SEMrush
ijcsi.org

Please wait for loading...




    SEMrush

      (1094):

    /
     1  ~ 2014 sep 12hiimpact factor of ijcst journalFAQs - International Journal of Computer Science Issues - IJCSI
     1  ~ 2014 aug 25e-lerning maths flash animationDeveloping E - Learning Based on Animation Content for Improving e - learning , improving, animation content, ... the utilization of e - learning in mathematics have been ... learning animation or flash content material was made by.
     1  ~ 2014 aug 15quesem neelam duhanQUESEM : Towards building a Meta Search Service utilizing ... - IJCSIproposes the concept of QUESEM , a Meta search service over the keyword
     2  +49 2014 sep 10sms micropayement systemImplication of Secure Micropayment System Using Process Oriented Implication of Secure Micropayment System Using. Process Oriented Structural Design by Hash chaining in Mobile Network. Chitra Kiran N. Research Scholar.
     2  +2 2014 aug 02comparison zigbee with adhocPerformance Comparison Of Routing Protocols For Zigbee WpanAODV ( Ad hoc On-demand distance Vector) routing protocol is often used in IEEE standard 802.15.4 ZigBee protocol stack. As there are many protocols ...
     2  +3 2014 jul 17rrequirements modelling softwareA Framework for Modelling Software Requirements - International this paper, we will present a requirement modelling framework with the analysis of ... analyzing and modelling software requirements in a systematic manner [1 ...
     3  +3 2014 sep 05swot for ecommerce siteAdvanced SWOT Analysis of E-Commerce - International Journal of SWOT analysis of E-commerce which will comprise of strengths, weaknesses, opportunities and threats faced by e-commerce in current scenario.
     3  +53 2014 jul 28sms micropayment systemImplication of Secure Micropayment System Using. Process Oriented ... architecture for micropayment system in wireless adhoc network. Deployment of any ...
     4  +5 2014 aug 09software development modelA Comparison Between Five Models Of Software Engineeringthat examine the area of software development through the development models , which are known as software development life cycle. It represents five of the ...
     4  +5 2014 jul 26software development models
     5  ~ 2014 sep 02application development modeldevelopment models, which are known as software development life cycle. It represents ... 2. Prototype model. 3. Rapid application development model (RAD) .
     5  ~ 2014 aug 16middle east erp productsERP System for Effective Management in Middle East - IJCSIERP System for Effective Management in Middle East . Asma'a Khtoom1, Abd Al- Qader Ayyash2 and Mohammad Al-Wedyan3. 1 CIS Department, Al-Balqa ...
     5  +2 2014 aug 15biometric voting machineDESIGN A SECURE ELECTRONIC VOTING SYSTEM ... - IJCSIelectronic voting machine undoubtedly requires less manpower, save much ... voting machine based on biometric verification is proposed and implemented.
     5  +27 2014 jul 31free journals computer scienceInternational Journal of Computer Science Issues - IJCSI
     6  -1 2014 oct 04ramco cloud on demandChallenges Involved in Implementation of ERP on Demand Solution implementing the ERP cloud on demand solution in an organization. Keywords: Cloud .... Ramco On Demand are few big cloud ERP providers. Different parties ...
     6  +2 2014 sep 11rijndael mars text encryption toolPerformance Analysis of AES and MARS Encryption Algorithmson a piece of cipher text until an intelligible translation into plain text is obtained. This is
     7  ~ 2014 aug 23ux web standardsUser Experience ( UX ) and the Web Accessibility StandardsUser Experience ( UX ) and the Web Accessibility Standards . Osama Sohaib1, Walayat Hussain2, M. Khalid Badini3. 1, 3 Department of Computer Science & IT,  ...
     7  +1 2014 aug 10colour visual cryptography schemesVisual Cryptography Scheme for Color Image Using Random visual cryptography scheme an image is divided into n number of shares such that ..... [10] F. Liu1, C.K. Wu1, X.J. Lin, Colour visual cryptography schemes, IET  ...
     7  +5 2014 aug 09free computer science journalsIJCSI: International Journal of Computer Science Issues
     7  +3 2014 jul 31voip over wimaxComparative Study of VoIP over WiMax and WiFi - International over wireless has been considered - the choices are VoIP over. WiFi or VoIP over WiMax . ... measurement analysis of VoIP over both WiFi and WiMax networks.
     7  -2 2014 jul 25discrete sine transformComparative Analysis for Discrete Sine Transform as a suitable Comparative Analysis for Discrete Sine Transform as a suitable method for noise estimation. Swati Dhamija1 and Dr. Priyanka Jain2. 1 Quality Engineer, Aircom ...
     8  -2 2014 sep 29proton advertisingWeb-based AR Advertising & Branding for Proton CompanyWeb-based AR Advertising & Branding for Proton . Company. Ashraf Abbas M. Al- Modwahi1, Behrang Parhizkar2, Arash Habibi Lashkari3. 1Faculty of ...
     8  +1 2014 jul 21rfid based attendance systemRFID Technology Based Attendance Management SystemRFID Technology Based Attendance Management System . Sumita Nainan1, Romin ... reader, whose effective range is based on its operational frequency, is ...
     9  -3 2014 sep 26in disaster control modeCommand And Control in Disaster Management - International Command and Control (C2) which is poorly equipped to deal with uncertainty ... This proposed C2 model for disaster management is just an approach of C2 ...
     9  +20 2014 aug 22natural grammar free pdfCorpus Based Context Free Grammar Design for Natural ... - IJCSIFor practical implementation of Natural Language Interface to. Database, deep ... Questions, Context Free Grammar , Deep Semantic Analysis. 1. Introduction.
     10  -1 2014 sep 23adaptive line enhancerPerformance Comparison of Adaptive Algorithms for - International We have designed and simulated an adaptive line enhancer system for conferencing. This system is based upon a least- mean-square (LMS) and recursive ...
     10  -3 2014 sep 15smoke detection local binary patternDynamic Analysis for Video Based Smoke Detection - International tional smoke detection systems depend on point smoke detectors, which measure ... the histogram sequences of Local Binary Pattern ( LBP ) and Local Binary ...
     10  +1 2014 aug 04lsb encoding steganographyA Detailed look of Audio Steganography Techniques using LSB and steganography requires a text or audio secret message to be embedded within a cover ... Keywords: Audio data hiding, phase coding , LSB ,HAS. 1. Introduction.
     11  +21 2014 sep 05incoming search term analyserRanking Web Pages Based On Searching , Keywords and Incoming In this article, a new Page-Rank strategy is proposed based on the searching keywords and incoming links. Page-Rank is an analysis algorithm that search  ...
     11  +8 2014 aug 08google pdf search engineSearch engine optimization with Google - International Journal of Google is most user friendly search engine proved for the Indian users ... most of other search engines use Google search patterns so we have concentrated on ...
     12  -2 2014 oct 02saas applications development testing( SaaS ) Testing Challenges - International Journal of Computer Testing SaaS applications has got its own set of new challenges which forms .... eliminates the effort required to develop , maintain and support software which is  ...
     12  +3 2014 aug 24refinery supply chainOil Refinery Supply Chain Modelling Using Pipe Transportation - IJCSIemploy PTS to simulate a real oil refinery supply chain consisting of 16 warehouses and 3 refineries placed in the Czech. Republic and Slovakia. The refineries ...
     12  +89 2014 aug 23advantages of simpledbComparison of Cloud Database: Amazon's SimpleDB and Google's advantages of Amazon's SimpleDB and Google's Big Table database are analysed and discussed in detail. From the comparison of these databases, users can ...
     12  -7 2014 aug 12rfid attendance systemRFID Technology Based Attendance Management System - IJCSIRFID Technology Based Attendance Management System . Sumita Nainan1, Romin Parekh2, Tanvi Shah3. 1 Department of Electronics & Telecommunication  ...
     12  +89 2014 aug 07hindi to punjabiEvaluation of Hindi to Punjabi Machine Translation Systemdeveloped Punjabi to Hindi Machine translation system with high accuracy of about ... use same evaluation criteria as that of Punjabi to Hindi Punjabi . Machine  ...
     12  -1 2014 jul 29ip lookup tableIP address lookup for Internet routers using cache routing tablespeed of the IP address lookup operation due to the increase in routing table size , in this paper, a new IP address lookup algorithm based on cache routing- table  ...
     12  +1 2014 jul 23gsm communication encryptionAuthentication and Secure Communication in GSM , GPRS, and to encrypt /decrypt the data and authenticate the user (MS) in GSM , GPRS and ... authentication and communication encryption in GSM /GPRS and UMTS with.
     13  +9 2014 aug 24zigbee power meterZigBee Based Electric Meter Reading System - International Journal ZigBee Based Electric Meter Reading System. 1S.Arun , 2R.Krishnamoorthy and 3 Dr.VenuGopala Rao.M. 1Research Scholar,Singhania University & Asst.
     13  +88 2014 aug 17test for color castColor Casts Detection and Adjustment - International Journal of The second part is the white balance algorithm which is applied to the image while a real cast is found by the color cast detector. The test image is divided into m ...
     13  -2 2014 aug 14computer science journal
     13  ~ 2014 aug 11programme automate en cAutomatic Test Case Generation of C Program Using CFGprograms as tests object, this paper explores how to create CFG of a C program and generate automatic ... Automatic test case generation tool would be an.
     13  +3 2014 aug 10xml to database mappingA Model Mapping Approach for storing XML documents in mapping approach for storing XML data in relational database which use two tables in it: ... with the document and used to translate XML to database schema.
     13  +4 2014 jul 26software lifecycle modelsthat examine the area of software development through the development models , which are known as software development life cycle . It represents five of the ...
     13  +88 2014 jul 20punjabi to hindideveloped Punjabi to Hindi Machine translation system with high accuracy of about ... use same evaluation criteria as that of Punjabi to Hindi Punjabi. Machine  ...
     13  +88 2014 jul 18hindi to punjabi tralationdeveloped Punjabi to Hindi Machine translation system with high accuracy of about 92%. Both the systems i.e. system under question and developed system are ...
     14  ~ 2014 oct 02face recognition attendanceAlgorithm for Efficient Attendance Management: Face Recognition Algorithm for Efficient Attendance Management: Face . Recognition based approach. Naveed Khan Balcoh, M. Haroon Yousaf, Waqar Ahmad and M. Iram Baig.
     14  ~ 2014 sep 29wireshark iptablesPacket Filtering using IP Tables in Linux - International Journal of Keywords:Firewall, Wireshark , IPtables ,Linux, HTTP. 1. Introduction. With the global Internet connection, network security has gained significant attention in the  ...
     14  +4 2014 sep 11ecrm application developmentElectronic Customer Relationship Management Usability Model how to design and develop a usable applications . This paper suggests a usability model to help organization to employ high usable eCRM systems. Keywords: ...
     14  +1 2014 sep 06ecrm applications development
     14  -2 2014 aug 13fractal image compressionA Study on Fractal Image Compression using Soft Computing ... - IJCSIfor textures and natural images, relying on the fact that parts of an image often resemble other parts of the same image. Fractal Image Compression (FIC) ...
     14  +3 2014 aug 01text mining applicationsTechniques, Applications and Challenging Issue in Text Mining ues Techniques, Applications and Challenging Issue in Text Mining ues, Applications ... Text mining is a very exciting research area as it tries to discover knowledge ...
     14  +13 2014 jul 28railways reservation codesA QR Code Based Processing For Dynamic and Transparent Seat QR code processing along with one of the standards of wireless communication. ... Keywords- Indian Railway , QR Code , Reservation System,. Dynamic Seat ...
     14  +19 2014 jul 21convert punjabi to hindi
     14  +1 2014 jul 17database development dataflowProcess and Database Modelling of a University Bursary System: A process modeling, and how to develop Process model for. Bursary Cash ... Keywords: Data flow diagram; Process Modeling, .... that are required by a database .
     15  +53 2014 aug 19software engineering problemsTeaching Software Engineering : Problems and Suggestionsof software engineering to computer science and computer ... Problems . The term Software Engineering (SE) was first introduced in 1968 in a NATO conference ...
     15  +3 2014 aug 17conclusion on web crawlerMercator as a web crawler - International Journal of Computer lers. Keywords: Introduction, Related Work, Architecture, Compo- nents, Extensibility, Conclusion . 1. Introduction. Designing a scalable web crawler comparable ...
     15  +11 2014 aug 15web ranking serviceHybrid Web Services Ranking Algorithm - IJCSIA major application of these web services is web service composition. ... service parameters. Ranking of web services has been a wide area of research. Various  ...
     16  +2 2014 sep 28diagnosis expert systemsImplementing an Expert Diagnostic Assistance System for Car Car failure detection is a sequence of diagnostic processes that necessitates the deployment of expertise. The Expert System (ES) is one of the leading. Artificial ...
     16  -8 2014 sep 19ieee regression testing hyderabadAn Approach to Cost Effective Regression Testing in Black-Box As the regression testing is a frequently executed activity in the
     16  +1 2014 aug 24raiting of knowledgeEvaluation Strategy for Ranking and Rating of Knowledge Sharing Evaluation Strategy for Ranking and Rating of Knowledge . Sharing Portal Usability ... systems, especially the Knowledge Sharing Portal as the main method of ...
     16  +1 2014 aug 21software testing tools pdfDifferent Forms of Software Testing Techniques for Finding ErrorsSoftware testing is an activity which is aimed for evaluating an .... with automated load testing, tools test can easily be .... GB1/ pdf /ch14-GB1. [8].
     16  +4 2014 aug 09software process modelIt is concerned with the software management processes that examine the ... A software process model is an abstract representation of a process. It presents a ...
     17  ~ 2014 oct 04business intelligence in manufacturingThe Study on the Application of Business Intelligence in Keywords: Business Intelligence , Manufacturing , Visual. Representation. 1. Introduction. The manufacturing industry may be the main resources for profit for a ...
     17  ~ 2014 sep 30component based development process and component lifecycle pdfA New - Knot Model for Component Based Software DevelopmentComponent Based Software Engineering (CBSE) is a process that emphasizes the ... development team must identify a suitable life cycle model for the specific ...
     17  ~ 2014 sep 12karachi smart phones for salesSmart Phones Application development using HTML5 and related 1 Computer Science, SZABIST Karachi ,. Sindh, Karachi , Pakistan. 2 Computer ... Table 1: Worldwide smartphone sales by Operating System. Operating System.
     17  +10 2014 sep 07rochdi messoussiA Robust Digital Watermarking Technique using DWT-DCT and
     17  +5 2014 aug 31synthesis of antennasPatterns Antennas Arrays Synthesis Based on Adaptive Particle synthesis of uniform linear and planar antennas arrays, the first one is an adaptive ... antennas arrays using APSO method provides a low side lobe level and ...
     17  +16 2014 aug 30english to bangladesh translationEnglish to Bangla Machine Translation System Using Context-Free English to Bangla machine translation system employing heuristics or artificial intelligence in algorithms for word recognition and translation [4] has been.
     17  +8 2014 aug 24real time server loadReal Time Network Server Monitoring using Smartphone with therefore, the monitoring of these servers in real time is required to discover the ... Keywords: Real time , dynamic load balancing, checkpoint, smartphone. 1.
     17  +9 2014 aug 11cloud hosting potential problemsCloud Computing : A Survey on its limitations and Potential ... - IJCSIadopting cloud computing in much more higher rate than ... with few potential limitations that is delaying its ... analyze all the potential problems that delay the.
     17  +81 2014 aug 05e learning questions databaseEnhancing the Quality of E - learning Systems via Multimedia question in this paper is; how can multimedia learning tolls improve the quality of
     17  +14 2014 jul 28on demand erp applicationsimplementing the ERP cloud on demand solution in an organization. Keywords: .... always willing to implement ERP Application to automate their Business ...
     17  +43 2014 jul 17large screen keypad mobilesKeypad for Large Letter-Set Languages and Small Touch- Screen Keypad for Large Letter-Set Languages and Small Touch- Screen . Devices (Case .... input on small touch screen devices such as mobile phones and PDAs.
     18  +5 2014 sep 19bigtable pdfComparison of Cloud Database - International Journal of Computer
     18  +5 2014 sep 07extracted from webpageInformation Extraction and Webpage Understanding - International Information Extraction and Webpage Understanding. M.Sharmila Begum1, L. Dinesh2 and P.Aruna3. 1 Assistant professor, Department of Software Engineering, ...
     18  -6 2014 sep 06impact trustrankAnti- Trust Rank : Fighting Web Spam - International Journal of Introduction. Web Graph Model, Biased Page Rank, Trust Rank ,. Anti Trust Rank . ... Furthermore, it has a negative economic and social impact on the whole web ...
     18  ~ 2014 aug 27solution select multiple treeMultiple Tree Multicast in a Dynamic Environment - International Many single multicast tree solutions and multiple multicast tree solutions have ... the packets based on improved multicast tree selection . PMT achieves this by ...
     18  +37 2014 aug 16swot analysis softwareSWOT Analysis of Software Development Process Models - IJCSISoftware worth billions and trillions of dollars have gone waste in the past due to ... Analyze the software process model using SWOT method. The objective is to ...
     18  +1 2014 aug 12biometric atm machinesenhanced atm security system using biometrics - International The end result is an enhanced biometric authenticated ATM system ... As the Automated Teller Machines ( ATM ) technology is advancing, fraudsters are devising ...
     18  +17 2014 aug 12software testing techniquesSoftware testing is an activity which is aimed for evaluating an attribute or ... 1 Represent different software testing techniques which are.
     18  +11 2014 aug 10self service technologyStudy of Airport Self - service Technology within Experimental self - service technology to consumers in general and especially to passengers ... self - service technology in all international airports and specifically focused on ...
     18  +83 2014 jul 23distance learning egertonMeta-Modeling Cloud Computing Architecture in Distance Learning1Department of Computer Science, Egerton University,Njoro. Box 536, Egerton , 20115 ... Distance learning is one of the growing potential methods of education.
     19  +15 2014 jul 27mohamed kamar facebookComputerized Simulation of Automotive Air-Conditioning System
     19  +10 2014 jul 27on-demand erp softwareDue to this, a new deployment model of ERP Software has emerged in the Industry i.e. ... implementing the ERP cloud on demand solution in an organization.
     20  +1 2014 oct 01translate hindi to punjabi
     20  -1 2014 sep 15pakistan business environment swotPakistan , 38000. Tanzila Samin ... is emerging as a new way of helping business enterprises to ... has stimulated a global commercial environment which is now ...
    1 2 of 11 pages    




    SEMrush