Open Access
Subscription or Fee Access
Full Issue
View or download the full issue | FULL PDF |
Table of Contents
Articles
Accuracy-Enhanced Power Metering Technique in Virtualized Environments | |
Xiao Peng, Liu Dongbo | 427-434 |
Utilizing an Enhanced Cellular Automata Model for Data Mining | |
Omar Y. Adwan, Ammar M. Huneiti, Abdel Latif Abu-Dalhoum | 435-443 |
Investigation of In-Network Data Mining Approach for Energy Efficient Data Centric Wireless Sensor Networks | |
Sanam Shahla Rizvi, Tae-Sun Chung | 444-447 |
Research of Two Key Techniques in Virtual Application Development | |
Duan Xinyu, He Engui | 448-453 |
The Optimized Wavelet Filters and Real-Time Implementation of Speech Codec Base on DWT on TMS320C64xx | |
Noureddine Aloui, Mourad Talbi, Adnane Cherif | 454-462 |
A Hybrid System of Hadoop and DBMS for Earthquake Precursor Application | |
Tao Luo, Wei Yuan, Pan Deng, Yunquan Zhang, Guoliang Chen | 462-467 |
Model Construction for Communication Gap of Requirements Elicitation by Stepwise Refinement | |
Noraini Che Pa, Abdullah Mohd Zin | 468-473 |
Towards a Reference Ontology for Higher Education Knowledge Domain | |
Leila Zemmouchi-Ghomari, Abdessamed Réda Ghomari | 474-488 |
A Fuzzy Logic Based Method for Selecting Information to Materialize in Hybrid Information Integration System | |
Hadi Wadii, Zellou Ahmed, Bouchaib Bounabat | 489-499 |
A New Approach for Code Generation from UML State Machine | |
My Hafid Aabidi, Abdeslam Jakimi, El Hassan El Kinani, Mohammed Elkoutbi | 500-506 |
An Energy Efficient Deployment Scheme for Ocean Sensor Networks | |
Bin Zeng, Lu Yao, Rui Wang | 507-513 |
A Fast Exact String Matching Algorithm Based on Nested Classification | |
Yuwan Gu, Lei Li, Guodong Shi, Yingli Zhang, Yuqiang Sun | 514-518 |
A New Solution to Defend Against Cooperative Black Hole Attack in Optimized Link State Routing Protocol | |
Hicham Zougagh, Ahmed Toumanari, Rachid Latif, Noureddine Idboufker | 519-526 |
Study of Network Access Control System Featuring Collaboratively Interacting Network Security Components | |
Li He-Hua, Wu Chun-Ling | 527-532 |
An Ontology Based Meta-Search Engine for Effective Web Page Retrieval | |
P. Vijaya, G. Raju, Santosh Kumar Ray | 533-541 |
MMSD: a Metadata-Aware Multi-Tiered Source Deduplication Cloud Backup System in the Personal Computing Environment | |
Haiyan Meng, Jing Li, Weiqing Liu, Changchun Zhang | 542-550 |
Bandwidth and Delay Aware Routing Protocol for Real Time Traffic in Mobile Adhoc Networks | |
P. Sivakumar, K. Duraiswamy | 551-559 |
A Survey and Evaluation of Fault Tolerant Techniques of Virtual Machine in Cloud Computing Environment | |
GuiPing Wang, ShuYu Chen, Zhen Zhou, MingWei Lin | 560-568 |
A Precise Facial Paralysis Degree Evaluation with Severity Classification Using Image Processing and Neural Network | |
K. Anguraj, S. Padma | 569-576 |
An Effective Tamil Speech Word Recognition Technique with Aid of MFCC and HMM (Hidden Markov Model) | |
S. Rojathai, M. Venkatesulu | 577-586 |
Lung CT Image Segmentation Based on Combined Multi-Scales Watershed Method and Region Growing Method | |
Zhao Juanjuan, Yang Jianfeng, Qiang Yan, Wang Quan | 587-592 |
Ant Colony Optimization Based Cache Discovery Algorithm for Mobile Ad Hoc Networks | |
S. Umamaheswari, G. Radhamani | 593-598 |
An Efficient Provably Secure Certificateless Signcryption without Random Oracles | |
Hua Sun | 599-604 |
A Reliability Framework of Component Based Software System Using Kal-Chan Path Selection Algorithm | |
S. Kaliraj, N. Chandru, Amitabh Wahi | 605-612 |
Retinal Vessel Segmentation Using Multi-Scale Line Detection | |
Xiangjun Gao | 613-619 |
A Swarm Intelligence Based Channelization Code Manipulation in WCDMA Networks for Avoiding Code Blocking | |
P. Kavipriya, C. Gomathy | 620-626 |
A Hierarchical QoS Routing Algorithm Based on VMN for MANET | |
Guofeng Yan, Yuxing Peng, Bin Huang | 627-631 |
An Efficient Speaker Recognition System for Separating the Single Channel Speech Using Frequency Modulation | |
G. Logeshwari, G. S. Anandha Mala | 632-641 |
Cross-Layer Based Routing and Rate Control Using Fuzzy Decision Systems in MANET | |
S. Narayanan, Rani Thottungal | 642-652 |
Optimization of MLP Using Genetic Algorithms Applied to Arabic Speech Recognition | |
M. Ben Nasr, S. Saoud, A. Cherif | 653-659 |
Dynamic Data Allocation in Distributed Database Systems: a Systematic Survey | |
Raju Kumar, Neena Gupta | 660-667 |
Total Variation-Based Image Restoration Using I-Divergence | |
Wu Qiufeng, Wang Kuanquan, Zuo Wangmeng | 668-672 |
Acoustic Study on Perception of Vowels in Standard Chinese by Uyghur Students | |
Yi Yang, Huaying Chen | 673-679 |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize