Most Cited Articles

International Journal of Computer Science & Information Technology (IJCSIT)

ISSN:0975-3826(online); 0975-4660 (Print)

http://airccse.org/journal/ijcsit.html

Most Cited Articles – 2012

Embedded Controller for Vehicle in-Front Obstacle Detection and Cabin Safety Alert System
V.Ramya, B. Palaniappan and K. Karthick, IJCSIT Journal, Vol 4, No 2, April 2012, PP. 117-131
DOI : 10.5121/ijcsit.2012.4210

Most Cited Articles – 2011

Common Phases of Computer Forensics Investigation Models
Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 17 – 31
DOI : 10.5121/ijcsit.2011.3302
Plants Images Classification Based on Textural Features using Combined Classifier
M. Z. Rashad,B.S.el-Desouky,Manal and S .Khawasik, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 93 – 100
DOI : 10.5121/ijcsit.2011.3407
Php Framework for Database Management Based on Mvc Pattern
Chanchai Supaartagorn, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 251 – 258
DOI : 10.5121/ijcsit.2011.3219
Wavelet Based Spectrum Sensing Techniques for Cognitive Radio – A Survey
Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 123 – 137
DOI : 10.5121/ijcsit.2011.3209
Research Review for Digital Image Segmentation Techniques
Ashraf A. Aly,Safaai Bin Deris and Nazar Zaki, IJCSIT Journal, Vol 3, No 5, Oct 2011, PP. 99-106
DOI : 10.5121/ijcsit.2011.3509
Machine Learning Methods for Spam E-Mail Classification
W.A. Awad and S.M. ELseuofi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 174-184
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network
Al Mutaz M. Abdalla, Safaai Dress and Nazar Zaki, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 176,186
DOI : 10.5121/ijcsit.2011.3312
Performance Analysis of Various Data Mining Classification Techniques on Healthcare Data
Shelly Gupta,Dharminder Kumar and Anand Sharma, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 155-169
DOI : 10.5121/ijcsit.2011.3413
Focused Web Crawling Using Decay Concept and Genetic Programming
Mahdi Bazarganigilani, Ali Syed and Sandid Burki Vol.1, No.1, January 2011, PP. 1-12
Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network
J.Pradeep,E.Srinivasan and S.Himavathi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 27-38
DOI : 10.5121/ijcsit.2011.3103
A Comparative Experiment of Several Shape Methods in Recognizing Plants
A. Kadir,L.E.NugrohoA.Susanto and P.I.Santosa, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 256-263
DOI : 10.5121/ijcsit.2011.3318
Ubiquitous Mobile Health Monitoring System for Elderly (Umhmse)
Abderrahim Bourouis,Mohamed Feham and Abdelhamid Bouchachia, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 74-82
DOI : 10.5121/ijcsit.2011.3306
Information Security Plan for Flight Simulator Applications
Jason Slaughter,Syed (Shawon) and M. Rahman, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 1-15
DOI : 10.5121/ijcsit.2011.3301
Improving the Character Recognition Efficiency of Feed Forward Bp Neural Network
Amit Choudhary and Rahul Rishi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 85-96
DOI : 10.5121/ijcsit.2011.3107
Hybrid GPS-GSM Localization of Automobile Tracking System
Mohammad A. Al-Khedher, IJCSIT Journal, Vol 3, No 6, Dec 2011, PP. 75-85
DOI : 10.5121/ijcsit.2011.3606
Dna Lossless Differential Compression Algorithm Based on Similarity of Genomic Sequence Database
Heba Afify,Muhammad Islam and Manal Abdel Wahed, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 145-154
DOI : 10.5121/ijcsit.2011.3412

Most Cited Articles – 2010

An Efficient Gait Recognition System for Human Identification using Modified ICA
M.Pushpa Rani and G.Arumugam, IJCSIT Journal, Vol 2,no 1,february 2010, PP. 55 – 67
Human Facial Experssion Detection from Detected in Captured Image using Back Propagation Neural Network
Jagdish Lal Raheja and Umesh Kumar, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 116 – 123
A Mobility – Based Checkpointing Protocol for Mobile Computing System
Suparna Biswas and Sarmistha Neogy, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 135 – 151
A New Dct-Based Watermarking Method For Copyright Protection Of Digital Audio
Pranab Kumar Dhar,Mohammad Ibrahim Khan and Saif Ahmad, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 91 – 101
DOI : 10.5121/ijcsit.2010.2507
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy
S.Veeramalai,N.Jaisankar and A.Kannan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 60 – 74
DOI : 10.5121/ijcsit.2010.2406
Performance Evaluation of Routing Protocols in Wireless Sensor Networks
Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 64 – 73
DOI : 10.5121/ijcsit.2010.2206
Agent based trust management framework in distributed E-Business environment
E.Sathiyamoorthy,N.Ch.Sriman Narayana Iyenger and V.Ramachandran, IJCSIT Journal, vol 2, no 2, feb 2010, PP. 14 – 28
Use of Smart Antennas in Ad Hoc Networks
Mohammed Ali Hussain,P.Suresh Varma,K. Satya Rajesh,Hussain Basha Pathan and Leela Madhav Sarraju, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 47 – 54
DOI : 10.5121/ijcsit.2010.2605
An Optimized Distributed Association Rule Mining Algorithm In Parallel and Distributed Data Mining With Xml Data for Improved Response Time
Sujni Paul, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 88 – 101
DOI : 10.5121/ijcsit.2010.2208
Performance Analysis of Multimedia Compression Algorithms
Eman Abdelfattah and Asif Mohiuddin, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 1-10
DOI : 10.5121/ijcsit.2010.2501
A Survey of Qos Routing Protocols for Mobile Ad Hoc Networks
G. Santhi and Alamelu Nachiappan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 125-136
DOI : 10.5121/ijcsit.2010.2411
Some Observations on Open Source Software Development on Software Engineering Perspectives
Vinay Tiwari, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 113-125
DOI : 10.5121/ijcsit.2010.2611
M-Learning: A New Paradigm of Learning Mathematics in Malaysia
Saipunidzam Mahamad,Mohammad Noor Ibrahim and Shakirah Mohd Taib, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 76-86
DOI : 10.5121/ijcsit.2010.2407
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm
Sandeep Singh Rawat and Lakshmi Rajamani, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 28-37
DOI : 10.5121/ijcsit.2010.2403
Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms
Rahmat Widia Sembiring,Jasni Mohamad Zain and Abdullah Embong, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 162-170
DOI : 10.5121/ijcsit.2010.2414
An Applied Study On Educational Use Of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication
Murat Kayri and Ozlem Cakır, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 48,58
DOI : 10.5121/ijcsit.2010.2405
Low Power Shift and Add Multiplier Design
C.N.Marimuthu,P.Thangaraj and Aswathy Ramesan, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 12,22
DOI : 10.5121/ijcsit.2010.2302
Mining Target-Oriented Sequential Patterns With Time-Intervals
Hao-En Chueh, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 113-123
DOI : 10.5121/ijcsit.2010.2410
Implementing Evaluation a Wireless body sensor system for automated physiological data acquition at home
Chao Chen and Carlos Pomalaza-Raez, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 24-38
DOI : 10.5121/ijcsit.2010.2303
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Md.Headayetullah and G.K.Pradhan, IJCSIT Journal, Volume 2, Number 3, June 2010 , PP. 72-91
DOI : 10.5121/ijcsit.2010.2306

Most Cited Articles – 2009

Thesaurus and Query Expansion
Hazra Imran and Aditi Sharan, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 89 – 97
Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach
A.Revathi,R.Ganapathy and Y.Venkataramani, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 30 – 42
Analysis On Deployment Cost And Network Performance for Heterogeneous Wireless Sensor Networks
Dilip Kumar,Trilok.C Aseri and R.B Patel, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 109 – 120
Ensemble Design for Intrusion Detection Systems
T. Subbulakshmi,A. Ramamoorthi and S.Mercy Shalinie, IJCSIT Journal, Vol 1, No 1, August 2009, PP. 1-9

AIRCC Publishing Corporation

http://www.airccse.org

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: