International Journal of Research in Computer Science

Title Publication Date Language Citations
ROI Segmentation for Feature Extraction from Human Facial Images2012/04/302
An Analysis of The Methods Employed for Breast Cancer Diagnosis2012/04/302
Free Space Optics: Atmospheric Effects & Back U2011/09/302
Max Min Fair Scheduling Algorithm using In Grid Scheduling with Load Balancing2012/04/302
Efficient Real-time Video Transmission in Wireless Mesh Network2011/12/302
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled Chaotic Maps2013/01/052
LB2CO: A Semantic Ontology Framework for B2C eCommerce Transaction on the Internet2014/01/052
Academic Talent Model Based on Human Resource Data Mart2012/09/052
Analysis of Handoff techniques used for hybrid networks: Cellular / WLAN2012/07/052
IEEE-754 compliant Algorithms for Fast Multiplication of Double Precision Floating Point Numbers2011/09/302
Study of Influencing Factors of Tender Evaluation: An Evidential Reasoning Approach2012/09/051
A Novel Statistical Method for Thermostable Proteins Discrimination2012/07/051
A Comparative Study of Recent Ontology Visualization Tools with a Case of Diabetes Data2012/04/301
Optimal Location of Multi-types of FACTS Devices using Genetic Algorithm2012/04/301
Ontology Based Information Extraction for Disease Intelligence2012/11/051
Texture Classification based on Gabor Wavelet2012/07/051
Adoption of Parallel Genetic Algorithms for the Solution of System of Equations2012/02/291
Digital Watermarking Trends2011/09/301
From Physical to Virtual Wireless Sensor Networks using Cloud Computing2013/01/051
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks2013/01/051
Text Independent Biometric Speaker Recognition System2013/11/051
Using Virtualization Technique to Increase Security and Reduce Energy Consumption in Cloud Computing2014/03/051
A Robust and Adaptable Method for Face Detection Based on Color Probabilistic Estimation Technique2013/11/051
Secure Electronic Lock using PIC 16f628a Microcontroller2012/09/051
A Two-Level Autonomous Intrusion Detection Model Inspired by the Immune System2014/01/051
Algebraic Fault Attack on the SHA-256 Compression Function2014/03/051
A Threshold Secure Data Sharing Scheme for Federated Clouds2012/09/05
A Robust Cryptographic System using Neighborhood-Generated Keys2012/09/05
A Conceptual Model for Ontology Based Learning2012/11/05
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?2012/11/05