Volume 4, Number 1, February 2012 |
Citation Count |
|
Trust Model for Reliable File Exchange In Cloud Computing
|
15 |
|
An Approach for Robots to Deal with Objects
|
07 |
|
Enhancement of Images Using Morphological Transformations
|
48 |
|
A Cluster Allocation and Routing Algorithm based on Node Density for Extending the Lifetime of Wireless Sensor Networks
|
12 |
|
Reliability Analysis of Multi Path Multistage Interconnection Networks
|
04 |
|
A Novel Password based Multi Party Key Agreement Protocol on Elliptic Curve
|
02 |
|
An Effective Model for Improving the Quality of Recommender Systems in Mobile E-Tourism
|
08 |
|
Image Segmentation in Video Sequences Using Modified Background Subtraction
|
17 |
|
Achieving Consensus with Individual Centrality Approach
|
04 |
|
Blind 3D Model Watermarking based on Multi-Resolution Representation and Fuzzy Logic
|
08 |
|
Integrated Task Clustering, Mapping and Scheduling for Heterogeneous Computing Systems
|
05 |
|
Ranking Popular Items By Naive Bayes Algorithm
|
01 |
|
Quality of Service Using PSO Algorithm
|
05 |
|
Image Retrieval System Using Hybrid Feature Extraction Technique
|
01 |
|
SignsWorld; Deeping into the Silence World and Hearing Its Signs (StAte oF the Art)
|
10 |
|
A Qualitative Study of LP-ITS: Linear Programming Intelligent Tutoring System
|
21 |
|
Graph Based New Approach for Frequent Pattern Mining
|
01 |
|
An Approach for Agile SOA Development using Agile Principals
|
14 |
|
Error Probability Analysis of Free-Space Optical Links with Different Channel Model under Turbulent Condition
|
06 |
|
Visual Analysis of Cost Based Database Optimizers Using Picasso Tool
|
0 |
|
Volume 4, Number 2, April 2013 |
Citation Count |
|
MppSoCGEN: A Framework for automatic generation of MppSoC Architecture
|
0 |
|
Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues
|
25 |
|
Mass Lesion Detection Using Wavelet Decomposition Transform and Support Vector Machine
|
07 |
|
Document Summarization Using Positive Pointwise Mutual Information
|
06 |
|
Fuzzy Multi-objective Approach for the Improvement of Distribution Network Efficiency by Considering DG
|
57 |
|
A Semi-Blind Reference Watermarking Scheme Using DWT-DCT-SVD for Copyright Protection
|
20 |
|
Review on Common Criteria as a Secure Software Development Model
|
13 |
|
Dynamic Domain Classification for Fractal Image Compression
|
01 |
|
Signal Processing for MIMO Interference Networks
|
0 |
|
Embedded Controller for Vehicle In-Front Obstacle Detection and Cabin Safety Alert System
|
36 |
|
UNDERSTANDING the Concept of Geographic Information System and Modelling Formalisms
|
0 |
|
Spectral Analysis of Projection Histogram for Enhancing Close matching character Recognition in Malayalam
|
04 |
|
Prashnottar: A Hindi Question Answering System
|
10 |
|
Volume 4, Number 3, June 2012 |
Citation Count |
|
Steganography in Arabic Text Using Zero Width and Kashidha Letters
|
12 |
|
Dimension Reduction by Mutual Information Feature Extraction
|
02 |
|
New-Fangled Method Against Data Flooding Attacks in MANET
|
02 |
|
Evaluation of Information Retrieval Systems
|
15 |
|
Improvement of Traffic Overhead and Reliability in Wireless Sensor Network
|
0 |
|
A Hybrid Region Growing Algorithm for Medical Image Segmentation
|
12 |
|
Full Data Controlled Web-Based Feed Aggregator
|
04 |
|
High Availability Solution: Resource Usage Management in Virtualized Software Aging
|
05 |
|
Critical Analysis of Ecm Applications in the Clouds: A Case Study
|
01 |
|
Crawler Architecture Using Grid Computing
|
01 |
|
Automatic Segmentation of Manipuri (Meiteilon) Word into Syllabic Units
|
0 |
|
An Approach for Integration Testing in Online Retail Applications
|
01 |
|
A Rule Based Approach for Root Word Identification in Malayalam Language
|
03 |
|
Volume 4, Number 4, August 2012 |
Citation Count |
|
Applying Data Envelopment Analysis to Evaluation of Taiwanese Solar Cell Industry Operational Performance
|
0 |
|
PCA - Wavelet Coefficients for T2 chart to Detect Endpoint in CMP process
|
01 |
|
PSO Algorithm for IPD Game
|
01 |
|
Training a Feed-Forward Neural Network with Artificial Bee Colony based Backpropagation Method
|
22 |
|
Multicore Dynamic Kernel Modules Attachment Technique for Kernel Performance Enhancement
|
0 |
|
Redescription Mining With Three Primary Data Mining Functionalities
|
0 |
|
Spatial Data Mining using Cluster Analysis
|
05 |
|
Applications of Wireless Sensor Networks in Fall Detection for Senior People
|
04 |
|
Intelligent Mining Association Rules
|
01 |
|
Comparison Study for Clonal Selection Algorithm and Genetic Algorithm
|
07 |
|
A New Audio Watermarking Method Based on Discrete Cosine Transform with a Gray Image
|
01 |
|
C-PASS-PC: A Cloud-driven Prototype of Multi-Center Proactive Surveillance System for Prostate Cancer
|
02 |
|
An Energy Aware Geocast Algorithm Using 2-Hop Neighbour Knowledge in Sensor Networks
|
0 |
|
Genetic Algorithm with SRM SVM Classifier for Face Verification
|
0 |
|
Volume 4, Number 5, October 2012 |
Citation Count |
|
Biometric Authentication Through a Virtual Keyboard for Smartphones
|
28 |
|
Improving Computer-Mediated Synchronous Communication of Doctors in Rural Communities Through Cloud Computing: A Case Study of Rural Hospitals in South Africa
|
05 |
|
Alfred Coleman1, Marlien E Herselman2 and Mary Coleman3, 1University of South Africa, 2CSIR South Africa and 3Medical University of South Africa, South Africa
|
0 |
|
Building a Portable Computer Lab with Bootable USB Hard Drives Using Virtualisation
|
0 |
|
A P2P Botnet Virus Detection System Based on Data-Mining Algorithms
|
01 |
|
Skyline Sets Queries for Incomplete Data
|
04 |
|
An Analyzer-Based Security Measurement Model for Increasing Software Security
|
02 |
|
Machine Learning Algorithms in Web Page Classification
|
02 |
|
Achieving the Benefits of Agility in Software Architecture-XP
|
01 |
|
An Insight View of Kernel Visual Debugger in System Boot up
|
0 |
|
Evolutionary Tuning of Fuzzy Rule Base Systems for Nonlinear System Modelling and Control
|
0 |
|
Computational Analysis of Code Collaboration Pattern and Semantic Role
|
0 |
|
A Neuro-Fuzzy Inference Model for Breast Cancer Recognition
|
15 |
|
Building a Legal Expert System for Legal Reasoning in Specific Domain-A Survey
|
04 |
|
A Rough - Neuro Model for Classifying Opponent Behavior in Real Time Strategy Games
|
05 |
|
Efficient Scheduling ff Real-Time Parallel Applications on Clusters
|
0 |
|
ASP-SSN: An Effective Approach for Linking Semantic Social Networks
|
0 |
|
Design of an Efficient MAC Protocol for Opportunistic Cognitive Radio Networks
|
03 |
|
Fast Hue-Preserving Histogram Equalization Methods For Color Image Contrast Enhancement
|
06 |
|
Efficient Monitoring in Online Tests Using Esdv Method
|
0 |
|
Volume 4, Number 6, December 2012 |
Citation Count |
|
Accessibility of Information Technologies in the Resting Home
|
0 |
|
An Information System to Support and Monitor Clinical Trial Process
|
0 |
|
Rotation Invariant Color Retrieval
|
01 |
|
Design of Physical Games for Learning the Lotus Effect
|
01 |
|
A Novel and Single Chip Tri-Band Low-Noise Amplifier for Wlan, Wifi and Wimax Receivers
|
01 |
|
An Efficient Passage Ranking Technique For a QA System
|
01 |
|
Multi-Homing Enabled Cognitive Radio Based Inter-Vehicle Communication System
|
0 |
|
Ear Recognition and Occlusion
|
0 |
|
Computing Installation Parameters Of CCTV Cameras for Traffic Surveillance
|
03 |
|
An Experimental Survey Towards Engaging Trustable Hypervisor Log Evidence Within a Cloud Forensic Environment
|
04 |
|
Adaptive Backstepping Controller and Synchronizer Design for Arneodo Chaotic System With Unknown Parameters
|
13 |
|
R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)
|
02 |
|
Denoising of Medical Ultrasound Images Using Spatial Filtering and Multiscale Transforms
|
03 |
|
Shaping of Location Conscious Information
|
01 |
|
Improved Spatial Gray Level Dependence Matrices for Texture Analysis
|
10 |