


default search action
Computer and Information Science, Volume 4
Volume 4, Number 1, January 2011
- Vahid Garousi:

Experience in Developing a Robot Control Software. 3-13 - Thanongsak Aneksrup, Pipat Hiranvanichakorn:

Efficient Group Key Agreement on Tree-based Braid Groups. 14-27 - Waheed Yasin, Hamidah Ibrahim, Nor Asilah Wati Abdul Hamid, Nur Izura Udzir:

A Systematic Review of File Sharing in Mobile Devices Using Peer-To-Peer Systems. 28-41 - S. Karpagachelvi, M. Arthanari, M. Sivakumar:

Classification of ECG Signals Using Extreme Learning Machine. 42-52 - Edem E. Williams, Essien Eyo:

Building a Cost Effective Network for E-learning in Developing Countries. 53-59 - Mazen Abu-Zaher:

Modified Least Significant Bit (MLSB). 60-67 - Ling Zhang, Yucai Dong, Hongtao Shi, Ping Chen, Xuhui Li:

The Extraction of the FAE Image Profilogram Based on the Grey Level Thresholding. 68-71 - Abbas Toloie Eshlaghy, Alireza Pourebrahimi, Babak Zendehdel Nobari

:
Presenting a Model for Ranking Organizations Based on the Level of the Information Security Maturity. 72-78 - Olusegun Folorunso, Gladys Adewale, Adewale Opeoluwa Ogunde, Julius Olatunji Okesola:

Pinch Analysis as a Knowledge Management Tool for Optimization in Supply Chain. 79-89 - Qiang Zhang, Jun Zhou, Xiaozhou Yu:

A Kind of Low-cost Non-intrusive Autonomous Fault Emulation System. 90-99 - Salih Mohammed Salih, Waleed Ameen Mahmoud:

Modified OFDM Model Based on Sub-Sliding Window Technique. 100-109 - Feng Xue, Gang Lv:

Tracking Formant Trajectory of Tracheoesophageal Speech Using Hidden Dynamic Model. 110-115 - Omid Moradi:

A Hopfield Neural Network for Channel Assignment Problem in Cellular Radio Networks. 116-129 - Ali Keshavarzi, Fereydoon Sarmadian, Reza Labbafi, Abbas Ahmadi:

Developing Pedotransfer Functions for Estimating Field Capacity and Permanent Wilting Point Using Fuzzy Table Look-up Scheme. 130-141 - Shuhua Jiang:

Research on Image Acquisition System Based on Binocular Stereo Vision. 142-150 - Farzaneh Pakzad, Marjan Kuchaki Rafsanjani:

Intrusion Detection Techniques for Detecting Misbehaving Nodes. 151-159 - Dan Wang, Yufei Zhang:

A Dynamic Secret Sharing Scheme Based on Factorization. 160-162 - Ch. Suresh, E. Vinod kumar, L. v. v. r. k. Sriharsha, Suresh Chandra Satapathy, P. V. G. D. Prasad Reddy:

PSO Clustering with Preprocessing of Data Using Artificial Immune System. 163-171 - Alireza Jolfaei

, Abdolrasoul Mirghadri:
Image Encryption Using Chaos and Block Cipher. 172-185 - Zhaoxing Liu, Ning Zhang:

One Improved Collaborative Filtering Method Based on Information Transformation. 186-190 - Wan Malini Wan Isa, Jamaliah Abdul Hamid, Hamidah Ibrahim, Mohd Hasan Selamat, Rusli Abdullah, Nurul Amelina Nasharuddin:

Testing the Accuracy of Text Deconstruction using PTree tool. 191-197 - Juan Tian, Cheng Wang, Xixue Zhang:

Design of the Storage Battery Online Monitoring System. 198-204 - Roslina Ibrahim, Rasimah Che Mohd Yusoff, Hasiah Mohamed Omar, Azizah Jaafar:

Students Perceptions of Using Educational Games to Learn Introductory Programming. 205-216 - R. Thilepa, M. Thanikachalam:

A New Process of Color Images Recognition by Using ART-1 Neural Network. 217-223 - Lanhua Zhang:

Studies of the HMIS Based on HL7 Criterions. 224-227
Volume 4, Number 2, March 2011
- Rusli Abdullah, Zainab Mohamed Shah, Amir Mohamed Talib

:
A Framework of Tools for Managing Software Architecture Knowledge. 2-16 - Mingtao Shi:

Necessities and Tactics of Tool-Based Software Testing. 17-20 - Ugochukwu C. Okonkwo, Efosa Obaseki:

Simulation Model of Multiple Queueing Parameters: A Case of Vehicle Maintenance System. 21-33 - Jing Huang, Deming Liu, Cheng Zeng:

10 Gb/s WDM-PON Using Downstream OFDM and Upstream OOK. 34-38 - Rahul Malhotra, Narinder Singh, Yaduvir Singh:

Genetic Algorithms: Concepts, Design for Optimization of Process Controllers. 39-54 - Huey Fang Ong, Norwati Mustapha, Md Nasir Sulaiman:

Integrative Gene Selection for Classification of Microarray Data. 55-63 - Mojtaba Karami, Marjan Kuchaki Rafsanjani, Amirhosein Fathinavid, Yaeghoob Yavari:

QAIDS: Quantitative and Agent based Intrusion Detection System. 64-74 - K. Duraiswamy, B. Jayanthi:

A New Approach to Discover Periodic Frequent Patterns. 75-80 - Hassan Rangriz, Javad Mehrabi, Alireza Azadegan:

The Impact of Human Resource Information System on Strategic Decisions in Iran. 81-87 - Sara Sahebdel, Hamidreza Bakhshi:

Relay Selection Schemes for Cooperative Communications Systems Sensor Networks. 88-95 - Edem E. Williams, Bassey Eyo, Stephen Akpan:

Linden Labs Second Life: Understanding the Business Model and Sources of Commercial and Social Success or Decline of Second Life. 96-101 - Seyyed Mohammad Reza Farshchi, Seyyede Aliye NezhadHoseini, Fateme Mohammadi:

A Novel Implementation of G-Fuzzy Logic Controller Algorithm on Mobile Robot Motion Planning Problem. 102-114 - Aliaa A. A. Youssif, Wesam A. A. Asker:

Automatic Facial Expression Recognition System Based on Geometric and Appearance Features. 115-124 - Huafeng Xie, Fang Wu, Xuying Lu:

Study on the Optimization Design of the Subject Indexing Based on the Word-frequency Statistics. 125-131 - Latef Oladimeji Yusuf, Olusegun Folorunso, Adio T. Akinwale, I. A. Adejumobi:

Service Oriented Application in Agent Based Virtual Knowledge Community. 132-147 - Lanhua Zhang, Xiaochen Xu:

A Community Public Health System Design based on HL7 Criterions. 148-151 - Sara Qazvini Abhari, Towhid Zargar Ershadi:

Target Tracking Based on Mean Shift and KALMAN Filter with Kernel Histogram Filtering. 152-160 - Bingchao Lei:

Improved RPPI Strategy for Software Reliability Analysis Basing on Multi-objective Optimizing Method. 161-164
Volume 4, Number 3, June 2011
- Ibrahim A. Alghamdi, Robert Goodwin, Giselle Rampersad

:
E-Government Readiness Assessment for Government Organizations in Developing Countries. 3-17 - Huiran Zhang, Yantao Li, Zheng Tang:

Study on Brainwave Responses from Ears: the Event-related Synchronization under the Auditory Stimulus. 18-32 - Samer M. Barakat

, Khalil Yaghi
, Zaina Hamdan:
MIS Students Perception of Most Wanted MIS Job Market Skills. 33-42 - Latef Oladimeji Yusuf, Olusegun Folorunso, Adio T. Akinwale, I. A. Adejumobi:

Visualizing and Assessing a Compositional Approach to Service-Oriented Business Process Design Using Unified Modelling Language (UML). 43-59 - Chang-yong Liang, Enqiao Zhang, Yong Ding, Xiaowen Qi:

Comprehensive Evaluation System and Selection Method of Tax Software. 60-66 - Hanadi Al-Zegaier, Hasan Ali Al-Zu'bi, Samer M. Barakat

:
Investigating the Link between Web Data Mining and Strategic Human Resources Planning. 67-75 - Saeid Jorfi, Khalil Md. Nor, Lotfi Najjar:

Assessing the Impact of IT Connectivity and IT Capability on IT-Business Strategic Alignment: An Empirical Study. 76-87 - Min Feng, Zhenyan Wang:

A Genetic K-means Clustering Algorithm Based on the Optimized Initial Centers. 88-94 - Mingtao Shi:

Capturing Software Requirements of Business Processes in Multinational Firms: A Conceptual Framework for Practitioners. 95-98 - Baoling Qin, Minwei Yang, Yao He:

Research and Development of the Thin Terminal Technology of Broadband Computer. 99-105 - Rahmat Widia Sembiring, Jasni Mohamad Zain:

The Design of Pre-Processing Multidimensional Data Based on Component Analysis. 106-115 - Deyuan Zhang, Bingquan Liu, Chengjie Sun, Xiaolong Wang:

Learning to Combine Kernels for Object Categorization. 116-124 - Z. Sakhi, Abderrahim Tragha, R. Kabil, M. Bennai:

Grover Algorithm Applied to Four Qubits System. 125-130 - Kone Forokoro, Zhong Xie:

WebGIS to Managing Natural Resource: Case of Flooded Pasture in Lake Débo and Walado Débo. 131-137 - Nabil Keskes, Ahmed Lehireche, Abdellatif Rahmoun:

Web Services Selection Based on Mixed Context and Quality of Service Ontology. 138-150 - Peng Li:

Study on the Wireless Ad Hoc Network Secure Routing Based on the SAR Technology. 151-156 - Karim Q. Hussein, Ayman J. Nsour:

Multimedia Enhancing Computer Based Training Modules for The Deaf, Supported by Case Study. 157-168 - Yun Niu, Xuguang Wu, Junhong He, Liang Hong:

Integrated Synthesis of Control and Bandwidth Scheduling on Networked Control Systems. 169-180 - Yujuan Li, Mei Wang, Zhunan Zhou:

A NCRE-oriented Teaching Mode. 181-183 - Abbas Toloie Eshlaghy, Alireza Pourebrahimi, Azam Farmanara:

Pathology of E-commerce with an Approach to Information Technology (A Case Study: Knauf Iran Company). 184-192
Volume 4, Number 4, July 2011
- David Salb, Hershey H. Friedman, Linda Weiser Friedman:

The Role of Information Technology in Fulfilling the Promise of Corporate Social Responsibility. 2-9 - Shafinah Kamarudin, Mohd Ikram Mohammad:

File Security based on Pretty Good Privacy (PGP) Concept. 10-28 - Pedro Ivan Tello Flores, Luis Enrique Colmenares Guillén

, Omar Ariosto Niño Prieto:
Approach of RSOR Algorithm Using HSV Color Model for Nude Detection in Digital Images. 29-45 - Marwa Salah Farhan, Mohamed I. Marie

, Laila Mohamed El Fangary
, Yehia K. Helmy:
An Integrated Conceptual Model for Temporal Data Warehouse Security. 46-57 - Zahid Javed, M. Shakeel Faridi, M. Haris Abid, Shams-ul-Hassan, Abdul Hyee, Fahad Jan:

Web Based EIS to Support Entrepreneurs and SMEs Analysis. 58-63 - Firas Mahdi Muhsin Al-Salbi:

Investigation of QoS Multicast Routing Based on Intelligent Multiple Constrained. 64-71 - Ali Bazghandi, Ali A. Pouyan:

An Agent-Based Simulation Model for Urban Traffic System. 72-82 - Liang Chen, Yingqing Guo:

Design of the Distributed Control System Based on CAN Bus. 83-89 - Ahmad Jawdat, Qasem Obeidat, Alaa Aljanaby

:
On The Design of User Experience Based Persuasive Systems. 90-99 - Mojgan Taheri, Mohammad Ali Afshar Kazemi, Abbas Toloui Ashlaghi:

Improvement of Mobility Management in Heterogeneous Wireless Networks by Using Multiple Attribute Decision Making. 100-108 - Lim Kah Seng, Norafida Ithnin, Hazinah Kutty Mammi:

Identifying the Re-usability of Triangle Scheme and Intersection Scheme on Mobile Device. 109-119 - Feng Bao, Fengzhi Zhao:

Study on the E-government Call Center System Based on SOA. 120-122 - Shaimaa Ezzat Salama, Mohamed I. Marie

, Laila Mohamed El Fangary
, Yehia K. Helmy:
Web Server Logs Preprocessing for Web Intrusion Detection. 123-133 - Funkun Xing:

A New Model for Automatic Sentence Segmentation. 134-137 - Adnan H. Ali:

Simultaneous Measurements for Tunable Laser Source Linewidth with Homodyne Detection. 138-144 - Ruicheng Li:

Analysis on the Method and Importance of Practical Teaching in Vocational College. 145-148 - Kavita Saini, Abdul Wahid, G. N. Purohit:

Designing And Implementing WBIs for Algorithms. 149-156
Volume 4, Number 5, September 2011
- Aliaa A. A. Youssif, Shereen A. Hussein, Ahmed S. Ibrahim:

Three-Dimensional Detection of Pulmonary Nodules in Chest CT Images. 2-13 - Ruijuan Hu:

Medical Data Mining Based on Decision Tree Algorithm. 14-19 - Nour-Mohammad Yaghoubi, Badroddin Oraee Yazdani, Nasir Ahoorani, Seyyed Ali Banihashemi

:
Information Technology Infrastructures and Knowledge Management: Towards Organizational Excellence. 20-27 - Wanhai Geng, Yiming Chen, Yulian Li, Dong Wang:

Wavelet Method for Nonlinear Partial Differential Equations of Fractional Order. 28-35 - Rahul Malhotra, Subhash Singh, Harkirtan Singh, Parminder Kumar Luthra:

Analysis of Intensity Modulation and Switched Fault Techniques for Different Optical Fiber Cables. 36-44 - Xuemei Bai, Bin Guo, Zhiyong An:

Design of the Wide-view Collimator Based on ZEMAX. 45-52 - Puxi Hu, Wei Qian, Jian Liao:

Intelligent Control System of CNC Mill Machineing Based on the Feed-Driven Linear Motor. 53-58 - Wen Liu, Ligong Zhang, Xiangzhong Bai, Feng Liu:

Dynamic Response of Electromagnetic Launcher's Rail Subjected to Cosine Pressure. 59-70 - Haijian Yang:

Design of Time Division MUX and DEMUX for Large Optical Transceiver. 71-77 - Abdallah Chouarfia, Hafida Bouziane:

Dynamic Maintenance and Evolution of Critical Components-Based Software Using Multi Agent Systems. 78-91 - Siqin Qimuge, Chunsheng Zhang:

The Necessity and the Scheme of Super Cloud and Super Cloud Language Existence. 92-96 - Zhao MingXia, Qiuyan He:

A Simulation System of Social Economic. 97-103 - Ramanathan. P, Pradip Manjrekar. P:

Wireless Sensor Network for Continuous Monitoring a Patient's Physiological Conditions Using ZigBee. 104-110 - Jianwen Li, Yuanyuan Hou, Jianghong Li:

Study on the Four-channel Skin-hearing Aid Based on Morse Codes. 111-115
Volume 4, Number 6, November 2011
- Muna F. Al-sammaraie:

Medical Images Compression Using Modified SPIHT Algorithm and Multiwavelets Transformation. 2-17 - Hamid Reza Mohebbi, Omid Kashefi

, Mohsen Sharifi:
ZIVM: A Zero-Copy Inter-VM Communication Mechanism for Cloud Computing. 18-27 - Fanjun Li, Ying Li:

Cascade-Correlation Algorithm with Trainable Activation Functions. 28-37 - Mohammed Abbas Fadhil Al-Husainy:

A New Image Steganography Based on Decimal-Digits Representation. 38-47 - Nayereh Ghahreman, Ahmad Baraani-Dastjerdi:

Semi-Automatic Labeling of Training Data Sets in Text Classification. 48-56 - Kai Cheng, Hongjun Zhang, Luyuan Zhang, Liang Wang:

The Operation Effectiveness Evaluation Based on Statistic Analysis. 57-65 - Benjamin Tatira, Lillias Hamufari Natsai Mutambara, Conilius J. Chagwiza, Lovemore J. Nyaumwe:

Computerized Summative Assessment of Multiple-choice Questions: Exploring Possibilities with the Zimbabwe School Examination Council Grade 7 Assessments. 66-74 - Olumide Olayinka Obe, O. O. Sangodoyin, T. A. Lasisi, Dahud Kehinde Shangodoyin, O. O. Adedoyin:

ICT: Opportunities and Challenges of Third World Tertiary Institutions. 75-82 - Rahul Malhotra, Minu Sethi, Parminder Kumar Luthra:

Denoising, Segmentation and Characterization of Brain Tumor from Digital MR Images. 83-104 - Xiaoyan Ma, Hao Zou, Yujuan Li:

Research and Application of Contingency Plan Based on Hospital Network and Information System Security. 105-110

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














