Journal: JCS

Volume 9, Issue 9

1086 -- 1091B. Murugeshwari, C. Jayakumar, K. Sarukesi. Preservation of the Privacy for Multiple Custodian Systems with Rule Sharing
1092 -- 1098Sangeetha Kuppusamy, Natarajan Mathaiyan. Intellisense Cluster Management and Energy Efficient Routing in Mobile Ad Hoc Networks
1099 -- 1105Anindito, Bens Pardamean, Robby Christian, Bahtiar Saleh Abbas. Expert-System based Medical Stroke Prevention
1106 -- 1116D. Udaya Suriya Rajkumar, Rajamani Vayanaperumal. A Leader based Monitoring Approach for sinkhole Attack in Wireless Sensor Network
1117 -- 1132D. Egfin Nirmala, A. Bibin Sam Paul, Vaidehi V.. Improving Independent Component Analysis using Support Vector Machines for Multimodal Image fusion
1133 -- 1139SunithaKarnam Anantha, Senthil Kumar Natarajan, Subransu Sekar Dash. Modeling and simulation of fuzzy based Automatic insulin Delivery System
1140 -- 1145Kelvinnicky Gunawan, Bens Pardamean. School Information Systems Design for Mobile phones
1146 -- 1155Anbalagan Thirunavukarasu, Uma Maheswari. Technical Analysis of fuzzy Metagraph based Decision Support System for Capital Market
1156 -- 1163V. Nandalal, S. Sophia. An Efficient Power Reduction Technique in orthogonal frequency Division Multiplexing System using tone Reservation
1164 -- 1173Aditya Kurniawan, Khaterini Mulyono, Mellyna, Stevan Gerardo. E-Resources Geographic Information System System for Military Operation
1174 -- 1180Kamalanaban Ethala, R. Seshadri, N. G. Renganathan, M. S. Saravanan. Secret Handshake Issue and Validate Authority based Authentication System for Wireless Sensor Network
1181 -- 1189S. Sridevi, V. R. Vijayakumar. Medical Image Compression Technique using Listless Set Partitioning in Hierarchical Trees and Contextual Vector quantization for brain Images
1190 -- 1196Syed Mubashir Ali, Tariq Rahim Soomro, M. Nawaz Brohi. Mapping Information Technology Infrastructure Library with other Information Technology Standards and Best Practices
1197 -- 1204Praveena Murugesan, A. Shanmugam. Enhanced Load Balancing Strategy in Heterogeneous Peer-to-Peer Networks
1205 -- 1210Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi. Improvement of Automatic Hemorrhages Detection Methods using Shapes Recognition
1211 -- 1216Srinath Doss, Janet Jeyaraj. Securing Mobile Ant Agent using Chinese Remainder Theorem
1217 -- 1223Derwin Suhartono, Patricia Chitra, Steven Hendry, Kevin Hendry. Prototype Design System for Mobile Web using Radio frequency identification at Parking Building
1224 -- 1231Usha Veerasamy Arivazhagu, Subramaniam Srinivasan. Replacement Mechanism of Caching Technique for Query Routing in Peer to Peer Networks
1232 -- 1240Latha Shanmugam, Lilly Florence. Enhancement and Comparison of Ant Colony Optimization for Software reliability Models
1241 -- 1251Rajeev Kumar, M. Dilsath Fathima, K. Kiruthika, M. S. Saravanan. Non-Cooperative Iris Recognition: a Novel Approach for Segmentation and Fake identification

Volume 9, Issue 8

943 -- 948Rose Al Qasem, Taisir Eldos. An Efficient cell Placement using gravitational Search Algorithms
949 -- 966Attariuas Hicham, Bouhorma Mohammed, Abdellah El-Fallahi. A Novel Approach based on Genetic fuzzy Clustering and adaptive Neural Networks for Sales Forecasting
967 -- 971Ali Ahmad Milad, Zul Azri Bin Muhamad Noh, Abdul Samad Shibghatullah, Shahrin Sahib, Rabiah Ahmad, Mustafa Almahdi Algaet. Transmission control Protocol Performance Comparison using Piggyback Scheme in WLANs
972 -- 980Thangavel Prem Jacob, Thavasi Anandam Ravi. Optimization of Test Cases by prioritization
981 -- 989Ashraph Sulaiman, S. V. Kasmir Raja, Sung-Han Park. On-the-Fly Key Generation for an Efficient Road Side Units based Authentication in Vehicular Networks
990 -- 997Prema Kannan, Senthil Kumar Natarajan, Subhransu Sekar Dash. Design of fuzzy Logic controller for Online Speed regulation of DC motor using PWM Technique based on Laboratory Virtual Instrument Engineering Workbench
998 -- 1007Elangovan Uma, Arputharaj Kannan. The Dynamic Nonce based Authentication Scheme to Defend Intermediary Attack for Web Services
1008 -- 1018Norwati Mustapha, Wong Pei Voon, Md Nasir Sulaiman. User Recommendation Algorithm in Social Tagging System based on Hybrid User Trust
1019 -- 1029Moaiad Khder, Zulaiha Ali Othman, AbdullahMohdZin, Salha Abdullah. Improving Data Availability in Mobile Environment using Data Allocation
1030 -- 1040V. Kavitha, V. Palanisamy. New burst assembly and Scheduling Technique for optical burst switching Networks
1041 -- 1050Magesh, Thangaraj. Comparing the Performance of Semantic Image Retrieval using SPARQL Query, Decision Tree Algorithm and LIRE
1051 -- 1060R. Surendran, B. Parvatha Varthini. Inject an elastic Grid Computing Techniques to Optimal Resource Management Technique Operations
1061 -- 1068Ahmed Farag Seddik, Riham Amin Hassan, Mahmoud A. Fakhreldein. Spectral Domain Features for Ovarian cancer Data Analysis
1069 -- 1078M. A. Berlin, Sheila Anand. Formal Verification of Safety Message Dissemination Protocol for VANETs
1079 -- 1085Bashir Alam. Fuzzy Round Robin CPU Scheduling Algorithm

Volume 9, Issue 7

811 -- 820Nur Azman Abu, Ferda Ernawan, Nanna Suryana. An Image dithering via Tchebichef moment transform
821 -- 826Inácio Yano, Vitor Chaves de Oliveira, Eric Alberto de Mello Fagotto, Alexandre de Assis Mota, Lia Toledo Moreira Mota. Predicting battery charge Depletion in Wireless Sensor Networks using received signal strength indicator
827 -- 837Vitor Chaves de Oliveira, Inácio Yano, Alexandre de Assis Mota, Lia Toledo Moreira Mota. Feasibility of Desktop Virtualization per Software Services and Local Hardware based on the Network Throughput
838 -- 846Venkata Ratnam Tatavolu, Seetha Ramaiah Panchumarthy. Embedded Computer based Active vibration control System for vibration Reduction of flexible Structures
847 -- 855Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja. Real Time multigraphs for Communication Networks: an intuitionistic fuzzy Mathematical Model
856 -- 865Abdelhak Boulaalam, El Habib Nfaoui, Omar El Beqqali. Intelligent Product based on Mobile Agent to Accelerate the New Product Development Process
866 -- 874Mohammad Syuhaimi Ab-Rahman, Hadiguna, Latifah Sarah Supian. Power Analysis on same filter Different Sources for Selection of spectral filters in optical Demultiplexer
875 -- 882Kamalanaban Ethala, R. Shesadri, N. G. Renganathan. The Use of Random Forest Classification and k-means Clustering Algorithm for Detecting Time stamped Signatures in the Active Networks
883 -- 888Jafreen Hossain, Nor Fazlida Mohd Sani, Aida Mustapha, Lilly Suriani Affendey. Using Feature Selection as accuracy Benchmarking in Clinical Data Mining
889 -- 897Zulaini Yahya, Muhamad Taufik Abdullah, Azreen Azman, Rabiah Abdul Kadir. Query Translation using Concepts Similarity based on Quran Ontology for Cross-Language Information Retrieval
898 -- 904Wesam Bhaya, Abdul Monem Rahma, Dhamyaa Al-Nasrawi. Text Steganography based on Font Type in MS-Word Documents
905 -- 921Radityo Anggoro, Teruaki Kitasuka, Ryoji Nakamura, Masayoshi Aritsugi. Performance Evaluation of Probabilistic Relay in Ad Hoc on-demand Distance Vector and Ad Hoc on-demand multipath Distance Vector under Highly Dynamic Environments
922 -- 927Mohammed Aboaoga, Mohd Juzaiddin Ab Aziz. Arabic Person Names Recognition by using a Rule based Approach
928 -- 934S. Balu, K. Amudha, C. Nelson Kennedy Babu. Human Visual sensitivity Guided bit Embedding for video Steganography
935 -- 942Mohammad Syuhaimi Ab-Rahman, Farshad Nasimi Khameneh. Cost-Effective wire-Harness Model by using Polymer optical Fiber

Volume 9, Issue 6

671 -- 677G. Malathy, R. M. Somasundaram, K. Duraiswamy. Performance Improvement in Cloud Computing using Resource Clustering
678 -- 689Akila, Uma Maheswari. Content based Medical Image Retrieval using Binary Association Rules
690 -- 698Walid Aly, Basheer Yousif, Bassem Zohdy. A deoxyribonucleic acid Compression Algorithm using Auto-Regression and Swarm Intelligence
699 -- 707Hasan Al-Sakran. Agent and Radio frequency identification based Architecture for Supermarket Information System
708 -- 715Budi Yulianto, Muhsin Shodiq, Lusiana Citra Dewi. Sound and Digital class Room: Smart Way to have a Language Laboratory
716 -- 725Ferda Ernawan, Nur Azman Abu, Nanna Suryana. Adaptive Tchebichef moment transform Image Compression using Psychovisual Model
726 -- 732J. Amjath Ali, J. Janet. Mass Classification in Digital Mammograms based on discrete Shearlet transform
733 -- 739Octavia George, Maria Gorethi, Syerra Riswandi, Widodo Budiharto. The Development of Expert Mood Identifier System using fuzzy Logic on BlackBerry Platform
740 -- 748Kaushik Velusamy, Shriram K. Vasudevan, Sankari Gopalakrishnan, Subashri Vasudevan, Balachandran Arumugam. Adapting Linux as Mobile Operating System
749 -- 756Andrews Jeyaraj, Thangappan Sasikala. Evaluation of various Compiler Optimization Techniques Related to MiBench Benchmark Applications
757 -- 762Gokul Murugesan, Shriram K. Vasudevan, Sivaraman Ramachandran, Subashri Vasudevan, Balachandran Arumugam. Vehicle identification using fuzzy adaline neural network
763 -- 770Hussain Mohammad Abu-Dalbouh. A Questionnaire Approach based on the Technology Acceptance Model for Mobile tracking on Patient progress Applications
771 -- 779Hussain Mohammad Abu-Dalbouh. Fast Real Time Analysis of Web Server Massive Log Files using an Improved Web Mining Architecture
780 -- 793Wafaa Omar, Amr Badr, Abd El Fatah Hegazy. Hybrid Ant-based Clustering Algorithm with Cluster Analysis Techniques
794 -- 810Ruki Harwahyu, Alfa Sheffildi Manaf, Bayu Sri Ananto, Burhan Adi Wicaksana, Riri Fitri Sari. Implementation of Color-blind Aid System

Volume 9, Issue 5

534 -- 542Devarj Saravanan, Subramaniam Srinivasan. Matrix based Indexing Technique for video Data
543 -- 550M. Raghini, N. Uma Maheswari, R. Venkatesh. Overview on Key Distribution Primitives in Wireless Sensor Network
551 -- 557Ragb O. M. Saleh, Md. Yazid Mohd.-Saman, M. Nordin A. Rahman. A New Policy for Path Selection in Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks
558 -- 565Mohanavalli Seetha Subramanian, Sheila Anand. Fuzzy System to Authenticate Assisted Living patients in their Home Environment
566 -- 571J. Viji Priya, S. Suppiah. Application of Newton Raphson Algorithm for Optimizing Transmission control Protocol Performance
572 -- 582M. Jasmine Pemeena Priyadarsini, K. Murugesan, Srinivasa Rao Inbathini, Y. Saiteja, Vemana Janith. Automatic target Recognition in cluttered visible imagery
583 -- 591Nurhizam Safie, Syed Mohamed Aljunid. E-Learning Initiative Capacity Building for Healthcare Workforce of Developing Countries
592 -- 606Poonguzhali M., Shanmugavel S.. A fuzzy based Mechanism for Allocation of Grid Resources
607 -- 619Salwa Aqeel Mahdi, Mohamed Othman, Hamidah Ibrahim, Jalil M. Desa, Jumat Sulaiman. Protocols for Secure Routing and Transmission in Mobile Ad Hoc Network: a Review
620 -- 625Taghi Javdani Gandomani, Hazura Zulzalil, Abdul Azim Abdul Ghani, Abu Bakar Md Sultan, Mina Ziaei Nafchi. Obstacles in Moving to Agile Software Development methods; at a Glance
626 -- 634Bhavneet Kaur, Karanjeet Singh Kahlon, Sandeep Sharma. Safety criterion in Inter-Domain Routing Protocol with Pseudo Renewals
635 -- 645Qasem Abu Al-Haija, Mohamed H. Shwehdi, Muhammad Banat. Evaluation Metrics for Wireless Sensor Network Security: Algorithms Review and Software Tool
646 -- 653N. Thangadurai, R. Dhanasekaran. Optimal Energy Consumption to Extend the Lifetime of Wireless Sensor Networks
654 -- 659Albert Pravin, Subramaniam Srinivasan. Effective Test Case Selection and prioritization in Regression Testing
660 -- 670P. Vijaya Karthick, V. Vasudevan. Dynamic souple Wireless Grid Applications for HORDE of jobs by sensible Centrality Scheduling with Redite

Volume 9, Issue 4

404 -- 412M. Krishnamoorthi, A. M. Natarajan. Artificial Bee Colony Algorithm Integrated with fuzzy C-mean operator for Data Clustering
413 -- 420Mohammad Syuhaimi Ab-Rahman, Hadiguna, Latifah Sarah Supian. Selection of spectral filters for optical Demultiplexer-same filter Different Source
421 -- 426Karim Al-Saedi, Selvakumar Manickam, Sureswaran Ramadass, Wafaa A. H. Al-Salihy, Ammar Almomani. Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining
427 -- 432Waleed Halboob, Ali Mamat, Ramlan Mahmod, Muhammad Khurram Khan. Temporal, Delegable and Cheap Update Access control to published XML Documents
433 -- 438V. Ganesh Kumar, K. Muneeswaran. Intelligent Apriori Algorithm for Complex Activity Mining in Supermarket Applications
439 -- 448T. Guru Baskar, D. Manimegalai. Secured Routing with Authentication in Mobile Ad Hoc Networks
449 -- 454Mohammad Syuhaimi Ab-Rahman, Hadiguna, Latifah Sarah Supian, Malik Sulaiman. Selection of spectral filters for optical Demultiplexer via same Source Different filters Testing Technique
455 -- 462Roswan Ismail, Nor Asilah Wati Abdul Hamid, Mohamed Othman, Rohaya Latip. Performance Analysis of Message Passing Interface Collective Communication on Intel Xeon Quad-Core Gigabit Ethernet and InfiniBand Clusters
463 -- 476Noocharin Tippayawannakorn, Juta Pichitlamken. Nelder-Mead method with Local Selection using Neighborhood and Memory for stochastic Optimization
477 -- 487Saravana Kumar Muthusamy, Thiyagarajan Purusothaman, Lavanya Selvaraj. An Enhanced and Cost Effective Group Key Management Scheme for Multicast Network
488 -- 499Mohammed Abuhamad, Masnizah Mohd, Juhana Salim. Event-Driven Business Intelligence Approach for Real-Time Integration of Technical and fundamental Analysis in Forex Market
500 -- 513Kugalur Muthusamy Palaniswamy, Veerappa Gounder Palanisamy. The Optimistic adaptive modulation Technique for Future Wireless Communication
514 -- 520K. Duraisamy, U. Ragavendran, Wathita Phachonpai, Supaporn Muchimapura, Terdthai Tong-Un, Jintanaporn Wattanathorn, Wipawee Thukhammee. Low Power analog Multiplier using MIFGMOS
521 -- 525D. Vydeki, R. S. Bhuvaneswaran. Effect of Clustering in Designing a fuzzy based Hybrid Intrusion Detection System for Mobile Ad Hoc Networks
526 -- 533C. Emilin Shyni, S. Swamynathan. Protecting the Online User’S Information against Phishing Attacks using Dynamic Encryption Techniques

Volume 9, Issue 3

277 -- 284Prabakaran Ganesan, R. Bhavani. A High Secure and robust Image Steganography using Dual wavelet and blending Model
285 -- 290K. Rajakumar, S. Muttan. A Framework for MRI Image Retrieval using Curvelet transform and Euclidean Distance
291 -- 298Pitsanu Tongkhow, Nantachai Kantanantha. Bayesian Models for Time Series with covariates, Trend, Seasonality, Autoregression and Outliers
299 -- 307Arun Bhaskar Mayilvaganan, Subhransu Sekhar Dash, Venkatesh Venkataramanan. Grid voltage stability enhancement using Photovoltaic based Static Synchronous compensator
308 -- 313Igni Sabasti Prabu Siluvai, V. Jawahar Senthil Kumar. A Framework for Simple Object Access Protocol Messages to Detect Expansion Attacks for Secure Webservice
314 -- 326Saad Elmansori. Conditioned Slicing for Efficient Multiway Decision graphs Model-Checker
327 -- 334R. S. Somasundaram, R. Nedunchezhian. Radial Basis function Network dependent Exclusive Mutual interpolation for missing Value imputation
335 -- 342Adib M. Monzer Habbal, Suhaidi Hassan. A Model for Congestion control of Transmission control Protocol in Mobile Wireless Ad Hoc Networks
343 -- 349Karpagam Vilvanathan, Rangarajan Rangaswamy. Bi-Level Classification of Color Indexed Image Histograms for Content based Image Retrieval
350 -- 357R. Beulah Jayakumari, V. Jawahar Senthilkumar. Priority based Congestion Detection and avoidance in Wireless Sensor Networks
358 -- 367G. Tamil Pavai, S. Tamil Selvi. Identification of Proliferative Diabetic Retinopathy using texture Segmentation
368 -- 376V. Berlin Hency, D. Sridharan 0001. Multicast-Supported Fast Handover for Proxy Mobile IPv6
377 -- 382Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja. Generalization of Dijkstra’S Algorithm for Extraction of Shortest Paths in Directed multigraphs
383 -- 390Arief Ramadhan, Dana Indra Sensuse, Muladno, Aniati Murni Arymurthy. Success Factors for E-Livestock: an E-Government Initiative
391 -- 403Dahlia Asyiqin Ahmad Zainaddin, Zurina Mohd Hanapi. Hybrid of fuzzy Clustering Neural Network over NSL Dataset for Intrusion Detection System

Volume 9, Issue 2

147 -- 154C. Sathiyakumar, K. Duraiswamy. A Hybrid Approach for Node Co-Operation based Clustering in Mobile Ad Hoc Networks
155 -- 158Naveen Raman, Thanushkodi Keppanagounder. Gate Replacement Technique for Reducing Leakage current in Wallace Tree Multiplier
159 -- 168Mohammed Serrhini, Abdelazziz Ait Moussa. Home Users Security and the Web Browser Inbuilt Settings, Framework to setup IT Automatically
169 -- 175J. Venkatesh, C. Aarthy, S. Thenmozhi, P. Balasubramanie. Operation of Enterprise Resource Planning System Implementation Compatibility towards Technical Advancement
176 -- 182T. Sree Sharmila, K. Ramar 0001, T. Sree Renga Raja. Comparative Analysis of satellite Image pre-Processing Techniques
183 -- 197Danilo Pelusi, Raffaele Mascella. Optimal control Algorithms for second order Systems
198 -- 206C. Sundar, M. Chitradevi, G. Geetharamani. An Overview of Research Challenges for Classification of cardiotocogram Data
207 -- 217Godfrey Winster Sathianesan, Swamynathan Sankaranarayanan. Unified Semantic Blog Mining Framework and Summarized Blog Retrieval
218 -- 224Wikaria Gazali, Haryono Soeparno, Ngarap Im. Manik. The Classification Model of Sandals Dhiif’S Product with Back Propagation and Fourier Descriptors method
225 -- 234R. Sadasivam, K. Duraiswamy. Efficient Approach to Discover interval-based Sequential Patterns
235 -- 243R. Kannan, S. Ravi. Second-order Statistical Approach for Digital modulation Scheme Classification in Cognitive Radio using Support Vector Machine and k-Nearest Neighbor Classifier
244 -- 251Imas Sukaesih Sitanggang, Razali Yaakob, Norwati Mustapha, A. N. Ainuddin. Classification Model for Hotspot Occurrences using Spatial Decision Tree Algorithm
252 -- 263Isam Azawi Mohialdeen. Comparative Study of Scheduling al-Grotihms in Cloud Computing
264 -- 270Ali Maroosi, Ravie Chandren Muniyandi. Membrane Computing Inspired Genetic Algorithm on Multi-Core Processors
271 -- 276S. Periyasamy, K. Duraiswamy. A proficient Traceback Approach using Provincial Locality Aspects to Eliminate Denial of Service Attacks

Volume 9, Issue 12

1626 -- 1637Ismail Hababeh, Issa Khalil, Abdallah Khreishah, Samir Bataineh. Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks
1638 -- 1647Ryan Rahmansyah, Ford Lumban Gaol. Service Oriented Architecture Governance Implementation in a Software Development Project as an Enterprise solutions
1648 -- 1660Yu Liu 0005, Haipeng Wang, Wei Xiong, You He. The error Registration Technique for maneuvering radar Network
1661 -- 1668Masnida Hussin, Rohaya Latip. Adaptive Resource control Mechanism through Reputation-based Scheduling in Heterogeneous Distributed Systems
1669 -- 1679Faruku Umar Ambursa, Rohaya Latip. A Survey: Particle Swarm Optimization-based Algorithms for Grid Computing Scheduling Systems
1680 -- 1685Paul Gardner-Stephen, Andrew Bettison, Romana Challans, Jeremy Lakeman. The rational behind the Serval Network Layer for Resilient Communications
1686 -- 1694Majharul Talukder, Ali M. Quazi, Dede Djatikusumol. Impact of Social Influence on Individuals’ Adoption of Social Networks in SMEs
1695 -- 1709Yu Liu 0005, Haipeng Wang, You He, Kai Dong, Chuwan Xiao. New Track-to-Track Correlation Algorithms based on Bithreshold in a Distributed multisensor Information fusion System
1710 -- 1714Zainab Rasheed Mirza, M. Nawaz Brohi. An in-depth Analysis on Integrating Campus Radio frequency identification System on Clouds for Enhancing Security
1715 -- 1721Rashed Mustafa, Dingju Zhu. Objectionable Image Detection in Cloud Computing Paradigm-a Review
1722 -- 1733Raja Azlina Raja Mahmood, Zurina Mohd Hanapi, Sazlinah Hasan, Asad I. Khan. Effective Black Hole Attacks in MANETs
1734 -- 1737Zainab Rasheed Mirza, M. Nawaz Brohi. Smart travelling with Radio frequency identification
1738 -- 1746Mohammud Ershadul Haque, Mohammud Fauzi Mohammud Zain, Maslina Jamil, Mahammad Abdul Hannan, Abdulla Al Suman. M-array quadrature amplitude modulation Wireless Sensor Network modulator reliability and accuracy Analyze in Civil SHM
1747 -- 1760Yu Liu 0005, Haipeng Wang, You He, Jian Shen. A Novel Hybrid Node localization Algorithm for Wireless Sensor Networks
1761 -- 1768Khalid Abd, Kazem Abhary, Romeo M. Marian. Development of a fuzzy-simulation Model of Scheduling robotic flexible assembly cells
1769 -- 1777Khalid Abd, Kazem Abhary, Romeo M. Marian. Application of a fuzzy-simulation Model of Scheduling robotic flexible assembly cells
1778 -- 1792Faraj El Dabee, Romeo Marian, Yousef Amer. A Novel Optimization Model for simultaneous Cost-Risk Reduction in Multi-suppliers Just-in-Time Systems
1793 -- 1802Oi Mean Foong, Suziah Sulaiman, Kiing Kiu Ling. Text Signage Recognition in Android Mobile Devices
1803 -- 1821Huajian Liu, Chris Saunders, Sang-Heon Lee. Development of a Proximal Machine Vision System for off-Season Weed Mapping in Broadacre no-tillage Fallows
1822 -- 1829Atiya Al-Zuheri. Structural and Operational Complexity of Manual assembly Systems
1830 -- 1846Zeinab Haji Abolhasani, Romeo M. Marian, Lee Loung. "Optimization of Multi-commodities Consumer supply Chains for-Part I-Modeling"
1847 -- 1855Lola Oktavia, Ford Lumban Gaol. Information Technology Strategic Planning at Pt. Venturium System

Volume 9, Issue 11

1427 -- 1434Shrivakshan Gopal Thiruvangadan, Chandrasekar Chelliah. A Comparision of various Edge Detection Techniques in motion Picture for identifying a Shark fish
1435 -- 1442Hendy Yeremia, Niko Adrianus Yuwono, Pius Raymond, Widodo Budiharto. Genetic Algorithm and Neural Network for optical Character Recognition
1443 -- 1450Ali Darejeh, Dalbir Singh. A Review on User Interface Design Principles to Increase Software Usability for Users with Less Computer Literacy
1451 -- 1455M. Vinoth Kumar, G. Tholkappia Arasu, V. Palanisamy. Analysis of Intelligent Data Mining for Information Extraction using Java Agent Development Environment Platform
1456 -- 1460Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi. Automatic retinal vessel Tortuosity Measurement
1461 -- 1471Eisuke Kita, Young-Bin Shin. Effectiveness of second Best Particle Information for Particle Swarm Optimization
1472 -- 1486Yogapriya Jaganathan, Ila Vennila. Feature Dimension Reduction for Efficient Medical Image Retrieval System using Unified Framework
1487 -- 1495Felipe Schneider Costa, Maria Marlene de Souza Pires, Silvia Modesto Nassar. Analysis of Bayesian Classifier accuracy
1496 -- 1505Sutarman, Mazlina Abdul Majid, Jasni Mohamad Zain. A Review on the Development of Indonesian Sign Language Recognition System
1506 -- 1513Wei Lin Du, Luiz Fernando Capretz, Ali Bou Nassif, Danny Ho. A Hybrid Intelligent Model for Software Cost estimation
1514 -- 1518A. Venkatesh Kumar, S. Vengataasalam. Cluster based Duplicate Detection
1519 -- 1525Uma Mani, Ramasamy Chandrasekaran, V. R. Sarma Dhulipala. Study and Analysis of Routing Protocols in Mobile Ad-Hoc Network
1526 -- 1533Malarvezhi Pandy, Kumar Ramamoorthy. A Novel two stage carrier frequency offset estimation and compensation Scheme in Multiple input Multiple output-orthogonal frequency Division Multiplexing System using Expectation and Maximization Iteration
1534 -- 1542Dina EL-Gammal, Amr Badr, Mostafa A. El-Azeim. New Binary Particle Swarm Optimization with Immunity-Clonal Algorithm
1543 -- 1555S. Karpagam, S. Gowri. Prediction of glioma using Genetic Optimized Neural Network
1556 -- 1565S. Suma Christal Mary, M. Pallikonda Rajasekaran, Y. ChrisbinJeeva. A Novel Approach for Information Security in Ad Hoc Networks through Secure Key Management
1566 -- 1574V. Ragavi, G. Geetha. Design of a Dual Keyboard
1575 -- 1588Maryam Golchin, Fatimah Khalid, Lili Nurliana Abdullah, Seyed Hashem Davarpanah. Shadow Detection using Color and Edge Information
1589 -- 1601S. Prince Mary, E. Baburaj. Constraint Informative Rules for Genetic Algorithm-based Web Page Recommendation System
1602 -- 1617Muthuraman Thangaraj, Vengatasubramanian Gayathri. A Context-based Technique using Tag-Tree for an Effective Retrieval from a Digital literature Collection
1618 -- 1625J. Udhayan, M. Rajesh Babu. Deteriorating Distributed Denial of Service Attack by Recovering Zombies using penalty Scheme

Volume 9, Issue 10

1252 -- 1259Sreekumar Pulakkazhy, R. V. Siva Balan. Data Mining in Banking and its Applications-a Review
1260 -- 1266M. Devi, S. Chenthur Pandian. An Efficient Autonomous Key Management with Reduced Communication/Computation Costs in Mobile Ad Hoc Network
1267 -- 1273Jess Nielsen, Michael Lykke. A Tool Analysis in Architectural Reconstruction
1274 -- 1282T. Peer Meera Labbai, V. Rajamani. Message Authentication Code based Secure Group Key Management Protocol for Mobile Ad Hoc Networks
1283 -- 1294R. S. Mohana, P. Thangaraj. Machine Learning Approaches in Improving Service Level Agreement-based Admission control for a Software-as-a-Service Provider in Cloud
1295 -- 1304Mohamad Faizal Ab Jabal, Suhardi Hamid, Salehuddin Shuib, Illiasaak Ahmad. Leaf Features Extraction and Recognition Approaches to Classify plant
1305 -- 1317Sanaa Kabil, Raja Elassali, Fouzia Elbahhar, Abdellah Ait Ouahman, Brahim Ait Essaid. Analysis and solution for Multi-band orthogonal frequency-Division Multiplexing ultra Wide band System in Real Environment for Vehicle to Infrastructure Application
1318 -- 1322M. Senthil Kumaran, R. Rangarajan. Dynamic Planning based Scheduling Approach for Wireless Sensor Networks
1323 -- 1328Agus Harjoko, Tri Wahyu Supardi. Acka 500 Watt Power amplifier for a 144 MHz channel based on a VHF Push-pull Power MOS transistor
1329 -- 1340K. Palani, P. Ramamoorthy. Quality of Service Aware of Cross Layer Approach on adaptive Gateway Discovery Scheme for Mobile Ad Hoc Networks
1341 -- 1347Sami Ktata, Faouzi Benzarti, Hamid Amiri. License plate localization using Gabor filters and Neural Networks
1348 -- 1355Mishra Suman, Ranganathan Hariharan. Gaussian Mixture Model based Classification of Microcalcification in Mammograms using Dyadic wavelet transform
1356 -- 1368Teuku Yuliar Arif, Riri Fitri Sari. Throughput Analysis of Aggregation with Fragment Retransmission plus Quality of Service Scheme
1369 -- 1382Ali Muftah Ben Omran, Mohd Juzaiddin Ab Aziz. Automatic Essay Grading System for Short Answers in English Language
1383 -- 1388Widodo Budiharto. The Development of an Expert Car Failure Diagnosis System with Bayesian Approach
1389 -- 1395Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi. Blood Vessels Extraction using Mathematical Morphology
1396 -- 1405Jinhyung Kim, Myunggwon Hwang, Do-Heon Jeong, Sa-Kwang Song, Hanmin Jung. Business Intelligence Service based on adaptive User Modeling and Grouping
1406 -- 1413Periyasamy Nirmaladevi, Ramasamy Asokan. A modified adaptive wavelet shrinkage speckle filter for ultrasound Images
1414 -- 1419Settachai Chaisanit, Chiraphorn Chomyim, Samphan Chandee. Intelligence Mobile and Digital Broadcasting Technology to Support Learning for Disabilities Students
1420 -- 1426J. Udhayan, Rajesh Babu. Lightweight Vigilant procedure to Implement Security Measures in Highly Roving Military Operations

Volume 9, Issue 1

1 -- 15G. Madasamy Raja, V. Sadasivam. Optimized Local Ternary Patterns: a New texture Model with Set of Optimal Patterns for texture Analysis
16 -- 29Nor Fazlida Mohd Sani, Noor Afiza Mohd Ariffin, Rodziah Binti Atan. Design of Object-Oriented Debugger Model by using Unified Modeling Language
30 -- 36P. S. Rama Praba, H. Ranganathan. Wavelet transform based Automatic Lesion Detection in Cervix Images using Active Contour
37 -- 42S. Lakshmi, S. Radha. Selfish Scheduler for Packet Scheduling based on Packet Weighted Energy drain rate in MANETs
43 -- 54Manimekalai Thirunavukkarasu, Meenakshi Murugappan, Maneesha S. Mohan. Multichannel Cognitive Cross Layer Optimization for Improved video Transmission
55 -- 62M. Nirmala, V. Palanisamy. An Efficient Prediction of missing Itemset in Shopping cart
63 -- 73Sivasubramaniam Nandhini, Senniappan Palaniammal. Stateless Aggregate Fair Marking Scheduler for Differentiated Service Networks
74 -- 82Jess Nielsen, Sufyan Almajali. Collecting Data from Running Systems
83 -- 93R. Uma, K. Muneeswaran. Efficacious Geospatial Information Retrieval using density Probabilistic Document Correlation Approach
94 -- 104Urmila Shrawankar, Vilas M. Thakare. A Hybrid method for Automatic speech Recognition Performance Improvement in Real World noisy Environment
105 -- 113S. Madhavi, K. Duraiswamy. Flooding Attack Aware Secure AODV
114 -- 121Petcharat Pattanasethanon, Kriangsak Chanthinok. An Evaluation of the Information Systems for Teaching and Learning Online of the Public University
122 -- 127Ravie Chandren Muniyandi, Abdullah Mohd Zin. Membrane Computing as the Paradigm for Modeling Systems Biology
128 -- 138Adnan Mukred, Dalbir Singh, Nurhizam Safie. A Review on the Impact of Information Culture on the Adoption of Health Information System in Developing Countries
139 -- 146S. Vijayakumar Bharathi, Dhanya Pramod, Ramakrishnan Raman. A fuzzy Petri-Net based Conceptual Model for Risk Prediction in Enterprise Resource Planning Acquisition Decisions for Small and Medium Enterprises