Volume 1, Number 1, August 2009 |
Citation Count |
|
Ensemble Design for Intrusion Detection Systems |
9 |
|
Design of a New Deterministic Algorithm for Finding Common DNA Subsequence |
1 |
|
Automatic Evolution of Ideas Through Multilayer Evolutionary System to Support Creative Thinking |
0 |
Volume 1, Number 2, November 2009 |
Citation Count |
|
Multi-Focus Fusion Method Based on LADWT |
0 |
|
Effect of Variation of Separation between the Ultrasonic Transmitter and Receiver on the Accuracy of Distance Measurement |
05 |
|
Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach |
29 |
|
Investigating the Performance of Various Vocoders for a Fair Scheduling Algorithm in WIMAX |
0 |
|
A Low Indexed Content Based Neural Network Approach for Natural Objects Recognition |
02 |
|
Identification of Telugu, Devanagari and English Scripts Using Discriminating Features |
19 |
|
Design and Implementation of 32-Bit Controller For Interfacing with reconfigurable computing systems. |
13 |
|
Thesaurus And query Expansion |
52 |
|
Optimal Curve Fitting of Speech Signal for Disabled Children |
05 |
|
Analysis on Deployment Cost and Network Performance for Heterogeneous Wireless Sensor Networks |
16 |
|
A collaborative PCE-Based mechanism for E2E recovery within MPLS-networks |
0 |
|
Analysis of Telecommunication Management Technologies |
13 |
|
Volume 2, Number 1, February 2010 |
Citation Count |
|
A Model for Semantic Integration of Business Components |
7 |
|
Agent Based Trust Management in Distributed E-Business Environment |
7 |
|
Multi Dimensional CTL and Stratified Datalog |
0 |
|
An Efficient Gait Recognition System For Human Identification Using Modified ICA |
49 |
|
Cartographic Generalization (Selection) For 2D Map of Urban Area |
02 |
|
A BPT Application: Semi-automatic Image Retrieval Tool |
0 |
|
Analyzing the P2P Traffic Using Probability Schemes |
03 |
|
Low Power VLSI Design with Resistive Feedback Logic |
0 |
|
Dynamic Probe Window Based Optimization for Surveillance in Home Security System |
01 |
|
Human Facial Expression Detection From Detected in Captured Image using Back Propagation Neural Network
|
37 |
|
Performance Evaluation of Face Recognition Using Gabor Filter, Log Gabor filter and Discrete Wavelet Transform |
27 |
|
A Mobility-Based CheckPointing Protocol for Mobile Computing System |
23 |
|
Volume 2, Number 2, April 2010 |
Citation Count |
|
Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock |
02 |
|
High Performance and Energy Efficient Task Scheduling Algorithm for Heterogeneous Mobile Computing System |
4 |
|
Identification of connection in spacecraft images and classifying them for Weather Monitoring |
0 |
|
Phenol Degradation: Numerical Simulation in a Stirred Tank Electrochemical Reactor |
05 |
|
An Efficient Statistical Multiplexing Method for H.264 VBR Video Sources for Improved Traffic Smoothing |
04 |
|
Performance Evaluation of Routing Protocols in Wireless Sensor Networks |
60 |
|
Improved Lossless Embedding and Extraction - A Data Hiding Mechanism |
01 |
|
An Optimized Distributed Association Rule Mining Algorithm in Parallel and Distributed Data Mining with XML Data for Improved Response Time |
04 |
|
CRM System Using PA-AKD Approach of D3M |
0 |
|
Enhanced-DSR: A New Approach to Improve Performance of DSR Algorithm |
10 |
|
Wrapper Generator using Java Native Interface |
03 |
|
Memory Management Technique for Paging on Distributed Shared Memory Framework |
04 |
|
Ontology Based Model For The ITU-T Recommendation G.805: Towards The Self-Management Of Transport Networks |
08 |
|
Volume 2, Number 3, June 2010 |
Citation Count |
|
Efficient Resource Matching in Heterogeneous Grid Using Resource Vector |
03 |
|
Low Power Shift and Add Multiplier Design |
26 |
|
Implementing and Evaluating A Wireless Body Sensor System For Automated Physiological Data Acquisition At Home |
14 |
|
A Parsing Scheme for Finding the Design Pattern and Reducing the Development Cost of Reusable Object Oriented Software |
01 |
|
Hybrid Scenario based Performance Analysis of DSDV and DSR |
03 |
|
Interoperability, Trust Based Information Sharing Protocal and Security: Digital Government Key Issues |
10 |
|
An Algorithm To Self - Extract Secondary Keywords and Their Combinations Based On Abstracts Collcted Using Primary Keywords From Online Digital Libraries |
0 |
|
A novel technique for image steganography based on Block-DCT and Huffman Encoding |
63 |
|
Biometric Authentication Using Nonparametric Methods |
01 |
|
Game Information System |
02 |
|
Survey on the Event Orderings Semantics Used for Distributed System |
02 |
|
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups |
0 |
|
Genbit Compress Tool(GBC): A Java-Based Tool To Compress DNA Sequences and Compute Compression Ratio (BITS/BASE) of Genomes |
07 |
|
Volume 2, Number 4, August 2010 |
Citation Count |
|
An Empirical Study on the Procedure to Derive Software Quality Estimation Models |
10 |
|
Diphone Speech Synthesis System for Arabic Using MARY TTS |
12 |
|
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm |
25 |
|
Improvement in Delay of Information flow in Energy Efficiency Organization |
0 |
|
An Applied Study on Educational Use of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication |
48 |
|
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy |
22 |
|
M-Learning: A New Paradigm of Learning Mathematics in Malaysia |
45 |
|
Utilizing Diagnosing Problems in a Probabilistic Domain to Build Student Models |
05 |
|
Clustering and Feature Specific Sentence Extraction Based Summarization of Multiple Documents |
28 |
|
Mining Target-Oriented Sequential Patterns With Time-Intervals |
09 |
|
A Survey of QOS Routing Protocols For Mobile Ad Hoc Networks |
40 |
|
Spiking Neurons With ASNN Based-Methods for the Neural Block Cipher |
04 |
|
A Modified Structure for Feed Forward Active Noise Control Systems With Improved Performa |
0 |
|
Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms |
19 |
|
A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on Particle Swarm Theory With Arithmetic Crossover |
09 |
|
Volume 2, Number 5, October 2010 |
Citation Count |
|
Performance Analysis of Multimedia Compression Algorithms |
13 |
|
Ontology-Based Quality Attributes Prediction in Component-Based Development |
04 |
|
Performance Analysis of Contention Window Cheating Misbehaviors in Mobile Adhoc Networks |
08 |
|
A New Email Retrivel Ranking Approach |
0 |
|
Design and Evaluation of XACML Conflict Policies Detection Mechanism |
05 |
|
Potential Security Attacks on Wireless Networks and their Countermeasure |
02 |
|
A New DCT-Based Watermarking Method for Copyright Protection of Digital Audio |
26 |
|
A Multi -Perspective Evaluation of MA and GA for Collaborative Filtering Recommender System |
15 |
|
Level Shifter Design for Low Power Applications |
17 |
|
A Plant Documentation Information System Design |
03 |
|
Energy Efficient Data Processing in Visual Sensor Network |
06 |
|
Identifying Bank Frauds Using CRISP-DM and Decision Trees |
14 |
|
A Clustering Heuristic for Multiprocessor Environments Using Computation and Communication Loads of Modules |
06 |
|
Soil Classification Using GATREE |
09 |
|
A Performance Comparison Study of the Location Prediction Based Routing Protocol with Position Based Routing Protocols for Mobile Ad Hoc Networks |
0 |
|
Volume 2, Number 6, December 2010 |
Citation Count |
|
Manipulating Multistage Interconnection Networks Using Fundamental Arrangements |
01 |
|
Inheritance Metrics for Object-Oriented Design |
08 |
|
Comparison of Class Inheritance and Interface Usage in Object Oriented Programming through Complexity Measures |
01 |
|
Adaptive Block Pinning Based: Dynamic Cache Partitioning for Multi-core Architectures |
0 |
|
Use of Smart Antennas In Ad Hoc Networks |
10 |
|
A Novel Embedded Statistical Scheduler for Realising High System-QoS |
0 |
|
Security Enhencement & Solution for Authentication Frame work in IEEE 802.16 |
02 |
|
Security In Wireless Sensor Networks Using Key Management Schemes |
02 |
|
Pattern Recognition Using Neural Networks |
16 |
|
Dynamic Scheduling of Skippable Periodic Tasks With Energy Efficiency In Weakly Hard Real-Time System |
02 |
|
Some Observations On Open Source Software Development On Software Engineering Perspectives |
10 |
|
Data Mining Algorithms And Medical Sciences |
13 |
|
Network Intrusion Detection System Based On Machine Learning Algorithms |
16 |
|
Segmentation And Object Recognition Using Edge Detection Techniques |
70 |
|
Automatic Induction of Rule Based Text Categorization |
03 |