-
1
Extract of facial feature point.
Published 2009“…International Journal of Computer Science and Network Security (IJCSNS)…”
Article -
2
HTS : a hierarchical method for load balancing in autonomous networks.
Published 2008“…IJCSNS (International Journal of Computer Science and Network Security)…”
Get full text
Article -
3
KSFaci : facilitating knowledge sharing using profiler and recommender agent.
Published 2008“…International Journal of Computer Science and Network Security (IJCSNS)…”
Get full text
Article -
4
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…IJCSNS (International Journal of Computer Science and Network Security)…”
Get full text
Article -
5
Performance comparison of routing protocols for mobile grid environment.
Published 2008“…International Journal of Computer Science and Network Security (IJCSNS)…”
Get full text
Article -
6
Performance comparison of voice packet sizes in the FIFO adversarial queuing and FIFO M/M/1 model.
Published 2008“…IJCSNS (International Journal of Computer Science and Network Security)…”
Get full text
Article -
7
Performance evaluation of AODV, DSDV and DSR routing protocol in grid environment.
Published 2009“…IJCSNS (International Journal of Computer Science and Network Security)…”
Get full text
Article -
8
Review of complexity metrics for object oriented software products.
Published 2008“…International Journal of Computer Science and Network Security (IJCSNS)…”
Get full text
Article -
9
Sharing clinical information in P2P environment with RBAC mechanism.
Published 2009“…IJCSNS (International Journal of Computer Science and Network Security)…”
Get full text
Article -
10
Term weighting schemes experiment based on SVD for Malay text retrieval.
Published 2008“…International Journal of Computer Science and Network Security (IJCSNS)…”
Article -
11
The robust software metric data model defined in XML.
Published 2008“…IJCSNS (International Journal of Computer Science and Network Security)…”
Get full text
Article -
12
Usability measurement of Malaysia online news websites.
Published 2008“…IJCSNS (International Journal of Computer Science and Network Security)…”
Get full text
Article -
13
Using strategy mapping and cause-and-effect relationship for measuring ITSP implementation.
Published 2009“…IJCSNS (International Journal of Computer Science and Network Security)…”
Get full text
Article -
14
Rules frequency order stemmer for Malay language.
Published 2009“…International Journal of Computer Science and Network Security (IJCSNS)…”
Get full text
Article -
15
Service oriented architecture in education sector.
Published 2009“…International Journal of Computer Science and Network Security (IJCSNS)…”
Article -
16
An analysis and comparison between new buffering design with Priority Queuing (Pq) algorithm and SPBA algorithm for VOIP
Published 2011“…International Journal of Computer Science and Network Security (IJCSNS)…”
Get full text
Article -
17
A steganography method based on hiding secrete data in Mpeg/audio layer III
Published 2011“…International Journal of Computer Science and Network Security (IJCSNS)…”
Get full text
Article