ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

Advances in Computer Science : an International Journal(ACSIJ) >>

Vol.3, No.5

Publisher: ACSIJ

Publishing Date: 2014-10-02

  1. Genetic Algorithm Based Energy Efficient Optimization Strategies in Wireless Sensor Networks: A Survey

    Authors: Innocent Njini; Obeten O. Ekabua

  2. Diabetes Forecasting Using Supervised Learning Techniques

    Authors: Salim Amour Diwani; Anael Sam

  3. A Review of Distributed Multi-Agent Systems Approach to Solve University Course Timetabling Problem

    Authors: Hamed Babaei; Amin Hadidi

  4. Enumeration of Hamiltonian Cycles on a Complete Graph using ECO method

    Authors: Retno Maharesi

  5. Evaluation of Free/Open Source Software Using OSMM Model Case Study: WebGIS and Spatial Database

    Authors: Mohammad Akbari; Seyed Reza Hashemi Peikar

  6. Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

    Authors: Seyed Mohammad Alavi; Karim Baghery; Behzad Abdolmaleki

  7. Combined Positioning Algorithm and Accuracy Analysis for BD2/GPS Positioning System

    Authors: Chun Liu; Chao Wang; Jiaoyan Liang

  8. Extracting Persian-English Parallel Sentences from Document Level Aligned Comparable Corpus using Bi-Directional Translation

    Authors: Ebrahim Ansari; Mohammad Hadi Sadreddini; Alireza Tabebordbar; Richard WALLACE

  9. Adaptive Color Mapping for NAO Robot Using Neural Network

    Authors: Vahid Rahmani; Vahid Rostami

  10. CBT-fi: Compact BitTable Approach for Mining Frequent Itemsets

    Authors: A.Saleem Raja; E.George Dharma Prakash Raj

  11. Effective Proposal for using Cloud Computing in Educational Environments in Iran

    Authors: Mojtaba Mostafavi Ghahfarokhi; Abbas Horri; GholamHosein Dastgheibyfard

  12. A Method for Hiding Association rules with Minimum Changes in Database

    Authors: Zahra Sheykhinezhad; Mohammad Naderi dehkordi; Hamid Rastegari

  13. Taylor Approach for Solving Non-Linear Bi-level Programming Problem

    Authors: Eghbal Hosseini; Isa Nakhai Kamalabadi

  14. A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania

    Authors: Mohamed D. Waziri; Zaipuna O. Yonah

  15. AMA: a compound methodology for designing and implementing agent-based systems

    Authors: Erfan Ghandehari; Fatemeh Saadatjoo; Mohammad Ali Zare Chahooki

  16. A new centrality measure for probabilistic diffusion in network

    Authors: Kiyotaka Ide; Akira Namatame; Loganathan Ponnambalam; Fu Xiuju; Rick Siow Mong Goh

  17. Towards A Secure Remote Electronic Voting in Tanzania Organizational Challenges

    Authors: Sylvester Kimbi; Yaw Nkansah-Gyekye; Kisangiri Michael

  18. Optimum Layout of Multiplexer with Minimal Average Power based on IWO, Fuzzy-IWO, GA, and Fuzzy GA

    Authors: Farshid Keivanian; Nasser Mehrshad; Seyed-Hamid Zahiri

  19. A Dynamic Simulation on Single Gate Junctionless Field Effect Transistor Based on Genetic Algorithm

    Authors: Roya Norani