


default search action
DICTAP 2012: Bangkok, Thailand
- 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), Bangkok, Thailand, May 16-18, 2012. IEEE 2012, ISBN 978-1-4673-0733-8

- Vikash Sharma

, Sanjay Kumar:
Recent developments in MIMO channel estimation techniques. 1-6 - Vasile Dadarlat:

WSeH: Proposal for an adaptive monitoring framework for WSNs, with enhanced security and QoS support. 7-12 - Saleh H. Al-Sharaeh

, Reema Hasan, Imad Salah:
An efficient routing technique that maximizes the lifetime and coverage of wireless sensor networks. 13-18 - Wei-Lun Wang, Bang-Heng Liou, Aaron Solomon:

2-Connected relay placement problem in wireless sensor networks. 19-24 - Thossaporn Chanpuek, Peerapong Uthansakul, Monthippa Uthansakul:

Performance enhancement of mobile networks using cooperative MIMO technique. 25-29 - S. Soundararajan

, Raghuvel S. Bhuvaneswaran:
Multipath load balancing & rate based congestion control for mobile ad hoc networks (MANET). 30-35 - S. D. Sepehr, Naser Movahhedinia, Ahmad Baraani:

Investigating QoS support in WiMAX over Metro-Ethernet backhaul. 36-41 - Wei Ding, Di Yuan:

A decomposition method for pilot power planning in UMTS systems. 42-47 - Cuiting Huang, Noël Crespi, Abderrahmane Maaradji

:
Services composition in IMS environment: An evolved SCIM based approach. 48-51 - Hendra Setiawan

, Firdaus
:
Possible schemes on baseband signal joint detection concept for multimode terminal. 52-57 - Jamal S. Rahhal

:
LDPC coding for MIMO wireless sensor networks with clustering. 58-61 - Mohammad Hajibegloo, Amir Javadi:

Fast fault detection in wireless sensor networks. 62-66 - Tohid Bagheri:

DFMC: Decentralized fault management mechanism for cluster based wireless sensor networks. 67-71 - Chou-Chen Wang, Chih-Yuan Chang, Yun-Yi Huang:

Fast motion estimation using two-step bit-transform-based normalized partial distortion search algorithm. 72-76 - Chou-Chen Wang, Jin-Long Li, Teng-Yao Wang, Chi-Wei Tung:

Robust video transmission for H.264 scalable video coding using unequal error protection. 77-81 - Arti Khaparde

:
Study of ICA algorithm for separation of mixed images. 82-86 - Deepak Dwarakanath, Alexander Eichhorn, Carsten Griwodz, Pål Halvorsen:

Faster and more accurate feature-based calibration for widely spaced camera pairs. 87-92 - Nilam Nur Amir Sjarif

, Siti Mariyam Shamsuddin, Siti Zaiton Mohd Hashim:
A framework of multi-objective particle swarm optimization in motion segmentation problem. 93-98 - Kailash J. Karande, Sanjay N. Talbar

, S. Sandeep Inamdar:
Face recognition using Oriented Laplacian of Gaussian (OLOG) and Independent Component Analysis (ICA). 99-103 - Ismaël Daribo:

Hierarchical requantization of depth data for 3D visual communications. 104-109 - Sirot Piman, Abdullah Zawawi Talib

:
Puppet modeling for real-time and interactive virtual shadow puppet play. 110-114 - Siti Hazurah Indera Putera, Syahrul Fahmi Dzafaruddin, Maziah Mohamad:

MATLAB based defect detection and classification of printed circuit board. 115-119 - Ahmet Teoman Naskali

, Emrah Deniz Kunt, Asif Sabanoviç
, Gonen Eren:
Development of system supervision and control software for a micromanipulation system. 120-124 - Mohammad V. Malakooti, Ahmad Pahlavan Tafti, Hamid Reza Naji:

An efficient algorithm for human cell detection in electron microscope images based on cluster analysis and vector quantization techniques. 125-129 - A. Haddoud, Mostefa Belhadj Aissa, Faiza Hocine, M. Fekir, Aichouche Belhadj Aissa:

Hybrid approach for georeferencing RadarSat2 images. 130-134 - Aymen Sellaouti, Moslem Ouled Sghaier

, Atef Hamouda:
An edge-region cooperative multi-agent approach for buildings extraction. 135-140 - Younghoon Kho, Yongjin James Kwon:

A study on the comparison of positioning tolerances depending on the state of vision sensors. 141-144 - Michel Plaisent, Lassana Maguiraga, Prosper Bernard, Sylvain Favreau, Diane Mercier:

Community of practice mediated by Internet: The case of Philanthropy-Quebec. 145-148 - Media A. Ayu

, Teddy Mantoro
, Siti Aisyah Ismail, Nurul Syafiqah Zulkifli:
Rich information service delivery to mobile users using smart posters. 149-153 - Fatima Faiza Ahmed, Syed Farrukh Hussain, Sabah Hameed, Sharjeel Mustafa Ali:

Semantic web E-portal for tourism. 154-158 - C. L. Chan, H. B. Yan, S. Y. Lee, Jonathan James Webster, Kim H. K. Wong:

A database design for complex linguistic data in collaborative web application. 159-165 - Aung Kyaw Oo, Thein Lwin, Ko Ko Oo, Pyi Aung, Thant Zin Ohn:

Framework development for evaluating e-government portals in Myanmar using analytic hierarchy process. 166-171 - Waralak Vongdoiwang Siricharoen

:
Applying prototype for software engineering in pilot project of research tracking system. 172-176 - Kazuaki Maeda:

Performance evaluation of object serialization libraries in XML, JSON and binary formats. 177-182 - Angela Siew-Hoong Lee, Tong Ming Lim, Soo Kar Leow, Justin Lim Renn Aun:

A study on the use of "Yams" for enterprise knowledge sharing. 183-188 - Jørgen Bøegh, Yuyu Yuan:

Towards a standard for Service Behavior Trustworthiness Management. 189-194 - Han Qi, Abdullah Gani

:
Research on mobile cloud computing: Review, trend and perspectives. 195-202 - Krung Sinapiromsaran

, Narudom Techaval:
Network intrusion detection using multi-attributed frame decision tree. 203-207 - Ali Ahmed, Abdullah A. I. Alnajem:

Trust-aware access control: How recent is your transaction history? 208-213 - A. Ruhan Bevi

, S. S. V. Sheshu, S. Malarvizhi:
FPGA based pipelined architecture for RC5 encryption. 214-219 - Atanu Basu, Indranil Sengupta:

Improved secure dynamic key management scheme with access control in user hierarchy. 220-225 - Suhas Sreehari

, Huapeng Wu, Majid Ahmadi:
Fast modular reduction for large-integer multiplication for cryptosystem application. 226-229 - Mark Evered:

Specification of role and attribute transitions for secure information system access. 230-235 - Mohammad V. Malakooti, Mehrzad Khederzdeh:

A Lossless Secure data embedding in image using DCT and Randomize key generator. 236-239 - Mohammad V. Malakooti, Mojtaba Raeisi Nejad Dobuneh:

A lossless digital encryption system for multimedia using orthogonal transforms. 240-244 - Radek Holy

, Marek Kalika, Jan Scherks:
Biometric ID cards at CTU in Prague. 245-249 - Hedi Benzina:

Towards designing secure virtualized systems. 250-255 - Safwan Mawlood Hussein

, Fakariah Hani Mohd Ali
, Zolidah Kasiran:
Evaluation effectiveness of hybrid IDS using Snort with Naïve Bayes to detect attacks. 256-260 - G. Thanigaivel

, N. Ashwin Kumar, P. Yogesh:
TRUNCMAN: Trust based routing mechanism using non-cooperative movement in mobile ad-hoc network. 261-266 - Montree Kumngern

, Usa Torteanchai:
Current-controlled quadrature oscillator using a new single ZC-CG-CCCCTA. 267-270 - Manuel de la Sen

, Raul Nistal
:
On linear dynamic systems with parametrized perturbations and time delays. 271-276 - Finn Arve Aagesen, Patcharee Thongtra:

On adaptability issues of networked service systems. 277-282 - Montree Kumngern

:
CMOS current-mode precision full-wave rectifier with improved bandwidth. 283-286 - Sicheng Tang, Huailiang Tan, Lun Li:

A novel memory compression technique for embedded system. 287-292 - Qadri Hamarsheh:

Unified matrix processor design for FCT-based filtering, convolution and correlation of signals. 293-299 - Montree Kumngern

:
Electronically tunable versatile voltage-mode biquadratic filter with three-input six-output using OTAs and grounded capacitors. 300-304 - Montree Kumngern

, Jirasak Chanwutitum:
Voltage-mode first-order allpass filter using single-ended OTAs and grounded capacitor. 305-308 - Montree Kumngern

, Kobchai Dejhan:
Current-mode multifunction biquad filter with three inputs five outputs using ZC-CDTAs. 309-313 - Tamer Özyigit, Salih Murat Egi:

Evaluating the ergonomic performance of Dive computers. 314-318 - Pradeep Goutam, K. M. Nitin Babu, S. V. Hari Prasad, Vidya Sagar, P. Laxmaiah:

Bit synchronization and viterbi equalization for GSM BTS - Hardware implementation on TMS320C6424 TI DSP. 319-323 - Tharathorn Phromsa-ard, Jiratchaporn Arpornsiripat, Jutaphet Wetcharungsri, Paramin Sangwongngam, Keattisak Sripimanwat, Pisit Vanichchanunt:

Improved Gradient Descent Bit Flipping algorithms for LDPC decoding. 324-328 - Jungwan Hong, Yongjin James Kwon, Sang C. Park:

A study on the agent-based simulation for analysis of armed helicopter's mission effectiveness: Analysis of mission effectiveness based on a combination of agents. 329-332 - Jessada Konpang:

A dual-band filter using coupled-feed with asymmetrical stepped-impedance resonator. 333-337 - Muhammad Bilal, Sana Imtiaz, Shahzad Asif, Wadood Abdul

:
Power efficient scalable hybrid processor architecture. 338-342 - Hiroki Oda, Hiroyuki Hisamatsu, Hiroshi Noborio:

A new available bandwidth measurement method based on ImTCP. 343-347 - Wei-Kuo Chiang

, Hung-Jiun Dai, Cheng Luo:
Cross-layer handover for SIP applications based on media-independent pre-authentication with redirect tunneling. 348-353 - Firdaus

, Ali Muayyadi
, Rina Pudji Astuti
:
Performance analysis of adaptive power control based on Signal to Interference Ratio (SIR) using fuzzy genetic for WCDMA. 354-358 - Wuttichai Vijitkunsawat

, Pramote Anunvrapong:
Multi-adaptive routing protocol for vehicular ad hoc network. 359-362 - Abubeker A. Yussuf, Wan Haslina Hassan, Sinzobakwira Issa:

A review of VHD approaches in next generation wireless networks. 363-367 - Harish Kumar, Pushpneel Verma, Rudrapratap Ojha, G. Venkat Babu

:
Study & analysis of capacity enhance and coverage increase with repeaters in 3rd generation for rural/semi urban mobile communication system in India. 368-372 - W. Pornsoongsong, Prabhas Chongstitvatana:

A parallel compiler for multi-core microcontrollers. 373-377 - Gennady Veselovsky, Sermvut Ackarachalanonth:

Constructing transition matrices for routing BPC permutations on shuffle-exchange recirculating networks. 378-382 - Renatus Michael, Faith Shimba

:
A critical performance analysis of Thin Client platforms. 383-387 - Salah Bindahman, Chan Huah Yong:

Performance enhancement for Distributed Lock Manager using Hybrid Multicast and Ring algorithm. 388-393 - Ahmad Awwad, Jehad A. Al-Sadi:

Extended OTIS-Arrangment a new efficient interconnection network. 394-399 - Bharati Rajan, Indra Rajasingh

, Sudeep Stephen
, Cyriac Grigorious
:
Spectrum of Sierpiński triangles using MATLAB. 400-403 - Bharati Rajan, Indra Rajasingh

, Cyriac Grigorious
, Sudeep Stephen
:
Energy of grid based networks using MATLAB. 404-408 - Luis Álvarez Sabucedo, Roberto Soto Barreiros, Juan M. Santos-Gago

, Manuel J. Fernández-Iglesias
:
A hybrid Semantic driven recommender for services in the eGovernment domain. 409-414 - Waralak Vongdoiwang Siricharoen

:
User persona roles in the end-user web developing approach. 415-420 - Eiichi Miyazaki, Hiroshi Kamano, Daisuke Yamakata, Yukio Hori, Yoshiro Imai:

Development of an automatic health screening system for Student Health Education of University. 421-427 - A. Sai Sabitha, Deepti Mehrotra

, Abhay Bansal:
Quality metrics a quanta for retrieving learning object by clustering techniques. 428-433 - Warit Leopairote, Athasit Surarerks, Nakornthip Prompoon:

Software quality in use characteristic mining from customer reviews. 434-439 - A. G. M. Das:

Technology assisted enhanced teaching and learning methods: A research project at Monash University. 440-446 - Riaza Mohd Rias, Wan Khadijah Yusof:

Animation and prior knowledge in a multimedia application: A case study on undergraduate computer science students in learning. 447-452 - Junaidah Mohamed Kassim, Rusli Abdullah

:
Advisory system architecture in agricultural environment to support decision making process. 453-456 - Supawadee Saengsri, Vit Niennattrakul, Chotirat Ann Ratanamahatana:

TFRS: Thai finger-spelling sign language recognition system. 457-462 - Manop Phankokkruad

:
Association rules for data mining in item classification algorithm: Web service approach. 463-468 - (Withdrawn) Hybrid recommender systems: Survey and experiments. 469-473

- Rawaa Dawoud Al-Dabbagh, Mohd Sapiyan Baba, Saad Mekhilef

, Azeddien Kinsheel:
The compact Genetic Algorithm for likelihood estimator of first order moving average model. 474-481 - Incheol Kim

, Eunmi Choi, Huikyung Oh:
Observation and motion models for indoor pedestrian tracking. 482-485 - Isamu Shioya, Takao Miura:

An accelerated learning algorithm of Gaussian mixture processes. 486-491 - Theerawat Kiatdarakun, Prapun Suksompong

:
Entropy rate of Thai text and testing author authenticity using character combination distribution. 492-497 - Lean Makhubele, Johnson Kinyua

, Ray Kekwaletswe
:
The effect of organizational, external, social, trust, information technology factors and knower's attitude on knowledge sharing: A case of financial service firm in South Africa. 498-503 - Izzah Amani Tarmizi, Syed Sahal Nazli Alhady Syed Hassan

, Wan Pauzi Wan Ibrahim:
A journal of real peak recognition of electrocardiogram (ECG) signals using neural network. 504-509 - Mohammad Shukri Salman

, Osman Kukrer
, Aykut Hocanin
:
A fast implementation of Quasi-Newton LMS algorithm using FFT. 510-513 - Kazuto Ohara, Kazuki Katagishi, Kazuo Toraichi:

Fluency DA functions approximation-based adaptive coding method of contours and regions for animation images. 514-519 - Mete Taspinar, Ahmet Teoman Naskali

, Gonen Eren, Merve Kurt
:
The importance of customized advertisement delivery using 3D tracking and facial recognition. 520-524

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














