Photos
Posts

http://ijcsi.org/contents.php?volume=14&&issue=4

IJCSI Volume 14, Issue 4, July 2017

Person Identification From Text Independent Lip Movement Using the Longest Matching Segment Method...
Paul C. Brown

Offline Handwritten Hindi SWARs Recognition using A Novel Wave based Feature Extraction Method
Ajay Indian and Karamjit Bhatia

Improved Interference Cancellation for Downlink Wavelet Based Multi-Carrier CDMA System
Ahmad Saad El-Deen, Hossam El-Deen Aboubakr Hassan and Atef Mohammed Hassan Ghonem

A new Algorithm for Mining Association Rules Based on Hypothesis Test
Medhat H A Awadalla and Sara G El-Far

Predictive Analysis for Journal Abstracts using Polynomial Neural Networks Algorithm
Adebola K. Ojo

A Self-Adaptive Multi-Resources Suppliers System
Ihab Sbeity, Mohammad-Baker Elkalla and Mohamed Dbouk

A Comprehensive Study of Shilling Attacks in Recommender Systems
Tulika Kumari and Punam Bedi

See More
The International Journal of Computer Science Issues (IJCSI) is a refereed journal for scientific papers dealing with any area of computer science research. The purpose of establishing the scientific journal is the assistance in development of science, fast operative publication and storage of mater...
ijcsi.org

IJCSI Volume 14, Issue 3, May 2017
http://ijcsi.org/contents.php?volume=14&&issue=3

Localization to Bidirectional Languages for a Visual Programming Environment on Smartphones
Aiman M. Ayyal Awwad

...

Improvement of Border Gateway Protocol Against Failure on Autonomous Systems
Nasser Solayman, Ayman El-Sayed and Mohammed Badawy

Fuzzy Expert System of Dental and Oral Disease with Certainty Factor
I Gede Billy Ambara Putra, I Ketut Gede Darma Putra and Ni Kadek Dwi Rusjayanthi

The Control of Information Technology in the Moroccan Parliament
Malik Motii, Alami Semma and Youssef Ait Houaich

A Study On Unsupervised IDS Techniques
Ujjwal Bhangale, Manthan Agrawal, Avadh Agrawal and Krushna Darade

Towards a new approach to pooling COBIT 5 and ITIL V3 with ISO/IEC 27002 for better use of ITG in the Moroccan parliament
Malik Motii and Alami Semma

Reliability Analysis of Modified Irregular Augmented Shuffle Exchange Network (MIASEN)
Shobha Arya and Nipur Singh

New Model to Achieve Software Quality Assurance in E-Learning Application
Fatima Mustafa Hassan A Min and Nadir Kamal Salih

The Security Screening Process Optimization based on Cellular Automatan Model
Zi-Hui Zhang, Hui-Nan Zhu, Gang He and Xiu-Fen Wan

A New Index for Evaluating Academic Performance: Hos - index
Handan Ankarali, Ozge Pasin and Seyit Ankarali

Engineering Drawing Teaching Exploration and Reformation in Xinxiang Medical University
Zhu Yongtao, He Xinyu, Lou Yuancang, Wang Jiao, Zhao Fang and Ren Wu

Legal requirements process for compliance and risk assessment using axiomatic design
Rhythm Wadhwa

Study on Performance Analysis of HQAM for DCT and DWT Based Compressed Image Transmission over AWGN Channel
Rezaul Karim, Shahela Pervin, Umme Moon Ima and Md. Khaliluzzaman

State of the art of Trust and Reputation Systems in E-Commerce Context
Hasnae Rahimi and Hanan El Bakkali

Risk Assessment for Maritime Safety: A brief research review
Rhythm Wadhwa

The L(2,1)-Labelings on the Homomorphic Product of two Graphs
Anuj Kumar and P. Pradhan

See More
The International Journal of Computer Science Issues (IJCSI) is a refereed journal for scientific papers dealing with any area of computer science research. The purpose of establishing the scientific journal is the assistance in development of science, fast operative publication and storage of mater...
ijcsi.org
Posts

IJCSI Volume 14, Issue 2, March 2017
http://ijcsi.org/contents.php?volume=14&&issue=2

Friend Recommendation Algorithm Based on Fragmentation of Time and Transmission of Interest
Sun Shibao, Jia Bowen, Zhang Jingshan, Zhang Yanan, Yan Xiaolong and Yin Lihang

...

Social Engineering Framework: Understanding the Deception Approach to Human Element of Security
Richardus Eko Indrajit

Usability Evaluation Method based on ISO/IEC SQuaRE: A Systematic Mapping Study
Tenia Wahyuningrum and Azhari

Exploring the Potential of the Innate Immune System for Computers Network Security
Almotasem Bellah Ahmad Alajlouni

Rule Based Gujarati Morphological Analyzer
Utkarsh Kapadia and Apurva Desai

Cybercrime in Saudi Arabia: fact or fiction?
Sulaiman Al Amro

A Method for Normalizing Students Scores Case Study Faculty of Information Technology At Al-Ahliyya Amman University
Khaled Al-Jubori and Mustafa Yaseen

Empirical study of project management dimensions: guidelines for an adapted standard to SMEs and large enterprises in developing countries (Moroccan case)
Amina Oukennou, Zitouni Beidouri and Otmane Bouksour

A Brief Study of Challenges in Machine Translation
H.Mohamed Zakir and M.Shafeen Nagoor

Extended SPINS Framework for Security Wireless Sensor Network
Khalid M. Abdullah, Essam H. Houssein and Hala H. Zayed

An Evaluation of Load Balancing between Server Platforms inside a Data Center
Amer Tahseen Abu Jassar

The state of IT Governance in Moroccan Public Sector
Naima Nakabi, Hatim Tadili and Alami Semaa

See More

The server hosting the journal website (http://ijcsi.org) is currently down for maintenance purposes. As soon as things will be back to normal, we will update this post. Thank you for your patience.

Update 1: The server is now back online and so is the journal website. Thank you for your patience.

The International Journal of Computer Science Issues (IJCSI) is a refereed journal for scientific papers dealing with any area of computer science research. The purpose of establishing the scientific journal is the assistance in development of science, fast operative publication and storage of mater...
ijcsi.org

IJCSI Volume 14, Issue 1, January 2017
http://ijcsi.org/contents.php?volume=14&&issue=1

A QoS-aware MAC protocol for Wireless Sensor Networks
Guoqiang Zheng, Yaru Sun, Bingwu Kang, Huahong Ma, Jishun Li and Yuting Wang

...

Memory Limited Trust Public Opinion Evolution Model In Accelerated Growth HK Network
Zhang Jingshan, Ma Baohua, Sun Shibao and Zhang Yanan

Improved Decoding of linear Block Codes using compact Genetic Algorithms with larger tournament size
Ahlam Berkani, Ahmed Azouaoui, Mostafa Belkasmi and Bouchaib Aylaj

Real time monitoring of proportional myo-control by antagonist co-activation
Abdelali Laamarti, Abdelhakim Lakhdar, Omar Battas, Imane Kermadi and Mohammed Abdoh Rafai

Development of Robust-Secure Data Hiding Technique for Color Images
M.A. Mohamed, M.E.A. Abou-Elseoud and Islam .M. Ibrahim

A Study on the Conversion of VRML to X3D In A Highly Complex and Detailed Web3D World
Mursid W. Hananto and Ahmad Ashari

Preprocessing MRI Images of Colorectal Cancer
Srivaramangai R, Prakash Hiremath and Ajay S Patil

Mitigating Evil Twin Attacks in Wireless 802.11 Networks at Jordan
Sinan Ameen Noman, Malik Qasaimeh, Raad Al-Qassas and Haitham Ameen Noman

Investigating the uniqueness of Singular Values for image recognition
Nesreen Nusair and Mohd Belal Al-Zoubi

Proposed ZAH_BAU filter for RGB color image enhancement
Ashraf Abdel-Karim Abu-Ein and Ziad A. Alqadi

Biterm for spam filtering in short message service text
Richard Omolo Midigo, Waweru Mwangi and George Onyango Okeyo

Improving Access to Radiology Health Care Services in Rural Areas of Developing Nations through a Secure Web Based Teleradiology Steganographic Method
Gabriel Kamau, Wilson Cheruiyot and Waweru Mwangi

Parallel and Scalable Map Reduce and Pipeline Tree Classifiers for Massive Dataset Using Map Reduce and Data Flow Pipeline
A. M. James Raj, J. Prema, P. Xavier and F. Sagayaraj Francis

Towards a new process-centric approach of social mediation management in Morocco
Yousaf Khiat, Hassan Nachifa and Mohammed Ftouhi

Net Neutrality and scenarios of Internet Pricing
Maloba Mbuya Firmin

The effect of N-gram indexing on Arabic documents retrieval
Emad Fawzi Al-Shalabi

Steganography Based on Local Binary Pattern and Discrete Wavelet transformation
Anuradha Singhal

See More

IJCSI Volume 13, Issue 6, November 2016
http://ijcsi.org/contents.php?volume=13&&issue=6

A New Efficient Certificateless Multi-Receiver Public Key Encryption Scheme
Jun Zhu, Lin-Lin Chen, Xian Zhu and Ling Xie

...

A dynamic deployment method of micro service oriented to SLA
Zhen-Ling Ji and Yong Liu

A pattern based methodology for analyzing enterprise architecture landscape
Jihane Lakhrouit and Karim Baïna

The lo-norm-based Blind Image Deconvolution: Comparison and Inspiration
Hai-Song Deng and Wen-Ze Shao

5G Wireless Communications Systems: Heterogeneous Network Architecture and Design for Small Cells, D2D Communications (Low Range, Multi-hop) and Wearable Healthcare System on chip (ECG, EEG) for 5G Wireless
Niraj Shakhakarmi

Ear Recognition using a novel Feature Extraction Approach
Ibrahim Omara, Feng Li, Ahmed Hagag, Souleyman Chaib and Wangmeng Zuo

TLM Platform Based on SystemC for Hybrid MSR Topology
Abid Noureddine, Zitouni Abdelkrim and Tourki Rached

Sext3: The Secure Ext3
Raza Muhammad, Zhou Ke and Basheer Riskhan

Graph Theoretic and Genetic Algorithm-Based Model for Web Content Mining
Moses Akinjide Adelola, Sunday Olumide Adewale and Gabriel Babatunde Iwasokun

A Localization Algorithm for Wireless Sensor Networks Using One Mobile Beacon
Ahmed Elsayed Aboelhassab and Salwa Elramly

An Approach Using Dynamic Deferred Acknowledgement to Improve TCP Performance in Multi-Hop Wireless Networks
K. Praveen Kumar Rao and T. Senthil Murugan

Modeling and simulation of multi-disk auto-balancing rotor
Yang Yi-Jiao, Tan Qing, Yi Nian-En and Yang Jun-Zhe

Lie Face Recognition Use CBIR (Content Based Image Retrieval) Techniques for Otomation System
Dodi Yudo Setyawan and Muhammad Rafiq

HomeGuard: A Smart System to Deal with the Emergency Response of Domestic Violence Victims
Anik Islam, Arifa Akter and Bayzid Ashik Hossain

Implementation of Email Security using PGP at Zimbramail Server
Made Sudarma and Dandy Pramana Hostiadi

AluxBot - A Chatbot that Encourages the Care for the Environment
Jorge Peniche-Avilés, Carlos Miranda-Palma, Lizzie Narváez-Díaz and Erika Llanes-Castro

Multi-body dynamics and Biomedical Engineering Development
Wu Ren, Zhong Wei Li, Jiao Wang, Yanping Bi, Yang Luo, Yuancang Lou and Yi Yu

Information Security Issues and Threats in Saudi Arabia: A Research Survey
Ahmed Alzahrani and Khalid Alomar

Serious Game to Combat Childhood Obesity Using Kinect
Rosa Rodriguez-Dzib, Jose Lopez-Martinez, Victor Chi-Pech and Erika Llanes-Castro

Transforming Government: A Proposed Model for Culture Centred Design Approach
Noliza Saidin, Dalbir Singh and Zainul Akramin Mohd Drus

Applications of Modern Optimization Methods for Controlling Parallel Connected DC-DC Buck Converters
Ali S. Al-Dmour

LBPV Based Partial Face Recognition
M Naveena

See More

(14th Dec 2016): Important: The journal server (ijcsi.org) is currently down for maintenance purposes. We apologize for any inconvenience caused. As soon as things will get better, we will post an update. You can email us at editor.ijcsi@gmail.com Thank you.

Update (15th Dec 2016): We migrated the journal to another server which is more stable. However, we still have a few issues to fix and the journal website will be available on Saturday 17th December 2016.

Update (16th Dec 2016): Since most issues were fixed, we decided to allow access to the journal some hours ago. You can now browse the journal website. Thank you.

Recommender System in Big Data Environment
Udeh Tochukwu Livinus, Rachid Chelouah and Houcine Senoussi
Download Full-Text
Web Server Vulnerability Analysis in the context of Transport Layer Security (TLS)

IJCSI Volume 13, Issue 4, July 2016
http://ijcsi.org/contents.php?volume=13&&issue=4

Path planning and Obstacle avoidance approaches for Mobile robot
Hoc Thai Nguyen and Hai Xuan Le

...

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks
Yee Ming Chen

Effectiveness of Data Vault compared to Dimensional Data Marts on Overall Performance of a Data Warehouse System
Zaineb Naamane

An Intelligent Data Processing Method for ResidentialLoad Analysis
Gaochao Cui, Li Zhu, Dongsheng Wang and Jianting Cao

A Study of Speech Emotion and Speaker Identification System using VQ and GMM
Sushma Bahuguna and Y. P. Raiwani

An Ontology Construction Approach for retrieval of the Museum Artifacts Using Protege
Manoj Kumar Sharma and Tanveer J Siddiqui

Impact of table partitioning on the query execution performance
Jaumin Ajdari, Nehat Mustafa, Xhemal Zenuni, Bujar Raufi and Florije Ismaili

Ontology-driven Approach for Knowledge Sharing and Retrieval
Nevin M. Matasyoh, George Okeyo and Wilson Cheruiyot

Tree Method Implementation in Geographic Information System of Pura Kawitan in Bali Based On Android Mobile
Putu Resatya Andrian, I Nyoman Piarsa and Ni Kadek Ayu Wirdiani

Implementation of Data Mining in Analyzing Social Media Users Personality with Nave Bayes Classifier: A Case Study of Instagram Social Media
R. Sudrajat, M.Si., Rudi Rosadi and Harits Muhammad

Android Navigation Application with Location-Based Augmented Reality
I Nyoman Piarsa, Putu Wira Buana and I Gede Agus Mahasadhu

An Efficient Method to Digitize Polygon Objects of a Black and White Raster Map
Krishan Kundu, Prasun Halder and Jyotsna Kumar Mandal

A Literature Survey: Towards a framework for evaluating quality in academic websites
James Kiprop Kosgey, Agnes Mindila and Otieno Calvins

Developing A Learning Knowledge-Based System For Diagnosis And Treatment Of Malaria
Chala Diriba, Million Meshesha and Debela Tesfaye

The Benefit Of Using More Than One Elman Neural Network For Off-Line Signature Recognition System
Shatha M., Manar Al-Abaji and Maher Hussien

See More
Path planning and Obstacle avoidance approaches for Mobile robot
Hoc Thai Nguyen and Hai Xuan Le
Download Full-Text

IJCSI Volume 13, Issue 4, July 2016 Published: http://ijcsi.org/contents.php?volume=13&&issue=4

The International Journal of Computer Science Issues (IJCSI) is a refereed journal for scientific papers dealing with any area of computer science research. The purpose of establishing the scientific journal is the assistance in development of science, fast operative publication and storage of mater...
ijcsi.org

IJCSI Volume 13, Issue 3, May 2016 Published: http://ijcsi.org/contents.php?volume=13&&issue=3

The International Journal of Computer Science Issues (IJCSI) is a refereed journal for scientific papers dealing with any area of computer science research. The purpose of establishing the scientific journal is the assistance in development of science, fast operative publication and storage of mater...
ijcsi.org

IJCSI Volume 13, Issue 2, March 2016 Published: http://ijcsi.org/contents.php?volume=13&&issue=2

The International Journal of Computer Science Issues (IJCSI) is a refereed journal for scientific papers dealing with any area of computer science research. The purpose of establishing the scientific journal is the assistance in development of science, fast operative publication and storage of mater…
ijcsi.org

Journal website offline for the moment. Server maintenance issue going on. Will update as soon as things evolve. Thank you.

IJCSI Volume 13, Issue 1, January 2016 Issue published: https://dx.doi.org/10.20943/IJCSI-201602

The International Journal of Computer Science Issues (IJCSI) is a refereed journal for scientific papers dealing with any area of computer science research. The purpose of establishing the scientific journal is the assistance in development of science, fast operative publication and storage of mater…
ijcsi.org