International Journal in Foundations of Computer Science & Technology

ISSN : 1839-7662



Home
Journal Home
Archives
Vol3 No2, 2013
Vol3 No1, 2013
Volume 2
Volume 1

Current Issue

July2013, Volume 3, Number 4

Graph Colouring Problem Based on Discrete Imperialist Competitive Algorithm   [Pdf]
Hojjat Emami1 and Shahriar Lotfi2, 1Islamic Azad University, Iran and 2University of Tabriz, Iran

A New Mechanism for Service Recovery Technology by Using Recovering Service’s Data   [Pdf]
Monire Norouzi, Islamic Azad University, Iran

Health Care Monitoring for the CVD Detection Using Soft Computing Techniques   [Pdf]
N.Sathiya Rani, K.Vimala and V.Kalaivani, National Engineering College, India

Wind Speed Data Analysis for Various Seasons during a Decade by Wavelet and S transform   [Pdf]
Sabyasachi Mukhopadhyay and Prasanta K Panigrahi, Indian Institutes of Science Education and Research, India

Logmin: A Model for Call Log Mining in Mobile Devices   [Pdf]
K.S. Kuppusamy, Leena Mary Francis and G. Aghila, Pondicherry University, India

Short Listing Likely Images Using Proposed Modified-Sift Together with Conventional Sift for Quick Sketch to Photo Matching   [Pdf]
Mohd. Ahmed, S. A. Patekar and Mandar Sohani, Vidyalankar Institute of Technology, India

Devnagari Numerals Classification and Recognition Using an Integrated Approach   [Pdf]
Kanika Bansal and Rajiv Kumar, Thapar University, India

Hidden Markov Model Based Named Entity Recognition Tool   [Pdf]
Deepti Chopra, Sudha Morwal and G.N. Purohit, Banasthali Vidyapith,(Raj.), India

May 2013, Volume 3, Number 3

Qoe Model for Multimedia Content Delivery from Mcloud to Mobile Devices   [pdf]
Aleksandar Karadimce and Danco Davcev, University Ss Cyril and Methodius, R. Macedonia

Delivering IT as A Utility- A Systematic Review   [pdf]
Inderveer Chana and Tarandeep Kaur, Thapar University, India

An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wireless Sensor Networks   [pdf]
Ramya Shivanagu and Deepti C, The Oxford College of Engineering, India

On 2-Repeated Solid Burst Errors   [pdf]
P. K. Das, Shivaji College (University of Delhi), India

March2013, Volume 3, Number 2

A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of The Graph Coloring Problem   [pdf]
Ramin Maazallahi and Aliakbar Niknafs, Shahid Bahonar University of Kerman, Iran

A Review On Semantic Relationship Based Applications   [pdf]
P.Shanthi Bala and G.Aghila, Pondicherry University, India

A New Research and Design for Grid Portal Security System   [pdf]
Alireza Souri, Islamic Azad University, Iran

A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems   [pdf]
V. Ravibabu, Manonmaniam Sundaranar University, India

Evaluation Of The Data Security Methods In Cloud Computing Environments   [pdf]
Farhad Soleimanian Gharehchopogh and Meysam Bahari, Islamic Azad University, Iran.

January 2013, Volume 3, Number 1

Scalable Cluster Based Cloud Storage   [pdf]
Parinaz Eskandarian Miyandoab1 and Jaber Karimpour2, 1Islamic Azad University, Iran and 2University of Tabriz, Iran

A New Greedy Randomized Adaptive Search Procedure for Multiobjective RNA Structural Alignment   [pdf]
Abdesslem Layeb, Amira Boudra, Wissem Korichi and Salim Chikhi, University of Constantine, Algeria

A New MVP Based Approach in Software Architecture for Time Reduction in Software Development   [pdf]
Farhad Soleimanian Gharehchopogh and Mortaza Abdollahiasl, Islamic Azad University, Iran

Cryptographic Control for Risk Assessment on Unix Operating System-I   [pdf]
Prashant Kumar Patra1 & Padma Lochan Pradhan2, 1BPUT, India and 2Sikha ‘O’ Anusandhan University (SOA), India


 

Published by WSP, Sydney, Australia