archive-org.com » ORG » I » IJORCS.ORG

Total: 231

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • IJORCS - International Journal of Computer Science | Computer Science Journals | Research Journals India
    an international repute is a notable and distinguish platform to publish quality research papers IJORCS is a repository of materials besides providing a platform for the reinforcement of science fast operative publication results of scientific researches and representation of the scientific conception of the society IJORCS is a purely Computer Science research journal and is acknowledged by various universities and international professional bodies Read More Indexed By Search Track Recent Publications A Comparative Analysis of Sybil Attacks on VANET Multimodal Image Retrieval Based on Query Weighting Advancements in Question Answering Systems Towards Indic Languages Narrative Science Systems A Review Using the Theory of Planned Behavior to Determine the Social Network Usage Behavior in Saudi Arabia Computed Science to Economy Conversion for Better Farming and Forestry Head and Hand Detection using Kinect Camera 360 The Effect of using Facebook Markup Language FBML for Designing an E Learning Model in Higher Education Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections Enhancement of DES Algorithm with Multi State Logic Interviews Elham Nikookar University of Tehran Iran Latest News CFP IJORCS Vol 5 Issue 2 Volume 5 Issue 1 Manuscripts IJORCS Volume 4 Issue 6 Manuscripts IJORCS Volume 4 Issue 5

    Original URL path: http://www.ijorcs.org/ (2016-05-01)
    Open archived version from archive


  • IJORCS - Aim and Scope of IJORCS | Topics Coverage| Publishing Papers in Journals | International Journal of Research in Computer Science
    from industry as well as the academic world are welcome to submit their complete unpublished manuscripts which are not under review in any other conference or journal in the following but not limited to topic areas Proposals for Special issues on currently active areas of research are also encouraged by IJORCS To sumbit a manuscript in IJORCS visit Submit Paper Topics Ad Hoc Sensor Network Ad hoc networks for pervasive communications Adaptive autonomic and context aware computing Advanced Computing Architectures and New Programming Models Algorithms Design and Analysis Agent based middleware Autonomic and self managing middleware B2B and B2C management BIGP Border Interior Gateway Protocol BioInformatics Biometrics Bio Medicine Biotechnology Boundary between Hardware and Software Broadband and intelligent networks Broadband wireless technologies Cloud Computing and Applications Cloud Computing and Cloud based Deployments Collaborative applications Communication architectures for pervasive computing Communication systems Complex Mechanisms Computational intelligence Computer and microprocessor based control Computer Architecture and Embedded Systems Computer Business Computer Industry Computer Network Protocols and Routers computer Security Computer Vision Computer based information systems in health care Computing Ethics Context awareness and middleware Cross layer design and Physical layer based issue Cryptography Data Base Management Data Mining Data Retrieval Decision making Digital Economy and Digital Divide Digital signal processing theory Distributed Sensor Networks E Business E Commerce E Government Emerging signal processing areas Enabling technologies for pervasive systems e g wireless BAN PAN Encryption Energy efficient and green pervasive computing Event based publish subscribe and message oriented middleware Evolutionary computing and intelligent systems Expert approaches Fuzzy algorithms Fuzzy logics GPS and location based applications Green Computing Grid Networking Healthcare Management Information Technology Human Computer Interaction HCI Image analysis and processing Image and multidimensional signal processing Image and Multimedia applications Industrial applications of neural networks Information and data security Information indexing and retrieval Information Management Information processing Information systems and applications Information Technology and their application Instrumentation electronics Intelligent Control System Intelligent sensors and actuators Internet applications and performances Internet Services and Applications Internet Technologies Infrastructure Services Applications Interworking architecture and interoperability Knowledge based systems Knowledge management Location Based Services Machine Learning Logic Programming Management information systems Medical imaging Micro nano technology Middleware Issues Middleware services and agent technologies Mobile and Wireless Networks Mobile Computing and Applications Mobile networks and services Multimedia Communications Multimodal sensing and context for pervasive applications Multisensor fusion Natural Language Processing Network management and services Network Modeling and Simulation Network Performance Protocols Sensors Networking theory and technologies Neural Networks Neuro Fuzzy and applications Neuroscience NoSQL and Polyglot persistence Open Models and Architectures Open Source Tools OpenWeb Technologies Operations research Optical Networks Optimizations in Programming Languages and their Constructs Parallel Processing and Multi core CPU s Pattern Recognition Peer to Peer and Overlay Networks Perception and semantic interpretation Pervasive Computing Performance optimization Positioning and tracking technologies Programming paradigms for pervasive systems Quality of Service and Quality of Experience Real time computer control Real time information systems Real time multimedia signal processing Reconfigurable adaptable and reflective middleware approaches Remote Sensing Representation

    Original URL path: http://www.ijorcs.org/scope (2016-05-01)
    Open archived version from archive

  • Submit Paper
    Based on Length of English Text using DES and attacks Studies on the Production of Rhamnolipids by Pseudomonas Putida Privacy Preserving MFI Based Similarity Measure for Hierarchical Document Clustering BIGP A New Single Protocol that can work as an IGP Interior Gateway Protocol as well as EGP Exterior Gateway Protocol A Novel Statistical Method for Thermostable Protein Discrimination An analysis of the methods employed for breast cancer diagnosis Max Min

    Original URL path: http://www.ijorcs.org/submit-paper (2016-05-01)
    Open archived version from archive

  • IJORCS - Author Guidelines
    made available online to download in our Publication Archive Transfer copyright of articles to IJORCS will ensure the widest possible dissemination of information An E publication Certificate will be awarded to each author View IJORCS eCertificate Sample IJORCS Official List of Authors who published in IJORCS Submit your paper using the paper submission form available here TYPES OF CONTRIBUTIONS The journal accepts the following types of contributions Original research articles Survey Review articles providing a comprehensive review on a scientific topic Fast Communications Short self contained articles on ongoing research or reporting interesting possibly tentative ideas or comments on previously published research papers Technical Notes Thesis PAPER SUBMISSION GUIDELINES The submitted papers MUST be written in English double column pages and SHOULD follow the IJORCS paper template Up to five 5 additional pages are permitted if the authors are willing to pay for the over length charge at the time of publication Submissions must include a title abstract keywords author s and affiliation s email address es Please indicate the corresponding author Authors submitting a revised manuscript need to outline separately the response to the reviewers comments including changes introduced to the manuscript There will be a publication charge for an accepted paper see Publication Fees for more information Final Paper Submission Each final paper should be in IJORCS Format with doc docx otd extension submitted through our Submission Form and after its acceptance the signed IJORCS Copyright Transfer Form should be submitted to the Editor Recent Publications A Comparative Analysis of Sybil Attacks on VANET Multimodal Image Retrieval Based on Query Weighting Advancements in Question Answering Systems Towards Indic Languages Narrative Science Systems A Review Using the Theory of Planned Behavior to Determine the Social Network Usage Behavior in Saudi Arabia Computed Science to Economy Conversion for Better Farming

    Original URL path: http://www.ijorcs.org/author-guidelines (2016-05-01)
    Open archived version from archive

  • IJORCS - Reviewer Guidelines
    the Call for Papers As a fully peer refereed journal the work when submitted should meet international quality standards Only the papers accepted by the Editorial Board will be published in the journal and so the member s role of the review board is to provide commentary criticism and opinion for those papers that they review Researchers and authors are invited to participate in the peer review process of IJORCS papers if your research interest matches with the themes of Call for Papers The reviewing process can be termed as a double blind process The most important parts of aspect of your review would be the review form Key points here are the written comments that will be transmitted to the author on the form The assessment given should be simple and straightforward depicting the importance of the ideas and or results presented in the paper Your written comments should provide a thorough appraisal of the reported work Reviewers are generally expected to complete their review within a four weeks period If you are unable to review please find a competent alternate reviewer else notify us immediately so that we can pass it on to another IJORCS reviewer Reviews should be constructive and provide feedback to the authors Reviewers are also encouraged to suggest ways to improve the paper even if it is acceptable in its original form The completed review form then should be electronically returned to the IJORCS Managing Editor If you would like to become an IJORCS reviewer register yourself here You will receive an email informing you whether you have been qualified to be part of the IJORCS Reviewers Committee Recent Publications A Comparative Analysis of Sybil Attacks on VANET Multimodal Image Retrieval Based on Query Weighting Advancements in Question Answering Systems Towards Indic Languages Narrative

    Original URL path: http://www.ijorcs.org/reviewer-guidelines (2016-05-01)
    Open archived version from archive

  • IJORCS - Editorial Board
    Head Bhai Maha Singh College of Engineering Muktsar Punjab INDIA Dr Mohammad A Mezher College of Computing Fahad Bin Sultan University Kingdom of SAUDI ARABIA Mr Ricardo Verschueren Software Developer RR Donnelley Gloucestershire UNITED KINGDOM Prof Dr Pinnamaneni Bhanu Prasad Professor of C S E Rajalakshmi Engineering College Chennai INDIA Visiting Scientist Indian Statistical Institute Bangalore INDIA Vision Specialist Matrix vision GmbH GERMANY Mr Aws Naser Jaber National Advanced IPv6 Centre NAv6 School of Computer and Mathematical Sciences Building Universiti Sains Penang MALAYSIA Prof Dwijendra Gupta Professor and Former Chair of Biochemistry Coordinator Chair Center of Bioinformatics Institute of Interdisciplinary Studies University of Allahabad Allahabad INDIA Visiting Professor University of Bologna ITALY Prof S P Ghrera Head of Department Associate professor Computer Science Engineering and Information Technology Jaypee University of Information Technology Waknaghat INDIA Prof Dr Arun Sharma Head Department of Computer Science and Engineering Krishna Institute of Engineering and Technology Ghaziabad INDIA Mr Arunabh Chattopadhyay Department of Mechanical Aerospace Engineering University of California Los Angeles USA Mr Mohammad Nasiruddin Research Assistant Laboratoire d Informatique de Grenoble Université de Grenoble Grenoble FRANCE Mr Nitin Bhatia Computer Science Engineering Department DAV College Jalandhar INDIA Dr Roohie Naaz Mir Head Department of Computer Science Engineering National Institute of Technology Srinagar INDIA Mr Ahmed Farouk Metwaly Senior Computer Sciences IT Department Etisalat College of Engineering Sharjah UAE Mr Hassen Mohammed Abduallah Alsafi Department of Computer Science DCS Faculty of Information and Communication Technology KICT International Islamic University Malaysia IIUM Selangor MALAYSIA Dr P Raviraj Professor Head Department of CSE Kalaignar Karunanidhi Institute of Technology Coimbatore Tamil Nadu INDIA Mr Nishchay Bahl Head PG Department of Computer Science DAV College Jalandhar Punjab INDIA Mr Saroj Kumar Biswas Department of Computer Science Engineering National Institute of Technology Silchar Assam INDIA Mr Vishrut Sharma Associate Software Engineer Compliance Audit Business Continuity Team Accenture Services Pvt Ltd Bangalore Karnataka INDIA Ms Prabhjot Kaur Reader Guru Gobind Singh Indraprastha University Delhi INDIA Mr Taha Mokfi Department of Industrial Engineering Islamic Azad University South Tehran Branch IRAN Mr Prasenjit Chatterjee Dept of Mechanical Engineering MCKV Institute of Engineering West Bengal INDIA Mr Pudaruth Sameerchand Computer Science and Information Systems University of Mauritius MAURITIUS Dr V Baby Deepa Controller of Examinations Head Department of Software Engineering M Kumarasamy College of Engineering Autonomous Karur Tamil Nadu INDIA Mr Ibrahim Kucukkoc Research Assistant Department of Industrial Engineering Balikesir University Balıkesir TURKEY Mr Amit Chauhan Department of Computer Science Engineering Babaria Institute of Technology Vadodara INDIA Mr Sumit Goyal Senior Research Fellow SRF National Dairy Research Institute Indian Council of Agricultural Research Karnal Haryana INDIA Mr Nilesh J Uke Information Technology Department Sinhgad College of Engineering Pune INDIA Mr Anuj Kumar Gupta Associate Professor CSE Department RIMT Institute of Engineering Technology Mandi Gobindgarh Punjab INDIA Mr Vikas Wasson Computer Science Engineering Department Institute of Engineering Technology Chandigarh INDIA Mr Rajkumar Viral Alternate Hydro Energy Center Indian Institute of Technology Roorkee Roorkee Uttrakhand INDIA Ms Nidhi Arora U V Patel College of Engineering Ganpat

    Original URL path: http://www.ijorcs.org/editorial-board (2016-05-01)
    Open archived version from archive

  • IJORCS - Call for Reviewers
    Review Using the Theory of Planned Behavior to Determine the Social Network Usage Behavior in Saudi Arabia Computed Science to Economy Conversion for Better Farming and Forestry Head and Hand Detection using Kinect Camera 360 The Effect of using Facebook Markup Language FBML for Designing an E Learning Model in Higher Education Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections Enhancement of DES Algorithm with Multi State

    Original URL path: http://www.ijorcs.org/call-for-reviewers (2016-05-01)
    Open archived version from archive

  • IJORCS Archive
    proposes a simple useful and cost effective solution for crime mapping Google cloud resources like satellit Read More Optimal location of Multi types of FACTS devices using Genetic algorithm The problem of improving the voltage profile and reducing power loss in electrical networks is a task that must be solved in an optimal manner Therefore placement of FACTS devices in suitable location can lead to control in line flow and maintain bus voltages in desired level and reducing losses i Read More Modified Approach of Hough Transform for Skew Detection and Correction in Documented Images In optical character recognition and document image analysis skew is introduced in coming documented image Which degrade the performance of OCR and image analysis system so to detection and correction of skew angle is important step of preprocessing of document analysis Many methods have been prop Read More ROI Segmentation for Feature Extraction from Human Facial Images Human Computer Interaction HCI is the biggest goal of computer vision researchers Features form the different facial images are able to provide a very deep knowledge about the activities performed by the different facial movements In this paper we presented a technique for feature extraction fro Read More A Comparative Study of Recent Ontology Visualization Tools with a Case of Diabetes Data Ontology is a conceptualization of a domain into machine readable format Ontologies are becoming increasingly popular modelling schemas for knowledge management services and applications Focus on developing tools to graphically visualise ontologies is rising to aid their assessment and analysis G Read More A Novel Approach to Genetic Algorithm based Cryptography Cryptography is immensely essential ingredient of network security Public Key Cryptography one of the most important forms of cryptography requires the key to be unique and non repeating There are two ways of producing the key One is rigorous mathematically strong algorithmic approach like AES Read More A Comparison of Computation Techniques for DNA Sequence Comparison This Project shows a comparison survey done on DNA sequence comparison techniques The various techniques implemented are sequential comparison multithreading on a single computer and multithreading using parallel processing This Project shows the issues involved in implementing a dynamic programm Read More Ontology Mapping for Dynamic Multiagent Environment Ontologies are essential for the realization of the Semantic Web which in turn relies on the ability of systems to identify and exploit relationships that exist between and within ontologies As ontologies can be used to represent different domains there is a high need for efficient ontology matc Read More A Randomized Load Balancing Algorithm IN GRID USING MAX MIN PSO Algorithm Grid computing is a new paradigm for next generation computing it enables the sharing and selection of geographically distributed heterogeneous resources for solving large scale problems in science and engineering Grid computing does require special software that is unique to the computing project Read More Max Min Fair Scheduling Algorithm Using In Grid Scheduling With Load Balancing This paper shows the importance of fair scheduling in grid environment such that all the tasks get equal amount of time for their execution such that it will not lead to starvation The load balancing of the available resources in the computational grid is another important factor This paper consid Read More An analysis of the methods employed for breast cancer diagnosis Breast cancer research over the last decade has been tremendous The ground breaking innovations and novel methods help in the early detection in setting the stages of the therapy and in assessing the response of the patient to the treatment The prediction of the recurrent cancer is also crucial f Read More Issue 4 Analysis of Handoff Techniques used for Hybrid Networks Cellular WLAN Most real life networks are hybrid networks A hybrid network combines the best features of two or more networks In networking terminology a hybrid network according to Information Technology control and Audit are reliable and versatile They provide large numbers of connections and data tra Read More A Novel Statistical Method for Thermostable Protein Discrimination In this study we used features that can be extracted from protein sequences to discriminate mesophilic thermophilic and hyper thermophilic proteins Amino acid frequency dipeptide amino acid frequency and physical chemical features are used in this study The effect of mentioned features on propo Read More BIGP A New Single Protocol that can work as an IGP Interior Gateway Protocol as well as EGP Exterior Gateway Protocol EGP and IGP are the key components of the present internet infrastructure Routers in a domain forward IP packet within and between domains Each domain uses an intra domain routing protocol known as Interior Gateway Protocol IGP like IS IS OSPF RIP etc to populate the routing tables of its rout Read More Privacy Preserving MFI Based Similarity Measure for Hierarchical Document Clustering The increasing nature of World Wide Web has imposed great challenges for researchers in improving the search efficiency over the internet Now days web document clustering has become an important research topic to provide most relevant documents in huge volumes of results returned in response to a s Read More Studies on the Production of Rhamnolipids by Pseudomonas Putida Rhamnolipid as a potent natural biosurfactant has a wide range of potential applications including enhanced oil recovery biodegradation and bioremediation Observation of tensio active indicated that biosurfactants were produced by the newly isolated and promising strain Pseudomonas putida The b Read More A Data Hiding Techniques Based on Length of English Text using DES and attacks The comparing recent proposal for multimedia applications network security remains an important topic for researchers The security deals with both wired and wireless communication Network is defined as it is a large system consisting of many similar parts that are connected together to allow the m Read More A Survey on Clustering Techniques for Wireless Sensor Network Wireless sensor networks have been used in various fields like battle feilds surveillance schools colleges etc It has been used in our day to day life Its growth increases day by day Sensor node normally senses the physical event from the environment such as temperature sound vibration pre Read More Texture Classification Based on Gabor Wavelets This paper presents the comparison of Texture classification algorithms based on Gabor Wavelets The focus of this paper is on feature extraction scheme for texture classification The texture feature for an image can be classified using texture descriptors In this paper we have used Homogeneous te Read More A Study and Comparative Analysis of Conditional Random Fields for Intrusion Detection Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research Due to complex and dynamic nature of computer ne Read More Issue 5 A Robust Cryptographic System using Neighborhood Generated Keys The ability to hide information from unauthorized individuals has been a prevalent issue over the years Countless algorithms such as DES AES and SHA have been developed These algorithms depend on varying key length and key management strategies to encrypt and decrypt messages The size of the enc Read More Development of an E Learning System Incorporating Semantic Web E Learning is efficient task relevant and just in time learning grown from the learning requirements of the new and dynamically changing world The term Semantic Web covers the steps to create a new WWW architecture that augments the content with formal semantics enabling better possibilities Read More Study of Influencing Factors of Tender Evaluation An Evidential Reasoning Approach Selection of tender is a multi criteria decision making process in which project performance is influenced by time cost and quality The appropriate tender selection can ensure a smooth delivery process and eliminate several complexities during construction In this paper the evidential reasoning Read More A Threshold Secure Data Sharing Scheme for Federated Clouds Cloud computing allows users to view computing in a new direction as it uses the existing technologies to provide better IT services at low cost To offer high QOS to customers according SLA cloud services broker or cloud service provider uses individual cloud providers that work collaboratively t Read More Academic Talent Model Based on Human Resource Data Mart In higher education such as university academic is becoming major asset The performance of academic has become a yardstick of university performance Therefore it s important to know the talent of academicians in their university so that the management can plan for enhancing the academic talent u Read More A Comparative Study of Image Compression Algorithms Digital images in their uncompressed form require an enormous amount of storage capacity Such uncompressed data needs large transmission bandwidth for the transmission over the network Discrete Cosine Transform DCT is one of the widely used image compression method and the Discrete Wavelet Trans Read More Secure Electronic Lock using PIC 16f628a Microcontroller The proposed system implements an electronic embedded lock that provides a great benefit over a traditional lock which uses only a manual key If in case the key is lost or stolen then anyone can open the lock using the key On the other hand losing a long and complex password or getting it stole Read More Issue 6 A Conceptual Model for Ontology Based Learning Utilizing learning features by many fields like education artificial intelligence and multi agent systems leads to generation of various definitions for this concept In this article these field s significant definitions for learning will be presented and their key concepts in each field will Read More Ontology Based Information Extraction for Disease Intelligence Disease Intelligence DI is based on the acquisition and aggregation of fragmented knowledge of diseases at multiple sources all over the world to provide valuable information to doctors researchers and information seeking community Some diseases have their own characteristics changed rapidly at Read More Can Feature be used to Model the Changing Access Control Policies Access control policies ACPs regulate the access to data and resources in information systems These ACPs are framed from the functional requirements and the Organizational security privacy policies It was found to be beneficial when the ACPs are included in the early phases of the software de Read More Commentz Walter Any Better than Aho Corasick for Peptide Identification An algorithm for locating all occurrences of a finite number of keywords in an arbitrary string also known as multiple strings matching is commonly required in information retrieval such as sequence analysis evolutionary biological studies gene protein identification and network intrusion detec Read More Volume 3 Issue 1 Ant Colony with Colored Pheromones Routing for Multi Objectives Quality of Services in WSNs In this article we present a new Ant routing algorithm with colored pheromones and clustering techniques for satisfying users Quality of Service QoS requirements in Wireless Sensor Networks WSNs An important problem is to detect the best route from a source node to the destination node Mor Read More Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Network Prediction of Atmospheric Pressure is one important and challenging task that needs lot of attention and study for analyzing atmospheric conditions Advent of digital computers and development of data driven artificial intelligence approaches like Artificial Neural Networks ANN have helped in nume Read More From Physical to Virtual Wireless Sensor Networks using Cloud Computing In the modern world billions of physical sensors are used for various dedications Environment Monitoring Healthcare Education Defense Manufacturing Smart Home Agriculture Precision and others Nonetheless they are frequently utilized by their own applications and thereby snubbing the signif Read More Design a New Image Encryption using Fuzzy Integral Permutation with Coupled Chaotic Maps This article introduces a novel image encryption algorithm based on DNA addition combining and coupled two dimensional piecewise nonlinear chaotic map This algorithm consists of two parts In the first part of the algorithm a DNA sequence matrix is obtained by encoding each color component and is Read More Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks In HMIPv6 Networks most of the existing handoff decision mechanisms deal mainly with the selection of Mobility Anchor Point MAP ignoring the selection of access router AR under each MAP In this paper we propose a new mechanism called Dynamic MAP and Diffserv based ARs selection for Handof Read More Issue 2 A PSO Based Subtractive Data Clustering Algorithm There is a tremendous proliferation in the amount of information available on the largest shared information source the World Wide Web Fast and high quality clustering algorithms play an important role in helping users to effectively navigate summarize and organize the information Recent studie Read More An Enhanced Framework for Improving Spatio Temporal Queries for Global Positioning Systems To efficiently process continuous spatio temporal queries we need to efficiently and effectively handle large number of moving objects and continuous updates on these queries In this paper we propose a framework that employs a new indexing algorithm that is built on top of SQL Server 2008 and avo Read More Issue 3 The Design of Cognitive Social Simulation Framework using Statistical Methodology in the Domain of Academic Science Modeling the behavior of the cognitive architecture in the context of social simulation using statistical methodologies is currently a growing research area Normally a cognitive architecture for an intelligent agent involves artificial computational process which exemplifies theories of cognition Read More An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System Due to the restriction of designing faster and faster computers one has to find the ways to maximize the performance of the available hardware A distributed system consists of several autonomous nodes where some nodes are busy with processing while some nodes are idle without any processing To Read More Improving the Efficiency of Spectral Subtraction Method by combining it with Wavelet Thresholding Technique In the field of speech signal processing Spectral subtraction method SSM has been successfully implemented to suppress the noise that is added acoustically SSM does reduce the noise at satisfactory level but musical noise is a major drawback of this method To implement spectral subtraction meth Read More A Study of Routing Techniques in Intermittently Connected MANETs A Mobile Ad hoc Network MANET is a self configuring infrastructure less network of mobile devices connected by wireless These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network The routing approach in MANET includes mai Read More Issue 4 Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sensor Networks In general nodes in Wireless Sensor Networks WSNs are equipped with limited battery and computation capabilities but the occurrence of congestion consumes more energy and computation power by retransmitting the data packets Thus congestion should be regulated to improve network performance In Read More A Review and Analysis on Mobile Application Development Processes using Agile Methodologies Over a last decade mobile telecommunication industry has observed a rapid growth proved to be highly competitive uncertain and dynamic environment Besides its advancement it has also raised number of questions and gained concern both in industry and research The development process of mobile a Read More Issue 5 Channel Aware Mac Protocol for Maximizing Throughput and Fairness The proper channel utilization and the queue length aware routing protocol is a challenging task in MANET To overcome this drawback we are extending the previous work by improving the MAC protocol to maximize the Throughput and Fairness In this work we are estimating the channel condition and Cont Read More Voice Recognition System using Template Matching It is easy for human to recognize familiar voice but using computer programs to identify a voice when compared with others is a herculean task This is due to the problem that is encountered when developing the algorithm to recognize human voice It is impossible to say a word the same way in two di Read More An Enhancement to Cleanroom Software Engineering using csUnit Tool Clean room software engineering is a technical and managerial process for the development of high quality software for zero defects with certified reliability which combines the correctness verifications and statistical usage testing to certify the software fitness This paper describes the clean Read More Issue 6 A Robust and Adaptable Method for Face Detection Based on Color Probabilistic Estimation Technique Human face perception is currently an active research area in the computer vision community Skin detection is one of the most important and primary stages for this purpose So far many approaches are proposed to done this case Near all of these methods have tried to find best match intensity dist Read More Text Independent Biometric Speaker Recognition System Designing a machine that mimics the human behavior particularly with the capability of responding properly to spoken language has intrigued engineers and scientists for centuries The earlier research work on voice recognition system which is text dependent requires that the user must say exactly Read More Volume 4 Issue 1 LB2CO A Semantic Ontology Framework for B2C eCommerce Transaction on the Internet Business ontology can enhance the successful development of complex enterprise system this is being achieved through knowledge sharing and the ease of communication between every entity in the domain Through human semantic interaction with the web resources machines to interpret the data publishe Read More A Two Level Autonomous Intrusion Detection Model Inspired by the Immune System There are several methods applied to distributed system security which have the same absolute view of the intrusion In their view an operation could be legitimate or intrusive which does not have any consistency with the complicated and heterogeneous nature of distributed systems In this paper Read More Optimized Method for Iranian Road Signs Detection and Recognition System Road sign recognition is one of the core technologies in Intelligent Transport Systems In the current study a robust and real time method is presented to identify and detect the roads speed signs in

    Original URL path: http://www.ijorcs.org/archive (2016-05-01)
    Open archived version from archive



  •