Archived Papers for Journal
Advances in Computer Science : an International Journal(ACSIJ) >>
Vol.4, No.5
Publisher: ACSIJ
Publishing Date: 2015-09-30
- APPLIED CRYPTOGRAPHY IN PASSWORD ENCRYPTION USING NEURAL NETWORKSAuthors: Venkata Karthik Gullapalli; Ishan Khanka; Rishi Verma
- Detecting Infected Botnet Machines by Using the Traffic Behavior AnalysisAuthors: Fahimeh Hasani; Ebrahime Mehdipour
- Approaches and methodologies for mobile software engineeringAuthors: Serena Pastore
- Discovering Influential Users in Social Media to Enhance Effective AdvertisementAuthors: Mohammad J. Tarokh; Hosniyeh S. Arian; Omid R. B. Speily
- Performance Evaluation of OSPF and EIGRP Routing Protocols for Video Streaming over Next Generation NetworksAuthors: Francis L Lugayizi; Naison Gasela; Esiefarienrhe Bukohwo Michael
- A graph-based feature selection method for improving medical diagnosisAuthors: A. R. Noruzi; H. R. Sahebi
- Repeat Finding Techniques, Data Structures and Algorithms in DNA sequences: A SurveyAuthors: Freeson Kaniwa; Heiko Schroeder; Otlhapile Dinakenyane
- The Regional Electronic Commerce Development Level Evaluation Technique based on ELECTRE-IV MethodAuthors: ZHAI Shan-shan
- Applying Website Usability Testing Techniques to Promote E-servicesAuthors: Abdel Nasser H. Zaied; Mohamed M. Hassan; Islam S. Mohamed
- Composite Local Path Planning for Multi-Robot Obstacle Avoidance and Formation NavigationAuthors: Sung-Gil Wee; Yoon-Gu Kim; Jinung An; Dong-Ha Lee; Suk-Gyu Lee
- Discrepancies Detection in Arabic and English DocumentsAuthors: Abdulwahed Almarimi; Gabriela Andrejková
- Finding the highest performance for one-to-many content distribution in peer-to-peer networks based on the clustering and loading bandwidth of peer NodesAuthors: H.R. Ghaffari; M. Akbari Motlagh; A. Akbari Motlagh
- Linear time constant factor approximation algorithm for the Euclidean ``Freeze-Tag`` robot awakening problemAuthors: Mohammad Javad Namazifar; Alireza Bagheri; Keivan Borna
- MLENN-KELM: a Prototype Selection Based Kernel Extreme Learning Machine Approach for Large-Scale Automatic Image AnnotationAuthors: Hamid Kargar-Shooroki; Mohammad Ali Zare Chahooki; Shima Javanmardi
- Persian Word Sense Disambiguation Corpus Extraction Based on Web Crawler MethodAuthors: Mohamadreza Mahmoodvand; Maryam Hourali
- On end-to-end safety for mobile COTS devicesAuthors: Markus Kucera
- Dynamic Multi-objective task scheduling in Cloud Computing based on Modified particle swarm optimizationAuthors: A.I.Awad; N.A.El-Hefnawy; H.M.Abdel_kader
- Variability management challenges in small and medium sized enterprises (SMEs)Authors: Tuomas Ihme; Päivi Parviainen; Susanna Teppola
- New attacks on Wi-Fi Protected SetupAuthors: Hamed Mohtadi; Alireza Rahimi
- Archetypes and Standards for Medical Information InterchangeAuthors: Dimitar Tcharaktchiev; Vesselin E. Gueorguiev; Ivan Evg. Ivanov
- An Optimal Control of Bone Marrow in Cancer Chemotherapy by Artificial Neural NetworksAuthors: H. Hosseinipour; H. R. Sahebi