Most Cited Articles

Most Cited Articles – 2017

Data Warehouse and Big Data Integration
Sonia Ordoñez Salinas and Alba Consuelo Nieto Lemus,IJCSIT Journal, Vol 9, No 2, April 2017, PP. 1-17
DOI : 10.5121/ijcsit.2017.9201

An Integrated System Framework for Predicting Students' Academic Performance in Higher Educational Institutions
Olugbenga Adejo and Thomas Connolly, IJCSIT Journal, Vol 9, No 3, June 2017, PP. 149-157
DOI : 10.5121/ijcsit.2017.93013

A Systematic Mapping Study on Current Research Topics in Smart Contracts
Maher Alharby and Aad van Moorsel, IJCSIT Journal, Vol 9, No 5, October 2017, PP. 151-164
DOI : 10.5121/ijcsit.2017.9511

Image encryption techniques using fractal function: a review
Shafali Agarwal, IJCSIT Journal, Vol 9, No 2, April 2017, PP. 53-68
DOI : 10.5121/ijcsit.2017.9205

A Meliorated Kashida - Based Approach for Arabic Text Steganography
Ala'a M. Alhusban and Jehad Q. Odeh Alnihoud, IJCSIT Journal, Vol 9, No 2, April 2017, PP. 99-112
DOI : 10.5121/ijcsit.2017.9209

Environmental monitoring and controlling system for mushroom farm with online interface
Arjuna Marzuki and Soh Yan Ying , IJCSIT Journal, Vol 9, No 4, August 2017, PP. 17-28
DOI : 10.5121/ijcsit.2017.9402

Residual quotient and annihilator of intuitionistic fuzzy sets of ring and module
P.K. Sharma and Gagandeep Kaur, IJCSIT Journal, Vol 9, No 4, August 2017, PP. 1-15
DOI : 10.5121/ijcsit.2017.9401

Raspberry pi and arduino uno working together as a basic meteorological station
José Rafael Cortés León and Ricardo Francisco Martínez-González,Anilú Miranda Medinay and Luis Alberto Peralta-Pelaez, IJCSIT Journal, Vol 9, No 5, October 2017, PP. 97-104
DOI : 10.5121/ijcsit.2017.9508

Multilevel Analysis of Student’s Feedback Using Moodle Logs in Virtual Cloud Environment
Ashok Verma, Sumangla Rathore, Santosh Vishwakarma and Shubham Goswami, IJCSIT Journal, Vol 9, No 5, October 2017, PP. 15-28
DOI : 10.5121/ijcsit.2017.9502

Usability testing of fitness mobile application: case study Aded Surat app
Ryan Alturki and Valerie Gay , IJCSIT Journal, Vol 9, No 5, October 2017, PP. 105-125
DOI : 10.5121/ijcsit.2017.9509

Most Cited Articles – 2016

Stock trend prediction using news sentiment analysis
Kalyani Joshi, Prof. Bharathi H. N., Prof. Jyothi Rao, IJCSIT Journal, Vol 8, No 3, June 2016, PP. 67-76
DOI : 10.5121/ijcsit.2016.8306

Automated test case generation and optimization: a comparative review
Rajesh Kumar Sahoo, Deeptimanta Ojha, Durga Prasad Mohapatra, Manas Ranjan Patra, IJCSIT Journal, Vol 8, No 5, October 2016, PP. 19-32
DOI : 10.5121/ijcsit.2016.8502

Eco-Strategy: Towards a New Generation Managerial Model Based on Green IT and CSR
Rachid Hba, Abderrazak Bakkas, Abdellah El Manouar, Mohammed Abdou Janati Idrissi,IJCSIT Journal, Vol 8, No 2, April 2016, PP. 51-62
DOI : 10.5121/ijcsit.2016.8204

Intrusion detection using feature selection and machine learning algorithm with misuse detection
Harvinder Pal Singh Sasan and Meenakshi Sharma, IJCSIT Journal, Vol 8, No 1, February 2016, PP. 17 -25
DOI : 10.5121/ijcsit.2016.8102

Extracting Arabic relations from the web
Shimaa M. Abd El-salam, Enas M.F. El Houby, A.K. Al sammak and T.A. El-shishtawy, IJCSIT Journal, Vol 8, No 1, February 2016, PP. 85 105
DOI : 10.5121/ijcsit.2016.8107

Amazigh part-of-speech tagging using markov models and decision trees
Samir AMRI, Lahbib ZENKOUAR, Mohamed OUTAHAJALA, IJCSIT Journal, Vol 8, No 5, October 2016, PP. 61 -71
DOI : 10.5121/ijcsit.2016.8505

Examine Website Quality on M-Banking Services Adoption in Bangladesh
Mohammad Abdullah Mahfuz, Liza Khanam and Wang Hu, IJCSIT Journal, Vol 8, No 2, April 2016, PP. 33 -50
DOI : 10.5121/ijcsit.2016.8203

The Importance of Neutral Class in Sentiment Analysis of Arabic Tweets
Hamed AL-Rubaiee, Renxi Qiu, and Dayou Li, IJCSIT Journal, Vol 8, No 2, April 2016, PP. 17 -31
DOI : 10.5121/ijcsit.2016.8202

A Study of the Reliability and Validity of the Leader-Member Exchange (LMX) Instrument in Arabic
AreejAlshamasi and NahlaAljojo, IJCSIT Journal, Vol 8, No 1, February 2016, PP. 55 -73
DOI : 10.5121/ijcsit.2016.8105

An Evaluation Study of General Software Project Risk Basedon Software Practitioners Experiences
Sahand Vahidnia and Ömer Özgür Tanrıöver and I. N. Askerzade, IJCSIT Journal, Vol 8, No 6, December 2016, PP. 1 -13
DOI : 10.5121/ijcsit.2016.8601

Most Cited Articles - 2015

Cross Platform App : A Comparative Study
Paulo R. M. de Andrade and Adriano B. Albuquerque, IJCSIT Journal, Vol 7, No 1, February 2015, PP. 33-40
DOI : 10.5121/ijcsit.2015.7104

Review of Lane Detection and Tracking Algorithms in Advanced Driver Assistance System
Ammu M Kumar and Philomina Simon, IJCSIT Journal, Vol 7, No 4, August 2015, PP. 65-78
DOI : 10.5121/ijcsit.2015.7406

Applying the Technology Acceptance Model to Understand Social Networking Sites (SNS) Usage: Impact of Perceived Social Capital
Waleed Al-Ghaith, IJCSIT Journal, Vol 7, No 4, August 2015, PP. 105-117
DOI : 10.5121/ijcsit.2015.7409

Iris Recognition for Personal Identification Using Lamstar Neural Network
Shideh Homayon, IJCSIT Journal, Vol 7, No 1, February 2015, PP. 01-08
DOI : 10.5121/ijcsit.2015.7101

Evaluation of Two-Level Global Load Balancing Framework in Cloud Environment
Po-Huei Liang and Jiann-Min Yang, IJCSIT Journal, Vol 7, No 2, April 2015, PP. 01-11
DOI : 10.5121/ijcsit.2015.7201

Instructor Perspectives of Mobile Learning Platform: An Empirical Study
Muasaad Alrasheedi, IJCSIT Journal, Vol 7, No 3, June 2015 PP. 27-40
DOI : 10.5121/ijcsit.2015.7303

Preprocessing for PPM: Compressing Utf-8 Encoded Natural Language Text
William J.Teahan and Khaled M.Alhawiti, IJCSIT Journal, Vol 7, No 2, April 2015 PP. 41-51
DOI : 10.5121/ijcsit.2015.7204

A Survivability Model for Saudi ICT Startups
Sara Almakenzi and Arif Bramantoro and Waleed Rashideh, IJCSIT Journal, Vol 7, No 2, April 2015 PP. 145-157
DOI : 10.5121/ijcsit.2015.7213

Encryption-Decryption RGB Color Image Using Matrix Multiplication
Mohamad M. AL-Laham, IJCSIT Journal, Vol 7, No 5, October 2015 PP. 109-119
DOI : 10.5121/ijcsit.2015.7508

Map-Reduce Implementations: Survey and Performance Comparison
Zeba Khanam and Shafali Agarwal, IJCSIT Journal, Vol 7, No 4, August 2015 PP. 119-126
DOI : 10.5121/ijcsit.2015.7410

Most Cited Articles - 2014

Performance Analysis of Wind Turbine as a Distributed Generation Unit in Distribution System
Ramadoni Syahputra, Imam Robandi and Mochamad Ashari, IJCSIT Journal, Vol 6, No 3, June 2014, PP. 39-56
DOI : 10.5121/ijcsit.2014.6303

Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method
Ming-Chang Lee, IJCSIT Journal, Vol 6, No1, February 2014, PP. 29-45
DOI : 10.5121/ijcsit.2014.6103

State of the art of learning styles-based adaptive educational hypermedia systems (LS-BAEHSs)
Ahmed Al-Azawei and Atta Badii, IJCSIT Journal, Vol 6, No 3, June 2014, PP. 01-19
DOI : 10.5121/ijcsit.2014.6301

State of the art of agile governance: a systematic review
Alexandre J. H. de O. Luna, Philippe Kruchten, Marcello L. G. do E.Pedrosa, Humberto R. de Almeida Neto and Hermano P. de Moura, IJCSIT Journal, Vol 6, No 5, October 2014, PP. 121-141
DOI : 10.5121/ijcsit.2014.6510

What Facilitates the Delivery of Citizen-Centric EGovernment Services in Developing Countries: Model Development and Validation Through Structural Equation Modeling
Yousef Elsheikh and Mohammad Azzeh, IJCSIT Journal, Vol 6, No1, February 2014 , PP. 77-98
DOI : 10.5121/ijcsit.2014.6106

Arabic text categorization algorithm using vector evaluation method
Ashraf Odeh, Aymen Abu-Errub, Qusai Shambour and Nidal Turab, IJCSIT Journal, Vol 6, No 6, December 2014, PP. 83-92
DOI : 10.5121/ijcsit.2014.6606

Business Bankruptcy Prediction Based on Survival Analysis Approach
Ming-Chang Lee, IJCSIT Journal, Vol 6, No 2, April 2014, PP. 103-119
DOI : 10.5121/ijcsit.2014.6207

Shape-Based Plagiarism Detection for Flowchart Figures in Texts
Senosy Arrish, Fadhil Noer Afif, Ahmadu Maidorawa and Naomie Salim, IJCSIT Journal, Vol 6, No 1, February 2014, PP. 113-124
DOI : 10.5121/ijcsit.2014.6108

A guide to deal with uncertainties in software project management
Marcelo Marinho, Suzana Sampaio, Telma Lima and Hermano de Moura, IJCSIT Journal, Vol 6, No 5, October 2014, PP. 01-20
DOI : 10.5121/ijcsit.2014.6501

A guide to deal with uncertainties in software project management
Heba A. Kurdi, IJCSIT Journal, Vol 6, No 2, April 2014, PP. 199-206
DOI : 10.5121/ijcsit.2014.6216

Most Cited Articles - 2013

Security threats on cloud computing vulnerabilities
Te-Shun Chou, IJCSIT Journal, Vol 5, No 3, June 2013, PP. 79-88
DOI : 10.5121/ijcsit.2013.5306

A Neuro-Fuzzy Approach For the Fault Location Estimation of Unsynchronized Two-Terminal Transmission Lines
Ramadoni Syahputra, IJCSIT Journal, Vol 5, No 1, February 2013, PP. 23-37
DOI : 10.5121/ijcsit.2013.5102

Automatic Detection of Microaneurysms and Hemorrhages in Color Eye Fundus Images
Sérgio Bortolin Júnior and Daniel Welfer, IJCSIT Journal, Vol 5, No 5, October 2013, PP. 21-37
DOI : 10.5121/ijcsit.2013.5502

A systematic mapping study on business process variability
George Valença, Carina Alves, Vander Alves and Nan Niu, IJCSIT Journal, Vol 5, No 1, February 2013, PP. 01-21
DOI : 10.5121/ijcsit.2013.5101

Multi-topic multi-document summarizer
Fatma El-Ghannam and Tarek El-Shishtawy, IJCSIT Journal, Vol 5, No 6, December 2013, PP. 77-90
DOI : 10.5121/ijcsit.2013.5606

Comparative study of backpropagation algorithms in neural network based identification of power system
Sheela Tiwari, Ram Naresh, Rameshwar Jha, IJCSIT Journal, Vol 5, No 4, August 2013, PP. 93-107
DOI : 10.5121/ijcsit.2013.5407

Concept-based indexing in text information retrieval
Fatiha Boubekeur and Wassila Azzoug, IJCSIT Journal, Vol 5, No 1, February 2013, PP. 119-136
DOI : 10.5121/ijcsit.2013.5110

A Preliminary Survey on Optimized Multiobjective Metaheuristic Methods for Data Clustering Using Evolutionary Approaches
Ramachandra Rao Kurada, Dr. K Karteeka Pavan and Dr. AV Dattareya Rao, IJCSIT Journal, Vol 5, No 5, October 2013, PP. 57-77
DOI : 10.5121/ijcsit.2013.5504

Diagnosis of Some Diseases in Medicine via computerized Experts System
R.A. Soltan, M. Z. Rashad and B.El-Desouky, IJCSIT Journal, Vol 5, No 5, October 2013, PP. 79-90
DOI : 10.5121/ijcsit.2013.5505

AdaBoost ensemble with simple genetic algorithm for student prediction model
AhmedSharaf ElDen, Malaka A. Moustafa, Hany M. Harb and AbdelH.Emara, IJCSIT Journal, Vol 5, No 2, April 2013, PP. 73-85
DOI : 10.5121/ijcsit.2013.5207

Most Cited Articles - 2012

Fuzzy multi-objective approach for the improvement of distribution network efficiency by considering DG
Ramadoni Syahputra, IJCSIT Journal, Vol 4, No 21, April 2012, PP. 57-68
DOI : 10.5121/ijcsit.2012.4205

Enhancement of images using morphological transformation
K.Sreedhar and B.Panlal, IJCSIT Journal, Vol 4, No 1, Feb 2012, PP. 33-50
DOI : 10.5121/ijcsit.2012.4103

A Qualitative Study of LP-ITS: Linear Programming Intelligent Tutoring System
Samy S. Abu Naser, IJCSIT Journal, Vol 4, No 1, Feb 2012, PP. 209-220
DOI : 10.5121/ijcsit.2012.4116

Biometric authentication through a virtual keyboard for smartphones
Matthias Trojahn and Frank Ortmeier, IJCSIT Journal, Vol 4, No 5, October 2012, PP. 01-12
DOI : 10.5121/ijcsit.2012.4501

Cost breakdown of public cloud computing and private cloud computing and security issues
Swarnpreet Singh and Tarun Jangwa, IJCSIT Journal, Vol 4, No 2, April 2012, PP. 17- 31
DOI : 10.5121/ijcsit.2012.4202

Embedded controller for vehicle In-Front obstacle detection and cabin safety alert system
V.Ramya, B. Palaniappan, K. Karthick, IJCSIT Journal, Vol 4, No 2, April 2012, PP.117-131
DOI : 10.5121/ijcsit.2012.4210

Training a feed-forward neural network with artificial bee colony based backpropagation method
Sudarshan Nandy, Partha Pratim Sarkar and Achintya Das, IJCSIT Journal, Vol 4, No 4, August 2012, PP. 33-46
DOI : 10.5121/ijcsit.2012.4404

Evaluation of information retrieval systems
Keneilwe Zuva and Tranos Zuva, IJCSIT Journal, Vol 4, No 3, June 2012, PP. 35-43
DOI : 10.5121/ijcsit.2012.4304

A neuro-fuzzy inference model for breast cancer recognition
Bekaddour Fatima and Chikh Mohammed Amine, IJCSIT Journal, Vol 4, No 5, October 2012, PP. 163-173
DOI : 10.5121/ijcsit.2012.4513

An Approach for agile SOA development using agile principals
Majlesi Shahrbanoo, Mehrpour Ali and Mohsenzadeh Mehran, IJCSIT Journal, Vol 4, No 1, Feb 2012, PP. 237-244
DOI : 10.5121/ijcsit.2012.4118

Most Cited Articles - 2011

IRIS Recognition Based On LBP and Combined LVQ Classifier
M. Z. Rashad, M. Y. Shams, O. Nomir and R. M. El-Awady IJCSIT Journal, Vol 3, No 5, October 2011, PP. 67-78
DOI : 10.5121/ijcsit.2011.3506

Common Phases of Computer Forensics Investigation Models
Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 17 - 31
DOI : 10.5121/ijcsit.2011.3302

Plants Images Classification Based on Textural Features using Combined Classifier
M. Z. Rashad,B.S.el-Desouky,Manal and S .Khawasik, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 93 - 100
DOI : 10.5121/ijcsit.2011.3407

Php Framework for Database Management Based on Mvc Pattern
Chanchai Supaartagorn, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 251 - 258
DOI : 10.5121/ijcsit.2011.3219

Wavelet Based Spectrum Sensing Techniques for Cognitive Radio - A Survey
Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 123 - 137
DOI : 10.5121/ijcsit.2011.3209

Research Review for Digital Image Segmentation Techniques
Ashraf A. Aly,Safaai Bin Deris and Nazar Zaki, IJCSIT Journal, Vol 3, No 5, Oct 2011, PP. 99-106
DOI : 10.5121/ijcsit.2011.3509

Machine Learning Methods for Spam E-Mail Classification
W.A. Awad and S.M. ELseuofi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 174-184

Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network
Al Mutaz M. Abdalla, Safaai Dress and Nazar Zaki, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 176,186
DOI : 10.5121/ijcsit.2011.3312

Performance Analysis of Various Data Mining Classification Techniques on Healthcare Data
Shelly Gupta,Dharminder Kumar and Anand Sharma, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 155-169
DOI : 10.5121/ijcsit.2011.3413

Focused Web Crawling Using Decay Concept and Genetic Programming
Mahdi Bazarganigilani, Ali Syed and Sandid Burki Vol.1, No.1, January 2011, PP. 1-12

Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network
J.Pradeep,E.Srinivasan and S.Himavathi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 27-38
DOI : 10.5121/ijcsit.2011.3103

A Comparative Experiment of Several Shape Methods in Recognizing Plants
A. Kadir,L.E.NugrohoA.Susanto and P.I.Santosa, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 256-263
DOI : 10.5121/ijcsit.2011.3318

Ubiquitous Mobile Health Monitoring System for Elderly (Umhmse)
Abderrahim Bourouis,Mohamed Feham and Abdelhamid Bouchachia, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 74-82
DOI : 10.5121/ijcsit.2011.3306

Information Security Plan for Flight Simulator Applications
Jason Slaughter,Syed (Shawon) and M. Rahman, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 1-15
DOI : 10.5121/ijcsit.2011.3301

Improving the Character Recognition Efficiency of Feed Forward Bp Neural Network
Amit Choudhary and Rahul Rishi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 85-96
DOI : 10.5121/ijcsit.2011.3107

Hybrid GPS-GSM Localization of Automobile Tracking System
Mohammad A. Al-Khedher, IJCSIT Journal, Vol 3, No 6, Dec 2011, PP. 75-85
DOI : 10.5121/ijcsit.2011.3606

Dna Lossless Differential Compression Algorithm Based on Similarity of Genomic Sequence Database
Heba Afify,Muhammad Islam and Manal Abdel Wahed, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 145-154
DOI : 10.5121/ijcsit.2011.3412

Most Cited Articles - 2010

An Efficient Gait Recognition System for Human Identification using Modified ICA
M.Pushpa Rani and G.Arumugam, IJCSIT Journal, Vol 2,no 1,february 2010, PP. 55 - 67

Human Facial Experssion Detection from Detected in Captured Image using Back Propagation Neural Network
Jagdish Lal Raheja and Umesh Kumar, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 116 - 123

A Mobility - Based Checkpointing Protocol for Mobile Computing System
Suparna Biswas and Sarmistha Neogy, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 135 - 151

A New Dct-Based Watermarking Method For Copyright Protection Of Digital Audio
Pranab Kumar Dhar,Mohammad Ibrahim Khan and Saif Ahmad, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 91 - 101
DOI : 10.5121/ijcsit.2010.2507

Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy
S.Veeramalai,N.Jaisankar and A.Kannan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 60 - 74
DOI : 10.5121/ijcsit.2010.2406

Performance Evaluation of Routing Protocols in Wireless Sensor Networks
Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 64 - 73
DOI : 10.5121/ijcsit.2010.2206

Agent based trust management framework in distributed E-Business environment
E.Sathiyamoorthy,N.Ch.Sriman Narayana Iyenger and V.Ramachandran, IJCSIT Journal, vol 2, no 2, feb 2010, PP. 14 - 28

Use of Smart Antennas in Ad Hoc Networks
Mohammed Ali Hussain,P.Suresh Varma,K. Satya Rajesh,Hussain Basha Pathan and Leela Madhav Sarraju, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 47 - 54
DOI : 10.5121/ijcsit.2010.2605

An Optimized Distributed Association Rule Mining Algorithm In Parallel and Distributed Data Mining With Xml Data for Improved Response Time
Sujni Paul, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 88 - 101
DOI : 10.5121/ijcsit.2010.2208

Performance Analysis of Multimedia Compression Algorithms
Eman Abdelfattah and Asif Mohiuddin, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 1-10
DOI : 10.5121/ijcsit.2010.2501

A Survey of Qos Routing Protocols for Mobile Ad Hoc Networks
G. Santhi and Alamelu Nachiappan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 125-136
DOI : 10.5121/ijcsit.2010.2411

Some Observations on Open Source Software Development on Software Engineering Perspectives
Vinay Tiwari, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 113-125
DOI : 10.5121/ijcsit.2010.2611

M-Learning: A New Paradigm of Learning Mathematics in Malaysia
Saipunidzam Mahamad,Mohammad Noor Ibrahim and Shakirah Mohd Taib, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 76-86
DOI : 10.5121/ijcsit.2010.2407

Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm
Sandeep Singh Rawat and Lakshmi Rajamani, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 28-37
DOI : 10.5121/ijcsit.2010.2403

Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms
Rahmat Widia Sembiring,Jasni Mohamad Zain and Abdullah Embong, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 162-170
DOI : 10.5121/ijcsit.2010.2414

An Applied Study On Educational Use Of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication
Murat Kayri and Ozlem Cakır, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 48,58
DOI : 10.5121/ijcsit.2010.2405

Low Power Shift and Add Multiplier Design
C.N.Marimuthu,P.Thangaraj and Aswathy Ramesan, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 12,22
DOI : 10.5121/ijcsit.2010.2302

Mining Target-Oriented Sequential Patterns With Time-Intervals
Hao-En Chueh, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 113-123
DOI : 10.5121/ijcsit.2010.2410

Implementing Evaluation a Wireless body sensor system for automated physiological data acquition at home
Chao Chen and Carlos Pomalaza-Raez, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 24-38
DOI : 10.5121/ijcsit.2010.2303

Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Md.Headayetullah and G.K.Pradhan, IJCSIT Journal, Volume 2, Number 3, June 2010 , PP. 72-91
DOI : 10.5121/ijcsit.2010.2306

Most Cited Articles - 2009

Thesaurus and Query Expansion
Hazra Imran and Aditi Sharan, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 89 - 97

Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach
A.Revathi,R.Ganapathy and Y.Venkataramani, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 30 - 42

Analysis On Deployment Cost And Network Performance for Heterogeneous Wireless Sensor Networks
Dilip Kumar,Trilok.C Aseri and R.B Patel, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 109 - 120

Ensemble Design for Intrusion Detection Systems
T. Subbulakshmi,A. Ramamoorthi and S.Mercy Shalinie, IJCSIT Journal, Vol 1, No 1, August 2009, PP. 1-9