default search action
Journal of Convergence Information Technology, Volume 5
Volume 5, Number 1, February 2010
- Bruce Moulton, Graham Croucher, Andrew Varis, June Chen:
Method for Increasing the Energy Efficiency of Wirelessly Networked Ambulatory Health Monitoring Devices. 7-14 - Hyung Tae Kim, Sang Bong Kim, Jong Sik Go, Yang Dam Eo, Byoung-kil Lee:
Building 3D Geospatial Information Using Airborne Multi-Looking Digital Camera System. 15-22 - Saber Benharzallah, Okba Kazar:
A Scalable and Efficient Query Answering for a Context and Schema Mediation. 23-32 - Mohd Helmy Abd Wahab, Norzilawati Abdullah, Ayob Johari, Herdawatie Abdul Kadir:
GSM Based Electrical Control System for Smart Home Application. 33-39 - Nahid Amani, Pedram Hajipour, Farzaneh Seyedmostafaei:
An Appropriate Violation Detection Scenario for Service Level Agreements Based on WS-Agreement Protocol. 40-47 - SangBock Lee, Taesoo Lee:
Analysis on the Amount of Physical Activities of Taekwondo Taegeuk Pumsae Using Accelerometers. 48-53 - Li Tian, Zhou Hong:
Design and Research of Self-Adaptive Learning Diagnosis Agent. 54-59 - Mehdi Nasiri, Leyla Sadat Taghavi, Behrouz Minaee:
Multi-Objective Rule Mining Using Simulated Annealing Algorithm. 60-68 - Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Bala Srinivasan, Huamei Qi:
Novel Hybrid Group Key Agreement for Sensitive Information Systems. 69-81 - Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan:
An Individual and Group Authentication Model for Wireless Network Services. 82-94 - Prasanta Gogoi, Bhogeswar Borah, Dhruba K. Bhattacharyya:
Anomaly Detection Analysis of Intrusion Data Using Supervised & Unsupervised Approach. 95-110 - Zichang Shangguan, Shouju Li, Wei Sun, Maotian Luan:
Model Reference Control for Bulkhead Pressure of EPB Shield in Tunneling. 111-115 - Yuehua Tao, Youming Xia, Tianwei Xu, Xiaoxiao Chi:
Research Progress of the Scale Invariant Feature Transform (SIFT) Descriptors. 116-121 - Yu Chen, Dequan Zheng, Bowen Zheng, Tiejun Zhao:
Research on Automatic Pattern Acquisition Based on Construction Extension. 122-127 - Shuoben Bi, Jingtao Liang, Shenjun Xue, Lianghu Lu:
Research on Spatial Knowledge Reasoning about Jiangzhai Settlement in First Period. 128-134 - Shen Yang, Shuchen Li, Xiaoxiao Ye, Fangping He:
Content Mining and Network Analysis of Microblog Spam. 135-140
Volume 5, Number 2, April 2010
- Thair Al-Dala:
Evaluating the Utilisation of Mobile Devices in Online Payments from the Consumer Perspective. 7-16 - Chi-Yen Yin, Jiann-Min Yang:
Assessment of Home Networking Research Trends, 1981-2009. 17-27 - Rezeg Khaled, Mohamed Tayeb Laskri, Sylvie Servigne:
Geospatial Web Services Semantic Discovery Approach Using Quality. 28-35 - Alireza Dehestani, Pedram Hajipour:
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs. 36-42 - Saeedreza Ehteram, Seyed Zeinolabedin Moussavi, Mohsen Sadeghi, Seyed m. Mahdavi, Abbas Kazemi:
Intelligent Monitoring Approach for Pipeline Defect Detection from MFL Inspection. 43-49 - Zhongbao Chen, Fuliang Bao, Zhigang Fang:
Signal Spectrum Sensing Robust to Noise Uncertainty. 50-58 - Hai Guo, Jing-ying Zhao, Ming-jun Da:
A Preprocessing Method for NaXi Pictograph Character Recognition. 59-66 - Zhengjun Cheng, Yuntao Zhang:
Classification Models of Estrogen Receptor-B Ligands Based on PSO-Adaboost-SVM. 67-83 - Yabin Li:
Research on Simulation and Optimization of Transshipment Port Operation in a Power Coal Ocean Shipping Logistics System on the Basis of WITNESS. 84-87 - Yi-Cheng Chan, Ming-Chun Liao:
Collision-Aware Backoff Mechanisms for IEEE 802, 11 WLANs. 88-100 - Omid Kashefi, Nina Mohseni, Behrouz Minaei:
Optimizing Document Similarity Detection in Persian Information Retrieval. 101-106 - Chen Hong:
A GMDH-Based Traffic Flow Forecasting Model. 107-111 - Geoffrey H. Tanakinjal, Kenneth R. Deans, Brendan J. Gray:
Innovation Characteristics, Perceived Risk, Permissibility and Trustworthiness in the Adoption of Mobile Marketing. 112-123 - Chi-Yen Yin, Johannes K. Chiang:
Bibliometric Analysis of Social Capital Research during 1956 to 2008. 124-132 - Mohammed J. Islam, Q. M. Jonathan Wu, Majid Ahmadi, Maher A. Sid-Ahmed:
Investigating the Performance of Naive- Bayes Classifiers and K- Nearest Neighbor Classifiers. 133-137 - Maha A. Al-Bayati, Karim Q. Hussein:
Evaluating the Efficiency of the Instructional Websites "Which are Oriented to the Deaf Students" According to the Technical Criteria". 138-145 - M. Sami Soliman, Guanzheng Tan:
Conditional Sensor Deployment Using Evolutionary Algorithms. 146-154 - Peishu Chen, Yijuan Zhu:
An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers. 155-162 - Tzong-I Wang, Ting-Yuan Yeh:
Development of Low Cost Message Delivery Path for Mobile Agent Communication. 163-173
Volume 5, Number 3, May 2010
- Lien Fu Lai, Liang-Tsung Huang, Chao-Chin Wu, Shi-Shan Chen:
Fuzzy Knowledge Management through Knowledge Engineering and Fuzzy Logic. 7-15 - Ying Wang, Daoping Wang, Guangli Liu, Zhimin Yang:
SVC Method for Textile Weave Recognizing. 16-19 - Ying Wang, Guangli Liu, Shengli Bai, Zhimin Yang:
Attribute Extraction System for Agricultural SEM. 20-23 - Wenjie Zhao, Mingxing He:
Improvement of a Secure Convex Hull Two-Party Computation Protocol. 24-30 - Huali Cai, Li Wang, Lu Liu, Zhiming Liu:
A Temporal Relation-based Method for Extracting Occurrence Time in Chinese Web News of Emergencies. 31-37 - Yinghui Pan:
Digital Watermarking Particle Swarm Optimization Based on Multi-wavelet. 38-45 - Ding Pan:
An Integrative Framework for Continuous Knowledge Discovery. 46-53 - Ding Pan:
Metadata Version Management for DW 2, 0 Environment. 54-60 - Xudong Lin, Hanxing Liu, Piyuan Lin, Meihua Wang:
Chinese Question Classification Using Alternating and Iterative One-against-One Algorithm. 61-67 - Qian Zhu, Xian-Yi Cheng, Zi-juan Gao:
The Recognition Method of Unknown Chinese Words in Fragments Based on Mutual Information. 68-72 - Yihui Qiu, Hong Li:
Application of Feature Extraction Method in Customer Churn Prediction Based on Random Forest and Transduction. 73-78 - Hanxing Liu, Xudong Lin, Caixing Liu:
Research and Implementation of Ontological QA System Based on FAQ. 79-85 - Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao:
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching. 86-94 - Li Yan, Yi Qin, Zheng Pei:
Linguistic Information Processing Based on Aggregation Operator over the Internet. 95-102 - Peiguang Lin, Lin Zhao:
Research on the Expression and Extraction of WDB. 103-112 - Xudong Lin, Hanxing Liu, Piyuan Lin, Meihua Wang:
Data Mining for Forecasting the Broiler Price Using Wavelet Transform. 113-121 - Chaoqun Li, Hongwei Li:
An Improved Instance Weighted Linear Regression. 122-128 - Mingfeng Zhao, Yajian Zhou, Yixian Yang, We Song, Yajun Du:
A New Method to Detect Useless Service Failure Model in SPN. 129-134
Volume 5, Number 4, June 2010
- Dong Jiang, Gang Chen:
Research on Operation Rules Modeling in Equipment Training System. 8-14 - Gang Chen:
Design and Realization of Equipment Training Simulator. 15-22 - Xun-Yi Ren, Lin Fei, Zheng Yan, Mao Bo-le:
An Efficient Lightweight Testbed for Networks Emulation. 23-28 - Xueliang Wei:
Shunt APF Based on Current Loop Repetitive Control. 29-37 - Peide Liu, Yu Su:
The Extended TOPSIS Based on Trapezoid Fuzzy Linguistic Variables. 38-53 - Weimin Ma, Ke Wang:
Optimal Online Risk-Tolerant Ordering Policy for the Newsvendor with Forecast. 54-65 - Xueying Tian:
Research on Corporate Citizenship Engaging in Social Welfare Activities. 66-74 - Xu Xiang, Jianguo Chen:
A Secure Routing Protocol for Peer-to-Peer Network. 75-83 - Bae-Ling Chen, Wen-Chung Kuo, Yu-Shuan Chu:
Weaknesses of a Secure Dynamic ID Based Remote User Authentication Scheme. 84-89 - Jinlong Wang, Ke Gao, Huy Quan Vu:
SpamCooling: A Parallel Heterogeneous Ensemble Spam Filtering System Based on Active Learning Techniques. 90-102 - Shifei Ding, Weikuan Jia, Chunyang Su, Xiaoliang Liu, Jinrong Chen:
An Improved BP Neural Network Algorithm Based on Factor Analysis. 103-108 - Zhiyong Yuan, Yuanyuan Zhang, Jianhui Zhao, Yihua Ding, Chengjiang Long, Lu Xiong, Dengyi Zhang, Guozhong Liang:
Real-time Simulation for 3D Tissue Deformation with CUDA Based GPU Computing. 109-119 - Zuowen Tan:
An Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography. 120-129 - Taiyo Maeda, Yusuke Aoki, Tadahiko Murata:
Construction of PSE System for Developing Reinforcement Learning Algorithms. 130-140 - Taiyo Maeda, Tadahiko Murata, Daichi Kotaka, Shigeru Matsumoto, Yang Cao:
Social Simulation Based on Human Behavioral Data Collected by Web-Based Experimental System. 141-151 - Hiroyuki Kanazawa, Naoki Onishi, Yuri Mizusawa, Takahiro Tsunekawa, Hitohide Usami:
Application Hosting Services for Research Community on Multiple Grid Environments. 152-163 - Jiang Xie, Guoyong Mao, Shilin Zhang, Wu Zhang:
An Integrated Computing Environment for Bio-Molecular Networks. 164-171 - Koichi Shimizu, Yuji Uehara, Yoshimasa Kadooka:
A PSE for Finite Element Method. 172-186 - Shinji Motoki, Atsushi Nakamura, Koichi Hashimoto, Kiyoshi Mizumaru:
Problem Solving Environment for Lattice QCD on Cell/B, E, . 187-194 - Kentaro Takai, Chioko Kaneta, Yuji Uehara, Yoshimasa Kadooka:
Development of Problem Solving Environment for Large Scale Electronic Structure Calculations Based on Tight Binding Method. 195-203 - Shigeo Kawata:
Review of PSE (Problem Solving Environment) Study. 204-215 - Takayuki Teramoto, Tadashi Okada, Shigeo Kawata:
An Education-Support PSE System: TSUNA-TASTE. 216-224 - Hiromichi Kobashi, Shigeo Kawata, Yasuhiko Manabe, Masami Matsumoto, Hitohide Usami, Daisuke Barada:
PSE Park: Framework for Problem Solving Environments. 225-239
Volume 5, Number 5, July 2010
- Nabendu Chaki, Bidyut Biman Sarkar:
Virtual Data Warehouse Modeling Using Petri Nets for Distributed Decision Making. 8-21 - Bao-sen Wang, Juan Li, Jian-min Sun:
The Study on the Evaluation System of Investment Value of Listed Companies on the GEM. 22-29 - Jeong-Hye Han, Dong-Ho Kim, Jong-Won Kim:
Physical Learning Activities with a Teaching Assistant Robot in Elementary School Music Class. 30-38 - Kuo-Ching Liu, Hui-Feng Huang:
A New Design of Encryption/Decryption for Field Applications. 39-43 - Debajyoti Mukhopadhyay, Sukanta Sinha:
An Algorithm for Construction of High Efficient Web Page Tree. 44-57 - Guimin Huang, Yanzhou Huang, Yan Zhang, Ya Zhou:
A Misspelling Intelligent Analysis Approach for Correcting Misspelled Words in English Text. 58-71 - Debajyoti Mukhopadhyay, Sukanta Sinha:
A Novel Approach for Domain Specific Lucky Web Search. 72-80 - Bin Zhu, Xiao-Ping Zeng, Xian-Sheng Xiong, Chen Qian, Wen-Yan Fan, Wei Geng:
A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks. 81-85 - Zhimin Yang, Xiao Yang, Guangli Liu:
A Fuzzy Optimization Method for Data Mining. 86-91 - Deepak Dahiya:
Delivering a Course in Software Engineering: A Hands On Approach. 92-98 - Wei-Chih Hsu, Tsan-Ying Yu, Jan-Lie Guo:
Enhanced Block Motion Estimation Based on Threshold-Aware Two-Path Search Method. 99-110 - Qindong Sun, Qian Wang, Jie Ren:
Modeling and Analysis of the Proactive Worm in Unstructured Peer-to-Peer Network. 111-117 - Pei-Wen Wang, Yi-Jing Su, Meng-Long Shih, Shao-Ding Luo:
Analysis of Online Word-of-Mouth in Online Forums Regarding Notebook Computers. 118-124 - Zonghao Zhou, Yijuan Zhu:
Reliability Analysis of the MAP/M/c Queue with Server Breakdowns. 125-130 - Koun-Tem Sun, Chih-Hsuan Wei, Yi-Yu Hsu, Wen-Chun Liu, Ting-Tsung Chang:
On Deriving an Equation of the Mutation Rate of the Hepatitis B Virus. 131-137 - Zhenyu Wu, Hongyang Yu, Bin Tang:
A Novel Feedback Approach for Image/Video sampling Systems' Performances Improvement. 138-147 - Wann-Jyi Horng:
Dynamic Relationship of Two Exchange Rate Market Returns' Volatility with an European Dollars Factor: Empirical Study of Japan and Korea's Exchange Rate Markets. 148-155 - Li Zhang, Guoxin Zheng, Dongli Jia:
Spectrum Pooling-Based Vertical Handover for Heterogeneous Cognitive Radio Networks with QoS Constrains. 156-169 - Panida Songram:
Efficient Ming of Top-K Closed Sequences. 170-178 - Kuo-Ching Liu, Hui-Feng Huang:
Efficient Access Control in a Hierarchy for Hardware-limited Users. 179-185 - Chaohong Song, Feng Shi:
Using IB1 Algorithm to Predict of Bacterial Toxins with an Improved Feature Extraction. 186-191 - Rishin Haldar, Debajyoti Mukhopadhyay:
An Attempt to Verify Claims of University Departments by Text Mining its Web Pages. 192-202 - Hai Guo, Jing-ying Zhao, Ming-jun Da, Xiao Niu Li:
NaXi Pictographs Edge Detection Using Lifting Wavelet Transform. 203-210
Volume 5, Number 6, August 2010
- Jürgen Geiser, Robert Röhle:
Kinetic Processes and Phase-transition of CVD Processes for Ti2SiC3. 9-32 - Dongsheng Liu, Hao Tian:
A New Anonymous Authentication Method Based on One-way Accumulator. 33-39 - Zheng Wei, Sanyang Liu, Xiaogang Qi:
Integrated Resources Optimization in Three-layer Dynamic Network. 40-46 - Weiguo Zhang, Xia Yin, Jianping Wu, Wei Zhang, Shuangming Huang:
Real Aggregation for Reducing Routing Information Base Size. 47-53 - Chi-Man Pun, Moon-Chuen Lee, Cong Lin:
Geometric Invariant Shape Representation Based on Radon and Adaptive Stationary Wavelet Transforms. 54-65 - Xinwu Li:
A Cell Projection Algorithm Based on Feature Region Segmentation and Cells Sorting. 66-72 - Yinghui Pan, Jian Luo, Jinqiao Chen, Bo Li:
A New Vector Identification Method Based on Vector Structure and Suffix Tree. 73-78 - Hao Jiang, Jie Xu:
Matching Objects in Multi-Camera Surveillance without Geometric Constraints. 79-86 - Hai Guo, Jing-ying Zhao:
Segmentation Method for NaXi Pictograph Character Recognition. 87-98 - Peiquan Jin, Xiaowen Li, Hong Chen, Lihua Yue:
CT-Rank: A Time-aware Ranking Algorithm for Web Search. 99-111 - Yang Peng, Ye-mei Qian:
A Particle Swarm Optimization to Vehicle Routing Problem with Fuzzy Demands. 112-119 - Hui Gao, Min Zhou, Yan Fu:
Analysis of Netizen's Affective Tendency on Public Opinion. 120-124 - Nan Dong, Fuqiang Liu, Zhipeng Li:
Crowd Density Estimation Using Sparse Texture Features. 125-137 - Xue Deng, Rongjun Li:
A Portfolio Selection Model Based on Possibility Theory Using Fuzzy Two-stage Algorithm. 138-145 - Peng Yang, Qingsheng Zhu:
Finding Key Knowledge Attribute Subspace of Outliers for High Dimensional Dataset. 146-154 - Jia Hou, Moon Ho Lee:
Information Hided Jacket Matrix and Its Fast Factorization Algorithm. 155-160 - Qifeng Zhou, Wencai Hong, Linkai Luo, Fan Yang:
Gene Selection Using Random Forest and Proximity Differences Criterion on DNA Microarray Data. 161-170 - Jinlong Wang, Shunyao Wu, Yang Jiao, Huy Quan Vu:
Study on Student Score Based on Data Mining. 171-179 - Weihua Xu, Weimin Ma, Fukun Yu:
An Analysis of the Co-operative Supply Chain's EPQ Model under Trade Credit. 180-188 - Chuntao Lu, Huyin Zhang, Di Wu, Xin Li, Zhou Zhu:
STBH: A Spectrum-tree-based Hybrid Routing Protocol for Cognitive Network. 189-196
Volume 5, Number 7, September 2010
- N. Saravana Selvam, S. Radhakrishnan:
Active Network Based Queue Management for Providing QoS Using IXP 2400 Network Processor. 9-16 - Cheng Xian-yi, Sun Ping, Zhu Qian, Yue-Hong Cai:
The Research of Chinese Semantic Similarity Calculation Introduced Punctuations. 17-23 - Jiaomin Liu, Li Li, Jianli Zhao, Tao Fu:
The Low-voltage Electrical Network Routing Strategy. 24-28 - Guoqiang Cai, Zhongzhi Tong, Zongyi Xing:
Modelling of Electrohydraulic System Using RBF Neural Networks and Genetic Algorithm. 29-35 - Xi Li, Xiaoning Zhu, Guoqiang Cai:
Research on System Integration Alliance of Urban Rail Transit Safety Monitoring. 36-41 - Cui-Xia Li, Wei-Ming Liu, Zi-Nan Fu:
GPS/TDOA Hybrid Location Algorithm Based on Federal Kalman Filter. 42-48 - Youjun Xu, Dantong Ouyang, Yuxin Ye:
Model Counting with Boolean Algebra and Extension Rule. 49-56 - M. S. Saleem Basha, P. Dhavachelvan:
Web Service Based Secure E-Learning Management System- EWeMS. 57-69 - Gang Chen, Huifang Lv, Jun Yang, Yue Zhang:
Key Technologies of Modeling for Equipment Training Environment. 70-77 - Miriam Salcedo H., Darnes Vilariño Ayala, Fabiola López y López, María Josefa Somodevilla García:
Clearing Policy for an Specialist Agent in Marketing Strategies. 78-83 - Mariceia Tatiane Vilani, Mariele Pinheiro, Luciana Sanches Alves, Nara Luisa Reis de Andrade, Marcelo de Carvalho Alves, Jose de Souza Nogueira:
Modelling Net Ecosystem CO2 Exchange by Simple Tropical Ecosystem Model. 84-89 - Tiejun Pan, Leina Zheng, Guoqing Yan:
Research of Information Framework for Fourth Party Logistics. 90-99 - Mayyada Hammoshi, Razan Alani:
A Proposed Model to Implement Load and Throughput of WLAN Implemented as Wi-Fi System. 100-111 - Xiaogang Qi, Chen-xi Qiu:
An Improvement of GAF for Lifetime Elongation in Wireless Sensor Networks. 112-119 - Fu Jianbao, Maotian Luan, Yang Qing, Nian Tingkai:
Three-Dimensional Finite Element Analysis of Wall Pressure on Large Diameter Silos. 120-128 - Renmin Han, Jun Huang:
QoS Routing in General Petersen-Torus Networks: A Case Study. 129-132 - Chang Wang, Yajun Du, Peiying Zhang:
Optimization of Query Expansion Source in Formal Concept Analysis. 133-140 - Ting-gui Chen, Chun-Hua Ju:
Characteristic Description of Coupled Task Sets Based on Design Structure Matrix and Its Optimal Time and Efforts Solution by Genetic Algorithm. 141-147 - Hongjun Guan:
Prevention and Control Model of Enterprise Business Risk Based on Multi-Agent. 148-154 - Peng Wang, Fengqiang Gao:
Full-Information Item Bifactor Analysis of the Job Burnout Scale for Chinese College Teachers. 155-160 - Kunfang Song, Shufen Ruan, Minghua Jiang:
A Flexible Grid Task Scheduling Algorithm Based on QoS Similarity. 161-166 - Hsin-Hsi Lai, Heng-Chang Lin, Yu-Cheng Chen:
A Product Knowledge-Sharing System Focusing on Internet-mediated Mode. 167-174 - Danwei Chen, Yanjun He:
A Study on Secure Data Storage Strategy in Cloud Computing. 175-179 - Zuowen Tan:
A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc Networks. 180-186 - Xiao Yang, Renyong Chi, Zhimin Yang:
Fuzzy Support Vector Machine Method for Evaluating Innovation Sources in Service Firms. 187-196 - Kuang Haibo, Li Wei, Jian Wang:
AMC Non-Performing Assets Disposal with CDO in China. 197-204
Volume 5, Number 8, October 2010
- Ahmed M. Mahdy, Jitender S. Deogun:
Adaptive Optical Wireless Networks: End-to-End Link Delay Optimization. 9-20 - Yongguo Liu, Yi-Dong Shen:
Data Clustering with Cat Swarm Optimization. 21-28 - Shouju Li, Li Wu, Fuzheng Qu, Wei Sun:
Parameter Estimation of Particle Flow Model for Soils Using Neural Networks. 29-35 - Linkai Luo, Dengfeng Huang, Hong Peng, Qifeng Zhou, Guifang Shao, Fan Yang:
A New Parameter Selection Method for Support Vector Machine Based on the Decision Value. 36-41 - Sotiris B. Kotsiantis, Dimitris Kanellopoulos, Vasilis Tampakas:
Financial Application of Multi-Instance Learning: Two Greek Case Studies. 42-53 - Shifei Ding, Li Xu, Chunyang Su, Hong Zhu:
Using Genetic Algorithms to Optimize Artificial Neural Networks. 54-62 - Youfu Wu, Jing Wu:
Recognizing Moving Objects Based on Gaussian-Hermite Moments and ART Neural Networks. 63-70 - Lilin Fan:
Research on Classification Mining Method of Frequent Itemset. 71-77 - Wei-Chih Hsu, Tsan-Ying Yu:
E-mail Spam Filtering Based on Support Vector Machines with Taguchi Method for Parameter Selection. 78-88 - Chih-Feng Chuang, Chao-Jen Cheng:
A Study of Institutional Repository Service Quality and Users' Loyalty to College Libraries in Taiwan: The Mediating & Moderating Effects. 89-99 - Kaipeng Liu, Binxing Fang, Weizhe Zhang:
Incorporating Relevance and Importance for Dynamic Ranking in Folksonomies. 100-112 - Yunni Xia, Zhe Ouyang, Yanxin Wu, Ruilong Yang:
Determing Performance of Choreography-based Composite Services. 113-125 - Chein-Shung Hwang:
Genetic Algorithms for Feature Weighting in Multi-criteria Recommender Systems. 126-136 - Tanzilah Noor Shabnam, Md. Imdadul Islam, M. Ruhul Amin:
Call Admission Control Strategy for System Throughput Maximization Using DOVE. 137-145 - Kai Yang, Jianfeng Ma:
A Hierarchical Hybrid Routing Protocol for Wireless Mesh Network. 146-156 - Yan Chen, Yunjun Gao:
Ranked Continuous Visible Nearest Neighbor Search. 157-164 - Chia-Chen Yen, Jih-Shih Hsu:
Pagerank Algorithm Improvement by Page Relevance Measurement. 165-173 - Yongqing Wei, Ming-ying Xu, Zhen-fang Zhu:
Feature-Denoising Based on Average Fitness of Genetic Population. 174-179 - Peiyu Liu, Jing Zhao, Zhen-fang Zhu:
Email Representation using Noncharacteristic Information and its Application. 180-185 - Jae Kwon Bae:
Forecasting Decisions on Dividend Policy of South Korea Companies Listed in the Korea Exchange Market Based on Support Vector Machines. 186-194 - Zhongzhi Li, Xuegang Wang:
Multiple Target Tracking Using Reverse Prediction Weighted Neighbor Data Association. 195-199 - Changsheng Wan, Aiqun Hu, Juan Zhang:
A Novel Authentication Protocol for Wireless Access Security. 200-207 - Kerui Chen, Jinchao Zhao, Wanli Zuo, Fengling He, Yongheng Chen:
Heterogeneous Deep Web Data Extraction Using Ontology Evolution. 208-215 - Yongheng Chen, Wanli Zuo, Fengling He, Kerui Chen:
Optimization Strategy of Parallel Query Processing Based on Multi-core Architecture. 216-225 - Yitian Xu, Haozhi Zhang, Laisheng Wang:
Rough Margin-Based Linear v Support Vector Machine. 226-232 - Xueying Tian:
Influence of Philanthropy Donation on Competitive Advantage: From the Perspective of Corporate Social Capital. 233-240 - Wei Min:
Construction of Marketing Management Information System of Travel Agency Based on Customer Relationship Management. 241-251 - Nitul Dutta, Iti Saha Misra, Abhishek Majumder:
Mathematical Analysis of Signaling Overhead in MIPv6 Based N-Layer Architecture. 252-261
Volume 5, Number 9, November 2010
- Massimo Orazio Spata, Salvatore Rinaudo:
Merging Nash Equilibrium Solution with Genetic Algorithm : The Game Genetic Algorithm. 9-15 - Yang Zhao, Mingjing Guo, Kaisa Varis:
The Information Resources Allocation Mechanisms in The National Innovation System of Finland. 16-26 - Ying Huang, Lu Lu:
A Methodology for Test Suit Reduction in User-session-based Testing. 27-44 - LiYue Zhu, Zilei Wang, Hongsheng Xi:
Markov Decision Process Model for Path Selection Algorithm on Multi-Business System with Services Composition. 45-53 - Jianhua Dai, Huaijian Zhang, Xiaochun Liu, Shaomin Zhang, Weidong Chen, Xiaoxiang Zheng:
A Novel Matched Filter for Neural Action Potential Detection. 54-60 - Jui-Hung Chen, Han-Bin Chang, Chun-Yi Shen, Te-Wua Wang, Wen-Chih Chang, Timothy K. Shih:
Immersive Learning Environment with Integrated Interactive Video and Ubiquitous Technologies. 61-72 - Xue Deng, Junfeng Zhao, Lihong Yang, Rongjun Li:
Constraint Method for Possibilistic Mean-variance Portfolio with Transaction Costs and Lending. 73-84 - Jian-ming Cui:
Traffic Prediction Based on Improved Neural Network. 85-89 - Xu Xiang:
A Flexible Resource Location Protocol for Peer-to-Peer Network. 90-96 - Hongwei Dai, Yu Yang, Cunhua Li:
Immune Network Theory Based Artificial Immune System and Its Application for Pattern Recognition. 97-108 - Qian Zhu, Xian-Yi Cheng:
The Semantic Tagging Model of Chinese Question Chunk Based on Description Logic. 109-117 - Fengxia Wang, Huixia Jin, Xiao Chang:
Relevance Vector Ranking for Information Retrieval. 118-125 - Jui-Hung Chen, David Tawei Ku, Te-Hua Wang, Wen-Chih Chang, Timothy K. Shih:
Using Adventure Game to Facilitate Learning Assessment Process. 126-134 - Yu-Cheng Chen, Hsin-Hsi Lai, Heng-Chang Lin:
Constructing Product Knowledge-Sharing System for Internet Transaction-Matching Model. 135-145 - Minjuan Zhong, Changxuan Wan:
Pseudo-Relevance Feedback Driven for XML Query Expansion. 146-156 - Wenyuan Liu, En-shuang Wang, Zijun Chen, Lin Wang:
An Improved DV-Hop Localization Algorithm based on The Selection of Beacon Nodes. 157-164 - Xudong Song, Dejun Zhu, Zhanzhi Qiu:
Study on Enterprises Group Order Allocation Multi-objective Model. 165-174 - Chunchen Liu, Dayou Liu, Sheng-Sheng Wang:
Dealing with Uncertainty in Situation-aware Computing System. 175-189 - Joseph K. Siror, Guanqun Liang, Kaifang Pang, Huanye Sheng, Dong Wang:
Impact of RFID Technology on Tracking of Export Goods in Kenya. 190-199 - Chengbo Xu, Junping Wang, Jun Huang:
Petersen-Twisted-Torus Networks for Multiprocessor Systems. 200-205 - Reihaneh Khorsand Motlagh Esfahani, Farhad Mardukhi, Naser Nematbakhsh:
Reputation Improved Web Services Discovery Based on QoS. 206-214 - Hong-qi Li, Xu He, Xiaolong Xie, Li Li, Jinyu Zhou, Xiongyan Li:
A New Boundary Condition for Particle Swarm Optimization. 215-221 - Gang Lv, Heming Zhao:
Tracking Formant Trajectory of Continuous Chinese Whispered Speech with Hidden Dynamic Model Based on Dynamic Target Orientation. 222-230 - Zhao-xiong He, Xing Liu, Peng-cheng Luo, Jing-lun Zhou:
Tactical Data Link Channel-PHY Modeling and Simulation in Network Simulator 2. 231-237 - Ying Zhang, Zhong Shen, Yilin Chang, Zhongjiang Yan, Liang Dai:
A Signal Aware Movement Control Algorithm for GPS-free Ad Hoc Networks. 238-245 - Chenming Li, Lizhong Xu, Chunxia Yu, Xiaodong Wei:
Measuring Concept Similarity of Heterogeneous Ontologies in Multi-angent System. 246-256 - Yi Wang, Huosong Xia, Jian Liu:
Commercial Credit Difference Evaluation and Prediction Model: Based on Neural Network. 257-266 - Zhixia Yang, Yingjie Tian:
Second Order Cone Programming Formulations for Handling Data with Perturbation. 267-278 - Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Secure Multimedia Distribution Based on Watermarking and Encryption. 279-286 - Shui Wang, Le Wang:
An Implementation of FP-Growth Algorithm Based on High Level Data Structures of Weka-JUNG Framework. 287-294
Volume 5, Number 10, December 2010
- Jianping Ge, Yalin Lei:
Assessing Welfare and Growth Effects of Grain-based Fuel Ethanol Development in China: a General Equilibrium Framework. 1-8 - Jiao-Li Lu, Jia-Heng Zheng, Hong-Ye Tan, Jian Sun:
Chinese Chunking and Consistency Checking Using Rule-Based Method. 9-14 - Li Fan, Yudong Zhang, Zhenyu Zhou, David P. Semanek, Shuihua Wang, Lenan Wu:
An Improved Image Fusion Algorithm Based on Wavelet Decomposition. 15-21 - Huafeng Wu, Chaojian Shi, Seiya Miyazaki:
Spirit: Security and Privacy in Real-Time Monitoring System. 22-28 - Anirban Kundu, Chandan Banerjee:
Multi-layered Service Suite Conceptualization in Cloud Computing. 29-38 - Xian-Yi Cheng, Dan-Qian Lu, Qian Zhu, Jin Wang:
The Overview of Text Representative Model. 39-47 - Xian-Yi Cheng, Ling-ling Zhu, Qian Zhu, Jin Wang:
The Framework of Network Public Opinion Monitoring and Analyzing System Based on Semantic Content Identification. 48-55 - Hongwei Dai, Yu Yang, Cunhua Li:
Distance Maintaining Compact Quantum Crossover Based Clonal Selection Algorithm. 56-65 - Lin Feng, Le Wang, Bo Jin:
Research on Maximal Frequent Pattern Outlier Factor for Online High-Dimensional Time-Series Outlier Detection. 66-71 - Chong Wang, Li Zhao:
Intermediate View Synthesis Based on Adaptive BP Algorithm and View Interpolation. 72-81 - Zhanmao Cao, Limin Peng:
Destination-oriented Routing and Maximum Capacity Scheduling Algorithms in Cayley Graph Model for Wireless Mesh Network. 82-90 - Jie Huang, Bei Huang, Qiucen Huang:
An Improved Dynamic Load Balancing Algorithm for a Distributed System in LAN. 91-98 - Heng-Chang Lin, Yu-Cheng Chen, Hsin-Hsi Lai:
Integrating Product Information Management (PIM) with Internet-Mediated Transactions (IMTs). 99-108 - Fengxia Wang, Xiao Chang:
Cost-Sensitive Support Vector Ranking for Information Retrieval. 109-116 - Xiao Chen, Feifei Lu:
An Improved Rate Control Scheme for H, 264 Based on Frame Complexity Estimation. 117-123 - Jun Tang:
Improved K-means Clustering Algorithm Based on User Tag. 124-130 - Tinghuai Ma, Jian Ge, Wei Tian, Yali Wang, Erasmus Sowah:
Virtual Resource Management Based Meteorological Computational Grid . 131-140 - Lifang Liu, Licheng Jiao:
Moitf GibbsGA: Sampling Transcription Factor Binding Sites Coupled with PSFM Optimization by Genetic Algorithm. 141-148 - Rui Yang, Xiaoju Ning:
Model Checking Cryptographic Protocols with Interval Temporal Logic. 149-158 - Cunli Song, Xiaobing Liu, Wei Wang, Ming Huang:
Dynamic Integrated Algorithm for Production Scheduling Based on Iterative Search. 159-166 - Jinyu Li, Qing Yang, Maotian Luan:
Limit Equilibrium Analysis of the Influence of Matric Suction on Unsaturated Soil Slope Stability. 167-175 - Jianli Wei:
A Risk Evaluation Method for the High-Technology Project Investment Based on ET-WA Operator with 2-Tuple Linguistic Information. 176-180 - Jianli Wei:
TOPSIS Method for Multiple Attribute Decision Making with Incomplete Weight Information in Linguistic Setting. 181-187 - Juchi Hou:
A Model for Software Selection with Fuzzy Linguistic Information. 188-193 - Juchi Hou:
Grey Relational Analysis Method for Multiple Attribute Decision Making in Intuitionistic Fuzzy Setting. 194-199 - Yuanhong Zhong, Jun Gu, Shanshan Wang, Shu Han:
A Cascaded Wireless System of SCCP and FMT with Cyclic Delay Diversity. 200-206 - Zhenlin Wei:
Novel MicroRNAs and Targets Prediction in PRRS Virus Genome. 207-215 - Yiming Li, Yi Li, Mingtian Zhou:
Area Optimization in Floorplanning Using AP-TCG. 216-222 - Qi Yang, Jianghong Shi, Biyu Tang:
Convergence Analysis of Decentralized Slot Synchronization Algorithm for Wireless Ad Hoc Networks. 223-232 - Xiaojiang Liu, Nenghai Yu:
People Summarization by Combining Named Entity Recognition and Relation Extraction. 233-241
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.