


default search action
Computer and Information Science, Volume 5
Volume 5, Number 1, January 2012
- Raymond Aschheim

, Smain Femmam, M. Faouzi Zerarka:
New "Graphiton" Model: a Computational Discrete Space, Self-Encoded as a Trivalent Graph. 2-12 - Dayong Wu, Yu Zhang, Ting Liu:

Unsupervised Query Segmentation Using Monolingual Word Alignment Method. 13-19 - Ahmed H. Gabr, Sherif Keshk, Aliaa A. A. Youssif:

Effect of Sensor Mobility and Channel Fading on Wireless Sensor Network Clustering Algorithms. 20-31 - Huigang Fu, Chongjun Fan, Jianbai Wang, Ding Fang, Lu Yu, Xianglai Ran:

Research and Planning of Application Blueprint for Shanghai Airport Business Intelligence System. 32-37 - Thomas J. B. Kropmans

, Barry G. G. O'Donovan, David Cunningham, Andrew W. Murphy, Gerard Flaherty, Debra Nestel, Fidelma P. Dunne:
An Online Management Information System for Objective Structured Clinical Examinations. 38-48 - Zhi Wu, Yuedao Jiang, Genzhu Bai:

Segmented Optimal Multi-Degree Reduction Approximation of Bézier Curve. 49-54 - Belkacem Athamena

, Zina Houhamdi
:
Structured Acceptance Test Suite Generation Process for Multi-Agent System. 55-61 - Azizol Abdullah, Rohaya Latip, Wan Mohd Azraei Wan Mustapha:

Evaluation of an Economy-Based File Replication Strategy for Malaysian Research and Education Network (MYREN) Data Grid Model. 62-76 - Mahdi Hariri, Shahriar B. Shokouhi:

Robustness of Multi Biometric Authentication Systems against Spoofing. 77-86 - Yahya Salameh Hassan Khraisat:

Design a Wireless Meteorological Station in Jordan. 87-96 - Hawrra Hassan Abass, Firas Mahdi Muhsin Al-Salbi:

Rotation and Scaling Image Using PCA. 97-106 - Guohua Zhang:

Study on Compound Model of Forest-Pulp Enterprise Production Logistics Intelligent Distribution System. 107-112 - Asim M. Murshid, S. N. Ahmad:

VLSI Architecture for Fuzzy Inference Processor using Triangular-Shaped Membership Function. 113-122 - Mingqiu Li:

Research on the Simulation of Time-Delay System. 123-127
Volume 5, Number 2, March 2012
- Jeff Butterfield, Thad Crews:

Casting a Wider Net: A Longitudinal Study Exploring Gender Differences, Influences and Attitudes Impacting Academic Major Selection in Computing. 2-10 - Abdallah Alashqur:

Using a Lattice Intension Structure to Facilitate User-Guided Association Rule Mining. 11-21 - Mingqiu Li:

Study on the Simulation of the APT Rough Tracing System Based on the Predictive Control Technology. 22-28 - Gary Cantrell, David A. Dampier, Yoginder S. Dandass, Nan Niu, A. Chris Bogen:

Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model. 29-38 - Ali Salih Mahmoud Saudi, Aliaa A. A. Youssif, Atef Z. Ghalwash:

Computer Aided Recognition of Vocal Folds Disorders by Means of RASTA-PLP. 39-48 - Kaige Chen, Xiaojun Han, Tenghao Huang:

Target Detection Algorithm Based on the Movement of Codebook Model. 49-54 - Justice G. Djokoto

:
The Use of Farm Information Systems among Grasscutter Farmers in Ga-South Municipality and Awutu-Senya District in Ghana. 55-68 - Yahya Salameh Hassan Khraisat:

Analysis of the Parameters of Symmetrical Multi - Fed Full - Wave Dipole Antenna. 69-74 - Chunsheng Zhang:

The Intelligent Decision Supporting Technology of Cloud-Based Public Data Warehouse. 75-78 - Marwa M. A. Elfattah, Aliaa A. A. Youssif, Ebada Sarhan Ahmed:

Handset Malwares Threats Feature Extraction Based on Behavior Analysis. 79-87 - Sami M. Alhomod, Mohd Mudasir Shafi:

Privacy Policy in E Government Websites: A Case Study of Saudi Arabia. 88-93 - Ying Zheng:

Analysis and Design of GRB System Based on WSRF Web Service. 94-97 - Siti Zobidah Omar, Hayrol Azril Mohamed Shaffril, Jusang Bolong, Jeffrey Lawrence D'Silva

:
Investigating Rural Library Usage among Rural Youth in Malaysia: Its Corresponding Determinants and Impacts. 98-104 - Mostafa Elhachloufi, Ahmed El Oirrak, Driss Aboutajdine, Mohammed Najib Kaddioui:

3D Recognition Using Neural Networks. 105-110 - Youyun Ao:

An Empirical Analysis of Fitness Assignment and Diversity-Preserving in Evolutionary Multi-Objective Optimization. 111-128
Volume 5, Number 3, May 2012
- Olabode Olatubosun, Oluwole Charles Akinyokun:

Modeling and Simulation of a Decision Support System for Population Census in Nigerian. 2-19 - A. S. Thuneibat:

Error Control Method for Interactive Video Applications over Modern Communication Networks. 20-26 - Majed Bouchahma, Wanglin Yan, Mohammed Ouessar:

Island Coastline Change Detection Based on Image Processing and Remote Sensing. 27-36 - Youssef Bassil, Mohammad Alwani:

Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information. 37-48 - Jing Xu, Wei Zhao, Peng Liu, Xianglong Tang:

An Improved Guidance Image Based Method to Remove Rain and Snow in a Single Image. 49-55 - Noreen Sarai, Godfrey Sithole:

Analysis of the Process and Outcomes of Eportfolio Development to Recognise Formal Learning in Zimbabwe. 56-66 - Mohamed A. El-Zawawy, Nagwan Moustafa Daoud:

New Error-recovery Techniques for Faulty-Calls of Functions. 67-75 - Chao Xu, Hongmei Ge:

An Application Research on Configuration Software System Platform Based on Component Technology. 76-82 - Ahmad Khader Haboush, Mohammad Al Nabhan, Motassem Al-Tarazi, Mohammad Al-Rawajbeh:

Load Balancing Using Multiple Node Disjoint Paths. 83-89 - Iraky Khalifa, Hala Mohamed Abbas:

Mobility Prediction in Dynamic Grids. 90-96 - Mina Elmaallam, Abdelaziz Kriouile:

A Model of Maturity for IS Risk Management Case Study. 97-109 - Rafiqul Zaman Khan, Noor Adnan Ibraheem:

Survey on Gesture Recognition for Hand Image Postures. 110-121 - Jingchun Feng, Fujie Zhang, Dandan Zhu, Fei Zhang:

Function Point Estimation and Demonstration on Website Projects. 122-135
Volume 5, Number 4, 2012
- Vahid Garousi, Tan Varma:

A Bibliometrics Analysis of Canadian Electrical and Computer Engineering Institutions (1996-2006) Based on IEEE Journal Publications. 1-24 - Athanasios Margaris:

Simulation and Visualization of Chaotic Systems. 25-52 - Mohamed A. El-Zawawy, Hamada A. Nayel

:
Type Systems Based Data Race Detector. 53-60 - Latifa Oubedda, Brahim Erraha, Mohamed Khalfaoui:

Data Intelligent Analysis for Decision-Making at Universities. 61-67 - Ahmed Roumane

, Kechar Bouabdellah, Kouninef Belkacem
:
Energy Efficient Fault Tolerant Routing Mechanism for Wireless Sensor Network. 68-76 - Chao Xu, Hongmei Ge:

Research and Implementation of the Cloud Platform Based on the B-learning. 77-82 - Moses Ekpenyong, Emem Obong Udoh:

Morpho-Syntactic Analysis Framework for Tone Language Text-to-Speech Systems. 83-101 - A. K. Akinwole, O. J. Emuoyibofarhe:

Performance Comparison of Mobile Ad Hoc Network Routing Protocol and Transmission Control Protocol. 102-109 - Zhisheng Wang, Xiaobing Xu:

Improved SOM-Based High-Dimensional Data Visualization Algorithm. 110-115 - Waldo Hasperué, Laura Lanzarini, Armando De Giusti:

Rule Extraction on Numeric Datasets Using Hyper-rectangles. 116-131 - Davood Kheyri, Mojtaba Karami:

A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET. 132-139
Volume 5, Number 5, 2012
- Mingtao Shi:

Incorporating Information Security in Analysis of Business Strategy: A Conceptual Framework. 1-16 - Maged Bouchahma, Wanglin Yan:

Automatic Measurement of Shoreline Change on Djerba Island of Tunisia. 17-24 - Abbass S. Abbass, Aliaa A. A. Youssif, Atef Z. Ghalwash:

Hybrid-Based Compressed Domain Video Fingerprinting Technique. 25-34 - Mohd Afzan Othman, Norlaili Mat Safri, Ismawati Abdul Ghani, Fauzan Khairi Che Harun

:
Characterization of Ventricular Tachycardia and Fibrillation Using Semantic Mining. 35-44 - John Kamau, Sylvester Namuye:

A Review of Users Adoption of Open Source Software in Africa. 45-49 - Jian-bo Wang, Chong-jun Fan, Lei Bai:

Air Traffic Forecast Empirical Research Based on the MCMC Method. 50-54 - Pradip Kumar Biswas, Alberto Moreira Baptista

:
Growth of ICT Capital and Deceleration of Labour Productivity in the EU Countries: The Missing Links. 55-68 - Qabas Abdal Zahraa Jabbar:

Evaluating Model for E-learning Modules According to Selected Criteria: An Object Oriented Approach. 69-75 - Thuneibat S. A., Ababneh M. S.:

Sigma-Delta Modulator Simulation and Analysis Using MatLab. 76-80 - Jianhao Tan, Jing Zhang, Ya Wang:

A Kind of CTA Bone Removal Technology Based on the Improved Watershed Algorithm. 81-87 - Dawletbay Utebaev:

Finite Element Method for Internal Wave Equation for Stratified Fluid. 88-92 - Manuel Alberto M. Ferreira

, Marina Andrade, José António Filipe:
The Age or Excess of the M|G|inf Queue Busy Cycle Mean Value. 93-97
Volume 5, Number 6, 2012
- Nabil Arman:

A Materialized View for the Same Generation Query in Deductive Databases. 1-5 - D. N. T. Kumar, Qufu Wei:

A General Computational Framework and Simulations of Branching Programs of Boolean Circuits Using Higher Order Logic (HOL) Software - An Insight into ECAD Tool Design Paradigm. 6-12 - Arindam Chaudhuri:

Forecasting Financial Time Series Using Multiple Regression, Multi Layer Perception, Radial Basis Function and Adaptive Neuro Fuzzy Inference System Models: A Comparative Analysis. 13-24 - Ahmed S. Rashad, Rowayda A. Sadek, Sherif Abdel Aziz El-Sherif:

An Efficient Hybrid Detection System for Abnormal Masses in Digital and Analog Mammogram. 25-32 - Eisa Alanazi, Malek Mouhoub, Bandar Mohammed:

A Preference-Aware Interactive System for Online Shopping. 33-42 - Hongmei Ge, Chao Xu, Qian Shi:

A Protection Method of Target Codes. 43-49 - Rusli Abdullah, Amir Mohamed Talib

:
Towards a Personal Knowledge Model (PKM) in Collaborative Environment of School Teachers' Community. 50-57 - Jésus Antonio Motta, Laurence Capus

, Nicole Tourigny:
Evaluation of Efficiency of Linear Techniques to Optimize Attribute Space in Machine Learning: Relevant Results for Extractive Methods of Summarizing. 58-72 - Hend S. Al-Khalifa:

WCAG 2.0 Semi-automatic Accessibility Evaluation System: Design and Implementation. 73-87 - Marios Poulos

, Ioannis Deliyannis, Andreas Floros
:
Audio Fingerprint Extraction Using an Adapted Computational Geometry Algorithm. 88-97 - Petr Mach, Regina Janíková:

Analysis of the Case Studies Video Recordings. 98-104

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














