Ijcsit(most cited articles)

606 views
518 views

Published on

International Journal of Computer Science & Information Technology(IJCSIT) - Most Cited Article

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
606
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ijcsit(most cited articles)

  1. 1. International Journal of Computer Science & Information Technology (IJCSIT) ISSN:0975-3826(online); 0975-4660 (Print) http://airccse.org/journal/ijcsit.html Most Cited Articles - 2012 Embedded Controller for Vehicle in-Front Obstacle Detection and Cabin Safety Alert System V.Ramya, B. Palaniappan and K. Karthick, IJCSIT Journal, Vol 4, No 2, April 2012, PP. 117- 131 DOI : 10.5121/ijcsit.2012.4210 Most Cited Articles - 2011 Common Phases of Computer Forensics Investigation Models Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 17 – 31 DOI : 10.5121/ijcsit.2011.3302 Plants Images Classification Based on Textural Features using Combined Classifier M. Z. Rashad,B.S.el-Desouky,Manal and S .Khawasik, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 93 – 100 DOI : 10.5121/ijcsit.2011.3407 Php Framework for Database Management Based on Mvc Pattern Chanchai Supaartagorn, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 251 - 258 DOI : 10.5121/ijcsit.2011.3219 Wavelet Based Spectrum Sensing Techniques for Cognitive Radio – A Survey Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 123 – 137 DOI : 10.5121/ijcsit.2011.3209 Research Review for Digital Image Segmentation Techniques Ashraf A. Aly,Safaai Bin Deris and Nazar Zaki, IJCSIT Journal, Vol 3, No 5, Oct 2011, PP. 99- 106 DOI : 10.5121/ijcsit.2011.3509 Machine Learning Methods for Spam E-Mail Classification W.A. Awad and S.M. ELseuofi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 174-184 Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network Al Mutaz M. Abdalla, Safaai Dress and Nazar Zaki, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 176,186 DOI : 10.5121/ijcsit.2011.3312 Performance Analysis of Various Data Mining Classification Techniques on Healthcare Data Shelly Gupta,Dharminder Kumar and Anand Sharma, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 155-169 DOI : 10.5121/ijcsit.2011.3413 Focused Web Crawling Using Decay Concept and Genetic Programming Mahdi Bazarganigilani, Ali Syed and Sandid Burki Vol.1, No.1, January 2011, PP. 1-12 Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network J.Pradeep,E.Srinivasan and S.Himavathi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 27-38 DOI : 10.5121/ijcsit.2011.3103
  2. 2. A Comparative Experiment of Several Shape Methods in Recognizing Plants A. Kadir,L.E.NugrohoA.Susanto and P.I.Santosa, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 256-263 DOI : 10.5121/ijcsit.2011.3318 Ubiquitous Mobile Health Monitoring System for Elderly (Umhmse) Abderrahim Bourouis,Mohamed Feham and Abdelhamid Bouchachia, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 74-82 DOI : 10.5121/ijcsit.2011.3306 Information Security Plan for Flight Simulator Applications Jason Slaughter,Syed (Shawon) and M. Rahman, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 1- 15 DOI : 10.5121/ijcsit.2011.3301 Improving the Character Recognition Efficiency of Feed Forward Bp Neural Network Amit Choudhary and Rahul Rishi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 85-96 DOI : 10.5121/ijcsit.2011.3107 Hybrid GPS-GSM Localization of Automobile Tracking System Mohammad A. Al-Khedher, IJCSIT Journal, Vol 3, No 6, Dec 2011, PP. 75-85 DOI : 10.5121/ijcsit.2011.3606 Dna Lossless Differential Compression Algorithm Based on Similarity of Genomic Sequence Database Heba Afify,Muhammad Islam and Manal Abdel Wahed, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 145-154 DOI : 10.5121/ijcsit.2011.3412 Most Cited Articles - 2010 An Efficient Gait Recognition System for Human Identification using Modified ICA M.Pushpa Rani and G.Arumugam, IJCSIT Journal, Vol 2,no 1,february 2010, PP. 55 - 67 Human Facial Experssion Detection from Detected in Captured Image using Back Propagation Neural Network Jagdish Lal Raheja and Umesh Kumar, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 116 - 123 A Mobility - Based Checkpointing Protocol for Mobile Computing System Suparna Biswas and Sarmistha Neogy, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 135 - 151 A New Dct-Based Watermarking Method For Copyright Protection Of Digital Audio Pranab Kumar Dhar,Mohammad Ibrahim Khan and Saif Ahmad, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 91 – 101 DOI : 10.5121/ijcsit.2010.2507 Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy S.Veeramalai,N.Jaisankar and A.Kannan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 60 - 74 DOI : 10.5121/ijcsit.2010.2406 Performance Evaluation of Routing Protocols in Wireless Sensor Networks Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 64 - 73 DOI : 10.5121/ijcsit.2010.2206 Agent based trust management framework in distributed E-Business environment E.Sathiyamoorthy,N.Ch.Sriman Narayana Iyenger and V.Ramachandran, IJCSIT Journal, vol 2, no 2, feb 2010, PP. 14 - 28 Use of Smart Antennas in Ad Hoc Networks Mohammed Ali Hussain,P.Suresh Varma,K. Satya Rajesh,Hussain Basha Pathan and Leela Madhav Sarraju, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 47 - 54 DOI : 10.5121/ijcsit.2010.2605
  3. 3. An Optimized Distributed Association Rule Mining Algorithm In Parallel and Distributed Data Mining With Xml Data for Improved Response Time Sujni Paul, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 88 - 101 DOI : 10.5121/ijcsit.2010.2208 Performance Analysis of Multimedia Compression Algorithms Eman Abdelfattah and Asif Mohiuddin, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 1-10 DOI : 10.5121/ijcsit.2010.2501 A Survey of Qos Routing Protocols for Mobile Ad Hoc Networks G. Santhi and Alamelu Nachiappan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 125-136 DOI : 10.5121/ijcsit.2010.2411 Some Observations on Open Source Software Development on Software Engineering Perspectives Vinay Tiwari, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 113-125 DOI : 10.5121/ijcsit.2010.2611 M-Learning: A New Paradigm of Learning Mathematics in Malaysia Saipunidzam Mahamad,Mohammad Noor Ibrahim and Shakirah Mohd Taib, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 76-86 DOI : 10.5121/ijcsit.2010.2407 Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm Sandeep Singh Rawat and Lakshmi Rajamani, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 28-37 DOI : 10.5121/ijcsit.2010.2403 Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms Rahmat Widia Sembiring,Jasni Mohamad Zain and Abdullah Embong, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 162-170 DOI : 10.5121/ijcsit.2010.2414 An Applied Study On Educational Use Of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication Murat Kayri and Ozlem Cakır, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 48,58 DOI : 10.5121/ijcsit.2010.2405 Low Power Shift and Add Multiplier Design C.N.Marimuthu,P.Thangaraj and Aswathy Ramesan, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 12,22 DOI : 10.5121/ijcsit.2010.2302 Mining Target-Oriented Sequential Patterns With Time-Intervals Hao-En Chueh, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 113-123 DOI : 10.5121/ijcsit.2010.2410 Implementing Evaluation a Wireless body sensor system for automated physiological data acquition at home Chao Chen and Carlos Pomalaza-Raez, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 24-38 DOI : 10.5121/ijcsit.2010.2303 Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues Md.Headayetullah and G.K.Pradhan, IJCSIT Journal, Volume 2, Number 3, June 2010 , PP. 72- 91 DOI : 10.5121/ijcsit.2010.2306
  4. 4. Most Cited Articles - 2009 Thesaurus and Query Expansion Hazra Imran and Aditi Sharan, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 89 - 97 Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach A.Revathi,R.Ganapathy and Y.Venkataramani, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 30 - 42 Analysis On Deployment Cost And Network Performance for Heterogeneous Wireless Sensor Networks Dilip Kumar,Trilok.C Aseri and R.B Patel, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 109 - 120 Ensemble Design for Intrusion Detection Systems T. Subbulakshmi,A. Ramamoorthi and S.Mercy Shalinie, IJCSIT Journal, Vol 1, No 1, August 2009, PP. 1-9 AIRCC Publishing Corporation www.airccse.org

×