Issue 1, March 2011

Pages Title Author(s) Papers
110 - 115 Intelligent Strategies or Smart Grid and Cyber Security

DOI: 10.20533/ijicr.2042.4655.2011.0013
Emmanuel Hooper Download Paper
116 - 123 The Need for Effective Information Security Awareness

DOI: 10.20533/ijicr.2042.4655.2011.0014
Fadi Aloul Download Paper
124 - 128 Corpus Based Statistical Analysis of Punjabi Syllables for Preparation of Punjabi Speech Database

DOI: 10.20533/ijicr.2042.4655.2011.0015
Parminder Singh, Gurpreet Singh Lehal Download Paper

Issue 2, June 2011

Pages Title Author(s) Papers
129 - 133 Email Vector Space Model (EVSM)

DOI: 10.20533/ijicr.2042.4655.2011.0016
Taiwo Ayodele Download Paper
134 - 139 Hardware Implementation of BCH ErrorCorrecting Codes on a FPGA

DOI: 10.20533/ijicr.2042.4655.2011.0017
Laurentiu Mihai Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban Download Paper
140 - 147 A Generic Approach to Processing Parallel Corpora of the Europarl for Distributional Discourse Patterns

DOI: 10.20533/ijicr.2042.4655.2011.0018
Jolanta Mizera-Pietraszko Download Paper

Issue 3, September 2011

Pages Title Author(s) Papers
148 - 153 Classification of Movie Reviews Using Complemented Naive Bayesian Classifier

DOI: 10.20533/ijicr.2042.4655.2011.0019
Siva RamaKrishna Reddy. V., D V L N. Somayajulu, Ajay R. Dani Download Paper
154 - 161 Related-Key Impossible Differential Attacks on Crypton

DOI: 10.20533/ijicr.2042.4655.2011.0020
Yuechuan Wei, Chao Li, Bing Sun Download Paper
162 - 168 A New Modified CMM Modular Exponentiation Algorithm

DOI: 10.20533/ijicr.2042.4655.2011.0021
Abdalhossein Rezai, Parviz Keshavarzi Download Paper

Issue 4, December 2011

Pages Title Author(s) Papers
169 - 174 Identify Handwriting Individually Using Feed Forward Neural Networks

DOI: 10.20533/ijicr.2042.4655.2011.0022
Constantin Anton, Cosmin Stirbu, Romeo-Vasile Badea Download Paper
175 - 179 Prioritized Transaction Management for Mobile Computing Systems

DOI: 10.20533/ijicr.2042.4655.2011.0023
K. Chitra, Al-Dahoud Ali Download Paper
180 - 189 Using Fingerprint Recognition in a New Security Model for Accessing Distributed Systems

DOI: 10.20533/ijicr.2042.4655.2011.0024
Sara Jeza Alotaibi, Mike Wald, David Argles Download Paper
0