Search Results - IJCSIS
-
1
A Close Assessment of X-ray Image Enhancement Techniques for Contraband Detection
Published 2016“…IJCSIS…”
Get full text
Get full text
-
2
ICT Convergence in Internet of Things – The Birth of Smart Factories
Published 2016“…IJCSIS…”
Get full text
Get full text
-
3
Design and implementation of multi factor mechanism for secure authentication system
Published 2013“…IJCSIS…”
Get full text
Get full text
-
4
Improving information security in e-banking by using biometric fingerprint : a case of major bank in Malaysia
Published 2012“…IJCSIS, USA.…”
Get full text
Get full text
-
5
Development of a project-based learning approach in requirement engineering
Published 2010“…IJCSIS Publication…”
Get full text
Get full text
-
6
Training process reduction based on potential weights linear analysis to accelerate back propagation network.
Published 2009“… IJCSIS Press…”
Get full text
Get full text
-
7
-
8
Analysis on Differential Router Buffer Size towards Network Congestion: A Simulation-based
Published 2011“…IJCSIS Managing Editor…”
Get full text
Get full text
-
9
Biologically Inspired Execution Framework for Vulnerable Workflow Systems
Published 2009“…LJS Publisher and IJCSIS Press…”
Get full text
Get full text
-
10
Application of a Fuzzy Programming Technique to Production Planning in the Textile Industry
Published 2009“…LJS Publisher and IJCSIS Press …”
Get full text
Get full text
-
11
The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera
Published 2009“…LJS Publisher and IJCSIS Press …”
Get full text
Get full text
-
12
Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques
Published 2009“…LJS Publisher and IJCSIS Press …”
Get full text
Get full text
-
13
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
Published 2009“…LJS Publisher and IJCSIS Press …”
Get full text
Get full text
-
14
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
Published 2010“…LJS Publisher and IJCSIS Press …”
Get full text
Get full text
-
15
Using biometric techniques to secure online student assessment: Comparative study
Published 2011“…LJS Publisher and IJCSIS Press …”
Get full text
Get full text
-
16
Location-based Solar Energy Potential Prediction Algorithm for Mountainous Rural Landscapes
Published 2013“…LJS Publisher and IJCSIS Press…”
Get full text
Get full text
-
17
Performance counter monitoring mechanism for measuring QoS attributes in SOA.
Published 2010“…LJS Publisher and IJCSIS Press…”
Get full text
Get full text
-
18
A New Generic Taxonomy on Hybrid Malware Detection Technique
Published 2009“…LJS Publisher and IJCSIS Press …”
Get full text
Get full text
-
19
Scenario Based Worm Trace Pattern Identification Technique
Published 2010“…LJS Publisher and IJCSIS Press …”
Get full text
Get full text
-
20
The avalanche and propagation characteristics from Haar perspective with extended linear and Bent Haar conditions
Published 2016“…International Journal of Computer Science and Information Security (IJCSIS)…”
Get full text
Get full text