SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Computer Science & Information Technology
(IJCSIT)
ISSN:0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
Most Cited Articles - 2012
Embedded Controller for Vehicle in-Front Obstacle Detection and Cabin Safety Alert System
V.Ramya, B. Palaniappan and K. Karthick, IJCSIT Journal, Vol 4, No 2, April 2012, PP. 117-
131 DOI : 10.5121/ijcsit.2012.4210
Most Cited Articles - 2011
Common Phases of Computer Forensics Investigation Models
Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, IJCSIT Journal, Vol 3, No 3, June 2011,
PP. 17 – 31 DOI : 10.5121/ijcsit.2011.3302
Plants Images Classification Based on Textural Features using Combined Classifier
M. Z. Rashad,B.S.el-Desouky,Manal and S .Khawasik, IJCSIT Journal, Vol 3, No 4, August
2011, PP. 93 – 100 DOI : 10.5121/ijcsit.2011.3407
Php Framework for Database Management Based on Mvc Pattern
Chanchai Supaartagorn, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 251 - 258
DOI : 10.5121/ijcsit.2011.3219
Wavelet Based Spectrum Sensing Techniques for Cognitive Radio – A Survey
Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, IJCSIT Journal, Vol 3, No 2, April
2011, PP. 123 – 137 DOI : 10.5121/ijcsit.2011.3209
Research Review for Digital Image Segmentation Techniques
Ashraf A. Aly,Safaai Bin Deris and Nazar Zaki, IJCSIT Journal, Vol 3, No 5, Oct 2011, PP. 99-
106 DOI : 10.5121/ijcsit.2011.3509
Machine Learning Methods for Spam E-Mail Classification
W.A. Awad and S.M. ELseuofi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 174-184
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural
Network
Al Mutaz M. Abdalla, Safaai Dress and Nazar Zaki, IJCSIT Journal, Vol 3, No 3, June 2011, PP.
176,186 DOI : 10.5121/ijcsit.2011.3312
Performance Analysis of Various Data Mining Classification Techniques on Healthcare Data
Shelly Gupta,Dharminder Kumar and Anand Sharma, IJCSIT Journal, Vol 3, No 4, August 2011,
PP. 155-169 DOI : 10.5121/ijcsit.2011.3413
Focused Web Crawling Using Decay Concept and Genetic Programming
Mahdi Bazarganigilani, Ali Syed and Sandid Burki Vol.1, No.1, January 2011, PP. 1-12
Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural
Network
J.Pradeep,E.Srinivasan and S.Himavathi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 27-38
DOI : 10.5121/ijcsit.2011.3103
A Comparative Experiment of Several Shape Methods in Recognizing Plants
A. Kadir,L.E.NugrohoA.Susanto and P.I.Santosa, IJCSIT Journal, Vol 3, No 3, June 2011, PP.
256-263 DOI : 10.5121/ijcsit.2011.3318
Ubiquitous Mobile Health Monitoring System for Elderly (Umhmse)
Abderrahim Bourouis,Mohamed Feham and Abdelhamid Bouchachia, IJCSIT Journal, Vol 3, No
3, June 2011, PP. 74-82 DOI : 10.5121/ijcsit.2011.3306
Information Security Plan for Flight Simulator Applications
Jason Slaughter,Syed (Shawon) and M. Rahman, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 1-
15 DOI : 10.5121/ijcsit.2011.3301
Improving the Character Recognition Efficiency of Feed Forward Bp Neural Network
Amit Choudhary and Rahul Rishi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 85-96
DOI : 10.5121/ijcsit.2011.3107
Hybrid GPS-GSM Localization of Automobile Tracking System
Mohammad A. Al-Khedher, IJCSIT Journal, Vol 3, No 6, Dec 2011, PP. 75-85
DOI : 10.5121/ijcsit.2011.3606
Dna Lossless Differential Compression Algorithm Based on Similarity of Genomic Sequence
Database
Heba Afify,Muhammad Islam and Manal Abdel Wahed, IJCSIT Journal, Vol 3, No 4, August
2011, PP. 145-154 DOI : 10.5121/ijcsit.2011.3412
Most Cited Articles - 2010
An Efficient Gait Recognition System for Human Identification using Modified ICA
M.Pushpa Rani and G.Arumugam, IJCSIT Journal, Vol 2,no 1,february 2010, PP. 55 - 67
Human Facial Experssion Detection from Detected in Captured Image using Back Propagation
Neural Network
Jagdish Lal Raheja and Umesh Kumar, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 116 - 123
A Mobility - Based Checkpointing Protocol for Mobile Computing System
Suparna Biswas and Sarmistha Neogy, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 135 - 151
A New Dct-Based Watermarking Method For Copyright Protection Of Digital Audio
Pranab Kumar Dhar,Mohammad Ibrahim Khan and Saif Ahmad, IJCSIT Journal, Vol.2, No.5,
October 2010, PP. 91 – 101 DOI : 10.5121/ijcsit.2010.2507
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy
S.Veeramalai,N.Jaisankar and A.Kannan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 60 - 74
DOI : 10.5121/ijcsit.2010.2406
Performance Evaluation of Routing Protocols in Wireless Sensor Networks
Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, IJCSIT
Journal, Volume 2, Number 2, April 2010, PP. 64 - 73 DOI : 10.5121/ijcsit.2010.2206
Agent based trust management framework in distributed E-Business environment
E.Sathiyamoorthy,N.Ch.Sriman Narayana Iyenger and V.Ramachandran, IJCSIT Journal, vol 2,
no 2, feb 2010, PP. 14 - 28
Use of Smart Antennas in Ad Hoc Networks
Mohammed Ali Hussain,P.Suresh Varma,K. Satya Rajesh,Hussain Basha Pathan and Leela
Madhav Sarraju, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 47 - 54
DOI : 10.5121/ijcsit.2010.2605
An Optimized Distributed Association Rule Mining Algorithm In Parallel and Distributed Data
Mining With Xml Data for Improved Response Time
Sujni Paul, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 88 - 101
DOI : 10.5121/ijcsit.2010.2208
Performance Analysis of Multimedia Compression Algorithms
Eman Abdelfattah and Asif Mohiuddin, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 1-10
DOI : 10.5121/ijcsit.2010.2501
A Survey of Qos Routing Protocols for Mobile Ad Hoc Networks
G. Santhi and Alamelu Nachiappan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 125-136
DOI : 10.5121/ijcsit.2010.2411
Some Observations on Open Source Software Development on Software Engineering
Perspectives
Vinay Tiwari, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 113-125
DOI : 10.5121/ijcsit.2010.2611
M-Learning: A New Paradigm of Learning Mathematics in Malaysia
Saipunidzam Mahamad,Mohammad Noor Ibrahim and Shakirah Mohd Taib, IJCSIT Journal,
Vol.2, No.4, August 2010, PP. 76-86 DOI : 10.5121/ijcsit.2010.2407
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm
Sandeep Singh Rawat and Lakshmi Rajamani, IJCSIT Journal, Vol.2, No.4, August 2010, PP.
28-37 DOI : 10.5121/ijcsit.2010.2403
Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms
Rahmat Widia Sembiring,Jasni Mohamad Zain and Abdullah Embong, IJCSIT Journal, Vol.2,
No.4, August 2010, PP. 162-170 DOI : 10.5121/ijcsit.2010.2414
An Applied Study On Educational Use Of Facebook as a Web 2.0 Tool: The Sample Lesson of
Computer Networks and Communication
Murat Kayri and Ozlem Cakır, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 48,58
DOI : 10.5121/ijcsit.2010.2405
Low Power Shift and Add Multiplier Design
C.N.Marimuthu,P.Thangaraj and Aswathy Ramesan, IJCSIT Journal, Volume 2, Number 3, June
2010, PP. 12,22 DOI : 10.5121/ijcsit.2010.2302
Mining Target-Oriented Sequential Patterns With Time-Intervals
Hao-En Chueh, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 113-123
DOI : 10.5121/ijcsit.2010.2410
Implementing Evaluation a Wireless body sensor system for automated physiological data
acquition at home
Chao Chen and Carlos Pomalaza-Raez, IJCSIT Journal, Volume 2, Number 3, June 2010, PP.
24-38
DOI : 10.5121/ijcsit.2010.2303
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government
Key Issues
Md.Headayetullah and G.K.Pradhan, IJCSIT Journal, Volume 2, Number 3, June 2010 , PP. 72-
91 DOI : 10.5121/ijcsit.2010.2306
Most Cited Articles - 2009
Thesaurus and Query Expansion
Hazra Imran and Aditi Sharan, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 89 - 97
Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using
Iterative Clustering Approach
A.Revathi,R.Ganapathy and Y.Venkataramani, IJCSIT Journal, Vol 1, No 2, November 2009,
PP. 30 - 42
Analysis On Deployment Cost And Network Performance for Heterogeneous Wireless Sensor
Networks
Dilip Kumar,Trilok.C Aseri and R.B Patel, IJCSIT Journal, Vol 1, No 2, November 2009, PP.
109 - 120
Ensemble Design for Intrusion Detection Systems
T. Subbulakshmi,A. Ramamoorthi and S.Mercy Shalinie, IJCSIT Journal, Vol 1, No 1, August
2009, PP. 1-9
AIRCC Publishing Corporation
www.airccse.org

Más contenido relacionado

La actualidad más candente

CV_Salim_August-2016
CV_Salim_August-2016CV_Salim_August-2016
CV_Salim_August-2016
SALIM ISTYAQ
 

La actualidad más candente (20)

Ijasuc(most cited articles)
Ijasuc(most  cited articles)Ijasuc(most  cited articles)
Ijasuc(most cited articles)
 
Top 1 cited paper cybernetics (ijci)
Top 1 cited paper cybernetics (ijci)Top 1 cited paper cybernetics (ijci)
Top 1 cited paper cybernetics (ijci)
 
CC NEW
CC NEWCC NEW
CC NEW
 
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket ShotsShot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
Ijdms(most cited articles)
Ijdms(most cited articles)Ijdms(most cited articles)
Ijdms(most cited articles)
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
Smart information desk system with voice assistant for universities
Smart information desk system with voice assistant for universities Smart information desk system with voice assistant for universities
Smart information desk system with voice assistant for universities
 
P1151517372
P1151517372P1151517372
P1151517372
 
Dr Khdour CV
Dr Khdour CVDr Khdour CV
Dr Khdour CV
 
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...
 
RESUME_Prakash
RESUME_PrakashRESUME_Prakash
RESUME_Prakash
 
CV_Salim_August-2016
CV_Salim_August-2016CV_Salim_August-2016
CV_Salim_August-2016
 
Aisi2016 technical program
Aisi2016  technical programAisi2016  technical program
Aisi2016 technical program
 
DrE.N.Ganesh_recent resume
DrE.N.Ganesh_recent resumeDrE.N.Ganesh_recent resume
DrE.N.Ganesh_recent resume
 
QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
 QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM  QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
 
Lastresume
LastresumeLastresume
Lastresume
 
Research Agility spring 2021
Research Agility spring 2021Research Agility spring 2021
Research Agility spring 2021
 
Multiple object detection report
Multiple object detection reportMultiple object detection report
Multiple object detection report
 

Destacado

Top 7 lawyer interview questions answers
Top 7 lawyer interview questions answersTop 7 lawyer interview questions answers
Top 7 lawyer interview questions answers
job-interview-questions
 
Webviewr keek
Webviewr keekWebviewr keek
Webviewr keek
mandy365
 
Website to get keek followers free
Website to get keek followers freeWebsite to get keek followers free
Website to get keek followers free
mandy365
 
Website get more followers keek free
Website get more followers keek freeWebsite get more followers keek free
Website get more followers keek free
mandy365
 
Websites to get more keek followers for free
Websites to get more keek followers for freeWebsites to get more keek followers for free
Websites to get more keek followers for free
mandy365
 
Top 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answersTop 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answers
job-interview-questions
 
Top 7 maintenance supervisor interview questions answers
Top 7 maintenance supervisor interview questions answersTop 7 maintenance supervisor interview questions answers
Top 7 maintenance supervisor interview questions answers
job-interview-questions
 
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENTAPPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
ijcsit
 

Destacado (18)

Top 7 lawyer interview questions answers
Top 7 lawyer interview questions answersTop 7 lawyer interview questions answers
Top 7 lawyer interview questions answers
 
Webviewr keek
Webviewr keekWebviewr keek
Webviewr keek
 
Website to get keek followers free
Website to get keek followers freeWebsite to get keek followers free
Website to get keek followers free
 
Website get more followers keek free
Website get more followers keek freeWebsite get more followers keek free
Website get more followers keek free
 
Websites to get more keek followers for free
Websites to get more keek followers for freeWebsites to get more keek followers for free
Websites to get more keek followers for free
 
Innovex
InnovexInnovex
Innovex
 
Top 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answersTop 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answers
 
La Reserva China
La Reserva ChinaLa Reserva China
La Reserva China
 
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
 
YNC presentation
YNC presentationYNC presentation
YNC presentation
 
Top 7 maintenance supervisor interview questions answers
Top 7 maintenance supervisor interview questions answersTop 7 maintenance supervisor interview questions answers
Top 7 maintenance supervisor interview questions answers
 
Building A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.orgBuilding A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.org
 
Molecular Solutions For The Set-Partition Problem On Dna-Based Computing
Molecular Solutions For The Set-Partition Problem On Dna-Based ComputingMolecular Solutions For The Set-Partition Problem On Dna-Based Computing
Molecular Solutions For The Set-Partition Problem On Dna-Based Computing
 
Comparing of switching frequency on vector controlled asynchronous motor
Comparing of switching frequency on vector controlled asynchronous motorComparing of switching frequency on vector controlled asynchronous motor
Comparing of switching frequency on vector controlled asynchronous motor
 
An Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
An Adaptive Framework for Enhancing Recommendation Using Hybrid TechniqueAn Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
An Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
 
Zimasset
ZimassetZimasset
Zimasset
 
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENTAPPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
 
Marketing presentation
Marketing presentation Marketing presentation
Marketing presentation
 

Similar a Ijcsit(most cited articles)

International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
IJCNCJournal
 

Similar a Ijcsit(most cited articles) (20)

IJNSA - Most Cited Articles
IJNSA - Most Cited ArticlesIJNSA - Most Cited Articles
IJNSA - Most Cited Articles
 
Ijcses(most cited articles)
Ijcses(most cited articles)Ijcses(most cited articles)
Ijcses(most cited articles)
 
Ijsea
IjseaIjsea
Ijsea
 
Ijaia(most cited article)
Ijaia(most cited article)Ijaia(most cited article)
Ijaia(most cited article)
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
Ijdps(most cited articles)
Ijdps(most cited articles)Ijdps(most cited articles)
Ijdps(most cited articles)
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
 
April 2023-Top Cited Articles in ACII-24.pdf
April 2023-Top Cited Articles in ACII-24.pdfApril 2023-Top Cited Articles in ACII-24.pdf
April 2023-Top Cited Articles in ACII-24.pdf
 
V3 technologies ieee2012
V3 technologies ieee2012V3 technologies ieee2012
V3 technologies ieee2012
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 -
 
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligence
 
June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing  June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing
 
New research articles 2020 october issue international journal of multimedi...
New research articles 2020 october  issue  international journal of multimedi...New research articles 2020 october  issue  international journal of multimedi...
New research articles 2020 october issue international journal of multimedi...
 
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
 
Dr. K. Karibasappa
Dr. K. KaribasappaDr. K. Karibasappa
Dr. K. Karibasappa
 
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...
 
Dynamic_Cluster_Head_CH_Node_Election_an.pdf
Dynamic_Cluster_Head_CH_Node_Election_an.pdfDynamic_Cluster_Head_CH_Node_Election_an.pdf
Dynamic_Cluster_Head_CH_Node_Election_an.pdf
 
Most Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And EngineeringMost Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And Engineering
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Ijcsit(most cited articles)

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) ISSN:0975-3826(online); 0975-4660 (Print) http://airccse.org/journal/ijcsit.html Most Cited Articles - 2012 Embedded Controller for Vehicle in-Front Obstacle Detection and Cabin Safety Alert System V.Ramya, B. Palaniappan and K. Karthick, IJCSIT Journal, Vol 4, No 2, April 2012, PP. 117- 131 DOI : 10.5121/ijcsit.2012.4210 Most Cited Articles - 2011 Common Phases of Computer Forensics Investigation Models Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 17 – 31 DOI : 10.5121/ijcsit.2011.3302 Plants Images Classification Based on Textural Features using Combined Classifier M. Z. Rashad,B.S.el-Desouky,Manal and S .Khawasik, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 93 – 100 DOI : 10.5121/ijcsit.2011.3407 Php Framework for Database Management Based on Mvc Pattern Chanchai Supaartagorn, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 251 - 258 DOI : 10.5121/ijcsit.2011.3219 Wavelet Based Spectrum Sensing Techniques for Cognitive Radio – A Survey Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 123 – 137 DOI : 10.5121/ijcsit.2011.3209 Research Review for Digital Image Segmentation Techniques Ashraf A. Aly,Safaai Bin Deris and Nazar Zaki, IJCSIT Journal, Vol 3, No 5, Oct 2011, PP. 99- 106 DOI : 10.5121/ijcsit.2011.3509 Machine Learning Methods for Spam E-Mail Classification W.A. Awad and S.M. ELseuofi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 174-184 Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network Al Mutaz M. Abdalla, Safaai Dress and Nazar Zaki, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 176,186 DOI : 10.5121/ijcsit.2011.3312 Performance Analysis of Various Data Mining Classification Techniques on Healthcare Data Shelly Gupta,Dharminder Kumar and Anand Sharma, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 155-169 DOI : 10.5121/ijcsit.2011.3413 Focused Web Crawling Using Decay Concept and Genetic Programming Mahdi Bazarganigilani, Ali Syed and Sandid Burki Vol.1, No.1, January 2011, PP. 1-12 Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network J.Pradeep,E.Srinivasan and S.Himavathi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 27-38 DOI : 10.5121/ijcsit.2011.3103
  • 2. A Comparative Experiment of Several Shape Methods in Recognizing Plants A. Kadir,L.E.NugrohoA.Susanto and P.I.Santosa, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 256-263 DOI : 10.5121/ijcsit.2011.3318 Ubiquitous Mobile Health Monitoring System for Elderly (Umhmse) Abderrahim Bourouis,Mohamed Feham and Abdelhamid Bouchachia, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 74-82 DOI : 10.5121/ijcsit.2011.3306 Information Security Plan for Flight Simulator Applications Jason Slaughter,Syed (Shawon) and M. Rahman, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 1- 15 DOI : 10.5121/ijcsit.2011.3301 Improving the Character Recognition Efficiency of Feed Forward Bp Neural Network Amit Choudhary and Rahul Rishi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 85-96 DOI : 10.5121/ijcsit.2011.3107 Hybrid GPS-GSM Localization of Automobile Tracking System Mohammad A. Al-Khedher, IJCSIT Journal, Vol 3, No 6, Dec 2011, PP. 75-85 DOI : 10.5121/ijcsit.2011.3606 Dna Lossless Differential Compression Algorithm Based on Similarity of Genomic Sequence Database Heba Afify,Muhammad Islam and Manal Abdel Wahed, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 145-154 DOI : 10.5121/ijcsit.2011.3412 Most Cited Articles - 2010 An Efficient Gait Recognition System for Human Identification using Modified ICA M.Pushpa Rani and G.Arumugam, IJCSIT Journal, Vol 2,no 1,february 2010, PP. 55 - 67 Human Facial Experssion Detection from Detected in Captured Image using Back Propagation Neural Network Jagdish Lal Raheja and Umesh Kumar, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 116 - 123 A Mobility - Based Checkpointing Protocol for Mobile Computing System Suparna Biswas and Sarmistha Neogy, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 135 - 151 A New Dct-Based Watermarking Method For Copyright Protection Of Digital Audio Pranab Kumar Dhar,Mohammad Ibrahim Khan and Saif Ahmad, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 91 – 101 DOI : 10.5121/ijcsit.2010.2507 Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy S.Veeramalai,N.Jaisankar and A.Kannan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 60 - 74 DOI : 10.5121/ijcsit.2010.2406 Performance Evaluation of Routing Protocols in Wireless Sensor Networks Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 64 - 73 DOI : 10.5121/ijcsit.2010.2206 Agent based trust management framework in distributed E-Business environment E.Sathiyamoorthy,N.Ch.Sriman Narayana Iyenger and V.Ramachandran, IJCSIT Journal, vol 2, no 2, feb 2010, PP. 14 - 28 Use of Smart Antennas in Ad Hoc Networks Mohammed Ali Hussain,P.Suresh Varma,K. Satya Rajesh,Hussain Basha Pathan and Leela Madhav Sarraju, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 47 - 54 DOI : 10.5121/ijcsit.2010.2605
  • 3. An Optimized Distributed Association Rule Mining Algorithm In Parallel and Distributed Data Mining With Xml Data for Improved Response Time Sujni Paul, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 88 - 101 DOI : 10.5121/ijcsit.2010.2208 Performance Analysis of Multimedia Compression Algorithms Eman Abdelfattah and Asif Mohiuddin, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 1-10 DOI : 10.5121/ijcsit.2010.2501 A Survey of Qos Routing Protocols for Mobile Ad Hoc Networks G. Santhi and Alamelu Nachiappan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 125-136 DOI : 10.5121/ijcsit.2010.2411 Some Observations on Open Source Software Development on Software Engineering Perspectives Vinay Tiwari, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 113-125 DOI : 10.5121/ijcsit.2010.2611 M-Learning: A New Paradigm of Learning Mathematics in Malaysia Saipunidzam Mahamad,Mohammad Noor Ibrahim and Shakirah Mohd Taib, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 76-86 DOI : 10.5121/ijcsit.2010.2407 Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm Sandeep Singh Rawat and Lakshmi Rajamani, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 28-37 DOI : 10.5121/ijcsit.2010.2403 Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms Rahmat Widia Sembiring,Jasni Mohamad Zain and Abdullah Embong, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 162-170 DOI : 10.5121/ijcsit.2010.2414 An Applied Study On Educational Use Of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication Murat Kayri and Ozlem Cakır, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 48,58 DOI : 10.5121/ijcsit.2010.2405 Low Power Shift and Add Multiplier Design C.N.Marimuthu,P.Thangaraj and Aswathy Ramesan, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 12,22 DOI : 10.5121/ijcsit.2010.2302 Mining Target-Oriented Sequential Patterns With Time-Intervals Hao-En Chueh, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 113-123 DOI : 10.5121/ijcsit.2010.2410 Implementing Evaluation a Wireless body sensor system for automated physiological data acquition at home Chao Chen and Carlos Pomalaza-Raez, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 24-38 DOI : 10.5121/ijcsit.2010.2303 Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues Md.Headayetullah and G.K.Pradhan, IJCSIT Journal, Volume 2, Number 3, June 2010 , PP. 72- 91 DOI : 10.5121/ijcsit.2010.2306
  • 4. Most Cited Articles - 2009 Thesaurus and Query Expansion Hazra Imran and Aditi Sharan, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 89 - 97 Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach A.Revathi,R.Ganapathy and Y.Venkataramani, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 30 - 42 Analysis On Deployment Cost And Network Performance for Heterogeneous Wireless Sensor Networks Dilip Kumar,Trilok.C Aseri and R.B Patel, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 109 - 120 Ensemble Design for Intrusion Detection Systems T. Subbulakshmi,A. Ramamoorthi and S.Mercy Shalinie, IJCSIT Journal, Vol 1, No 1, August 2009, PP. 1-9 AIRCC Publishing Corporation www.airccse.org