (2002) . ...

D Nigam, S Tiwari, R Kumar

... network”, 978-1-4673-1101-4/12/$31.00 ©2012 IEEE [8] S.Santhoshbaboo and

B.Narasimhan,“A Hop-by-Hop Congestion-Aware Routing Protocol for Heterogeneous Mobile

Ad-hoc Networks”,International Journal of Computer Science and Information Security (IJCSIS), ...

MT Chaudhry, M Sher

Page 1. Secure Group Based Biometric Authentication Approach for Mobile Ad hoc Networks

Developed by Muhammad Tallal Chaudhry (544-FBAS/MSCS/F09) Supervised by Prof. Dr.

Muhammad Sher MSCS-F09 Department of Computer Science & Software Engineering ...

MS Iraji - Journal of Asian Scientific Research, 2015

... Communication, vol. 2, pp. 319-323, 2011. [12] C. Yaashuwanth and DR Ramesh, "A

new scheduling algorithms for real time tasks," International Journal of Computer Science

and Information Security (IJCSIS), vol. 6, pp. 61-66, 2009. [13 ...

A Dahane, NE Berrached, A Loukil - Computer Science and Its Applications, 2015

... Computer Communications Journal 30(14-15), 2826–2841 (2007) 16. Chawla, M., Singhai, J.,

Rana, JL: Clustering in Mobile Ad- hoc Networks: A Review. International Journal of Computer

Science and Information Security (IJCSIS) 8(2), 293–301 (2010) Page 13. ...

PD Virulkar, AN Bhute

... 2010. [6] M. Irfan, et.al “Management of Location Based Advertisement Services

using Spatial Triggers in Cellular Networks” (IJCSIS) International Journal of

Computer Science and Information Security, Vol.6, No. 1, 2009. [7 ...

YN Suralkar, GR Pathak

... REFERENCES [1] G. Padmavathi, D. Shanmugapriya, “A survey of attacks security

mechanism and Challenges in Wireless Sensor Networks”, (IJCSIS) International Journal

of Computer Science and Information Security,2009, Vol. 4, No. ...

P Sumathi, BU Maheswari

... 2, No. 2, June 2012, ISSN: 2046-6447. [15] V.Chitraa and Antony Selvdoss Davamani,

“A Survey on Preprocessing Methods for Web Usage Data”, (IJCSIS) International Journal

of Computer Science and Information Security, vol. 7, no. 3, 2010. ...

S Ravikumar - 2015

... 57. Gomathi, M & segmentation using fuzzy possibilistic C- arXiv preprint arXiv:1004.1768,

(IJCSIS) International Journal of Computer Science and Information Security, vol.7, no. 3, pp.

222-228. 58. c- Communication, vol.48, issue12, pp.1638-1649. 59. ...

S Kumar, P Narula, T Ahmed

... [21] Panchal, VK, Singh, P., Kaur, N., & Kundra, H. (2009). Biogeography based satellite image

classification. (IJCSIS) International Journal of Computer Science and Information Security,.

6(2), 269-274. [22] Panchal, VK, Goel, S., Bhatnagar, M. (2009). ...

K Yadav, J Bhattacharya - 2015

... R&D Canada -Valcartier,Innovative Interfaces and Interactions Group 3. S. Sumathi, SK Srivatsa,

M. Uma Maheswari, in “Vision Based Game Development Using Human Computer Interaction,”

International Journal of Computer Science and Information Security, IJCSIS, Vol. ...

M Langarizadeh, E Khajehpour, H Khajehpour… - Iranian Journal of Medical …, 2015

... 16. Ocampo E, Cabrera MM. Integration of rule based expert systems and case based reasoning

in an acute bacterial meningitis clinical decision support system. IJCSIS. 2010;7(2):112-8. 17.

Ocampo E, Maceiras M, Herrera S, Maurente C, Rodríguez D, Sicilia MA. ...

Y FARHAOUI

... [7] Farhaoui Y, Asimi A. Performance method of assessment of the intrusion detection and

prevention systems. IJEST. 2011;3(7). [8] Farhaoui Y, Asimi A. Performance assessment of tools

of the intrusion detection and prevention systems. IJCSIS. 2012;10(1). ...

VN Luong, HHC Nguyen, VS Le - arXiv preprint arXiv:1505.01535, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. 5, May 2015 An improvement on fragmentation in Distribution ... Page 2. (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 13, No. 5, May 2015 ...

S Kumar - International Journal of Computer and Communication …, 2015

... 1-4). Huanggang, China. [10] Kumar, S., & Muttoo, SK (2011, June). Steganography based

on contourlet transform. International Journal of Computer Science and Information Security

(IJCSIS), 90(6). [11] Kumar, S., & Muttoo, SK (2013, April). ...

MHM Khan - Codes, Cryptology, and Information Security, 2015

... tion System. (IJCSIS) International Journal of Computer Science and Information

Security 8(1) (2010) 7. Badawi, A.: Hand Vein Biometric Verification Prototype: A

Testing Performance and Patterns Similarity. In: Proceedings ...

MRRAM Ashish, B Kharate

... REFERENCES [1] Peter Veprek, AB Bradley “An improved algorithm vector quantization design”

1070-9908 IEEE. [2] Dr. HB Kekre and Tanuja Sarode “New Cluste Algorithm For Vector

Quantization Using Rotation of Error Vec IJCSIS Vol.7 No.3 2010. ...

A Meiappane, VP Venkataesan, V Premanand

... [28] Lashkari AH, Saleh R., Farmand F., Zakaria OB (2009) A Wide range Survey on Recall Based

Graphical User Authentications Algorithms Based on ISO and Attack Patterns“, International

Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. ...

I Marcu, SV Halunga - Wireless Personal Communications

... Awon, NT, Islam, A., Rahman, M., & Touhidul Islam, AZM (2012). Effect of AWGN & fading (Raleigh

& Rician) channels on BER performance of a WiMAX communication system. International Journal

of Computer Science and Information Security (IJCSIS), 10(8). 11–17. 14. ...

D Napoleon, E Ramaraj

... 2006. [7] Priti Maheswary, Dr. Namita Srivastava, '' Retrieval of Remote Sensing

Images Using Colour & Texture Attribute'', (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 4, No. 1 & 2, 2009. ...

P Saxena, S Shrivastava, AS Bundela

... 4(1), pp. 110-118, 2011. [10] Arutehelvan G., Sivatsa S. K, Jaganathan R., Inaccuracy minimization

by partitioning fuzzy data sets- validation of an analytical methodology, (IJCSIS) International Journal

of Computer Science and Information Security, vol. 8, no. 1, 2010. ...

A Kaur, TP Singh

... 2, No. 5, October, 2010. [24] V. PALANISAMY, P.ANNADURAI, “Impact of Rushing

attack on Multicast in Mobile Ad Hoc Network”, (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009.

A Rawat

... [16] [17] RFC 615, Updated Security Considerations for the MD5

Message-Digest and the HMAC- MD5 Algorithms [18] H. Tiwari and K. Asawa, 2010, ―A Secure

Hash Function MD-192 with Modified Message Expansion‖, IJCSIS, Vol. 7, No. 2, pp. ...

S Bhatia, A Bawa, VK Attri

... this paper. REFERENCES [1] Saleem Basha, Dhavachelvan P “Analysis of Empirical

Software Effort Estimation Models” (IJCSIS) International Journal of Computer Science

and Information Security, Vol. 7, No. 3, 2010. [2] Jyoti ...

S Ahmad, SAJB Abdullah, RB Arshad - Public Policy and Administration Research, 2015

... Descriptive system for creating awareness in the electoral process in Nigeria using information

technology. International Journal of Computer Science and Information Security, (IJCSIS), 8(9),

225. Retrieved from http://sites.google.com/site/ijcsis/ Premium Times (2014, April 29). ...

MH Nadimi-Shahraki, ZS Torabi, A Nabiollahi - Computer and Information Science, 2015

... (2015). Efficient Support Vector Machines for Spam Detection: A Survey. International Journal

of Computer Science and Information Security (IJCSIS), 13(1), 1947- 5500. Zhao, Y., & Zhang,

Y. (2008). Comparison of decision tree methods for finding active objects. ...

A BAHNASSE, N ELKAMOUN - Policy, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. 3, 2015 ... 21 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 13, No. 3, 2015 ...

A Spalka - US Patent 20,150,113,292, 2015

... on Encrypted Data”, in Proc. of the 2000 IEEE Symposium on Security and Privacy

(S&P 2000), 2000. And (IJCSIS) International Journal of Computer Science and

Information Security, Vol. 9, No. 8, August 2011, Efficient Cryptographic ...

DT Selva Rathna

... (journal style) [4] Sheikh.R, Kumar B., Mishra DK, Changing Neighbors k-Secure Sum

Protocol for Secure Multi-Party Computation, (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 7, No. 1, 2010. ...

P Kherwa, J Nigam

... [6] Chitraa.V, Dr. Davamani A,”A Survey on Preprocessing Methods for Web Usage

Data” (IJCSIS) International Journal of Computer Science and Information Security,

Vol. 7, No. 3, 2010. [7] Chen J., Sun L, Zaiane O. and Goebel. ...

MVB Phadtare, VR Ghorpade

... Security, March, 2011. [2] PS Revenkar, Anisa Anjum and WZ Gandhare, “Secure

Iris Authentication Using Visual Cryptography”, International Journal of Computer

Science and Information Security (IJCSIS), 2010. [3] Young ...

H Hayouni, M Hamdi

... 636-639, 2011. 9. G.Padmavathi, and D.Shanmugapriya,“A Survey of Attacks, Secu- rity

Mechanisms and Challenges in Wireless Sensor Networks,” (IJC- SIS'09) International Journal

of Computer Science and Information Security, Vol.4, No.1&2, 2009. 10. ...

SS Baghshahi, S Jabbehdari, S Adabi

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol.

11, No. 12, December 2013 An Agent-Based Framework for Virtual Machine ... Corresponding

author 35 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. ...

R Sana

... 958-9618, 2008. DilipKumar SM and Vijaya Kumar BP ,'Energy-Aware Multicast

Routing in MANETs: A Genetic Algorithm Approach', International Journal of

Computer Science and Information Security (IJCSIS), Vol. 2, 2009. ...

M Dabas, PC Saxena, S Sabharwal

... [3] KN Kamlesh, Srivatsa SK , “Topological Design of Minimum Cost Survivable Computer

Communication Networks: Bipartite Graph Method” (IJCSIS) International Journal of

Computer Science and Information Security, Vol. 3, No. 1, 2009. ...

SE Waheed, AAM Mady, MA El-Sayed, S Abdel-Khalek

Page 1. New Approach for Drawings of 3-Planar Graphs Shimaa E. Waheed1,3,

Amal Ali M. Mady1, Mohamed A. El-Sayed2,4, S. Abdel-Khalek1 1 Department of

Math, Faculty of Science, Taif University, KSA; 2 Department ...

KJ Danjuma

Page 1. Performance Evaluation of Machine Learning Algorithms in Post-operative Life

Expectancy in the Lung Cancer Patients Kwetishe Joro Danjuma1 1 Department of Computer

Science, Modibbo Adama University of Technology, Yola, Adamawa State, Nigeria ...

MC Selvakumar, MD Vetrithangam, M Kamarajan

... 3483, pp.1159 -1168, 2005. 5. M. Deriche, “ GCC License Plates Detection and

Recognition Using Morphological Filtering and Neural Networks,” Int J. on Comp.

Sci. and Info Security, IJCSIS, vol. 8, No. 8, pp. 263-269, Dec, 2010. ...

N GHERABI - Journal of Theoretical and Applied Information …, 2015

... International Journal of Computer Applications 33(9):22-29, November 2011 [8] N. Gherabi, M.

Bahaj, K. Addakiri ”Mapping relational database into OWL Structure with data semantic

preservation” (IJCSIS) 2012 [9] Cristian Perez de Laborda and Stefan Conrad. ...

A Khatoonabadi - Information Technology and Applications, 2015

AM ALABAICHI

... Blowfish Block Cipher on ECB mode. (IJCSIS) International Journal of Computer ...

Randomness Analysis of 128 bits Blowfish Block Cipher on ECB mode. (IJCSIS)

International Journal of Computer Science and Information Security, 11 (10), 8-21. ...

P Suresh, P Keerthika

... Springer, London ,1997. [9] Karimi, Faraneh Zarafshan, Adznan.B. Jantan, AR Ramli,

M.Iqbal, B.Saripan, “A New Fuzzy Approach for Dynamic Load Balancing Algorithm,”

IJCSIS, vol. 6, no. 1, pp 01-05, 2009. [10] Qin Zheng ...

ÁV RIVERA, AN UNDA, B RAMOS, E MACÍAS…

Page 1. Lee Microcell Propagation Model: A Complex Case Empirical Study ÁNGELO

VERA RIVERA (1) , ALFREDO NÚÑEZ UNDA (1) , BORIS RAMOS (1) , ELSA MACÍAS

(2) , ÁLVARO SUÁREZ (2) , JORGE GÓMEZ (1) (1 ...

S BASRI, N KAMA, R IBRAHIM

Page 1. COCHCOMO: An extension of COCOMO II for Estimating Effort for

Requirement Changes during Software Development Phase SUFYAN BASRI, NAZRI

KAMA, ROSLINA IBRAHIM Advanced Informatics School Universiti ...

L MC MK, M NO, P SI

... Searches on Encrypted Data", in Proc. of the 2000 IEEE Symposium on Security and

Privacy (S&P 2000), 2000. And (IJCSIS) International Journal of Com- puter Science

and Information Security,Vol. 9, No. 8, Au- gust 2011, Efficient ...

SVV Sudhakar, KK Kiran, GB Rao, KS Raju, MU Rao…

... [7] Mr. Wankhede Vishal A, Prof. Dr. Upena Dalal, Mr. Jha Rakesh “A Survey of

Mobile WiMAX IEEE 802.16m Standard” (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 8, No. 1, April 2010. ...

S Thengdi, S Nair, NR Deshmukh, K Kawley…

... RA ―Experimental Study of Various Data Masking Techniques with Random

Replacement using data volume‖,(International Journal of Computer Science and

Information Security (IJCSIS), Vol. 9, No. 8, August 2011 [5] Liew ...

A Streicher, D Szentes, W Roller

... [8] Manashty, AR, Rajabzadeh, A., and Jahromi, ZF 2010. A Scenario-Based Mobile Application

for Robot- Assisted Smart Digital Homes. In IJCSIS. International Journal of Computer Science

and Information Security 5. [9] Mittal, S., Risco-Martin, JL, and Zeigler, BP 2009. ...

FR Patel, AN Cheeran

... and Teddy S. Gunawan, “ Novel Framework for Hidden Data in the Image Page within Executable

File Using Computation between Advance Encryption Standared and Distortion Techniques”,

International Journal of Computer Science and Information Security (IJCSIS), Vol. ...

Y Sri Lalitha, A Govardhan

Page 1. International Journal of Data Mining & Knowledge Management Process (IJDKP)

Vol.5, No.2, March 2015 DOI : 10.5121/ijdkp.2015.5203 23 IMPROVED TEXT

CLUSTERING WITH NEIGHBORS Sri Lalitha Y 1 and Govardhan A 2 ...

SVV Sudhakar, KK Kiran, GB Rao, KS Raju, MU Rao…

... [7] Mr. Wankhede Vishal A, Prof. Dr. Upena Dalal, Mr. Jha Rakesh “A Survey of

Mobile WiMAX IEEE 802.16m Standard” (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 8, No. 1, April 2010. ...

S Thengdi, S Nair, NR Deshmukh, K Kawley…

... RA ―Experimental Study of Various Data Masking Techniques with Random

Replacement using data volume‖,(International Journal of Computer Science and

Information Security (IJCSIS), Vol. 9, No. 8, August 2011 [5] Liew ...

A Streicher, D Szentes, W Roller

... [8] Manashty, AR, Rajabzadeh, A., and Jahromi, ZF 2010. A Scenario-Based Mobile Application

for Robot- Assisted Smart Digital Homes. In IJCSIS. International Journal of Computer Science

and Information Security 5. [9] Mittal, S., Risco-Martin, JL, and Zeigler, BP 2009. ...

FR Patel, AN Cheeran

... and Teddy S. Gunawan, “ Novel Framework for Hidden Data in the Image Page within Executable

File Using Computation between Advance Encryption Standared and Distortion Techniques”,

International Journal of Computer Science and Information Security (IJCSIS), Vol. ...

Y Sri Lalitha, A Govardhan

Page 1. International Journal of Data Mining & Knowledge Management Process (IJDKP)

Vol.5, No.2, March 2015 DOI : 10.5121/ijdkp.2015.5203 23 IMPROVED TEXT

CLUSTERING WITH NEIGHBORS Sri Lalitha Y 1 and Govardhan A 2 ...

R Chaudhary, G Arora

... vol.1, pp.112-115, Nov.2009. [20] B. Sathish Kumar, KR Shankar Kumar, “An Efficient

Inter Carrier Interference Cancellation Schemes for OFDM System” IJCSIS, Vol 6,

no.3, 2009 [21] Y. Zhao and S.-G. Häggman, “Sensitivity ...

C Prakash, K Gupta, A Mittal, R Kumar, V Laxmi - Procedia Computer Science, 2015

... International Journal Of Computer Science And Information Security, Ijcsis, 7(2). [10]; MO Mallye,

D Lynn AM de paor, “Kinematic analysis of human walking gait using digital image processing”

Medical & Biological Enginnering & Computing, pp 392-402, 1993. ...

B Nithya, YB Sankari, K Manikantan, S Ramachandran - Procedia Computer Science, 2015

... Azmi; Performance Comparison of Assorted Color Spaces for Multilevel Block

Truncation Coding based Face Recognition. International Journal of Computer

Science and Information Security (IJCSIS), 10 (3) (2012), pp. 58–63. ...

S Naik, N Shekokar - Procedia Computer Science, 2015

... (IJCSIS) International Journal of Computer Science and Information Security, 4 (1 & 2) (2009). ☆

Peer-review under responsibility of scientific committee of International Conference on Advanced

Computing Technologies and Applications (ICACTA-2015). ...

BO Sadiq, E Obi, AS Abubakar, Y Ibrahim, S Saidu - 2015

... Retrieved [5] Said O. (2009) “Analysis, Design and Simulation

of a New System for Internet Multimedia Transmission Guarantee” (IJCSIS) International

Journal of Computer Science and Information Security, Vol. 5, No. ...

K Verma, D Shukla, S Gangele - Open Journal of Computer Science and Information …, 2015

... 24. Shukla, D., Verma, Kapil and Gangele, Sharad, (2012 c): Curve Fitting Approximation In

Internet Traffic Distribution In Computer Network In Two Market Environment, International Journal

of Computer Science and Information Security (IJCSIS), Vol. 10, Issue 05, pp. ...

M Athoillah, M Irawan, EM Imah - Jurnal Ilmu Komputer dan Informasi, 2015

... Journal Current Applied Physics, 2010. [24] N. Bhatia, & Vandana, ”Survey of Nearest

Neighbor Techniques”, (IJCSIS) International Journal of Computer Science and

Information Security, vol. 8, pp. 302- 305, 2010. [25] H. Bal, & ...

SH Youn, T Sim, A Choi, J Song, KY Shin, IK Lee… - Computers in Biology and …, 2015

Ultrasonic surgical units (USUs) have the advantage of minimizing tissue damage during

surgeries that require tissue dissection by reducing problems such as coa.

P Saini, A Bansal, A Sharma

... 2012. [13] Mekelle and Ethiopia, “Concurrent Approach to Flynn's SPMD

Classification”, pp 79-81, IJCSIS, 2010 [14] Shameem Akhter and Jason Roberts,

Multi-Core Programming. Richard Bowles, US: Intel press, 2006. [15 ...

A Chitransh

... [4] MA Alim, MM Rahman, MM Hossain, A. Al-Nahid, Electronics and Communication Engineering

Discipline, Khulna University, Khulna 9208, Bangladesh, “Analysis of Large-Scale Propagation

Models for Mobile Communications in Urban Area”, (IJCSIS) International Journal ...

R Goyal, S Garg

... Gaurav Vijayvargiya Dr. Sanjay Silakari Dr.Rajeev Pandey “A Survey: Various

Techniques of Image Compression” (IJCSIS) International Journal of Computer

Science and Information Security, Vol. 11, No. 10, October 2013 [12]. ...

NAAPA Wadhe

... Visual Cryptographic Applications”, IJCSE, Vol. 5 No. 06 Jun 2013, ISSN : 0975-3397

[3] PSRevenkar, Anisa Anjum, W .Z.Gandhare, ”Secure Iris Authentication Using Visual

Cryptography”, IJCSIS, Vol. 7, No.3, 2010, ISSN 1947 ...

VA Bharadi, B Pandya, MB Nemade

... IJCA), Special Issue for ACM International Conference ICWET 2011, February 2011 [11] HB Kekre,

TK Sarode, SD Thepade, “Inception of Hybrid Wavelet Transform using Two Orthogonal

Transforms and It's use for Image Compression”, (IJCSIS) International Journal of ...

R Ramachandran, R Manivannan, R Ramachandiran…

... 689-705. [6] Deriche. M (2010), “GCC License Plates Detection and Recognition Using

Morphological Filtering and Neural Networks”, International Journal on Computer Science

and Information Security, IJCSIS, Volume 8, Number 8, pp. 263- 269. ...

VN Talooki, R Bassoli, DE Lucani, J Rodriguez… - Computer Networks, 2015

This survey paper shows the state of the art in security mechanisms, where a deep review

of the current research and the status of this topic is carried out. We.

M KallolMahapatra, MA Kumar, MJ Jain

... Available: [10] S. Saha, “Consideration

Points: Detecting Cross-Site Scripting,” (IJCSIS) International Journal of Computer

Science and Information Security,Vol. 4, No. 1 & 2, 2009.

F Archetti, D Cappellini, A Candelieri, D Conti - 2015

... Systems, (2013). [10] Kavitha V. and Punithavalli M., “Clustering Time Series Data

Stream – A Literature Survey”, (IJCSIS) International Journal of Computer Science

and Information Security, Vol. 8 No. 1, (2010). [11] Zhang ...

ZS Torabi, MH Nadimi-Shahraki, A Nabiollahi

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol.

13, No. 1, January 2015 ... 11 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 Page 2. Figure

1. Sources of Spam by country Figure 1. Sources of spam by region ...

A Perišić, M Lazić, B Perišić, R Obradović - Space

... Journal of Smart Home, Vol.8, No.6 (2014), pp.1-12

[5] Zahra Forootan Jahromi, Amir Rajabzadeh, and Ali Reza Manashty, "A Multi-Purpose

Scenario-based Simulator for Smart House Environments", (IJCSIS) International Journal of ...

TH Nguyen, Y Wang, Y Ha, R Li - IET Biometrics, 2015

Page 1. Published in IET Biometrics Received on 11th April 2014 Revised on 29th August 2014

Accepted on 23rd September 2014 doi: 10.1049/iet-bmt.2014.0026 ISSN 2047-4938 Performance

and security-enhanced fuzzy vault scheme based on ridge features for distorted ...

M Vadoodparast, AR Hamdan - arXiv preprint arXiv:1503.03208, 2015

Page 1. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13,

No. 2, February 2015 Identify applicable sponsor/s here. ... Netherlands 12% 8% Page 2. (IJCSIS)

International Journal of Computer Science and Information Security, Vol. 13, No. ...

This information update is brought to you by Google Scholar Alert.

ISSN 1947 5500 Copyright © IJCSIS, USA.