Issue 1, March 2016

PagesTitleAuthor(s)Papers
655 - 662Analysing Use Case Diagrams in a Calculus of Context-aware Ambients

DOI: 10.20533/ijicr.2042.4655.2016.0081
Francois Siewe, Ahmed Al-Alshuhai, Saad Almutairi, Abdulgader Almutairi Download Paper
663 - 671Hardware Implementation of an Efficient Key Management Scheme for Wireless Sensor Networks

DOI: 10.20533/ijicr.2042.4655.2016.0082
Jilna P., Deepthi P.P., Jayaraj U.K. Download Paper
672 - 681Quality Assessment of Subjectively Labelled Training Data for Improving the Reliability of Status Perception

DOI: 10.20533/ijicr.2042.4655.2016.0083
Ying Dai Download Paper
682 - 693On the Path to High Precise IP Geolocation: A Self-Optimizing Model

DOI: 10.20533/ijicr.2042.4655.2016.0084
Peter Hillmann, Lars Stiemert, Gabi Dreo, Oliver Rose Download Paper

Issue 2, June 2016

PagesTitleAuthor(s)Papers
694 - 705Securing Autonomous Networks through Virtual Closure

DOI: 10.20533/ijicr.2042.4655.2016.0085
Darren Hurley-Smith, Jodie Wetherall, Andrew Adekunle Download Paper
706 - 710Fuzzy Based Analysis for Efficient Clustering in MANET and Security Enhancement Approach using Neural Network

DOI: 10.20533/ijicr.2042.4655.2016.0086
V. Preetha, K. Chitra Download Paper
711 - 719Extended Multiset-Table-Algebra Operations

DOI: 10.20533/ijicr.2042.4655.2016.0087
Iryna Glushko Download Paper
720 - 727Bi-Directional Traffic Management with Multiple Data Feeds for Dynamic Route Computation and Prediction System

DOI: 10.20533/ijicr.2042.4655.2016.0088
Rahatur Rahman, Shamim Akhter Download Paper

Issue 3, September 2016

PagesTitleAuthor(s)Papers
728 - 732Online System for recognizing Arabic Numerals Based on Matching Alignment Algorithm

DOI: 10.20533/ijicr.2042.4655.2016.0089
Mustafa Ali Abuzaraida, Akram M. Zeki, Ahmed M. Zeki Download Paper
733 - 740Single- and Multi-User IPs’ Users: Identical Seeking but Different Clicking

DOI: 10.20533/ijicr.2042.4655.2016.0090
Nikolai Buzikashvili Download Paper
741 - 747Dynamic Transform Method for Ontology DB from Semi-structured Datasets

DOI: 10.20533/ijicr.2042.4655.2016.0091
Gui-hyun Baek, Kee-hong Ahn, Su-kyoung Kim Download Paper
748 - 753Automatic Generation of Fuzzy Models By using Iteration through Training Data

DOI: 10.20533/ijicr.2042.4655.2016.0092
Abdulrazaq Alsuhail Almutairi Download Paper

Issue 4, December 2016

PagesTitleAuthor(s)Papers
754 - 760A Comparative Study on Serial Decision Tree Classification Algorithms in Text Mining

DOI: 10.20533/ijicr.2042.4655.2016.0093
Khaled M. Almunirawi, Ashraf Y. A. Maghari Download Paper
761 - 770EEVi –Framework and Guidelines to Evaluate the Effectiveness of Cyber-Security Visualizationt

DOI: 10.20533/ijicr.2042.4655.2016.0094
Aneesha Sethi, Federica Paci, Gary Wills Download Paper
771 - 781European Surveillance Systems: Technological and Threat Assessment

DOI: 10.20533/ijicr.2042.4655.2016.0095
Christos Ntrigkogias, Associate Prof. Nineta Polemi Download Paper
782 - 790Efficient Distributed Vulnerability Assessment by Utilizing Miniaturized Computers

DOI: 10.20533/ijicr.2042.4655.2016.0096
Yi Hu, Dustin Sulek, Anthony Carella, Joshua Cox, Allyson Frame, Karen Cipriano, Hong-xia Wang Download Paper