
http://ijcsi.org/contents.php?volume=14&&issue=4
IJCSI Volume 14, Issue 4, July 2017
Person Identification From Text Independent Lip Movement Using the Longest Matching Segment Method...
Paul C. Brown
Offline Handwritten Hindi SWARs Recognition using A Novel Wave based Feature Extraction Method
Ajay Indian and Karamjit Bhatia
Improved Interference Cancellation for Downlink Wavelet Based Multi-Carrier CDMA System
Ahmad Saad El-Deen, Hossam El-Deen Aboubakr Hassan and Atef Mohammed Hassan Ghonem
A new Algorithm for Mining Association Rules Based on Hypothesis Test
Medhat H A Awadalla and Sara G El-Far
Predictive Analysis for Journal Abstracts using Polynomial Neural Networks Algorithm
Adebola K. Ojo
A Self-Adaptive Multi-Resources Suppliers System
Ihab Sbeity, Mohammad-Baker Elkalla and Mohamed Dbouk
A Comprehensive Study of Shilling Attacks in Recommender Systems
Tulika Kumari and Punam Bedi
IJCSI Volume 14, Issue 3, May 2017
http://ijcsi.org/contents.php?volume=14&&issue=3
Localization to Bidirectional Languages for a Visual Programming Environment on Smartphones
Aiman M. Ayyal Awwad
Improvement of Border Gateway Protocol Against Failure on Autonomous Systems
Nasser Solayman, Ayman El-Sayed and Mohammed Badawy
Fuzzy Expert System of Dental and Oral Disease with Certainty Factor
I Gede Billy Ambara Putra, I Ketut Gede Darma Putra and Ni Kadek Dwi Rusjayanthi
The Control of Information Technology in the Moroccan Parliament
Malik Motii, Alami Semma and Youssef Ait Houaich
A Study On Unsupervised IDS Techniques
Ujjwal Bhangale, Manthan Agrawal, Avadh Agrawal and Krushna Darade
Towards a new approach to pooling COBIT 5 and ITIL V3 with ISO/IEC 27002 for better use of ITG in the Moroccan parliament
Malik Motii and Alami Semma
Reliability Analysis of Modified Irregular Augmented Shuffle Exchange Network (MIASEN)
Shobha Arya and Nipur Singh
New Model to Achieve Software Quality Assurance in E-Learning Application
Fatima Mustafa Hassan A Min and Nadir Kamal Salih
The Security Screening Process Optimization based on Cellular Automatan Model
Zi-Hui Zhang, Hui-Nan Zhu, Gang He and Xiu-Fen Wan
A New Index for Evaluating Academic Performance: Hos - index
Handan Ankarali, Ozge Pasin and Seyit Ankarali
Engineering Drawing Teaching Exploration and Reformation in Xinxiang Medical University
Zhu Yongtao, He Xinyu, Lou Yuancang, Wang Jiao, Zhao Fang and Ren Wu
Legal requirements process for compliance and risk assessment using axiomatic design
Rhythm Wadhwa
Study on Performance Analysis of HQAM for DCT and DWT Based Compressed Image Transmission over AWGN Channel
Rezaul Karim, Shahela Pervin, Umme Moon Ima and Md. Khaliluzzaman
State of the art of Trust and Reputation Systems in E-Commerce Context
Hasnae Rahimi and Hanan El Bakkali
Risk Assessment for Maritime Safety: A brief research review
Rhythm Wadhwa
The L(2,1)-Labelings on the Homomorphic Product of two Graphs
Anuj Kumar and P. Pradhan
IJCSI Volume 14, Issue 2, March 2017
http://ijcsi.org/contents.php?volume=14&&issue=2
Friend Recommendation Algorithm Based on Fragmentation of Time and Transmission of Interest
Sun Shibao, Jia Bowen, Zhang Jingshan, Zhang Yanan, Yan Xiaolong and Yin Lihang
Social Engineering Framework: Understanding the Deception Approach to Human Element of Security
Richardus Eko Indrajit
Usability Evaluation Method based on ISO/IEC SQuaRE: A Systematic Mapping Study
Tenia Wahyuningrum and Azhari
Exploring the Potential of the Innate Immune System for Computers Network Security
Almotasem Bellah Ahmad Alajlouni
Rule Based Gujarati Morphological Analyzer
Utkarsh Kapadia and Apurva Desai
Cybercrime in Saudi Arabia: fact or fiction?
Sulaiman Al Amro
A Method for Normalizing Students Scores Case Study Faculty of Information Technology At Al-Ahliyya Amman University
Khaled Al-Jubori and Mustafa Yaseen
Empirical study of project management dimensions: guidelines for an adapted standard to SMEs and large enterprises in developing countries (Moroccan case)
Amina Oukennou, Zitouni Beidouri and Otmane Bouksour
A Brief Study of Challenges in Machine Translation
H.Mohamed Zakir and M.Shafeen Nagoor
Extended SPINS Framework for Security Wireless Sensor Network
Khalid M. Abdullah, Essam H. Houssein and Hala H. Zayed
An Evaluation of Load Balancing between Server Platforms inside a Data Center
Amer Tahseen Abu Jassar
The state of IT Governance in Moroccan Public Sector
Naima Nakabi, Hatim Tadili and Alami Semaa
The server hosting the journal website (http://ijcsi.org) is currently down for maintenance purposes. As soon as things will be back to normal, we will update this post. Thank you for your patience.
Update 1: The server is now back online and so is the journal website. Thank you for your patience.
IJCSI Volume 14, Issue 1, January 2017
http://ijcsi.org/contents.php?volume=14&&issue=1
A QoS-aware MAC protocol for Wireless Sensor Networks
Guoqiang Zheng, Yaru Sun, Bingwu Kang, Huahong Ma, Jishun Li and Yuting Wang
Memory Limited Trust Public Opinion Evolution Model In Accelerated Growth HK Network
Zhang Jingshan, Ma Baohua, Sun Shibao and Zhang Yanan
Improved Decoding of linear Block Codes using compact Genetic Algorithms with larger tournament size
Ahlam Berkani, Ahmed Azouaoui, Mostafa Belkasmi and Bouchaib Aylaj
Real time monitoring of proportional myo-control by antagonist co-activation
Abdelali Laamarti, Abdelhakim Lakhdar, Omar Battas, Imane Kermadi and Mohammed Abdoh Rafai
Development of Robust-Secure Data Hiding Technique for Color Images
M.A. Mohamed, M.E.A. Abou-Elseoud and Islam .M. Ibrahim
A Study on the Conversion of VRML to X3D In A Highly Complex and Detailed Web3D World
Mursid W. Hananto and Ahmad Ashari
Preprocessing MRI Images of Colorectal Cancer
Srivaramangai R, Prakash Hiremath and Ajay S Patil
Mitigating Evil Twin Attacks in Wireless 802.11 Networks at Jordan
Sinan Ameen Noman, Malik Qasaimeh, Raad Al-Qassas and Haitham Ameen Noman
Investigating the uniqueness of Singular Values for image recognition
Nesreen Nusair and Mohd Belal Al-Zoubi
Proposed ZAH_BAU filter for RGB color image enhancement
Ashraf Abdel-Karim Abu-Ein and Ziad A. Alqadi
Biterm for spam filtering in short message service text
Richard Omolo Midigo, Waweru Mwangi and George Onyango Okeyo
Improving Access to Radiology Health Care Services in Rural Areas of Developing Nations through a Secure Web Based Teleradiology Steganographic Method
Gabriel Kamau, Wilson Cheruiyot and Waweru Mwangi
Parallel and Scalable Map Reduce and Pipeline Tree Classifiers for Massive Dataset Using Map Reduce and Data Flow Pipeline
A. M. James Raj, J. Prema, P. Xavier and F. Sagayaraj Francis
Towards a new process-centric approach of social mediation management in Morocco
Yousaf Khiat, Hassan Nachifa and Mohammed Ftouhi
Net Neutrality and scenarios of Internet Pricing
Maloba Mbuya Firmin
The effect of N-gram indexing on Arabic documents retrieval
Emad Fawzi Al-Shalabi
Steganography Based on Local Binary Pattern and Discrete Wavelet transformation
Anuradha Singhal
IJCSI Volume 13, Issue 6, November 2016
http://ijcsi.org/contents.php?volume=13&&issue=6
A New Efficient Certificateless Multi-Receiver Public Key Encryption Scheme
Jun Zhu, Lin-Lin Chen, Xian Zhu and Ling Xie
A dynamic deployment method of micro service oriented to SLA
Zhen-Ling Ji and Yong Liu
A pattern based methodology for analyzing enterprise architecture landscape
Jihane Lakhrouit and Karim Baïna
The lo-norm-based Blind Image Deconvolution: Comparison and Inspiration
Hai-Song Deng and Wen-Ze Shao
5G Wireless Communications Systems: Heterogeneous Network Architecture and Design for Small Cells, D2D Communications (Low Range, Multi-hop) and Wearable Healthcare System on chip (ECG, EEG) for 5G Wireless
Niraj Shakhakarmi
Ear Recognition using a novel Feature Extraction Approach
Ibrahim Omara, Feng Li, Ahmed Hagag, Souleyman Chaib and Wangmeng Zuo
TLM Platform Based on SystemC for Hybrid MSR Topology
Abid Noureddine, Zitouni Abdelkrim and Tourki Rached
Sext3: The Secure Ext3
Raza Muhammad, Zhou Ke and Basheer Riskhan
Graph Theoretic and Genetic Algorithm-Based Model for Web Content Mining
Moses Akinjide Adelola, Sunday Olumide Adewale and Gabriel Babatunde Iwasokun
A Localization Algorithm for Wireless Sensor Networks Using One Mobile Beacon
Ahmed Elsayed Aboelhassab and Salwa Elramly
An Approach Using Dynamic Deferred Acknowledgement to Improve TCP Performance in Multi-Hop Wireless Networks
K. Praveen Kumar Rao and T. Senthil Murugan
Modeling and simulation of multi-disk auto-balancing rotor
Yang Yi-Jiao, Tan Qing, Yi Nian-En and Yang Jun-Zhe
Lie Face Recognition Use CBIR (Content Based Image Retrieval) Techniques for Otomation System
Dodi Yudo Setyawan and Muhammad Rafiq
HomeGuard: A Smart System to Deal with the Emergency Response of Domestic Violence Victims
Anik Islam, Arifa Akter and Bayzid Ashik Hossain
Implementation of Email Security using PGP at Zimbramail Server
Made Sudarma and Dandy Pramana Hostiadi
AluxBot - A Chatbot that Encourages the Care for the Environment
Jorge Peniche-Avilés, Carlos Miranda-Palma, Lizzie Narváez-DÃaz and Erika Llanes-Castro
Multi-body dynamics and Biomedical Engineering Development
Wu Ren, Zhong Wei Li, Jiao Wang, Yanping Bi, Yang Luo, Yuancang Lou and Yi Yu
Information Security Issues and Threats in Saudi Arabia: A Research Survey
Ahmed Alzahrani and Khalid Alomar
Serious Game to Combat Childhood Obesity Using Kinect
Rosa Rodriguez-Dzib, Jose Lopez-Martinez, Victor Chi-Pech and Erika Llanes-Castro
Transforming Government: A Proposed Model for Culture Centred Design Approach
Noliza Saidin, Dalbir Singh and Zainul Akramin Mohd Drus
Applications of Modern Optimization Methods for Controlling Parallel Connected DC-DC Buck Converters
Ali S. Al-Dmour
LBPV Based Partial Face Recognition
M Naveena
(14th Dec 2016): Important: The journal server (ijcsi.org) is currently down for maintenance purposes. We apologize for any inconvenience caused. As soon as things will get better, we will post an update. You can email us at editor.ijcsi@gmail.com Thank you.
Update (15th Dec 2016): We migrated the journal to another server which is more stable. However, we still have a few issues to fix and the journal website will be available on Saturday 17th December 2016.
Update (16th Dec 2016): Since most issues were fixed, we decided to allow access to the journal some hours ago. You can now browse the journal website. Thank you.
IJCSI Volume 13, Issue 4, July 2016
http://ijcsi.org/contents.php?volume=13&&issue=4
Path planning and Obstacle avoidance approaches for Mobile robot
Hoc Thai Nguyen and Hai Xuan Le
Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks
Yee Ming Chen
Effectiveness of Data Vault compared to Dimensional Data Marts on Overall Performance of a Data Warehouse System
Zaineb Naamane
An Intelligent Data Processing Method for ResidentialLoad Analysis
Gaochao Cui, Li Zhu, Dongsheng Wang and Jianting Cao
A Study of Speech Emotion and Speaker Identification System using VQ and GMM
Sushma Bahuguna and Y. P. Raiwani
An Ontology Construction Approach for retrieval of the Museum Artifacts Using Protege
Manoj Kumar Sharma and Tanveer J Siddiqui
Impact of table partitioning on the query execution performance
Jaumin Ajdari, Nehat Mustafa, Xhemal Zenuni, Bujar Raufi and Florije Ismaili
Ontology-driven Approach for Knowledge Sharing and Retrieval
Nevin M. Matasyoh, George Okeyo and Wilson Cheruiyot
Tree Method Implementation in Geographic Information System of Pura Kawitan in Bali Based On Android Mobile
Putu Resatya Andrian, I Nyoman Piarsa and Ni Kadek Ayu Wirdiani
Implementation of Data Mining in Analyzing Social Media Users Personality with Nave Bayes Classifier: A Case Study of Instagram Social Media
R. Sudrajat, M.Si., Rudi Rosadi and Harits Muhammad
Android Navigation Application with Location-Based Augmented Reality
I Nyoman Piarsa, Putu Wira Buana and I Gede Agus Mahasadhu
An Efficient Method to Digitize Polygon Objects of a Black and White Raster Map
Krishan Kundu, Prasun Halder and Jyotsna Kumar Mandal
A Literature Survey: Towards a framework for evaluating quality in academic websites
James Kiprop Kosgey, Agnes Mindila and Otieno Calvins
Developing A Learning Knowledge-Based System For Diagnosis And Treatment Of Malaria
Chala Diriba, Million Meshesha and Debela Tesfaye
The Benefit Of Using More Than One Elman Neural Network For Off-Line Signature Recognition System
Shatha M., Manar Al-Abaji and Maher Hussien
IJCSI Volume 13, Issue 4, July 2016 Published: http://ijcsi.org/contents.php?volume=13&&issue=4
IJCSI Volume 13, Issue 3, May 2016 Published: http://ijcsi.org/contents.php?volume=13&&issue=3
IJCSI Volume 13, Issue 2, March 2016 Published: http://ijcsi.org/contents.php?volume=13&&issue=2
Journal website offline for the moment. Server maintenance issue going on. Will update as soon as things evolve. Thank you.
IJCSI Volume 13, Issue 1, January 2016 Issue published: https://dx.doi.org/10.20943/IJCSI-201602















