Issue 1, March 2011

PagesTitleAuthor(s)Papers
110 - 115Intelligent Strategies or Smart Grid and Cyber Security

DOI: 10.20533/ijicr.2042.4655.2011.0013
Emmanuel Hooper Download Paper
116 - 123The Need for Effective Information Security Awareness

DOI: 10.20533/ijicr.2042.4655.2011.0014
Fadi Aloul Download Paper
124 - 128Corpus Based Statistical Analysis of Punjabi Syllables for Preparation of Punjabi Speech Database

DOI: 10.20533/ijicr.2042.4655.2011.0015
Parminder Singh, Gurpreet Singh Lehal Download Paper

Issue 2, June 2011

PagesTitleAuthor(s)Papers
129 - 133Email Vector Space Model (EVSM)

DOI: 10.20533/ijicr.2042.4655.2011.0016
Taiwo Ayodele Download Paper
134 - 139Hardware Implementation of BCH ErrorCorrecting Codes on a FPGA

DOI: 10.20533/ijicr.2042.4655.2011.0017
Laurentiu Mihai Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban Download Paper
140 - 147A Generic Approach to Processing Parallel Corpora of the Europarl for Distributional Discourse Patterns

DOI: 10.20533/ijicr.2042.4655.2011.0018
Jolanta Mizera-Pietraszko Download Paper

Issue 3, September 2011

PagesTitleAuthor(s)Papers
148 - 153Classification of Movie Reviews Using Complemented Naive Bayesian Classifier

DOI: 10.20533/ijicr.2042.4655.2011.0019
Siva RamaKrishna Reddy. V., D V L N. Somayajulu, Ajay R. Dani Download Paper
154 - 161Related-Key Impossible Differential Attacks on Crypton

DOI: 10.20533/ijicr.2042.4655.2011.0020
Yuechuan Wei, Chao Li, Bing Sun Download Paper
162 - 168A New Modified CMM Modular Exponentiation Algorithm

DOI: 10.20533/ijicr.2042.4655.2011.0021
Abdalhossein Rezai, Parviz Keshavarzi Download Paper

Issue 4, December 2011

PagesTitleAuthor(s)Papers
169 - 174Identify Handwriting Individually Using Feed Forward Neural Networks

DOI: 10.20533/ijicr.2042.4655.2011.0022
Constantin Anton, Cosmin Stirbu, Romeo-Vasile Badea Download Paper
175 - 179Prioritized Transaction Management for Mobile Computing Systems

DOI: 10.20533/ijicr.2042.4655.2011.0023
K. Chitra, Al-Dahoud Ali Download Paper
180 - 189Using Fingerprint Recognition in a New Security Model for Accessing Distributed Systems

DOI: 10.20533/ijicr.2042.4655.2011.0024
Sara Jeza Alotaibi, Mike Wald, David Argles Download Paper