default search action
Journal of Convergence Information Technology, Volume 4
Volume 4, Number 1, March 2009
- Mamoun Hussein Mamoun:
A Secure DSR Routing Protocol for MANET. 3-10 - Saeedreza Ehteram, Alborz Rezazadeh Sereshkeh, Seyed Zeinolabedin Moussavi, Ali Sadr, Ali Akbar Jalali:
Utilizing a Pattern Recognition Controller and Linear Discriminate Analysis for MFL Defect Detection. 11-19 - H. N. Zaynidinov, Eeljin Chae, Tae Soo Yun:
Digital Signal Processing With Application of Basic Splines. 20-23 - D. Shanthi, G. Sahoo, N. Saravanan:
Comparison of Neural Network Training Algorithms for the prediction of the patient's post-operative recovery area. 24-32 - S. N. Geethalakshmi:
Impact of non-technical components on Success and Failure of Software Development. 33-38 - Lin Chen, Zongfang Zhou:
A Measure on Joint Default Risk Based Credit Rating Information and Combinatorial Copula Function. 39-46 - Ming-Tao Chou:
The Logarithm Function with a Fuzzy Time Series. 47-51 - Guo-Sheng Hu, Feng-Feng Zhu, Guo-Hong Zhang:
Transportation Reliability Based Distribution Center Decision. 52-57 - Jin-Kyoung Heo:
Distributed Object Activation for Web Application Encipherment Key. 58-62 - Wann-Jyi Horng, Jih-Ming Chyan:
A DCC Analysis of Two Stock Market Returns Volatility with an Oil Price Factor: An Evidence Study of Singapore and Thailand's Stock Markets. 63-69 - S. Janakiraman, V. Vasudevan:
An Intelligent Distributed Intrusion Detection System using Genetic Algorithm. 70-76 - Hua-Yi Lin:
High Effect Secure Data Transmission Mechanisms in Wireless Sensor Networks Using ID-Based Key Management Scheme. 77-83
Volume 4, Number 2, June 2009
- Chu-Fu Wang, Shu-Chien Huang, Jau-Der Shih:
Movement-Assisted Deployment for Irregular Sensor Density in Wireless Sensor Networks. 7-15 - Anestis A. Toptsis:
K-grid: A Structure for Storage and Retrieval of Affective Knowledge. 16-29 - Krishan Sabaragamu Koralalage, Noriaki Yoshiura:
OTag: Architecture to Represent Real World Objects in RF Tags to Improve Future Intelligent Transportation Systems. 30-48 - Dingju Zhu:
Upgrade Digital City Based on Parallel Computing. 49-51 - Marcelo de Carvalho Alves, Fabio Moreira da Silva, Tomas de Aquino Ferreira, Flavio Castro Silva:
Neuro-fuzzy operational performance of a coffee harvester machine. 52-59 - Byung-Sun Yoo, Yong-Dae Park, Kyu-Shick Lee, Nam-Kyun Kim, Mu-wook Pyeon:
A Study on USN Management for Tunnel Entry Slope. 60-63 - E. A. Mary Anita, V. Vasudevan:
Black Hole Attack on Multicast Routing Protocols. 64-68 - Alaa Mohamed Riad, Hazem M. El-Bakry, Haitham A. El-Ghareeb:
Mapping Different Software Architecture Paradigms to Different Integration Techniques: Highlighting Driving and Restraining Forces for Each Paradigm. 69-83 - Hosein Alizadeh, Behrouz Minaei-Bidgoli, Saeed K. Amirgholipour:
A New Method for Improving the Performance of K Nearest Neighbor using Clustering Technique. 84-92 - Joe Prathap P. M, V. Vasudevan:
Secure Key Management with optimal resource allocation using multiple edge sharing multicast trees. 93-101 - Qiu-Ting Wang, Xiu-Lin Hu:
New Kalman Filtering Algorithm for Passive-BD/SINS Integrated Navigation System Based on UKF. 102-107 - Alaa Mohamed Riad, Hamdy K. El-Minir, Haitham A. El-Ghareeb:
Review of e-Learning Systems Convergence from Traditional Systems to Services based Adaptive and Intelligent Systems. 108-131 - Atefeh Ahmadi, Reza Berangi:
Automatic Location Update using IPV6 Addressing Format for Next Generation Network. 132-137 - V. Prasanna Venkatesan, M. Krishnamoorthy:
A Metrics Suite for Measuring Software Components. 138-153 - Martin Aruldoss, T. Miranda Lakshmi, J. Madhusudanan:
Multi Agent Communication System for Online Auction with Decision Support System by JADE and TRACE. 154-163 - Siwoo Byun:
Enhanced Index Management for Accelerating Hybrid Storage Systems. 164-169 - Anirban Kundu, Alok Ranjan Pal, Tanay Sarkar, Arijit Samanta, Nirupam Chakraborty, Subhendu Mandal, Sutirtha Kr. Guha, Debajyoti Mukhopadhyay:
An Alternate Way to Develop Lossless Graphical Data Compression Package using Non-Linear Single Cycle Multiple Attractor Cellular Automata. 170-179
Volume 4, Number 3, September 2009
- Kazuya Odagiri, Giuseppe De Marco, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii:
The Processing Workload Evaluation in two Network Management Models of IP Networks. 7-16 - Weon Sang Yoo, Gyoo Gun Lim, Jonathan S. Kim:
A Game Theoretic Modeling Analysis on the Internet Channel Disintermediation. 17-24 - P. Radhakrishnan, V. M. Prasad, M. R. Gopalan:
Extensive Analysis and Prediction of Optimal Inventory levels in supply chain management based on Particle Swarm Optimization Algorithm. 25-33 - Massimo Orazio Spata, Salvatore Rinaudo:
A scheduling Algorithm based on Potential Game for a Cluster Grid. 34-37 - Mithun Karmakar, Dhruba K. Bhattacharyya:
Privacy Preserving Data Mining Using Matrix Algebraic Approach. 38-44 - Sung Wan Kim:
Improved Processing of Path Query on RDF Data Using Suffix Array. 45-52 - A. N. M. Rezaul Karim, Md. Golam Rabiul Alam:
Dynamic Threshold for Morphological Change Detection Algorithm. 53-58 - Hasina Attaullah, Muhammad Younus Javed:
QoS based Vertical handover between UMTS, WiFi and WiMAX Networks. 59-64 - Ruma Dutta, Indranil Ghosh, Anirban Kundu, Debajyoti Mukhopadhyay:
An Advanced Partitioning Approach of Web Page Clustering utilizing Content & Link Structure. 65-71 - Pyung-Soo Kim, Jeong-Hun Choi:
A New Mechanism for Available Bandwidth Estimation. 72-76 - Shikai Zhang, Lenan Wu:
Hybrid Modulation Based on Combining of AM and UNB. 77-81 - Hyoung Do Kim, Ju-Han Kim:
DNA Data Compression Based on the Whole Genome Sequence. 82-85 - Changsheng Wan, Aiqun Hu, Juan Zhang:
Managing Handover Authentication in Big-domain Wireless Environment. 86-93 - Reza Entezari-Maleki, Arash Rezaei, Behrouz Minaei-Bidgoli:
Comparison of Classification Methods Based on the Type of Attributes and Sample Size. 94-102 - YunYoung Hur, Jeonghye Han:
Analysis on Children's Tolerance to Weak Recognition of Storytelling Robots. 103-109
Volume 4, Number 4, December 2009
- Wann-Jyi Horng, Chi-Ming Kuan:
A DCC Analysis of Two Exchange Rate Market Returns Volatility with an Japan Dollars Factor: Study of Taiwan and Korea Exchange Rate Markets. 7-13 - Bruce Moulton, Zenon Chaczko, Mark Karatovic:
Updating Electronic Health Records with Information from Sensor Systems: Considerations Relating To Standards and Architecture Arising From the Development of a Prototype System. 21-26 - Mamoun Hussein Mamoun:
A New DSR Routing Protocol for MANET. 27-30 - Md. Imdadul Islam, M. Ruhul Amin:
Determination of Save Operating Border of Asynchronous Data Traffic Based on MMPP. 31-35 - Mamoun Hussein Mamoun:
A Newly Routing Protocol for MANET. 36-40 - Zdenek Becvar:
Efficiency of Handover Prediction Based on Handover History. 41-47 - H. S. Yoon, S. B. Hong, S. Moon, N. Kim, H. Y. Youm:
A Study on A Transport Network Independent Mobile IP Model. 48-54 - Hanan Ahmed Hosni Mahmoud Abd Alla, Lilac A. E. Al-Safadi:
A Multi Join Algorithm Utilizing Double Indices. 55-60 - Ruma Dutta, Anirban Kundu, Rana Dattagupta, Debajyoti Mukhopadhyay:
An Approach to Web Page Prediction Using Markov Model and Web Page Ranking. 61-67 - Hoon Ko, Carlos Filipe Freitas, Goreti Marreiros, Carlos Ramos:
A Study on Users Authentication Method for Safety Group Decision System in Dynamic Small Group. 68-76 - Jinn-Min Yang, Pao-Ta Yu:
Random Subspace Method with Feature Subsets Selected by a Fuzzy Class Separability Index. 77-86 - Yu-Lung Lo, Ling-Yi Tsai:
Approximate Searching for Music Data in Real-Valued Feature Indexing. 87-95 - Marjan Bahrololum, Elham Salahi, Mahmoud Khaleghi:
An Improved Intrusion Detection Technique based on two Strategies Using Decision Tree and Neural Network. 96-101 - Kim Yong Jae:
A Study on The Global Standards Of The E-Trade Process on The Basis ebXML & Web Services. 102-110 - Sanjay Mohapatra:
Framework for HRIS Implementation in Non-IT Sector. 111-117 - Chaohong Song Feng Shi, Xuan Ma:
Prediction of the subcellular location of apoptosis proteins based on approximate entropy. 118-122 - Guoqiang Zhang:
An experimental study on constructing sense relations in vocabulary teaching. 123-128
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.