Volume 2 (2011)
Issue 1, March 2011
Pages | Title | Author(s) | Papers |
110 - 115 | Intelligent Strategies or Smart Grid and Cyber Security DOI: 10.20533/ijicr.2042.4655.2011.0013 |
Emmanuel Hooper | |
116 - 123 | The Need for Effective Information Security Awareness DOI: 10.20533/ijicr.2042.4655.2011.0014 |
Fadi Aloul | |
124 - 128 | Corpus Based Statistical Analysis of Punjabi Syllables for Preparation of Punjabi Speech Database DOI: 10.20533/ijicr.2042.4655.2011.0015 |
Parminder Singh, Gurpreet Singh Lehal |
Issue 2, June 2011
Pages | Title | Author(s) | Papers |
129 - 133 | Email Vector Space Model (EVSM) DOI: 10.20533/ijicr.2042.4655.2011.0016 |
Taiwo Ayodele | |
134 - 139 | Hardware Implementation of BCH ErrorCorrecting Codes on a FPGA DOI: 10.20533/ijicr.2042.4655.2011.0017 |
Laurentiu Mihai Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban | |
140 - 147 | A Generic Approach to Processing Parallel Corpora of the Europarl for Distributional Discourse Patterns DOI: 10.20533/ijicr.2042.4655.2011.0018 |
Jolanta Mizera-Pietraszko |
Issue 3, September 2011
Pages | Title | Author(s) | Papers |
148 - 153 | Classification of Movie Reviews Using Complemented Naive Bayesian Classifier DOI: 10.20533/ijicr.2042.4655.2011.0019 |
Siva RamaKrishna Reddy. V., D V L N. Somayajulu, Ajay R. Dani | |
154 - 161 | Related-Key Impossible Differential Attacks on Crypton DOI: 10.20533/ijicr.2042.4655.2011.0020 |
Yuechuan Wei, Chao Li, Bing Sun | |
162 - 168 | A New Modified CMM Modular Exponentiation Algorithm DOI: 10.20533/ijicr.2042.4655.2011.0021 |
Abdalhossein Rezai, Parviz Keshavarzi |
Issue 4, December 2011
Pages | Title | Author(s) | Papers |
169 - 174 | Identify Handwriting Individually Using Feed Forward Neural Networks DOI: 10.20533/ijicr.2042.4655.2011.0022 |
Constantin Anton, Cosmin Stirbu, Romeo-Vasile Badea | |
175 - 179 | Prioritized Transaction Management for Mobile Computing Systems DOI: 10.20533/ijicr.2042.4655.2011.0023 |
K. Chitra, Al-Dahoud Ali | |
180 - 189 | Using Fingerprint Recognition in a New Security Model for Accessing Distributed Systems DOI: 10.20533/ijicr.2042.4655.2011.0024 |
Sara Jeza Alotaibi, Mike Wald, David Argles |