Information Security Plan for Flight Simulator Applications |
Jason Slaughter, Syed M. Rahman |
Vol 3, No 3 (2011), Pagination: 1-15
|
ABSTRACT |
PDF
|
|
Abstract Views: 510 |
PDF Views: 209
|
Common Phases of Computer Forensics Investigation Models |
Yunus Yusoff, Roslan Ismail, Zainuddin Hassan |
Vol 3, No 3 (2011), Pagination: 17-31
|
ABSTRACT |
PDF
|
|
Abstract Views: 1139 |
PDF Views: 503
|
Comparison and Analysis of Watermarking Algorithms in Color Images - Image Security Paradigm |
D. Biswas, S. Biswas, P. P. Sarkar, D. Sarkar, S. Banerjee, A. Pal |
Vol 3, No 3 (2011), Pagination: 33-47
|
ABSTRACT |
PDF
|
|
Abstract Views: 452 |
PDF Views: 284
|
Evolutionary Neural Networks Algorithm for the Dynamic Frequency Assignment Problem |
Jamal Elhachmi, Zouhair Guennoun |
Vol 3, No 3 (2011), Pagination: 49-61
|
ABSTRACT |
PDF
|
|
Abstract Views: 511 |
PDF Views: 217
|
Optimal Self Correcting Fault Free Error Coding Technique in Memory Operation |
Harikishore Kakarla, M. Madhavi Latha, Habibulla Khan |
Vol 3, No 3 (2011), Pagination: 63-72
|
ABSTRACT |
PDF
|
|
Abstract Views: 536 |
PDF Views: 267
|
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE) |
Abderrahim Bourouis, Mohamed Feham, Abdelhamid Bouchachia |
Vol 3, No 3 (2011), Pagination: 74-82
|
ABSTRACT |
PDF
|
|
Abstract Views: 480 |
PDF Views: 220
|
A Review on Elliptic Curve Cryptography for Embedded Systems |
Rahat Afreen, S. C. Mehrotra |
Vol 3, No 3 (2011), Pagination: 84-103
|
ABSTRACT |
PDF
|
|
Abstract Views: 443 |
PDF Views: 234
|
Statistical Analysis on Software Metrics Affecting Modularity in Open Source Software |
Andi Wahju Rahardjo Emanuel, Retantyo Wardoyo, Jazi Eko Istiyanto, Khabib Mustofa |
Vol 3, No 3 (2011), Pagination: 105-118
|
ABSTRACT |
PDF
|
|
Abstract Views: 478 |
PDF Views: 198
|
Image Retrieval Using Bit-Plane Pixel Distribution |
N. S. T. Sai, R. C. Patil |
Vol 3, No 3 (2011), Pagination: 159-174
|
ABSTRACT |
PDF
|
|
Abstract Views: 437 |
PDF Views: 208
|
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network |
Al Mutaz M. Abdalla, Safaai Dress, Nazar Zaki |
Vol 3, No 3 (2011), Pagination: 176-186
|
ABSTRACT |
PDF
|
|
Abstract Views: 505 |
PDF Views: 218
|
Effective Independent Quality Assessment Using IVandV |
Pathanjali Sastri Akella, K. Nageswara Rao |
Vol 3, No 3 (2011), Pagination: 188-198
|
ABSTRACT |
PDF
|
|
Abstract Views: 426 |
PDF Views: 201
|
E-Learning Personalization Based on Dynamic Learners' Preference |
Essaid El Bachari, El Hassan Abelwahed, Mohammed El Adnani |
Vol 3, No 3 (2011), Pagination: 200-216
|
ABSTRACT |
PDF
|
|
Abstract Views: 541 |
PDF Views: 353
|
An LMS Based Blind Source Separation Algorithm Using a Fast Nonlinear Autocorrelation Method |
Behzad Mozaffari Tazehkand |
Vol 3, No 3 (2011), Pagination: 218-225
|
ABSTRACT |
PDF
|
|
Abstract Views: 467 |
PDF Views: 217
|
A Novel Technique for Back-Link Extraction and Relevance Evaluation |
Pooja Gupta, A. K. Sharma, Divakar Yadav |
Vol 3, No 3 (2011), Pagination: 227-238
|
ABSTRACT |
PDF
|
|
Abstract Views: 496 |
PDF Views: 257
|
Electronic Commerce in Web 3.0: The Evidence from Emerging Economics |
Xi Zhang, Doug Vogel |
Vol 3, No 3 (2011), Pagination: 240-254
|
ABSTRACT |
PDF
|
|
Abstract Views: 475 |
PDF Views: 205
|
A Comparative Experiment of several Shape Methods in Recognizing Plants |
A. Kadir, L. E. Nugroho, A. Susanto, P. I. Santosa |
Vol 3, No 3 (2011), Pagination: 256-263
|
ABSTRACT |
PDF
|
|
Abstract Views: 633 |
PDF Views: 273
|
RCAUSE - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems |
Er. Anand Rajavat, Vrinda Tokekar |
Vol 3, No 3 (2011), Pagination: 265-273
|
ABSTRACT |
PDF
|
|
Abstract Views: 442 |
PDF Views: 211
|
Unsupervised Horizontal Collaboration Based in SOM |
Nadia Mesghouni, Khaled Ghedira, Moncef Temani |
Vol 3, No 3 (2011), Pagination: 275-286
|
ABSTRACT |
PDF
|
|
Abstract Views: 390 |
PDF Views: 209
|