ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

Advances in Computer Science : an International Journal(ACSIJ) >>

Vol.4, No.5

Publisher: ACSIJ

Publishing Date: 2015-09-30

  1. APPLIED CRYPTOGRAPHY IN PASSWORD ENCRYPTION USING NEURAL NETWORKS

    Authors: Venkata Karthik Gullapalli; Ishan Khanka; Rishi Verma

  2. Detecting Infected Botnet Machines by Using the Traffic Behavior Analysis

    Authors: Fahimeh Hasani; Ebrahime Mehdipour

  3. Approaches and methodologies for mobile software engineering

    Authors: Serena Pastore

  4. Discovering Influential Users in Social Media to Enhance Effective Advertisement

    Authors: Mohammad J. Tarokh; Hosniyeh S. Arian; Omid R. B. Speily

  5. Performance Evaluation of OSPF and EIGRP Routing Protocols for Video Streaming over Next Generation Networks

    Authors: Francis L Lugayizi; Naison Gasela; Esiefarienrhe Bukohwo Michael

  6. A graph-based feature selection method for improving medical diagnosis

    Authors: A. R. Noruzi; H. R. Sahebi

  7. Repeat Finding Techniques, Data Structures and Algorithms in DNA sequences: A Survey

    Authors: Freeson Kaniwa; Heiko Schroeder; Otlhapile Dinakenyane

  8. The Regional Electronic Commerce Development Level Evaluation Technique based on ELECTRE-IV Method

    Authors: ZHAI Shan-shan

  9. Applying Website Usability Testing Techniques to Promote E-services

    Authors: Abdel Nasser H. Zaied; Mohamed M. Hassan; Islam S. Mohamed

  10. Composite Local Path Planning for Multi-Robot Obstacle Avoidance and Formation Navigation

    Authors: Sung-Gil Wee; Yoon-Gu Kim; Jinung An; Dong-Ha Lee; Suk-Gyu Lee

  11. Discrepancies Detection in Arabic and English Documents

    Authors: Abdulwahed Almarimi; Gabriela Andrejková

  12. Finding the highest performance for one-to-many content distribution in peer-to-peer networks based on the clustering and loading bandwidth of peer Nodes

    Authors: H.R. Ghaffari; M. Akbari Motlagh; A. Akbari Motlagh

  13. Linear time constant factor approximation algorithm for the Euclidean ``Freeze-Tag`` robot awakening problem

    Authors: Mohammad Javad Namazifar; Alireza Bagheri; Keivan Borna

  14. MLENN-KELM: a Prototype Selection Based Kernel Extreme Learning Machine Approach for Large-Scale Automatic Image Annotation

    Authors: Hamid Kargar-Shooroki; Mohammad Ali Zare Chahooki; Shima Javanmardi

  15. Persian Word Sense Disambiguation Corpus Extraction Based on Web Crawler Method

    Authors: Mohamadreza Mahmoodvand; Maryam Hourali

  16. On end-to-end safety for mobile COTS devices

    Authors: Markus Kucera

  17. Dynamic Multi-objective task scheduling in Cloud Computing based on Modified particle swarm optimization

    Authors: A.I.Awad; N.A.El-Hefnawy; H.M.Abdel_kader

  18. Variability management challenges in small and medium sized enterprises (SMEs)

    Authors: Tuomas Ihme; Päivi Parviainen; Susanna Teppola

  19. New attacks on Wi-Fi Protected Setup

    Authors: Hamed Mohtadi; Alireza Rahimi

  20. Archetypes and Standards for Medical Information Interchange

    Authors: Dimitar Tcharaktchiev; Vesselin E. Gueorguiev; Ivan Evg. Ivanov

  21. An Optimal Control of Bone Marrow in Cancer Chemotherapy by Artificial Neural Networks

    Authors: H. Hosseinipour; H. R. Sahebi