Most Cited Articles
International Journal of Computer Science & Information Technology (IJCSIT)
ISSN:0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
Most Cited Articles – 2012
Embedded Controller for Vehicle in-Front Obstacle Detection and Cabin Safety Alert System V.Ramya, B. Palaniappan and K. Karthick, IJCSIT Journal, Vol 4, No 2, April 2012, PP. 117-131 DOI : 10.5121/ijcsit.2012.4210 |
Most Cited Articles – 2011
Common Phases of Computer Forensics Investigation Models Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 17 – 31 DOI : 10.5121/ijcsit.2011.3302 |
Plants Images Classification Based on Textural Features using Combined Classifier M. Z. Rashad,B.S.el-Desouky,Manal and S .Khawasik, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 93 – 100 DOI : 10.5121/ijcsit.2011.3407 |
Php Framework for Database Management Based on Mvc Pattern Chanchai Supaartagorn, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 251 – 258 DOI : 10.5121/ijcsit.2011.3219 |
Wavelet Based Spectrum Sensing Techniques for Cognitive Radio – A Survey Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 123 – 137 DOI : 10.5121/ijcsit.2011.3209 |
Research Review for Digital Image Segmentation Techniques Ashraf A. Aly,Safaai Bin Deris and Nazar Zaki, IJCSIT Journal, Vol 3, No 5, Oct 2011, PP. 99-106 DOI : 10.5121/ijcsit.2011.3509 |
Machine Learning Methods for Spam E-Mail Classification W.A. Awad and S.M. ELseuofi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 174-184 |
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network Al Mutaz M. Abdalla, Safaai Dress and Nazar Zaki, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 176,186 DOI : 10.5121/ijcsit.2011.3312 |
Performance Analysis of Various Data Mining Classification Techniques on Healthcare Data Shelly Gupta,Dharminder Kumar and Anand Sharma, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 155-169 DOI : 10.5121/ijcsit.2011.3413 |
Focused Web Crawling Using Decay Concept and Genetic Programming Mahdi Bazarganigilani, Ali Syed and Sandid Burki Vol.1, No.1, January 2011, PP. 1-12 |
Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network J.Pradeep,E.Srinivasan and S.Himavathi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 27-38 DOI : 10.5121/ijcsit.2011.3103 |
A Comparative Experiment of Several Shape Methods in Recognizing Plants A. Kadir,L.E.NugrohoA.Susanto and P.I.Santosa, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 256-263 DOI : 10.5121/ijcsit.2011.3318 |
Ubiquitous Mobile Health Monitoring System for Elderly (Umhmse) Abderrahim Bourouis,Mohamed Feham and Abdelhamid Bouchachia, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 74-82 DOI : 10.5121/ijcsit.2011.3306 |
Information Security Plan for Flight Simulator Applications Jason Slaughter,Syed (Shawon) and M. Rahman, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 1-15 DOI : 10.5121/ijcsit.2011.3301 |
Improving the Character Recognition Efficiency of Feed Forward Bp Neural Network Amit Choudhary and Rahul Rishi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 85-96 DOI : 10.5121/ijcsit.2011.3107 |
Hybrid GPS-GSM Localization of Automobile Tracking System Mohammad A. Al-Khedher, IJCSIT Journal, Vol 3, No 6, Dec 2011, PP. 75-85 DOI : 10.5121/ijcsit.2011.3606 |
Dna Lossless Differential Compression Algorithm Based on Similarity of Genomic Sequence Database Heba Afify,Muhammad Islam and Manal Abdel Wahed, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 145-154 DOI : 10.5121/ijcsit.2011.3412 |
Most Cited Articles – 2010
An Efficient Gait Recognition System for Human Identification using Modified ICA M.Pushpa Rani and G.Arumugam, IJCSIT Journal, Vol 2,no 1,february 2010, PP. 55 – 67 |
Human Facial Experssion Detection from Detected in Captured Image using Back Propagation Neural Network Jagdish Lal Raheja and Umesh Kumar, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 116 – 123 |
A Mobility – Based Checkpointing Protocol for Mobile Computing System Suparna Biswas and Sarmistha Neogy, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 135 – 151 |
A New Dct-Based Watermarking Method For Copyright Protection Of Digital Audio Pranab Kumar Dhar,Mohammad Ibrahim Khan and Saif Ahmad, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 91 – 101 DOI : 10.5121/ijcsit.2010.2507 |
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy S.Veeramalai,N.Jaisankar and A.Kannan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 60 – 74 DOI : 10.5121/ijcsit.2010.2406 |
Performance Evaluation of Routing Protocols in Wireless Sensor Networks Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 64 – 73 DOI : 10.5121/ijcsit.2010.2206 |
Agent based trust management framework in distributed E-Business environment E.Sathiyamoorthy,N.Ch.Sriman Narayana Iyenger and V.Ramachandran, IJCSIT Journal, vol 2, no 2, feb 2010, PP. 14 – 28 |
Use of Smart Antennas in Ad Hoc Networks Mohammed Ali Hussain,P.Suresh Varma,K. Satya Rajesh,Hussain Basha Pathan and Leela Madhav Sarraju, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 47 – 54 DOI : 10.5121/ijcsit.2010.2605 |
An Optimized Distributed Association Rule Mining Algorithm In Parallel and Distributed Data Mining With Xml Data for Improved Response Time Sujni Paul, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 88 – 101 DOI : 10.5121/ijcsit.2010.2208 |
Performance Analysis of Multimedia Compression Algorithms Eman Abdelfattah and Asif Mohiuddin, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 1-10 DOI : 10.5121/ijcsit.2010.2501 |
A Survey of Qos Routing Protocols for Mobile Ad Hoc Networks G. Santhi and Alamelu Nachiappan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 125-136 DOI : 10.5121/ijcsit.2010.2411 |
Some Observations on Open Source Software Development on Software Engineering Perspectives Vinay Tiwari, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 113-125 DOI : 10.5121/ijcsit.2010.2611 |
M-Learning: A New Paradigm of Learning Mathematics in Malaysia Saipunidzam Mahamad,Mohammad Noor Ibrahim and Shakirah Mohd Taib, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 76-86 DOI : 10.5121/ijcsit.2010.2407 |
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm Sandeep Singh Rawat and Lakshmi Rajamani, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 28-37 DOI : 10.5121/ijcsit.2010.2403 |
Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms Rahmat Widia Sembiring,Jasni Mohamad Zain and Abdullah Embong, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 162-170 DOI : 10.5121/ijcsit.2010.2414 |
An Applied Study On Educational Use Of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication Murat Kayri and Ozlem Cakır, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 48,58 DOI : 10.5121/ijcsit.2010.2405 |
Low Power Shift and Add Multiplier Design C.N.Marimuthu,P.Thangaraj and Aswathy Ramesan, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 12,22 DOI : 10.5121/ijcsit.2010.2302 |
Mining Target-Oriented Sequential Patterns With Time-Intervals Hao-En Chueh, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 113-123 DOI : 10.5121/ijcsit.2010.2410 |
Implementing Evaluation a Wireless body sensor system for automated physiological data acquition at home Chao Chen and Carlos Pomalaza-Raez, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 24-38 DOI : 10.5121/ijcsit.2010.2303 |
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues Md.Headayetullah and G.K.Pradhan, IJCSIT Journal, Volume 2, Number 3, June 2010 , PP. 72-91 DOI : 10.5121/ijcsit.2010.2306 |
Most Cited Articles – 2009
Thesaurus and Query Expansion Hazra Imran and Aditi Sharan, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 89 – 97 |
Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach A.Revathi,R.Ganapathy and Y.Venkataramani, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 30 – 42 |
Analysis On Deployment Cost And Network Performance for Heterogeneous Wireless Sensor Networks Dilip Kumar,Trilok.C Aseri and R.B Patel, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 109 – 120 |
Ensemble Design for Intrusion Detection Systems T. Subbulakshmi,A. Ramamoorthi and S.Mercy Shalinie, IJCSIT Journal, Vol 1, No 1, August 2009, PP. 1-9 |
AIRCC Publishing Corporation