Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Information Technology and Computer Science

ISSN: 2074--9007
Publisher: MECS Publisher


ADD TO MY LIST
 
Validation of Novel Approach to Detect Type Mismatch Problem Using Component Based Development

Author(s): M. Rizwan Jameel Qureshi | Ebtesam Ahmad Alomari
Volume: 5
Issue: 9
Year: 2013
Performance Analysis of Software Effort Estimation Models Using Neural Networks

Author(s): E.Praynlin | P.Latha
Volume: 5
Issue: 9
Year: 2013
Morphotactics of Manipuri Adjectives: A Finite-State Approach

Author(s): Ksh. Krishna B. Singha | Kh. Raju Singha | Bipul Syam Purkayastha
Volume: 5
Issue: 9
Year: 2013
An Improvement over AODV Routing Protocol by Limiting Visited Hop Count

Author(s): Reza Fotohi | Shahram Jamali | Fateme Sarkohaki | Shahram Behzad
Volume: 5
Issue: 9
Year: 2013
An Approach of Degree Constraint MST Algorithm

Author(s): Sanjay Kumar Pal | Samar Sen Sarma
Volume: 5
Issue: 9
Year: 2013
Improving Energy Efficient Clustering Method for Wireless Sensor Network

Author(s): Md. Imran Hossain | M. Mahbubur Rahman | Tapan Kumar Godder | Mst. Titasa Khatun
Volume: 5
Issue: 9
Year: 2013
Shape Classification Based on Normalized Distance and Angle Histograms Using PNN

Author(s): Atefeh Goshvarpour | Hossein Ebrahimnezhad | Ateke Goshvarpour
Volume: 5
Issue: 9
Year: 2013
Domain Analysis and Visualization of NLRP10

Author(s): Sim-Hui Tee
Volume: 5
Issue: 9
Year: 2013
A Proposal of Case Based Reasoning System for the Appropriate Selection of Components Using CBD

Author(s): Abrar Omar Alkhamisi | M. Rizwan Jameel Qureshi
Volume: 5
Issue: 9
Year: 2013
A Face Recognition Approach Based on Entropy Estimate of the Nonlinear DCT Features in the Logarithm Domain Together with Kernel Entropy Component Analysis

Author(s): Arindam Kar | Debotosh Bhattacharjee | Dipak Kumar Basu | Mita Nasipuri | Mahantapas Kundu
Volume: 5
Issue: 9
Year: 2013
Uplink Capacity Estimation and Enhancement in WCDMA Network

Author(s): Fadoua Thami Alami | Noura Aknin | Ahmed El Moussaoui
Volume: 5
Issue: 9
Year: 2013
Cascaded Factor Analysis and Wavelet Transform Method for Tumor Classification Using Gene Expression Data

Author(s): Jayakishan Meher | Ram Chandra Barik | Madhab Ranjan Panigrahi | Saroj Kumar Pradhan | Gananath Dash
Volume: 4
Issue: 9
Year: 2012
Optical Many Casting Using QoS Depend Layer Aware Mechanism

Author(s): R.C. Arun Chander | P.Karunakaran | S.Venkatraman | I.Hameem Shanavas
Volume: 4
Issue: 9
Year: 2012
Study the Performance of SLM for Different Number of Subcarriers

Author(s): Mohammad Alamgir Hossain | Md. Ibrahim Abdullah | Md. Shamim Hossain | Md. Salim Raza
Volume: 4
Issue: 9
Year: 2012
Random Handwritten CAPTCHA: Web Security with a Difference

Author(s): Mukta Rao | Nipur Singh
Volume: 4
Issue: 9
Year: 2012
Proposal of Implicit Coordination Model for Performance Enhancement Using Sprint Zero

Author(s): M. Rizwan Jameel Qureshi | Ahmed Barnawi | Aiesha Ahmad
Volume: 4
Issue: 9
Year: 2012
Image Denoising using Tri Nonlinear and Nearest Neighbor Interpolation with Wavelet Transform

Author(s): Sachin D Ruikar | Dharmpal D Doye
Volume: 4
Issue: 9
Year: 2012
Coupling Complexity Metric: A Cognitive Approach

Author(s): A. Aloysius | L. Arockiam
Volume: 4
Issue: 9
Year: 2012
Development of Neuro-fuzzy System for Early Prediction of Heart Attack

Author(s): Obanijesu Opeyemi | Emuoyibofarhe O. Justice
Volume: 4
Issue: 9
Year: 2012
Smart Agent Learning based Hotel Search System- Android Environment

Author(s): Wayne Lawrence | Suresh Sankaranarayanan
Volume: 4
Issue: 9
Year: 2012
Integrating Non-Functional Properties in Model Driven Development: A Stepwise Refinement View

Author(s): Maryam Nooraei Abade | Zeinab Rajabi
Volume: 4
Issue: 9
Year: 2012
Evaluating Design Patterns of Commercial Web Applications using Net Easy Score

Author(s): Tharis Thimthong | Thippaya Chintakovid | Soradech Krootjohn
Volume: 5
Issue: 8
Year: 2013
Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets

Author(s): Chandrashekhar Azad | Vijay Kumar Jha
Volume: 5
Issue: 8
Year: 2013
Priority Based Uplink Scheduling Scheme for WiMAX Service Classes

Author(s): Kire Jakimoski | Toni Janevski
Volume: 5
Issue: 8
Year: 2013
Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense

Author(s): Muhammad Aamir | Muhammad Arif
Volume: 5
Issue: 8
Year: 2013
Robust Sliding Mode Fuzzy Control of a Car Suspension System

Author(s): Ayman A. Aly
Volume: 5
Issue: 8
Year: 2013
A Comparative Performance Analysis of Low Power Bypassing Array Multipliers

Author(s): Nirlakalla Ravi | S. Venkateswarlu | T. Jayachandra Prasad | Thota Subba Rao
Volume: 5
Issue: 8
Year: 2013
Data Driven Fuzzy Modeling for Sugeno and Mamdani Type Fuzzy Model using Memetic Algorithm

Author(s): Savita Wadhawan | Gunjan Goel | Srikant Kaushik
Volume: 5
Issue: 8
Year: 2013
Fault Persistency and Fault Prediction in Optimization of Software Release

Author(s): Maurizio Pighin | Anna Marzona
Volume: 5
Issue: 8
Year: 2013
Empirical Study of an Improved Component Based Software Development Model using Expert Opinion Technique

Author(s): Asif Irshad Khan | Md. Mottahir Alam | Noor-ul-Qayyum | Usman Ali Khan
Volume: 5
Issue: 8
Year: 2013
Design Robust Fuzzy Sliding Mode Control Technique for Robot Manipulator Systems with Modeling Uncertainties

Author(s): Farzin Piltan | AliReza Nabaee | MohammadMahdi Ebrahimi | Mansour Bazregar
Volume: 5
Issue: 8
Year: 2013
Improvement of Component Integration Testing Technique

Author(s): Khulood Salem Albeladi | M. Rizwan Jameel Qureshi
Volume: 5
Issue: 8
Year: 2013
Empirical Estimation of Hybrid Model: A Controlled Case Study

Author(s): Sadaf Un Nisa | M. Rizwan Jameel Qureshi
Volume: 4
Issue: 8
Year: 2012
Offline Handwritten Devanagari Script Recognition

Author(s): Ved Prakash Agnihotri
Volume: 4
Issue: 8
Year: 2012
Genomic Analysis and Classification of Exon and Intron Sequences Using DNA Numerical Mapping Techniques

Author(s): Mohammed Abo-Zahhad | Sabah M. Ahmed | Shimaa A. Abd-Elrahman
Volume: 4
Issue: 8
Year: 2012
Trends, Issues and Challenges Concerning Spam Mails

Author(s): Jitendra Nath Shrivastava | Maringanti Hima Bindu
Volume: 4
Issue: 8
Year: 2012
A Novel Approach for Spectrum Access Using Fuzzy Logic in Cognitive Radio

Author(s): Ila Sharma | G. Singh
Volume: 4
Issue: 8
Year: 2012
Doppler Shift Impact On The MIMO OFDM System In Vehicular Channel Condition

Author(s): Samarendra Nath Sur | Rabindranath Bera
Volume: 4
Issue: 8
Year: 2012
Performance of Linear Block Coding for Multipath Fading Channel

Author(s): Hemlata Sinha | M.R. Meshram | G.R. Sinha
Volume: 4
Issue: 8
Year: 2012
An Efficient Graph-Coloring Algorithm for Processor Allocation

Author(s): Mohammed Hasan Mahafzah
Volume: 5
Issue: 7
Year: 2013
Evaluation of the Extended CBD Model: A Case Study using IMS Application

Author(s): M. Rizwan Jameel Qureshi | Ahmed Barnawi
Volume: 5
Issue: 7
Year: 2013
Digital IIR Filter Design using Real Coded Genetic Algorithm

Author(s): Ranjit Kaur | Manjeet Singh Patterh | J.S. Dhillon
Volume: 5
Issue: 7
Year: 2013
Service Oriented Architecture for Remote Sensing Satellite Telemetry Data Implemented on Cloud Computing

Author(s): Abdelfattah El-Sharkawi | Ahmed Shouman | Sayed Lasheen
Volume: 5
Issue: 7
Year: 2013
Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards

Author(s): Quist-Aphetsi Kester | Koumadi Koudjo M | Nii.Narku Quaynor
Volume: 5
Issue: 7
Year: 2013
Stable Fuzzy PD Control with Parallel Sliding Mode Compensation with Application to Rigid Manipulator

Author(s): Farzin Piltan | Mohammad A. Bairami | Farid Aghayari | Mohammad Reza Rashidian
Volume: 5
Issue: 7
Year: 2013
Systematic Review and Classification on Video Surveillance Systems

Author(s): Fereshteh Falah Chamasemani | Lilly Suriani Affendey
Volume: 5
Issue: 7
Year: 2013
An Analytical Review of Stereovision Techniques to Reconstruct 3D Coordinates

Author(s): Raheel Ahmed | Muhammad Naeem Ahmed Khan
Volume: 5
Issue: 7
Year: 2013
Performance Analysis on Throughput in 4G Network in Digital Environment with SISO Technique

Author(s): Nausrat Jahan Ahmed | Md. Ruhul Islam | Victor Dutta | Indu Kumari Gupta
Volume: 5
Issue: 7
Year: 2013
A New Method to Improve Round Robin Scheduling Algorithm with Quantum Time Based on Harmonic-Arithmetic Mean (HARM)

Author(s): Ashkan Emami Ale Agha | Somayyeh Jafarali Jassbi
Volume: 5
Issue: 7
Year: 2013
Clustering Based on Node Density in Heterogeneous Under-Water Sensor Network

Author(s): Sharad Saxena | Shailendra Mishra | Mayank Singh
Volume: 5
Issue: 7
Year: 2013
Development of a Web Based Environmental Health Tracking System for Nigeria

Author(s): Adebayo P. Idowu | Emmanuel R. Adagunodo | Olapeju A. Esimai
Volume: 4
Issue: 7
Year: 2012
Adaptive Guidance based on Context Profile for Software Process Modeling

Author(s): Hamid Khemissa | Mohamed Ahmed-Nacer | Mourad Oussalah
Volume: 4
Issue: 7
Year: 2012
Analysis of Parametric & Non Parametric Classifiers for Classification Technique using WEKA

Author(s): Yugal kumar | G. Sahoo
Volume: 4
Issue: 7
Year: 2012
Database Semantic Interoperability based on Information Flow Theory and Formal Concept Analysis

Author(s): Guanghui Yang | Junkang Feng
Volume: 4
Issue: 7
Year: 2012
On the Quick Construction of the Edge-Balance Index Sets of a Classes of Nested Network Graph

Author(s): Hongjuan Tian | Yuge Zheng
Volume: 4
Issue: 7
Year: 2012
Artificial Neural Networks for Diagnosis of Kidney Stones Disease

Author(s): Koushal Kumar | Abhishek
Volume: 4
Issue: 7
Year: 2012
Real Time Implementation of Audio Source Localization on Blackfin ADSP-BF527 EZ-KIT

Author(s): Mustapha Djeddou | Anis Redjimi | Abdesslam Bouyeda
Volume: 4
Issue: 7
Year: 2012
Performance Evaluation of Photovoltaic Models Based on a Solar Model Tester

Author(s): Salih Mohammed Salih | Firas Fadhil Salih | Mustafa Lateef Hasan | Mustafa Yaseen Bedaiawi
Volume: 4
Issue: 7
Year: 2012
Performance Analysis of MANET Routing Protocols in Different Mobility Models

Author(s): Anuj K. Gupta | Harsh Sadawarti | Anil K. Verma
Volume: 5
Issue: 6
Year: 2013
An Efficient IBE Scheme using IFP and DDLP

Author(s): Chandrashekhar Meshram
Volume: 5
Issue: 6
Year: 2013
Study of Parametric Performance Evaluation of Machine Learning and Statistical Classifiers

Author(s): Yugal kumar | G. Sahoo
Volume: 5
Issue: 6
Year: 2013
The Major Physical Layer Constraints of Fiber Optical fiber Packet Switch Architectures

Author(s): Devesh Pratap Singh
Volume: 5
Issue: 6
Year: 2013
Intelligent Vision Methodology for Detection of the Cutting Tool Breakage

Author(s): Abdallah A. Alshennawy | Ayman A. Aly
Volume: 5
Issue: 6
Year: 2013
gSemSim: Semantic Similarity Measure for Intra Gene Ontology Terms

Author(s): Muhammad Naeem | Saira Gillani | Muhammad Abdul Qadir | Sohail Asghar
Volume: 5
Issue: 6
Year: 2013
Secured and Optimized AODV for Wireless Sensor Networks

Author(s): Benamar KADRI | Mohammed FEHAM | AbdellahMHAMMED
Volume: 5
Issue: 6
Year: 2013
Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

Author(s): Shahram Behzad | Reza Fotohi | Shahram Jamali
Volume: 5
Issue: 6
Year: 2013
Random Connection Based Scale-free Networks

Author(s): Shun-Li Lou | Xu-Hua Yang
Volume: 5
Issue: 6
Year: 2013
Ultrasound Image Despeckling using Local Binary Pattern Weighted Linear Filtering

Author(s): Simily Joseph | Kannan Balakrishnan | M.R. Balachandran Nair | Reji Rajan Varghese
Volume: 5
Issue: 6
Year: 2013
Advanced Applications of Neural Networks and Artificial Intelligence: A Review

Author(s): Koushal Kumar | Gour Sundar Mitra Thakur
Volume: 4
Issue: 6
Year: 2012
Dynamic High Level Cross Layer Security Mechanisms for Wireless Sensor Networks

Author(s): Sanjeev Puri | S.P Tripathi
Volume: 4
Issue: 6
Year: 2012
Novel Hybrid Model: Integrating Scrum and XP

Author(s): Zaigham Mushtaq | M. Rizwan Jameel Qureshi
Volume: 4
Issue: 6
Year: 2012
Robust Security System for Critical Computers

Author(s): Preet Inder Singh
Volume: 4
Issue: 6
Year: 2012
A Fuzzy Preference Relation Based Method for Face Recognition by Gabor Filters

Author(s): Soumak Biswas | Sripati Jha | Ramayan Singh
Volume: 4
Issue: 6
Year: 2012
Mining the Shirt Sizes for Indian Men by Clustered Classification

Author(s): M. Martin Jeyasingh | Kumaravel Appavoo
Volume: 4
Issue: 6
Year: 2012
Semantic Multi-granular Lock model for Object Oriented Distributed Systems

Author(s): V.Geetha | N.Sreenath
Volume: 5
Issue: 5
Year: 2013
The Extensive Bit-level Encryption System (EBES)

Author(s): Satyaki Roy
Volume: 5
Issue: 5
Year: 2013
Performance Evaluation of the Loop Buffer Switch under Prioritized Traffic

Author(s): Devesh Pratap Singh | Rajiv Srivastava
Volume: 5
Issue: 5
Year: 2013
Factors Affecting Software Cost Estimation in Developing Countries

Author(s): Ali Javed | Mirza Ahsan Ullah | Aziz-ur-Rehman
Volume: 5
Issue: 5
Year: 2013
A New Technique for Segmentation of Handwritten Numerical Strings of Bangla Language

Author(s): Md. Aktaruzzaman | Md. Farukuzzaman Khan | Ahsan-Ul-Ambia
Volume: 5
Issue: 5
Year: 2013
The Web Navigability Structure of E- Banking in India

Author(s): Arvinder Kaur | Diksha Dani
Volume: 5
Issue: 5
Year: 2013
iText – SMS-based Web Services for Low-end Cell Phones

Author(s): Juan Li | Justin Anderson | Matti Kariluoma | Kailash Joshi | Prateek Rajan | Pubudu Wijeyaratne
Volume: 5
Issue: 5
Year: 2013
VisiMark1_0: An Assistance Tool for Evaluating Robustness of Video Watermarking Algorithms

Author(s): Neeta Deshpande | Mahesh Sanghavi | Archana Rajurkar | Ramchandra Manthalkar
Volume: 5
Issue: 5
Year: 2013
Platform-Independent Courseware Sharing

Author(s): Takao Shimomura | Adriano Montanaro
Volume: 5
Issue: 5
Year: 2013
A Novel Quantum Inspired Cuckoo Search Algorithm for Bin Packing Problem

Author(s): Abdesslem Layeb | Seriel Rayene Boussalia
Volume: 4
Issue: 5
Year: 2012
Under Water Optical Wireless Communications Technology for Short and Very Short Ranges

Author(s): Abd El–Naser A. Mohamed | Ahmed Nabih Zaki Rashed | Amina E. M. El-Nabawy
Volume: 4
Issue: 5
Year: 2012
Survey on an Efficient Coverage and Connectivity of Wireless Sensor Networks using Intelligent Algorithms

Author(s): M.Siddappa | Channakrishna raju
Volume: 4
Issue: 5
Year: 2012
Image Classification using Support Vector Machine and Artificial Neural Network

Author(s): Le Hoang Thai | Tran Son Hai | Nguyen Thanh Thuy
Volume: 4
Issue: 5
Year: 2012
A Study and Critical Survey on Service Reusability Metrics

Author(s): T. Karthikeyan | J. Geetha
Volume: 4
Issue: 5
Year: 2012
Feature Selection using a Novel Particle Swarm Optimization and It’s Variants

Author(s): R. Parimala | R. Nallaswamy
Volume: 4
Issue: 5
Year: 2012
Solving Web-based Applications Architectural Problems in the Cloud: The Way Forward

Author(s): Philip Achimugu | Oluwatolani Oluwagbemi | Ishaya Gambo
Volume: 4
Issue: 5
Year: 2012
Web Refinding Support System Based on Process Recollective Activity

Author(s): Masashi Toda
Volume: 4
Issue: 5
Year: 2012
Control System of Sensorless Brushless DC Motor Based on TMS320F240

Author(s): Li Zeng | Zicheng Li
Volume: 3
Issue: 5
Year: 2011
An Optimization Model and DPSO-EDA for Document Summarization

Author(s): Rasim M. Alguliev | Ramiz M. Aliguliyev | Chingiz A. Mehdiyev
Volume: 3
Issue: 5
Year: 2011
Real-Time Air Pollutants Rendering based on Image Processing

Author(s): Demin Wang | Yan Huang | Weitao Li
Volume: 3
Issue: 5
Year: 2011
A Semantic Approach to the Notion of Representation and Its Application to Information Systems

Author(s): Lin Liu | Junkang Feng
Volume: 3
Issue: 5
Year: 2011
Aerodynamic System Modeling based on Proper Orthogonal Decomposition

Author(s): Weigang Yao | Min Xu | Xiaojuan Wang
Volume: 3
Issue: 5
Year: 2011
On the Two SAOR Iterative Formats for Solving Linear Complementarity Problems

Author(s): H.Saberi Najafi | S.A.Edalatpanah
Volume: 3
Issue: 5
Year: 2011
A Novel Method for Grayscale Image Segmentation by Using GIT-PCANN

Author(s): Haiyan Li | Guo Lei | Zhang Yufeng | Xinling Shi | Chen Jianhua
Volume: 3
Issue: 5
Year: 2011
Study of the Characteristics and Computation Analysis Results of Electromechanical Systems Models

Author(s): Berdai Abdelmajid | Abdelhadi El Moudden | Chornyi O.P.
Volume: 3
Issue: 5
Year: 2011
Performance Evaluation of Index Schemes for Semantic Cache

Author(s): Sheneela Naz | Muhammad Naeem | Amir Qayyum
Volume: 5
Issue: 4
Year: 2013
AWG Based Optical Packet Switch Architecture

Author(s): Pallavi S. | M. Lakshmi
Volume: 5
Issue: 4
Year: 2013
Evaluation of Hidden Semi-Markov Models Training Methods for Greek Emotional Text-to-Speech Synthesis

Author(s): Alexandros Lazaridis | Iosif Mporas
Volume: 5
Issue: 4
Year: 2013
A Partial Ordered Number System for Information Flow Control

Author(s): Shih-Chien Chou
Volume: 5
Issue: 4
Year: 2013
Supervised Optimization of Fuel Ratio in IC Engine Based on Design Baseline Computed Fuel Methodology

Author(s): Farzin Piltan | Saeed Zare | Fatemeh ShahryarZadeh | Mohammad Mansoorzadeh | Marzieh kamgari
Volume: 5
Issue: 4
Year: 2013
Performance Evaluation of I.T Project Management in Developing Countries

Author(s): Nadeem Majeed | Khurram Ali Shah | Khurram Ashfaq Qazi | Muazzam Maqsood
Volume: 5
Issue: 4
Year: 2013
Detecting Pirated Movie’s with Similarity Assessment Based on Earth Mover’s Distance

Author(s): Srinivas Baggam | K.Venkata Rao | P. Suresh Varma
Volume: 5
Issue: 4
Year: 2013
Association Rule Hiding by Positions Swapping of Support and Confidence

Author(s): Padam Gulwani
Volume: 4
Issue: 4
Year: 2012
A New Centrality Measure for Tracking Online Community in Social Network

Author(s): Sanjiv Sharma | G.N. purohit
Volume: 4
Issue: 4
Year: 2012
RFID Based Toll Deduction System

Author(s): Asif Ali Laghari | M. Sulleman Memon | Agha Sheraz Pathan
Volume: 4
Issue: 4
Year: 2012
Central Nervous System Based Computing Models for Shelf Life Prediction of Soft Mouth Melting Milk Cakes

Author(s): Sumit Goyal | Gyanendra Kumar Goyal
Volume: 4
Issue: 4
Year: 2012
Advance Mining of Temporal High Utility Itemset

Author(s): Swati Soni | Sini shibu
Volume: 4
Issue: 4
Year: 2012
An E-Services Success Measurement Framework

Author(s): Abdel Nasser H. Zaied
Volume: 4
Issue: 4
Year: 2012
Evaluation of the Design Metric to Reduce the Number of Defects in Software Development

Author(s): M. Rizwan Jameel Qureshi | Waseem A. Qureshi
Volume: 4
Issue: 4
Year: 2012
NoC Research and Practice: Design and Implementation of 2×4 2D-Torus Topology

Author(s): Xingang Ju | Liang Yang
Volume: 3
Issue: 4
Year: 2011
Non-polynomial Spline Difference Schemes for Solving Second-order Hyperbolic Equations

Author(s): Li-Bin Liu | Yong Zhang | Huai-Huo Cao
Volume: 3
Issue: 4
Year: 2011
Comprehensive Evaluation of Energy Transportation Corridor in China

Author(s): Guang-jun Jiang
Volume: 3
Issue: 4
Year: 2011
Research on Virtual Vehicle Driven with Vision

Author(s): Youquan Liu | Yu Cui | Enhua Wu
Volume: 3
Issue: 4
Year: 2011
Research on the time synchronization technology based on the GEO Positioning System

Author(s): Jing wenfang | Lu xiaochun | Wang Jin | Wang Danni
Volume: 3
Issue: 4
Year: 2011
Structural Conditions on Observability of Nonlinear Systems

Author(s): Qiang Ma
Volume: 3
Issue: 4
Year: 2011
Numerical Implementation of Nonlinear Implicit Iterative Method for Solving Ill-posed Problems

Author(s): Jianjun Liu | Zhe Wang | Guoqiang He | Chuangang Kang
Volume: 3
Issue: 4
Year: 2011
Several cancer classifiers combined with PLS-DR for base on gene expression profile

Author(s): JianGeng Li | Hui Li
Volume: 3
Issue: 4
Year: 2011
Internet Passport Authentication System Using Multiple Biometric Identification Technology

Author(s): V.K. Narendira Kumar | B. Srinivasan
Volume: 5
Issue: 3
Year: 2013
Comparison of on Demand Routing Protocols

Author(s): Bharat Bhushan | Shailender Gupta | C.K.Nagpal
Volume: 5
Issue: 3
Year: 2013
A Novel Circuit for Thermocouple Signals Linearization Using AD Converter

Author(s): Ayman A. Aly | Aly S. Abo El-Lail
Volume: 5
Issue: 3
Year: 2013
A Novel and Efficient Method for Protecting Internet Usage from Unauthorized Access Using Map Reduce

Author(s): P. Srinivasa Rao | K. Thammi Reddy | MHM. Krishna Prasad
Volume: 5
Issue: 3
Year: 2013
Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies

Author(s): Tousif ur Rehman | Muhammad Naeem Ahmed Khan | Naveed Riaz
Volume: 5
Issue: 3
Year: 2013
Implementing Delaunay Triangles and Bezier Curves to Identify Suitable Business Locations in the Presence of Obstacles

Author(s): Tejas Pattabhi | Arti Arya | Pradyumna N | Swati Singh | Sukanya D
Volume: 5
Issue: 3
Year: 2013
A Mobile-Based Computer Controller via Android Technology

Author(s): Siew-Chin Chong | Lee-Ying Chong | Stephanie Bosede Ajiroba
Volume: 5
Issue: 3
Year: 2013
A Survey of Catadioptric Omnidirectional Camera Calibration

Author(s): Yan Zhang | Lina Zhao | Wanbao Hu
Volume: 5
Issue: 3
Year: 2013
About One Model Strategic Game of Collective Choice

Author(s): Guram N. Beltadze | Jimsher A. Giorgobiani
Volume: 4
Issue: 3
Year: 2012
Dual Amplitude-Width PPM for Free Space Optical Systems

Author(s): Mehdi Rouissat | Riad .A Borsali | Mohammed Chick-Bled
Volume: 4
Issue: 3
Year: 2012
Impact of Variation in Pause Time and Network Load in AODV and AOMDV Protocols

Author(s): P.Periyasamy | E.Karthikeyan
Volume: 4
Issue: 3
Year: 2012
Star Coloring Problem: The DNA Solution

Author(s): G. Sethuraman | Kavitha Joseph
Volume: 4
Issue: 3
Year: 2012
Design and Simulation of MC-CDMA Transceiver via Slantlet Transform

Author(s): Kattoush A. H. | Qasaymeh M. M.
Volume: 4
Issue: 3
Year: 2012
Implementing SEReleC with EGG

Author(s): Vishwas J Raval | Padam Kumar
Volume: 4
Issue: 3
Year: 2012
Optimization for manufacturing system based on Pheromone

Author(s): Lei Wang | Dunbing Tang
Volume: 3
Issue: 3
Year: 2011
A Modified T-S Model Fuzzy Adaptive Control System Based on Genetic Algorithm

Author(s): Xiaofeng Lian | Zaiwen Liu | Zhanguo Wang
Volume: 3
Issue: 3
Year: 2011
Cyclic Spectral Features Extracting of Complex Modulation Signal Based on ACP Method

Author(s): ZHANG Xin | LIU Feng | ZHENG Peng | Wang Ze-Zhong
Volume: 3
Issue: 3
Year: 2011
Asynchronous Data Fusion With Parallel Filtering Frame

Author(s): Na Li | Junhui Liu
Volume: 3
Issue: 3
Year: 2011
Application of Cloud Theory in Association Rules

Author(s): Zhaohong Wang
Volume: 3
Issue: 3
Year: 2011
Pseudo-Spectrum Time Domain and Time Reversal Mirror technique using in Microwave-induced Thermo-Acoustic Tomography System

Author(s): Guoping Chen | Zhiqin Zhao | Qing.H. Liu
Volume: 3
Issue: 3
Year: 2011
FPGA Based High Accuracy Synchronous Acquisition Design for Binocular Vision System

Author(s): Lili Lin | Wenhui Zhou
Volume: 3
Issue: 3
Year: 2011
Fingerprints, Iris and DNA Features based Multimodal Systems: A Review

Author(s): Prakash Chandra Srivastava | Anupam Agrawal | Kamta Nath Mishra | P. K. Ojha | R. Garg
Volume: 5
Issue: 2
Year: 2013
Self-organized Detection of Relationships in a Network

Author(s): P.Lokesh Kumar Reddy | B.Rama Bhupal Reddy | S.Rama Krishna
Volume: 5
Issue: 2
Year: 2013
Knowledge Discovery in Endangered Species Diversification

Author(s): Muhammad Naeem | Sohail Asghar
Volume: 5
Issue: 2
Year: 2013
A Simple Statistical Model to Estimate Incident Solar Radiation at the Surface from NOAA AVHRR Satellite Data

Author(s): Mst. Ashrafunnahar Hena | M. Shahjahan Ali | M. Muntasir Rahman
Volume: 5
Issue: 2
Year: 2013
Developing a Virtual Group Decision Support System Based on Fuzzy Hybrid MCDM Approach

Author(s): Bahram Izadi | Saeedeh Ketabi
Volume: 5
Issue: 2
Year: 2013
On Transforming Business Patterns to Labeled Petri Nets Using Graph Grammars

Author(s): Karima Mahdi | Raida Elmansouri | Allaoua Chaoui
Volume: 5
Issue: 2
Year: 2013
Analysis and Ranking of Software Reliability Models Based on Weighted Criteria Value

Author(s): Mohd. Anjum | Md. Asraful Haque | Nesar Ahmad
Volume: 5
Issue: 2
Year: 2013
AuMID: An Authentication Mechanism based on Identity Tag under Future Internet Architecture

Author(s): Ming Wan | Ying Liu | Hongke Zhang
Volume: 2
Issue: 2
Year: 2010
A Quality Assessment of Watermarked Color Image Based on Vision Masking

Author(s): Hongmei Yang
Volume: 2
Issue: 2
Year: 2010
Using String Kernel for Document Clustering

Author(s): Qingwei Shi | Xiaodong Qiao | Xu Guangquan
Volume: 2
Issue: 2
Year: 2010
An Improved Kerberos Scheme Based on Dynamic Password

Author(s): Wen Lei | Hai Cao | Xingjian Liang | Hong Zhang
Volume: 2
Issue: 2
Year: 2010
32Still Image Compression Algorithm Based on Directional Filter Banks

Author(s): Chunling Yang | Duanwu Cao | Li Ma
Volume: 2
Issue: 2
Year: 2010
An Improved Wavelet Filtering Algorithm and Its FPGA Implementation

Author(s): Lan Yang | Xiang-mo Zhao | Fei Hui | Xin Shi
Volume: 2
Issue: 2
Year: 2010
A Clientless Endpoint Authentication SchemeBased on TNC

Author(s): Kun Wu | Zhongying Bai
Volume: 2
Issue: 2
Year: 2010
A Proxy based Framework for Efficient Range Query Processing in a Cellular Network

Author(s): Muhamed Ilyas | Vijayakumar
Volume: 2
Issue: 2
Year: 2010
On Construction of Gene-PDB Structure Mapping with Applications in Functional Annotation of Human Genes

Author(s): Xi Chen | Hao Jiang | Wai-Ki Ching | Limin Li
Volume: 3
Issue: 2
Year: 2011
Study on the Impact Breakup Model of the Space Target Based on the Thin Plate

Author(s): Weijie Wang | Huairong Shen | Yiyong Li
Volume: 3
Issue: 2
Year: 2011
Two SAOR Iterative Formats for Solving Linear Complementarity Problems

Author(s): Xian-li Han | Dong-jin Yuan | Shan Jiang
Volume: 3
Issue: 2
Year: 2011
The Control and Modeling of Diesel Generator Set in Electric Propulsion Ship

Author(s): Le Luo | Lan Gao | Hehe Fu
Volume: 3
Issue: 2
Year: 2011
Applied an Efficient Site-directed Mutagenesis Method into Escherichia coli

Author(s): Muqing Qiu
Volume: 3
Issue: 2
Year: 2011
Pronunciation Proficiency Evaluation based on Discriminatively Refined Acoustic Models

Author(s): Ke Yan | Shu Gong
Volume: 3
Issue: 2
Year: 2011
Man-made Object Detection Based on Texture Clustering and Geometric Structure Feature Extracting

Author(s): Fei Cai | Honghui Chen | Jianwei Ma
Volume: 3
Issue: 2
Year: 2011
Kernel Techniques in Support Vector Machines for Classification of Biological Data

Author(s): Hao Jiang | Wai-Ki Ching | Zeyu Zheng
Volume: 3
Issue: 2
Year: 2011
Diversity Through N-Version Programming: Current State, Challenges and Recommendations

Author(s): Raphaël Khoury | Abdelwahab Hamou-Lhadj | Mario Couture | Robert Charpentier
Volume: 4
Issue: 2
Year: 2012
Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design

Author(s): M. Rizwan Jameel Qureshi | Mahaboob Sharief Shaik | Nayyar Iqbal
Volume: 4
Issue: 2
Year: 2012
Ear Biometrics in Human Identification System

Author(s): V.K. Narendira Kumar | B. Srinivasan
Volume: 4
Issue: 2
Year: 2012
Algorithmic Aspects for Total Connected Dominating Sets in Mobile Ad Hoc Wireless Networks

Author(s): C.D.Guruprakash | B.P.Mallikarjunaswamy
Volume: 4
Issue: 2
Year: 2012
A Hybrid Algorithm for Classification of Compressed ECG

Author(s): Shubhada S.Ardhapurkar | Ramandra R. Manthalkar | Suhas S.Gajre
Volume: 4
Issue: 2
Year: 2012
Speech Quality Assessment of VoIP: G.711 VS G.722 Based on Interview Tests with Thai Users

Author(s): Therdpong Daengsi | Chai Wutiwiwatchai | Apiruck Preechayasomboon | Saowanit Sukparungsee
Volume: 4
Issue: 2
Year: 2012
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

Author(s): Vimal Bibhu | Dhirendra Kumar Singh
Volume: 4
Issue: 2
Year: 2012
Modeling Truncated Loss Data of Operational Risk in E-banking

Author(s): Maryam Pirouz | Maziar Salahi
Volume: 5
Issue: 12
Year: 2013
Controlling Citizen’s Cyber Viewing Using Enhanced Internet Content Filters

Author(s): Shafi’í Muhammad ABDULHAMID | Fasilat Folagbayo IBRAHIM
Volume: 5
Issue: 12
Year: 2013
Improving Situational Awareness for Precursory Data Classification using Attribute Rough Set Reduction Approach

Author(s): Pushan Kumar Dutta | O. P. Mishra | M.K.Naskar
Volume: 5
Issue: 12
Year: 2013
An Analytical Study of Power Line Effect on UTP Cable using Lumped Circuit Components

Author(s): Mitamoni Sarma | Shikhar Kr. Sarma
Volume: 5
Issue: 12
Year: 2013
Hybrid Communication System Based on OFDM

Author(s): Farman Ullah | Nadia N Qadri | Muhammad Asif Zakriyya | Aamir Khan
Volume: 5
Issue: 12
Year: 2013
Efficient Algorithm for Destabilization of Terrorist Networks

Author(s): Nisha Chaurasia | Akhilesh Tiwari
Volume: 5
Issue: 12
Year: 2013
Combining Time Reversal and Fast Marching Method in Wireless Indoor Positioning

Author(s): Guoping Chen | Wenshan Wang | Hao Zeng | Chun Guan | Feng He
Volume: 5
Issue: 12
Year: 2013
An Analytic Approach for Calculating Frame Erasue Rate in Cellular GSM Networks

Author(s): Ahmed M. Alaa | Hazem Tawfik
Volume: 5
Issue: 12
Year: 2013
Design Parallel Linear PD Compensation by Fuzzy Sliding Compensator for Continuum Robot

Author(s): Amin Jalali | Farzin Piltan | Mohammadreza Hashemzadeh | Fatemeh BibakVaravi | Hossein Hashemzadeh
Volume: 5
Issue: 12
Year: 2013
Implementation of Palm Print Biometric Identification System Using Ordinal Measures

Author(s): V.K. Narendira Kumar | B. Srinivasan
Volume: 5
Issue: 12
Year: 2013
Goal Structured Requirement Engineering and Traceability Model for Data Warehouses

Author(s): Vinay Kumar | Reema Thareja
Volume: 5
Issue: 12
Year: 2013
A Cluster Based Job Scheduling Algorithm for Grid Computing

Author(s): Reza Fotohi | Mehdi Effatparvar
Volume: 5
Issue: 12
Year: 2013
Analysis of MC-CDMA System in Mobile Communications

Author(s): M. F. Ghanim | M. F. L. Abdullah
Volume: 4
Issue: 12
Year: 2012
Classification of SAR Images Based on Entropy

Author(s): Debabrata Samanta | Goutam Sanyal
Volume: 4
Issue: 12
Year: 2012
Real Time Handwritten Marathi Numerals Recognition Using Neural Network

Author(s): Sandeep B. Patil | G.R. Sinha
Volume: 4
Issue: 12
Year: 2012
Efficient Networks Communication Routing Using Swarm Intelligence

Author(s): Koushal Kumar
Volume: 4
Issue: 12
Year: 2012
Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers

Author(s): G. Ramesh | R. Umarani
Volume: 4
Issue: 12
Year: 2012
Architecture Aware Key Management Scheme for Wireless Sensor Networks

Author(s): Benamar KADRI | Mohammed FEHAM | Abdellah MHAMMED
Volume: 4
Issue: 12
Year: 2012
Validated CMS: Towards New Generation of Web Content Management Systems on Web 2.0

Author(s): Zakaria Itahriouan | Anouar Abtoy | Kamal Eddine El Kadiri | Noura Aknin
Volume: 4
Issue: 12
Year: 2012
Improvement in Quality of Software Architecture via Enhanced-Pattern Driven Architecture (EPDA)

Author(s): Muhammad Fahad Khan | Kanwal Yousaf | Anam Mustaqeem | Muazaam Maqsood
Volume: 4
Issue: 12
Year: 2012
A Proposed Virtualization Technique to Enhance IT Services

Author(s): Nashaat el-Khameesy | Hossam Abdel Rahman Mohamed
Volume: 4
Issue: 12
Year: 2012
Analogue Wavelet Transform Based the Solution of the Parabolic Equation

Author(s): Jean-Bosco Mugiraneza | Amritasu Sinha
Volume: 4
Issue: 12
Year: 2012
Novel Spectrum Handoff in Cognitive Radio Networks Using Fuzzy Logic

Author(s): Nisar A. Lala | Moin Uddin | N.A. Sheikh
Volume: 5
Issue: 11
Year: 2013
WEBspike: A New Proposition of Deterministic Finite Automata and Parallel Algorithm Based Web Application for EEG Spike Recognition

Author(s): Anup Kumar Keshri | Shamba Chatterjee | Barda Nand Das | Rakesh Kumar Sinha
Volume: 5
Issue: 11
Year: 2013
Design and Implementation of Low Power 8-bit Carry-look Ahead Adder Using Static CMOS Logic and Adiabatic Logic

Author(s): Abdul Sajid | Ahmad Nafees | Saifur Rahman
Volume: 5
Issue: 11
Year: 2013
One-bit Hard Combination Decision Scheme for Cooperative Spectrum Sensing in Cognitive Radio

Author(s): Mohammed Mynuddin | Tania Khadem | Md. Ibrahim Abdullah | Md. Shamim Hossain | Mohammad Alamgir Hossain
Volume: 5
Issue: 11
Year: 2013
A Framework for Selection of Membership Function Using Fuzzy Rule Base System for the Diagnosis of Heart Disease

Author(s): Manisha Barman | J Paul Chaudhury
Volume: 5
Issue: 11
Year: 2013
Performance Comparison of Various Diversity Techniques using Matlab Simulation

Author(s): Sanjiv Kumar | P. K. Gupta | G. Singh | D. S. Chauhan
Volume: 5
Issue: 11
Year: 2013
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Networks Performance

Author(s): Nashaat el-Khameesy | Hossam Abdel Rahman Mohamed
Volume: 5
Issue: 11
Year: 2013
A Novel Cat Swarm Optimization Algorithm for Unconstrained Optimization Problems

Author(s): Meysam Orouskhani | Yasin Orouskhani | Mohammad Mansouri | Mohammad Teshnehlab
Volume: 5
Issue: 11
Year: 2013
Beampattern for Multiple Antennas in Hybrid Terrestrial Satellite Communications System (HTSCS)

Author(s): Farman Ullah | Nadia N Qadri | Aamir Khan | Khalid Ibrahim
Volume: 5
Issue: 11
Year: 2013
Artificial Neural Network Turbulent Modeling for Predicting the Pressure Drop of Nanofluid

Author(s): M. S. Youssef | Ayman A. Aly
Volume: 5
Issue: 11
Year: 2013
Utilizing Conceptual Indexing to Enhance the Effectiveness of Vector Space Model

Author(s): Aya M. Al-Zoghby | Ahmed Sharaf Eldin Ahmed | Taher T. Hamza
Volume: 5
Issue: 11
Year: 2013
Design Serial Fuzzy Variable Structure Compensator for Linear PD Controller: Applied to Rigid Robot

Author(s): Farzin Piltan | Saleh Mehrara | Javad Meigolinedjad | Reza Bayat
Volume: 5
Issue: 11
Year: 2013
Using Web Services Standards for Dealing with Complexities of Multiple Incompatible Applications

Author(s): Quist-Aphetsi Kester | Ghartey Nana Gyankumah | Ajibade Ibrahim Kayode
Volume: 4
Issue: 11
Year: 2012
Design and Development of a Simple Low-cost Touchscreen to Control Home Automation System

Author(s): M. Muntasir Rahman | Md. Aktaruzzaman | Mst. Ashrafunnahar Hena
Volume: 4
Issue: 11
Year: 2012
Performance Analysis of 802.16 (WIMAX) Networks under Various Routing Protocols and Traffic Loads

Author(s): Mohammad Rehan Rasheed | Ibrahim M. Hussain
Volume: 4
Issue: 11
Year: 2012
Energy Detection Performance of Spectrum Sensing in Cognitive Radio

Author(s): Md. Shamim Hossain | Md. Ibrahim Abdullah | Mohammad Alamgir Hossain
Volume: 4
Issue: 11
Year: 2012
Downlink and Uplink Physical Channels in Long Term Evolution

Author(s): A. Z. Yonis | M. F. L. Abdullah
Volume: 4
Issue: 11
Year: 2012
Optical Packet Switch Architectures: A Comparative Study

Author(s): Preeti Singh | Seema Verma
Volume: 4
Issue: 11
Year: 2012
A Method of Movie Business Prediction Using Back-propagation Neural Network

Author(s): Debaditya Barman | Nirmalya Chowdhury
Volume: 4
Issue: 11
Year: 2012
Prediction of Missing Values for Decision Attribute

Author(s): T. Medhat
Volume: 4
Issue: 11
Year: 2012
Simulation and Tuning of PID Controllers using Evolutionary Algorithms

Author(s): T. Lakshmi Priyanka | K.R.S. Narayanan | T.Jayanthi | S.A.V. Satya Murty
Volume: 4
Issue: 11
Year: 2012
Artificial Bee Colony and Its Application for Image Fusion

Author(s): Prabhat Kumar Sharma | Bhavya V S | Navyashree K M | Sunil K S | Pavithra P
Volume: 4
Issue: 11
Year: 2012
On Approximate Equivalences of Multigranular Rough Sets and Approximate Reasoning

Author(s): B. K. Tripathy | Anirban Mitra
Volume: 5
Issue: 10
Year: 2013
Secluding Efficient Geographic Multicast Protocol against Multicast Attacks

Author(s): A. Amuthan | R. Kaviarasan | S. Parthiban
Volume: 5
Issue: 10
Year: 2013
Web Crawler Based on Mobile Agent and Java Aglets

Author(s): Md. Abu Kausar | V. S. Dhaka | Sanjeev Kumar Singh
Volume: 5
Issue: 10
Year: 2013
Impact of Throughput in Enhancing the Efficiency of Cognitive Radio Ad Hoc Network - A Study

Author(s): V. Jayaraj | J. Jegathesh Amalraj | L. Nagarajan
Volume: 5
Issue: 10
Year: 2013
Ontology Based Information Retrieval in Semantic Web: A Survey

Author(s): Vishal Jain | Mayank Singh
Volume: 5
Issue: 10
Year: 2013
Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols

Author(s): Reza Fotohi | Shahram Jamali | Fateme Sarkohaki
Volume: 5
Issue: 10
Year: 2013
Performance Analysis of Classification Methods and Alternative Linear Programming Integrated with Fuzzy Delphi Feature Selection

Author(s): Bahram Izadi | Bahram Ranjbarian | Saeedeh Ketabi | Faria Nassiri-Mofakham
Volume: 5
Issue: 10
Year: 2013
Measurement Based Admission Control Methods in IP Networks

Author(s): Erik Chromy | Tomas Behul
Volume: 5
Issue: 10
Year: 2013
An Integrated Knowledge Base System Architecture for Histopathological Diagnosis of Breast Diseases

Author(s): Aderonke A. Kayode | Babajide S.Afolabi | Kayode A. Adelusola
Volume: 5
Issue: 1
Year: 2012
Design Model Free Switching Gain Scheduling Baseline Controller with Application to Automotive Engine

Author(s): Farzin Piltan | Mehdi Akbari | Mojdeh Piran | Mansour Bazregar
Volume: 5
Issue: 1
Year: 2012
Analysis of Tandem Repeat Patterns in Nlrc4 using a Motif Model

Author(s): Sim-Hui Tee
Volume: 5
Issue: 1
Year: 2012
A Simple Model of Mapping of Land Surface Temperature from Satellite Digital Images in Bangladesh

Author(s): Shaikh Habiba Sultana | M. Shahjahan Ali | Mst. Ashrafunahar Hena | M. Muntasir Rahman
Volume: 5
Issue: 1
Year: 2012
Performance Evaluation of the Loop Buffer Switch Under Prioritized Traffic and Optical Regeneration

Author(s): Devesh Pratap Singh | Rafik Ahmad | Rajiv Srivastava
Volume: 5
Issue: 1
Year: 2012
Fault Tolerant Message Efficient Coordinator Election Algorithm in High Traffic Bidirectional Ring Network

Author(s): Danial Rahdari | Amir Masoud Rahmani | Afsane Arabshahi
Volume: 5
Issue: 1
Year: 2012
Interpretation of Normal and Pathological ECG Beats using Multiresolution Wavelet Analysis

Author(s): Shubhada S.Ardhapurkar | Ramandra R. Manthalkar | Suhas S.Gajre
Volume: 5
Issue: 1
Year: 2012
Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings

Author(s): Jianhua Zhu | Guohua Cui | Shiyang Zhou
Volume: 1
Issue: 1
Year: 2009
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems

Author(s): Jianfeng Lu | Ruixuan Li | Zhengding Lu | Xiaopu Ma
Volume: 1
Issue: 1
Year: 2009
A System Call Randomization Based Method for Countering Code-Injection Attacks

Author(s): Zhaohui Liang | Bin Liang | Lupin Li
Volume: 1
Issue: 1
Year: 2009
A Wireless Video Transmission Scheme Based on MAC-independent Opportunistic Routing &Encoding Protocol

Author(s): Yong Liu | Li Chen | Lifeng Sun | Shiqiang Yang
Volume: 2
Issue: 1
Year: 2010
Low-power Wireless Pressure Transmitter and Net of Oil-well Based on Zigbee

Author(s): Xiwei Yang | Changyun Li
Volume: 2
Issue: 1
Year: 2010
Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks

Author(s): Yuan Li | Xing Luo
Volume: 2
Issue: 1
Year: 2010
A Genetic Programming Framework for Topic Discovery from Online Digital Library

Author(s): Yinxing Li | Ning Li
Volume: 2
Issue: 1
Year: 2010
Research of CWS’ Particle Size Distribution based on Ultrasonic Attenuation Theory

Author(s): WANG Weidong | ZHANG Chenglian | CHU Fengge
Volume: 2
Issue: 1
Year: 2010
Research on Dynamic Water Surface and Ripple Animation

Author(s): Yufen Feng | Haiyan Fan
Volume: 2
Issue: 1
Year: 2010
A SCPS-NP Routing Algorithm Based on Mobile IP Routing

Author(s): Kai Hu | He Yang | Hong Jiang | Shu Jiang | Lujia Chen
Volume: 2
Issue: 1
Year: 2010
An Improved Active Shape Model Application on Facial Feature Localization

Author(s): Min Wang | Yiling Wen | Li Fang | Weiping Sun
Volume: 2
Issue: 1
Year: 2010
Multiresolution Fuzzy C-Means Clustering Using Markov Random Field for Image Segmentation

Author(s): Xuchao Li | Suxuan Bian
Volume: 1
Issue: 1
Year: 2009
Hierarchical Matching for Chinese Calligraphic Retrieval Using Skeleton Similarity

Author(s): Jie Chen | Fuxi Zhu
Volume: 1
Issue: 1
Year: 2009
Research of Intrusion Detection Technology and its Formal Modeling

Author(s): PENG Yali | YU Min
Volume: 1
Issue: 1
Year: 2009
A Cost-Aware Resource Selection for Dataintensive Applications in Cloud-oriented Data Centers

Author(s): Wei Liu | Feiyan Shi | Wei Du | Hongfeng Li
Volume: 3
Issue: 1
Year: 2011
A Hybrid P2P Approach to Service Discovery in the Cloud

Author(s): Jing Zhou | Nor Aniza Abdullah | Zhongzhi Shi
Volume: 3
Issue: 1
Year: 2011
Trusted Mobile Client for Document Security in Mobile Office Automation

Author(s): Xiaojun Yu | Qiaoyan Wen
Volume: 3
Issue: 1
Year: 2011
A new Measuring Method of Flux Linkage of SRM

Author(s): Chuntang Zhang | Hui Kong
Volume: 3
Issue: 1
Year: 2011
Real-time Flame Rendering with GPU and CUDA

Author(s): Wei Wei | Yanqiong Huang
Volume: 3
Issue: 1
Year: 2011
Mixed QoS Controlled Wireless Streaming Media Transmission Strategy

Author(s): Fu Xianping | Men Yugang
Volume: 3
Issue: 1
Year: 2011
A Differentiated QoS Supporting PPS Solution Based on CICQ

Author(s): Li Xiuqin | Yang Xiliang | Lan Julong
Volume: 3
Issue: 1
Year: 2011
An Efficient Dimension Reduction Quantization Scheme for Speech Vocal Parameters

Author(s): Qiang Xiao | Liang Chen | Ya Wang
Volume: 3
Issue: 1
Year: 2011
Performance of a Slantlet Based OFDM Transceiver under Different Channel Conditions

Author(s): Abbas Hasan Kattoush | Qasaymeh M. M.
Volume: 4
Issue: 1
Year: 2012
Using Logic Programming to Represent Information Content Inclusion Relations

Author(s): Doug Salt | Junkang Feng
Volume: 4
Issue: 1
Year: 2012
Recognition of Marrow Cell Images Based on Fuzzy Clustering

Author(s): Xitao Zheng | Yongwei Zhang | Yehua Yu | Jing Zhang | Jun Shi
Volume: 4
Issue: 1
Year: 2012
A New Secure Multicast Key Distribution Scheme Using Tabulation Method

Author(s): R. Varalakshmi | V. Rhymend Uthariaraj
Volume: 4
Issue: 1
Year: 2012
Architecture for Accessing Heterogeneous Databases

Author(s): Mohd Kamir Yusof | Ahmad Faisal Amri Abidin | Mohd Nordin Abdul Rahman
Volume: 4
Issue: 1
Year: 2012
Performance of Frequency Domain DFE Using Subcarrier Allocation

Author(s): P.SIVAKUMAR | M.RAJARAM
Volume: 4
Issue: 1
Year: 2012
A Data Mining-Based Response Model for Target Selection in Direct Marketing

Author(s): Eniafe Festus Ayetiran | Adesesan Barnabas Adeyemo
Volume: 4
Issue: 1
Year: 2012
Affiliate Program      Why do you need a reservation system?