Information Security Plan for Flight Simulator Applications |
Jason Slaughter, Syed M. Rahman |
Vol 3, No 3 (2011), Pagination: 1-15
|
ABSTRACT |
PDF
|
|
Abstract Views: 362 |
PDF Views: 143
|
Common Phases of Computer Forensics Investigation Models |
Yunus Yusoff, Roslan Ismail, Zainuddin Hassan |
Vol 3, No 3 (2011), Pagination: 17-31
|
ABSTRACT |
PDF
|
|
Abstract Views: 976 |
PDF Views: 430
|
Comparison and Analysis of Watermarking Algorithms in Color Images - Image Security Paradigm |
D. Biswas, S. Biswas, P. P. Sarkar, D. Sarkar, S. Banerjee, A. Pal |
Vol 3, No 3 (2011), Pagination: 33-47
|
ABSTRACT |
PDF
|
|
Abstract Views: 307 |
PDF Views: 174
|
Evolutionary Neural Networks Algorithm for the Dynamic Frequency Assignment Problem |
Jamal Elhachmi, Zouhair Guennoun |
Vol 3, No 3 (2011), Pagination: 49-61
|
ABSTRACT |
PDF
|
|
Abstract Views: 360 |
PDF Views: 140
|
Optimal Self Correcting Fault Free Error Coding Technique in Memory Operation |
Harikishore Kakarla, M. Madhavi Latha, Habibulla Khan |
Vol 3, No 3 (2011), Pagination: 63-72
|
ABSTRACT |
PDF
|
|
Abstract Views: 352 |
PDF Views: 161
|
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE) |
Abderrahim Bourouis, Mohamed Feham, Abdelhamid Bouchachia |
Vol 3, No 3 (2011), Pagination: 74-82
|
ABSTRACT |
PDF
|
|
Abstract Views: 338 |
PDF Views: 156
|
A Review on Elliptic Curve Cryptography for Embedded Systems |
Rahat Afreen, S. C. Mehrotra |
Vol 3, No 3 (2011), Pagination: 84-103
|
ABSTRACT |
PDF
|
|
Abstract Views: 283 |
PDF Views: 153
|
Statistical Analysis on Software Metrics Affecting Modularity in Open Source Software |
Andi Wahju Rahardjo Emanuel, Retantyo Wardoyo, Jazi Eko Istiyanto, Khabib Mustofa |
Vol 3, No 3 (2011), Pagination: 105-118
|
ABSTRACT |
PDF
|
|
Abstract Views: 291 |
PDF Views: 138
|
Image Retrieval Using Bit-Plane Pixel Distribution |
N. S. T. Sai, R. C. Patil |
Vol 3, No 3 (2011), Pagination: 159-174
|
ABSTRACT |
PDF
|
|
Abstract Views: 272 |
PDF Views: 121
|
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network |
Al Mutaz M. Abdalla, Safaai Dress, Nazar Zaki |
Vol 3, No 3 (2011), Pagination: 176-186
|
ABSTRACT |
PDF
|
|
Abstract Views: 276 |
PDF Views: 140
|
Effective Independent Quality Assessment Using IVandV |
Pathanjali Sastri Akella, K. Nageswara Rao |
Vol 3, No 3 (2011), Pagination: 188-198
|
ABSTRACT |
PDF
|
|
Abstract Views: 264 |
PDF Views: 140
|
E-Learning Personalization Based on Dynamic Learners' Preference |
Essaid El Bachari, El Hassan Abelwahed, Mohammed El Adnani |
Vol 3, No 3 (2011), Pagination: 200-216
|
ABSTRACT |
PDF
|
|
Abstract Views: 384 |
PDF Views: 286
|
An LMS Based Blind Source Separation Algorithm Using a Fast Nonlinear Autocorrelation Method |
Behzad Mozaffari Tazehkand |
Vol 3, No 3 (2011), Pagination: 218-225
|
ABSTRACT |
PDF
|
|
Abstract Views: 259 |
PDF Views: 132
|
A Novel Technique for Back-Link Extraction and Relevance Evaluation |
Pooja Gupta, A. K. Sharma, Divakar Yadav |
Vol 3, No 3 (2011), Pagination: 227-238
|
ABSTRACT |
PDF
|
|
Abstract Views: 300 |
PDF Views: 164
|
Electronic Commerce in Web 3.0: The Evidence from Emerging Economics |
Xi Zhang, Doug Vogel |
Vol 3, No 3 (2011), Pagination: 240-254
|
ABSTRACT |
PDF
|
|
Abstract Views: 307 |
PDF Views: 135
|
A Comparative Experiment of several Shape Methods in Recognizing Plants |
A. Kadir, L. E. Nugroho, A. Susanto, P. I. Santosa |
Vol 3, No 3 (2011), Pagination: 256-263
|
ABSTRACT |
PDF
|
|
Abstract Views: 460 |
PDF Views: 197
|
RCAUSE - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems |
Er. Anand Rajavat, Vrinda Tokekar |
Vol 3, No 3 (2011), Pagination: 265-273
|
ABSTRACT |
PDF
|
|
Abstract Views: 282 |
PDF Views: 145
|
Unsupervised Horizontal Collaboration Based in SOM |
Nadia Mesghouni, Khaled Ghedira, Moncef Temani |
Vol 3, No 3 (2011), Pagination: 275-286
|
ABSTRACT |
PDF
|
|
Abstract Views: 241 |
PDF Views: 134
|