


default search action
Computer and Information Science, Volume 2
Volume 2, Number 1, February 2009
- Masoud Yaghini, Atieh Bourouni, Roozbeh Hesam Amiri:

A Framework for Selection of Information Systems Development Methodologies. 3-11 - Desheng Xu, Kejian Xia, Dezheng Zhang, Huangsheng Zhang:

Model Checking the Inconsistency and Circularity in Rule-Based Expert Systems. 12-17 - Azleen Ilias, Mohd Zulkeflee Abd Razak, Rahida Abdul Rahman, Mohd Rushdan Yasoa':

End-User Computing Satisfaction (EUCS) in Computerised Accounting System (CAS): Which the Critical Factors? A Case in Malaysia. 18-24 - Feng Ding, Yanzhang Wang, Xin Ye:

Layer Model and Algorithm of Organization Authorization Based on Position Network. 25-34 - K. Premalatha, A. M. Natarajan:

Chi-Square Test for Anomaly Detection in XML Documents Using Negative Association Rules. 35-42 - Hualun Lai, Liangwei Zhong, Jing Ni:

Research of Sales Contract Management System Based on WEB. 43-47 - Kuldeep Sharma

, Deepak Garg:
Complexity Analysis in Heterogeneous System. 48-52 - Peng Liu, Jing Xu, Jiafeng Liu, Xianglong Tang:

Pixel Based Temporal Analysis Using Chromatic Property for Removing Rain from Videos. 53-60 - Idawaty Ahmad, Muhammad Fauzan Othman:

Fault Recovery Mechanisms in Utility Accrual Real Time Scheduling Algorithm. 61-68 - Wei Zhang, Qin Huang, Zhenkun Wang:

The Fusion of Remote Sensing Images Based on Lifting Wavelet Transformation. 69-75 - Yusliza Mohd. Yusoff, Zikri Muhammad, Mohd Salehuddin Mohd Zahari, Ermy Syaifuddin Pasah, Emmaliana Robert:

Individual Differences, Perceived Ease of Use, and Perceived Usefulness in the E-Library Usage. 76-83 - Mengxin Zhang, Zhihan Lv

, Xiaolei Zhang, Ge Chen, Ke Zhang:
Research and Application of the 3D Virtual Community Based on WEBVR and RIA. 84-89 - Abu Bakar Md Sultan, Abdul Azim Abdul Ghani, Lim Su Fang:

Framework for Conference Management System. 90-94 - Guoliang Zhong, Liangzhong Jiang:

Design of the Closed Loop Speed Control System for DC Motor. 95-102 - Gang Yang, Weiwei Zhang, Huang Ying, Yongquan Yu:

Simulation Research of Extension Control Based on Crane-Double Pendulum System. 103-107 - Tianbao Zhuang, Hong Zhao, Zheng Tang:

An Analysis of Improving Memory Performance Based on EEG Alpha and Theta Oscillations. 108-114 - Xinhua Xu:

A Study On Query Optimization for Federated Database Systems. 115-120 - Yuqing Geng, Chunsheng Zhang:

Study on the Optimization Method of Select Query Sentence in Standard SQL Language. 121-125 - GuoJun Liu, Xianglong Tang:

Tracking High Speed Skater by Using Multiple Model. 126-131 - Ramesh Rao:

Digital Divide: Issues Facing Adult Learners. 132-136 - Kehe Wu, Xia He, Tingshun Li, Hongyu Tao:

To Construct Search Engine Analyzer for Electrical Enterprises Based on Lucene. 137-141 - Saidatul Rahah Hamidi, Jusoff Hj. Kamaruzaman:

The Characteristic and Success Factors of an Organizational Memory Information System. 142-151 - Min Zhao, Jiyin Sun, Xiaochun Che:

The Research of the Model of Communication System Depending on the Queuing Theory. 152-155 - Xuesong Yu, Jiafeng Liu:

Estimate 3D Arm Motion with Hierarchical Limb Model. 156-163 - Wei Wang, Wenju Liu:

Study on the Software Development Based on AOP Technology. 164-167 - Farok Azmat, Md Ikhwan Hamdan, Jusoff Hj. Kamaruzaman:

Analysis of BitTorrent on an Open Source VPN Technology to End User. 168-183 - Changhao Shuai, Yong Li:

Generating a Simple Fractal Graphics in Computer. 184-187 - Xingzi Liu, Liang Lin, Dongran Zang:

Stochastic Programming Models and Hybrid Intelligent Algorithm for Unbalanced Bidding Problem. 188-194 - Weihua Gai, Dakun Zhang:

People Portraits and Cartoon Algorithm Study. 195-199 - Norisma Idris, Sapiyan Baba, Rukaini Abdullah:

A Summary Sentence Decomposition Algorithm for Summarizing Strategies Identification. 200-210 - Xin Chen, Weizhi Huang:

The Design of Intelligent Home Alarming System Based on Wireless Sensor Network Technology. 211-215
Volume 2, Number 2, May 2009
- Nafishah Othman, Shafiz Affendi Mohd. Yusof, Wan Rozaini Sheik Osman:

A Conflict between Professional vs. Domestic Life? Understanding the Use of ICT in Teleworking for Balance in Work and Family Units. 3-15 - Weidong Sun, Wei Zhang:

Application of the Remote Sensing Technology in the Line Arrangement of Shallow Artificial Seismic Exploration. 16-18 - Roesnita Ismail, Kamaruzaman Jusoff, T. Ahmad, S. Ahmad, R. S. Ahmad:

Fuzzy State Space Model of Multivariable Control Systems. 19-25 - Yijian Liu, Yanjun Fang:

Design of the Nonlinear System Predictor Driven by the Bayesian-Gaussian Neural Network of Sliding Window Data. 26-33 - Siew Hock Ow:

User Evaluation of an Electronic Malaysian Sign Language Dictionary: e-Sign Dictionary. 34-52 - Guohua Zhang, Jieyu Chen:

Research and Establishment of the Integrated Project of Barcode Acquisition Technology and ERP System in the Regenerated Textile Chemical Fiber Industry. 53-56 - Mohamad Noorman Masrek, Jusoff Hj. Kamaruzaman:

The Effect of Information Technology Infrastructure Flexibility on Intranet Effectiveness. 57-67 - Chungen Xu, Sheng Gong:

Formal Description for an Object-Oriented Role-based Access Control Model. 68-72 - Xiaoning Peng, Bin Huang, Ping Luo:

SDS: A Scalable Data Services System in Data Grid. 73-79 - Tianbao Zhuang, Hong Zhao, Zheng Tang:

A Study of Brainwave Entrainment Based on EEG Brain Dynamics. 80-86 - Qin Ming Liu, Wenyuan Lv:

The Study of Fault Diagnosis Based on Particle Swarm Optimization Algorithm. 87-91 - Ruixian Li:

Study on the Virtual Simulation of Flight Environment Based on OpenGL. 92-97 - Hebiao Yang, Yukun Chen, Rengang Hou:

A Novel Data Mining Platform Design with Dynamic Algorithm Base. 98-102 - Jingrong Yang, Chunyu Zhao:

Study on the Data Mining Algorithm Based on Positive and Negative Association Rules. 103-106 - Limin Cai:

Temperature Measurement and Control System Based on Embedded WEB. 107-111 - Huawang Qin, Yuewei Dai, Zhiquan Wang:

A Model of Intrusion Tolerant System Based on Game Theory. 112-117 - Guilin Lu:

Design and Applications of the Circuit of Keyboard Display in Detecting Axle's Temperature System. 118-125 - Jie Cong:

Design of Electric Bicycle Controller. 126-130 - Chunhua Ju:

CRMS: An Algorithm of Classification Rule Mining Based on Multiple Supports. 131-136 - Yan Li, Lianhe Yang:

Based on Delaunay Triangulation DEM of Terrain Model. 137-140 - Chun Jin, Fan Yang, Baohong Wan, Xiaojun Zhou:

The Design of Digital Television Multimedia Message Service System. 141-144
Volume 2, Number 3, August 2009
- K. Venkatachalam, P. Balasubramanie:

A Hybrid Resource Allocation Strategy with Queuing in Wireless Mobile Communication Networks. 3-14 - Jianhao Tan, Jing Zhang, Fu Guo:

Machine Learning Emulation in Nature-inspired Computation Systems. 15-23 - Mahmod Othman, Shaiful Annuar Khalid, Mohammad Ismail, Norshimah Abdul Rahman, Mohamad Fadhili Yahaya:

Fuzzy Evaluation of Weapons System. 24-31 - Bin Yan:

Formulas of Retrieval Rate in Database Based on Normalization Design. 32-39 - Mohamad Noorman Masrek, Jusoff Hj. Kamaruzaman, Nor Shahriza Abdul Karim, Ramlah Hussein:

Effectiveness of Corporate Intranet in Selected Malaysian Companies. 40-45 - Chongjun Fan, Honglin Xiong, Haiying Zhang, Wujun Liu, Liqiang Wang, Xiaohui Song:

Analysis of Network Security and Risks Prevention Strategies of Hongqiao Airport West Terminal. 46-52 - Aznoora Osman, Hanif Baharin, Mohammad Hafiz Ismail

, Jusoff Hj. Kamaruzaman:
Paper Prototyping as a Rapid Participatory Design Technique. 53-57 - Juan Huang, Yaoping Fei:

The Design and Implementation of the Distributed Computing Platform for Bioinformatics. 58-63 - Sharifah Lailee Syed-Abdullah, Omar Mazni, Mohd Nasir Abdul Hamid, Che Latifah bt Ismail, Jusoff Hj. Kamaruzaman:

Positive Affects Inducer on Software Quality. 64-70 - Jingzhong Wang, Lu Zhang:

Text Emotion Computing under Cognition Vision. 71-74 - Xu Yang, Hiroyuki Kumehara, Wei Zhang:

Back Propagation Wavelet Neural Network Based Prediction of Drill Wear from Thrust Force. 75-86 - Zhongjun Xiao, Mengxiao Wang:

Study on the NN Decoupling Control System of Air-cushioned Headbox. 87-93 - Ruicheng Li:

Security and Management of Local Computer Data. 94-96 - Farok Azmat, Md Ikhwan Hamdan, Jusoff Hj. Kamaruzaman:

Leveraging an Open Source VPN Technology to End User. 97-102 - Hongzhuo Zhang:

Study on the TOPN Abnormal Detection Based on the NetFlow Data Set. 103-108 - Ping Xiao:

Study on the Design Principles of Data Disaster Recovery System for Hospitals. 109-112 - Ku Ruhana Ku-Mahamud, Jia Yun Khor:

Pattern Extraction and Rule Generation of Forest Fire using Sliding Window Technique. 113-121 - Chengjun Tian, Zhiyong An, Lijuan Li, Chengyu Yang, Jie Duan, Kang Wang:

Study on the Fault Diagnosis Technique of Aerial Camera Exposure Board Based on Petri Net. 122-126 - Khaled Ahmad Aali, Masoud Parsinejad, Bizhan Rahmani:

Estimation of Saturation Percentage of Soil Using Multiple Regression, ANN, and ANFIS Techniques. 127-136 - Mengxin Li, Chengdong Wu, Hui Lin:

An Optimised Method-Based an Improved Neural Network Classifier. 137-142 - Li Fu:

Relative Truth Degree of Logic Formulas and Graded Fuzzy Logic. 143-148 - Guilin Lu, Shaohong Wan, Kaiqing Xu:

Study on the UWB Rader Synchronization Technology. 149-153 - Zheng Li:

A Species-Coexistence Model Defending against Credit Cheating in E-Commerce. 154-160 - Peng Li, Yulian Shang, Jifeng Wang, Yufei Zhang:

Study on the Multiple-Key-Pair Generation Scheme Based on Grey Half-generation. 161-165 - Nafaizatulnaniah Hashim, Abu Bakar Md Sultan:

Knowledge Management and Usability Model for Knowledge Management System. 166-175 - Xianjun Wang, Wencheng Guo:

The Design of RS232 and CAN Protocol Converter Based on PIC MCU. 176-181 - Zaki Ahmad Dahlan, Nor Arzami Othman, Mohd Fazril Izhar Mohd Idris, Jusoff Hj. Kamaruzaman:

Development of Individual Learners: Perspective on the Uncertain Future Contribution of E-Learning. 182-189
Volume 2, Number 4, 2009
- Larry King, Natarajan Meghanathan:

A Weighted-Density Connected Dominating Set Data Gathering Algorithm for Wireless Sensor Networks. 3-13 - Ziming Zeng:

An Agent-based Online Shopping System in E-commerce. 14-19 - Shivendra Gajraj Tewari:

CalOra: A software to simulate calcium diffusion. 20-30 - Lang Su, Zheng Gao:

Radial Projection Fourier Transform and its Application for Scene Matching with Rotation Invariance. 31-46 - Marzanah A. Jabar, Fatimah Sidi, Mohd Hasan Selamat, Abdul Azim Abdul Ghani, Hamidah Ibrahim:

An Investigation into Methods and Concepts of Qualitative Research in Information System Research. 47-54 - Jun Lang, Bing Qin, Ting Liu, Sheng Li:

Unsupervised Coreference Resolution with HyperGraph Partitioning. 55-63 - Plaban Kumar Bhowmick:

Reader Perspective Emotion Analysis in Text through Ensemble based Multi-Label Classification Framework. 64-74 - Zhicheng Dong, Wei Xiao, Xiping Zhang:

Artificial Fish Swarm Algorithm-Assisted and Receive-Diversity Aided Multi-user Detection for MC-CDMA Systems. 75-80 - Farhah Abdullah, Jusoff Hj. Kamaruzaman, Hasiah Mohamed, Roszainora Setia:

Strict versus Negligence Software Product Liability. 81-88 - Xuxing Ding, Fangfang Xie, Qing Wu:

Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network. 89-93 - Rossey Ginsawat, Rusli Abdullah, Mohd Zali Mohd Nor:

Applying Knowledge Management System Architecture in Software Maintenance Environment. 94-99 - Xun-Yi Ren, Ruchuan Wang, Hejun Zhou:

Intrusion Detection Method Using Protocol Classification and Rough. 100-108 - Fatimah Sidi, Marzanah A. Jabar, Mohd Hasan Selamat, Abdul Azim Abdul Ghani, Md Nasir Sulaiman:

Framework for Interrogative Knowledge Identification. 109-115 - Fengjuan Yang:

Analysis and Design of ETL in Hospital Performance Appraisal System. 116-121 - Siti Rafidah Muhamat Dawam, Khairul Adilah Ahmad, Jusoff Hj. Kamaruzaman, Taniza Tajuddian, Shamsul Jamel Elias, Suhardi Wan Mansor:

The Use of ICT in Public and Private Institutions of Higher Learning, Malaysia. 122-128 - Shan Gai, Peng Liu, Jiafeng Liu, Xianglong Tang:

A NN Image Classification Method Driven by the Mixed Fitness Function. 129-136 - Khairul Anwar Sedek, Norlis Osman, Mohd Nizam Osman, Jusoff Hj. Kamaruzaman:

Developing a Secure Web Application Using OWASP Guidelines. 137-143 - Yuan Cui:

DOA Estimation for Coherent Sources in Transformed Space. 144-147 - Juan Xu:

Construction of Information Disaster Recovery for Hospitals. 148-152 - Jihong Song, Shaopeng Wang:

The Pastry Algorithm Based on DHT. 153-157 - Yang Liu, Junle Yu:

Research of Education Evaluation Information Mining Technology Based on Gray Clustering Analysis and Fuzzy Evaluation Method. 158-164 - Ruicheng Li:

The Application of the Real-time Temperature Monitoring System for Electric Transmission Lines. 165-168 - Junying Gan, Sibin He:

Two-Dimensional Heteroscedastic Discriminant Analysis for Facial Gender Classification. 169-174 - Xingman Li, Chunqing Li, Zhiyong Wang:

Grid-based Data Quality and Data Integration Research. 175-178

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














