IJCSES “International Journal of Computer Sciences and Engineering Systems”                ISSN 0973-4406

A Fully Refereed International Journal

International Journal of Computer Sciences and Engineering Systems

 

 

Home

*For Authors
*Current Issue
*Editorial Board
*Former Issues
*For Reviewers
*Contact Us

 

 

 

 

 

 

Volume 3, Number 4: 2009

Article#

    Article Title & Authors (Volume 3 Number 4 2009)

Page

1

Path Map Generation of an Unknown Area Using a Self Guided Vehicle by Radon Transform and Shortest Path Calculation by Moore’s Algorithm

K. AHMED, M. S. MUNIR, and A. S. M. SHIHAVUDDIN

281-287

2

Optical Recognition of Handwritten Devnagari Numerals with Multifarious Recognition System

C. Vasantha LAKSHMI, Ritu JAIN and C. PATVARDHAN

289-296

3

Tunable Bandpass Filter Using RF MEMS Switches

A.H.M. Zahirul ALAM, Md. Rafiqul ISLAM, and Sheroz KHAN

297-301

4

Improved Cryptanalysis on the Cryptosystem Based on DLP  γ=αaβb

R.PADMAVATHY, and Chakravarthy BHAGVATI

303-306

5

Exaggeration Cloning From Example Sequence

Tong-Yee LEE, Ping-Hsien LIN, Shao-Wei YEN, Ming-Te CHI, Yu-Shuen WANG, Chih-Yuan YAO, and Jin-Lung LIN

307-313

6

New Approach to Design a Hamilton p-Cycle

Sanjay Kumar SAHU

315-317

7

Robust Optimal Sliding Mode Tracking Control for PMSM with Uncertainties

Hai-Ping PANG,  and Xia CHEN

319-323

8

Hepatitis B Disease Diagnosis Using Artificial Neural Network

Ghumbre Shashikant UTTRESHWAR, and A. A. GHATOL

325-333

9

Scheduling Approach for Run Time Reconfigured Systems

Bouraoui OUNI, Abdellatif MTIBAA,  and EL-bay BOURENNANE

335-340

10

My Agent Oriented Market Transaction Handling Using Multi-Agent System

Syed Fawad MUSTAFA and Syed Sharaf ALIJAFFRI

341-344

11

“When to Stop Testing” Using Non Homogenous Poisson Process Based     Cumulative priority Model

Praveen Ranjan SRIVASTAVA, Abhishek GUPTA, Sushil TIWARI, and Pulkit MATHUR

345-350

12

Image Magnification based on Directed Linear Interpolation

T. Romen SINGH,  O. Imocha SINGH,   Kh. Manglem SINGH, Tejmani SINAM and Th. Rupachandra SINGH

351-359

13

Development of SS7 and IP Based SIGTRAN protocol analyzer software operated with designed USB E1 interface card

M. S. MUNIR, K. AHMED, A. S. M. SHIHAVUDDIN, M. Y. RAZIB, and K. R. AHMED

361-366

14

Efficient Application of Association Rule Mining Algorithms on an Encoded Temporal Database with Weighted Items

Chelliah BALASUBRAMANIAN, and Karuppaswamy DURAISWAMY

367-372

 

 

Volume 3, Number 3: 2009

 

Article#

    Article Title & Authors (Volume 3 Number 3 2009)

Page

1

Texture Analysis using Haar Wavelet based Laws method

S. SURESH KUMAR  and L .GANESAN

173-178

2

Software Testing Effort Estimation using Fuzzy Logic Praveen

Ranjan SRIVASTAVA, Suresh SAGGAR, A.P.SINGH and Raghurama G

179-184

3

Secure the AD HOC Networks

G. RAMESH,R. UMARANI,S. SELVARAJ, and C. KARPAGAM

185-193

4

Semantic Search using Conceptual Graphs

R.RENUGA and Dr.SUDHASADASIVAM

195-200

5

DSP Implementation and Performances Evaluation of 2D DWT for JPEG2000 compression

Ihsen GAZZAH, Chokri SOUANI and Kamel BESBES

201-206

6

A Memetic Algorithm to Time-Cost Trade off in Project Scheduling

Barmak Hooshyar AZAR and Amir Masoud RAHMANI

207-212

7

Contextual Frequent Words Mining for Chinese Text Clustering

Xian-Jun Meng, Qing-Cai Chen, Xiao-Long Wang, Ying Ding, Xuan Wang

213-220

8

A Multi-Document Summarization Approach Based on Extracts Classification

Fatma KALLEL JAOUA, Lamia HADRICH BELGUITH, Maher JAOUA, and Abdelmajid BEN HAMADOU

221-231

9

Realization of Quantum Boolean Circuits using Garbage Free Fredkin Operations

Amlan CHAKRABARTI, and Susmita SUR-KOLAY

233-237

10

Distributed Computing Techniques for Information Handling in Wireless Ad Hoc Sensor Networks

M.K.JEYA KUMAR

239-245

11

New Approaches Reducing Handoff Latency in 802.11 Wireless LANs

Monji ZAIDI, Ridha OUNI, Jamila BHAR and Rached TOURKI

247-255

12

A Review of Survivable WDM Optical Networks for Unicast and Multicast Traffic

Baibaswata MOHAPATRA, Rajendra K. NAGARIA, and Sudarshan TIWARI

257-264

13

Overview of Intrusion Detection Systems

V. K. PACHGHARE, Dr. Parag KULKARNI and Deven M. NIKAM

265-268

14

Statistical Approach for Content-based Face Image Retrieval

Qi HAN, Zhi-fang WANG, Qiong LI and Xia-mu NIU

269-274

15

A Fast Automatic Registration Scheme of 3D Face Model for Template Protection

Wenjun HUANG, Min LUO and Xiamu.NIU

275-280

Volume 3, Number 2: 2009

 

Article#

    Article Title & Authors (Volume 3 Number 2 2009)

Page

1

A Software Stress Testing Experiment

Hassan I. MATHKOUR, Ghazy M.R. ASSASSA, and Huda Bin SADIQ

63-70

2

Med Search – A Vertical Search Engine

Rajashree SHETTAR, Dr. Shobha G,  and Rakshitha IYER

71-76

3

Item Conflict Based Sanitization to Preserve Privacy in Utility Itemset Mining

R.R.RAJALAXMI, and A.M.NATARAJAN

77-83

4

Specification and Verification of Hardware Circuits using mCRL

K.L. MAN

85-93

5

A secure Face Recognition System

Zhifang WANG, Qi HAN, Christoph BUSCH, and Xiamu NIU

95-98

6

Dual Watermarking Scheme for Copyright Protection

Kh. Manglem SINGH

99-106

7

Diminution of Space and Size Complexity on Object-Relational Database Using Principal Component

P. UMAMAHESWARI,  and Dr.M.RAJARAM

107-113

8

ROBDD – Software and Hardware Representations

Mohamed RASEEN, and K. THANUSHKODI

115-120

9

Agent Based Prototype Model for Requirement Gathering, Categorization and Goal Extraction

Prabhat RANJAN, and  A. K. MISRA

121-132

10

Robust and Secure Perceptual Hashing Method with Diffusion Capability

Hui ZHANG, Qiong LI, Xiamu NIU, Yanan WANG

133-136

11

QoS-aware Bandwidth Management using Fuzzy Control Theory in Heterogeneous Wireless Networks

I-Shyan HWANG, Bor-Jiunn HWANG and Ling-Feng KU

137-142

12

Adaptive Neural Network Impedance Control for Robotic Manipulators Driven by Current-Fed Induction Motors

Ming-Chang Hwang

143-149

13

Designing a Prototype of Living Product  - Interactive Modular Display (IMD)

Yuan-Bang CHENG, and Huei-Sheng YU

151-157

14

Image Restoration with Missing Edge Detection

Hwei-Jen LIN, I-Chun PAI and Hung-Hsuan WU

159-163

15

Solving the Scheduling Problem by Swarm Intelligent Optimization Ruey-Maw CHEN, Chung-Lun WU, and Shih-Tang LO

165-171

 

Volume 3, Number 1: 2009

 

Article#

    Article Title & Authors (Volume 3 Number 1 2009)

Page

1

A Novel Method for Content Based Image Retrieval Using Color Features
Huu Quynh NGUYEN, and Quoc Tao NGO

1-6

2

Fingerprint Recognition Using Principal Component Analysis and Various Distance Measures
Ismail  A. ISMAIL , Mohammed   A. RAMADAN, Talaat  . El DANF, and Ahmed   H. SAMAK

7-10

3

VLSI Implementation of an LNS Divider Applicable to Mobile 3D Graphics Processors
Yong-Hwan LEE, and Young-Sung CHO

11-15

4

Hybrid Genetic-Particle Swarm Optimizer for Document Clustering
K. PREMALATHA , and Dr. A.M. NATARAJAN

17-22

5

A Finite Element Approach for Modeling the Capacitive Coupling in Conductors Installed nearby AC Power Lines
A. H. Al-BADI, and   M. A.  SALAM

23-28

6

Network on Chip switch scheduling approach for QoS and hardware resources adaptation
Abdelhamid HELALI, and Salem NASRI

29-35

7

An Improved Packet Marking Scheme for Tracing DDoS Attack

Wan-Biao LI, Xiao-Ming CHEN, and Shi-Qiang JI

37-42

8

Improving HG Method for Content Based Landscape Image Retrieval
Huu Quynh NGUYEN, and Quoc Tao NGO

43-47

9

An Improved Particle Swarm Optimization for Prediction Model of Macromolecular Structure
Fuli RONG, Yang YIand Yang HU

49-54

10

Embedding Secret Binary Message Using Locally Adaptive Data Compression Coding
Chin-Chen CHANG, Chin-Feng LEE and Lin-Yi CHUANG

55-61