Volume 3 (2012)
Issue 1, March 2012
Pages | Title | Author(s) | Papers |
190 - 196 | Semantic Tagging of Medical Narratives with Top Level Concepts from SNOMED CT Healthcare Data Standard DOI: 10.20533/ijicr.2042.4655.2012.0025 |
Saman Hina, Eric Atwell, Owen Johnson | |
197 - 204 | Biometric Incorporation in Pervasive and Autonomous Systems Emphasising the use within e-Health Specific Smart Homes DOI: 10.20533/ijicr.2042.4655.2012.0026 |
Peter William Matthew | |
205 - 213 | A New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks DOI: 10.20533/ijicr.2042.4655.2012.0027 |
Bassem Bakhache, Kassem Ahmad, Safwan el Assad |
Issue 2, June 2012
Pages | Title | Author(s) | Papers |
214 - 220 | Improving Finding and Re-finding Web search Results Using Clustering and Visualisation DOI: 10.20533/ijicr.2042.4655.2012.0028 |
Hoda Badesh, James Blustein | |
221 - 230 | Flow Shop Scheduling Problem with Transportation Times, Two-Robots and Inputs/Outputs with Limited Capacity DOI: 10.20533/ijicr.2042.4655.2012.0029 |
Tarik Lamoudan, Fatima El Khoukhi, Ahmed El Hilali Alaoui, Jaouad Boukachour | |
231 - 237 | Security of Telemedical Applications over the Internet using Programmable Cellular Automata DOI: 10.20533/ijicr.2042.4655.2012.0030 |
Petre Anghelescu |
Issue 3, September 2012
Pages | Title | Author(s) | Papers |
238 - 248 | Fraud Reduction on EMV Payment Cards by the Implementation of Stringent Security Features DOI: 10.20533/ijicr.2042.4655.2012.0031 |
Oludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale Lindskog | |
249 - 254 | Combating Malware Threat using Hybrid Security Model DOI: 10.20533/ijicr.2042.4655.2012.0032 |
P.R.Lakshmi Eswari, N.Sarat Chandra Babu | |
255 - 262 | Single Sign-On for Unified Communications DOI: 10.20533/ijicr.2042.4655.2012.0033 |
Ping Lin, Sunil Menon, Shailesh Patel, Lin Lin |
Issue 4, December 2012
Pages | Title | Author(s) | Papers |
263 - 277 | Security Vulnerability Analysis in Virtualized Computing Environments DOI: 10.20533/ijicr.2042.4655.2012.0034 |
Tyson T. Brooks, Carlos Caicedo, Joon S. Park | |
278 - 283 | Assumption/Commitment Algorithmic Approach for Ontology Alignment DOI: 10.20533/ijicr.2042.4655.2012.0035 |
Said Rabah Azzam, Shikun Zhou | |
284 - 290 | A Secure and Efficient Key Agreement Protocol Based on Certificateless Cryptography DOI: 10.20533/ijicr.2042.4655.2012.0036 |
Nashwa A.F. Mohamed, Mohsin H.A. Hashim, Eihab B.M. Bashier, Mohamed E.H. Hassouna |