Information Security Plan for Flight Simulator Applications |
Jason Slaughter, Syed M. Rahman |
Vol 3, No 3 (2011), Pagination: 1-15
|
ABSTRACT |
PDF
|
|
Abstract Views: 531 |
PDF Views: 228
|
Common Phases of Computer Forensics Investigation Models |
Yunus Yusoff, Roslan Ismail, Zainuddin Hassan |
Vol 3, No 3 (2011), Pagination: 17-31
|
ABSTRACT |
PDF
|
|
Abstract Views: 1165 |
PDF Views: 519
|
Comparison and Analysis of Watermarking Algorithms in Color Images - Image Security Paradigm |
D. Biswas, S. Biswas, P. P. Sarkar, D. Sarkar, S. Banerjee, A. Pal |
Vol 3, No 3 (2011), Pagination: 33-47
|
ABSTRACT |
PDF
|
|
Abstract Views: 472 |
PDF Views: 301
|
Evolutionary Neural Networks Algorithm for the Dynamic Frequency Assignment Problem |
Jamal Elhachmi, Zouhair Guennoun |
Vol 3, No 3 (2011), Pagination: 49-61
|
ABSTRACT |
PDF
|
|
Abstract Views: 530 |
PDF Views: 234
|
Optimal Self Correcting Fault Free Error Coding Technique in Memory Operation |
Harikishore Kakarla, M. Madhavi Latha, Habibulla Khan |
Vol 3, No 3 (2011), Pagination: 63-72
|
ABSTRACT |
PDF
|
|
Abstract Views: 562 |
PDF Views: 283
|
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE) |
Abderrahim Bourouis, Mohamed Feham, Abdelhamid Bouchachia |
Vol 3, No 3 (2011), Pagination: 74-82
|
ABSTRACT |
PDF
|
|
Abstract Views: 508 |
PDF Views: 236
|
A Review on Elliptic Curve Cryptography for Embedded Systems |
Rahat Afreen, S. C. Mehrotra |
Vol 3, No 3 (2011), Pagination: 84-103
|
ABSTRACT |
PDF
|
|
Abstract Views: 466 |
PDF Views: 250
|
Statistical Analysis on Software Metrics Affecting Modularity in Open Source Software |
Andi Wahju Rahardjo Emanuel, Retantyo Wardoyo, Jazi Eko Istiyanto, Khabib Mustofa |
Vol 3, No 3 (2011), Pagination: 105-118
|
ABSTRACT |
PDF
|
|
Abstract Views: 495 |
PDF Views: 219
|
Image Retrieval Using Bit-Plane Pixel Distribution |
N. S. T. Sai, R. C. Patil |
Vol 3, No 3 (2011), Pagination: 159-174
|
ABSTRACT |
PDF
|
|
Abstract Views: 462 |
PDF Views: 221
|
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network |
Al Mutaz M. Abdalla, Safaai Dress, Nazar Zaki |
Vol 3, No 3 (2011), Pagination: 176-186
|
ABSTRACT |
PDF
|
|
Abstract Views: 528 |
PDF Views: 234
|
Effective Independent Quality Assessment Using IVandV |
Pathanjali Sastri Akella, K. Nageswara Rao |
Vol 3, No 3 (2011), Pagination: 188-198
|
ABSTRACT |
PDF
|
|
Abstract Views: 449 |
PDF Views: 215
|
E-Learning Personalization Based on Dynamic Learners' Preference |
Essaid El Bachari, El Hassan Abelwahed, Mohammed El Adnani |
Vol 3, No 3 (2011), Pagination: 200-216
|
ABSTRACT |
PDF
|
|
Abstract Views: 571 |
PDF Views: 367
|
An LMS Based Blind Source Separation Algorithm Using a Fast Nonlinear Autocorrelation Method |
Behzad Mozaffari Tazehkand |
Vol 3, No 3 (2011), Pagination: 218-225
|
ABSTRACT |
PDF
|
|
Abstract Views: 485 |
PDF Views: 232
|
A Novel Technique for Back-Link Extraction and Relevance Evaluation |
Pooja Gupta, A. K. Sharma, Divakar Yadav |
Vol 3, No 3 (2011), Pagination: 227-238
|
ABSTRACT |
PDF
|
|
Abstract Views: 523 |
PDF Views: 278
|
Electronic Commerce in Web 3.0: The Evidence from Emerging Economics |
Xi Zhang, Doug Vogel |
Vol 3, No 3 (2011), Pagination: 240-254
|
ABSTRACT |
PDF
|
|
Abstract Views: 498 |
PDF Views: 223
|
A Comparative Experiment of several Shape Methods in Recognizing Plants |
A. Kadir, L. E. Nugroho, A. Susanto, P. I. Santosa |
Vol 3, No 3 (2011), Pagination: 256-263
|
ABSTRACT |
PDF
|
|
Abstract Views: 659 |
PDF Views: 287
|
RCAUSE - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems |
Er. Anand Rajavat, Vrinda Tokekar |
Vol 3, No 3 (2011), Pagination: 265-273
|
ABSTRACT |
PDF
|
|
Abstract Views: 463 |
PDF Views: 228
|
Unsupervised Horizontal Collaboration Based in SOM |
Nadia Mesghouni, Khaled Ghedira, Moncef Temani |
Vol 3, No 3 (2011), Pagination: 275-286
|
ABSTRACT |
PDF
|
|
Abstract Views: 414 |
PDF Views: 225
|