Information Security Plan for Flight Simulator Applications |
Jason Slaughter, Syed M. Rahman |
Vol 3, No 3 (2011), Pagination: 1-15
|
ABSTRACT |
PDF
|
|
Abstract Views: 419 |
PDF Views: 166
|
Common Phases of Computer Forensics Investigation Models |
Yunus Yusoff, Roslan Ismail, Zainuddin Hassan |
Vol 3, No 3 (2011), Pagination: 17-31
|
ABSTRACT |
PDF
|
|
Abstract Views: 1028 |
PDF Views: 451
|
Comparison and Analysis of Watermarking Algorithms in Color Images - Image Security Paradigm |
D. Biswas, S. Biswas, P. P. Sarkar, D. Sarkar, S. Banerjee, A. Pal |
Vol 3, No 3 (2011), Pagination: 33-47
|
ABSTRACT |
PDF
|
|
Abstract Views: 353 |
PDF Views: 209
|
Evolutionary Neural Networks Algorithm for the Dynamic Frequency Assignment Problem |
Jamal Elhachmi, Zouhair Guennoun |
Vol 3, No 3 (2011), Pagination: 49-61
|
ABSTRACT |
PDF
|
|
Abstract Views: 416 |
PDF Views: 165
|
Optimal Self Correcting Fault Free Error Coding Technique in Memory Operation |
Harikishore Kakarla, M. Madhavi Latha, Habibulla Khan |
Vol 3, No 3 (2011), Pagination: 63-72
|
ABSTRACT |
PDF
|
|
Abstract Views: 436 |
PDF Views: 221
|
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE) |
Abderrahim Bourouis, Mohamed Feham, Abdelhamid Bouchachia |
Vol 3, No 3 (2011), Pagination: 74-82
|
ABSTRACT |
PDF
|
|
Abstract Views: 383 |
PDF Views: 181
|
A Review on Elliptic Curve Cryptography for Embedded Systems |
Rahat Afreen, S. C. Mehrotra |
Vol 3, No 3 (2011), Pagination: 84-103
|
ABSTRACT |
PDF
|
|
Abstract Views: 358 |
PDF Views: 181
|
Statistical Analysis on Software Metrics Affecting Modularity in Open Source Software |
Andi Wahju Rahardjo Emanuel, Retantyo Wardoyo, Jazi Eko Istiyanto, Khabib Mustofa |
Vol 3, No 3 (2011), Pagination: 105-118
|
ABSTRACT |
PDF
|
|
Abstract Views: 358 |
PDF Views: 162
|
Image Retrieval Using Bit-Plane Pixel Distribution |
N. S. T. Sai, R. C. Patil |
Vol 3, No 3 (2011), Pagination: 159-174
|
ABSTRACT |
PDF
|
|
Abstract Views: 334 |
PDF Views: 146
|
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network |
Al Mutaz M. Abdalla, Safaai Dress, Nazar Zaki |
Vol 3, No 3 (2011), Pagination: 176-186
|
ABSTRACT |
PDF
|
|
Abstract Views: 398 |
PDF Views: 175
|
Effective Independent Quality Assessment Using IVandV |
Pathanjali Sastri Akella, K. Nageswara Rao |
Vol 3, No 3 (2011), Pagination: 188-198
|
ABSTRACT |
PDF
|
|
Abstract Views: 337 |
PDF Views: 167
|
E-Learning Personalization Based on Dynamic Learners' Preference |
Essaid El Bachari, El Hassan Abelwahed, Mohammed El Adnani |
Vol 3, No 3 (2011), Pagination: 200-216
|
ABSTRACT |
PDF
|
|
Abstract Views: 440 |
PDF Views: 309
|
An LMS Based Blind Source Separation Algorithm Using a Fast Nonlinear Autocorrelation Method |
Behzad Mozaffari Tazehkand |
Vol 3, No 3 (2011), Pagination: 218-225
|
ABSTRACT |
PDF
|
|
Abstract Views: 373 |
PDF Views: 173
|
A Novel Technique for Back-Link Extraction and Relevance Evaluation |
Pooja Gupta, A. K. Sharma, Divakar Yadav |
Vol 3, No 3 (2011), Pagination: 227-238
|
ABSTRACT |
PDF
|
|
Abstract Views: 391 |
PDF Views: 200
|
Electronic Commerce in Web 3.0: The Evidence from Emerging Economics |
Xi Zhang, Doug Vogel |
Vol 3, No 3 (2011), Pagination: 240-254
|
ABSTRACT |
PDF
|
|
Abstract Views: 378 |
PDF Views: 164
|
A Comparative Experiment of several Shape Methods in Recognizing Plants |
A. Kadir, L. E. Nugroho, A. Susanto, P. I. Santosa |
Vol 3, No 3 (2011), Pagination: 256-263
|
ABSTRACT |
PDF
|
|
Abstract Views: 535 |
PDF Views: 224
|
RCAUSE - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems |
Er. Anand Rajavat, Vrinda Tokekar |
Vol 3, No 3 (2011), Pagination: 265-273
|
ABSTRACT |
PDF
|
|
Abstract Views: 339 |
PDF Views: 169
|
Unsupervised Horizontal Collaboration Based in SOM |
Nadia Mesghouni, Khaled Ghedira, Moncef Temani |
Vol 3, No 3 (2011), Pagination: 275-286
|
ABSTRACT |
PDF
|
|
Abstract Views: 289 |
PDF Views: 156
|