Volume 7 (2016)
Issue 1, March 2016
Pages | Title | Author(s) | Papers |
655 - 662 | Analysing Use Case Diagrams in a Calculus of Context-aware Ambients DOI: 10.20533/ijicr.2042.4655.2016.0081 |
Francois Siewe, Ahmed Al-Alshuhai, Saad Almutairi, Abdulgader Almutairi |
![]() |
663 - 671 | Hardware Implementation of an Efficient Key Management Scheme for Wireless Sensor Networks DOI: 10.20533/ijicr.2042.4655.2016.0082 |
Jilna P., Deepthi P.P., Jayaraj U.K. |
![]() |
672 - 681 | Quality Assessment of Subjectively Labelled Training Data for Improving the Reliability of Status Perception DOI: 10.20533/ijicr.2042.4655.2016.0083 |
Ying Dai |
![]() |
682 - 693 | On the Path to High Precise IP Geolocation: A Self-Optimizing Model DOI: 10.20533/ijicr.2042.4655.2016.0084 |
Peter Hillmann, Lars Stiemert, Gabi Dreo, Oliver Rose |
![]() |
Issue 2, June 2016
Pages | Title | Author(s) | Papers |
694 - 705 | Securing Autonomous Networks through Virtual Closure DOI: 10.20533/ijicr.2042.4655.2016.0085 |
Darren Hurley-Smith, Jodie Wetherall, Andrew Adekunle |
![]() |
706 - 710 | Fuzzy Based Analysis for Efficient Clustering in MANET and Security Enhancement Approach using Neural Network DOI: 10.20533/ijicr.2042.4655.2016.0086 |
V. Preetha, K. Chitra |
![]() |
711 - 719 | Extended Multiset-Table-Algebra Operations DOI: 10.20533/ijicr.2042.4655.2016.0087 |
Iryna Glushko |
![]() |
720 - 727 | Bi-Directional Traffic Management with Multiple Data Feeds for Dynamic Route Computation and Prediction System DOI: 10.20533/ijicr.2042.4655.2016.0088 |
Rahatur Rahman, Shamim Akhter |
![]() |
Issue 3, September 2016
Pages | Title | Author(s) | Papers |
728 - 732 | Online System for recognizing Arabic Numerals Based on Matching Alignment Algorithm DOI: 10.20533/ijicr.2042.4655.2016.0089 |
Mustafa Ali Abuzaraida, Akram M. Zeki, Ahmed M. Zeki |
![]() |
733 - 740 | Single- and Multi-User IPs’ Users: Identical Seeking but Different Clicking DOI: 10.20533/ijicr.2042.4655.2016.0090 |
Nikolai Buzikashvili |
![]() |
741 - 747 | Dynamic Transform Method for Ontology DB from Semi-structured Datasets DOI: 10.20533/ijicr.2042.4655.2016.0091 |
Gui-hyun Baek, Kee-hong Ahn, Su-kyoung Kim |
![]() |
748 - 753 | Automatic Generation of Fuzzy Models By using Iteration through Training Data DOI: 10.20533/ijicr.2042.4655.2016.0092 |
Abdulrazaq Alsuhail Almutairi |
![]() |
Issue 4, December 2016
Pages | Title | Author(s) | Papers |
754 - 760 | A Comparative Study on Serial Decision Tree Classification Algorithms in Text Mining DOI: 10.20533/ijicr.2042.4655.2016.0093 |
Khaled M. Almunirawi, Ashraf Y. A. Maghari |
![]() |
761 - 770 | EEVi –Framework and Guidelines to Evaluate the Effectiveness of Cyber-Security Visualizationt DOI: 10.20533/ijicr.2042.4655.2016.0094 |
Aneesha Sethi, Federica Paci, Gary Wills |
![]() |
771 - 781 | European Surveillance Systems: Technological and Threat Assessment DOI: 10.20533/ijicr.2042.4655.2016.0095 |
Christos Ntrigkogias, Associate Prof. Nineta Polemi |
![]() |
782 - 790 | Efficient Distributed Vulnerability Assessment by Utilizing Miniaturized Computers DOI: 10.20533/ijicr.2042.4655.2016.0096 |
Yi Hu, Dustin Sulek, Anthony Carella, Joshua Cox, Allyson Frame, Karen Cipriano, Hong-xia Wang |
![]() |