Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Software Engineering and Soft Computing

ISSN: 2251--7545
Publisher: Advance Academic Publisher


ADD TO MY LIST
 
Design of a High Speed XAUI Based on Dynamic Reconfigurable Transceiver IP Core

Author(s): Haipeng Zhang 1 | Lingjun Kong 2 | Xiuju Huang 3 | Mengmeng Cao 4
Volume: 2
Issue: 9
Year: 2012
Improving of Authentication Mechanism in IMS Environment By Integration Hop By Hop And End To End Model

Author(s): maisam mohammadian 1 | nasser mozayanii 2
Volume: 2
Issue: 9
Year: 2012
Optimal Intelligent Control for Wind Turbulence Rejection in WECS Using ANNs and Genetic Fuzzy Approach

Author(s): hadi kasiri 1 | Hamid Reza Momeni 2 | Atieh Kasiri 3
Volume: 2
Issue: 9
Year: 2012
Measuring Cost of Quality(CoQ)- on SDLC projects is indispensible for effective Software Quality Assurance

Author(s): Parvez Mahmood Khan 1 | M.M.Sufyan Beg 2
Volume: 2
Issue: 9
Year: 2012
Words ordering and corresponding verb-subject agreements in English-Arabic machine translation: Hybrid-based approach

Author(s): Mohammed Abu Shquier 1 | Omer Abu Shqeer 2
Volume: 2
Issue: 8
Year: 2012
Analysis of a two echelon Queueing-service system by considering Speed-Quality tradeoff in service

Author(s): Ata G.zare 1 | Alireza Haji 2 | Farshid Jamali 3
Volume: 2
Issue: 8
Year: 2012
Long Term Energy Demand Forecasting based on Hybrid, Optimization: Comparative Study

Author(s): Wahab Musa 1 | Ku Ruhana Ku-Mahamud 2 | Azman Yasin 3
Volume: 2
Issue: 8
Year: 2012
A Formal Framework for the Formalization of Informal Requirements

Author(s): Florent Peres 1 | Jing Yang 2 | Mohamed Ghazel 3
Volume: 2
Issue: 8
Year: 2012
Fuzzy Logic Based Multi User Adaptive Test System

Author(s): Atif Ali Khan 1 | Oumair Naseer 2
Volume: 2
Issue: 8
Year: 2012
An Introduction to Distributed Cryptography Based on Quantum Cryptography

Author(s): Leila Pashaie Bonab 1 | Jaber Karimpour 2 | Mohamdali Jamali 3 | Ayaz Isazadeh 4
Volume: 2
Issue: 8
Year: 2012
Managing Software Development Risk with the OODA Loop

Author(s): Nathaniel D. Amsden 1 | Narasimha K. Shashidhar 2
Volume: 2
Issue: 7
Year: 2012
A Prediction Model for System Testing Defects using Regression Analysis

Author(s): Muhammad Dhiauddin Mohamed Suffian 1 | Suhaimi Ibrahim 2
Volume: 2
Issue: 7
Year: 2012
CLTChord: Improving lookup at the Chord protocol using cache location table

Author(s): Jaber Karimpour 1 | Majid Moghaddam 2 | Ali A. Noroozi 3
Volume: 2
Issue: 7
Year: 2012
Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design

Author(s): Yixin Liu 1 | Haipeng Zhang 2 | Tao Feng 3
Volume: 2
Issue: 7
Year: 2012
Lightweight Local Area Network Dynamic Routing Protocol for MANET

Author(s): Adam Macintosh 1 | Mohammad Ghavami 2 | Ming Fei Siyau 3
Volume: 2
Issue: 7
Year: 2012
Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering

Author(s): Zahra Vali 1 | Massoud Reza Hashemi 2 | Neda Moghim 3
Volume: 2
Issue: 6
Year: 2012
Modeling of a Memory Interface Using Modeling Language

Author(s): Akitoshi Matsuda 1 | Shinichi Baba 2
Volume: 2
Issue: 6
Year: 2012
ShAppliT: A Novel Broker-mediated Solution to Generic Application Sharing in a Cluster of Closed Operating Systems

Author(s): CHEN GUO 1 | Cenzhe Zhu 2 | Teng Tiow Tay 3
Volume: 2
Issue: 6
Year: 2012
Least Entropy-Like Approach for Reconstructing L-Shaped Surfaces Using a Rotating Array of Ultrasonic Sensors

Author(s): Nicola Ivan Giannoccaro 1 | Giovanni Indiveri 2 | Luigi Spedicato 3
Volume: 2
Issue: 6
Year: 2012
A Simple Software Application for Simulating Commercially Available Solar Panels

Author(s): Nalika Ulapane 1 | Sunil Abeyratne 2 | Prabath Binduhewa 3 | Chamari Dhanapala 4 | Shyama Wickramasinghe 5 | Nimal Rathnayake 6
Volume: 2
Issue: 5
Year: 2012
Service Oriented Paradigm for Massive Multiplayer Online Games

Author(s): Farrukh Arslan 1
Volume: 2
Issue: 5
Year: 2012
Discrete Event Simulation and Petri net Modeling for Reliability Analysis

Author(s): Behrooz Safarinejadian 1
Volume: 2
Issue: 5
Year: 2012
An Ant Colony Clustering Algorithm Using Fuzzy Logic

Author(s): S.Nithya 1 | 2 R.Manavalan 2
Volume: 2
Issue: 5
Year: 2012
Research on Vision-based Autonomous Navigation Algorithm for RVD between Spacecrafts

Author(s): wei sun 1 | Long Chen 2 | Kai Liu 3
Volume: 2
Issue: 5
Year: 2012
Optimization of Routes in Mobile Ad hoc Networks using Artificial Neural Networks

Author(s): seyed saeed sadat noori 1 | seyed ali sadat noori 2 | seyed morteza lari baghal 3
Volume: 2
Issue: 4
Year: 2012
Relative Pose Measurement Algorithm of Non-cooperative Target based on Stereo Vision and RANSAC

Author(s): Long Chen 1 | Baolong GUO 2 | Wei SUN 3
Volume: 2
Issue: 4
Year: 2012
Integration of Unicast and Multicast Scheduling in Input-Queued Packet Switches with High Scalability

Author(s): Yongbo Jiang 1 | Zhiliang Qiu 2 | Jian Zhang 3 | Jun Li 4
Volume: 2
Issue: 4
Year: 2012
Estimation of Power Losses on Radial Feeder Using Minimum Electrical Measurements and Differential Evolution Method

Author(s): Marinko Barukcic 1 | Srete Nikolovski 2 | Zeljko Hederic 3
Volume: 2
Issue: 4
Year: 2012
Improved Camshift with adaptive searching window

Author(s): Aixia Wang 1 | Jingjiao Li 2 | Zhenlin Lu 3
Volume: 2
Issue: 3
Year: 2012
Web 2.0-Based Academician Profile Information System

Author(s): Lee Beng Yong 1 | Rosita Suhaimi 2 | Iris Syawe Seh Ling 3 | Robert John Jingut 4 | Hawa Nahar 5
Volume: 2
Issue: 3
Year: 2012
Mapping of QoS between UMTS and WiMAX in Tight Coupling Heterogeneous Wireless Network

Author(s): Charles Sarraf 1 | Firas Ousta 2 | Nidal Kamel 3 | Mohd Zuki 4
Volume: 2
Issue: 3
Year: 2012
An Objects Detecting and Tracking method based on MSPF and SVM

Author(s): Wei Sun 1 | Xu Zhang 2 | Yunyi Yan 3
Volume: 2
Issue: 2
Year: 2012
Empirical Study of the Inertia Weight Particle Swarm Optimization with Constraint Factor

Author(s): YAN Chun-man 1 | GUO Bao-long 2 | WU Xian-xiang 3
Volume: 2
Issue: 2
Year: 2012
A New Centralized Multicast Wavelength Allocation Algorithm in Optical Fiber Network

Author(s): Rafed Sabbar Abbas 1 | Hamed Saffa Al-Raweshidy 2
Volume: 2
Issue: 11
Year: 2012
Security Implications of Distributed Database Management System Models

Author(s): Charupalli Sunil Kumar 1 | J Seetha 2 | S.R. Vinotha 3
Volume: 2
Issue: 11
Year: 2012
Key parameters generation of the navigation data of GPS Simulator

Author(s): Tao Feng 1 | qianqian wu 2 | Haipeng Zhang 3
Volume: 2
Issue: 10
Year: 2012
Towards a Curriculum Design Maturity Model

Author(s): Thong Chee Ling 1 | Yusmadi Yah Jusoh 2 | Rusli Abdullah 3 | Nor Hayati Alwi 4
Volume: 2
Issue: 10
Year: 2012
An Energy Optimization Algorithm for Mobile Ad Hoc Network

Author(s): Mohamed Belkheir 1 | Zeyad Qacem 2 | Merahi Bouziani 3 | Abderrahmane Ghelamellah 4
Volume: 2
Issue: 10
Year: 2012
A novel classificatory filter for multiple types of erotic images based on Internet

Author(s): Xu Zhang 1 | Baolong Guo 2 | Yunyi Yan 3 | Chunman Yan 4
Volume: 1
Issue: 1
Year: 2011
Simulated Annealing algorithm for Data Aggregation Trees in Wireless Sensor Networks

Author(s): Ladan Darougaran 1 | Hossein Shahinzadeh 2 | Mohammadreza Salavati 3
Volume: 1
Issue: 1
Year: 2011
PCA- Based Feature Extraction and LDA algorithm for Preterm Birth Monitoring

Author(s): Muhammad Naufal Mansor 1 | Sazali Yaacob 2 | Hariharan Muthusamy 3 | Shafriza Nisha Basah 4 | Shahrul Hi-fi Syam bin Ahmad Jamil 5 | Mohd Lutfi Mohd Khidir 6 | Muhammad Nazri Rejab 7 | Ku Mohd Yusri Ku Ibrahim 8 | Addzrull Hi-fi Syam bin Ahmad Jamil 9 | Jamaluddin Ahmad 10 | Ahmad Kad 11
Volume: 1
Issue: 1
Year: 2011
PCA- Based Feature Extraction and k-NN algorithm for Early Jaundice Detection

Author(s): Muhammad Naufal Mansor 1 | Sazali Yaacob 2 | Hariharan Muthusamy 3 | Shafriza Nisha Basah 4 | Shahrul Hi-fi Syam bin Ahmad Jamil 5 | Mohd Lutfi Mohd Khidir 6 | Muhammad Nazri Rejab 7 | Ku Mohd Yusri Ku Ibrahim 8 | Addzrull Hi-fi Syam bin Ahmad Jamil 9 | Jamaluddin Ahmad 10 | Ah 11
Volume: 1
Issue: 1
Year: 2011
A Data Mining Approach To Gen Dynamic Behavioral Process

Author(s): Mehdi Alimi Motlagh Fard 1 | Hamid Reza Ranjbar 2 | Abbas Davani 3 | Mehdi Sadegh Zadeh 4
Volume: 1
Issue: 1
Year: 2011
Prediction of under pickling defects on steel strip surface

Author(s): Valentina Colla 1 | Nicola Matarese and Gianluca Nastasi 2
Volume: 1
Issue: 1
Year: 2011
An overview to Software Architecture in Intrusion Detection System

Author(s): Mehdi Bahrami 1 | Mohammad Bahrami 2
Volume: 1
Issue: 1
Year: 2011
Save time & money - Smart Internet Solutions      Why do you need a reservation system?