default search action
Computer and Information Science, Volume 4
Volume 4, Number 1, January 2011
- Vahid Garousi:
Experience in Developing a Robot Control Software. 3-13 - Thanongsak Aneksrup, Pipat Hiranvanichakorn:
Efficient Group Key Agreement on Tree-based Braid Groups. 14-27 - Waheed Yasin, Hamidah Ibrahim, Nor Asilah Wati Abdul Hamid, Nur Izura Udzir:
A Systematic Review of File Sharing in Mobile Devices Using Peer-To-Peer Systems. 28-41 - S. Karpagachelvi, M. Arthanari, M. Sivakumar:
Classification of ECG Signals Using Extreme Learning Machine. 42-52 - Edem E. Williams, Essien Eyo:
Building a Cost Effective Network for E-learning in Developing Countries. 53-59 - Mazen Abu-Zaher:
Modified Least Significant Bit (MLSB). 60-67 - Ling Zhang, Yucai Dong, Hongtao Shi, Ping Chen, Xuhui Li:
The Extraction of the FAE Image Profilogram Based on the Grey Level Thresholding. 68-71 - Abbas Toloie Eshlaghy, Alireza Pourebrahimi, Babak Zendehdel Nobari:
Presenting a Model for Ranking Organizations Based on the Level of the Information Security Maturity. 72-78 - Olusegun Folorunso, Gladys Adewale, Adewale Opeoluwa Ogunde, Julius Olatunji Okesola:
Pinch Analysis as a Knowledge Management Tool for Optimization in Supply Chain. 79-89 - Qiang Zhang, Jun Zhou, Xiaozhou Yu:
A Kind of Low-cost Non-intrusive Autonomous Fault Emulation System. 90-99 - Salih Mohammed Salih, Waleed Ameen Mahmoud:
Modified OFDM Model Based on Sub-Sliding Window Technique. 100-109 - Feng Xue, Gang Lv:
Tracking Formant Trajectory of Tracheoesophageal Speech Using Hidden Dynamic Model. 110-115 - Omid Moradi:
A Hopfield Neural Network for Channel Assignment Problem in Cellular Radio Networks. 116-129 - Ali Keshavarzi, Fereydoon Sarmadian, Reza Labbafi, Abbas Ahmadi:
Developing Pedotransfer Functions for Estimating Field Capacity and Permanent Wilting Point Using Fuzzy Table Look-up Scheme. 130-141 - Shuhua Jiang:
Research on Image Acquisition System Based on Binocular Stereo Vision. 142-150 - Farzaneh Pakzad, Marjan Kuchaki Rafsanjani:
Intrusion Detection Techniques for Detecting Misbehaving Nodes. 151-159 - Dan Wang, Yufei Zhang:
A Dynamic Secret Sharing Scheme Based on Factorization. 160-162 - Ch. Suresh, E. Vinod kumar, L. v. v. r. k. Sriharsha, Suresh Chandra Satapathy, P. V. G. D. Prasad Reddy:
PSO Clustering with Preprocessing of Data Using Artificial Immune System. 163-171 - Alireza Jolfaei, Abdolrasoul Mirghadri:
Image Encryption Using Chaos and Block Cipher. 172-185 - Zhaoxing Liu, Ning Zhang:
One Improved Collaborative Filtering Method Based on Information Transformation. 186-190 - Wan Malini Wan Isa, Jamaliah Abdul Hamid, Hamidah Ibrahim, Mohd Hasan Selamat, Rusli Abdullah, Nurul Amelina Nasharuddin:
Testing the Accuracy of Text Deconstruction using PTree tool. 191-197 - Juan Tian, Cheng Wang, Xixue Zhang:
Design of the Storage Battery Online Monitoring System. 198-204 - Roslina Ibrahim, Rasimah Che Mohd Yusoff, Hasiah Mohamed Omar, Azizah Jaafar:
Students Perceptions of Using Educational Games to Learn Introductory Programming. 205-216 - R. Thilepa, M. Thanikachalam:
A New Process of Color Images Recognition by Using ART-1 Neural Network. 217-223 - Lanhua Zhang:
Studies of the HMIS Based on HL7 Criterions. 224-227
Volume 4, Number 2, March 2011
- Rusli Abdullah, Zainab Mohamed Shah, Amir Mohamed Talib:
A Framework of Tools for Managing Software Architecture Knowledge. 2-16 - Mingtao Shi:
Necessities and Tactics of Tool-Based Software Testing. 17-20 - Ugochukwu C. Okonkwo, Efosa Obaseki:
Simulation Model of Multiple Queueing Parameters: A Case of Vehicle Maintenance System. 21-33 - Jing Huang, Deming Liu, Cheng Zeng:
10 Gb/s WDM-PON Using Downstream OFDM and Upstream OOK. 34-38 - Rahul Malhotra, Narinder Singh, Yaduvir Singh:
Genetic Algorithms: Concepts, Design for Optimization of Process Controllers. 39-54 - Huey Fang Ong, Norwati Mustapha, Md Nasir Sulaiman:
Integrative Gene Selection for Classification of Microarray Data. 55-63 - Mojtaba Karami, Marjan Kuchaki Rafsanjani, Amirhosein Fathinavid, Yaeghoob Yavari:
QAIDS: Quantitative and Agent based Intrusion Detection System. 64-74 - K. Duraiswamy, B. Jayanthi:
A New Approach to Discover Periodic Frequent Patterns. 75-80 - Hassan Rangriz, Javad Mehrabi, Alireza Azadegan:
The Impact of Human Resource Information System on Strategic Decisions in Iran. 81-87 - Sara Sahebdel, Hamidreza Bakhshi:
Relay Selection Schemes for Cooperative Communications Systems Sensor Networks. 88-95 - Edem E. Williams, Bassey Eyo, Stephen Akpan:
Linden Labs Second Life: Understanding the Business Model and Sources of Commercial and Social Success or Decline of Second Life. 96-101 - Seyyed Mohammad Reza Farshchi, Seyyede Aliye NezhadHoseini, Fateme Mohammadi:
A Novel Implementation of G-Fuzzy Logic Controller Algorithm on Mobile Robot Motion Planning Problem. 102-114 - Aliaa A. A. Youssif, Wesam A. A. Asker:
Automatic Facial Expression Recognition System Based on Geometric and Appearance Features. 115-124 - Huafeng Xie, Fang Wu, Xuying Lu:
Study on the Optimization Design of the Subject Indexing Based on the Word-frequency Statistics. 125-131 - Latef Oladimeji Yusuf, Olusegun Folorunso, Adio T. Akinwale, I. A. Adejumobi:
Service Oriented Application in Agent Based Virtual Knowledge Community. 132-147 - Lanhua Zhang, Xiaochen Xu:
A Community Public Health System Design based on HL7 Criterions. 148-151 - Sara Qazvini Abhari, Towhid Zargar Ershadi:
Target Tracking Based on Mean Shift and KALMAN Filter with Kernel Histogram Filtering. 152-160 - Bingchao Lei:
Improved RPPI Strategy for Software Reliability Analysis Basing on Multi-objective Optimizing Method. 161-164
Volume 4, Number 3, June 2011
- Ibrahim A. Alghamdi, Robert Goodwin, Giselle Rampersad:
E-Government Readiness Assessment for Government Organizations in Developing Countries. 3-17 - Huiran Zhang, Yantao Li, Zheng Tang:
Study on Brainwave Responses from Ears: the Event-related Synchronization under the Auditory Stimulus. 18-32 - Samer M. Barakat, Khalil Yaghi, Zaina Hamdan:
MIS Students Perception of Most Wanted MIS Job Market Skills. 33-42 - Latef Oladimeji Yusuf, Olusegun Folorunso, Adio T. Akinwale, I. A. Adejumobi:
Visualizing and Assessing a Compositional Approach to Service-Oriented Business Process Design Using Unified Modelling Language (UML). 43-59 - Chang-yong Liang, Enqiao Zhang, Yong Ding, Xiaowen Qi:
Comprehensive Evaluation System and Selection Method of Tax Software. 60-66 - Hanadi Al-Zegaier, Hasan Ali Al-Zu'bi, Samer M. Barakat:
Investigating the Link between Web Data Mining and Strategic Human Resources Planning. 67-75 - Saeid Jorfi, Khalil Md. Nor, Lotfi Najjar:
Assessing the Impact of IT Connectivity and IT Capability on IT-Business Strategic Alignment: An Empirical Study. 76-87 - Min Feng, Zhenyan Wang:
A Genetic K-means Clustering Algorithm Based on the Optimized Initial Centers. 88-94 - Mingtao Shi:
Capturing Software Requirements of Business Processes in Multinational Firms: A Conceptual Framework for Practitioners. 95-98 - Baoling Qin, Minwei Yang, Yao He:
Research and Development of the Thin Terminal Technology of Broadband Computer. 99-105 - Rahmat Widia Sembiring, Jasni Mohamad Zain:
The Design of Pre-Processing Multidimensional Data Based on Component Analysis. 106-115 - Deyuan Zhang, Bingquan Liu, Chengjie Sun, Xiaolong Wang:
Learning to Combine Kernels for Object Categorization. 116-124 - Z. Sakhi, Abderrahim Tragha, R. Kabil, M. Bennai:
Grover Algorithm Applied to Four Qubits System. 125-130 - Kone Forokoro, Zhong Xie:
WebGIS to Managing Natural Resource: Case of Flooded Pasture in Lake Débo and Walado Débo. 131-137 - Nabil Keskes, Ahmed Lehireche, Abdellatif Rahmoun:
Web Services Selection Based on Mixed Context and Quality of Service Ontology. 138-150 - Peng Li:
Study on the Wireless Ad Hoc Network Secure Routing Based on the SAR Technology. 151-156 - Karim Q. Hussein, Ayman J. Nsour:
Multimedia Enhancing Computer Based Training Modules for The Deaf, Supported by Case Study. 157-168 - Yun Niu, Xuguang Wu, Junhong He, Liang Hong:
Integrated Synthesis of Control and Bandwidth Scheduling on Networked Control Systems. 169-180 - Yujuan Li, Mei Wang, Zhunan Zhou:
A NCRE-oriented Teaching Mode. 181-183 - Abbas Toloie Eshlaghy, Alireza Pourebrahimi, Azam Farmanara:
Pathology of E-commerce with an Approach to Information Technology (A Case Study: Knauf Iran Company). 184-192
Volume 4, Number 4, July 2011
- David Salb, Hershey H. Friedman, Linda Weiser Friedman:
The Role of Information Technology in Fulfilling the Promise of Corporate Social Responsibility. 2-9 - Shafinah Kamarudin, Mohd Ikram Mohammad:
File Security based on Pretty Good Privacy (PGP) Concept. 10-28 - Pedro Ivan Tello Flores, Luis Enrique Colmenares Guillén, Omar Ariosto Niño Prieto:
Approach of RSOR Algorithm Using HSV Color Model for Nude Detection in Digital Images. 29-45 - Marwa Salah Farhan, Mohamed E. Marie, Laila Mohamed El Fangary, Yehia K. Helmy:
An Integrated Conceptual Model for Temporal Data Warehouse Security. 46-57 - Zahid Javed, M. Shakeel Faridi, M. Haris Abid, Shams-ul-Hassan, Abdul Hyee, Fahad Jan:
Web Based EIS to Support Entrepreneurs and SMEs Analysis. 58-63 - Firas Mahdi Muhsin Al-Salbi:
Investigation of QoS Multicast Routing Based on Intelligent Multiple Constrained. 64-71 - Ali Bazghandi, Ali A. Pouyan:
An Agent-Based Simulation Model for Urban Traffic System. 72-82 - Liang Chen, Yingqing Guo:
Design of the Distributed Control System Based on CAN Bus. 83-89 - Ahmad Jawdat, Qasem Obeidat, Alaa Aljanaby:
On The Design of User Experience Based Persuasive Systems. 90-99 - Mojgan Taheri, Mohammad Ali Afshar Kazemi, Abbas Toloui Ashlaghi:
Improvement of Mobility Management in Heterogeneous Wireless Networks by Using Multiple Attribute Decision Making. 100-108 - Lim Kah Seng, Norafida Ithnin, Hazinah Kutty Mammi:
Identifying the Re-usability of Triangle Scheme and Intersection Scheme on Mobile Device. 109-119 - Feng Bao, Fengzhi Zhao:
Study on the E-government Call Center System Based on SOA. 120-122 - Shaimaa Ezzat Salama, Mohamed I. Marie, Laila Mohamed El Fangary, Yehia K. Helmy:
Web Server Logs Preprocessing for Web Intrusion Detection. 123-133 - Funkun Xing:
A New Model for Automatic Sentence Segmentation. 134-137 - Adnan H. Ali:
Simultaneous Measurements for Tunable Laser Source Linewidth with Homodyne Detection. 138-144 - Ruicheng Li:
Analysis on the Method and Importance of Practical Teaching in Vocational College. 145-148 - Kavita Saini, Abdul Wahid, G. N. Purohit:
Designing And Implementing WBIs for Algorithms. 149-156
Volume 4, Number 5, September 2011
- Aliaa A. A. Youssif, Shereen A. Hussein, Ahmed S. Ibrahim:
Three-Dimensional Detection of Pulmonary Nodules in Chest CT Images. 2-13 - Ruijuan Hu:
Medical Data Mining Based on Decision Tree Algorithm. 14-19 - Nour-Mohammad Yaghoubi, Badroddin Oraee Yazdani, Nasir Ahoorani, Seyyed Ali Banihashemi:
Information Technology Infrastructures and Knowledge Management: Towards Organizational Excellence. 20-27 - Wanhai Geng, Yiming Chen, Yulian Li, Dong Wang:
Wavelet Method for Nonlinear Partial Differential Equations of Fractional Order. 28-35 - Rahul Malhotra, Subhash Singh, Harkirtan Singh, Parminder Kumar Luthra:
Analysis of Intensity Modulation and Switched Fault Techniques for Different Optical Fiber Cables. 36-44 - Xuemei Bai, Bin Guo, Zhiyong An:
Design of the Wide-view Collimator Based on ZEMAX. 45-52 - Puxi Hu, Wei Qian, Jian Liao:
Intelligent Control System of CNC Mill Machineing Based on the Feed-Driven Linear Motor. 53-58 - Wen Liu, Ligong Zhang, Xiangzhong Bai, Feng Liu:
Dynamic Response of Electromagnetic Launcher's Rail Subjected to Cosine Pressure. 59-70 - Haijian Yang:
Design of Time Division MUX and DEMUX for Large Optical Transceiver. 71-77 - Abdallah Chouarfia, Hafida Bouziane:
Dynamic Maintenance and Evolution of Critical Components-Based Software Using Multi Agent Systems. 78-91 - Siqin Qimuge, Chunsheng Zhang:
The Necessity and the Scheme of Super Cloud and Super Cloud Language Existence. 92-96 - Zhao MingXia, Qiuyan He:
A Simulation System of Social Economic. 97-103 - Ramanathan. P, Pradip Manjrekar. P:
Wireless Sensor Network for Continuous Monitoring a Patient's Physiological Conditions Using ZigBee. 104-110 - Jianwen Li, Yuanyuan Hou, Jianghong Li:
Study on the Four-channel Skin-hearing Aid Based on Morse Codes. 111-115
Volume 4, Number 6, November 2011
- Muna F. Al-sammaraie:
Medical Images Compression Using Modified SPIHT Algorithm and Multiwavelets Transformation. 2-17 - Hamid Reza Mohebbi, Omid Kashefi, Mohsen Sharifi:
ZIVM: A Zero-Copy Inter-VM Communication Mechanism for Cloud Computing. 18-27 - Fanjun Li, Ying Li:
Cascade-Correlation Algorithm with Trainable Activation Functions. 28-37 - Mohammed Abbas Fadhil Al-Husainy:
A New Image Steganography Based on Decimal-Digits Representation. 38-47 - Nayereh Ghahreman, Ahmad Baraani-Dastjerdi:
Semi-Automatic Labeling of Training Data Sets in Text Classification. 48-56 - Kai Cheng, Hongjun Zhang, Luyuan Zhang, Liang Wang:
The Operation Effectiveness Evaluation Based on Statistic Analysis. 57-65 - Benjamin Tatira, Lillias Hamufari Natsai Mutambara, Conilius J. Chagwiza, Lovemore J. Nyaumwe:
Computerized Summative Assessment of Multiple-choice Questions: Exploring Possibilities with the Zimbabwe School Examination Council Grade 7 Assessments. 66-74 - Olumide Olayinka Obe, O. O. Sangodoyin, T. A. Lasisi, Dahud Kehinde Shangodoyin, O. O. Adedoyin:
ICT: Opportunities and Challenges of Third World Tertiary Institutions. 75-82 - Rahul Malhotra, Minu Sethi, Parminder Kumar Luthra:
Denoising, Segmentation and Characterization of Brain Tumor from Digital MR Images. 83-104 - Xiaoyan Ma, Hao Zou, Yujuan Li:
Research and Application of Contingency Plan Based on Hospital Network and Information System Security. 105-110
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.