


default search action
Journal of Convergence Information Technology, Volume 4
Volume 4, Number 1, March 2009
- Mamoun Hussein Mamoun:

A Secure DSR Routing Protocol for MANET. 3-10 - Saeedreza Ehteram, Alborz Rezazadeh Sereshkeh, Seyed Zeinolabedin Moussavi, Ali Sadr, Ali Akbar Jalali:

Utilizing a Pattern Recognition Controller and Linear Discriminate Analysis for MFL Defect Detection. 11-19 - H. N. Zaynidinov, Eeljin Chae, Tae Soo Yun:

Digital Signal Processing With Application of Basic Splines. 20-23 - D. Shanthi, G. Sahoo, N. Saravanan:

Comparison of Neural Network Training Algorithms for the prediction of the patient's post-operative recovery area. 24-32 - S. N. Geethalakshmi:

Impact of non-technical components on Success and Failure of Software Development. 33-38 - Lin Chen, Zongfang Zhou:

A Measure on Joint Default Risk Based Credit Rating Information and Combinatorial Copula Function. 39-46 - Ming-Tao Chou:

The Logarithm Function with a Fuzzy Time Series. 47-51 - Guo-Sheng Hu, Feng-Feng Zhu, Guo-Hong Zhang:

Transportation Reliability Based Distribution Center Decision. 52-57 - Jin-Kyoung Heo:

Distributed Object Activation for Web Application Encipherment Key. 58-62 - Wann-Jyi Horng, Jih-Ming Chyan:

A DCC Analysis of Two Stock Market Returns Volatility with an Oil Price Factor: An Evidence Study of Singapore and Thailand's Stock Markets. 63-69 - S. Janakiraman, V. Vasudevan:

An Intelligent Distributed Intrusion Detection System using Genetic Algorithm. 70-76 - Hua-Yi Lin:

High Effect Secure Data Transmission Mechanisms in Wireless Sensor Networks Using ID-Based Key Management Scheme. 77-83
Volume 4, Number 2, June 2009
- Chu-Fu Wang, Shu-Chien Huang, Jau-Der Shih:

Movement-Assisted Deployment for Irregular Sensor Density in Wireless Sensor Networks. 7-15 - Anestis A. Toptsis:

K-grid: A Structure for Storage and Retrieval of Affective Knowledge. 16-29 - Krishan Sabaragamu Koralalage, Noriaki Yoshiura:

OTag: Architecture to Represent Real World Objects in RF Tags to Improve Future Intelligent Transportation Systems. 30-48 - Dingju Zhu:

Upgrade Digital City Based on Parallel Computing. 49-51 - Marcelo de Carvalho Alves, Fabio Moreira da Silva, Tomas de Aquino Ferreira, Flavio Castro Silva:

Neuro-fuzzy operational performance of a coffee harvester machine. 52-59 - Byung-Sun Yoo, Yong-Dae Park, Kyu-Shick Lee, Nam-Kyun Kim, Mu-wook Pyeon:

A Study on USN Management for Tunnel Entry Slope. 60-63 - E. A. Mary Anita, V. Vasudevan:

Black Hole Attack on Multicast Routing Protocols. 64-68 - Alaa Mohamed Riad, Hazem M. El-Bakry, Haitham A. El-Ghareeb:

Mapping Different Software Architecture Paradigms to Different Integration Techniques: Highlighting Driving and Restraining Forces for Each Paradigm. 69-83 - Hosein Alizadeh, Behrouz Minaei-Bidgoli, Saeed K. Amirgholipour:

A New Method for Improving the Performance of K Nearest Neighbor using Clustering Technique. 84-92 - Joe Prathap P. M, V. Vasudevan:

Secure Key Management with optimal resource allocation using multiple edge sharing multicast trees. 93-101 - Qiu-Ting Wang, Xiu-Lin Hu:

New Kalman Filtering Algorithm for Passive-BD/SINS Integrated Navigation System Based on UKF. 102-107 - Alaa Mohamed Riad, Hamdy K. El-Minir, Haitham A. El-Ghareeb:

Review of e-Learning Systems Convergence from Traditional Systems to Services based Adaptive and Intelligent Systems. 108-131 - Atefeh Ahmadi, Reza Berangi:

Automatic Location Update using IPV6 Addressing Format for Next Generation Network. 132-137 - V. Prasanna Venkatesan, M. Krishnamoorthy:

A Metrics Suite for Measuring Software Components. 138-153 - Martin Aruldoss, T. Miranda Lakshmi, J. Madhusudanan:

Multi Agent Communication System for Online Auction with Decision Support System by JADE and TRACE. 154-163 - Siwoo Byun:

Enhanced Index Management for Accelerating Hybrid Storage Systems. 164-169 - Anirban Kundu, Alok Ranjan Pal, Tanay Sarkar, Arijit Samanta, Nirupam Chakraborty, Subhendu Mandal, Sutirtha Kr. Guha, Debajyoti Mukhopadhyay:

An Alternate Way to Develop Lossless Graphical Data Compression Package using Non-Linear Single Cycle Multiple Attractor Cellular Automata. 170-179
Volume 4, Number 3, September 2009
- Kazuya Odagiri, Giuseppe De Marco, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii:

The Processing Workload Evaluation in two Network Management Models of IP Networks. 7-16 - Weon Sang Yoo, Gyoo Gun Lim, Jonathan S. Kim:

A Game Theoretic Modeling Analysis on the Internet Channel Disintermediation. 17-24 - P. Radhakrishnan, V. M. Prasad, M. R. Gopalan:

Extensive Analysis and Prediction of Optimal Inventory levels in supply chain management based on Particle Swarm Optimization Algorithm. 25-33 - Massimo Orazio Spata, Salvatore Rinaudo:

A scheduling Algorithm based on Potential Game for a Cluster Grid. 34-37 - Mithun Karmakar, Dhruba K. Bhattacharyya:

Privacy Preserving Data Mining Using Matrix Algebraic Approach. 38-44 - Sung Wan Kim:

Improved Processing of Path Query on RDF Data Using Suffix Array. 45-52 - A. N. M. Rezaul Karim, Md. Golam Rabiul Alam:

Dynamic Threshold for Morphological Change Detection Algorithm. 53-58 - Hasina Attaullah, Muhammad Younus Javed:

QoS based Vertical handover between UMTS, WiFi and WiMAX Networks. 59-64 - Ruma Dutta, Indranil Ghosh, Anirban Kundu, Debajyoti Mukhopadhyay:

An Advanced Partitioning Approach of Web Page Clustering utilizing Content & Link Structure. 65-71 - Pyung-Soo Kim, Jeong-Hun Choi:

A New Mechanism for Available Bandwidth Estimation. 72-76 - Shikai Zhang, Lenan Wu:

Hybrid Modulation Based on Combining of AM and UNB. 77-81 - Hyoung Do Kim, Ju-Han Kim:

DNA Data Compression Based on the Whole Genome Sequence. 82-85 - Changsheng Wan, Aiqun Hu, Juan Zhang:

Managing Handover Authentication in Big-domain Wireless Environment. 86-93 - Reza Entezari-Maleki, Arash Rezaei, Behrouz Minaei-Bidgoli:

Comparison of Classification Methods Based on the Type of Attributes and Sample Size. 94-102 - YunYoung Hur, Jeonghye Han:

Analysis on Children's Tolerance to Weak Recognition of Storytelling Robots. 103-109
Volume 4, Number 4, December 2009
- Wann-Jyi Horng, Chi-Ming Kuan:

A DCC Analysis of Two Exchange Rate Market Returns Volatility with an Japan Dollars Factor: Study of Taiwan and Korea Exchange Rate Markets. 7-13 - Bruce Moulton, Zenon Chaczko, Mark Karatovic:

Updating Electronic Health Records with Information from Sensor Systems: Considerations Relating To Standards and Architecture Arising From the Development of a Prototype System. 21-26 - Mamoun Hussein Mamoun:

A New DSR Routing Protocol for MANET. 27-30 - Md. Imdadul Islam, M. Ruhul Amin:

Determination of Save Operating Border of Asynchronous Data Traffic Based on MMPP. 31-35 - Mamoun Hussein Mamoun:

A Newly Routing Protocol for MANET. 36-40 - Zdenek Becvar:

Efficiency of Handover Prediction Based on Handover History. 41-47 - H. S. Yoon, S. B. Hong, S. Moon, N. Kim, H. Y. Youm:

A Study on A Transport Network Independent Mobile IP Model. 48-54 - Hanan Ahmed Hosni Mahmoud Abd Alla, Lilac A. E. Al-Safadi:

A Multi Join Algorithm Utilizing Double Indices. 55-60 - Ruma Dutta, Anirban Kundu, Rana Dattagupta, Debajyoti Mukhopadhyay:

An Approach to Web Page Prediction Using Markov Model and Web Page Ranking. 61-67 - Hoon Ko, Carlos Filipe Freitas, Goreti Marreiros, Carlos Ramos:

A Study on Users Authentication Method for Safety Group Decision System in Dynamic Small Group. 68-76 - Jinn-Min Yang, Pao-Ta Yu:

Random Subspace Method with Feature Subsets Selected by a Fuzzy Class Separability Index. 77-86 - Yu-Lung Lo, Ling-Yi Tsai:

Approximate Searching for Music Data in Real-Valued Feature Indexing. 87-95 - Marjan Bahrololum, Elham Salahi, Mahmoud Khaleghi:

An Improved Intrusion Detection Technique based on two Strategies Using Decision Tree and Neural Network. 96-101 - Kim Yong Jae:

A Study on The Global Standards Of The E-Trade Process on The Basis ebXML & Web Services. 102-110 - Sanjay Mohapatra:

Framework for HRIS Implementation in Non-IT Sector. 111-117 - Chaohong Song Feng Shi, Xuan Ma:

Prediction of the subcellular location of apoptosis proteins based on approximate entropy. 118-122 - Guoqiang Zhang:

An experimental study on constructing sense relations in vocabulary teaching. 123-128

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














