default search action
International Journal of Advancements in Computing Technology, Volume 2
Volume 2, Number 1, March 31 2010
- Youfu Wu, Gang Zhou, Jing Wu:
A Monitoring System for Supermarket Based on Trajectory of Palm. 7-15 - Nasser N. Khmiss, Huthaifa T. Akrm:
A New Approach of Digital Subscriber Line2 Initialization Process. 16-32 - Loghman Kaki, Mohammad Teshnehlab, Mahdi Aliyari Shoorehdeli:
Classification of Multi-Class Datasets Using 2D Membership Functions in TSK Fuzzy System. 33-40 - Suoju He, Yuan Gao, Jiajian Yang, Yiwen Fu, Xiao Liu:
Creating Challengeable and Satisfactory Game Opponent by the Use of CI Approaches. 41-63 - A. N. M. Rezaul Karim, Thwarique:
Face Recognition Using Matrix Decomposition Technique Eigenvectors and SVD. 64-71 - Rezwanur Rahman, Joydip Saha, Ashirul Mubin:
Fast Scene Change Detection in Surveillance Systems Using ANOVA on Color Histogram. 72-77 - Alaa Aljanaby, Ku Ruhana Ku-Mahamud, Norita Md Norwawi:
Interacted Multiple Ant Colonies Optimization Framework: an Experimental Study of the Evaluation and the Exploration Techniques to Control the Search Stagnation. 78-85 - Haider M. AlSabbagh, Ali Amin:
Kalman Filter Estimation of the Number of Competing Terminals in an IEEE 802, 11 Network Utilizing Error Pron-Channel. 86-92 - Nils Gruschka, Luigi Lo Iacono, Namhi Kang:
Packaged HTTP: Reconsidering Web Efficiency. 93-99
Volume 2, Number 2, June 2010
- Jaakko Korpi, Jussi Koskinen:
Constructive Dynamic Program Slicing Research. 7-23 - Berdakh Abibullaev, Won-Seok Kang, Seung-Hyun Lee, Jinung An:
Classification of Cardiac Arrhythmias using Biorthogonal Wavelets and Support Vector Machines. 24-34 - Prabhjot Kaur, Moin Uddin, Arun Khosla:
Adaptive Bandwidth Allocation Scheme for Cognitive Radios. 35-41 - Zahra Khanmirzaei, Mohammad Teshnehlab:
Prediction Using Recurrent Neural Network Based Fuzzy Inference system by the Modified Bees Algorithm. 42-55 - Yinliang Yue:
An Energy Efficient Shifted Logging Storage Architecture for Write-oriented Workloads. 56-63 - Hanan A. R. Akkar, Firas R. Mahdi:
Implementation of Digital Circuits Using Neuro - Swarm Based on FPGA. 64-78 - Ashwin B. K., Kumaran K., Madhu Vishwanatham V., M. Sumaithri:
A Secured Web Services Based E-Commerce Model for SMME Using Digital Identity. 79-87 - Manal Jamil Al-Kindi:
Separation and Equalization of Cross-Coupled Signals by Adaptive Cancellation. 88-101 - Li Jin, Yunlong Zhu, Hai Shen, Tao Ku:
Research on Two-layer Location-Routing Problem and Optimization Algorithm. 102-108 - Stuti Bazaj, Sachin Modi, Anand Mohan, Surya Pal Singh:
An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients. 109-116 - Davood KeyKhosravi, Ali Ghaffari, Ali Hosseinalipour, Batool Abadi Khasragi:
New Clustering Protocol to Decrease Probability Failure Nodes and Increasing the Lifetime in WSNs. 117-121 - Aasia Khanum:
An Intelligent Framework for Natural Object Identification in Images. 122-129 - P. Dharanyadevi, P. Dhavachelvan, Ramachandran Baskaran, V. S. K. Venkatachalapathy:
Qualitative Analysis on Matchmaking Techniques for Web Service Discovery. 130-143 - Ali Abdulhadi Noaman:
Concentric Circular Array Antenna Null Steering Synthesis by Using Modified Hybrid Ant Colony System Algorithm. 144-157 - Antonio Martín, Carlos León, Félix Biscarri:
Intelligent Integrated Management for Telecommunication Networks. 158-171 - Omar Walid Abdul-Wahab, Wameedh Nazar Flayyih:
Adding PC Connectivity to the MTS-88 Microcomputer Teaching System. 172-182 - Anestis A. Toptsis, Adam Russell:
On Some Issues and a System Architecture for Quality-based Blog Evaluation. 183-194
Volume 2, Number 3, August 31 2010
- Ali Awde, Moeiz Miraoui, Chakib Tadj, Yacine Bellik:
Modeling and Simulation of a Pervasive Multimodal Multimedia Computing System for Visually-Impaired Users. 6-14 - Yonsik Lee, Jeongsu Lee:
The Migration of Mobile Agent Using the Object Replication. 15-21 - Yi-Sheng Huang, Yen-Liang Pan:
An Improved Deadlock Prevention Strategy for FMSs Using Theory of Regions. 22-30 - Muhammad Usman, Russel Pears:
Integration of Data Mining and Data Warehousing: A Practical Methodology. 31-46 - Shailesh Khapre, Madarapu Naresh Kumar, P. Dhavachelvan, S. K. V. Jayakumar:
V-Book: Memoryless Editor for eBooks. 47-63 - Liangji Chen, Changyin Gao, Xianzhang Feng:
Five-axis NURBS Path Real-time Generation Method in CNC System. 64-69 - Haider Fakher Radhi Al-Saidy:
New Proposed Algorithms for nth Order Butterworth Active Filter Computer-Aided Design. 70-76 - Yonsik Lee, Kwangwoo Nam:
The Metatable of Naming Agent for the Naming Service of Sensor Network. 77-83 - Vasi Narasimhulu, Pothula Sujatha, P. Dhavachelvan, M. S. Saleem Basha:
Enhanced Named Entity Transliteration Model Using Machine Learning Algorithm. 84-93 - Ahmad Shabani, Rasul Saadat:
Examining the Citations Received by DOAJ's Journals from ISI Web of Science's Articles (2003-2008). 94-101 - Shinya Nozaki, Yen-Wei Chen, Rumiko Azuma, Zensho Nakao, Yoshinori Namihira:
A Fourier Series Based Method of CT Image Reconstruction for Laser Fusion Research. 102-113 - Om Pal, Peeyush Jain, Sudhansu Goyal, Zia Saquib, Bernard L. Menezes:
Intrusion Detection Using Graph Support: A Hybrid Approach of Supervised and Unsupervised Techniques. 114-118 - Hee-Cheul Kim, Hyoung-Keun Park:
The Comparative Study of Software Optimal Release Time Based on Burr Distribution. 119-129 - Ali H. Hamad, Fatima B. Ibrahim:
Path Planning of Mobile Robot Based on Modification of Vector Field Histogram using Neuro-Fuzzy Algorithm. 129-138 - M. S. Saleem Basha:
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer. 139-154 - Sook-Young Choi, Seong-Hun Ahn:
Quality Assurance of Distance Education in Korea. 155-162 - Ahmed J. Jameel:
Performance Enhancement of Wireless Communication Systems using Transmit and Receive diversity. 163-171
Volume 2, Number 4, October 31 2010
- Jing-Chiou Liou, Sujith Bhashyam:
On Improving Feasibility and Security Measures of Online Authentication. 6-16 - Jingtao Zhou, Haicheng Yang, Mingwei Wang, Rongxia Zhang, Min Shi:
A Review of Enterprise Information Integration from Content Level and System Level Perspectives. 17-29 - Jane J. Stephan, Sana'a Khudayer:
Gesture Recognition for Human-Computer Interaction (HCI). 30-35 - Sara-Meshkizadeh, Amir Masoud Rahmani:
Webpage Classification based on Compound of Using HTML Features & URL Features and Features of Sibling Pages. 36-46 - J. G. Flores, G. Urquiza, J. A. Hernandez:
Inverse neural Network to Optimal Performance of the hydraulic Turbine Runner Blades. 47-56 - Jaydip Sen:
An Efficient Certification Scheme for Nodes in a Wireless Ad Hoc Network. 57-66 - Hao Chen, Jianhua Sun, Qianjie Zhang, Ke Mao:
An Execution-flow Based Method for Detecting Cross-Site Scripting of Ajax Applications. 67-76 - Deepak Dahiya, Pooja Jain:
Enterprise Systems Development: Impact of Various Software Development Methodologies. 77-87 - Sook-Young Choi, Seong-Hun Ahn:
Quality Assurance for Online Programs. 88-94 - Jamaiah Haji Yahaya, Aziz Deraman:
Measuring the Unmeasurable Characteristics of Software Product Quality. 95-106 - Urmila Shrawankar, Vilas M. Thakare:
Voice Activity Detector and Noise Trackers for Speech Recognition System in Noisy Environment. 107-114 - Fatemeh Kafili Kasmaee, Ramin Nassiri, Gholamreza Latif Shabgahi:
Achieving CMMI Maturity Level 3 by Implementing FEAF Reference Models. 115-122 - Saif D. Salman, Ahmed A. Bahrani:
Segmentation of Tumor Tissue in Gray Medical Images Using Watershed Transformation Method. 123-127 - Rahul Malhotra, Narinder Singh, Yaduvir Singh:
An Efficient Fuzzy-GA Flow Control of Turbine Compressor System: A Process Control Case Study. 128-139 - Xiaoling Wang, Clement H. C. Leung:
Representing Image Search Performance Using Time Series Models. 140-150 - Aihua Zheng, Jixin Ma, Xiaoyi Zhou, Bin Luo:
Efficient and Effective State-based Framework for News Video Retrival. 151-161 - Mingwei Wang, Shan Li, Jingtao Zhou, Tao Yue:
An Ontology and Agent Based Collaborate Platform in Digital Production Engineering. 162-167 - Shuxiang Xu:
Data Mining Using Higher Order Neural Network Models With Adaptive Neuron Activation Functions. 168-177
Volume 2, Number 5, December 2010
- Osamu Mizuno, Hideaki Hata:
A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis. 1-12 - Ravi Rastogi, Nitin, Durg Singh Chauhan:
Fast Interconnections: A Case Tool for Developing Fault-tolerant Multi-stage Interconnection Networks. 13-24 - Ali Modirkhazeni, Norafida Ithnin, Othman Ibrahim:
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks. 25-41 - Dorin Carstoiu, Elena Lepadatu, Mihai Gaspar:
Hbase - non SQL Database, Performances Evaluation. 42-52 - Ramzy S. Ali Al-Waily:
Design of Robust Mixed H2/H(infinite) PID Controller Using Particle Swarm Optimization. 53-60 - Amir Sabbagh Molahosseini, M. Kuchaki Rafsanjani, S. H. Ghafouri, M. Hashemipour:
A Reduced-Area Reverse Converter for the Moduli Set {2n, 2n-1, 22n-1-1}. 61-65 - Fadhil A. Ali:
Expert System Design of Two Electrostatic Lenses Column by Mixing Dynamic Programming and AI Techniques. 66-74 - Haiyan Zhu, Quansheng Dou, Ping Jiang:
Further Results on Fault Classes in Boolean Specifications. 75-79 - J. Joshua Thomas, Ahamad Tajudin Abdul Khader, Bahari Belaton, Amy Leow:
VIZSolution: An Interface Tool to Solve Real-world Examination Timetabling Problem. 80-88 - Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta, Srishti Sarin:
Enhancing E-mail Security by CAPTCHA based Image Grid Master Password. 89-98 - Mohammad Reza Moohebat, Mohammad Davarpanah Jazi:
A Comparative Study of Critical Success Factors (CSFs) in Implementation of ERP in Developed and Developing Countries. 99-110 - Muththolib Sidheeq, Ali Dehghantanha, Geetha Kananparan:
Utilizing Trusted Platform Module to Mitigate Botnet Attacks. 111-117 - Haider Fakher Radhi Al-Saidy:
New Proposed Algorithms for Nth Order Butterworth Passive Filter Computer-Aided Design. 118-124 - Bindiya M. Varghese, A. Unnikrishnan, Paulose Jacob, Justin Jacob:
Correlation Clustering Model for Crime Pattern Detection. 125-128 - Ami T. Choksi, Devesh C. Jinwala:
Improving Semantic Matching of Grid Resources Using Refined Ontology with Complement Class. 129-139 - Fadhil Salman Abed, Nada Abdul Aziz Mustafa:
A Proposed Technique for Information Hiding Based on DCT. 140-152 - Azzam A. Marouf, Ali H. Hamad, Sameer A. Abdelrazzak:
A Developed Modified OSAP Controller with Repetitive Control Action for UPS. 153-165 - Bahaa I. Kazem, Ali H. Hamad, Mustafa M. Mozael:
Modified Vector Field Histogram with a Neural Network Learning Model for Mobile Robot Path Planning and Obstacle Avoidance. 166-173
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.