首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Computer Science Issues
ISSN Print: 1694-0784
ISSN Online:
主页:
http://www.ijcsi.org/index.php
分享:
Go
Factors Influencing ICT Adoption in Halal Transportations: A Case Study of Malaysian Halal Logistics Service Providers
Mohd Iskandar Illyas Tan
,
Raziah Noor Razali
,
Mohammad Ishak Desa
A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
Gunjan Nehru
,
Puja Dhar
Continuous Bangla Speech Segmentation, Classification and Feature Extraction
Md. Mijanur Rahman
,
Md. Farukuzzaman Khan
,
Md. Al-Amin Bhuiyan
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
Yogendra Kumar Jain
,
Manoj Kumar Verma
Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks
Surraya Khanum
,
Muhammad Usman
,
Alaa Alwabel
Towards an information flow in logic programming
Antoun Yaacoub
Robust Iris Recognition Based on Statistical Properties of Walsh Hadamard Transform Domain
Sunita V. Dhavale
Hybrid Distance Based Document Clustering with Keyword and Phrase Indexing
Subhadra Kompella
,
M. Shashi
Synthesis of Quantum Multiplexer Circuits
Arijit Roy
,
Dibyendu Chatterjee
,
Subhasis Pal
Web Application Security by SQL Injection DetectionTools
Atefeh Tajpour
,
Suhaimi Ibrahim
,
Mohammad Sharifi
DSP implementation of Fuzzy based Power Quality enhancement strategy for IPOS converter fed drive
N.Radhakrishnan
,
M.Ramaswamy
Applying Genetic Algorithms for Inventory Lot-Sizing Problem with Supplier Selection under Storage Capacity Constraints
Chirawat Woarawichai
,
Kritsana Kuruvit
,
Paitoon Vashirawongpinyo
Precise multiple object identification and tracking using efficient visual attributes in dense crowded scene with regions of rational movement
Pushpa D
,
H. S. Sheshadri
IPv6 Tunneling Over IPV4
A.Sankara Narayanan
,
M.Syed Khaja Mohideen
,
M.Chithik Raja
A Strategic Framework for Designing E-Learning System with Focus on University Entrepreneurship
Masoud Asgarimehr
,
Babak Shirazi
,
Meisam Jafari Eskandari
,
Salman Rostami
An Approach for Data Storage Security in Cloud Computing
Deepanchakaravarthi Purushothaman
,
Sunitha Abburu
Knowledge Management Model and Strategy of Genetic Resources and Traditional Knowledge in Indonesia
Dana Indra Sensuse
,
Lukman
Web-based Decision Support System for Agribusiness Development in Oil Palm Plantations at Siak Local Government Using Policy Analysis Matrix
Arif Imam Suroso
,
Arief Ramadhan
Current Status of Mobile Internet Protocol version 4 and its Security Issues
Susanna S Henry
,
V. Santhosh Kumar
Identification of Nominated Classes for Software Refactoring Using Object-Oriented Cohesion Metrics
Safwat M. Ibrahim
,
Sameh A. Salem
,
Manal A. Ismail
,
Mohamed Eladawy
Fortification of Transport Layer Security Protocol with Hashed Fingerprint Identity Parameter
Kuljeet Kaur
,
G. Geetha
Comparison between Poissonian and Markovian Primary Traffics in Cognitive Radio Networks
Abdelaali Chaoub
,
Elhassane Ibn-Elhaj
A Content based CT Lung Image Retrieval by DCT Matrix and Feature Vector Technique
J.Bridget Nirmala
,
S.Gowri
Comparison of Routing Protocols for Locating moving object in Large Scale Cellular Wireless Sensor Network
Ola A. Al-Sonosy
,
Mohammed A. Hashem
,
Nagwa Badr
A Discussion on Elliptic Curve Cryptography and Its Applications
Sharad Kumar Verma
,
D. B. Ojha
Current Web Applications Development and Measurement Practices for Small Software Firms
Faudziah Ahmad
,
Fauziah Baharom
,
Moath Husni
A new content framework and metamodel for Enterprise Architecture and IS Strategic Planning
Mouhsine Lakhdissi
,
Bouchaib Bounabat
Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols
Qazi Javed Ahmed
,
Mirza Aamir Mehmood
,
Abdul Qudoos
An Unsupervised Dynamic Image Segmentation using Fuzzy Hopfield Neural Network based Genetic Algorithm
Amiya Halder
,
Soumajit Pramanik
Image Processing and Analysis for DTMRI
Kondapalli Srinivasa Vara Prasad
,
Manike Chiranjeevi
,
Kundan Kumar Mishra
,
Kdbs Tanuja
Numerical Approach For Local Bifurcation Analysis of Nonlinear Physical System
Abdelhak Chikhaoui
,
Tayeb Benouaz
,
Fatiha Lassouani
Transmitting Cryptographic data through Steganography
Maria Akhtar Mufti
,
Aihab Khan
,
Malik Sikandar Hayat Khiyal
,
Asim Munir
The Integration of Networking and Computerization towards e-Education and e-Learning at the Higher Education and Research Institutions of Pakistan
Dost Muhammad Khan
,
Najia Saher
,
Faisal Shahzad
,
Nawaz Mohamudally
Influence of Side Effect of EBG Structures on the Far-Field Pattern of Patch Antennas
Fethi Benikhlef
,
Nourdinne Boukli Hacen
Analysis of Quality of Service Performances of Connection Admission Control Mechanisms in OFDMA IEEE 802.16 Network using BMAP Queuing
Abdelali El Bouchti
,
Abdelkrim Haqiq
,
Said El Kafhali
Environmental Noise Classification and Cancellation using Fuzzy Classifier and Fuzzy Adaptive Filters
T. Meera Devi
,
N. Kasthuri
,
A. M. Natarajan
Development of Personal Learning Network System To Build E-Literacy
Wawan Setiawan
Cryptographic Hash functions - a review
Rajeev Sobti
,
G.Geetha
Regular Maximum Principle in the Time Optimal Control Problems with Time-Varying State Constraint
Murad H. Imanov
A New Architecture of a Ubiquitous Health Monitoring System: A Prototype of Cloud Mobile Health Monitoring System
Abderrahim Bourouis
,
Mohammed Feham
,
Abdelhamid Bouchachia
An Optical / Wireless Integrated Approach to provide Multiple Gateways in Wireless Mesh Networks
Muhammad Raheel
,
Muhammad Salman Ashraf
Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)
Sadaqat Ur Rehman
,
Muhammad Bilal
,
Basharat Ahmad
,
Khawaja Muhammad Yahya
Analysis of the Similarities and Differences between MPLS Label Distribution Protocols RSVP and CR-LDP
Muhammad Asif
,
Zahid Farid
,
Muhammad Lal
,
Junaid Qayyum
Cloud Infrastructure Service Management - A Review
A. Anasuya Threse Innocent
A Survey on Semantic Web Search Engine
G.Sudeepthi
,
G. Anuradha
,
M.Surendra Prasad Babu
Data Mining Classifiers for Static Security Evaluation in Power System
Ibrahim Saeh
,
M.W.Mustafa
Performance Analysis Cluster Computing Environments on Molecular Dynamic Simulation of RAD GTPase and LOXCurcumin Molecules with AMBER
Heru Suhartanto
,
Arry Yanuar
,
M. H. Hilman
,
Ari Wibisono
Converting Relational Database Into Xml Document
Kanagaraj.S
,
Sunitha Abburu
Fuzzy Integrity Constraints for Native XML Database
E.J.Thomson Fredrick
,
G. Radhamani
Qos- based rate allocation in wireless mesh networks
Airin Mardokhpour
Go