SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal of Computer Science & Information Technology
(IJCSIT)
ISSN:0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
Most Cited Articles - 2012
Embedded Controller for Vehicle in-Front Obstacle Detection and Cabin Safety Alert System
V.Ramya, B. Palaniappan and K. Karthick, IJCSIT Journal, Vol 4, No 2, April 2012, PP. 117-
131 DOI : 10.5121/ijcsit.2012.4210
Most Cited Articles - 2011
Common Phases of Computer Forensics Investigation Models
Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, IJCSIT Journal, Vol 3, No 3, June 2011,
PP. 17 – 31 DOI : 10.5121/ijcsit.2011.3302
Plants Images Classification Based on Textural Features using Combined Classifier
M. Z. Rashad,B.S.el-Desouky,Manal and S .Khawasik, IJCSIT Journal, Vol 3, No 4, August
2011, PP. 93 – 100 DOI : 10.5121/ijcsit.2011.3407
Php Framework for Database Management Based on Mvc Pattern
Chanchai Supaartagorn, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 251 - 258
DOI : 10.5121/ijcsit.2011.3219
Wavelet Based Spectrum Sensing Techniques for Cognitive Radio – A Survey
Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, IJCSIT Journal, Vol 3, No 2, April
2011, PP. 123 – 137 DOI : 10.5121/ijcsit.2011.3209
Research Review for Digital Image Segmentation Techniques
Ashraf A. Aly,Safaai Bin Deris and Nazar Zaki, IJCSIT Journal, Vol 3, No 5, Oct 2011, PP. 99-
106 DOI : 10.5121/ijcsit.2011.3509
Machine Learning Methods for Spam E-Mail Classification
W.A. Awad and S.M. ELseuofi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 174-184
Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural
Network
Al Mutaz M. Abdalla, Safaai Dress and Nazar Zaki, IJCSIT Journal, Vol 3, No 3, June 2011, PP.
176,186 DOI : 10.5121/ijcsit.2011.3312
Performance Analysis of Various Data Mining Classification Techniques on Healthcare Data
Shelly Gupta,Dharminder Kumar and Anand Sharma, IJCSIT Journal, Vol 3, No 4, August 2011,
PP. 155-169 DOI : 10.5121/ijcsit.2011.3413
Focused Web Crawling Using Decay Concept and Genetic Programming
Mahdi Bazarganigilani, Ali Syed and Sandid Burki Vol.1, No.1, January 2011, PP. 1-12
Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural
Network
J.Pradeep,E.Srinivasan and S.Himavathi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 27-38
DOI : 10.5121/ijcsit.2011.3103
A Comparative Experiment of Several Shape Methods in Recognizing Plants
A. Kadir,L.E.NugrohoA.Susanto and P.I.Santosa, IJCSIT Journal, Vol 3, No 3, June 2011, PP.
256-263 DOI : 10.5121/ijcsit.2011.3318
Ubiquitous Mobile Health Monitoring System for Elderly (Umhmse)
Abderrahim Bourouis,Mohamed Feham and Abdelhamid Bouchachia, IJCSIT Journal, Vol 3, No
3, June 2011, PP. 74-82 DOI : 10.5121/ijcsit.2011.3306
Information Security Plan for Flight Simulator Applications
Jason Slaughter,Syed (Shawon) and M. Rahman, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 1-
15 DOI : 10.5121/ijcsit.2011.3301
Improving the Character Recognition Efficiency of Feed Forward Bp Neural Network
Amit Choudhary and Rahul Rishi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 85-96
DOI : 10.5121/ijcsit.2011.3107
Hybrid GPS-GSM Localization of Automobile Tracking System
Mohammad A. Al-Khedher, IJCSIT Journal, Vol 3, No 6, Dec 2011, PP. 75-85
DOI : 10.5121/ijcsit.2011.3606
Dna Lossless Differential Compression Algorithm Based on Similarity of Genomic Sequence
Database
Heba Afify,Muhammad Islam and Manal Abdel Wahed, IJCSIT Journal, Vol 3, No 4, August
2011, PP. 145-154 DOI : 10.5121/ijcsit.2011.3412
Most Cited Articles - 2010
An Efficient Gait Recognition System for Human Identification using Modified ICA
M.Pushpa Rani and G.Arumugam, IJCSIT Journal, Vol 2,no 1,february 2010, PP. 55 - 67
Human Facial Experssion Detection from Detected in Captured Image using Back Propagation
Neural Network
Jagdish Lal Raheja and Umesh Kumar, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 116 - 123
A Mobility - Based Checkpointing Protocol for Mobile Computing System
Suparna Biswas and Sarmistha Neogy, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 135 - 151
A New Dct-Based Watermarking Method For Copyright Protection Of Digital Audio
Pranab Kumar Dhar,Mohammad Ibrahim Khan and Saif Ahmad, IJCSIT Journal, Vol.2, No.5,
October 2010, PP. 91 – 101 DOI : 10.5121/ijcsit.2010.2507
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy
S.Veeramalai,N.Jaisankar and A.Kannan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 60 - 74
DOI : 10.5121/ijcsit.2010.2406
Performance Evaluation of Routing Protocols in Wireless Sensor Networks
Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, IJCSIT
Journal, Volume 2, Number 2, April 2010, PP. 64 - 73 DOI : 10.5121/ijcsit.2010.2206
Agent based trust management framework in distributed E-Business environment
E.Sathiyamoorthy,N.Ch.Sriman Narayana Iyenger and V.Ramachandran, IJCSIT Journal, vol 2,
no 2, feb 2010, PP. 14 - 28
Use of Smart Antennas in Ad Hoc Networks
Mohammed Ali Hussain,P.Suresh Varma,K. Satya Rajesh,Hussain Basha Pathan and Leela
Madhav Sarraju, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 47 - 54
DOI : 10.5121/ijcsit.2010.2605
An Optimized Distributed Association Rule Mining Algorithm In Parallel and Distributed Data
Mining With Xml Data for Improved Response Time
Sujni Paul, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 88 - 101
DOI : 10.5121/ijcsit.2010.2208
Performance Analysis of Multimedia Compression Algorithms
Eman Abdelfattah and Asif Mohiuddin, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 1-10
DOI : 10.5121/ijcsit.2010.2501
A Survey of Qos Routing Protocols for Mobile Ad Hoc Networks
G. Santhi and Alamelu Nachiappan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 125-136
DOI : 10.5121/ijcsit.2010.2411
Some Observations on Open Source Software Development on Software Engineering
Perspectives
Vinay Tiwari, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 113-125
DOI : 10.5121/ijcsit.2010.2611
M-Learning: A New Paradigm of Learning Mathematics in Malaysia
Saipunidzam Mahamad,Mohammad Noor Ibrahim and Shakirah Mohd Taib, IJCSIT Journal,
Vol.2, No.4, August 2010, PP. 76-86 DOI : 10.5121/ijcsit.2010.2407
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm
Sandeep Singh Rawat and Lakshmi Rajamani, IJCSIT Journal, Vol.2, No.4, August 2010, PP.
28-37 DOI : 10.5121/ijcsit.2010.2403
Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms
Rahmat Widia Sembiring,Jasni Mohamad Zain and Abdullah Embong, IJCSIT Journal, Vol.2,
No.4, August 2010, PP. 162-170 DOI : 10.5121/ijcsit.2010.2414
An Applied Study On Educational Use Of Facebook as a Web 2.0 Tool: The Sample Lesson of
Computer Networks and Communication
Murat Kayri and Ozlem Cakır, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 48,58
DOI : 10.5121/ijcsit.2010.2405
Low Power Shift and Add Multiplier Design
C.N.Marimuthu,P.Thangaraj and Aswathy Ramesan, IJCSIT Journal, Volume 2, Number 3, June
2010, PP. 12,22 DOI : 10.5121/ijcsit.2010.2302
Mining Target-Oriented Sequential Patterns With Time-Intervals
Hao-En Chueh, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 113-123
DOI : 10.5121/ijcsit.2010.2410
Implementing Evaluation a Wireless body sensor system for automated physiological data
acquition at home
Chao Chen and Carlos Pomalaza-Raez, IJCSIT Journal, Volume 2, Number 3, June 2010, PP.
24-38
DOI : 10.5121/ijcsit.2010.2303
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government
Key Issues
Md.Headayetullah and G.K.Pradhan, IJCSIT Journal, Volume 2, Number 3, June 2010 , PP. 72-
91 DOI : 10.5121/ijcsit.2010.2306
Most Cited Articles - 2009
Thesaurus and Query Expansion
Hazra Imran and Aditi Sharan, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 89 - 97
Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using
Iterative Clustering Approach
A.Revathi,R.Ganapathy and Y.Venkataramani, IJCSIT Journal, Vol 1, No 2, November 2009,
PP. 30 - 42
Analysis On Deployment Cost And Network Performance for Heterogeneous Wireless Sensor
Networks
Dilip Kumar,Trilok.C Aseri and R.B Patel, IJCSIT Journal, Vol 1, No 2, November 2009, PP.
109 - 120
Ensemble Design for Intrusion Detection Systems
T. Subbulakshmi,A. Ramamoorthi and S.Mercy Shalinie, IJCSIT Journal, Vol 1, No 1, August
2009, PP. 1-9
AIRCC Publishing Corporation
www.airccse.org

Contenu connexe

Tendances

CV_Salim_August-2016
CV_Salim_August-2016CV_Salim_August-2016
CV_Salim_August-2016
SALIM ISTYAQ
 

Tendances (20)

Ijasuc(most cited articles)
Ijasuc(most  cited articles)Ijasuc(most  cited articles)
Ijasuc(most cited articles)
 
Top 1 cited paper cybernetics (ijci)
Top 1 cited paper cybernetics (ijci)Top 1 cited paper cybernetics (ijci)
Top 1 cited paper cybernetics (ijci)
 
CC NEW
CC NEWCC NEW
CC NEW
 
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket ShotsShot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
Shot-Net: A Convolutional Neural Network for Classifying Different Cricket Shots
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
Ijdms(most cited articles)
Ijdms(most cited articles)Ijdms(most cited articles)
Ijdms(most cited articles)
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
Smart information desk system with voice assistant for universities
Smart information desk system with voice assistant for universities Smart information desk system with voice assistant for universities
Smart information desk system with voice assistant for universities
 
P1151517372
P1151517372P1151517372
P1151517372
 
Dr Khdour CV
Dr Khdour CVDr Khdour CV
Dr Khdour CV
 
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...
 
RESUME_Prakash
RESUME_PrakashRESUME_Prakash
RESUME_Prakash
 
CV_Salim_August-2016
CV_Salim_August-2016CV_Salim_August-2016
CV_Salim_August-2016
 
Aisi2016 technical program
Aisi2016  technical programAisi2016  technical program
Aisi2016 technical program
 
DrE.N.Ganesh_recent resume
DrE.N.Ganesh_recent resumeDrE.N.Ganesh_recent resume
DrE.N.Ganesh_recent resume
 
QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
 QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM  QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
QUALITY IDENTIFICATION OF ENDEMIC PAGARALAM SALAK FRUIT USING EXPERT SYSTEM
 
Lastresume
LastresumeLastresume
Lastresume
 
Research Agility spring 2021
Research Agility spring 2021Research Agility spring 2021
Research Agility spring 2021
 
Multiple object detection report
Multiple object detection reportMultiple object detection report
Multiple object detection report
 

En vedette

Top 7 lawyer interview questions answers
Top 7 lawyer interview questions answersTop 7 lawyer interview questions answers
Top 7 lawyer interview questions answers
job-interview-questions
 
Webviewr keek
Webviewr keekWebviewr keek
Webviewr keek
mandy365
 
Website to get keek followers free
Website to get keek followers freeWebsite to get keek followers free
Website to get keek followers free
mandy365
 
Website get more followers keek free
Website get more followers keek freeWebsite get more followers keek free
Website get more followers keek free
mandy365
 
Websites to get more keek followers for free
Websites to get more keek followers for freeWebsites to get more keek followers for free
Websites to get more keek followers for free
mandy365
 
Top 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answersTop 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answers
job-interview-questions
 
Top 7 maintenance supervisor interview questions answers
Top 7 maintenance supervisor interview questions answersTop 7 maintenance supervisor interview questions answers
Top 7 maintenance supervisor interview questions answers
job-interview-questions
 
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENTAPPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
ijcsit
 

En vedette (18)

Top 7 lawyer interview questions answers
Top 7 lawyer interview questions answersTop 7 lawyer interview questions answers
Top 7 lawyer interview questions answers
 
Webviewr keek
Webviewr keekWebviewr keek
Webviewr keek
 
Website to get keek followers free
Website to get keek followers freeWebsite to get keek followers free
Website to get keek followers free
 
Website get more followers keek free
Website get more followers keek freeWebsite get more followers keek free
Website get more followers keek free
 
Websites to get more keek followers for free
Websites to get more keek followers for freeWebsites to get more keek followers for free
Websites to get more keek followers for free
 
Innovex
InnovexInnovex
Innovex
 
Top 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answersTop 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answers
 
La Reserva China
La Reserva ChinaLa Reserva China
La Reserva China
 
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
 
YNC presentation
YNC presentationYNC presentation
YNC presentation
 
Top 7 maintenance supervisor interview questions answers
Top 7 maintenance supervisor interview questions answersTop 7 maintenance supervisor interview questions answers
Top 7 maintenance supervisor interview questions answers
 
Building A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.orgBuilding A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.org
 
Molecular Solutions For The Set-Partition Problem On Dna-Based Computing
Molecular Solutions For The Set-Partition Problem On Dna-Based ComputingMolecular Solutions For The Set-Partition Problem On Dna-Based Computing
Molecular Solutions For The Set-Partition Problem On Dna-Based Computing
 
Comparing of switching frequency on vector controlled asynchronous motor
Comparing of switching frequency on vector controlled asynchronous motorComparing of switching frequency on vector controlled asynchronous motor
Comparing of switching frequency on vector controlled asynchronous motor
 
An Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
An Adaptive Framework for Enhancing Recommendation Using Hybrid TechniqueAn Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
An Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
 
Zimasset
ZimassetZimasset
Zimasset
 
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENTAPPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
APPLYING AN ARABIC CONVERSATIONAL AGENT IN THE JORDANIAN E-GOVERNMENT
 
Marketing presentation
Marketing presentation Marketing presentation
Marketing presentation
 

Similaire à Ijcsit(most cited articles)

International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
IJCNCJournal
 

Similaire à Ijcsit(most cited articles) (20)

IJNSA - Most Cited Articles
IJNSA - Most Cited ArticlesIJNSA - Most Cited Articles
IJNSA - Most Cited Articles
 
Ijcses(most cited articles)
Ijcses(most cited articles)Ijcses(most cited articles)
Ijcses(most cited articles)
 
Ijsea
IjseaIjsea
Ijsea
 
Ijaia(most cited article)
Ijaia(most cited article)Ijaia(most cited article)
Ijaia(most cited article)
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
Ijdps(most cited articles)
Ijdps(most cited articles)Ijdps(most cited articles)
Ijdps(most cited articles)
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
 
April 2023-Top Cited Articles in ACII-24.pdf
April 2023-Top Cited Articles in ACII-24.pdfApril 2023-Top Cited Articles in ACII-24.pdf
April 2023-Top Cited Articles in ACII-24.pdf
 
V3 technologies ieee2012
V3 technologies ieee2012V3 technologies ieee2012
V3 technologies ieee2012
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 -
 
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligence
 
June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing  June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing
 
New research articles 2020 october issue international journal of multimedi...
New research articles 2020 october  issue  international journal of multimedi...New research articles 2020 october  issue  international journal of multimedi...
New research articles 2020 october issue international journal of multimedi...
 
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
 
Dr. K. Karibasappa
Dr. K. KaribasappaDr. K. Karibasappa
Dr. K. Karibasappa
 
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...
 
Dynamic_Cluster_Head_CH_Node_Election_an.pdf
Dynamic_Cluster_Head_CH_Node_Election_an.pdfDynamic_Cluster_Head_CH_Node_Election_an.pdf
Dynamic_Cluster_Head_CH_Node_Election_an.pdf
 
Most Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And EngineeringMost Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And Engineering
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Ijcsit(most cited articles)

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) ISSN:0975-3826(online); 0975-4660 (Print) http://airccse.org/journal/ijcsit.html Most Cited Articles - 2012 Embedded Controller for Vehicle in-Front Obstacle Detection and Cabin Safety Alert System V.Ramya, B. Palaniappan and K. Karthick, IJCSIT Journal, Vol 4, No 2, April 2012, PP. 117- 131 DOI : 10.5121/ijcsit.2012.4210 Most Cited Articles - 2011 Common Phases of Computer Forensics Investigation Models Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 17 – 31 DOI : 10.5121/ijcsit.2011.3302 Plants Images Classification Based on Textural Features using Combined Classifier M. Z. Rashad,B.S.el-Desouky,Manal and S .Khawasik, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 93 – 100 DOI : 10.5121/ijcsit.2011.3407 Php Framework for Database Management Based on Mvc Pattern Chanchai Supaartagorn, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 251 - 258 DOI : 10.5121/ijcsit.2011.3219 Wavelet Based Spectrum Sensing Techniques for Cognitive Radio – A Survey Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 123 – 137 DOI : 10.5121/ijcsit.2011.3209 Research Review for Digital Image Segmentation Techniques Ashraf A. Aly,Safaai Bin Deris and Nazar Zaki, IJCSIT Journal, Vol 3, No 5, Oct 2011, PP. 99- 106 DOI : 10.5121/ijcsit.2011.3509 Machine Learning Methods for Spam E-Mail Classification W.A. Awad and S.M. ELseuofi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 174-184 Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network Al Mutaz M. Abdalla, Safaai Dress and Nazar Zaki, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 176,186 DOI : 10.5121/ijcsit.2011.3312 Performance Analysis of Various Data Mining Classification Techniques on Healthcare Data Shelly Gupta,Dharminder Kumar and Anand Sharma, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 155-169 DOI : 10.5121/ijcsit.2011.3413 Focused Web Crawling Using Decay Concept and Genetic Programming Mahdi Bazarganigilani, Ali Syed and Sandid Burki Vol.1, No.1, January 2011, PP. 1-12 Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network J.Pradeep,E.Srinivasan and S.Himavathi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 27-38 DOI : 10.5121/ijcsit.2011.3103
  • 2. A Comparative Experiment of Several Shape Methods in Recognizing Plants A. Kadir,L.E.NugrohoA.Susanto and P.I.Santosa, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 256-263 DOI : 10.5121/ijcsit.2011.3318 Ubiquitous Mobile Health Monitoring System for Elderly (Umhmse) Abderrahim Bourouis,Mohamed Feham and Abdelhamid Bouchachia, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 74-82 DOI : 10.5121/ijcsit.2011.3306 Information Security Plan for Flight Simulator Applications Jason Slaughter,Syed (Shawon) and M. Rahman, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 1- 15 DOI : 10.5121/ijcsit.2011.3301 Improving the Character Recognition Efficiency of Feed Forward Bp Neural Network Amit Choudhary and Rahul Rishi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 85-96 DOI : 10.5121/ijcsit.2011.3107 Hybrid GPS-GSM Localization of Automobile Tracking System Mohammad A. Al-Khedher, IJCSIT Journal, Vol 3, No 6, Dec 2011, PP. 75-85 DOI : 10.5121/ijcsit.2011.3606 Dna Lossless Differential Compression Algorithm Based on Similarity of Genomic Sequence Database Heba Afify,Muhammad Islam and Manal Abdel Wahed, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 145-154 DOI : 10.5121/ijcsit.2011.3412 Most Cited Articles - 2010 An Efficient Gait Recognition System for Human Identification using Modified ICA M.Pushpa Rani and G.Arumugam, IJCSIT Journal, Vol 2,no 1,february 2010, PP. 55 - 67 Human Facial Experssion Detection from Detected in Captured Image using Back Propagation Neural Network Jagdish Lal Raheja and Umesh Kumar, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 116 - 123 A Mobility - Based Checkpointing Protocol for Mobile Computing System Suparna Biswas and Sarmistha Neogy, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 135 - 151 A New Dct-Based Watermarking Method For Copyright Protection Of Digital Audio Pranab Kumar Dhar,Mohammad Ibrahim Khan and Saif Ahmad, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 91 – 101 DOI : 10.5121/ijcsit.2010.2507 Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy S.Veeramalai,N.Jaisankar and A.Kannan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 60 - 74 DOI : 10.5121/ijcsit.2010.2406 Performance Evaluation of Routing Protocols in Wireless Sensor Networks Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 64 - 73 DOI : 10.5121/ijcsit.2010.2206 Agent based trust management framework in distributed E-Business environment E.Sathiyamoorthy,N.Ch.Sriman Narayana Iyenger and V.Ramachandran, IJCSIT Journal, vol 2, no 2, feb 2010, PP. 14 - 28 Use of Smart Antennas in Ad Hoc Networks Mohammed Ali Hussain,P.Suresh Varma,K. Satya Rajesh,Hussain Basha Pathan and Leela Madhav Sarraju, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 47 - 54 DOI : 10.5121/ijcsit.2010.2605
  • 3. An Optimized Distributed Association Rule Mining Algorithm In Parallel and Distributed Data Mining With Xml Data for Improved Response Time Sujni Paul, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 88 - 101 DOI : 10.5121/ijcsit.2010.2208 Performance Analysis of Multimedia Compression Algorithms Eman Abdelfattah and Asif Mohiuddin, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 1-10 DOI : 10.5121/ijcsit.2010.2501 A Survey of Qos Routing Protocols for Mobile Ad Hoc Networks G. Santhi and Alamelu Nachiappan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 125-136 DOI : 10.5121/ijcsit.2010.2411 Some Observations on Open Source Software Development on Software Engineering Perspectives Vinay Tiwari, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 113-125 DOI : 10.5121/ijcsit.2010.2611 M-Learning: A New Paradigm of Learning Mathematics in Malaysia Saipunidzam Mahamad,Mohammad Noor Ibrahim and Shakirah Mohd Taib, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 76-86 DOI : 10.5121/ijcsit.2010.2407 Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm Sandeep Singh Rawat and Lakshmi Rajamani, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 28-37 DOI : 10.5121/ijcsit.2010.2403 Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms Rahmat Widia Sembiring,Jasni Mohamad Zain and Abdullah Embong, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 162-170 DOI : 10.5121/ijcsit.2010.2414 An Applied Study On Educational Use Of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication Murat Kayri and Ozlem Cakır, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 48,58 DOI : 10.5121/ijcsit.2010.2405 Low Power Shift and Add Multiplier Design C.N.Marimuthu,P.Thangaraj and Aswathy Ramesan, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 12,22 DOI : 10.5121/ijcsit.2010.2302 Mining Target-Oriented Sequential Patterns With Time-Intervals Hao-En Chueh, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 113-123 DOI : 10.5121/ijcsit.2010.2410 Implementing Evaluation a Wireless body sensor system for automated physiological data acquition at home Chao Chen and Carlos Pomalaza-Raez, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 24-38 DOI : 10.5121/ijcsit.2010.2303 Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues Md.Headayetullah and G.K.Pradhan, IJCSIT Journal, Volume 2, Number 3, June 2010 , PP. 72- 91 DOI : 10.5121/ijcsit.2010.2306
  • 4. Most Cited Articles - 2009 Thesaurus and Query Expansion Hazra Imran and Aditi Sharan, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 89 - 97 Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach A.Revathi,R.Ganapathy and Y.Venkataramani, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 30 - 42 Analysis On Deployment Cost And Network Performance for Heterogeneous Wireless Sensor Networks Dilip Kumar,Trilok.C Aseri and R.B Patel, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 109 - 120 Ensemble Design for Intrusion Detection Systems T. Subbulakshmi,A. Ramamoorthi and S.Mercy Shalinie, IJCSIT Journal, Vol 1, No 1, August 2009, PP. 1-9 AIRCC Publishing Corporation www.airccse.org