Volume 3, Number 1, February 2011 |
Citation Count |
|
Affine Invariant Descriptors of 3D Object Using Multiple Regression Model |
02 |
|
Use-Case, Runtime and Deployment Views for Developing Subsidies Mobile Wallet |
0 |
|
Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network |
0 |
|
Electre Methods in Solving Group Decision Support System Bioinformatics on Gene Mutation Detection Simulation |
14 |
|
A Novel Super Resolution Reconstruction of Low Reoslution Images Progressively Using DCT and Zonal Filter Based Denoising |
03 |
|
Mining Target-Oriented Fuzzy Correlation Rules to Optimize Telecom Service Management |
05 |
|
Improving the Character Recognition Efficiency of Feed Forward BP Neural Network |
22 |
|
Initial Classification Through Back Propagation In a Neural Network Following Optimization Through GA to Evaluate the Fitness of an Algorithm |
23 |
|
Adaptive Fuzzy Filtering for Artifact Reduction in Compressed images and videos |
0 |
|
Channel Allocation for Direct Sequence Spread Spectrum Using Vertex Merge Algorithm |
0 |
|
Combining Speedup Techniques based on Landmarks and Containers with parallelised preprocessing in Random and Planar Graphs |
0 |
|
Machine Learning Methods for Spam E-Mail Classification |
0 |
|
A Formal Classification of Internet Banking Attacks and Vulnerabilities |
18 |
|
Characterization of Tumor Region Using SOM and Neuro Fuzzy Techniques in Digital Mammography |
06 |
|
Search-Based Software Test Data Generation Using Evolutionary Computation |
09 |
|
Volume 3, Number 2, April 2011 |
Citation Count |
|
Clustering Posts in Online Discussion Forum Threads |
06 |
|
The Development of Electronic Payment System for Universities in Indonesia: On Resolving Key Success Factors |
05 |
|
Brightness Factor Matching for Gesture Recognition System Using Scaled Normalization |
39 |
|
Behavior Analysis in a learning Environment to Identify the Suitable Learning Style |
17 |
|
An Object-Oriented Modeling and Implementation of Spatio-Temporal Knowledge Discovery System |
08 |
|
An Effective CBVR System Based on Motion, Quantized Color and Edge Density Features
|
05 |
|
Model Based System Engineering Approach of a Lightweight Embedded TCP/IP |
01 |
|
Model-Based Factors to Extract Quality Indications in Software Lines of Code |
03 |
|
Wavelet Based Spectrum Sensing Techniques for CogKarthik Divakaran, Naveen Manikandan P and Shri Hari R R, Amrita Vishwa Vidyapeetham, Indianitive Radio - A Survey |
12 |
|
Ontology Alignment Using Machine Learning Techniques
|
13 |
|
A Novel Parallel Algorithm for Clustering Documents Based on the Hierarchical Agglomerative Approach |
06 |
|
Adaptive Team-Based Multi-Agent Organizational Model: A Case in Rescue Systems |
04 |
|
A Descriptive Model for Developing a Hydraulic Geodatabase by Using the GIS Softwares |
02 |
|
Application of PUF-Enabled RFID Tags in Electronic Banking |
02 |
|
Energy Efficient Task Scheduling of Send-Receive Task Graphs on Distributed Multi-Core Processors with Software Controlled Dynamic Voltage Scaling |
01 |
|
A Design of a Computer-Aided Diagnostic Tool For Chest X-Ray Analysis |
07 |
|
Characterization and Validation of Requirements Management Measures Using Correlation and Regression Model |
04 |
|
An Automated Size Recognition Technique for Acetabular Implant in Total Hip Replacement |
05 |
|
PHP Framework for Database Management Based on MVC Pattern |
19 |
|
Importance of Data Collection and Validation for Systematic Software Development Process |
01 |
|
Volume 3, Number 3, June 2011 |
Citation Count |
|
Information Security Plan for Flight Simulator Applications |
15 |
|
Common Phases of Computer Forensics Investigation Models |
74 |
|
Comparison and Analysis of Watermarking Algorithms in Color Images - Image Security Paradigm |
05 |
|
Evolutionary Neural Networks algorithm for the Dynamic Frequency Assignment Problem |
11 |
|
Optimal Self Correcting Fault Free Error Coding Technique in Memory Operation |
02 |
|
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE)
|
54 |
|
A Review on Elliptic Curve Cryptography for Embedded Systems
|
21 |
|
Statistical Analysis on Software Metrics Affecting Modularity in Open Source Software
|
04 |
|
Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government
|
01 |
|
Hybrid of Particle Swarm Optimization with Evolutionary Operators to Fragile Image Watermarking Based DCT
|
14 |
|
Image Retrieval using Bit-plane Pixel Distribution
|
06 |
|
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network
|
32 |
|
Effective Independent Quality Assessment using IV&V
|
02 |
|
E-Learning personalization based on Dynamic learners' preference
|
44 |
|
An LMS Based Blind Source Separation Algorithm Using A Fast Nonlinear Autocorrelation Method
|
0 |
|
A Novel Technique for Back-Link Extraction and Relevance Evaluation
|
02 |
|
Electronic Commerce in Web 3.0: The Evidence from Emerging Economics |
5 |
|
A Comparative Experiment of Several Shape Methods in Recognizing Plants
|
36 |
|
RCause - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems
|
0 |
|
Unsupervised horizontal collaboration based in SOM
|
02 |
|
Volume 3, Number 4, August 2011 |
Citation Count |
|
Automatic Application Level Set Approach In Detection Calcifications In Mammographic Image |
03 |
|
A Robust Steganography Model Using Wavelet-Based Block-Partition Modification |
11 |
|
Cultural Influences on Explicit and Implicit Knowledge Sharing Behaviour in Virtual Teams
|
10 |
|
A Fuzzy Framework For Segmentation, Feature Matching And Retrieval Of Brain MR Images
|
0 |
|
MDA-Based ATL Transformation To Generate MVC 2 Web Models
|
05 |
|
Comprehensive Measurement Framework for Enterprise Architectures
|
08 |
|
Plants Images Classification Based on Textural Features using Combined Classifier
|
27 |
|
Design and FPGA Implementation of DDR3 SDRAM Controller for High Performance
|
04 |
|
Self-Adaptation Mechanism to Control the Diversity of the Population in Genetic Algorithm
|
08 |
|
Packet Scheduling Of Two Classes Flow
|
01 |
|
Reduction Of Blocking Probability In Shared Protected Optical Network
|
02 |
|
DNA Lossless Differential Compression Alogorithm Based on Similarity of Genomic Sequence Database
|
11 |
|
Performance Analysis Of Various Data Mining Classification Techniques On Healthcare Data
|
27 |
|
Towards A Model Of Maturity For Is Risk Management
|
12 |
|
A Fuzzy Approach For Clustering Gene Expression Time Series Data
|
01 |
|
Novel Apporach for Speech Recognition by Using Self - Organized Maps
|
09 |
|
Special Issue on "ICCSEA - 2011" |
||
A New Trusted Third-Party Billing For Mobile Networks
|
0 |
|
Performance Evaluation And Impact Of Weighting Factors On An Energy And Delay Aware Dynamic Source Routing Protocol
|
05 |
|
Indian Languages IR using Latent Semantic Indexing
|
06 |
|
Active Controller Design For Global Choas Anti-Synchronization Of Li and Tigan Chaotic Systems
|
11 |
|
Volume 3, Number 5, October 2011 |
Citation Count |
|
It Security Issues Within the Video Game Industry
|
09 |
|
Adaptive Beamforming Algorithm for Interference Suppression in GNSS Receivers
|
58 |
|
Minimize the False Positive Rate in a Database Intrusion Detection System
|
04 |
|
Design Pattern Management System: A Support Tool Based on Design Patterns Applicability
|
0 |
|
Genetic Algorithm (GA) In Feature Selection For CRF Based Manipuri Multiword Expression (MWE) Identification
|
04 |
|
IRIS Recognition Based On LBP and Combined LVQ Classifier
|
20 |
|
An IR-based Pedestrian Detection System Implemented with Matlab-Equipped Laptop and Low-Cost Microcontroller
|
07 |
|
New Method for 3D Shape Retrieval
|
02 |
|
Research Review for Digital Image Segmentation Techniques
|
41 |
|
Stable Filtering for Artificial Pheromone Potential Field Constructed By Mobile Robots and Passive RFID Tags
|
0 |
|
Evaluate the Performance of Optical Cross Connect Based on Fiber Bragg Grating Under Different Bit Rate
|
07 |
|
Optimized Fuzzy Logic Application for MRI Brain Images Segmentation
|
15 |
|
Robust seed selection algorithm for k-means type algorithms
|
15 |
|
Knowledge Based Methods for Video Data Retrieval
|
03 |
|
Analysis and Design Complex and Large Data Base using MySQL Workbench
|
02 |
|
Direct Manipulation of Web Browsing History
|
03 |
|
A Semantically Enriched Web Usage Based Recommendation Model
|
12 |
|
Enhancing Confidentiality of Private Communication through Dual Compression
|
0 |
|
Optimum Partition Parameter of Divide-And-Conquer Algorithm for Solving Closest-Pair Problem
|
10 |
|
Monitoring Software Reliability using Statistical Process Control: An MMLE Approach
|
03 |
|
Volume 3, Number 6, December 2011 |
Citation Count |
|
From 3D Model Data to Semantics
|
03 |
|
Recycling of Bandwidth in Metropolitan Area Networks(MAN)
|
0 |
|
Adaptation AC to Improve Wireless Access Network Dependability
|
01 |
|
A Comparative Study To Find A Suitable Method For Text Document Clustering
|
02 |
|
Recognizing Bangla Grammar Using Predictive Parser
|
15 |
|
Hybrid GPS-GSM Localization of Automobile Tracking System
|
75 |
|
Network Intrusion Detection Using Data Mining and Network Behaviour Analysis
|
18 |
|
Technical Analysis of Remote 3D Visualization on Mobile Devices
|
02 |
|
Integrated Environment for Developing E-Learning Lectures
|
04 |
|
Analysis of Different Privacy Preserving Cloud Storage Frameworks
|
07 |
|
Investigating the Awareness of Applying the Important Web Application Development and Measurement Practices
|
03 |
|
Flooding Attacks to Internet Threat Monitors(ITM): Modeling and Counter Measures Using Botnet and Honeypots
|
09 |
|
Mobile Geographic Information Systems: A Case Study on Mansoura University, Egypt
|
12 |
|
An Improved Neural Image Compression Approach With Cluster Based Pre-Processing
|
0 |
|
From Learning Style of Webpage Content to Learner's Learning Style
|
07 |
|
Image Labeling and Segmentation using Hierarchical Conditional Random Field Model
|
0 |
|
Multi-Resolution Analysis For Medical Image Compression
|
03 |
|
Introduction Of Knowledge Management Architecture Using Multi Agent
|
08 |
|
Optimal Fuzzy Model Construction With Statistical Information Using Genetic Algorithm
|
02 |
|
Edge Detection Techniques For Image Segmentation
|
61 |