You are on page 1of 4

Advances in Computer Science : an

International J ournal
Page 1 of 4 ACSIJ 2014 Volume 3 Issue 2
4/3/2014 http://www.acsij.org/publications/acsij-2014-volume-3-issue-2
ACSIJ Open Access Publications
2014
Vol ume 3, Issue 2
Multi-Objective Genetic Algorithms for computing Fast Fourier Transform for evolving Smart Sensors devices using
Field Programmable gate arrays
Innocent Njini, Obeten O. Ekabua
Download Full-Text
Analysis and Improvement of the Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
Masoud Mohammadi, Mehdi Hosseinzadeh, Mohammad Esmaeildoust
Download Full-Text
Weighted Twin Support Vector Machine with Universum
Shuxia Lu, Le Tong
Download Full-Text
Designing An Efficient Target Tracking Protocol Based on a Clustering Algorithm and Recovery Mechanism in
Wireless Sensor Networks (WSNs)
Shirin Shoaee, Shabnam Shoaee
Download Full-Text
Middle East User Navigation in Online Social Networks and Interactions in E-Commerce, an Analogy
Mehrdad Zaker Shahrak, Shahriar Mohammadi
Download Full-Text
Map Abstraction with Adjustable Time Bounds
Sourodeep Bhattacharjee, Scott D. Goodwin
Download Full-Text
Predicting students’ grades using fuzzy non-parametric regression method and ReliefF-based algorithm
J avad Ghasemian, Mahmoud Moallem, Yasin Alipour
Download Full-Text
Reducing Energy Consumption in Mobile ad hoc Networks Using Energy-aware Routing Algorithm Based on
Home Page Call For Papers Submission Authors Reviewers
Publications FAQ About Us Contact Us
Page 2 of 4 ACSIJ 2014 Volume 3 Issue 2
4/3/2014 http://www.acsij.org/publications/acsij-2014-volume-3-issue-2
Multiple Routes
Ali Broumandnia, Ehsan Sharifi, Milad Ghahari Bidgoli
Download Full-Text
Extracting Protein Names from Biological Literature
Huang-Cheng Kuo, Ken-I Lin
Download Full-Text
Cloud based Cross Platform Mobile Applications Building and integrating cloud services with mobile client
applications
Cosmina Ivan, Razvan Popa
Download Full-Text
Applying Web Usage Mining Techniques to Design Effective Web Recommendation Systems: A Case Study
Maryam J afari, Farzad Soleymani Sabzchi, Amir J alili Irani
Download Full-Text
Geometric Transformations via Matrix Multiplications Using Hardware/Software Co-design
Tai-Chi Lee
Download Full-Text
A New Robust Audio Signal Steganography Based On Multiple Chaotic Algorithms With Edge Detection Technique
Amir Houshang Arab Avval, Shahram Mohanna
Download Full-Text
A Quantum Optimization Model for Dynamic Resource Allocation in Networks
Yu QingPing, You XiaoMing, Liu Sheng
Download Full-Text
Heuristics for Irreversible Ternary MVL Circuit Synthesis and Optimization Using PSO Algorithm
Maryam Yarmohammadi, Majid Mohammadi
Download Full-Text
Cooperative Machine-Vision-Based Tracking using Multiple Unmanned Aerial Vehicles
Ali Pirshayan, Hadi Seyedarabi, Siamak Haghipour
Download Full-Text
Study of secure m-commerce, challenges and solutions
Ali Mirarab, AbdolReza Rasouli kenari
Download Full-Text
Page 3 of 4 ACSIJ 2014 Volume 3 Issue 2
4/3/2014 http://www.acsij.org/publications/acsij-2014-volume-3-issue-2
Traditional Host based Intrusion Detection Systems’ Challenges in Cloud Computing
Masoudeh Keshavarzi
Download Full-Text
Botnet Detection using NetFlow and Clustering
Pedram Amini, Reza Azmi, MuhammadAmin Araghizadeh
Download Full-Text
Citizens’ Readiness for Remote Electronic Voting in Tanzania
Sylvester Kimbi, Irina Zlotnikova
Download Full-Text
ACSIJ Volume 3, Issue 2 - March 2014 Issue
Download Full-Text
About ACSIJ
ACSIJ is a refereed open access international journal for scientific
papers dealing in all areas of computer science research...
Learn more »
FAQs
Read the most frequently
asked questions about
ACSIJ .
Frequently Asked Questions
(FAQs) »
Get in touch
Phone: +9821
44462320
Email:
info@acsij.org
More contact
details »
Page 4 of 4 ACSIJ 2014 Volume 3 Issue 2
4/3/2014 http://www.acsij.org/publications/acsij-2014-volume-3-issue-2