首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Computer Science Issues
ISSN Print: 1694-0784
ISSN Online:
主页:
http://www.ijcsi.org/index.php
分享:
Go
Using Quadtree Algorithm for Improving Fuzzy C-means Method in Image Segmentation
Zahra Ghorbanzad
,
Farshid Babapour
Dynamic service Allocation with Protection Path
Loay Alzubaidi
Implementing a Novel Approach an Convert Audio Compression to Text Coding via Hybrid Technique
Mazin Abed Mohammed
The Simulated Annealing Algorithm Implemented by the MATLAB
Lin Lin
,
Chen Fei
RSSVM-based Multi-Instance Learning for Image Categorization
Daxiang Li
Motion Detection Real Time 3D Walkthrough in Limkokwing University of Creative Technology (Modet-Walk) using Kinect XBox
Behrang Parhizkar
,
Kanammal A/p Sandrasekaran
,
Arash Habibi Lashkari
Empirical Study and Model of Users Acceptance for Mobile Commerce in China
Hua Zheng
,
Ying Li
,
Dandan Jiang
Generalized If ... Then...Else Inference Rules with Linguistic Modifiers for Approximate Reasoning
Le Anh Phuong
,
Tran Dinh Khang
A self-configuration model for execution management in Grid computing
Mohamad Fadaeian
,
Mehdi N.Fesharaki
Detection of the Concentration and Size Distribution of Indoor Inhalable Particle Based on Mathematical Morphology
Hongli Liu
,
Xiong Zhou
,
Lei Xiao
Precedence Based Preemption and Bandwidth Reservation Scheme in MANET
Sourabh Singh Verma
Methods of Identifying and Preventing SQL Attacks
Bojken Shehu
,
Aleksander Xhuvani
,
Shqiponja Ahmetaj
Setswana Speech Recognizer for Computer Based Applications
Oratile Leteane
,
Francis
,
J. Ogwu
ASL Fingerspelling Translator Glove
Jamal Haydar
,
Bayan Dalal
,
Shahed Hussainy
,
Lina El Khansa
MP3 Steganography: Review
Mohammed Salem Atoum
,
Subariah Ibrahim
,
Ghazali Sulong
,
Ali M-Ahmad
The effect of using a thesaurus in Arabic information retrieval system
Mohammad Wedyan
,
Basim Alhadidi
,
Adnan Alrabea
Reproducible Research in Speech Sciences
Kandaacute;lmandaacute;n Abari
Dynamic Structural Modeling and Its Applications: An Analysis of Anxiety Structure
Keita Kinjo
Solving Problems in Software Applications through Data Synchronization in Case of Absence of the Network
Isak Shabani
,
Betim Cico
,
Agni Dika
Covering Space and Van Kampen theory methods of Fundamental Group
Gbenga Olayinka Ojo
,
Ajuebishi Patient Adetunji
,
Oluwaseun Gbenga Fadare
,
Fisayo Caleb Sangogboye
Inversion of Web Service Invocation using Publish/Subscribe Push-Based Architecture
Thanisa Numnonda
,
Rattakorn Poonsuph
Secure Routing in Wireless Sensor Networks
Soumyashree Sahoo
,
Pradipta Mishra
,
R. N. Satpathy
The application of methods of nonlinear dynamics for ECG in Normal Sinus Rhythm
Nisar Hundewale
Security of the DNS Protocol - Implementation and Weaknesses Analyses of DNSSEC
Kaouthar Chetioui
,
Ghizlane Orhanou
,
Said El Hajji
,
Abdelmajid Lakbabi
Extracting Generalized Semantic Roles from Corpus
Fateme Jafarinejad
,
Mehrnoush Shamsfard
Web Testing: Tool, Challenges and Methods
Shakti Kundu
Control Logic Algorithm for Medium Scale Wind Turbines
Osama Abdel Hakeem Abdel Sattar
,
R. R. Darwish
,
Saad Mohamed Ali Eid
,
Elsayed Mostafa Saad
A Power Efficient, Oblivious, Path-Diverse, Minimal Routing for Mesh-based Networks-on-Chip
El Sayed M. Saad
,
Sameh A. Salem
,
Medhat H. Awadalla
,
Ahmed M. Mostafa
A Hand Finding and Segmenting in a Partially Cluttered Scene
R. M. Farouk
,
Gamal F. Elhadi
,
Abdalhakeem. T. Issa
IPTV-Internet Protocol Televisions Key Broadcast Building Blocks
Muhammad Asif
,
Zahid Farid
,
Muhammad Lal
,
Junaid Qayyum
OFDM Transmission Performance Evaluation in V2X Communication
Aymen Sassi
,
Faiza Charfi
,
Yassin El Hillali
,
Lotfi Kamoun
An Approach of Digital Image Copyright Protection by Using Watermarking Technology
Md. Selim Reza
,
Mohammed Shafiul Alam Khan
,
Md. Golam Robiul Alam
,
Serajul Islam
Uniform Fiber Bragg Grating modeling and simulation used matrix transfer method
Abdallah Ikhlef
,
Rachida Hedara
,
Mohamed Chikh-Bled
Enriching Soft Systems Methodology (SSM) With Hermeneutic in e-Government Systems Development Process
Dana Indra Sensuse
,
Arief Ramadhan
Performance Analysis of Probabilistic Rebroadcasting in Grid FSR for MANET
S. Nithya Rekha
,
C. Chandrasekar
Data optimization from a multiple species network using modified SFLA(Shuffled Frog Leaping Algorithm)
N. Kannaiya Raja
,
N. Kannaiya Raja
,
K. Arulanandam
,
K. Arulanandam
An Application of Genetic Algorithm with Iterative Chromosomes for Image Clustering Problems
R. Balakrishnan
,
U. Karthick Kumar
Performance Enhancement of Digital Communication Systems Using Fuzzy Logic
Danmeet Kaur
Principal Objects Detection Using Graph-Based Segmentation and Normalized Histogram
Pham The Bao
,
Bui Ngoc Nam
An Investigation about obstacles of Mobile Commerce in Iran (A case study in Saravan City)
Baqer Kord
,
Dawood Karimzadegan
,
Mehrab Omara
Conceptualizing of Social Networking Sites
J. S. Sodhi
,
Shilpi Sharma
Decision-making application for the Management of HumanResources: the automation of the recruitment to the breasts ofUniversities
Latifa Oubedda
,
Erraha Brahim
,
Khalfaoui Mohamed
How Workflow Systems Facilitate Business Process Reengineering and Improvement
Mohamed El Khadiri
,
Abdelaziz El Fazziki
Steady State and Transient Study of The Electron Transport In N-Type GaSb Using Three Valley Monte Carlo Model
Belhadji Youcef
,
Bouazza Benyounes
Cloud Load Balancing Techniques: A Step Towards Green Computing
Nidhi Jain Kansal
,
Inderveer Chana
Improving performance of distributed data mining (DDM) with multi-agent system
Trilok Nath Pandey
,
Niranjan Panda
,
Pravat Kumar Sahu
Fast and Accurate Practical Positioning Method using Enhanced-Lateration Technique and Adaptive Propagation Model in GSM Mode
Mohamed H. Abdel Meniem
,
Ahmed M. Hamad
,
Eman Shaaban
Cryptography and State-of-the-art Techniques
Mohiuddin Ahmed
,
T. M. Shahriar Sazzad
,
Md. Elias Mollah
RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks
M Salman Ashraf
,
Muhammad Raheel
Proposal of a New Block Cipher reasonably Non-Vulnerable against Cryptanalytic Attacks
Abhijit Chowdhury
,
Angshu Kumar Sinha
,
Saurabh Dutta
Go