


default search action
Journal of Computer Science, Volume 11
Volume 11, Number 1, 2015
- Rony Baskoro Lukito

, Cahya Lukito
, Deddy Arifin:
Implementation Techniques of Search Engine Optimization in Marketing Strategies Through the Internet. 1-6 - K. Ratna Babu, K. V. N. Sunitha

:
Enhancing Digital Images Through Cuckoo Search Algorithm in Combination with Morphological Operation. 7-17 - Yenny Sylvia, Djunaidy Santoso:

Transformation Box-Cox for Stabilisation of Diversity in Group Random Design. 18-29 - S. Vanaja, K. Rameshkumar

:
Performance Analysis of Classification Algorithms on Medical Diagnoses-a Survey. 30-52 - Shanthini Pandiaraj

, K. R. Shankar Kumar:
Speaker Identification Using Discrete Wavelet Transform. 53-56 - A. Rajamani, V. Krishnaveni:

An Efficient Denoising Algorithm for Impulse Noise Removal. 57-63 - Naya Nagy

, Marius Nagy, Selim G. Akl:
Carving Secret Messages out of Public Information. 64-70 - A. Lekha, C. V. Srikrishna, Viji Vinod

:
Fuzzy Association Rule Mining. 71-74 - Es-Said Chanigui, Abdelmalek Azizi

:
A Modified Secure Scheme of Quantum Key Distribution Without Public Announcement Bases. 75-81 - S. Thayammal, D. Selvathi

:
Edge Preserved Image Compression using Extended Shearlet transform. 82-88 - Mohsen Kakavand, Norwati Mustapha, Aida Mustapha

, Mohd Taufik Abdullah, Hamed Riahi:
A Survey of Anomaly Detection Using Data Mining Methods for Hypertext Transfer Protocol Web Services. 89-97 - Manar AbuTalib, Muhammed AbuOdeh, Adhraa Almansoori, Arwa AlNauimi:

Enhancing Social Science Research in the UAE: An Open Source Software Solution University of Sharjah (UOS) Case Study. 98-108 - Abdulkareem Al-Alwani:

Improving Email Response in an Email Management System Using Natural Language Processing Based Probabilistic Methods. 109-119 - P. Jaganathan, T. Karthikeyan

:
Highly Efficient Architecture for Scalable Focused Crawling Using Incremental Parallel Web Crawler. 120-126 - Amy Chiang, Simon X. Liao:

Image Analysis with Legendre Moment Descriptors. 127-136 - B. Booba, T. V. Gopal

:
Efficient Scheduling of Packets in Wireless Sensor Networks Using Priority Based Scheduling Approach. 137-144 - Manar AbuTalib, Ashraf Elnagar

:
A New Computer Science Student Recruitment Strategy University Of Sharjah (UOS) Case Study. 145-152 - C. Malathy, M. A. K. Sadiq, K. Annapurani

:
An Innovative Approach for Person Identification by Detection and Extraction of Optic Disc from Retina and Concha from Ear. 153-165 - I. Joe Louis Paul

, S. Radha, J. Raja
:
Performance Analysis of Joint Degree Distribution (JDD) in Luby Transform Codes. 166-177 - Bareq Shaalan, Ravie Chandren Muniyandi

:
Implementing Mitogen Activated Protein Kinases Cascade on Membrane Computing Using P-Lingua. 178-187 - J. S. Kanchana, S. Sujatha:

Recommendation Engine Formation Using Depth First Search and Genetic Approach. 188-194 - Saleheh Heidari, Muhamad Taufik Abdullah

, Lili Nurliyana Abdullah
:
A Novel Four-Directional Thresholding Approach for Lung Computed-Tomography Images by Using Similarity-Based Segmentation Technique. 195-203 - Mohd Kamir Yusof, Md. Yazid Mohd. Saman, Wan Nor Shuhadah Wan Nik:

Comparative of Mediator Approach for Database Integration. 204-217 - P. Kavitha Rani

, E. Kannan:
Straight Line Routing on Next Hop Graph in Wireless Sensor Networks. 218-223 - R. Vijayalakshmi, V. Vasudevan:

Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid. 224-229 - Anas A. Abboud

, Rahmita Wirza O. K. Rahmat, Suhaini B. Kadiman, Mohd Zamrin Dimon, Lili Nurliyana Abdullah, M. Iqbal Saripan
, Hasan H. Khaleel
:
Automatic Detection of the End-Diastolic and End-Systolic from 4D Echocardiographic Images. 230-240 - Naragain Phumchusri, Yanipa Chinsuwan:

Decision Support System for Open Vehicle Routing With Transhipments and Stopovers. 241-253 - P. Deivendran, E. R. Naganathan:

Scalability Services in Cloud Computing Using Eyeos. 254-261 - E. Dhiravidachelvi

, V. Rajamani:
A Novel Approach for Diagnosing Diabetic Retinopathy in Fundus Images. 262-269 - Djunaidy Santoso:

The Benefits of Bezier, B-Spline Algorithm in the Industry World. 270-273
Volume 11, Number 2, 2015
- Alaa M. Elsayad

, Mahmoud Fakhr:
Diagnosis of Cardiovascular Diseases with Bayesian Classifiers. 274-282 - R. Velayutham

, D. Manimegalai:
CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA. 283-290 - M. Rajaram, J. Vijaya:

A Defense Mechanism for Differential Power Analysis Attack in AES. 291-296 - Larisa G. Gagarina, D. N. Kavtaradze, A. A. Mordovin, Evgeni M. Portnov, V. V. Slyusar, Kyaw Zaw Ye

:
Modeling of a Dynamic Interaction of Motor Transport and Natural Systems in Order to Minimize the Risks of Project and Management Decisions. 297-303 - K. S. Selvanayaki, R. M. Somasundaram:

Hybrid Approach for Detection and Recognition of Vehicles. 304-314 - K. Thamizhchelvy, G. Geetha

:
An Efficient Image Generation Algorithm Using Fractals and Chaos Theory. 315-324 - Ahmad Alqurneh, Aida Mustapha

:
The Impact of Oath Writing Style on Stylometric Features and Machine Learning Classifiers. 325-329 - Nor Amalina Mohd Sabri, Abd. Samad Hasan Basari, Burairah Hussin, Khyrina Airin Fariza Abu Samah

:
The Utilisation of Dijkstra's Algorithm to Assist Evacuation Route in Higher and Close Building. 330-336 - S. Sumalatha

, G. Sreenivasulu
, G. Uday Kiran Bhargava:
Multicast Node Communication Using Virtual Queue with Process Scheduling. 337-343 - M. Sayee Kumar

, T. Purusothaman:
Hybrid Broadcast Group Management Protocol for Secure, Scalable and Efficient Group Communication. 344-350 - Nur Azman Abu, Ferda Ernawan

, Fadzilah Salim:
Smooth Formant Peak Via Discrete Tchebichef Transform. 351-360 - M. Uma Devi, G. Meera Gandhi

:
Wordnet and Ontology Based Query Expansion for Semantic Information Retrieval in Sports Domain. 361-371 - J. Vellingiri

, S. Kaliraj, S. Satheeshkumar, T. Parthiban:
A Novel Approach for User Navigation Pattern Discovery and Analysis for Web Usage Mining. 372-382 - Thabit Sultan Mohammed

, Laith Al-Jobouri
:
A Comparative Study of Construction Techniques of t-Error Correction/All Unidirectional Error Detection Codes. 383-390 - S. Gopalakrishnan

, P. Ganeshkumar:
Secure and Efficient Transmission in Mobile Ad hoc Network to Identify the Fake ID's Using Fake ID Detection Protocol. 391-399 - Joseph Gladwin Sekar, Salivahanan Sankarappan:

Enhanced Channel Estimation and Performance Analysis Using H-Infinity Filter for MIMO-Orthogonal Frequency Division Multiplexing Systems. 400-405 - Mohd Fadzli Marhusin

, Muhammad Firdaus Zul Kafli, Rossilawati Sulaiman
, Shaharudin Ismail, Zul Hilmi Abdullah
:
A Framework for a Multi-Layered Security of an Automated Programming Code Assessment Tool. 406-415 - G. Nantha Kumar, A. Arokiasamy:

An Efficient Combined Call Admission Control and Scheduling Algorithm to Improve Quality of Service for Multimedia Services Over Next Generation Wireless Networks. 416-425 - Vitor Chaves de Oliveira

, Gunnar Bedicks Junior, Cristiano Akamine
:
Methodology to Asses Internet Protocol Connection Availability: A Prerequisite For Feasible Video Stream Through Content Delivery Networks. 426-437 - D. Ayyamuthukumar, S. Karthik:

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks. 438-442 - J. Jeyachidra, M. Punithavalli:

A Novel Distinguishability Based Weighted Feature Selection Algorithms for Improved Classification of Gene Microarray Dataset. 443-452
Volume 11, Number 3, 2015
- Athraa Jasim Mohammed

, Yuhanis Yusof
, Husniza Binti Husni
:
Document Clustering Based on Firefly Algorithm. 453-465 - Radhwan M. Abduallah, Zuriati Zukarnain

, Farzaneh Masoumiyan, Azizol Abdullah
:
Mobility and Handover Technique in Heterogeneous Wireless Networks. 466-473 - Simanta Kumar Nayak, Bikram Kesari Ratha, Payodhar Padhi, Santosh K. Nanda, Aparajeya Panda:

Investigation of Quantitative Plant Activity Relationship (QPAR) for Diabetics II Using Genetic Algorithm. 474-478 - Mani Arora

, Derick Engles, Sandeep Sharma
:
MDS Algorithm for Encryption. 479-483 - Basel Alshaikhdeeb, Kamsuriah Ahmad:

Integrating Correlation Clustering and Agglomerative Hierarchical Clustering for Holistic Schema Matching. 484-489 - Gothai Ekambaram

, Balasubramanie Palanisamy
:
A Modified Key Partitioning for BigData Using MapReduce in Hadoop. 490-497 - Suhad A. Yousif

, Venus Wazeer Samawi
, Islam Elkabani, Rached N. Zantout
:
Enhancement of Arabic Text Classification Using Semantic Relations of Arabic WordNet. 498-509 - Abbas M. Ali, Shareef Maulod Shareef

:
Spatial Representation to Support Visual Impaired People. 510-516 - Muhammad Asif Khan

, Varun Jeoti:
On the Enlargement of Robust Region of Chaotic Tent Map for the Use in Key Based Substitution-Box (S-Box). 517-525 - Gayathri A., P. Narayanasamy:

Security in MANET's by Using Detective Signature Techniques. 526-533 - T. R. Vedhavathy

, M. S. K. Manikandan:
A Novel Unique Node Based Clustering and Location-Key Pair Based Security for Wireless Networks. 534-539 - Fadi Herzallah

, Muriati Mukhtar:
Organization Information Ecology and E-Commerce Adoption: Effect on Organizational SMEs Performance. 540-551 - Maurizio Palesi, Davide Patti

, Giuseppe Ascia, Daniela Panno, Vincenzo Catania:
Coupling Routing Algorithm and Data Encoding for Low Power Networks on Chip. 552-566 - Dennise Adrianto, Violitta Yesmaya

, Alvin Chandra:
Increasing Learning Frequency through Education Based Game. 567-572 - Ibrahim Mohamed, Mohammad Syuhaimi Ab-Rahman

:
Analytical Analysis of In-Band Crosstalk, Out-of-Band Crosstalk and GVD-Based Power Penalties in DWDM and TDM/DWDM-PONS. 573-589 - Hala Albaroodi, Selvakumar Manickam

, Mohammed Anbar
:
A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift). 590-597
Volume 11, Number 4, 2015
- Sérgio Bimbi Junior

, Vitor Chaves de Oliveira
, Gunnar Bedicks Junior:
Software Defined Radio Implementation of a QPSK Modulator/Demodulator in an Extensive Hardware Platform Based on FPGAs Xilinx ZYNQ. 598-611 - Chansiri Singhtaun

, Suriya Natsupakpong:
Applications of Parallel Computing for Facility Location-Transportation Problems for Disaster Response. 612-620 - Kelton de Souza Santiago, Anderson da Silva Soares, Telma Woerle de Lima

, Clarimar José Coelho, Paulo Henrique Ribeiro Gabriel
:
Genetic Algorithm for Variable and Samples Selection in Multivariate Calibration Problems. 621-626 - Mohammed M. Abu Shquier, Khaled M. Alhawiti

:
Novel Prefix Tri-Literal Word Analyser: Rule-Based Approach. 627-638 - Ahmed Al-Saffar

, Nazlia Omar
:
Integrating a Lexicon Based Approach and K Nearest Neighbour for Malay Sentiment Analysis. 639-644 - Abu Bakar Marini, Surya Ismail, Sufian Bin Idris, Zarina Shukur:

seMeja API Design Based on CRUD+N Concept. 645-661 - Marcos V. O. de Assis, Mario Lemes Proença Jr.

:
Scorpius: sFlow Network Anomaly Simulator. 662-674 - Anmar Abuhamdah

:
Adaptive Acceptance Criterion (AAC) Algorithm for Optimization Problems. 675-691 - Jitendra Nath Singh

, Sanjay K. Dwivedi:
Performance Evaluation of Search Engines Using Enhanced Vector Space Model. 692-698 - Inácio Yano

, Vitor Chaves de Oliveira
, Mauricio Becker, Andreiwid Sheffer Corrêa
:
Applying a Hybrid Polling Approach by Software Implementation to Extend the Lifetime of a Wireless Sensor Network. 699-706
Volume 11, Number 5, 2015
- Ali Ahmad Milad, Zul Azri Bin Muhamad Noh, Abdul Samad Shibghatullah

, Mustafa Almahdi Algaet, Aouache Mustapha
:
Design a New Bidirectional Transmission Protocol to Improve the Performance of MAC Layer Based on Very High Speed WLANs. 707-722 - Mohamad Afendee Mohamed, Abdullah Muhammed

, Mustafa Man
:
A Secure Chat Application Based on Pure Peer-to-Peer Architecture. 723-729 - Filipe Hiluy Lima, Henrique Mariano Costa do Amaral, Denílson Moreira Santos:

Corporate Network Analysis with IPTV Traffic Insertion. 730-737 - Hussam Saad Adeen, Ayman Atia

, Ahmad Amin, Andrew Victor, Abdelrahman Essam, Ehab Gharib, Mohamed Hussien:
RemoAct: Portable Projected Interface with Hand Gesture Interaction. 738-749 - Hazalina Hashim, Shahrul Azman Mohd. Noah

:
Development of Domain Ontology for a Semantic Online Forum. 750-763 - Abdullatif Abolohom, Nazlia Omar

:
A Hybrid Approach to Pronominal Anaphora Resolution in Arabic. 764-771 - Ahsan Abdullah, Sohayp Abo Alshamat, Ahmad Bakhashwain, Muhammad Ahtisham Aslam:

Automatic Text Removal and Replacement in Scanned Meteorological Thematic Maps. 772-783
Volume 11, Number 6, 2015
- Mohammed Nazeh Abdul Wahid, Azizol Abdullah

:
Detecting an Anomaly Behavior through Enhancing the Mechanism of Packet Filtering. 784-793 - Douglas Hiura Longo, Beatriz Wilges, Patricia Vilain, Renato Cislaghi:

Fixture Setup through Object Notation for Implicit Test Fixtures. 794-803 - Saleh Atiewi

, Salman Yussof
, Mohd Ezanee
:
A Comparative Analysis of Task Scheduling Algorithms of Virtual Machines in Cloud Environment. 804-812 - Jayasri Kotti

, Seetha Ramaiah Panchumarthy:
A GQM Based Approach towards the Development of Metrics for Software Safety. 813-820 - Abdullah Soliman Alshra'a

, Venus Wazeer Samawi
:
Load Balancing Technique Based on Broadcasting and Residual Energy Using Adaptive Clustering Hierarchy Protocol (LBEACH). 821-838
Volume 11, Number 7, 2015
- Cheong Hee Park:

Prototype-Based Sample Selection for Active Hashing. 839-844 - Olalekan Bello, Hushairi Zen, Al-Khalid Othman, Khairuddin Abdul Hamid:

Utility-based Scheduling Frameworks for Efficient Quality-of-Service Differentiation in a Mixture of Real-time and Non-real-time Traffics. 845-854 - Parminder Singh Bawa

, Selvakumar Manickam
:
Critical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques. 855-862 - J. Chandra

, M. Nachamai, Anitha S. Pillai:
Correlation Based ADALINE Neural Network for Commodity Trading. 863-871 - Mohammad Ehab Ragab:

Extended Kalman Filter versus Newton-Lowe's Method for Robot Pose Estimation. 872-879
Volume 11, Number 8, 2015
- Inderdeep Kaur Aulakh, Renu Vig

:
Secondary User Sensing Time Optimization in Sensing-Transmission Scheduling for Dynamic Spectrum Access in Cognitive Radio. 880-891 - Taisir Eldos, Waleed Nazih, Aws Kanan:

Maximally Distant Codes Allocation Using Chemical Reaction Optimization and Ant Colony Optimization Algorithms. 892-901 - Shafique Ahmad Chaudhry:

On the Need of Source Address for Route-Error Delivery in 6LoWPAN. 902-914 - Andreas Zendler, Dieter Klaudt:

Instructional Methods to Computer Science Education as Investigated by Computer Science Teachers. 915-927 - Pallab Dutta, Mahesh Kumar, B. Sridharan, Vipin Tyagi:

Efficacy of Numeric Keypad for Computer Illiterates in Rural ICT. 928-935
Volume 11, Number 9, 2015
- Karam Dhafer Mayoof, Rosilah Hassan, Amjed Sid Ahmed

, Ahmed Marwan
:
Performance Evaluation of Handover in WiMax with TCP and UDP as Underlying Protocol. 936-942 - Buchanagandi Enock Nyamajeje, Huiqun Yu:

Reducing Network Bandwidth Cost on End User Resources Consumption in Cloud Environment. 943-956 - Samaneh Mazaheri, Rahmita Wirza, Puteri Suhaiza Sulaiman

, Mohd Zamrin Dimon, Fatimah Khalid
, Rohollah Moosavi Tayebi:
Segmentation Methods of Echocardiography Images for Left Ventricle Boundary Detection. 957-970 - Ammar Ali Neamah

:
New Collisions to Improve Pollard's Rho Method of Solving the Discrete Logarithm Problem on Elliptic Curves. 971-975 - Andréia Alves dos Santos Schwaab, Silvia Modesto Nassar, Paulo José de Freitas Filho:

Automatic Methods for Generation of Type-1 and Interval Type-2 Fuzzy Membership Functions. 976-987
Volume 11, Number 10, 2015
- Alexander A. Galushkin

:
Education in the Field of National Information Security in the Russian Federation and Abroad. 988-994 - Seitim Aiganym:

The Conceptual Principals of Bitcoin Crypto Currency. 995-999 - Thiripurasundari Sivakrishnakumar:

A Comprehensive Study on Mobility Issues in AODV. 1000-1004 - Achmad Rizal

, Risanuri Hidayat
, Hanung Adi Nugroho
:
Signal Domain in Respiratory Sound Analysis: Methods, Application and Future Development. 1005-1016 - Hui-Hui Wang, Yin-Chai Wang, Soo-See Chai:

Towards Semantic User Query: A Review. 1017-1024
Volume 11, Number 11, 2015
- Siew Mooi Lim, Md Nasir Sulaiman, Norwati Mustapha, Abu Bakar Md Sultan

:
Parameter Settings for New Generational Genetic Algorithms for Solving Global Optimization Problems. 1025-1031 - Manar AbuTalib:

Encouraging High School Student Interest in Computing Studies in GCC: UAE Case Study. 1032-1040 - Mohsen Kakavand, Norwati Mustapha, Aida Mustapha

, Mohd Taufik Abdullah, Hamed Riahi:
Issues and Challenges in Anomaly Intrusion Detection for HTTP Web Services. 1041-1053 - Arif Muntasa

:
The Human Facial Expression Classification Using the Center Kernel Subspace based the Ridge Regression. 1054-1059 - Er. Sumit Kaur, R. K. Bansal:

Chronological Advancement in Image Processing from Lime Stone Mofits to Superpixel Classification. 1060-1074
Volume 11, Number 12, 2015
- Inali Wisniewski Soares, Luciane Telinski Wiedermann Agner, Paulo Cézar Stadzisz, Jean Marcelo Simão

:
Application of Platform Models in Model Driven Engineering of Embedded Software. 1075-1081 - Muhammad Arif Saifudin, Bib Paruhum Silalahi

, Imas Sukaesih Sitanggang
:
Star Catalog Generation for Satellite Attitude Navigation Using Density Based Clustering. 1082-1089 - Ahmad Yahya Dawod

, Mohd Jan Nordin, Junaidi Abdullah:
Static Hand Gestures: Fingertips Detection Based on Segmented Images. 1090-1098 - Idawaty Ahmad, Mohamed Othman, Z. Ahmad Zulkarnain:

Enhanced Preemptive Global Utility Accrual Real Time Scheduling Algorithms in Multicore Environment. 1099-1107 - Daniel Strmecki

, Andrija Bernik
, Danijel Radosevic:
Gamification in E-Learning: Introducing Gamified Design Elements into E-Learning Systems. 1108-1117 - Edward David Moreno, Leila C. M. Buarque

, Florêncio Natan, Gustavo Quirino, Ricardo J. P. de B. Salgueiro:
Impact of Asymmetric Encryption Algorithms in a VANET. 1118-1131

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














