Open Access
Subscription or Fee Access
Full Issue
View or download the full issue | FULL PDF |
Table of Contents
Articles
A New Approach to Component-Based Development of Software Architecture | |
Sabah Al-Fedaghi, Ahmed Abdullah | 1-10 |
Implementation and Comparison of EKF and UKF Based Tracking Loop at Low Carrier-to-Noise Ratio Conditions | |
Yawen Fan, Jianjun Yin | 11-16 |
Improvement Wood Computerized Tomography Images with Ultrasonic Wave Parallel Translation | |
Honghui Fan, Hongjin Zhu, Guangping Zhu, Yao Wang | 17-20 |
Enhancing Hazy Images with the Aid of Particle Swarm Optimization (PSO) and Morphological Operation | |
K. Ratna Babu, K. V. N. Sunitha | 21-28 |
Applications of the Ferguson-Like Curve and Coons-Like Patches | |
Juncheng Li | 29-34 |
3D/4D Face Recognition: a Comprehensive Survey | |
Jing Luo, Jianyun Ni, Zhaoxia Xiao, Haihua Zhang | 35-42 |
A Novel Community-Based Approach for Influence Maximization in Social Network | |
Jiaguo Lv, Jingfeng Guo, Huixiao Ren | 43-49 |
Finite-Time Stabilizing Control of Linear Systems Over Networks | |
Yanling Shang | 50-54 |
Research on Image Processing-Based Accurate Measurement of Optical Microscopic Image | |
Peilong Xu | 55-58 |
Images Analysis of Exact Bubble Contour in Gas/Liquid Two Phase Flow | |
Hao Zhang, Qian Yang | 59-63 |
A Taxonomy of Load Balancing Techniques in Cloud Computing | |
Mohammed Abdurabu Alsaih, Rohaya Latip, Azizol Abdullah, Shamala K. Subramaniam | 64-76 |
Local Similarities Approximation in DNA Sequences Based on Pairwise Sequence Aligner Algorithm | |
N. Al-Shanableh, H. Al-Zoubi, M. Al Rababaa | 77-82 |
Formalization in Software Reengineering | |
Qian Zhongsheng, Yang Yong, Chen Zhongyu | 83-87 |
A Data Mining Model for Broadcasting and Television DSS | |
Fulian Yin, Xi Jiang, Yao Qin | 88-93 |
Web Personalized Search System Based on Improved Link Structure Analysis and Unidirectional FP-Tree for Mining Frequent Item Sets Algorithms | |
Guimei Bai, Mingzhao Li | 94-99 |
Mobility in Ad Hoc-Based Network with Active High Traffic | |
Rizik M. H. Al-Sayyed | 100-107 |
Dynamic Cloud Resource Reservation Based on Trust Attributes | |
Tian Jun-Feng, Dong Na | 108-114 |
A Study on the Effect of Different Velocities on the Handover Delay in WiMAX Systems | |
Elmabruk S. Elgembari, Kamaruzzaman B. Seman | 115-119 |
The Technical Report of Secured Document Transmitting on Cloud Platform Through Web2App/PaaS Operation | |
Chun-Ta Lin, Cheng-I Hou | 120-123 |
Basic-Block Based Instruction Prefetching for Real-Time Applications | |
Fan Ni, Xiang Long, Han Wan, Xiaopeng Gao | 124-131 |
A Cryptographic Processor for 32 bit Embedded System with Resource-Constraints | |
N. Benhadjyoussef, W. Elhadjyoussef, M. Machhout, K. Torki, R. Tourki | 132-143 |
Deriving Objective Navigational Measures for Web Usability | |
Hazwani Rahmat, Hazura Zulzalil | 144-151 |
Research of Semantic Information Retrieval Based on Conceptual Analysis of User Queries | |
Yangxin Yu, Yizhou Zhang | 152-156 |
The Application Research of IPv6 Technology in the Security Architecture of the Internet of Things | |
Guofang Kuang, Huanlong Zhang | 157-162 |
The Novel Model of Domain Ontology Matching and Merging in Semantic Web Service Based on Fuzzy Concept Lattice | |
Ruiling Zhang, Hongsheng Xu | 163-169 |
Using Multi-Vector DBSCAN Algorithm to Cluster the Distribution of Urban Water Point | |
Jianzhuo Yan, Mengyao Qi, Liying Fang, Ying Wang, Jianyun Yu | 170-173 |
A New Computer Architecture Supporting Object-Oriented Programming | |
Junyi Li, Jingyu Chen, Anthony S. Fong | 174-179 |
Specific Erotic Image Detection Method Based on SVM | |
Li Yonggang, Yin Haiming | 180-185 |
A Hash Function-Based RFID Authentication Protocol | |
Minghui Wang, Junhua Pan | 186-190 |
Network Trustworthy Assessment Based on Advanced DyTrust Model | |
Minsheng Tan, Qiong Chen, Huan Zhou, Weixing Xie | 191-196 |
A New User Authentication Scheme for Hierarchical Wireless Sensor Networks | |
Shuaiwen Xu, Xiaoming Wang | 197-203 |
A Face Recognition Method Based on Complex Network, Canny Algorithm and Image Contours | |
Tang Xiao, Wang Yin-He, Wang Qin-Ruo | 204-210 |
SaaS Intelligent Customization Model Based on Tenancy History | |
Xiaojun Ren, Yongqing Zheng, Lanju Kong | 211-217 |
A Conceptual Framework of Service Invocation in the Novel DSS: the Example in Situation Assessment | |
Yang Jie, Zhou Xianzhong, Wang Baoxiang, Mao Ke | 218-224 |
IP Network Performance Measuring Based on I/O Correlation Model | |
Yang Zong-Chang, Kuang Hong | 225-229 |
Modified Fast Codebook Model | |
Qian Zhao, Cheng Zhao, Yuan-Bin Hou, Xin-Rong Mao | 230-234 |
A VLSI Based Framework for Iterative and Adaptive Based Image Filter for Impulse Noise Removal | |
P. G. Kuppusamy, R. Rani Hemamalini | 235-242 |
FPGA Based Real Time Wavelet Video Coding | |
Wajdi Elhamzi, Taoufik Saidani, Yahia Said, Mohamed Atri | 243-249 |
Rapid Parallel Computation of Point Multiplication for ECDSA Over Prime Field | |
A. Sakthivel, Nedunchezhian Raju | 250-255 |
An Efficient Adaptive Segmentation Algorithm on EEG Signals to Discriminate between Subject with Epilepsy and Normal Control | |
Samaneh Kazemifar, Reza Boostani | 256-261 |
A New Pattern Recognition Method Based on Nonlinear Support Vector Machine | |
Zhi-Hang Tang, Bei-Ping Tang, Ying Han, Yi-Jie Lu, Xiang-Ling Luo, Wen-Bin Tian, Hai-Bin Wang | 262-266 |
A Kind of New Algorithm to Solve the Multi-Objective Traveling Salesman | |
Shuiqiang Liu, Jianhua Zhou, Juncheng Lei | 267-270 |
Investigation of the Performance of Modified TCM Scheme for the Protection of SPIHT-Based Compressed Images Over Fading Channel | |
Mohamed Benaissa, Abdesselam Bassou, Mohammed Beladgham, Abdelmalik Taleb-Ahmed, A. Moulay Lakhdar | 271-276 |
The P-Permutations Basing Error-Correcting Codes | |
Han Haiqing, Li Qin, Zhu Siru, Lei Gaihui | 277-281 |
Research and Application on Data Stream Management System of Expressway Real-Time Monitoring System | |
JiangFan Feng, YanHong Liu | 282-286 |
Similarity Distance Based Clustering Framework for Aggregation of Web Usage Data | |
Joan M. John, A. Shajin Nargunam | 287-295 |
The Study on Multiple Document Automatic Summarization System | |
Junqing Liang, Mingjing Jia, Xiao Li, Shuchao Guo, Weiwei Zhai | 296-301 |
Performance Analysis for Split Phase Multi-Channel Protocols | |
Junrong Yan, Xiaorong Xu | 302-306 |
Evaluating the Delays in Local Controller Networks | |
Nikolay Kakanakov | 307-312 |
Acoustic Experimental Signal Analysis Using an Adaptive Neuro-Fuzzy Inference System and Different Time-Frequency Techniques | |
Latif Rachid, Mostafa Laaboubi, Azzedine Dliou | 313-326 |
Status and Prospects of Autonomous Vehicle Positioning Method for Cooperative Vehicle Infrastructure System | |
Jiang Liu, Baigen Cai, Yunpeng Wang | 327-340 |
A Spatial Data Mining Method Based on the Concept Lattice of Compact Dependencies | |
C. Ma, X.-D. Gao, Z.-W. Zeng | 341-346 |
A New Automatic Image Registration Algorithm Based on Corner Detector for Remote Sensing Applications | |
Lila Meddeber, Tarik Zouagui, Abdelmalik Taleb-Ahmed, Nassr-Eddine Berrached | 347-362 |
Investigation and Implementation of Square Type Patch Based Algorithm on Texture Synthesis of Image Inpainting Technique for Medical Images | |
Hardik Modi, Mandar Sahasrabuddhe | 363-369 |
Controlled-Adaptable Distributed Data and File Sharing with Multiple Participants in Visual Cryptography | |
F. R. Shiny Malar, M. K. Jeya Kumar | 370-377 |
An Improved Principal Component Analysis for Palmprint Recognition | |
Shuang Xu, Min Li, Jifeng Ding | 378-383 |
Improving the Medical Diagnosis Process Using Maximal Association Rules | |
A. L. (Ion) Udristoiu, S. Udristoiu | 884-889 |
Research on the Vehicle Routing Problem with Time Windows by Cellular Ant Algorithm | |
Yuanzhi Wang | 390-395 |
A Resource Sharing Management System Based on Cloud Computing Middleware | |
Fang Wei, Xu Jiang | 396-400 |
An Adaptive Management Approach Collaborating Heterogeneous Resources in Cloud Service Environments | |
Xiaoying Wang, Rui Wang, Xiaojing Liu | 401-408 |
The Connection between Concepts in Formal Concept Analysis and Concepts in a Dual Description Logic | |
Yuxia Lei, Jingying Tian | 409-415 |
A Secure Scheme for Three-Dimension Heterogeneous Wireless Sensor Networks | |
Yuquan Zhang, Min You | 416-421 |
A Novel Exact Algorithm for Graph Coloring via Implicit Enumeration | |
Zhang Kai, Yi Jiaren, Zhu Enqiang, Shi Xiaolong, Liu Ziyan | 422-426 |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize