Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Future Computer and Communication

ISSN: 2010--3751
Publisher: IACSIT Press


ADD TO MY LIST
 
An Effective XML Storage Method Based on Deleting XPath Query Minimization PDF available

Author(s): Zhen-Fang Li
Volume: 2
Issue: 5
Year: 2013
Named Entity Recognizer for Filipino Text Using Conditional Random Field PDF available

Author(s): Ana Patricia T. Alfonso | Illuminada Vivien R. Domingo | Mary Joy F. Galope | Ria A. Sagum | Rachelle B. Villar | Jobert T. Villegas
Volume: 2
Issue: 5
Year: 2013
AssistMe: A Location-Based Social Network for Assistance PDF available

Author(s): Wassim Benhallam | Ali El Ouafiq | Ayoub Khobalatte | Mohamed Riduan Abid
Volume: 2
Issue: 4
Year: 2013
Design of a Multipurpose Whitebox Networking Platform PDF available

Author(s): Nam-Seok Ko | Hwanjo Heo | Sung-Jin Moon | Sung-Kee Noh | Jong-Dae Park | Hong-Shik Park
Volume: 2
Issue: 4
Year: 2013
2D Interleaver Design for Image Transmission over Severe Burst-Error Environment PDF available

Author(s): P. Hanpinitsak | C. Charoenlarpnopparut
Volume: 2
Issue: 4
Year: 2013
A Novel Face Hallucination with an Error Regression Model and MPCA in RGB Color Space

Author(s): Krissada Asavaskulkiet | Phumin Kirawanich
Volume: 2
Issue: 4
Year: 2013
Secure Last Acknowledged Packet Routing Algorithm (SLAPRA) for MANETs PDF available

Author(s): P. Cooper | L. Chen | C. Sun
Volume: 2
Issue: 4
Year: 2013
Masking Matrix Design of Quasi-Cyclic LDPC Codes for High-speed Optical Communications PDF available

Author(s): Shuling Che | Xinmei Wang
Volume: 2
Issue: 4
Year: 2013
Development of a Network Adaptive H.264/AVC Medical Video Transmission System PDF available

Author(s): Yi-Fei Xu | Hai-Bo Hu
Volume: 2
Issue: 4
Year: 2013
Evaluation of OSPF and EIGRP Routing Protocols for IPv6 PDF available

Author(s): Alex Hinds | Anthony Atojoko | Shao Ying Zhu
Volume: 2
Issue: 4
Year: 2013
Distributed Pipes Enforcement in Mobile Grid Environment - A Novel Approach for Task Scheduling PDF available

Author(s): Aghila Rajagopal | M. A. Maluk Mohamed
Volume: 2
Issue: 4
Year: 2013
Latent Text Mining for Cybercrime Forensics PDF available

Author(s): Raymond Y. K. Lau | Yunqing Xia
Volume: 2
Issue: 4
Year: 2013
Quadratic Permutation Polynomial Interleavers for LTE Turbo Coding PDF available

Author(s): Ching-Lung Chi
Volume: 2
Issue: 4
Year: 2013
A Novel Image Steganography in Contourletdomain Using Genetic Algorithm PDF available

Author(s): H. Ramezani | F. Keynia | F. Ramezani
Volume: 2
Issue: 4
Year: 2013
A New Efficient Matrix Based Frequent Itemset Mining Algorithm with Tags PDF available

Author(s): Harpreet Singh | Renu Dhir
Volume: 2
Issue: 4
Year: 2013
NFC Technology: Today and Tomorrow PDF available

Author(s): Hongwei Du
Volume: 2
Issue: 4
Year: 2013
Deinterlacing Algorithm Using Blackman-Harris Filter along the Piecewise Edge Direction PDF available

Author(s): Joohyeok Kim | Jechang Jeong
Volume: 2
Issue: 4
Year: 2013
An Extension of Scalable MAC for VANETs PDF available

Author(s): Ganis Zulfa Santoso | Monsoo Kang
Volume: 2
Issue: 4
Year: 2013
Wireless Sensor Data Fusion Algorithm Based on the Sensor Scheduling and Batch Estimate PDF available

Author(s): Kaihong Zhang | Cong Li | Wenhui Zhang
Volume: 2
Issue: 4
Year: 2013
Chinese Herbal Medicine for Migraine: An Application of Text Mining PDF available

Author(s): Minzhi Wang | Miao Jiang | Guang Zheng | Xiaojuan He | Cheng Lu | Aiping Lu
Volume: 2
Issue: 4
Year: 2013
PAPR Reduction Based on DFT Precoding for OFDM Signals

Author(s): Mohamed A. Aboul-Dahab | Esam A. A. A. Hagras | Ahmad. A. Elhaseeb
Volume: 2
Issue: 4
Year: 2013
Birefringence-Based Real-Time Rendering of Translucent Material PDF available

Author(s): Qun Gao | Shuangjiu Xiao
Volume: 2
Issue: 3
Year: 2013
Adaptive Hybrid PAPR Reduction in OFDM System PDF available

Author(s): Osama A. Omer | Ahmed Abdel-Reheem
Volume: 2
Issue: 3
Year: 2013
Cost-Effective Computing in the Cloud Infrastructure PDF available

Author(s): Mohammad Razavi | Kamran Zamanifar
Volume: 2
Issue: 3
Year: 2013
Developing a Model of Social Relation Support for Online Reputation Systems PDF available

Author(s): Fereshteh Ghazizadeh Ehsaei | Ab. Razak Che Hussin | Mohammadali Kianian
Volume: 2
Issue: 3
Year: 2013
Instructional Engineering for Acceptance of Web 2.0 Technologies to Promote Critical Thinking PDF available

Author(s): Mohammadali kianian | Jamalludin Bin Harun | Fereshteh Ghazizadeh Ehsaei
Volume: 2
Issue: 3
Year: 2013
Destination Retrieval System Using an Association Retrieval Method PDF available

Author(s): Yuya Kanazawa | Yosuke Hidaka | Katsuhiko Ogawa
Volume: 2
Issue: 3
Year: 2013
A High Performance Point Based Image Alignment Approach Using an Artificial Immune System PDF available

Author(s): Osama A. Omer | Mohamed Abdel-Nasser
Volume: 2
Issue: 3
Year: 2013
Acceptance of Total Hospital Information System (THIS) PDF available

Author(s): Noor’ain Mohamad Yunus | Dilla Syadia Ab Latiff | Zamzaliza Abdul Mulud | Siti Noorsuriani Ma’on
Volume: 2
Issue: 3
Year: 2013
Analysis of Proximity Networks from Multiple Mobile Sensor Data PDF available

Author(s): Dae Wook Kim | Mehmet M. Dalkilic
Volume: 2
Issue: 3
Year: 2013
Web Impact Factor for Malaysian Public Universities PDF available

Author(s): Abdul Arif | N. A. Ismail
Volume: 2
Issue: 3
Year: 2013
Data Mining Approach in Security Information and Event Management PDF available

Author(s): Anita Rajendra Zope | Amarsinh Vidhate | Naresh Harale
Volume: 2
Issue: 2
Year: 2013
A Study on the Suitability of Ethernet/IP and EtherCAT for Industrial Time Critical Applications PDF available

Author(s): P. A. Manoj Kumar | B. Sathish Kumar
Volume: 2
Issue: 2
Year: 2013
GUI Testing Techniques: A Survey PDF available

Author(s): Imran Ali Qureshi | Aamer Nadeem
Volume: 2
Issue: 2
Year: 2013
CDMA Based Reversible and Blind Watermarking Scheme for Images PDF available

Author(s): Muhammad Kashif Samee | Jürgen Götze
Volume: 2
Issue: 2
Year: 2013
A Survey of Safety Analysis Techniques for Safety Critical Systems

Author(s): Aftab Ali Haider | Aamer Nadeem
Volume: 2
Issue: 2
Year: 2013
Formal Modelling Languages to Specify Real-Time Systems: A Survey PDF available

Author(s): Aftab Ali Haider | Aamer Nadeem
Volume: 2
Issue: 2
Year: 2013
A Survey of Logic Based Classifiers PDF available

Author(s): Aftab Ali Haider | Sohail Asghar
Volume: 2
Issue: 2
Year: 2013
Latest Approach to Improve the Protection of Embedded Systems by Using PGP Technique PDF available

Author(s): P. Rama Bayapa Reddy | K. Soundararajan | M. H. M. Krishna Prasad
Volume: 2
Issue: 2
Year: 2013
Design and Implementation of a Mobile Sensor Network Testbed Using SUN SPOTs PDF available

Author(s): Hung-Da Shih | Xiaolan Zhang | David S. L. Wei | Kshirasagar Naik | Rung Ching Chen
Volume: 2
Issue: 2
Year: 2013
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks PDF available

Author(s): Bing Li | Yejun Liu | Lei Guo
Volume: 2
Issue: 2
Year: 2013
Network Transform – A Tool Based Approach PDF available

Author(s): Shameemraj M. Nadaf | Hemant Kumar Rath | Anantha Simha
Volume: 2
Issue: 2
Year: 2013
Topological Properties of few Poly Oxide, Poly Silicate, DOX and DSL Networks PDF available

Author(s): F. Simonraj | A. George
Volume: 2
Issue: 2
Year: 2013
Intelligent Information Retrieval and Recommender System Framework PDF available

Author(s): Sitalakshmi Venkatraman | Sadhana J. Kamatkar
Volume: 2
Issue: 2
Year: 2013
Automatic Identification of Chinese Prepositional Phrase Including Verbs PDF available

Author(s): Yuanyuan Wang | Jianliang Xu
Volume: 2
Issue: 1
Year: 2013
A Study of the Use of IDAs in Cloud Storage PDF available

Author(s): Xuesong Zhang | Honglei Wang
Volume: 2
Issue: 1
Year: 2013
Potential Innovations (New Ideas/Trends) Detection in Information Network PDF available

Author(s): Dmitry Romanov | Mikhail Ponfilenok | Nikolay Kazantsev
Volume: 2
Issue: 1
Year: 2013
MF-Secure: Multifactor Security Framework for Distributed Mobile Systems PDF available

Author(s): S. Rithika Saranya | S. Ravimaran
Volume: 2
Issue: 1
Year: 2013
A Single-Image Super-Resolution Method for Texture Interpolation PDF available

Author(s): Yaron Kalit | Moshe Porat
Volume: 2
Issue: 1
Year: 2013
A New Approach to Texture Recognition Using Decorrelation Stretching PDF available

Author(s): Micha Kalfon | Moshe Porat
Volume: 2
Issue: 1
Year: 2013
Practical Issues on Constructing Hybrid Smart Homes

Author(s): Hsien-Tang Lin
Volume: 2
Issue: 1
Year: 2013
Real-time Background Subtraction for Video Avatar

Author(s): Hasup Lee | Yoshisuke Tateyama | Tetsuro Ogi
Volume: 2
Issue: 1
Year: 2013
Bio-Inspired Correlation in a Multi-Robot System PDF available

Author(s): Alice Abraham | Jeson Kamalnath R | Naresh T | Ashutosh Tripathy | Samarth Bharani | Narendra Kumar G.
Volume: 2
Issue: 1
Year: 2013
Performance Evaluation of AODV and DSDV for Implementing Robot Swarm Performance Evaluation of AODV and DSDV for Implementing Robot Swarm PDF available

Author(s): Alice Abraham | Ashutosh Tripathy | Jeson Kamalnath | Naresh T | Samarth Bharani | Narendra Kumar G
Volume: 2
Issue: 1
Year: 2013
Post Operative Monitoring of Kidney Transplanted Patients Using Wireless Sensor Networks PDF available

Author(s): Alice Abraham | Srinath K. S | Guru. Prasad B. S | Sumanth | Narendra Kumar G
Volume: 2
Issue: 1
Year: 2013
Throughput Analysis of WLAN with Network Coding PDF available

Author(s): Pallavi R. Mane | M. Sathish Kumar | Sudhakar G | Ghanashyama Prabhu
Volume: 2
Issue: 1
Year: 2013
Free Forms + CRM     Affiliate Program