Academic Journals Database
Disseminating quality controlled scientific knowledge

Computer and Information Science

ISSN: 1913--8989
Publisher: Canadian Center of Science and Education


ADD TO MY LIST
 
Analysis of the Case Studies Video Recordings

Author(s): PaedDr. Petr Mach | Mgr. Regina Janíková
Volume: 5
Issue: 6
Year: 2012
Audio Fingerprint Extraction Using an Adapted Computational Geometry Algorithm

Author(s): Marios Poulos | Ioannis Deliyannis | Andreas Floros
Volume: 5
Issue: 6
Year: 2012
WCAG 2.0 Semi-automatic Accessibility Evaluation System: Design and Implementation

Author(s): Hend S. Al-Khalifa
Volume: 5
Issue: 6
Year: 2012
A Protection Method of Target Codes

Author(s): Ge Hongmei | Xu Chao | Shi Qian
Volume: 5
Issue: 6
Year: 2012
A Preference-Aware Interactive System for Online Shopping

Author(s): Eisa Alanazi | Malek Mouhoub | Bandar Mohammed
Volume: 5
Issue: 6
Year: 2012
Towards a Personal Knowledge Model (PKM) in Collaborative Environment of School Teachers’ Community

Author(s): Rusli Abdullah | Amir Mohamed Talib
Volume: 5
Issue: 6
Year: 2012
An Efficient Hybrid Detection System for Abnormal Masses in Digital and Analog Mammogram

Author(s): Ahmed S. Rashad | Rowayda A. Sadek | Sherif Abdel Aziz El-Sherif
Volume: 5
Issue: 6
Year: 2012
A Materialized View for the Same Generation Query in Deductive Databases

Author(s): Nabil Arman
Volume: 5
Issue: 6
Year: 2012
Research and Application of Contingency Plan Based on Hospital Network and Information System Security

Author(s): Xiaoyan Ma | Hao Zou | Yujuan Li
Volume: 4
Issue: 6
Year: 2011
Denoising, Segmentation and Characterization of Brain Tumor from Digital MR Images

Author(s): Rahul Malhotra | Minu Sethi | ParminderKumar Luthra
Volume: 4
Issue: 6
Year: 2011
ICT: Opportunities and Challenges of Third World Tertiary Institutions

Author(s): OBE O | SANGODOYIN O O | LASISI T A | SHANGODOYIN D K | ADEDOYIN O.O
Volume: 4
Issue: 6
Year: 2011
Computerized Summative Assessment of Multiple-choice Questions: Exploring Possibilities with the Zimbabwe School Examination Council Grade 7 Assessments

Author(s): Benjamin Tatira | Lillias Hamufari Natsai Mutambara | Conilius J. Chagwiza | Lovemore J. Nyaumwe
Volume: 4
Issue: 6
Year: 2011
The Operation Effectiveness Evaluation Based on Statistic Analysis

Author(s): Kai Cheng | Hongjun Zhang | Luyuan Zhang | Liang Wang
Volume: 4
Issue: 6
Year: 2011
Semi-Automatic Labeling of Training Data Sets in Text Classification

Author(s): Nayereh Ghahreman | Ahmad Baraani Dastjerdi
Volume: 4
Issue: 6
Year: 2011
A New Image Steganography Based on Decimal-Digits Representation

Author(s): Mohammed Abbas Fadhil Al-Husainy
Volume: 4
Issue: 6
Year: 2011
Cascade-Correlation Algorithm with Trainable Activation Functions

Author(s): Fanjun Li | Ying Li
Volume: 4
Issue: 6
Year: 2011
ZIVM: A Zero-Copy Inter-VM Communication Mechanism for Cloud Computing

Author(s): Hamid Reza Mohebbi | Omid Kashefi | Mohsen Sharifi
Volume: 4
Issue: 6
Year: 2011
Medical Images Compression Using Modified SPIHT Algorithm and Multiwavelets Transformation

Author(s): Muna F Al-sammaraie
Volume: 4
Issue: 6
Year: 2011
The Age or Excess of the M|G|inf Queue Busy Cycle Mean Value

Author(s): Manuel Alberto M. Ferreira | Marina Andrade | José António Filipe
Volume: 5
Issue: 5
Year: 2012
Finite Element Method for Internal Wave Equation for Stratified Fluid

Author(s): Dawletbay Utebaev
Volume: 5
Issue: 5
Year: 2012
A Kind of CTA Bone Removal Technology Based on the Improved Watershed Algorithm

Author(s): Tan Jianhao | Zhang Jing | Wang Ya
Volume: 5
Issue: 5
Year: 2012
Sigma-Delta Modulator Simulation and Analysis Using MatLab

Author(s): Thuneibat S. A. | Ababneh M. S.
Volume: 5
Issue: 5
Year: 2012
Evaluating Model for E-learning Modules According to Selected Criteria: An Object Oriented Approach

Author(s): Qabas Abdal Zahraa Jabbar
Volume: 5
Issue: 5
Year: 2012
Growth of ICT Capital and Deceleration of Labour Productivity in the EU Countries: The Missing Links

Author(s): Pradip Kumar Biswas | Alberto Moreira Baptista
Volume: 5
Issue: 5
Year: 2012
Air Traffic Forecast Empirical Research Based on the MCMC Method

Author(s): Jian-bo Wang | Chong-jun Fan | Lei Bai
Volume: 5
Issue: 5
Year: 2012
A Review of Users Adoption of Open Source Software in Africa

Author(s): John Kamau | Sylvester Namuye
Volume: 5
Issue: 5
Year: 2012
Characterization of Ventricular Tachycardia and Fibrillation Using Semantic Mining

Author(s): Mohd Afzan Othman | Norlaili Mat Safri | Ismawati Abdul Ghani | Fauzan Khairi Che Harun
Volume: 5
Issue: 5
Year: 2012
Hybrid-Based Compressed Domain Video Fingerprinting Technique

Author(s): Abbass S. Abbass | Aliaa A. A. Youssif | Atef Z. Ghalwash
Volume: 5
Issue: 5
Year: 2012
Automatic Measurement of Shoreline Change on Djerba Island of Tunisia

Author(s): Maged Bouchahma | Wanglin Yan
Volume: 5
Issue: 5
Year: 2012
Study on the Four-channel Skin-hearing Aid Based on Morse Codes

Author(s): Jianwen Li | Yuanyuan Hou | Jianghong Li
Volume: 4
Issue: 5
Year: 2011
Wireless Sensor Network for Continuous Monitoring a Patient’s Physiological Conditions Using ZigBee

Author(s): Ramanathan. P | Pradip Manjrekar.P
Volume: 4
Issue: 5
Year: 2011
A Simulation System of Social Economic

Author(s): Zhao MingXia | Qiuyan He
Volume: 4
Issue: 5
Year: 2011
The Necessity and the Scheme of Super Cloud and Super Cloud Language Existence

Author(s): Siqin Qimuge | Chunsheng Zhang
Volume: 4
Issue: 5
Year: 2011
Dynamic Maintenance and Evolution of Critical Components-Based Software Using Multi Agent Systems

Author(s): Chouarfia Abdallah | Hafida Bouziane
Volume: 4
Issue: 5
Year: 2011
Design of Time Division MUX and DEMUX for Large Optical Transceiver

Author(s): Haijian Yang
Volume: 4
Issue: 5
Year: 2011
Dynamic Response of Electromagnetic Launcher’s Rail Subjected to Cosine Pressure

Author(s): Wen Liu | Ligong Zhang | Xiangzhong Bai | Feng Liu
Volume: 4
Issue: 5
Year: 2011
Intelligent Control System of CNC Mill Machineing Based on the Feed-Driven Linear Motor

Author(s): Puxi Hu | Wei Qian | Jian Liao
Volume: 4
Issue: 5
Year: 2011
Design of the Wide-view Collimator Based on ZEMAX

Author(s): Xuemei Bai | Bin Guo | Zhiyong An
Volume: 4
Issue: 5
Year: 2011
Analysis of Intensity Modulation and Switched Fault Techniques for Different Optical Fiber Cables

Author(s): Rahul Malhotra | Subhash Singh | Harkirtan Singh | Parminder Kumar Luthra
Volume: 4
Issue: 5
Year: 2011
Wavelet Method for Nonlinear Partial Differential Equations of Fractional Order

Author(s): Wanhai Geng | Yiming Chen | Yulian Li | Dong Wang
Volume: 4
Issue: 5
Year: 2011
Information Technology Infrastructures and Knowledge Management: Towards Organizational Excellence

Author(s): Nour-Mohammad Yaghoubi | Badroddin Oraee Yazdani | Nasir Ahoorani | Seyyed Ali Banihashemi
Volume: 4
Issue: 5
Year: 2011
Medical Data Mining Based on Decision Tree Algorithm

Author(s): Ruijuan Hu
Volume: 4
Issue: 5
Year: 2011
Three-Dimensional Detection of Pulmonary Nodules in Chest CT Images

Author(s): Aliaa A. A. Youssif | Shereen A. Hussein | Ahmed S. Ibrahim
Volume: 4
Issue: 5
Year: 2011
Partitioned Methods in Computational Modelling on Fluid-Structure Interactions of Concrete Gravity-Dam

Author(s): W. Z. Lim | R. Y. Xiao | T. Hong | C. S. Chin
Volume: 6
Issue: 4
Year: 2013
An Approach of Failure-Analysis for the Real-Time Fire Reconnaissance Satellite-Monitoring System

Author(s): Omar Ariosto Niño Prieto | Luis Enrique Colmenares-Guillén | Edilberto Huerta Niño | Aldo Enrique Aguila Jurado
Volume: 6
Issue: 4
Year: 2013
Handling Safety-Related Requirements in Critical Systems Product Lines

Author(s): Ahmad Khader Haboush
Volume: 6
Issue: 4
Year: 2013
Abstract Sentence Classification for Scientific Papers Based on Transductive SVM

Author(s): Yuanchao Liu | Feng Wu | Ming Liu | Bingquan Liu
Volume: 6
Issue: 4
Year: 2013
Machine Vision System Based on the Parallel Shift Technology and Multiple Image Analysis

Author(s): Stepan Belan | Sergey Yuzhakov
Volume: 6
Issue: 4
Year: 2013
Research of the Stereo Measure Technology for Firearms Chamber

Author(s): Zhang Guangwei
Volume: 6
Issue: 4
Year: 2013
Testing of Event Detection Lateness in Wireless Sensor Networks

Author(s): Laye Hadji Diakite | Li Yu | Rabiu Haruna
Volume: 6
Issue: 4
Year: 2013
Monitoring and Analytical Evaluation of Interactivity Mediated by a Dynamic Hypermedia Device

Author(s): Guillermo L. Rodríguez | Patricia S. San Martín | Griselda Guarnieri
Volume: 6
Issue: 4
Year: 2013
A Survey of User Modelling in Social Media Websites

Author(s): Ahmad Abdel-Hafez | Yue Xu
Volume: 6
Issue: 4
Year: 2013
Data Mining Techniques and Preference Learning in Recommender Systems

Author(s): Bandar Mohammed | Malek Mouhoub | Eisa Alanazi | Samira Sadaoui
Volume: 6
Issue: 4
Year: 2013
Fuzzy Clustering of Students’ Data Repository for At-Risks Students Identification and Monitoring

Author(s): Udoinyang G. Inyang | Enobong E. Joshua
Volume: 6
Issue: 4
Year: 2013
Improvements Based on the Harris Algorithm

Author(s): Huai Yang Chen | Jinjie Chen
Volume: 6
Issue: 4
Year: 2013
Modeling and Generalized Predictive Control for Chilled Water in Central Air-conditioning System

Author(s): Bai Yan | Ren Qingchang | Ma Ke
Volume: 6
Issue: 4
Year: 2013
Architectural Limitations in Multi-User Computer-Aided Engineering Applications

Author(s): Edward Red | Greg Jensen | Prasad Weerakoon | David French | Steven Benzley | Karl Merkley
Volume: 6
Issue: 4
Year: 2013
A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET

Author(s): Davood Kheyri | Mojtaba Karami
Volume: 5
Issue: 4
Year: 2012
Rule Extraction on Numeric Datasets Using Hyper-rectangles

Author(s): Waldo Hasperué | Laura Cristina Lanzarini | Armando De Giusti
Volume: 5
Issue: 4
Year: 2012
Improved SOM-Based High-Dimensional Data Visualization Algorithm

Author(s): Wang Zhisheng | Xu Xiaobing
Volume: 5
Issue: 4
Year: 2012
Performance Comparison of Mobile Ad Hoc Network Routing Protocol and Transmission Control Protocol

Author(s): Akinwole A. K. | Emuoyibofarhe O. J.
Volume: 5
Issue: 4
Year: 2012
Morpho-Syntactic Analysis Framework for Tone Language Text-to-Speech Systems

Author(s): Moses Ekpenyong | Emem Obong Udoh
Volume: 5
Issue: 4
Year: 2012
Research and Implementation of the Cloud Platform Based on the B-learning

Author(s): Xu Chao | Ge Hongmei
Volume: 5
Issue: 4
Year: 2012
Data Intelligent Analysis for Decision-Making at Universities

Author(s): Latifa Oubedda | Brahim Erraha | Mohamed Khalfaoui
Volume: 5
Issue: 4
Year: 2012
Energy Efficient Fault Tolerant Routing Mechanism for Wireless Sensor Network

Author(s): Ahmed Roumane | Bouabdellah Kechar | Belkacem Kouninef
Volume: 5
Issue: 4
Year: 2012
Simulation and Visualization of Chaotic Systems

Author(s): Athanasios I. Margaris
Volume: 5
Issue: 4
Year: 2012
Type Systems Based Data Race Detector

Author(s): Mohamed A. El-Zawawy | Hamada A. Nayel
Volume: 5
Issue: 4
Year: 2012
File Security based on Pretty Good Privacy (PGP) Concept

Author(s): Shafinah Kamarudin | Mohd Ikram Mohammad
Volume: 4
Issue: 4
Year: 2011
The Role of Information Technology in Fulfilling the Promise of Corporate Social Responsibility

Author(s): David Salb | Hershey H. Friedman | Linda Weiser Friedman
Volume: 4
Issue: 4
Year: 2011
Designing And Implementing WBIs for Algorithms

Author(s): Kavita Saini | Abdul Wahid | G. N. Purohit
Volume: 4
Issue: 4
Year: 2011
Analysis on the Method and Importance of Practical Teaching in Vocational College

Author(s): Ruicheng Li
Volume: 4
Issue: 4
Year: 2011
A New Model for Automatic Sentence Segmentation

Author(s): Funkun Xing
Volume: 4
Issue: 4
Year: 2011
Web Server Logs Preprocessing for Web Intrusion Detection

Author(s): Shaimaa Ezzat Salama | Mohamed I. Marie | Laila M. El-Fangary | Yehia K. Helmy
Volume: 4
Issue: 4
Year: 2011
Study on the E-government Call Center System Based on SOA

Author(s): Feng Bao | Fengzhi Zhao
Volume: 4
Issue: 4
Year: 2011
Identifying the Re-usability of Triangle Scheme and Intersection Scheme on Mobile Device

Author(s): Lim Kah Seng | Norafida Ithnin | Hazinah Kutty Mammi
Volume: 4
Issue: 4
Year: 2011
Improvement of Mobility Management in Heterogeneous Wireless Networks by Using Multiple Attribute Decision Making

Author(s): Mojgan Taheri | Mohammad Ali Afshar Kazemi | Abbas Toloui Ashlaghi
Volume: 4
Issue: 4
Year: 2011
On The Design of User Experience Based Persuasive Systems

Author(s): Ahmad Jawdat | Qasem Obeidat | Alaa Aljanaby
Volume: 4
Issue: 4
Year: 2011
Design of the Distributed Control System Based on CAN Bus

Author(s): Liang Chen | Yingqing Guo
Volume: 4
Issue: 4
Year: 2011
An Agent-Based Simulation Model for Urban Traffic System

Author(s): Ali Bazghandi | Ali A. Pouyan
Volume: 4
Issue: 4
Year: 2011
Investigation of QoS Multicast Routing Based on Intelligent Multiple Constrained

Author(s): Firas Mahdi Muhsin Al-Salbi
Volume: 4
Issue: 4
Year: 2011
Web Based EIS to Support Entrepreneurs and SMEs Analysis

Author(s): Zahid Javed | M. Shakeel Faridi | M.Haris Abid | Shams-ul- Hassan | Abdul Hyee | Fahad Jan
Volume: 4
Issue: 4
Year: 2011
An Integrated Conceptual Model for Temporal Data Warehouse Security

Author(s): Marwa Salah Farhan | Mohamed E. Marie | Laila M. El-Fangary | Yehia K. Helmy
Volume: 4
Issue: 4
Year: 2011
Approach of RSOR Algorithm Using HSV Color Model for Nude Detection in Digital Images

Author(s): Pedro Ivan Tello Flores | Luis Enrique Colmenares Guillén | Omar Ariosto Niño Prieto
Volume: 4
Issue: 4
Year: 2011
Application of the Central Encryption System in the Dynamic Secret Sharing Scheme (II)

Author(s): Yulian Shang | Min Feng | Peng Li | Kaiquan Shi
Volume: 3
Issue: 4
Year: 2010
Sensor Networks Routing

Author(s): M R S Mitra | M N Santhi | M V P Kumar | P R Sudha
Volume: 3
Issue: 4
Year: 2010
The Research and Application of the Virtualization and Clustering on Linux Server

Author(s): Rongbo Cui | Xiaobing Xu
Volume: 3
Issue: 4
Year: 2010
The Safety Issue in a Web Travel Booking Services Scenario Based on Business Process Execution Language

Author(s): Apostolos Axenopoulos | Charalampos Doulaverakis | Nicholas Protogeros | Panayiotis Tahinakis | John Mylonakis
Volume: 3
Issue: 4
Year: 2010
Frequency Domain Pseudo-color to Enhance Ultrasound Images

Author(s): Jakia Afruz | Va’Juanna Wilson | Scott E Umbaugh
Volume: 3
Issue: 4
Year: 2010
Hybrid learning of Syntactic and Semantic Dependencies

Author(s): Lin Yao | Chengjie Sun | Lu Li | Zhixin Hao | Xiaolong Wang
Volume: 3
Issue: 4
Year: 2010
ICT Competence among Academic Staff in Universities in Cross Rivers State, Nigeria

Author(s): Ijeoma Aniedi Archibong | Joseph Ogbiji | Franc Anijaobi-Idem
Volume: 3
Issue: 4
Year: 2010
Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review

Author(s): Amir Mohamed Talib | Rodziah Atan | Rusli Abdullah | Masrah Azrifah Azmi Murad
Volume: 3
Issue: 4
Year: 2010
Globally Convergent Particle Swarm Optimization via Branch-and-Bound

Author(s): Zaiyong Tang | Kallol Kumar Bagchi
Volume: 3
Issue: 4
Year: 2010
Exploratory Analysis of Quality Practices in Open Source Domain

Author(s): Jie Xu | Luiz Fernando Capretz | Danny Ho
Volume: 3
Issue: 4
Year: 2010
ID-SOMGA: A Self Organising Migrating Genetic Algorithm-Based Solution for Intrusion Detection

Author(s): Olusegun Folorunso | Oluwatobi O. Akande | Adewale O. Ogunde | Olufunke R. Vincent
Volume: 3
Issue: 4
Year: 2010
Using Visual Analytics to Develop Situation Awareness in Network Intrusion Detection System

Author(s): Olusegun Folorunso | Adio Taofiki Akinwale | Aderonke J Ikuomola
Volume: 3
Issue: 4
Year: 2010
An Efficient Homomorphic Coercion Resistant and E2E Verifiable Voting Scheme

Author(s): Vinodu George | M. P. Sebastian
Volume: 3
Issue: 4
Year: 2010
Web Access Pattern Algorithms in Education Domain

Author(s): C. Gomathi | M. Moorthi | K. Duraiswamy
Volume: 1
Issue: 4
Year: 2009
Architecture of Embedded System Software

Author(s): Dongdong Wang
Volume: 1
Issue: 4
Year: 2009
A New Approach for Data Clustering Based on PSO with Local Search

Author(s): K. Premalatha | A.M. Natarajan
Volume: 1
Issue: 4
Year: 2009
Adjustment of Performance for the Application of PL/SQL

Author(s): Erjun Chen | Shaohong Yin
Volume: 1
Issue: 4
Year: 2009
Performance Evaluation of QoS by Combining Medium Access Control and Slow Start in MANETS

Author(s): J. Premalatha | P. Balasubramanie
Volume: 1
Issue: 4
Year: 2009
A Modified Adaptive Algorithm for Formant Bandwidth in Whisper Conversion

Author(s): Gang Lv | Heming Zhao
Volume: 1
Issue: 4
Year: 2009
Acoustic Pronunciation Variations Modeling for Standard Malay Speech Recognition

Author(s): Noraini Seman | Kamaruzaman Jusoff
Volume: 1
Issue: 4
Year: 2009
Multi-level Frontier based Topic-specific Crawler Design with Improved URL Ordering

Author(s): Akilandeswari Jeyapal | Gopalan Palanisamy
Volume: 1
Issue: 4
Year: 2009
Text Document Pre-Processing Using the Bayes Formula for Classification Based on the Vector Space Model

Author(s): Dino Isa | Lee Lam Hong | V. P. Kallimani | R. Rajkumar
Volume: 1
Issue: 4
Year: 2009
Design of the Automatic Spreader Control System Based on Embedded System

Author(s): Yinglin Li | Lianhe Yang | Fang Ma | Yingzhong Li
Volume: 1
Issue: 4
Year: 2009
Artificial Neural Networks for the Prediction of Thermo Physical Properties of Diacetone Alcohol Mixtures

Author(s): T.R Kubendran | R. Baskaran | M. Balakrishna
Volume: 1
Issue: 4
Year: 2009
The Integration of 3D GIS and Virtual Technology in the Design and Development of Residential Property Marketing Information System (GRPMIS)

Author(s): Siti Aekbal Salleh | Wan Mohd Naim Wan Salleh | Abdul Hadi Nawawi | Eran Sadek Said Md. Sadek
Volume: 1
Issue: 4
Year: 2009
Analysis of Telephone System of a University Campus and Design of a Converged VoIP System

Author(s): Amel Chowdhury | Jakia Afruz | Jalalur Rahman
Volume: 1
Issue: 4
Year: 2009
An Alternative Analysis of Two Circular Variables via Graphical Representation:

Author(s): Yong Zulina Zubairi | Fakhrulrozi Hussain | Abdul Ghapor Hussin
Volume: 1
Issue: 4
Year: 2009
Design and Application of the RFID Technology in ERP

Author(s): Juan Tian | Xiujuan Wang | Lanhua Zhang
Volume: 3
Issue: 4
Year: 2010
Research of Dynamic Information Flow Monitoring Based on Finite State Automaton

Author(s): Yuehua Zhao | Yu Tao
Volume: 3
Issue: 4
Year: 2010
Methodology Research of Ontology Building in Semantic Web

Author(s): Gang Wang
Volume: 3
Issue: 4
Year: 2010
Payload Inspection Using Parallel Bloom Filter in Dual Core Processor

Author(s): Arulanand Natarajan | S. Subramanian
Volume: 3
Issue: 4
Year: 2010
Acoustic Characteristics Analysis on the Tracheoesophageal Speech

Author(s): Gang Lv
Volume: 3
Issue: 4
Year: 2010
Design and Implementation of the Servo Control System Based on DSP

Author(s): Chaoji Chen | Na Zhao | Hongtao Jin | Yongjin Zhao
Volume: 3
Issue: 4
Year: 2010
Medical Data Mining Based on Association Rules

Author(s): Ruijuan Hu
Volume: 3
Issue: 4
Year: 2010
Voice Browsing Approach to E-Business Access: A Blind’s Perspective

Author(s): Muhammad Nabeel Talib | Shuqin Cai | Muhai Hu
Volume: 3
Issue: 4
Year: 2010
A Novel Steganographic Technique Based on 3D-DCT Approach

Author(s): Samir Kumar Bandyopadhyay | Tuhin Utsab Paul | Avishek Raychoudhury
Volume: 3
Issue: 4
Year: 2010
An Introductory of Mental Arithmetic Using Interactive Multimedia for Pre-School Children

Author(s): Siti Zulaiha Ahmad | Arifah Fasha Rosmani | Mohammad Hafiz Ismail | Suraya Shakeri
Volume: 3
Issue: 4
Year: 2010
Construction of Information Disaster Recovery for Hospitals

Author(s): Juan Xu
Volume: 2
Issue: 4
Year: 2009
Analysis and Design of ETL in Hospital Performance Appraisal System

Author(s): Fengjuan Yang
Volume: 2
Issue: 4
Year: 2009
Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network

Author(s): Xuxing Ding | Fangfang Xie | Qing Wu
Volume: 2
Issue: 4
Year: 2009
An Agent-based Online Shopping System in E-commerce

Author(s): Ziming Zeng
Volume: 2
Issue: 4
Year: 2009
A Weighted-Density Connected Dominating Set Data Gathering Algorithm for Wireless Sensor Networks

Author(s): Larry King | Natarajan Meghanathan
Volume: 2
Issue: 4
Year: 2009
An Investigation into Methods and Concepts of Qualitative Research in Information System Research

Author(s): Marzanah A Jabar | Fatimah Sidi | Mohd Hasan Selamat | Abd Azim Abd Ghani | Hamidah Ibrahim
Volume: 2
Issue: 4
Year: 2009
Framework for Interrogative Knowledge Identification

Author(s): Fatimah Sidi | Marzanah A. Jabar | Mohd Hasan Selamat | Abdul Azim Abd Ghani | Md Nasir Sulaiman
Volume: 2
Issue: 4
Year: 2009
Radio Propagation for Wireless Ultra-wide Band Systems

Author(s): Lijun Li | Guilin Lu
Volume: 1
Issue: 4
Year: 2009
Multi-object Segmentation Based on Improved Pulse Coupled Neural Network

Author(s): Dansong Cheng | Xianglong Tang | Jiafeng Liu | Xiaofang Liu
Volume: 1
Issue: 4
Year: 2009
Design of Temperature Monitor Device for DC Source Based on 1-Wire Bus

Author(s): Xiao Chen
Volume: 1
Issue: 4
Year: 2009
A Text Image Segmentation Method Based on Spectral Clustering

Author(s): Rui Wu | Jianhua Huang | Xianglong Tang | Jiafeng Liu
Volume: 1
Issue: 4
Year: 2009
A Path Planning Method Based on Adaptive Genetic Algorithm for a Shape-shifting Robot

Author(s): Mengxin Li | Xinghua Xia | Ying Zhang | Tonglin Liu
Volume: 3
Issue: 4
Year: 2010
Aspect Oriented Requirements Engineering

Author(s): Ahmed Yakout A. Mohamed | Abd El Fatah .A. Hegazy | Ahmed R. Dawood
Volume: 3
Issue: 4
Year: 2010
Grid-based Data Quality and Data Integration Research

Author(s): Xingman Li | Chunqing Li | Zhiyong Wang
Volume: 2
Issue: 4
Year: 2009
Two-Dimensional Heteroscedastic Discriminant Analysis for Facial Gender Classification

Author(s): Junying Gan | Sibin He
Volume: 2
Issue: 4
Year: 2009
DOA Estimation for Coherent Sources in Transformed Space

Author(s): Yuan Cui
Volume: 2
Issue: 4
Year: 2009
Developing a Secure Web Application Using OWASP Guidelines

Author(s): Khairul Anwar Sedek | Norlis Osman | Mohd Nizam Osman | Hj. Kamaruzaman Jusoff
Volume: 2
Issue: 4
Year: 2009
A NN Image Classification Method Driven by the Mixed Fitness Function

Author(s): Shan Gai | Peng Liu | Jiafeng Liu | Xianglong Tang
Volume: 2
Issue: 4
Year: 2009
The Use of ICT in Public and Private Institutions of Higher Learning, Malaysia

Author(s): Siti Rafidah Muhamat Dawam | Khairul Adilah Ahmad | Kamaruzaman Jusoff | Taniza Tajuddian | Shamsul Jamel Elias | Suhardi Wan Mansor
Volume: 2
Issue: 4
Year: 2009
Intrusion Detection Method Using Protocol Classification and Rough

Author(s): Xunyi Ren | Ruchuan Wang | Hejun Zhou
Volume: 2
Issue: 4
Year: 2009
Applying Knowledge Management System Architecture in Software Maintenance Environment

Author(s): Rossey Ginsawat | Rusli Abdullah | Mohd Zali Mohd Nor
Volume: 2
Issue: 4
Year: 2009
Strict versus Negligence Software Product Liability

Author(s): Farhah Abdullah | Kamaruzaman Jusoff | Hasiah Mohamed | Roszainora Setia
Volume: 2
Issue: 4
Year: 2009
Artificial Fish Swarm Algorithm-Assisted and Receive-Diversity Aided Multi-user Detection for MC-CDMA Systems

Author(s): Zhicheng Dong | Wei Xiao | Xiping Zhang
Volume: 2
Issue: 4
Year: 2009
Unsupervised Coreference Resolution with HyperGraph Partitioning

Author(s): Jun Lang | Bing Qin | Ting Liu | Sheng Li
Volume: 2
Issue: 4
Year: 2009
CalOra: A software to simulate calcium diffusion

Author(s): Shivendra Gajraj Tewari
Volume: 2
Issue: 4
Year: 2009
Software Functional Testing from the Perspective of Business Practice

Author(s): Mingtao Shi
Volume: 3
Issue: 4
Year: 2010
The Pastry Algorithm Based on DHT

Author(s): Jihong Song | Shaopeng Wang
Volume: 2
Issue: 4
Year: 2009
Computer and Information Science, Vol. 2, No. 4, November, 2009

Author(s): Editor CIS
Volume: 2
Issue: 4
Year: 2009
Panoramic Images Automatically Stitching Algorithm Introduction

Author(s): Shangchen Liu | Dakun Zhang
Volume: 1
Issue: 4
Year: 2009
Study of Genetic Algorithms on Optimizing PI Parameters in Prime Mover Simulation System

Author(s): Lixin Tan | Juemin Liu
Volume: 1
Issue: 4
Year: 2009
The Implementation of CAN Bus Adapter Based on CH372

Author(s): Huadong Chen | Dianhua Hou | Xing Chen
Volume: 1
Issue: 4
Year: 2009
Study on the Lane Mark Identification Method in Intelligent Vehicle Navigation

Author(s): Gaoying Zhi | Wencheng Guo
Volume: 1
Issue: 4
Year: 2009
General Framework of Chain Store Information System base on Supply Chain Management Theory

Author(s): Haibin Zhang | Seok-jea Ok
Volume: 1
Issue: 4
Year: 2009
Study on the Quality Evaluation System of College Information Network

Author(s): Zhengyong Liu
Volume: 1
Issue: 4
Year: 2009
Computer and Information Science, Vol. 1, No. 4, November 2008, all in one file

Author(s): Editor CIS
Volume: 1
Issue: 4
Year: 2009
Application of Wavelet Transform Analysis to ADCs Harmonics Distortion

Author(s): Emad A. Awada | Mohammad H. Alomari
Volume: 6
Issue: 3
Year: 2013
An Efficient Cursor Search Algorithm

Author(s): Yongping Huang | Shufan Yang | Yushan Jin
Volume: 6
Issue: 3
Year: 2013
Clustering of Web Search Results Based on Document Segmentation

Author(s): Mohammad Hasan Haggag | Amal Aboutabl | Najla Mukhtar
Volume: 6
Issue: 3
Year: 2013
A Novel Approach for Dynamic Polarity Mining from Customer Reviews

Author(s): Yuanchao Liu | Xin Wang | Chengjie Sun | Bingquan Liu
Volume: 6
Issue: 3
Year: 2013
An Assessment of Changeability of Open Source Software

Author(s): Yirsaw Ayalew | Kagiso Mguni
Volume: 6
Issue: 3
Year: 2013
A Tool for Automatic Dependability Test in Eucalyptus Cloud Computing Infrastructures

Author(s): Debora Souza | Rubens Matos | Jean Araujo | Vandi Alves | Paulo Maciel
Volume: 6
Issue: 3
Year: 2013
Combination of Naïve Bayes Classifier and K-Nearest Neighbor (cNK) in the Classification Based Predictive Models

Author(s): Elma Zannatul Ferdousy | Md. Mafijul Islam | M. Abdul Matin
Volume: 6
Issue: 3
Year: 2013
Program Factory – A Conception of Knowledge Representation of Scientific Artifacts from Standpoint of Software Engineering

Author(s): Lavrischeva K. | Aronov A. | Dzyubenko A.
Volume: 6
Issue: 3
Year: 2013
Security of E-Procurement Transactions in Supply Chain Reengineering

Author(s): Juliette Stephens | Raul Valverde
Volume: 6
Issue: 3
Year: 2013
Mobility Prediction in Dynamic Grids

Author(s): Iraky Khalifa | Hala Mohamed Abbas
Volume: 5
Issue: 3
Year: 2012
Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information

Author(s): Youssef Bassil | Mohammad Alwani
Volume: 5
Issue: 3
Year: 2012
Island Coastline Change Detection Based on Image Processing and Remote Sensing

Author(s): Majed Bouchahma | Wanglin Yan | Mohammed Ouessar
Volume: 5
Issue: 3
Year: 2012
Modeling and Simulation of a Decision Support System for Population Census in Nigerian

Author(s): Olabode Olatubosun | Akinyokun O. Charles
Volume: 5
Issue: 3
Year: 2012
Load Balancing Using Multiple Node Disjoint Paths

Author(s): Ahmad Khader Haboush | Mohammad Al Nabhan | Motassem Al-Tarazi | Mohammad Al-Rawajbeh
Volume: 5
Issue: 3
Year: 2012
Function Point Estimation and Demonstration on Website Projects

Author(s): Jingchun Feng | Fujie Zhang | Dandan Zhu | Fei Zhang
Volume: 5
Issue: 3
Year: 2012
Survey on Gesture Recognition for Hand Image Postures

Author(s): Rafiqul Zaman Khan | Noor Adnan Ibraheem
Volume: 5
Issue: 3
Year: 2012
A Model of Maturity for IS Risk Management Case Study

Author(s): Mina Elmaallam | Abdelaziz Kriouile
Volume: 5
Issue: 3
Year: 2012
Analysis of the Process and Outcomes of Eportfolio Development to Recognise Formal Learning in Zimbabwe

Author(s): Noreen Sarai | Godfrey Sithole
Volume: 5
Issue: 3
Year: 2012
An Improved Guidance Image Based Method to Remove Rain and Snow in a Single Image

Author(s): Jing Xu | Wei Zhao | Peng Liu | Xianglong Tang
Volume: 5
Issue: 3
Year: 2012
New Error-recovery Techniques for Faulty-Calls of Functions

Author(s): Mohamed A. El-Zawawy | Nagwan Moustafa Daoud
Volume: 5
Issue: 3
Year: 2012
Pathology of E-commerce with an Approach to Information Technology (A Case Study: Knauf Iran Company)

Author(s): Abbas Toloie- Eshlaghy | Alireza Poorebrahimi | Azam Farmanara
Volume: 4
Issue: 3
Year: 2011
A NCRE-oriented Teaching Mode

Author(s): Yujuan Li | Mei Wang | Zhunan Zhou
Volume: 4
Issue: 3
Year: 2011
Integrated Synthesis of Control and Bandwidth Scheduling on Networked Control Systems

Author(s): Yun Niu | Xuguang Wu | Junhong He | Liang Hong
Volume: 4
Issue: 3
Year: 2011
Multimedia Enhancing Computer Based Training Modules for The Deaf, Supported by Case Study

Author(s): Karim Q Hussein | Ayman J Nsour
Volume: 4
Issue: 3
Year: 2011
Web Services Selection Based on Mixed Context and Quality of Service Ontology

Author(s): Nabil Keskes | Ahmed Lehireche | Abdellatif Rahmoun
Volume: 4
Issue: 3
Year: 2011
WebGIS to Managing Natural Resource: Case of Flooded Pasture in Lake Débo and Walado Débo

Author(s): Kone Forokoro | Zhong Xie
Volume: 4
Issue: 3
Year: 2011
Learning to Combine Kernels for Object Categorization

Author(s): Deyuan Zhang | Bingquan Liu | Chengjie Sun | Xiaolong Wang
Volume: 4
Issue: 3
Year: 2011
The Design of Pre-Processing Multidimensional Data Based on Component Analysis

Author(s): Rahmat Widia Sembiring | Jasni Mohamad Zain
Volume: 4
Issue: 3
Year: 2011
A Genetic K-means Clustering Algorithm Based on the Optimized Initial Centers

Author(s): Min Feng | Zhenyan Wang
Volume: 4
Issue: 3
Year: 2011
Assessing the Impact of IT Connectivity and IT Capability on IT-Business Strategic Alignment: An Empirical Study

Author(s): Saeid Jorfi | Khalil Md Nor | Lotfi Najjar
Volume: 4
Issue: 3
Year: 2011
Investigating the Link between Web Data Mining and Strategic Human Resources Planning

Author(s): Hanadi Al-Zegaier | Hasan Ali Al-Zu’bi | Samer Barakat
Volume: 4
Issue: 3
Year: 2011
Visualizing and Assessing a Compositional Approach to Service-Oriented Business Process Design Using Unified Modelling Language (UML)

Author(s): Latef Oladimeji Yusuf | Olusegun Folorunso | Adio Akinwale | I.A. Adejumobi
Volume: 4
Issue: 3
Year: 2011
MIS Students Perception of Most Wanted MIS Job Market Skills

Author(s): Samer M. Barakat | Khalil Yaghi | Zaina Hamdan
Volume: 4
Issue: 3
Year: 2011
Study on Brainwave Responses from Ears: the Event-related Synchronization under the Auditory Stimulus

Author(s): Huiran Zhang | Yantao Li | Zheng Tang
Volume: 4
Issue: 3
Year: 2011
E-Government Readiness Assessment for Government Organizations in Developing Countries

Author(s): Ibrahim A. Alghamdi | Robert Goodwin | Giselle Rampersad
Volume: 4
Issue: 3
Year: 2011
Confirmation of Expectations and Satisfaction with the Internet Shopping: The Role of Internet Self-efficacy

Author(s): Yue-Yang Chen | Hui-Ling Huang | Yin-Chien Hsu | Hsing-Chau Tseng | Yun-Chen Lee
Volume: 3
Issue: 3
Year: 2010
Summarization of Program Development in Multi-core Environment

Author(s): Hongyu Li
Volume: 1
Issue: 3
Year: 2009
A New Vision Inspection Method for Wood Veneer Classification

Author(s): Mengxin Li | Chengdong Wu
Volume: 1
Issue: 3
Year: 2009
The Design and Implementation of Precious Test and Quality Control System Based on Delphi

Author(s): Ruoping Wang | Liguo Lai
Volume: 1
Issue: 3
Year: 2009
Study on the Scheme for RSA Iterative Encryption System

Author(s): Yulian Shang | Wuyuan Jia | Peng Li | Pengfei Zhu
Volume: 1
Issue: 3
Year: 2009
Hough Transform and Its Application in Vehicle License Plate Tilt Correction

Author(s): Zhenhui Zhang | Shaohong Yin
Volume: 1
Issue: 3
Year: 2009
New Path Filling Method on Data Preprocessing in Web Mining

Author(s): Chungsheng Zhang | Liyan Zhuang
Volume: 1
Issue: 3
Year: 2009
A New Approach to Sensitive Rule Hiding

Author(s): K. Duraiswamy | D. Manjula | N. Maheswari
Volume: 1
Issue: 3
Year: 2009
Creating Websites: Adobe Go Live vs. LiveText

Author(s): Donna F. Herring | Charles E. Notar | Judy McEntyre
Volume: 1
Issue: 3
Year: 2009
The New Development of CAD in Clothing

Author(s): Lingxia Zhang | Hongzhi Zhang | Yinglin Li
Volume: 1
Issue: 3
Year: 2009
Design of Calendar Clock Based on DS12C887 Chip

Author(s): Xiao Chen
Volume: 1
Issue: 3
Year: 2009
Power Estimation in Mobile Communication Systems

Author(s): Lenin Gopal | Ashutosh Kumar Singh | Veeramani Shanmugam
Volume: 1
Issue: 3
Year: 2009
The Drive and Support of Web3.0 to Rich Media Advertisement

Author(s): Xiaonan Jin
Volume: 1
Issue: 3
Year: 2009
Similarity Matrix Based Session Clustering by Sequence Alignment Using Dynamic Programming

Author(s): K. Duraiswamy | V. Valli Mayil
Volume: 1
Issue: 3
Year: 2009
Revelations of the New Developments of Brain Science on Early Education

Author(s): Tianbao Zhuang | Hong Zhao | Zheng Tang
Volume: 1
Issue: 3
Year: 2009
Construction of New Forest Roads in Malaysia Using a GIS-Based Decision Support System

Author(s): Kamaruzaman Jusoff
Volume: 1
Issue: 3
Year: 2009
The Role of Session Border Controllers in the DMZ of Voice over IP(VoIP) Networks

Author(s): Huihong Chen | Zhigang Chen
Volume: 1
Issue: 3
Year: 2009
Autonomous Notification and Situation Reporting for Flood Disaster Management

Author(s): Ku Ruhana Ku-Mahamud | Norita Md Norwawi | Norliza Katuk | Safaai Deris
Volume: 1
Issue: 3
Year: 2009
Artificial Neural Networks for the Prediction of Thermo Physical Properties of Liquid Mixtures

Author(s): R. Baskaran | S. Arunachalam | K. Manjunath | T.R Kubendran
Volume: 1
Issue: 3
Year: 2009
Study on the Design Principles of Data Disaster Recovery System for Hospitals

Author(s): Ping Xiao
Volume: 2
Issue: 3
Year: 2009
Pattern Extraction and Rule Generation of Forest Fire using Sliding Window Technique

Author(s): Ku Ruhana Ku-Mahamud | Jia Yun Khor
Volume: 2
Issue: 3
Year: 2009
Grover Algorithm Applied to Four Qubits System

Author(s): Z. Sakhi | A. Tragha | R. Kabil | M. Bennai
Volume: 4
Issue: 3
Year: 2011
Research and Development of the Thin Terminal Technology of Broadband Computer

Author(s): Baoling Qin | Minwei Yang | Yao He
Volume: 4
Issue: 3
Year: 2011
Comprehensive Evaluation System and Selection Method of Tax Software

Author(s): Changyong Liang | Enqiao Zhang | Yong Ding | Xiaowen Qi
Volume: 4
Issue: 3
Year: 2011
Anomaly Detection of Clinical Behavior Sequences

Author(s): Hebiao Yang | Xiaodong Yuan
Volume: 3
Issue: 3
Year: 2010
Finite Time Synchronization between Two Different Chaotic Systems with Uncertain Parameters

Author(s): Wanli Yang | Xiaodong Xia | Yucai Dong | Suwen Zheng
Volume: 3
Issue: 3
Year: 2010
Research on Patent Model Integration Based on Ontology

Author(s): Liping Zhi | Hengshan Wang | Yazheng Dang
Volume: 3
Issue: 3
Year: 2010
A Novel Forager Agent Based Approach to Capture the Future Browsing Pattern of Online Users

Author(s): Mohanraj Vijayakumar | Lakshmipathi R
Volume: 3
Issue: 3
Year: 2010
Supporting Differentiated Service in Cognitive Radio Wireless Mesh Networks

Author(s): Kiam Cheng How
Volume: 3
Issue: 3
Year: 2010
Development of Design and Analysis Tool for Switched Reluctance Drive System

Author(s): Shoujun Song | Weiguo Liu
Volume: 3
Issue: 3
Year: 2010
Intrusion Detection in Agent-Based Virtual Knowledge Communities

Author(s): Gabriel Opeyemi Ogunleye | ADEWALE OPEOLUWA OGUNDE
Volume: 3
Issue: 3
Year: 2010
Comparison of Fuzzy Inference System and Multiple Regression to Predict Synthetic Envelopes Clogging

Author(s): Bakhtiar Karimi | Farhad Mirzaei | Mohammad Javad Nahvinia | Behnam Ababaei
Volume: 3
Issue: 3
Year: 2010
A Research on Architecture of Digital Publishing Management System

Author(s): Yu Tian | Jingliang Chen
Volume: 3
Issue: 3
Year: 2010
The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

Author(s): Zemao Zhao | Fei He | Rui Xu
Volume: 3
Issue: 3
Year: 2010
Promote the Use of Two-dimensional Continuous Random Variables Conditional Distribution

Author(s): Feixue Huang | Cheng Li
Volume: 3
Issue: 3
Year: 2010
Path Planning for Mobile Robots Based on Hybrid Architecture Platform

Author(s): Ting Zhou | Xiaoping Fan | Shengyue Yang | Zhihua Qu
Volume: 3
Issue: 3
Year: 2010
A Species-Coexistence Model Defending against Credit Cheating in E-Commerce

Author(s): Zheng Li
Volume: 2
Issue: 3
Year: 2009
Study on the UWB Rader Synchronization Technology

Author(s): Guilin Lu | Shaohong Wan | Kaiqing Xu
Volume: 2
Issue: 3
Year: 2009
An Optimised Method-Based an Improved Neural Network Classifier

Author(s): Mengxin Li | Chengdong Wu | Hui Lin
Volume: 2
Issue: 3
Year: 2009
Estimation of Saturation Percentage of Soil Using Multiple Regression, ANN, and ANFIS Techniques

Author(s): Khaled Ahmad Aali | Masoud Parsinejad | Bizhan Rahmani
Volume: 2
Issue: 3
Year: 2009
Study on the Fault Diagnosis Technique of Aerial Camera Exposure Board Based on Petri Net

Author(s): Chengjun Tian | Zhiyong An | Lijuan Li | Chengyu Yang | Jie Duan | Kang Wang
Volume: 2
Issue: 3
Year: 2009
Positive Affects Inducer on Software Quality

Author(s): Sharifah Lailee Syed-Abdullah | Mazni Omar | Mohd Nasir Abdul Hamid | Che Latifah bt Ismail | Kamaruzaman Jusoff
Volume: 2
Issue: 3
Year: 2009
The Design and Implementation of the Distributed Computing Platform for Bioinformatics

Author(s): Juan Huang | Yaoping Fei
Volume: 2
Issue: 3
Year: 2009
Paper Prototyping as a Rapid Participatory Design Technique

Author(s): Aznoora Osman | Hanif Baharin | Mohammad Hafiz Ismail | Kamaruzaman Jusoff
Volume: 2
Issue: 3
Year: 2009
Effectiveness of Corporate Intranet in Selected Malaysian Companies

Author(s): Mohamad Noorman Masrek | Kamaruzaman Jusoff | Nor Shariza Abdul Karim | Ramlah Hussein
Volume: 2
Issue: 3
Year: 2009
Formulas of Retrieval Rate in Database Based on Normalization Design

Author(s): Bin Yan
Volume: 2
Issue: 3
Year: 2009
Machine Learning Emulation in Nature-inspired Computation Systems

Author(s): Jianhao Tan | Jing Zhang | Fu Guo
Volume: 2
Issue: 3
Year: 2009
Back Propagation Wavelet Neural Network Based Prediction of Drill Wear from Thrust Force

Author(s): Xu Yang | Hiroyuki. Kumehara | Wei Zhang
Volume: 2
Issue: 3
Year: 2009
Study on the TOPN Abnormal Detection Based on the NetFlow Data Set

Author(s): Hongzhuo Zhang
Volume: 2
Issue: 3
Year: 2009
Leveraging an Open Source VPN Technology to End User

Author(s): Farok Azmat | Md Ikhwan Hamdan | Hj. Kamaruzaman Jusoff
Volume: 2
Issue: 3
Year: 2009
Study on the NN Decoupling Control System of Air-cushioned Headbox

Author(s): Zhongjun Xiao | Mengxiao Wang
Volume: 2
Issue: 3
Year: 2009
Text Emotion Computing under Cognition Vision

Author(s): Jingzhong Wang | Lu Zhang
Volume: 2
Issue: 3
Year: 2009
Research of Information System of Monitoring Remote on Distributed Micro-turbine

Author(s): Liangwei Zhong | Kangmin Chen | Jing Ni | Anyang He
Volume: 1
Issue: 3
Year: 2009
Image Analysis for Online Dynamic Steganography Detection

Author(s): Kevin Curran | Joanne Mc Devitt
Volume: 1
Issue: 3
Year: 2009
The Design of the Vector Control System of Asynchronous Motor

Author(s): Min Zhang | Xinping Ding | Zhen Guo
Volume: 3
Issue: 3
Year: 2010
Application of VRML in Distance Vocational Education

Author(s): Rong Zhu | Yong Wang
Volume: 3
Issue: 3
Year: 2010
From UML Specification into Implementation Using Object Mapping

Author(s): Rosziati Ibrahim
Volume: 3
Issue: 3
Year: 2010
An Exploratory Study of Determinants and Corrective Measures for Software Piracy and Counterfeiting in the Digital Age

Author(s): Yin-Leng Theng | Wee Teck Tan | May O. Lwin | Schubert Foo Shou-Boon
Volume: 3
Issue: 3
Year: 2010
An Improved Clustering Algorithm Based on Density Distribution Function

Author(s): Jianhao Tan | Jing Zhang | Weixiong Li
Volume: 3
Issue: 3
Year: 2010
Aspect Oriented Software Development vs. other Techniques (Structured Approach and Object Oriented Approach)

Author(s): Ahmed Yakout A. Mohamed | Abd El Fatah .A. Hegazy | Ahmed R.Dawood
Volume: 3
Issue: 3
Year: 2010
Grid Signature: High Performance Digital Signature Through Using Alchemi Grid Computing.

Author(s): Iyad Ali Shaheen | Abdelfatah Hegazy | Bahaa Hasan
Volume: 3
Issue: 3
Year: 2010
Computational Modeling of Transmission Capacity With Outage Constraints in Ad-Hoc Networks

Author(s): Moses Effiong Ekpenyong | Joseph Isabona
Volume: 3
Issue: 3
Year: 2010
Development of On-line Shopping Mart System for Developing Countries

Author(s): Awoyelu, I.O | Tangba O | Awoyelu F.E
Volume: 3
Issue: 3
Year: 2010
Utilizing Usability Evaluating Model in Applying CMM to Improve the Quality of Software Maintenance Process

Author(s): Amir Mohamed Talib | Rusli Abdullah
Volume: 3
Issue: 3
Year: 2010
Evaluation of a Stochastic Weather Generator in Different Climates

Author(s): Behnam Ababaei | Teymour Sohrabi | Farhad Mirzaei | Bakhtiar Karimi
Volume: 3
Issue: 3
Year: 2010
Representation of textual documents by the approach wordnet and n-grams for the unsupervised classification (clustering) with 2D cellular automata: a comparative study

Author(s): HAMOU Reda Mohamed | LEHIRECHE Ahmed | LOKBANI Ahmed Chaouki | RAHMANI Mohamed
Volume: 3
Issue: 3
Year: 2010
Validate Conference Paper using Dice Coefficient

Author(s): Nurhilyana Anuar | Abu Bakar Md Sultan
Volume: 3
Issue: 3
Year: 2010
A Conceptual Model for Psychological Empowerment of Telecentre Users

Author(s): Zahurin Mat Aji | Shafiz Affendi Mohd Yusof | Wan Rozaini Sheik Osman | Nor Iadah Yusop
Volume: 3
Issue: 3
Year: 2010
Design and Realization of New Generation Campus Smart Card System Based on the Mobile Communication

Author(s): Qijie Sheng | Xin Tong | Xiangyang Song | Zhihao Zhang | Jun Xu
Volume: 3
Issue: 3
Year: 2010
Development of Individual Learners: Perspective on the Uncertain Future Contribution of E-Learning

Author(s): Zaki Ahmad Dahlan | Nor Arzami Othman | Mohd Fazril Izhar Mohd Idris | Hj. Kamaruzaman Jusoff
Volume: 2
Issue: 3
Year: 2009
The Design of RS232 and CAN Protocol Converter Based on PIC MCU

Author(s): Xianjun Wang | Wencheng Guo
Volume: 2
Issue: 3
Year: 2009
Knowledge Management and Usability Model for Knowledge Management System

Author(s): Nafaizatulnaniah Hashim | Abu Bakar Md Sultan
Volume: 2
Issue: 3
Year: 2009
Study on the Multiple-Key-Pair Generation Scheme Based on Grey Half-generation

Author(s): Peng Li | Yulian Shang | Jifeng Wang | Yufei Zhang
Volume: 2
Issue: 3
Year: 2009
Relative Truth Degree of Logic Formulas and Graded Fuzzy Logic

Author(s): Li Fu
Volume: 2
Issue: 3
Year: 2009
Fuzzy Evaluation of Weapons System

Author(s): Mahmod Othman | Shaiful Annuar Khalid | Mohammad Ismail | Norshimah Abdul Rahman | Mohamad Fadhili Yahaya
Volume: 2
Issue: 3
Year: 2009
A Novel Sanitization Approach for Privacy Preserving Utility Itemset Mining

Author(s): R.R. Rajalaxmi | A.M. Natarajan
Volume: 1
Issue: 3
Year: 2009
Model of On-line Room Reservation System Based on Web Service and XPMS

Author(s): Jiali Wang | Jun Zheng | Wenxin Hu
Volume: 1
Issue: 3
Year: 2009
Computer Aided Investigation towards the Wind Power Generation Potentials of Guangzhou

Author(s): Gang Yang | Yongxian Du | Ming Chen
Volume: 1
Issue: 3
Year: 2009
A Decision Algorithm of Strong Connexity Convenient for Parallel Computation

Author(s): Ruixian Li
Volume: 3
Issue: 3
Year: 2010
Analysis of Network Security and Risks Prevention Strategies of Hongqiao Airport West Terminal

Author(s): Chongjun Fan | Honglin Xiong | Haiying Zhang | Wujun Liu | Liqiang Wang | Xiaohui Song
Volume: 2
Issue: 3
Year: 2009
A Hybrid Resource Allocation Strategy with Queuing in Wireless Mobile Communication Networks

Author(s): K. Venkatachalam | P. Balasubramanie
Volume: 2
Issue: 3
Year: 2009
Computer and Information, Vol. 2, No. 3, August 2009, all in one file, Part B

Author(s): CIS Editor
Volume: 2
Issue: 3
Year: 2009
Why do you need a reservation system?      Save time & money - Smart Internet Solutions