Information Security Plan for Flight Simulator Applications |
Jason Slaughter, Syed M. Rahman |
Vol 3, No 3 (2011), Pagination: 1-15
|
ABSTRACT |
PDF
|
|
Abstract Views: 333 |
PDF Views: 127
|
Common Phases of Computer Forensics Investigation Models |
Yunus Yusoff, Roslan Ismail, Zainuddin Hassan |
Vol 3, No 3 (2011), Pagination: 17-31
|
ABSTRACT |
PDF
|
|
Abstract Views: 946 |
PDF Views: 414
|
Comparison and Analysis of Watermarking Algorithms in Color Images - Image Security Paradigm |
D. Biswas, S. Biswas, P. P. Sarkar, D. Sarkar, S. Banerjee, A. Pal |
Vol 3, No 3 (2011), Pagination: 33-47
|
ABSTRACT |
PDF
|
|
Abstract Views: 273 |
PDF Views: 157
|
Evolutionary Neural Networks Algorithm for the Dynamic Frequency Assignment Problem |
Jamal Elhachmi, Zouhair Guennoun |
Vol 3, No 3 (2011), Pagination: 49-61
|
ABSTRACT |
PDF
|
|
Abstract Views: 329 |
PDF Views: 125
|
Optimal Self Correcting Fault Free Error Coding Technique in Memory Operation |
Harikishore Kakarla, M. Madhavi Latha, Habibulla Khan |
Vol 3, No 3 (2011), Pagination: 63-72
|
ABSTRACT |
PDF
|
|
Abstract Views: 317 |
PDF Views: 146
|
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE) |
Abderrahim Bourouis, Mohamed Feham, Abdelhamid Bouchachia |
Vol 3, No 3 (2011), Pagination: 74-82
|
ABSTRACT |
PDF
|
|
Abstract Views: 303 |
PDF Views: 139
|
A Review on Elliptic Curve Cryptography for Embedded Systems |
Rahat Afreen, S. C. Mehrotra |
Vol 3, No 3 (2011), Pagination: 84-103
|
ABSTRACT |
PDF
|
|
Abstract Views: 251 |
PDF Views: 132
|
Statistical Analysis on Software Metrics Affecting Modularity in Open Source Software |
Andi Wahju Rahardjo Emanuel, Retantyo Wardoyo, Jazi Eko Istiyanto, Khabib Mustofa |
Vol 3, No 3 (2011), Pagination: 105-118
|
ABSTRACT |
PDF
|
|
Abstract Views: 257 |
PDF Views: 124
|
Image Retrieval Using Bit-Plane Pixel Distribution |
N. S. T. Sai, R. C. Patil |
Vol 3, No 3 (2011), Pagination: 159-174
|
ABSTRACT |
PDF
|
|
Abstract Views: 241 |
PDF Views: 107
|
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network |
Al Mutaz M. Abdalla, Safaai Dress, Nazar Zaki |
Vol 3, No 3 (2011), Pagination: 176-186
|
ABSTRACT |
PDF
|
|
Abstract Views: 244 |
PDF Views: 124
|
Effective Independent Quality Assessment Using IVandV |
Pathanjali Sastri Akella, K. Nageswara Rao |
Vol 3, No 3 (2011), Pagination: 188-198
|
ABSTRACT |
PDF
|
|
Abstract Views: 233 |
PDF Views: 124
|
E-Learning Personalization Based on Dynamic Learners' Preference |
Essaid El Bachari, El Hassan Abelwahed, Mohammed El Adnani |
Vol 3, No 3 (2011), Pagination: 200-216
|
ABSTRACT |
PDF
|
|
Abstract Views: 353 |
PDF Views: 271
|
An LMS Based Blind Source Separation Algorithm Using a Fast Nonlinear Autocorrelation Method |
Behzad Mozaffari Tazehkand |
Vol 3, No 3 (2011), Pagination: 218-225
|
ABSTRACT |
PDF
|
|
Abstract Views: 234 |
PDF Views: 118
|
A Novel Technique for Back-Link Extraction and Relevance Evaluation |
Pooja Gupta, A. K. Sharma, Divakar Yadav |
Vol 3, No 3 (2011), Pagination: 227-238
|
ABSTRACT |
PDF
|
|
Abstract Views: 270 |
PDF Views: 147
|
Electronic Commerce in Web 3.0: The Evidence from Emerging Economics |
Xi Zhang, Doug Vogel |
Vol 3, No 3 (2011), Pagination: 240-254
|
ABSTRACT |
PDF
|
|
Abstract Views: 274 |
PDF Views: 120
|
A Comparative Experiment of several Shape Methods in Recognizing Plants |
A. Kadir, L. E. Nugroho, A. Susanto, P. I. Santosa |
Vol 3, No 3 (2011), Pagination: 256-263
|
ABSTRACT |
PDF
|
|
Abstract Views: 419 |
PDF Views: 174
|
RCAUSE - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems |
Er. Anand Rajavat, Vrinda Tokekar |
Vol 3, No 3 (2011), Pagination: 265-273
|
ABSTRACT |
PDF
|
|
Abstract Views: 250 |
PDF Views: 130
|
Unsupervised Horizontal Collaboration Based in SOM |
Nadia Mesghouni, Khaled Ghedira, Moncef Temani |
Vol 3, No 3 (2011), Pagination: 275-286
|
ABSTRACT |
PDF
|
|
Abstract Views: 209 |
PDF Views: 118
|