CINXE.COM
International Journal of Computer Science and Information Technology (IJCSIT)
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta charset="UTF-8"> <style type="text/css"> ul li a{ font-weight:bold; color:#000; list-style:none; text-decoration:none; size:10px;} .imagess { height:90px; text-align:left; margin:0px 5px 2px 8px; float:right; border:none; } a:visited { color:#60F; } #left p { font-family:CALIBRIB; font-size:0.80pc; } </style> <link rel="icon" type="image/ico" href="http://airccse.org/2014/adco/logo.ico"/> <title>International Journal of Computer Science and Information Technology (IJCSIT)</title> <link rel="stylesheet" type="text/css" href="current.css" /> </head> <body> <div id="wap"> <div id="page"> <div id="top"> <table width="100%" cellspacing="0" cellpadding="0" > <tr><td colspan="3" valign="top"><img src="top3.gif" /></td></tr> </table> </div> <div id="menu"> <a href="ijcsit.html">Home</a> <a href="eboard.html">Editorial</a> <a href="ijcsit2024_curr.html">Current Issue</a> <a href="papersub.html">Submission</a> <a href="jcsit_index.html">Indexing</a> <a href="specialissue.html">Special Issue</a> <a href="contacts.html">Contacts</a> <a href="http://airccse.org/" target="blank">AIRCC</a></div> <div id="content"> <div id="left"> <h2>Most Cited Articles</h2> <h4>Most Cited Articles – 2017</h4> <table class="show" align="center" width="100%"> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?oi=bibs&hl=en&cites=2060018886354257263&as_sdt=5"target="_blank"> Data Warehouse and Big Data Integration</a><br /> <span>Sonia Ordoñez Salinas and Alba Consuelo Nieto Lemus,IJCSIT Journal, Vol 9, No 2, April 2017, PP. 1-17<br />DOI : 10.5121/ijcsit.2017.9201 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?oi=bibs&hl=en&cites=4868069007570958873&as_sdt=5" target="_blank">An Integrated System Framework for Predicting Students' Academic Performance in Higher Educational Institutions</a><br /> <span>Olugbenga Adejo and Thomas Connolly, IJCSIT Journal, Vol 9, No 3, June 2017, PP. 149-157<br />DOI : 10.5121/ijcsit.2017.93013 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?oi=bibs&hl=en&cites=7991993602931573227&as_sdt=5" target="_blank">A Systematic Mapping Study on Current Research Topics in Smart Contracts</a><br /> <span>Maher Alharby and Aad van Moorsel, IJCSIT Journal, Vol 9, No 5, October 2017, PP. 151-164<br />DOI : 10.5121/ijcsit.2017.9511 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?oi=bibs&hl=en&cites=4332658438686521419&as_sdt=5" target="_blank">Image encryption techniques using fractal function: a review</a><br /> <span>Shafali Agarwal, IJCSIT Journal, Vol 9, No 2, April 2017, PP. 53-68<br />DOI : 10.5121/ijcsit.2017.9205 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?oi=bibs&hl=en&cites=14374842849482799704&as_sdt=5" target="_blank"> A Meliorated Kashida - Based Approach for Arabic Text Steganography</a><br /> <span>Ala'a M. Alhusban and Jehad Q. Odeh Alnihoud, IJCSIT Journal, Vol 9, No 2, April 2017, PP. 99-112<br />DOI : 10.5121/ijcsit.2017.9209 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?oi=bibs&hl=en&cites=398301826638348326&as_sdt=5" target="_blank"> Environmental monitoring and controlling system for mushroom farm with online interface</a><br /> <span>Arjuna Marzuki and Soh Yan Ying , IJCSIT Journal, Vol 9, No 4, August 2017, PP. 17-28 <br />DOI : 10.5121/ijcsit.2017.9402 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?oi=bibs&hl=en&cites=16909871243277276170&as_sdt=5" target="_blank">Residual quotient and annihilator of intuitionistic fuzzy sets of ring and module</a><br /> <span>P.K. Sharma and Gagandeep Kaur, IJCSIT Journal, Vol 9, No 4, August 2017, PP. 1-15<br />DOI : 10.5121/ijcsit.2017.9401 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?oi=bibs&hl=en&cites=12133205333499969983&as_sdt=5" target="_blank">Raspberry pi and arduino uno working together as a basic meteorological station</a><br /> <span>José Rafael Cortés León and Ricardo Francisco Martínez-González,Anilú Miranda Medinay and Luis Alberto Peralta-Pelaez, IJCSIT Journal, Vol 9, No 5, October 2017, PP. 97-104 <br />DOI : 10.5121/ijcsit.2017.9508 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?oi=bibs&hl=en&cites=5920616976433573325&as_sdt=5">Multilevel Analysis of Student’s Feedback Using Moodle Logs in Virtual Cloud Environment</a><br /> <span>Ashok Verma, Sumangla Rathore, Santosh Vishwakarma and Shubham Goswami, IJCSIT Journal, Vol 9, No 5, October 2017, PP. 15-28<br />DOI : 10.5121/ijcsit.2017.9502 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?oi=bibs&hl=en&cites=7604113052501690596&as_sdt=5" target="_blank">Usability testing of fitness mobile application: case study Aded Surat app</a><br /> <span>Ryan Alturki and Valerie Gay , IJCSIT Journal, Vol 9, No 5, October 2017, PP. 105-125<br />DOI : 10.5121/ijcsit.2017.9509 </span></b></p></td></tr></table> <h4>Most Cited Articles – 2016</h4> <table class="show" align="center" width="100%"> <tr><td><p><b><a href="https://scholar.google.com/scholar?oi=bibs&hl=en&cites=13018580966088281025&as_sdt=5" target="_blank">Stock trend prediction using news sentiment analysis</a><br /> <span>Kalyani Joshi, Prof. Bharathi H. N., Prof. Jyothi Rao, IJCSIT Journal, Vol 8, No 3, June 2016, PP. 67-76<br />DOI : 10.5121/ijcsit.2016.8306</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.com/scholar?oi=bibs&hl=en&cites=13406262518879209182&as_sdt=5" target="_blank"> Automated test case generation and optimization: a comparative review </a><br /> <span>Rajesh Kumar Sahoo, Deeptimanta Ojha, Durga Prasad Mohapatra, Manas Ranjan Patra, IJCSIT Journal, Vol 8, No 5, October 2016, PP. 19-32 <br />DOI : 10.5121/ijcsit.2016.8502 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.com/scholar?oi=bibs&hl=en&cites=16381300618331229967&as_sdt=5" target="_blank">Eco-Strategy: Towards a New Generation Managerial Model Based on Green IT and CSR</a><br /> <span>Rachid Hba, Abderrazak Bakkas, Abdellah El Manouar, Mohammed Abdou Janati Idrissi,IJCSIT Journal, Vol 8, No 2, April 2016, PP. 51-62<br />DOI : 10.5121/ijcsit.2016.8204 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.com/scholar?oi=bibs&hl=en&cites=5535692404335135394&as_sdt=5" target="_blank">Intrusion detection using feature selection and machine learning algorithm with misuse detection</a><br /> <span>Harvinder Pal Singh Sasan and Meenakshi Sharma, IJCSIT Journal, Vol 8, No 1, February 2016, PP. 17 -25<br />DOI : 10.5121/ijcsit.2016.8102 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.com/scholar?oi=bibs&hl=en&cites=2007474207705083671&as_sdt=5" target="_blank">Extracting Arabic relations from the web</a><br /> <span>Shimaa M. Abd El-salam, Enas M.F. El Houby, A.K. Al sammak and T.A. El-shishtawy, IJCSIT Journal, Vol 8, No 1, February 2016, PP. 85 105<br />DOI : 10.5121/ijcsit.2016.8107 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.com/scholar?oi=bibs&hl=en&cites=3412654054340777322&as_sdt=5" target="_blank">Amazigh part-of-speech tagging using markov models and decision trees</a><br /> <span>Samir AMRI, Lahbib ZENKOUAR, Mohamed OUTAHAJALA, IJCSIT Journal, Vol 8, No 5, October 2016, PP. 61 -71<br />DOI : 10.5121/ijcsit.2016.8505</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.com/scholar?oi=bibs&hl=en&cites=844654102134198929&as_sdt=5" target="_blank">Examine Website Quality on M-Banking Services Adoption in Bangladesh</a><br /> <span>Mohammad Abdullah Mahfuz, Liza Khanam and Wang Hu, IJCSIT Journal, Vol 8, No 2, April 2016, PP. 33 -50<br />DOI : 10.5121/ijcsit.2016.8203 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.com/scholar?oi=bibs&hl=en&cites=16363918133408880274&as_sdt=5" target="_blank">The Importance of Neutral Class in Sentiment Analysis of Arabic Tweets</a><br /> <span>Hamed AL-Rubaiee, Renxi Qiu, and Dayou Li, IJCSIT Journal, Vol 8, No 2, April 2016, PP. 17 -31<br />DOI : 10.5121/ijcsit.2016.8202 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.com/scholar?oi=bibs&hl=en&cites=3801040689090992602&as_sdt=5" target="_blank">A Study of the Reliability and Validity of the Leader-Member Exchange (LMX) Instrument in Arabic</a><br /> <span>AreejAlshamasi and NahlaAljojo, IJCSIT Journal, Vol 8, No 1, February 2016, PP. 55 -73<br />DOI : 10.5121/ijcsit.2016.8105 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.com/scholar?oi=bibs&hl=en&cites=1607526140938595799&as_sdt=5" target="_blank">An Evaluation Study of General Software Project Risk Basedon Software Practitioners Experiences</a><br /> <span>Sahand Vahidnia and Ömer Özgür Tanrıöver and I. N. Askerzade, IJCSIT Journal, Vol 8, No 6, December 2016, PP. 1 -13<br />DOI : 10.5121/ijcsit.2016.8601 </span></b></p></td></tr></table> <h4>Most Cited Articles - 2015</h4> <table class="show" align="center" width="100%" > <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Cross+Platform+App+%3A+A+Comparative+Study&btnG=" target="_blank">Cross Platform App : A Comparative Study</a><br> <span>Paulo R. M. de Andrade and Adriano B. Albuquerque, IJCSIT Journal, Vol 7, No 1, February 2015, PP. 33-40<br>DOI : 10.5121/ijcsit.2015.7104</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Review+of+Lane+Detection+and+Tracking+Algorithms+in+Advanced+Driver+Assistance+System&btnG=" target="_blank">Review of Lane Detection and Tracking Algorithms in Advanced Driver Assistance System</a><br> <span>Ammu M Kumar and Philomina Simon, IJCSIT Journal, Vol 7, No 4, August 2015, PP. 65-78<br>DOI : 10.5121/ijcsit.2015.7406</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Applying+the+Technology+Acceptance+Model+to+Understand+Social+Networking+Sites+%28SNS%29+Usage%3A+Impact+of+Perceived+Social+Capital&btnG=" target="_blank">Applying the Technology Acceptance Model to Understand Social Networking Sites (SNS) Usage: Impact of Perceived Social Capital</a><br> <span>Waleed Al-Ghaith, IJCSIT Journal, Vol 7, No 4, August 2015, PP. 105-117<br>DOI : 10.5121/ijcsit.2015.7409 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Iris+Recognition+for+Personal+Identification+Using+Lamstar+Neural+Network&btnG=" target="_blank">Iris Recognition for Personal Identification Using Lamstar Neural Network</a><br> <span>Shideh Homayon, IJCSIT Journal, Vol 7, No 1, February 2015, PP. 01-08<br>DOI : 10.5121/ijcsit.2015.7101</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Evaluation+of+Two-Level+Global+Load+Balancing+Framework+in+Cloud+Environment&btnG=" target="_blank">Evaluation of Two-Level Global Load Balancing Framework in Cloud Environment</a><br> <span>Po-Huei Liang and Jiann-Min Yang, IJCSIT Journal, Vol 7, No 2, April 2015, PP. 01-11<br>DOI : 10.5121/ijcsit.2015.7201</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Instructor+Perspectives+of+Mobile+Learning+Platform%3A+An+Empirical+Study&btnG=" target="_blank">Instructor Perspectives of Mobile Learning Platform: An Empirical Study</a><br> <span>Muasaad Alrasheedi, IJCSIT Journal, Vol 7, No 3, June 2015 PP. 27-40<br>DOI : 10.5121/ijcsit.2015.7303</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Preprocessing+for+PPM%3A+Compressing+Utf-8+Encoded+Natural+Language+Text&btnG=" target="_blank"> Preprocessing for PPM: Compressing Utf-8 Encoded Natural Language Text</a><br> <span>William J.Teahan and Khaled M.Alhawiti, IJCSIT Journal, Vol 7, No 2, April 2015 PP. 41-51<br>DOI : 10.5121/ijcsit.2015.7204</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=A+Survivability+Model+for+Saudi+ICT+Startups&btnG=" target="_blank"> A Survivability Model for Saudi ICT Startups</a><br> <span>Sara Almakenzi and Arif Bramantoro and Waleed Rashideh, IJCSIT Journal, Vol 7, No 2, April 2015 PP. 145-157<br>DOI : 10.5121/ijcsit.2015.7213</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Encryption-Decryption+RGB+Color+Image+Using+Matrix+Multiplication&btnG=" target="_blank"> Encryption-Decryption RGB Color Image Using Matrix Multiplication</a><br> <span>Mohamad M. AL-Laham, IJCSIT Journal, Vol 7, No 5, October 2015 PP. 109-119<br>DOI : 10.5121/ijcsit.2015.7508</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Map-Reduce+Implementations%3A+Survey+and+Performance+Comparison&btnG=" target="_blank"> Map-Reduce Implementations: Survey and Performance Comparison</a><br> <span>Zeba Khanam and Shafali Agarwal, IJCSIT Journal, Vol 7, No 4, August 2015 PP. 119-126<br>DOI : 10.5121/ijcsit.2015.7410</span></b></p></td></tr> </table> <h4>Most Cited Articles - 2014</h4> <table class="show" align="center" width="100%" > <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Performance+Analysis+of+Wind+Turbine+as+a+Distributed+Generation+Unit+in+Distribution+System&btnG=" target="_blank">Performance Analysis of Wind Turbine as a Distributed Generation Unit in Distribution System</a><br> <span>Ramadoni Syahputra, Imam Robandi and Mochamad Ashari, IJCSIT Journal, Vol 6, No 3, June 2014, PP. 39-56<br>DOI : 10.5121/ijcsit.2014.6303</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Information+security+risk+analysis+methods+and+research+trends%3A+AHP+and+fuzzy+comprehensive+method&btnG=" target="_blank">Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method</a><br> <span>Ming-Chang Lee, IJCSIT Journal, Vol 6, No1, February 2014, PP. 29-45<br>DOI : 10.5121/ijcsit.2014.6103</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=State+of+the+art+of+learning+styles-based+adaptive+educational+hypermedia+systems+%28LS-BAEHSs%29&btnG=" target="_blank">State of the art of learning styles-based adaptive educational hypermedia systems (LS-BAEHSs)</a><br> <span>Ahmed Al-Azawei and Atta Badii, IJCSIT Journal, Vol 6, No 3, June 2014, PP. 01-19<br>DOI : 10.5121/ijcsit.2014.6301</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=State+of+the+art+of+agile+governance%3A+a+systematic+review&btnG=" target="_blank">State of the art of agile governance: a systematic review</a><br> <span>Alexandre J. H. de O. Luna, Philippe Kruchten, Marcello L. G. do E.Pedrosa, Humberto R. de Almeida Neto and Hermano P. de Moura, IJCSIT Journal, Vol 6, No 5, October 2014, PP. 121-141<br>DOI : 10.5121/ijcsit.2014.6510</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=What+Facilitates+the+Delivery+of+Citizen-Centric+EGovernment+Services+in+Developing+Countries%3A+Model+Development+and+Validation+Through+Structural+Equation+Modeling&btnG=" target="_blank">What Facilitates the Delivery of Citizen-Centric EGovernment Services in Developing Countries: Model Development and Validation Through Structural Equation Modeling</a><br> <span>Yousef Elsheikh and Mohammad Azzeh, IJCSIT Journal, Vol 6, No1, February 2014 , PP. 77-98<br>DOI : 10.5121/ijcsit.2014.6106</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Arabic+text+categorization+algorithm+using+vector+evaluation+method&btnG=" target="_blank">Arabic text categorization algorithm using vector evaluation method</a><br> <span>Ashraf Odeh, Aymen Abu-Errub, Qusai Shambour and Nidal Turab, IJCSIT Journal, Vol 6, No 6, December 2014, PP. 83-92<br>DOI : 10.5121/ijcsit.2014.6606</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Business+Bankruptcy+Prediction+Based+on+Survival+Analysis+Approach&btnG=" target="_blank">Business Bankruptcy Prediction Based on Survival Analysis Approach</a><br> <span>Ming-Chang Lee, IJCSIT Journal, Vol 6, No 2, April 2014, PP. 103-119<br>DOI : 10.5121/ijcsit.2014.6207</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Shape-Based+Plagiarism+Detection+for+Flowchart+Figures+in+Texts&btnG=" target="_blank">Shape-Based Plagiarism Detection for Flowchart Figures in Texts</a><br> <span>Senosy Arrish, Fadhil Noer Afif, Ahmadu Maidorawa and Naomie Salim, IJCSIT Journal, Vol 6, No 1, February 2014, PP. 113-124<br>DOI : 10.5121/ijcsit.2014.6108 </span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=A+guide+to+deal+with+uncertainties+in+software+project+management&btnG=" target="_blank">A guide to deal with uncertainties in software project management</a><br> <span>Marcelo Marinho, Suzana Sampaio, Telma Lima and Hermano de Moura, IJCSIT Journal, Vol 6, No 5, October 2014, PP. 01-20<br>DOI : 10.5121/ijcsit.2014.6501</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Review+of+Closed+Circuit+Television+%28CCTV%29+Techniques+for+Vehicles+Traffic+Management&btnG=" target="_blank">A guide to deal with uncertainties in software project management</a><br> <span>Heba A. Kurdi, IJCSIT Journal, Vol 6, No 2, April 2014, PP. 199-206<br>DOI : 10.5121/ijcsit.2014.6216</span></b></p></td></tr> </table> <h4>Most Cited Articles - 2013</h4> <table class="show" align="center" width="100%" > <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Security+threats+on+cloud+computing+vulnerabilities&btnG=" target="_blank">Security threats on cloud computing vulnerabilities</a><br> <span>Te-Shun Chou, IJCSIT Journal, Vol 5, No 3, June 2013, PP. 79-88<br>DOI : 10.5121/ijcsit.2013.5306</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=A+Neuro-Fuzzy+Approach+For+the+Fault+Location+Estimation+of+Unsynchronized+Two-Terminal+Transmission+Lines&btnG=" target="_blank">A Neuro-Fuzzy Approach For the Fault Location Estimation of Unsynchronized Two-Terminal Transmission Lines</a><br> <span>Ramadoni Syahputra, IJCSIT Journal, Vol 5, No 1, February 2013, PP. 23-37<br>DOI : 10.5121/ijcsit.2013.5102</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Automatic+Detection+of+Microaneurysms+and+Hemorrhages+in+Color+Eye+Fundus+Images&btnG=" target="_blank">Automatic Detection of Microaneurysms and Hemorrhages in Color Eye Fundus Images</a><br> <span>Sérgio Bortolin Júnior and Daniel Welfer, IJCSIT Journal, Vol 5, No 5, October 2013, PP. 21-37<br>DOI : 10.5121/ijcsit.2013.5502</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=A+systematic+mapping+study+on+business+process+variability&btnG=" target="_blank">A systematic mapping study on business process variability</a><br> <span>George Valença, Carina Alves, Vander Alves and Nan Niu, IJCSIT Journal, Vol 5, No 1, February 2013, PP. 01-21<br>DOI : 10.5121/ijcsit.2013.5101</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Multi-topic+multi-document+summarizer&btnG=" target="_blank">Multi-topic multi-document summarizer</a><br> <span>Fatma El-Ghannam and Tarek El-Shishtawy, IJCSIT Journal, Vol 5, No 6, December 2013, PP. 77-90<br>DOI : 10.5121/ijcsit.2013.5606</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Comparative+study+of+backpropagation+algorithms+in+neural+network+based+identification+of+power+system&btnG=" target="_blank">Comparative study of backpropagation algorithms in neural network based identification of power system</a><br> <span>Sheela Tiwari, Ram Naresh, Rameshwar Jha, IJCSIT Journal, Vol 5, No 4, August 2013, PP. 93-107<br>DOI : 10.5121/ijcsit.2013.5407</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Concept-based+indexing+in+text+information+retrieval&btnG=" target="_blank">Concept-based indexing in text information retrieval</a><br> <span>Fatiha Boubekeur and Wassila Azzoug, IJCSIT Journal, Vol 5, No 1, February 2013, PP. 119-136<br>DOI : 10.5121/ijcsit.2013.5110</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=A+Preliminary+Survey+on+Optimized+Multiobjective+Metaheuristic+Methods+for+Data+Clustering+Using+Evolutionary+Approaches&btnG=" target="_blank">A Preliminary Survey on Optimized Multiobjective Metaheuristic Methods for Data Clustering Using Evolutionary Approaches</a><br> <span>Ramachandra Rao Kurada, Dr. K Karteeka Pavan and Dr. AV Dattareya Rao, IJCSIT Journal, Vol 5, No 5, October 2013, PP. 57-77<br>DOI : 10.5121/ijcsit.2013.5504</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Diagnosis+of+Some+Diseases+in+Medicine+via+computerized+Experts+System&btnG=" target="_blank">Diagnosis of Some Diseases in Medicine via computerized Experts System</a><br> <span>R.A. Soltan, M. Z. Rashad and B.El-Desouky, IJCSIT Journal, Vol 5, No 5, October 2013, PP. 79-90<br>DOI : 10.5121/ijcsit.2013.5505</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=AdaBoost+ensemble+with+simple+genetic+algorithm+for+student+prediction+model&btnG=" target="_blank">AdaBoost ensemble with simple genetic algorithm for student prediction model</a><br> <span>AhmedSharaf ElDen, Malaka A. Moustafa, Hany M. Harb and AbdelH.Emara, IJCSIT Journal, Vol 5, No 2, April 2013, PP. 73-85<br>DOI : 10.5121/ijcsit.2013.5207</span></b></p></td></tr> </table> <h4>Most Cited Articles - 2012</h4> <table class="show" align="center" width="100%" > <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Fuzzy+multi-objective+approach+for+the+improvement+of+distribution+network+efficiency+by+considering+DG&btnG=" target="_blank">Fuzzy multi-objective approach for the improvement of distribution network efficiency by considering DG</a><br> <span>Ramadoni Syahputra, IJCSIT Journal, Vol 4, No 21, April 2012, PP. 57-68<br>DOI : 10.5121/ijcsit.2012.4205</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Enhancement+of+images+using+morphological+transformation&btnG=" target="_blank">Enhancement of images using morphological transformation</a><br> <span>K.Sreedhar and B.Panlal, IJCSIT Journal, Vol 4, No 1, Feb 2012, PP. 33-50<br>DOI : 10.5121/ijcsit.2012.4103</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=A+Qualitative+Study+of+LP-ITS%3A+Linear+Programming+Intelligent+Tutoring+System&btnG=" target="_blank">A Qualitative Study of LP-ITS: Linear Programming Intelligent Tutoring System</a><br><span>Samy S. Abu Naser, IJCSIT Journal, Vol 4, No 1, Feb 2012, PP. 209-220<br>DOI : 10.5121/ijcsit.2012.4116</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Biometric+authentication+through+a+virtual+keyboard+for+smartphones&btnG=" target="_blank">Biometric authentication through a virtual keyboard for smartphones</a><br> <span>Matthias Trojahn and Frank Ortmeier, IJCSIT Journal, Vol 4, No 5, October 2012, PP. 01-12<br>DOI : 10.5121/ijcsit.2012.4501</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Cost+breakdown+of+public+cloud+computing+and+private+cloud+computing+and+security+issues&btnG=" target="_blank">Cost breakdown of public cloud computing and private cloud computing and security issues</a><br> <span>Swarnpreet Singh and Tarun Jangwa, IJCSIT Journal, Vol 4, No 2, April 2012, PP. 17- 31<br>DOI : 10.5121/ijcsit.2012.4202</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Embedded+controller+for+vehicle+In-Front+obstacle+detection+and+cabin+safety+alert+system&btnG=" target="_blank">Embedded controller for vehicle In-Front obstacle detection and cabin safety alert system</a><br> <span>V.Ramya, B. Palaniappan, K. Karthick, IJCSIT Journal, Vol 4, No 2, April 2012, PP.117-131 <br>DOI : 10.5121/ijcsit.2012.4210</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Training+a+feed-forward+neural+network+with+artificial+bee+colony+based+backpropagation+method&btnG=" target="_blank">Training a feed-forward neural network with artificial bee colony based backpropagation method</a><br> <span>Sudarshan Nandy, Partha Pratim Sarkar and Achintya Das, IJCSIT Journal, Vol 4, No 4, August 2012, PP. 33-46<br>DOI : 10.5121/ijcsit.2012.4404</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=Evaluation+of+Information+Retrieval+Systems&btnG=" target="_blank">Evaluation of information retrieval systems</a><br> <span>Keneilwe Zuva and Tranos Zuva, IJCSIT Journal, Vol 4, No 3, June 2012, PP. 35-43<br>DOI : 10.5121/ijcsit.2012.4304</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=A+neuro-fuzzy+inference+model+for+breast+cancer+recognition&btnG=" target="_blank">A neuro-fuzzy inference model for breast cancer recognition</a><br> <span>Bekaddour Fatima and Chikh Mohammed Amine, IJCSIT Journal, Vol 4, No 5, October 2012, PP. 163-173<br>DOI : 10.5121/ijcsit.2012.4513</span></b></p></td></tr> <tr><td><p><b><a href="https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=An+Approach+for+agile+SOA+development+using+agile+principals&btnG=" target="_blank">An Approach for agile SOA development using agile principals</a><br> <span>Majlesi Shahrbanoo, Mehrpour Ali and Mohsenzadeh Mehran, IJCSIT Journal, Vol 4, No 1, Feb 2012, PP. 237-244<br>DOI : 10.5121/ijcsit.2012.4118</span></b></p></td></tr></table> <h4>Most Cited Articles - 2011</h4> <table class="show" align="center" width="100%" > <tr><td><p><b><a href="http://scholar.google.com/scholar?hl=en&q=IRIS+Recognition+Based+On+LBP+and+Combined+LVQ+Classifier&btnG=" target="_blank">IRIS Recognition Based On LBP and Combined LVQ Classifier</a><br /> <span>M. Z. Rashad, M. Y. Shams, O. Nomir and R. M. El-Awady IJCSIT Journal, Vol 3, No 5, October 2011, PP. 67-78<br />DOI : 10.5121/ijcsit.2011.3506</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=9958275878639499782&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Common Phases of Computer Forensics Investigation Models</a><br /> <span>Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 17 - 31<br />DOI : 10.5121/ijcsit.2011.3302</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=4314471168678701907&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Plants Images Classification Based on Textural Features using Combined Classifier</a><br /> <span>M. Z. Rashad,B.S.el-Desouky,Manal and S .Khawasik, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 93 - 100<br />DOI : 10.5121/ijcsit.2011.3407</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=11605109261827403157&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Php Framework for Database Management Based on Mvc Pattern</a><br /> <span>Chanchai Supaartagorn, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 251 - 258<br />DOI : 10.5121/ijcsit.2011.3219</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=5940773995861111479&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Wavelet Based Spectrum Sensing Techniques for Cognitive Radio - A Survey</a><br /> <span>Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, IJCSIT Journal, Vol 3, No 2, April 2011, PP. 123 - 137<br />DOI : 10.5121/ijcsit.2011.3209</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=511703513734371923&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Research Review for Digital Image Segmentation Techniques</a><br /> <span>Ashraf A. Aly,Safaai Bin Deris and Nazar Zaki, IJCSIT Journal, Vol 3, No 5, Oct 2011, PP. 99-106<br />DOI : 10.5121/ijcsit.2011.3509</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=1732849250885602216&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Machine Learning Methods for Spam E-Mail Classification</a><br /> <span>W.A. Awad and S.M. ELseuofi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 174-184</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=17716231962321292731&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network</a><br /> <span>Al Mutaz M. Abdalla, Safaai Dress and Nazar Zaki, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 176,186<br />DOI : 10.5121/ijcsit.2011.3312</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=18296704989911236260&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Performance Analysis of Various Data Mining Classification Techniques on Healthcare Data</a><br /> <span>Shelly Gupta,Dharminder Kumar and Anand Sharma, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 155-169<br />DOI : 10.5121/ijcsit.2011.3413</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=6083675592373376923&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Focused Web Crawling Using Decay Concept and Genetic Programming</a><br /> <span>Mahdi Bazarganigilani, Ali Syed and Sandid Burki Vol.1, No.1, January 2011, PP. 1-12</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=17076194868436666762&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network</a><br /> <span>J.Pradeep,E.Srinivasan and S.Himavathi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 27-38<br />DOI : 10.5121/ijcsit.2011.3103</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=4443371434491451204&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">A Comparative Experiment of Several Shape Methods in Recognizing Plants</a><br /> <span>A. Kadir,L.E.NugrohoA.Susanto and P.I.Santosa, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 256-263<br />DOI : 10.5121/ijcsit.2011.3318</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=17977045510496524872&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Ubiquitous Mobile Health Monitoring System for Elderly (Umhmse)</a><br /> <span>Abderrahim Bourouis,Mohamed Feham and Abdelhamid Bouchachia, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 74-82<br />DOI : 10.5121/ijcsit.2011.3306</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=11456771790673160656&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Information Security Plan for Flight Simulator Applications</a><br /> <span>Jason Slaughter,Syed (Shawon) and M. Rahman, IJCSIT Journal, Vol 3, No 3, June 2011, PP. 1-15<br />DOI : 10.5121/ijcsit.2011.3301</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=15976081853577461289&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Improving the Character Recognition Efficiency of Feed Forward Bp Neural Network</a><br /> <span>Amit Choudhary and Rahul Rishi, IJCSIT Journal, Vol 3, No 1, Feb 2011, PP. 85-96<br />DOI : 10.5121/ijcsit.2011.3107</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=14045328569584534631&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Hybrid GPS-GSM Localization of Automobile Tracking System</a><br /> <span>Mohammad A. Al-Khedher, IJCSIT Journal, Vol 3, No 6, Dec 2011, PP. 75-85<br />DOI : 10.5121/ijcsit.2011.3606</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=6405414983342154773&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Dna Lossless Differential Compression Algorithm Based on Similarity of Genomic Sequence Database</a><br /> <span>Heba Afify,Muhammad Islam and Manal Abdel Wahed, IJCSIT Journal, Vol 3, No 4, August 2011, PP. 145-154<br />DOI : 10.5121/ijcsit.2011.3412</span></b></p></td></tr></table> <h4>Most Cited Articles - 2010</h4> <table class="show" align="center" width="100%" > <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=4575113201517101334&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">An Efficient Gait Recognition System for Human Identification using Modified ICA</a><br /> <span>M.Pushpa Rani and G.Arumugam, IJCSIT Journal, Vol 2,no 1,february 2010, PP. 55 - 67</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=8825032428204052225&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Human Facial Experssion Detection from Detected in Captured Image using Back Propagation Neural Network</a><br /> <span>Jagdish Lal Raheja and Umesh Kumar, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 116 - 123</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=1953013105015440104&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">A Mobility - Based Checkpointing Protocol for Mobile Computing System</a><br /> <span>Suparna Biswas and Sarmistha Neogy, IJCSIT Journal, Vol 2, no 1,february 2010, PP. 135 - 151</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=5512921978295137232&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">A New Dct-Based Watermarking Method For Copyright Protection Of Digital Audio</a><br /> <span>Pranab Kumar Dhar,Mohammad Ibrahim Khan and Saif Ahmad, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 91 - 101<br />DOI : 10.5121/ijcsit.2010.2507</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=11175423312314041656&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy</a><br /> <span>S.Veeramalai,N.Jaisankar and A.Kannan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 60 - 74<br />DOI : 10.5121/ijcsit.2010.2406</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=7444580272850841330&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Performance Evaluation of Routing Protocols in Wireless Sensor Networks</a><br /> <span>Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 64 - 73 <br />DOI : 10.5121/ijcsit.2010.2206</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=10556217503413911315&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Agent based trust management framework in distributed E-Business environment</a><br /> <span>E.Sathiyamoorthy,N.Ch.Sriman Narayana Iyenger and V.Ramachandran, IJCSIT Journal, vol 2, no 2, feb 2010, PP. 14 - 28</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=4583165629019850108&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Use of Smart Antennas in Ad Hoc Networks</a><br /> <span>Mohammed Ali Hussain,P.Suresh Varma,K. Satya Rajesh,Hussain Basha Pathan and Leela Madhav Sarraju, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 47 - 54<br />DOI : 10.5121/ijcsit.2010.2605</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=1049723846656213275&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">An Optimized Distributed Association Rule Mining Algorithm In Parallel and Distributed Data Mining With Xml Data for Improved Response Time</a><br /> <span>Sujni Paul, IJCSIT Journal, Volume 2, Number 2, April 2010, PP. 88 - 101<br />DOI : 10.5121/ijcsit.2010.2208</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=8070616999710867645&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Performance Analysis of Multimedia Compression Algorithms</a><br /> <span>Eman Abdelfattah and Asif Mohiuddin, IJCSIT Journal, Vol.2, No.5, October 2010, PP. 1-10<br />DOI : 10.5121/ijcsit.2010.2501</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=16794880317918715007&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">A Survey of Qos Routing Protocols for Mobile Ad Hoc Networks</a><br /> <span>G. Santhi and Alamelu Nachiappan, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 125-136<br />DOI : 10.5121/ijcsit.2010.2411</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=9746501752933326011&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Some Observations on Open Source Software Development on Software Engineering Perspectives</a><br /> <span>Vinay Tiwari, IJCSIT Journal, Vol 2, No 6, December 2010, PP. 113-125<br />DOI : 10.5121/ijcsit.2010.2611 <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=9750137020717604518&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">M-Learning: A New Paradigm of Learning Mathematics in Malaysia </a><br /> <span>Saipunidzam Mahamad,Mohammad Noor Ibrahim and Shakirah Mohd Taib, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 76-86<br />DOI : 10.5121/ijcsit.2010.2407 <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=939163493326856017&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm</a><br /> <span>Sandeep Singh Rawat and Lakshmi Rajamani, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 28-37<br />DOI : 10.5121/ijcsit.2010.2403</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=794272730662773370&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms</a><br /> <span>Rahmat Widia Sembiring,Jasni Mohamad Zain and Abdullah Embong, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 162-170<br />DOI : 10.5121/ijcsit.2010.2414</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=2085850977004338069&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">An Applied Study On Educational Use Of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication</a><br /> <span>Murat Kayri and Ozlem Cakır, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 48,58<br />DOI : 10.5121/ijcsit.2010.2405</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=17828396854059198343&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Low Power Shift and Add Multiplier Design</a><br /> <span>C.N.Marimuthu,P.Thangaraj and Aswathy Ramesan, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 12,22<br />DOI : 10.5121/ijcsit.2010.2302</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=4641079210049812004&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Mining Target-Oriented Sequential Patterns With Time-Intervals</a><br /> <span>Hao-En Chueh, IJCSIT Journal, Vol.2, No.4, August 2010, PP. 113-123<br />DOI : 10.5121/ijcsit.2010.2410</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=14001895462247464135&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Implementing Evaluation a Wireless body sensor system for automated physiological data acquition at home</a><br /> <span>Chao Chen and Carlos Pomalaza-Raez, IJCSIT Journal, Volume 2, Number 3, June 2010, PP. 24-38<br />DOI : 10.5121/ijcsit.2010.2303</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=6302359491395123111&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues</a><br /> <span>Md.Headayetullah and G.K.Pradhan, IJCSIT Journal, Volume 2, Number 3, June 2010 , PP. 72-91<br />DOI : 10.5121/ijcsit.2010.2306</span></b></p></td></tr></table> <h4>Most Cited Articles - 2009</h4> <table class="show" align="center" width="100%" > <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=13322843383359186317&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Thesaurus and Query Expansion</a><br /> <span>Hazra Imran and Aditi Sharan, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 89 - 97</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=11560414947758183266&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach</a><br /> <span>A.Revathi,R.Ganapathy and Y.Venkataramani, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 30 - 42</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=17481451718136191579&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Analysis On Deployment Cost And Network Performance for Heterogeneous Wireless Sensor Networks</a><br /> <span>Dilip Kumar,Trilok.C Aseri and R.B Patel, IJCSIT Journal, Vol 1, No 2, November 2009, PP. 109 - 120</span></b></p></td></tr> <tr><td><p><b><a href="http://scholar.google.co.in/scholar?cites=6453291094762858392&as_sdt=2005&sciodt=0,5&hl=en" target="_blank">Ensemble Design for Intrusion Detection Systems</a><br /> <span>T. Subbulakshmi,A. Ramamoorthi and S.Mercy Shalinie, IJCSIT Journal, Vol 1, No 1, August 2009, PP. 1-9</span></b></p></td></tr></table> </div> <div id="right"> <div class="menu_right"> <ul><li><a href="ijcsit_forthcoming.html">Forthcoming Papers</a></li> <li><a href="csit_archives.html">Archives</a></li> <li><a href="http://aircconline.com/ijcsit/cita.html">Citation Count</a></li> </ul> </div><br /> </div> <div class="clear"></div> <div id="footer"><table width="100%" ><tr><td height="25" colspan="2"><br /><p align="center">® All Rights Reserved - AIRCC</p></td></table> </div> </div> </div> </div> </body> </html>