首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Computer Science and Information Security
ISSN Print: 1947-5500
ISSN Online:
主页:
http://sites.google.com/site/ijcsis/
分享:
Go
V-Diagnostic: A Data Mining System For Human Immuno- Deficiency Virus Diagnosis
Omowunmi O. Adeyemo
,
Adenike O. Osofisan
Student Modeling using Case-Based Reasoning in Conventional Learning System
Indriana Hidayah
,
Alvi Syahrina
,
Adhistya Erna Permanasari
Mapping Relational Database into OWL Structure with Data Semantic Preservation
Noreddine GHERABI
,
Khaoula ADDAKIRI
,
Mohamed BAHAJ
Fingerprint Feature Extraction and Identification using Direction Oriented Matrix with Color Band
T. Vidhya
,
T. K. Thivakaran
Information Security on The Communication Network In Nigeria Based On Digital Signature
O. S. Adebayo
,
V. O. Waziri
,
J.A Ojeniyi
,
S. A. Bashir
Phases vs. Levels using Decision Trees for Intrusion Detection Systems
Heba Ezzat Ibrahim
,
Sherif M. Badr
,
Mohamed A. Shaheen
Frankenstein’s other Monster: Toward a Philosophy of Information Security
Paul D. Nugent
,
Amjad Ali
Comprehensive Analysis of π Base Exponential Functions as a Window
Mahdi Nouri
,
Sepideh Lahooti
,
Sepideh Vatanpour
,
Negar Besharatmehr
Analysis & Selection of Requirements Elicitation Techniques for OSSD
Munazza Ishtiaq
,
Fareeha Choudhry
,
Fahim Ashraf Awan
,
Aasia Khanum
STX Scheme for Reducing Latency with Centralized Matching Algorithms
G. Ramesh Kumar
,
S. Tharani
Analysis of Stock Marketing with SOAP service using Python
P. Asha
,
T. Jebarajan
,
Kathiresan
Secure Communication with Flipping Substitute Permutation Algorithm for Electronic Copy right Management System
C. Parthasarathy
,
G. Ramesh Kumar
,
S. K. Srivatsa
Even Harmonious Graphs with Applications
P.B. Sarasija
,
R. Binthiya
Implementation of Dynamic Time Warping for Video Indexing
S. Prasanna
,
S. Purushothaman
,
A. Jothi
A Multi-criteria Decision Model For EOL Computers in Reverse Logistics
K.ArunVasantha Geethan
,
S.Jose
,
R.Devisree
,
S.Godwin Barnabas
Analysis and Comparison of Medical Image Fusion Techniques: Wavelet based Transform and Contourlet based Transform
C G Ravichandran
,
R. Rubesh Selvakumar
,
S. Goutham
Performance Comparison of TCP Variants in Mobile Ad- Hoc Networks
Mandakini Tayade
,
Sanjeev Sharma
Adaptive MIMO-OFDM Scheme with Reduced Computational Complexity and Improved Capacity
L. C. Siddanna Gowd
,
A. R. Rajini
,
A. R. Rajini
PAPR Reduction of OFDM Signal Using Error Correcting Code and Selective Mapping
Anshu
,
Himanshu Sharma
Highly Dynamic Nature of Mobile AD-HOC Networks (MANETs): Requirement of Stringent Security Measures
P. Balagangadhar Rao
Facial Tracking Using Radial Basis Function
P. Mayilvahanan
,
S. Purushothaman
,
A. Jothi
Email Authorship Identification Using Radial Basis Function
A. Pandian
,
Md. Abdul Karim Sadiq
Information Agents in Database Systems as a New Paradigm for Software Developing Process
Eva Cipi
,
Betim Cico
Image Processing: The Comparison of the Edge Detection Algorithms for Images in Matlab
Ehsan Azimirad
,
Javad Haddadnia
An Empirical Comparison of Boosting and Bagging Algorithms
R. Kalaichelvi Chandrahasan
,
Angeline Christobel Y
,
Usha Rani Sridhar
,
Arockiam L
A Framework for Identifying Software Vulnerabilities within SDLC Phases
Zeinab Moghbel
,
Nasser Modiri
Detection and Tracking of objects in Analysing of Hyper spectral High-Resolution Imagery and Hyper spectral Video Compression
T. Arumuga Maria Devi
,
Nallaperumal Krishnan
,
K.K Sherin
,
Mariadas Ronnie C.P
Performance Evaluation of TCP over Mobile Ad-hoc Networks
Foez Ahmed
,
Sateesh Kumar Pradhan
,
,
Nayeema Islam
,
,
Sumon Kumar Debnath
Simulation of Grover’s Algorithm Quantum Search in a Classical Computer
A.B. Mutiara
,
R. Refianti
The Impact of Speed on the Performance of Dynamic Source Routing in Mobile Ad-Hoc Networks
Naseer Ali Husieen
,
Osman B Ghazali
,
Suhaidi Hassan
,
Mohammed M. Kadhum
Hybrid Fingerprint Image compression and Decompression Technique
R.Seshadri
,
Yaswanth Kumar.Avulapti
,
M.Usha Rani
EFRRA: An Efficient Fault-Resilient-Replica-Algorithm for Content Distribution Networks
Amutharaj. J
,
Radhakrishnan. S.
SAR Image Segmentation using Vector Quantization Technique on Entropy Images
Dr. H. B. Kekre
,
Saylee Gharge
,
,
Tanuja K. Sarode
Multicast Routing and Wavelength Assignment for Capacity Improvement in Wavelength Division Multiplexing Networks
N. Kaliammal
,
G. Gurusamy
Off-line Handwritten Signature Recognition Using Wavelet Neural Network
Mayada Tarek
,
Taher Hamza
,
Elsayed Radwan
Ultra Fast Computing Using Photonic Crystal Based Logic Gates
X. Susan Christina
,
A. P. Kapilan
,
P. Elizabeth Caroline
Effective Packet Management Scheme in Wireless Ad-Hoc Networks using Distributed Spanning Tree
J. Amudhavel
,
M.S.Saleem Basha
,
T. Vengattaraman
,
P. Dhavachelvan
Analytical Comparison of Fairness Principles for Resource Sharing in Packet-Based Communication Networks
Yaser Miaji
,
Suhaidi Hassan
FP-tree and COFI Based Approach for Mining of Multiple Level Association Rules in Large Databases
Virendra Kumar Shrivastava
,
Dr. Parveen Kumar
,
Dr. K. R. Pardasani
Secure Framework for Mobile Devices to Access Grid Infrastructure
Kashif Munir
,
Lawan Ahmad Mohammad
An Extension for Combination of Duty Constraints in Role-Based Access Control
Ali Hosseini
,
,
Mohammad Abdollahi Azgomi
High-Precision Half-Wave Rectifier Circuit In Dual Phase Output Mode
Theerayut Jamjaem
,
Bancha Burapattanasiri
Architecture of Network Management Tools for Heterogeneous System
Rosilah Hassan
,
Rozilawati Razali
,
Shima Mohseni
,
Ola Mohamad
Web-Based Expert System for Civil Service Regulations: RCSES
Mofreh Hogo
,
Khaled Fouad
,
Fouad Mousa
A New Method to Extract Dorsal Hand Vein Pattern using Quadratic Inference Function
Maleika Heenaye- Mamode Khan
,
Naushad Ali Mamode Khan
Sinusoidal Frequency Doublers Circuit With Low Voltage + 1.5 Volt CMOS Inverter
Bancha Burapattanasiri
A Framework for Validation of Object-Oriented Design Metrics
Devpriya Soni
,
Ritu Shrivastava
,
M. Kumar
A Topological derivative based image segmentation for sign language recognition system using isotropic filter
M. Krishnaveni
,
Dr. V. Radha
A New Image Steganography Based On First Component Alteration Technique
Amanpreet Kaur
,
Renu Dhir
,
Geeta Sikka
Design and Analysis of a Spurious Switching Suppression Technique Equipped Low Power Multiplier with Hybrid Encoding Scheme
S.Saravanan
,
M.Madheswaran
Go