default search action
Computer and Information Science, Volume 3
Volume 3, Number 1, 2010
- Natarajan Meghanathan, Levon Paul Judon:
Improvement in Network Lifetime for On-Demand Routing in Mobile Ad hoc Networks using either On-Demand Recharging or Transmission Power Control or Both. 3-11 - Wei Zhang, Jinzhong Yang, Conghui Fang, Dongli Fan, Jianyong Wu:
Noise Removal of Spaceborne SAR Image Based on the FIR Digital Filter. 12-16 - Mingtao Shi:
Documenting Software Requirements Specification: A Revisit. 17-19 - Feixue Huang, Yong Zhou, Zhijie Li:
Simulation Evaluation Algorithms of LSRP and DVRP in Bank Network. 20-28 - Alaa Aljanaby, Ku Ruhana Ku-Mahamud, Norita Md Norwawi:
Interacted Multiple Ant Colonies Optimization Approach to Enhance the Performance of Ant Colony Optimization Algorithms. 29-34 - Lixin Wang, Renxia Wan:
A New Method of Reducing Pair-wise Combinatorial Test Suite. 35-41 - A. M. Ogaboh Agba, Moses Ikoh, E. M. Ushie, A. O. Bassey:
Telecommunications Revolution: Implications on Criminality and Family Crisis in the South-South States of Nigeria. 42-51 - Weifu Du, Songbo Tan:
Infer the Semantic Orientation of Words by Optimizing Modularity. 52-58 - Sana Jabbar Al-Yaseri:
Distributed University Registration Database System Using Oracle 9i. 59-67 - Gang Lv, Heming Zhao:
Developments of the Research of the Formant Tracking Algorithm. 68-71 - Shaheda Akthar, Sk. Md. Rafi:
Recovery of Software Architecture Using Partitioning Approach by Fiedler Vector and Clustering. 72-75 - Wenyan Wang, Didi Liu, Xiaohua Wang:
An Improved Wide-band Noise Signal Analysis Method. 76-80 - Modi Lakulu, Rusli Abdullah, Mohd Hasan Selamat, Hamidah Ibrahim, Mohd Zali Mohd Nor:
A Framework of Collaborative Knowledge Management System in Open Source Software Development Environment. 81-90 - Ming Liu:
Semantic Clustering for Large-Scale Documents.doc. 91-100 - Amir Mohamed Talib, Rusli Abdullah:
Utilizing Usability Model with Multi-agent Technology to Facilitate Knowledge Sharing of Software Maintenance Process Knowledge Environment. 101-119 - Zhijie Li, Xiangdong Liu, Xiaodong Duan, Feixue Huang:
Comparative Research on Particle Swarm Optimization and Genetic Algorithm. 120-127 - Hart O. Awa, Nsobiari F. Awara, Bartholomew C. Emecheta:
Collaborative Supply Chain in the Digital Age: A Case Study of its Extent of Adoption by Indigenous Organizations in Building Inter-and Intra-firm Alignments. 128-138 - Hongtao Shi, Yucai Dong, Lianghai Yi, Dongyun Zheng, Hong Ju, Erchang Ma, Weidong Li:
Study on the Route Optimization of Military Logistics Distribution in Wartime Based on the Ant Colony Algorithm. 139-143 - Hasiah Mohamed, Nora Yanti Che Jan, Nik Marsyahariani Nik Daud:
Exposure of Computer Games among IHL Students in Malaysia: Case Study of Computer Science Students in UiTM Terengganu. 144-151 - Yan Taishan:
A Knowledge Innovation Algorithm Based on Granularity. 152-159 - Rusli Abdullah, Musa Abu Hasan, Siti Zobidah Omar, Narimah Ismail, Jusang Bolong:
E-Community System towards First Class Mentality Development: An Infrastructure Requirements Analysis. 160-167 - Zhichang Zhang, Yu Zhang, Ting Liu, Sheng Li:
Automatic Recognition of Focus and Interrogative Word in Chinese Question for Classification. 168-174 - Rongcang Han:
Simulation of Radiation Characteristics for Cylindrical Conformal Phased Array. 175-179 - Qinghai Bai:
Analysis of Particle Swarm Optimization Algorithm. 180-184 - Shufeng Zhou, Guangwu Meng, Haiyun Ling:
Ontologies Acquisition from Relational Databases. 185-187 - Ruying Sun:
Synthesis of Shaped Beam for Base-station Antennas in Cellular Mobile Communications. 188-191 - H. S. Ramesh Babu, Gowrishankar, P. S. Satyanarayana:
Call Admission Control for Next Generation Wireless Networks Using Higher Order Markov Model. 192-198
Volume 3, Number 2, May 2010
- Natarajan Meghanathan, Srilakshmi Vavilala:
Impact of Route Selection Metrics on the Performance of On-Demand Mesh-based Multicast Ad hoc Routing. 3-18 - Vahid Garousi, Tan Varma:
A Bibliometric Assessment of Canadian Software Engineering Scholars and Institutions (1996-2006). 19-29 - Mingtao Shi:
4Ps of Business Requirements Analysis for Software Implementation. 30-33 - Renee Ann Pistone:
A Critical Examination of Heidegger's Thoughts: Technology Places Humanity in Shackles Hindering Our Natural Thinking Process and Our Connection to Being. 34-37 - Mohd Zainuri Saringat, Tutut Herawan, Rosziati Ibrahim:
A Proposal for Constructing Relational Database from Class Diagram. 38-46 - Zhifeng Sun, Deming Liu, Hairong Liu, Qizhen Sun:
The Design of SOA-based Multiwavelength Fiber Ring Laser for Fiber Sensing Network. 47-51 - Amir Mohamed Talib, Rusli Abdullah, Rodziah Binti Atan, Masrah Azrifah Azmi Murad:
MASK-SM: Multi-Agent System Based Knowledge Management System to Support Knowledge Sharing of Software Maintenance Knowledge Environment. 52-78 - Zinah Rajab Hussein, Rahmita Wirza O. K. Rahmat, Lili Nurliyana Abdullah, M. Iqbal Saripan, Mohd Zamrin Dimon:
Quantitative Detection of Left Ventricular Wall Motion Abnormality by Two-Dimensional Echocardiography. 79-85 - Lanying Zhang, Chongjun Fan, Xiaodong Zhu, Jianzheng Yang, Wenchun Shu, Chen Zeng:
Research and Design of Hongqiao Airport Water Management Information System. 86-93 - Dimple Juneja, Atul Sharma, Punit Kumar, S. Sitharama Iyengar, A. K. Sharma:
A Novel and Efficient Algorithm for Deploying Mobile Sensors in Subsurface. 94-105 - Kuanquan Wang, Yongfeng Yuan, Jie Li:
A Simulation System for Computational Cell Models Based on Object-Oriented Design Patterns. 106-115 - Nor Iadah Yusop, Shafiz Affendi Mohd. Yusof, Zahurin Mat Aji, Huda Ibrahim, Khairudin Kasiran, Zulkhairi Md. Dahalin, Nor Farzana Abdul Ghani, Rafidah Abd. Razak, Syahida Hassan, Abdul Razak Rahmat:
The Influence of Community Characteristics towards Telecentres Success. 116-120 - Wenyan Wang:
An Image Lossless Compression Patent. 121-125 - Fatemeh Meskaran, Rusli Abdullah, Masitah Ghazali:
A Conceptual Framework of Iranian Consumer Trust in B2C Electronic Commerce. 126-139 - Zhen Guo, Min Zhang, Xinping Ding:
The Simulation of Switched Reluctance Motor with the Rapid Nonlinear Method. 140-144 - Shaik. Mohammad Rafi, K. Nageswara Rao, Shaheda Akthar:
Incorporating Generalized Modified Weibull TEF in to Software Reliability Growth Model and Analysis of Optimal Release Policy. 145-162 - Jiquan Ma, Peijun Ma, Xiaohong Su:
Solder Joints Detection Method Based on Surface Recovery. 163-170 - Laila A. Abd El-Megid, Mohamed E. El-Sharkawi, Laila Mohamed El Fangary, Yehia K. Helmy:
Vertical Mining of Frequent Patterns from Uncertain Data. 171-179 - Hebiao Yang, Kai Chen:
Study on the Software Collaboration Framework Based on Internetware. 180-190 - Rusli Abdullah, Norhashimi Mohd Nor, Amir Mohamed Talib:
A Notification System Model for Bioinformatics Community of Practice. 191-204 - Shoujun Song, Weiguo Liu:
A Comparative Study on Modeling Methods for Switched Reluctance Machines. 205-210 - Hasiah Mohamed Omar, Azizah Jaafar:
Conceptual Framework for a Heuristics Based Methodology for Interface Evaluation of Educational Games. 211-219 - Aliaa A. A. Youssif, Atef Z. Ghalwash, Mohammed Ezz El Dien Abd El Kader:
An Efficient Decentralized Grid Service Advertisement Approach Using Multi-Agent System. 220-228 - Yongping Liu, Xiaobo Guo:
Design and Implementation of the Automatic License Plate Location Algorithm under Complex Backgrounds. 229-234 - Huda Ibrahim, Azman Yasin, Zulkhairi Md. Dahalin:
Financial Sustainability Issues in Malaysia's Telecentres. 235-240 - Qin Chen, Fancai Zeng, Zhen Yang:
Study on the Effects of Multimedia Monitoring System in Medical Teachers' Microteaching Training. 241-243 - Nor Shahida bt Mohd Jamail, Abu Bakar Md Sultan:
Shuffling Algorithms for Automatic Generator Question Paper System. 244-251 - Mahmod Othman, Ku Ruhana Ku-Mahamud:
Fuzzy Multi Criteria Evaluation for Performance of Bus Companies. 252-262 - Shufeng Zhou, Haiyun Ling, Mei Han, Huaiwei Zhang:
Ontology Generator from Relational Database Based on Jena. 263-267 - Yiheng Chen, Bing Qin, Ting Liu, Yuanchao Liu, Sheng Li:
The Comparison of SOM and K-means for Text Clustering. 268-274 - Huanchun Yang:
Analysis and Research on Non-Technological Factors with Hospital Informationization Construction. 275-279
Volume 3, Number 3, August 2010
- Kiam Cheng How:
Supporting Differentiated Service in Cognitive Radio Wireless Mesh Networks. 3-13 - Yue-Yang Chen, Hui-Ling Huang, Yin-Chien Hsu, Hsing-Chau Tseng, Yun-Chen Lee:
Confirmation of Expectations and Satisfaction with the Internet Shopping: The Role of Internet Self-efficacy. 14-22 - Jianhao Tan, Jing Zhang, Weixiong Li:
An Improved Clustering Algorithm Based on Density Distribution Function. 23-29 - Yin Leng Theng, Wee Teck Tan, May O. Lwin, Schubert Shou-Boon Foo:
An Exploratory Study of Determinants and Corrective Measures for Software Piracy and Counterfeiting in the Digital Age. 30-49 - Feixue Huang, Cheng Li:
Promote the Use of Two-dimensional Continuous Random Variables Conditional Distribution. 50-55 - Iyad Ali Shaheen, Abdelfatah Hegazy, Bahaa Hasan:
Grid Signature: High Performance Digital Signature Through Using Alchemi Grid Computing. 56-65 - Yu Tian, Jingliang Chen:
A Research on Architecture of Digital Publishing Management System. 66-70 - Zahurin Mat Aji, Shafiz Affendi Mohd. Yusof, Wan Rozaini Sheik Osman, Nor Iadah Yusop:
A Conceptual Model for Psychological Empowerment of Telecentre Users. 71-79 - Qijie Sheng, Xin Tong, Xiangyang Song, Zhihao Zhang, Jun Xu:
Design and Realization of New Generation Campus Smart Card System Based on the Mobile Communication. 80-88 - Moses Effiong Ekpenyong, Joseph Isabona:
Computational Modeling of Transmission Capacity With Outage Constraints in Ad-Hoc Networks. 89-97 - Zemao Zhao, Fei He, Rui Xu:
The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network. 98-104 - Mohanraj Vijayakumar, Lakshmipathi R:
A Novel Forager Agent Based Approach to Capture the Future Browsing Pattern of Online Users. 105-116 - Ting Zhou, Xiaoping Fan, Shengyue Yang, Zhihua Qu:
Path Planning for Mobile Robots Based on Hybrid Architecture Platform. 117-121 - Bakhtiar Karimi, Farhad Mirzaei, Mohammad Javad Nahvinia, Behnam Ababaei:
Comparison of Fuzzy Inference System and Multiple Regression to Predict Synthetic Envelopes Clogging. 122-133 - Liping Zhi, Hengshan Wang, Yazheng Dang:
Research on Patent Model Integration Based on Ontology. 134-138 - Nurhilyana Anuar, Abu Bakar Md Sultan:
Validate Conference Paper using Dice Coefficient. 139-145 - Ruixian Li:
A Decision Algorithm of Strong Connexity Convenient for Parallel Computation. 146-148 - Rosziati Ibrahim:
From UML Specification into Implementation Using Object Mapping. 149-157 - Shoujun Song, Weiguo Liu:
Development of Design and Analysis Tool for Switched Reluctance Drive System. 158-163 - I. O. Awoyelu, O. Tangba, F. E. Awoyelu:
Development of On-line Shopping Mart System for Developing Countries. 164-173 - Wanli Yang, Xiaodong Xia, Yucai Dong, Suwen Zheng:
Finite Time Synchronization between Two Different Chaotic Systems with Uncertain Parameters. 174-179 - Amir Mohamed Talib, Rusli Abdullah:
Utilizing Usability Evaluating Model in Applying CMM to Improve the Quality of Software Maintenance Process. 180-196 - Hebiao Yang, Xiaodong Yuan:
Anomaly Detection of Clinical Behavior Sequences. 197-202 - Gabriel Opeyemi Ogunleye, Adewale Opeoluwa Ogunde:
Intrusion Detection in Agent-Based Virtual Knowledge Communities. 203-209 - Rong Zhu, Yong Wang:
Application of VRML in Distance Vocational Education. 210-216 - Behnam Ababaei, Teymour Sohrabi, Farhad Mirzaei, Bakhtiar Karimi:
Evaluation of a Stochastic Weather Generator in Different Climates. 217-229 - Meijuan Kang:
The Simulation of the Time Slot CSMA/CD Protocol Based on P-Persistent Exponential Backoff Algorithm. 230-234 - Min Zhang, Xinping Ding, Zhen Guo:
The Design of the Vector Control System of Asynchronous Motor. 235-239 - Reda Mohamed Hamou, Ahmed Lehireche, Ahmed Chaouki Lokbani, Mohamed Rahmani:
Representation of textual documents by the approach wordnet and n-grams for the unsupervised classification (clustering) with 2D cellular automata: a comparative study. 240-255 - Ahmed Yakout A. Mohamed, Abdel Fatah A. Hegazy, Ahmed R. Dawood:
Aspect Oriented Software Development vs. other Techniques (Structured Approach and Object Oriented Approach). 256-276
Volume 3, Number 4, November 2010
- Rashmi Mantri, Junkang Feng:
Identification of the Most Specific Information that a Signal Carries by Using Barwise-Seligman Theory of Information Channel. 3-16 - Muhammad Nabeel Talib, Shuqin Cai, Muhai Hu:
Voice Browsing Approach to E-Business Access: A Blind's Perspective. 17-23 - Jakia Afruz, Va'Juanna Wilson, Scott E. Umbaugh:
Frequency Domain Pseudo-color to Enhance Ultrasound Images. 24-34 - Jie Xu, Luiz Fernando Capretz, Danny Ho:
Exploratory Analysis of Quality Practices in Open Source Domain. 35-48 - Mingtao Shi:
Software Functional Testing from the Perspective of Business Practice. 49-52 - Apostolos Axenopoulos, Charalampos Doulaverakis, Nicholas Protogeros, Panayiotis Tahinakis, John Mylonakis:
The Safety Issue in a Web Travel Booking Services Scenario Based on Business Process Execution Language. 53-59 - Zaiyong Tang, Kallol Kumar Bagchi:
Globally Convergent Particle Swarm Optimization via Branch-and-Bound. 60-71 - Siti Zulaiha Ahmad, Arifah Fasha Rosmani, Mohammad Hafiz Ismail, Suraya Shakeri:
An Introductory of Mental Arithmetic Using Interactive Multimedia for Pre-School Children. 72-79 - Olusegun Folorunso, Oluwatobi O. Akande, Adewale Opeoluwa Ogunde, Olufunke R. Vincent:
ID-SOMGA: A Self Organising Migrating Genetic Algorithm-Based Solution for Intrusion Detection. 80-92 - Omid Moradi:
Fixed Channel Assignment and Neural Network Algorithm for Channel Assignment Problem in Cellular Radio Networks. 93-103 - Ruijuan Hu:
Medical Data Mining Based on Association Rules. 104-108 - Ijeoma Aniedi Archibong, Joseph Ogbiji, Franc Anijaobi-Idem:
ICT Competence among Academic Staff in Universities in Cross Rivers State, Nigeria. 109-115 - Guohua Chen:
Fuzzy Data Decision Support in Portfolio Selection: a Possibilistic Safety-first Model. 116-124 - Vinodu George, M. P. Sebastian:
An Efficient Homomorphic Coercion Resistant and E2E Verifiable Voting Scheme. 125-130 - Chaoji Chen, Na Zhao, Hongtao Jin, Yongjin Zhao:
Design and Implementation of the Servo Control System Based on DSP. 131-134 - Ahmed Yakout A. Mohamed, Abdel Fatah A. Hegazy, Ahmed R. Dawood:
Aspect Oriented Requirements Engineering. 135-154 - Rongbo Cui, Xiaobing Xu:
The Research and Application of the Virtualization and Clustering on Linux Server. 155-158 - Oyewole Mustapha Bello:
Effects of the Location of GSM Base Stations on Satisfaction of Occupiers and Rental Value of Proximate Residential Property. 159-170 - Gang Lv:
Acoustic Characteristics Analysis on the Tracheoesophageal Speech. 171-174 - Amir Mohamed Talib, Rodziah Binti Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad:
Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review. 175-186 - Lin Yao, Chengjie Sun, Lu Li, Zhixin Hao, Xiaolong Wang:
Hybrid learning of Syntactic and Semantic Dependencies. 187-199 - M. R. S. Mitra, M. N. Santhi, M. V. P. Kumar, P. R. Sudha:
Sensor Networks Routing. 200-207 - Mengxin Li, Xinghua Xia, Ying Zhang, Tonglin Liu:
A Path Planning Method Based on Adaptive Genetic Algorithm for a Shape-shifting Robot. 208-214 - Arulanand Natarajan, S. Subramanian:
Payload Inspection Using Parallel Bloom Filter in Dual Core Processor. 215-223 - Yulian Shang, Min Feng, Peng Li, Kaiquan Shi:
Application of the Central Encryption System in the Dynamic Secret Sharing Scheme (II). 224-228 - Samir Kumar Bandyopadhyay, Tuhin Utsab Paul, Avishek Raychoudhury:
A Novel Steganographic Technique Based on 3D-DCT Approach. 229-235 - Gang Wang:
Methodology Research of Ontology Building in Semantic Web. 236-239 - Olusegun Folorunso, Adio T. Akinwale, Aderonke Ikuomola:
Using Visual Analytics to Develop Situation Awareness in Network Intrusion Detection System. 240-251 - Yuehua Zhao, Yu Tao:
Research of Dynamic Information Flow Monitoring Based on Finite State Automaton. 252-256 - Hongbiao Xu:
Research on Tele-immersion: Collaborative-Learning Environment with Sharing Knowledge-based. 257-263 - Juan Tian, Xiujuan Wang, Lanhua Zhang:
Design and Application of the RFID Technology in ERP. 264-267
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.