The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 1 Issue 6

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Pause Time Optimal Setting for AODV Protocol on RPGM Mobility Model in MANETs

Abstract: For the last few years, a number of routing protocols have been proposed and implemented for wireless mobile Ad hoc network. The motivation behind this paper is to discover and study the pause time effects on Ad hoc on Demand Distance Vector (AODV) protocol and find out the node pause time optimal setting for this protocol where Reference Point Group Mobility (RPGM) model uses as a reference model. In order to come across the best performance of a particular routing protocol, there a need to examine a number of parameters with different performance and analyze the optimal setting of that protocol and its network configuration environment. This experiment, the speed is fixed with 20 ms in all scenarios while the pause time is varying from scenario to another to observe the optimal setting of the pause time on protocol’s performance in this configuration. The outcome of the experiment are analyzed with different parameters such as varying number of nodes, increasing connections, increasing pause time and discussed the effects of the pause time. The results have shown that the value of the pause time can be affecting the performance of the protocol. In the experiment, we found that the lower pause time give better performance of the protocol. However, this paper is a part of ongoing research on AODV protocol in link failure. Thus, it is important to figure out the factors which can be involved the performance of the protocol.

Author 1: Sayid Mohamed Abdule
Author 2: Suhaidi Hassan
Author 3: Osman Ghazali
Author 4: Mohammed M. Kadhum

Keywords: MANETs, AODV, pause time, optimal settin, RPGM

PDF

Paper 2: Automating Legal Research through Data Mining

Abstract: The term legal research generally refers to the process of identifying and retrieving appropriate information necessary to support legal decision-making from past case records. At present, the process is mostly manual, but some traditional technologies such as keyword searching are commonly used to speed the process up. But a keyword search is not a comprehensive search to cater to the requirements of legal research as the search result includes too many false hits in terms of irrelevant case records. Hence the present generic tools cannot be used to automate legal research. This paper presents a framework which was developed by combining several ‘Text Mining’ techniques to automate the process overcoming the difficulties in the existing methods. Further, the research also identifies the possible enhancements that could be done to enhance the effectiveness of the framework.

Author 1: M F M Firdhous

Keywords: Text Mining; Legal Research; Term Weighting; Vector Space

PDF

Paper 3: Quantization Table Estimation in JPEG Images

Abstract: Most digital image forgery detection techniques require the doubtful image to be uncompressed and in high quality. However, most image acquisition and editing tools use the JPEG standard for image compression. The histogram of Discrete Cosine Transform coefficients contains information on the compression parameters for JPEGs and previously compressed bitmaps. In this paper we present a straightforward method to estimate the quantization table from the peaks of the histogram of DCT coefficients. The estimated table is then used with two distortion measures to deem images as untouched or forged. Testing the procedure on a large set of images gave a reasonable average estimation accuracy of 80% that increases up to 88% with increasing quality factors. Forgery detection tests on four different types of tampering resulted in an average false negative rate of 7.95% and 4.35% for the two measures respectively.

Author 1: Salma Hamdy
Author 2: Haytham El-Messiry
Author 3: Mohamed Roushdy
Author 4: Essam Kahlifa

Keywords: Digital image forensics; forgery detection; compression history; Quantization tables.

PDF

Paper 5: Modified ID-Based Public key Cryptosystem using Double Discrete Logarithm Problem

Abstract: In 1984, Shamir [1] introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify him self before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the “identity” of his communication partner and the public key of the KAC. There is no public file required in this system. However, Shamir did not succeed in constructing an identity based cryptosystem, but only in constructing an identity-based signature scheme. Meshram and Agrawal [4] have proposed an id - based cryptosystem based on double discrete logarithm problem which uses the public key cryptosystem based on double discrete logarithm problem. In this paper, we propose the modification in an id based cryptosystem based on the double discrete logarithm problem and we consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.

Author 1: Chandrashekhar Meshram

Keywords: Public key Cryptosystem, Identity based Cryptosystem, Discrete Logarithm Problem, Double Discrete Logarithm Problem.

PDF

Paper 6: Efficient Implementation of Sample Rate Converter

Abstract: Within wireless base station system design, manufacturers continue to seek ways to add value and performance while increasing differentiation. Transmit/receive functionality has become an area of focus as designers attempt to address the need to move data from very high frequency sample rates to chip processing rates. Digital Up Converter (DUC) and Digital Down Converter (DDC) are used as sample rate converters. These are the important block in every digital communication system; hence there is a need for effective implementation of sample rate converter so that cost can be reduced. With the recent advances in FPGA technology, the more complex devices providing high-speed as required in DSP applications are available. The filter implementation in FPGA, utilizing the dedicated hardware resources can effectively achieve application-specific integrated circuit (ASIC)-like performance while reducing development time cost and risks. So in this paper the technique for an efficient design of DDC for reducing sample rate is being suggested which meets the specifications of WiMAX system. Its effective implementation also ensures the pathway for the efficient applications in VLSI designs. Different design configurations for the sample rate converter are explored. The sample rate converter can be designed using half band filters, fixed FIR filters, poly-phase filters, CIC filters or even farrow filters.

Author 1: Charanjit singh
Author 2: Manjeet Singh patterh
Author 3: Sanjay Sharma

Keywords: WiMAX; Half Band filter; FIR filter; CIC Filter; Farrow Filter; FPGA

PDF

Paper 7: Cloud Computing Through Mobile-Learning

Abstract: Cloud computing is the new technology that has various advantages and it is an adoptable technology in this present scenario. The main advantage of the cloud computing is that this technology reduces the cost effectiveness for the implementation of the Hardware, software and License for all. This is the better peak time to analyze the cloud and its implementation and better use it for the development of the quality and low cost education for all over the world. In this paper, we discuss how to influence on cloud computing and influence on this technology to take education to a wider mass of students over the country. We believe cloud computing will surely improve the current system of education and improve quality at an affordable cost.

Author 1: N Mallikharjuna Rao
Author 2: C.Sasidhar
Author 3: V. Satyendra Kumar

Keywords: Cloud Computing, Education, SAAS, Quality Teaching, Cost effective Cloud, Mobile phone, Mobile Cloud

PDF

Paper 8: Robust R Peak and QRS detection in Electrocardiogram using Wavelet Transform

Abstract: In this paper a robust R Peak and QRS detection using Wavelet Transform has been developed. Wavelet Transform provides efficient localization in both time and frequency. Discrete Wavelet Transform (DWT) has been used to extract relevant information from the ECG signal in order to perform classification. Electrocardiogram (ECG) signal feature parameters are the basis for signal Analysis, Diagnosis, Authentication and Identification performance. These parameters can be extracted from the intervals and amplitudes of the signal. The first step in extracting ECG features starts from the exact detection of R Peak in the QRS Complex. The accuracy of the determined temporal locations of R Peak and QRS complex is essential for the performance of other ECG processing stages. Individuals can be identified once ECG signature is formulated. This is an initial work towards establishing that the ECG signal is a signature like fingerprint, retinal signature for any individual Identification. Analysis is carried out using MATLAB Software. The correct detection rate of the Peaks is up to 99% based on MIT-BIH ECG database.

Author 1: P Sasikala
Author 2: Dr. R.S.D. Wahidabanu

Keywords: Electrocardiogram, Wavelet Transform, QRS complex, Filters, Thresholds

PDF

Paper 9: Performance Evaluation of Node Failure Prediction QoS Routing Protocol (NFPQR) in Ad Hoc Networks

Abstract: The characteristics of ad hoc networks make the QoS support a very complex process unlike traditional networks. The nodes in ad hoc wireless networks have limited power capabilities. The node failure in the network leads to different problems such as network topology changes, network partitions, packet losses and low signal quality. Many QoS routing protocols like Predictive location based QoS routing protocol (PLBQR), Ticket based QoS routing, Trigger based distributed QoS routing (TDR) protocol ,Bandwidth routing(BR) protocol, Core extracted distributed routing (CEDAR) protocol have been proposed. However these algorithms do not consider the node failures and their consequences in the routing. Thus most of the routing protocols do not perform well in frequent or unpredictable node failure conditions. Node Failure Predication QoS Routing” (NFPQR) scheme provides an optimal route selection by predicting the possibility of failure of a node through its power level. The NFPQR protocol has been modified as C-NFPQR (Clustered NFPQR) in order to provide power optimization using clustered based approach. The performance of the NFPQR and C-NFPQR is evaluated through the same QoS parameters.

Author 1: Dr D Srinivas Rao
Author 2: Sake Pothalaiah

Keywords: NFPQ;, C-NFPQR; CEDAR; PLBQR; TDR; QoS; Routing Protocols

PDF

Paper 10: Microcontroller Based Home Automation System with Security

Abstract: With advancement of technology things are becoming simpler and easier for us. Automatic systems are being preferred over manual system. This unit talks about the basic definitions needed to understand the Project better and further defines the technical criteria to be implemented as a part of this project.

Author 1: Inderpreet Kaur

Keywords: Automation, 8051 microcontroller, LDR, LED, ADC, Relays, LCD display, Sensors, Stepper motor

PDF

Paper 11: Characterization and Architecture of Component Based Models

Abstract: Component based Software Engineering is the most common term nowadays in the field of software development. The CBSE approach is actually based on the principle of ‘Select and Use’ rather than ‘Design and Test’ as in traditional software development methods. Since this trend of using and ‘reusing’ components is in its developing stage, there are many advantages and problems as well that occur while use of components. Here is presented a series of papers that cover various important and integral issues in the field concerned. This paper is an introductory research on the essential concepts, principles and steps that underlie the available commercialized models in CBD. This research work has a scope extending to Component retrieval in repositories and their management and implementing the results verification.

Author 1: Er Iqbaldeep kaur
Author 2: Dr.P.K.Suri
Author 3: Er.Amit Verma

Keywords: Components, CBSD, CORBA, KOAYLA, EJB, Component retrieval, repositories etc.

PDF

Paper 12: Performance Improvement by Changing Modulation Methods for Software Defined Radios

Abstract: This paper describes an automatic switching of modulation method to reconfigure transceivers of Software Defined Radio (SDR) based wireless communication system. The programmable architecture of Software Radio promotes a flexible implementation of modulation methods. This flexibility also translates into adaptively, which is used here to optimize the throughput of a wireless network, operating under varying channel conditions. It is robust and efficient with processing time overhead that still allows the SDR to maintain its real-time operating objectives. This technique is studied for digital wireless communication systems. Tests and simulations using an AWGN channel show that the SNR threshold is 5dB for the case study.

Author 1: Bhalchandra B Godbole
Author 2: Dilip S. Aldar

Keywords: Wireless mobile communication, SDR, reconfigurability, modulation switching

PDF

Paper 13: Randomized Algorithmic Approach for Biclustering of Gene Expression Data

Abstract: Microarray data processing revolves around the pivotal issue of locating genes altering their expression in response to pathogens, other organisms or other multiple environmental conditions resulted out of a comparison between infected and uninfected cells or tissues. To have a comprehensive analysis of the corollaries of certain treatments, deseases and developmental stages embodied as a data matrix on gene expression data is possible through simultaneous observation and monitoring of the expression levels of multiple genes. Clustering is the mechanism of grouping genes into clusters based on different parameters. Clustering is the process of grouping genes into clusters either considering row at a time(row clustering) or considering column at a time(column clustering). The application of clustering approach is crippled by conditions which are unrelated to genes. To get better of these problems a unique form of clustering technique has evolved which offers simultaneous clustering (both rows and columns) which is known as biclustering. A bicluster is deemed to be a sub matrix consisting data values. A bicluster is resulted out of the removal of some of the rows as well as some of the columns of given data matrix in such a fashion that each row of what is left reads the same string. A fast, simple and efficient randomized algorithm is explored in this paper, which discovers the largest bicluster by random projections.

Author 1: Sradhanjali Nayak
Author 2: Debahuti Mishra
Author 3: Satyabrata Das
Author 4: Amiya Kumar Rath

Keywords: Bicluster; microarray data; gene expression; randomized algorithm

PDF

Paper 14: A Method of Genetic Algorithm (GA) for FIR Filter Construction: Design and Development with Newer Approaches in Neural Network Platform

Abstract: The main focus of this paper is to describe a developed and dynamic method of designing finite impulse response filters with automatic, rapid and less computational complexity by an efficient Genetic approach. To obtain such efficiency, specific filter coefficient coding scheme has been studied and implemented. The algorithm generates a population of genomes that represents the filter coefficient where new genomes are generated by crossover, mutation operations methods. Our proposed genetic technique has able to give better result compare to other method

Author 1: Ajoy Kumar Dey
Author 2: Avijit Saha
Author 3: Shibani Ghosh

Keywords: Genetic Algorithm; FIR: filter design; optimization; neural network.

PDF

Paper 15: Hybrid Technique for Human Face Emotion Detection

Abstract: This paper presents a novel approach for the detection of emotions using the cascading of Mutation Bacteria Foraging optimization and Adaptive Median Filter in highly corrupted noisy environment. The approach involves removal of noise from the image by the combination of MBFO & AMF and then detects local, global and statistical feature form the image. The Bacterial Foraging Optimization Algorithm (BFOA), as it is called now, is currently gaining popularity in the community of researchers, for its effectiveness in solving certain difficult real-world optimization problems. Our results so far show the approach to have a promising success rate. An automatic system for the recognition of facial expressions is based on a representation of the expression, learned from a training set of pre-selected meaningful features. However, in reality the noises that may embed into an image document will affect the performance of face recognition algorithms. As a first we investigate the emotionally intelligent computers which can perceive human emotions. In this research paper four emotions namely anger, fear, happiness along with neutral is tested from database in noisy environment of salt and pepper. Very high recognition rate has been achieved for all emotions along with neutral on the training dataset as well as user defined dataset. The proposed method uses cascading of MBFO & AMF for the removal of noise and Neural Networks by which emotions are classified.

Author 1: Renu Nagpal
Author 2: Pooja Nagpal
Author 3: Sumeet Kaur

Keywords: biomertics;adaptive median filter; bacteria foraging optimization;feature detection;facial expression

PDF

Paper 16: Design Strategies for AODV Implementation in Linux

Abstract: In a Mobile Ad hoc Network (MANET), mobile nodes constructing a network, nodes may join and leave at any time, and the topology changes dynamically. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In this paper, we explore the difficulties encountered in implementing MANET routing protocols in real oper¬ating systems, and study the common requirements im¬posed by MANET routing on the underlying operating system services. Also, it explains implementation techniques of the AODV protocol to determine the needed events, such as: Snooping, Kernel Modification, and Netfilter. In addition, this paper presents a discussion of the advantages as well as disadvantages of each implementation of this architecture in Linux.

Author 1: Ms Prinima Gupta
Author 2: Dr. R. K Tuteja

Keywords: Ad-hoc Networking, AODV, MANET.

PDF

Paper 17: Model Based Test Case Prioritization For Testing Component Dependency In CBSD Using UML Sequence Diagram

Abstract: Software maintenance is an important and costly activity of the software development lifecycle. To ensure proper maintenance the software undergoes regression testing. It is very inefficient to re execute every test case in regression testing for small changes. Hence test case prioritization is a technique to schedule the test case in an order that maximizes some objective function. A variety of objective functions are applicable, one such function involves rate of fault detection - a measure of how quickly faults are detected within the testing process. Early fault detection can provide a faster feedback generating a scope for debuggers to carry out their task at an early stage. In this paper we propose a method to prioritize the test cases for testing component dependency in a Component Based Software Development (CBSD) environment using Greedy Approach. An Object Interaction Graph (OIG) is being generated from the UML sequence diagrams for interdependent components. The OIG is traversed to calculate the total number of inter component object interactions and intra component object interactions. Depending upon the number of interactions the objective function is calculated and the test cases are ordered accordingly. This technique is applied to components developed in Java for a software system and found to be very effective in early fault detection as compared to non-prioritize approach.

Author 1: Arup Abhinna Acharya
Author 2: Vuda Sreenivasarao
Author 3: Namita Panda

Keywords: Regression Testing, Object Interaction Graph, Test Cases, CBSD

PDF

Paper 18: EM Wave Transport 2D and 3D Investigations

Abstract: Boltzmann Transport Equation [1-2] has been modelled in close conjunction with Maxwell’s equation, investigations for 2D and 3D transport carriers have been proposed. Exact solution of Boltzmann Equation still remains the core field of research. We have worked towards evaluation of 2D and 3D solutions of BTE. Application of our work can be extended to study the electromagnetic wave transport in upper atmosphere i.e. ionosphere. We have given theoretical and numerical analysis of probability density function, collision integral under various initial and final conditions. Modelling of coupled Boltzmann Maxwell’s equation taking binary collision and multi species collision terms has been evaluated. Solutions of Electric Field (E) and Magnetic Field (B) under coupled conditions have been obtained. PDF convergences under the absence of electric field have been sketched, with an iterative approach and are shown in figure 1. Also 3D general algorithm for solution of BTE has been suggested.

Author 1: Rajveer S Yaduvanshi
Author 2: Harish Parthasarathy

Keywords: Boltzmann Transport Equation, Probability Distribution Function, Coupled BTE-Maxwell’s.

PDF

Paper 19: A Study on Associative Neural Memories

Abstract: Memory plays a major role in Artificial Neural Networks. Without memory, Neural Network can not be learned itself. One of the primary concepts of memory in neural networks is Associative neural memories. A survey has been made on associative neural memories such as Simple associative memories (SAM), Dynamic associative memories (DAM), Bidirectional Associative memories (BAM), Hopfield memories, Context Sensitive Auto-associative memories (CSAM) and so on. These memories can be applied in various fields to get the effective outcomes. We present a study on these associative memories in artificial neural networks.

Author 1: B.D C.N Prasad
Author 2: P E S N Krishna Prasad
Author 3: Sagar Yeruva
Author 4: P Sita Rama Murty

Keywords: Associative memories; SAM; DAM; Hopfield model; BAM; Holographic Associative Memory (HAM); Context-sensitive Auto-associative Memory (CSAM); Context-sensitive Asynchronous Memory (CSYM)

PDF

Paper 20: Adaptive Channel Estimation Techniques for MIMO OFDM Systems

Abstract: In this paper, normalized least mean (NLMS) square and recursive least squares (RLS) adaptive channel estimator are described for multiple input multiple output (MIMO) orthogonal frequency division multiplexing (OFDM) systems. These CE methods uses adaptive estimator which are able to update parameters of the estimator continuously, so that the knowledge of channel and noise statistics are not necessary. This NLMS/RLS CE algorithm requires knowledge of the received signal only. Simulation results demonstrated that the RLS CE method has better performances compared NLMS CE method for MIMO OFDM systems. In addition, the utilizing of more multiple antennas at the transmitter and/or receiver provides a much higher performance compared with fewer antennas. Furthermore, the RLS CE algorithm provides faster convergence rate compared to NLMS CE method. Therefore, in order to combat the more channel dynamics, the RLS CE algorithm is better to use for MIMO OFDM systems.

Author 1: Md Masud Rana
Author 2: Md. Kamal Hosain

Keywords: MIMO; NLMS; OFDM; RLS

PDF

Paper 21: The Impact of Social Networking Websites to Facilitate the Effectiveness of Viral Marketing

Abstract: The Internet and the World Wide Web have become two key components in today's technology based organizations and businesses. As the Internet is becoming more and more popular, it is starting to make a big impact on people's day-to-day life. As a result of this revolutionary transformation towards the modern technology, social networking on the World Wide Web has become an integral part of a large number of people's lives. Social networks are websites which allow users to communicate, share knowledge about similar interests, discuss favorite topics, review and rate products/services, etc. These websites have become a powerful source in shaping public opinion on virtually every aspect of commerce. Marketers are challenged with identifying influential individuals in social networks and connecting with them in ways that encourage viral marketing content movement and there has been little empirical research study about of this website to diffuse of viral marketing content. In this article, we explore the role of social network websites which has influence on viral marketing, and the characteristics of the most influential users to spread share viral content. Structural equation modeling is used to examine the patterns of inter-correlations among the constructions and to empirically test the hypotheses.

Author 1: Abed Abedniya
Author 2: Sahar Sabbaghi Mahmouei

Keywords: Social networks website, viral marketing, structural equation modeling

PDF

Paper 22: A Face Replacement System Based on Face Pose Estimation

Abstract: Face replacement system plays an important role in the entertainment industries. However, most of these systems nowadays are assisted by hand and specific tools. In this paper, a new face replacement system for automatically replacing a face with image processing technique is described. The system is divided into two main parts: facial feature extraction and face pose estimation. In the first part, the face region is determined and the facial features are extracted and located. Eyes, mouth, and chin curve are extracted by their statistical and geometrical properties. These facial features are used as the information for the second part. A neural network is adopted here to classify the face pose according to the feature vectors which are obtained from the different ratio of facial features. From the experiments and some comparisons, they show that this system works better while dealing with different pose, especially for non-frontal face pose.

Author 1: Kuo Yu Chiu
Author 2: Shih-Che Chien
Author 3: Sheng-Fuu Lin

Keywords: Facial feature, Face replacement, Neural network, Support vector machine (SVM)

PDF

Paper 23: A Comprehensive Analysis of Spoofing

Abstract: The main intention of writing this paper is to enable the students, computer users and novice researchers about spoofing attacks. Spoofing means impersonating another person or computer, usually by providing false information (E-mail name, URL or IP address). Spoofing can take on many forms in the computer world, all of which involve some type false representation of information. There are a variety of methods and types of spoofing. We would like to introduce and explain following spoofing attacks in this paper: IP, ARP, E-Mail, Web, and DNS spoofing. There are no legal or constructive uses for implementing spoofing of any type. Some of the outcomes might be sport, theft, vindication or some other malicious goal. The magnitude of these attacks can be very severe; can cost us millions of dollars. This Paper describes about various spoofing types and gives a small view on detection and prevention of spoofing attacks.

Author 1: P Ramesh Babu
Author 2: D.Lalitha Bhaskari
Author 3: CH.Satyanarayana

Keywords: Spoofing, Filtering, Attacks, Information, Trust

PDF

Paper 24: Key Management Techniques for Controlling the Distribution and Update of Cryptographic keys

Abstract: Key management plays a fundamental role in cryptography as the basis for securing cryptographic techniques providing confidentiality, entity authentication, data origin authentication, data integrity, and digital signatures. The goal of a good cryptographic design is to reduce more complex problems to the proper management and safe-keeping of a small number of cryptographic keys, ultimately secured through trust in hardware or software by physical isolation or procedural controls. Reliance on physical and procedural security (e.g., secured rooms with isolated equipment), tamper-resistant hardware, and trust in a large number of individuals is minimized by concentrating trust in a small number of easily monitored, controlled, and trustworthy elements.

Author 1: T Lalith
Author 2: R.Umarani
Author 3: G.M.Kadharnawaz

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org