default search action
Computer and Information Science, Volume 5
Volume 5, Number 1, January 2012
- Raymond Aschheim, Smain Femmam, M. Faouzi Zerarka:
New "Graphiton" Model: a Computational Discrete Space, Self-Encoded as a Trivalent Graph. 2-12 - Dayong Wu, Yu Zhang, Ting Liu:
Unsupervised Query Segmentation Using Monolingual Word Alignment Method. 13-19 - Ahmed H. Gabr, Sherif Keshk, Aliaa A. A. Youssif:
Effect of Sensor Mobility and Channel Fading on Wireless Sensor Network Clustering Algorithms. 20-31 - Huigang Fu, Chongjun Fan, Jianbai Wang, Ding Fang, Lu Yu, Xianglai Ran:
Research and Planning of Application Blueprint for Shanghai Airport Business Intelligence System. 32-37 - Thomas J. B. Kropmans, Barry G. G. O'Donovan, David Cunningham, Andrew W. Murphy, Gerard Flaherty, Debra Nestel, Fidelma P. Dunne:
An Online Management Information System for Objective Structured Clinical Examinations. 38-48 - Zhi Wu, Yuedao Jiang, Genzhu Bai:
Segmented Optimal Multi-Degree Reduction Approximation of Bézier Curve. 49-54 - Belkacem Athamena, Zina Houhamdi:
Structured Acceptance Test Suite Generation Process for Multi-Agent System. 55-61 - Azizol Abdullah, Rohaya Latip, Wan Mohd Azraei Wan Mustapha:
Evaluation of an Economy-Based File Replication Strategy for Malaysian Research and Education Network (MYREN) Data Grid Model. 62-76 - Mahdi Hariri, Shahriar B. Shokouhi:
Robustness of Multi Biometric Authentication Systems against Spoofing. 77-86 - Yahya Salameh Hassan Khraisat:
Design a Wireless Meteorological Station in Jordan. 87-96 - Hawrra Hassan Abass, Firas Mahdi Muhsin Al-Salbi:
Rotation and Scaling Image Using PCA. 97-106 - Guohua Zhang:
Study on Compound Model of Forest-Pulp Enterprise Production Logistics Intelligent Distribution System. 107-112 - Asim M. Murshid, S. N. Ahmad:
VLSI Architecture for Fuzzy Inference Processor using Triangular-Shaped Membership Function. 113-122 - Mingqiu Li:
Research on the Simulation of Time-Delay System. 123-127
Volume 5, Number 2, March 2012
- Jeff Butterfield, Thad Crews:
Casting a Wider Net: A Longitudinal Study Exploring Gender Differences, Influences and Attitudes Impacting Academic Major Selection in Computing. 2-10 - Abdallah Alashqur:
Using a Lattice Intension Structure to Facilitate User-Guided Association Rule Mining. 11-21 - Mingqiu Li:
Study on the Simulation of the APT Rough Tracing System Based on the Predictive Control Technology. 22-28 - Gary Cantrell, David A. Dampier, Yoginder S. Dandass, Nan Niu, A. Chris Bogen:
Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model. 29-38 - Ali Salih Mahmoud Saudi, Aliaa A. A. Youssif, Atef Z. Ghalwash:
Computer Aided Recognition of Vocal Folds Disorders by Means of RASTA-PLP. 39-48 - Kaige Chen, Xiaojun Han, Tenghao Huang:
Target Detection Algorithm Based on the Movement of Codebook Model. 49-54 - Justice G. Djokoto:
The Use of Farm Information Systems among Grasscutter Farmers in Ga-South Municipality and Awutu-Senya District in Ghana. 55-68 - Yahya Salameh Hassan Khraisat:
Analysis of the Parameters of Symmetrical Multi - Fed Full - Wave Dipole Antenna. 69-74 - Chunsheng Zhang:
The Intelligent Decision Supporting Technology of Cloud-Based Public Data Warehouse. 75-78 - Marwa M. A. Elfattah, Aliaa A. A. Youssif, Ebada Sarhan Ahmed:
Handset Malwares Threats Feature Extraction Based on Behavior Analysis. 79-87 - Sami M. Alhomod, Mohd Mudasir Shafi:
Privacy Policy in E Government Websites: A Case Study of Saudi Arabia. 88-93 - Ying Zheng:
Analysis and Design of GRB System Based on WSRF Web Service. 94-97 - Siti Zobidah Omar, Hayrol Azril Mohamed Shaffril, Jusang Bolong, Jeffrey Lawrence D'Silva:
Investigating Rural Library Usage among Rural Youth in Malaysia: Its Corresponding Determinants and Impacts. 98-104 - Mostafa Elhachloufi, Ahmed El Oirrak, Driss Aboutajdine, Mohammed Najib Kaddioui:
3D Recognition Using Neural Networks. 105-110 - Youyun Ao:
An Empirical Analysis of Fitness Assignment and Diversity-Preserving in Evolutionary Multi-Objective Optimization. 111-128
Volume 5, Number 3, May 2012
- Olabode Olatubosun, Oluwole Charles Akinyokun:
Modeling and Simulation of a Decision Support System for Population Census in Nigerian. 2-19 - A. S. Thuneibat:
Error Control Method for Interactive Video Applications over Modern Communication Networks. 20-26 - Majed Bouchahma, Wanglin Yan, Mohammed Ouessar:
Island Coastline Change Detection Based on Image Processing and Remote Sensing. 27-36 - Youssef Bassil, Mohammad Alwani:
Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information. 37-48 - Jing Xu, Wei Zhao, Peng Liu, Xianglong Tang:
An Improved Guidance Image Based Method to Remove Rain and Snow in a Single Image. 49-55 - Noreen Sarai, Godfrey Sithole:
Analysis of the Process and Outcomes of Eportfolio Development to Recognise Formal Learning in Zimbabwe. 56-66 - Mohamed A. El-Zawawy, Nagwan Moustafa Daoud:
New Error-recovery Techniques for Faulty-Calls of Functions. 67-75 - Chao Xu, Hongmei Ge:
An Application Research on Configuration Software System Platform Based on Component Technology. 76-82 - Ahmad Khader Haboush, Mohammad Al Nabhan, Motassem Al-Tarazi, Mohammad Al-Rawajbeh:
Load Balancing Using Multiple Node Disjoint Paths. 83-89 - Iraky Khalifa, Hala Mohamed Abbas:
Mobility Prediction in Dynamic Grids. 90-96 - Mina Elmaallam, Abdelaziz Kriouile:
A Model of Maturity for IS Risk Management Case Study. 97-109 - Rafiqul Zaman Khan, Noor Adnan Ibraheem:
Survey on Gesture Recognition for Hand Image Postures. 110-121 - Jingchun Feng, Fujie Zhang, Dandan Zhu, Fei Zhang:
Function Point Estimation and Demonstration on Website Projects. 122-135
Volume 5, Number 4, 2012
- Vahid Garousi, Tan Varma:
A Bibliometrics Analysis of Canadian Electrical and Computer Engineering Institutions (1996-2006) Based on IEEE Journal Publications. 1-24 - Athanasios Margaris:
Simulation and Visualization of Chaotic Systems. 25-52 - Mohamed A. El-Zawawy, Hamada A. Nayel:
Type Systems Based Data Race Detector. 53-60 - Latifa Oubedda, Brahim Erraha, Mohamed Khalfaoui:
Data Intelligent Analysis for Decision-Making at Universities. 61-67 - Ahmed Roumane, Kechar Bouabdellah, Kouninef Belkacem:
Energy Efficient Fault Tolerant Routing Mechanism for Wireless Sensor Network. 68-76 - Chao Xu, Hongmei Ge:
Research and Implementation of the Cloud Platform Based on the B-learning. 77-82 - Moses Ekpenyong, Emem Obong Udoh:
Morpho-Syntactic Analysis Framework for Tone Language Text-to-Speech Systems. 83-101 - A. K. Akinwole, O. J. Emuoyibofarhe:
Performance Comparison of Mobile Ad Hoc Network Routing Protocol and Transmission Control Protocol. 102-109 - Zhisheng Wang, Xiaobing Xu:
Improved SOM-Based High-Dimensional Data Visualization Algorithm. 110-115 - Waldo Hasperué, Laura Lanzarini, Armando De Giusti:
Rule Extraction on Numeric Datasets Using Hyper-rectangles. 116-131 - Davood Kheyri, Mojtaba Karami:
A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET. 132-139
Volume 5, Number 5, 2012
- Mingtao Shi:
Incorporating Information Security in Analysis of Business Strategy: A Conceptual Framework. 1-16 - Maged Bouchahma, Wanglin Yan:
Automatic Measurement of Shoreline Change on Djerba Island of Tunisia. 17-24 - Abbass S. Abbass, Aliaa A. A. Youssif, Atef Z. Ghalwash:
Hybrid-Based Compressed Domain Video Fingerprinting Technique. 25-34 - Mohd Afzan Othman, Norlaili Mat Safri, Ismawati Abdul Ghani, Fauzan Khairi Che Harun:
Characterization of Ventricular Tachycardia and Fibrillation Using Semantic Mining. 35-44 - John Kamau, Sylvester Namuye:
A Review of Users Adoption of Open Source Software in Africa. 45-49 - Jian-bo Wang, Chong-jun Fan, Lei Bai:
Air Traffic Forecast Empirical Research Based on the MCMC Method. 50-54 - Pradip Kumar Biswas, Alberto Moreira Baptista:
Growth of ICT Capital and Deceleration of Labour Productivity in the EU Countries: The Missing Links. 55-68 - Qabas Abdal Zahraa Jabbar:
Evaluating Model for E-learning Modules According to Selected Criteria: An Object Oriented Approach. 69-75 - Thuneibat S. A., Ababneh M. S.:
Sigma-Delta Modulator Simulation and Analysis Using MatLab. 76-80 - Jianhao Tan, Jing Zhang, Ya Wang:
A Kind of CTA Bone Removal Technology Based on the Improved Watershed Algorithm. 81-87 - Dawletbay Utebaev:
Finite Element Method for Internal Wave Equation for Stratified Fluid. 88-92 - Manuel Alberto M. Ferreira, Marina Andrade, José António Filipe:
The Age or Excess of the M|G|inf Queue Busy Cycle Mean Value. 93-97
Volume 5, Number 6, 2012
- Nabil Arman:
A Materialized View for the Same Generation Query in Deductive Databases. 1-5 - D. N. T. Kumar, Qufu Wei:
A General Computational Framework and Simulations of Branching Programs of Boolean Circuits Using Higher Order Logic (HOL) Software - An Insight into ECAD Tool Design Paradigm. 6-12 - Arindam Chaudhuri:
Forecasting Financial Time Series Using Multiple Regression, Multi Layer Perception, Radial Basis Function and Adaptive Neuro Fuzzy Inference System Models: A Comparative Analysis. 13-24 - Ahmed S. Rashad, Rowayda A. Sadek, Sherif Abdel Aziz El-Sherif:
An Efficient Hybrid Detection System for Abnormal Masses in Digital and Analog Mammogram. 25-32 - Eisa Alanazi, Malek Mouhoub, Bandar Mohammed:
A Preference-Aware Interactive System for Online Shopping. 33-42 - Hongmei Ge, Chao Xu, Qian Shi:
A Protection Method of Target Codes. 43-49 - Rusli Abdullah, Amir Mohamed Talib:
Towards a Personal Knowledge Model (PKM) in Collaborative Environment of School Teachers' Community. 50-57 - Jésus Antonio Motta, Laurence Capus, Nicole Tourigny:
Evaluation of Efficiency of Linear Techniques to Optimize Attribute Space in Machine Learning: Relevant Results for Extractive Methods of Summarizing. 58-72 - Hend S. Al-Khalifa:
WCAG 2.0 Semi-automatic Accessibility Evaluation System: Design and Implementation. 73-87 - Marios Poulos, Ioannis Deliyannis, Andreas Floros:
Audio Fingerprint Extraction Using an Adapted Computational Geometry Algorithm. 88-97 - Petr Mach, Regina Janíková:
Analysis of the Case Studies Video Recordings. 98-104
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.