default search action
Computer and Information Science, Volume 2
Volume 2, Number 1, February 2009
- Masoud Yaghini, Atieh Bourouni, Roozbeh Hesam Amiri:
A Framework for Selection of Information Systems Development Methodologies. 3-11 - Desheng Xu, Kejian Xia, Dezheng Zhang, Huangsheng Zhang:
Model Checking the Inconsistency and Circularity in Rule-Based Expert Systems. 12-17 - Azleen Ilias, Mohd Zulkeflee Abd Razak, Rahida Abdul Rahman, Mohd Rushdan Yasoa':
End-User Computing Satisfaction (EUCS) in Computerised Accounting System (CAS): Which the Critical Factors? A Case in Malaysia. 18-24 - Feng Ding, Yanzhang Wang, Xin Ye:
Layer Model and Algorithm of Organization Authorization Based on Position Network. 25-34 - K. Premalatha, A. M. Natarajan:
Chi-Square Test for Anomaly Detection in XML Documents Using Negative Association Rules. 35-42 - Hualun Lai, Liangwei Zhong, Jing Ni:
Research of Sales Contract Management System Based on WEB. 43-47 - Kuldeep Sharma, Deepak Garg:
Complexity Analysis in Heterogeneous System. 48-52 - Peng Liu, Jing Xu, Jiafeng Liu, Xianglong Tang:
Pixel Based Temporal Analysis Using Chromatic Property for Removing Rain from Videos. 53-60 - Idawaty Ahmad, Muhammad Fauzan Othman:
Fault Recovery Mechanisms in Utility Accrual Real Time Scheduling Algorithm. 61-68 - Wei Zhang, Qin Huang, Zhenkun Wang:
The Fusion of Remote Sensing Images Based on Lifting Wavelet Transformation. 69-75 - Yusliza Mohd. Yusoff, Zikri Muhammad, Mohd Salehuddin Mohd Zahari, Ermy Syaifuddin Pasah, Emmaliana Robert:
Individual Differences, Perceived Ease of Use, and Perceived Usefulness in the E-Library Usage. 76-83 - Mengxin Zhang, Zhihan Lv, Xiaolei Zhang, Ge Chen, Ke Zhang:
Research and Application of the 3D Virtual Community Based on WEBVR and RIA. 84-89 - Abu Bakar Md Sultan, Abdul Azim Abdul Ghani, Lim Su Fang:
Framework for Conference Management System. 90-94 - Guoliang Zhong, Liangzhong Jiang:
Design of the Closed Loop Speed Control System for DC Motor. 95-102 - Gang Yang, Weiwei Zhang, Ying Huang, Yongquan Yu:
Simulation Research of Extension Control Based on Crane-Double Pendulum System. 103-107 - Tianbao Zhuang, Hong Zhao, Zheng Tang:
An Analysis of Improving Memory Performance Based on EEG Alpha and Theta Oscillations. 108-114 - Xinhua Xu:
A Study On Query Optimization for Federated Database Systems. 115-120 - Yuqing Geng, Chunsheng Zhang:
Study on the Optimization Method of Select Query Sentence in Standard SQL Language. 121-125 - GuoJun Liu, Xianglong Tang:
Tracking High Speed Skater by Using Multiple Model. 126-131 - Ramesh Rao:
Digital Divide: Issues Facing Adult Learners. 132-136 - Kehe Wu, Xia He, Tingshun Li, Hongyu Tao:
To Construct Search Engine Analyzer for Electrical Enterprises Based on Lucene. 137-141 - Saidatul Rahah Hamidi, Jusoff Hj. Kamaruzaman:
The Characteristic and Success Factors of an Organizational Memory Information System. 142-151 - Min Zhao, Jiyin Sun, Xiaochun Che:
The Research of the Model of Communication System Depending on the Queuing Theory. 152-155 - Xuesong Yu, Jiafeng Liu:
Estimate 3D Arm Motion with Hierarchical Limb Model. 156-163 - Wei Wang, Wenju Liu:
Study on the Software Development Based on AOP Technology. 164-167 - Farok Azmat, Md Ikhwan Hamdan, Jusoff Hj. Kamaruzaman:
Analysis of BitTorrent on an Open Source VPN Technology to End User. 168-183 - Changhao Shuai, Yong Li:
Generating a Simple Fractal Graphics in Computer. 184-187 - Xingzi Liu, Liang Lin, Dongran Zang:
Stochastic Programming Models and Hybrid Intelligent Algorithm for Unbalanced Bidding Problem. 188-194 - Weihua Gai, Dakun Zhang:
People Portraits and Cartoon Algorithm Study. 195-199 - Norisma Idris, Sapiyan Baba, Rukaini Abdullah:
A Summary Sentence Decomposition Algorithm for Summarizing Strategies Identification. 200-210 - Xin Chen, Weizhi Huang:
The Design of Intelligent Home Alarming System Based on Wireless Sensor Network Technology. 211-215
Volume 2, Number 2, May 2009
- Nafishah Othman, Shafiz Affendi Mohd. Yusof, Wan Rozaini Sheik Osman:
A Conflict between Professional vs. Domestic Life? Understanding the Use of ICT in Teleworking for Balance in Work and Family Units. 3-15 - Weidong Sun, Wei Zhang:
Application of the Remote Sensing Technology in the Line Arrangement of Shallow Artificial Seismic Exploration. 16-18 - Roesnita Ismail, Kamaruzaman Jusoff, T. Ahmad, S. Ahmad, R. S. Ahmad:
Fuzzy State Space Model of Multivariable Control Systems. 19-25 - Yijian Liu, Yanjun Fang:
Design of the Nonlinear System Predictor Driven by the Bayesian-Gaussian Neural Network of Sliding Window Data. 26-33 - Siew Hock Ow:
User Evaluation of an Electronic Malaysian Sign Language Dictionary: e-Sign Dictionary. 34-52 - Guohua Zhang, Jieyu Chen:
Research and Establishment of the Integrated Project of Barcode Acquisition Technology and ERP System in the Regenerated Textile Chemical Fiber Industry. 53-56 - Mohamad Noorman Masrek, Jusoff Hj. Kamaruzaman:
The Effect of Information Technology Infrastructure Flexibility on Intranet Effectiveness. 57-67 - Chungen Xu, Sheng Gong:
Formal Description for an Object-Oriented Role-based Access Control Model. 68-72 - Xiaoning Peng, Bin Huang, Ping Luo:
SDS: A Scalable Data Services System in Data Grid. 73-79 - Tianbao Zhuang, Hong Zhao, Zheng Tang:
A Study of Brainwave Entrainment Based on EEG Brain Dynamics. 80-86 - Qin Ming Liu, Wenyuan Lv:
The Study of Fault Diagnosis Based on Particle Swarm Optimization Algorithm. 87-91 - Ruixian Li:
Study on the Virtual Simulation of Flight Environment Based on OpenGL. 92-97 - Hebiao Yang, Yukun Chen, Rengang Hou:
A Novel Data Mining Platform Design with Dynamic Algorithm Base. 98-102 - Jingrong Yang, Chunyu Zhao:
Study on the Data Mining Algorithm Based on Positive and Negative Association Rules. 103-106 - Limin Cai:
Temperature Measurement and Control System Based on Embedded WEB. 107-111 - Huawang Qin, Yuewei Dai, Zhiquan Wang:
A Model of Intrusion Tolerant System Based on Game Theory. 112-117 - Guilin Lu:
Design and Applications of the Circuit of Keyboard Display in Detecting Axle's Temperature System. 118-125 - Jie Cong:
Design of Electric Bicycle Controller. 126-130 - Chunhua Ju:
CRMS: An Algorithm of Classification Rule Mining Based on Multiple Supports. 131-136 - Yan Li, Lianhe Yang:
Based on Delaunay Triangulation DEM of Terrain Model. 137-140 - Chun Jin, Fan Yang, Baohong Wan, Xiaojun Zhou:
The Design of Digital Television Multimedia Message Service System. 141-144
Volume 2, Number 3, August 2009
- K. Venkatachalam, P. Balasubramanie:
A Hybrid Resource Allocation Strategy with Queuing in Wireless Mobile Communication Networks. 3-14 - Jianhao Tan, Jing Zhang, Fu Guo:
Machine Learning Emulation in Nature-inspired Computation Systems. 15-23 - Mahmod Othman, Shaiful Annuar Khalid, Mohammad Ismail, Norshimah Abdul Rahman, Mohamad Fadhili Yahaya:
Fuzzy Evaluation of Weapons System. 24-31 - Bin Yan:
Formulas of Retrieval Rate in Database Based on Normalization Design. 32-39 - Mohamad Noorman Masrek, Jusoff Hj. Kamaruzaman, Nor Shahriza Abdul Karim, Ramlah Hussein:
Effectiveness of Corporate Intranet in Selected Malaysian Companies. 40-45 - Chongjun Fan, Honglin Xiong, Haiying Zhang, Wujun Liu, Liqiang Wang, Xiaohui Song:
Analysis of Network Security and Risks Prevention Strategies of Hongqiao Airport West Terminal. 46-52 - Aznoora Osman, Hanif Baharin, Mohammad Hafiz Ismail, Jusoff Hj. Kamaruzaman:
Paper Prototyping as a Rapid Participatory Design Technique. 53-57 - Juan Huang, Yaoping Fei:
The Design and Implementation of the Distributed Computing Platform for Bioinformatics. 58-63 - Sharifah Lailee Syed-Abdullah, Omar Mazni, Mohd Nasir Abdul Hamid, Che Latifah bt Ismail, Jusoff Hj. Kamaruzaman:
Positive Affects Inducer on Software Quality. 64-70 - Jingzhong Wang, Lu Zhang:
Text Emotion Computing under Cognition Vision. 71-74 - Xu Yang, Hiroyuki Kumehara, Wei Zhang:
Back Propagation Wavelet Neural Network Based Prediction of Drill Wear from Thrust Force. 75-86 - Zhongjun Xiao, Mengxiao Wang:
Study on the NN Decoupling Control System of Air-cushioned Headbox. 87-93 - Ruicheng Li:
Security and Management of Local Computer Data. 94-96 - Farok Azmat, Md Ikhwan Hamdan, Jusoff Hj. Kamaruzaman:
Leveraging an Open Source VPN Technology to End User. 97-102 - Hongzhuo Zhang:
Study on the TOPN Abnormal Detection Based on the NetFlow Data Set. 103-108 - Ping Xiao:
Study on the Design Principles of Data Disaster Recovery System for Hospitals. 109-112 - Ku Ruhana Ku-Mahamud, Jia Yun Khor:
Pattern Extraction and Rule Generation of Forest Fire using Sliding Window Technique. 113-121 - Chengjun Tian, Zhiyong An, Lijuan Li, Chengyu Yang, Jie Duan, Kang Wang:
Study on the Fault Diagnosis Technique of Aerial Camera Exposure Board Based on Petri Net. 122-126 - Khaled Ahmad Aali, Masoud Parsinejad, Bizhan Rahmani:
Estimation of Saturation Percentage of Soil Using Multiple Regression, ANN, and ANFIS Techniques. 127-136 - Mengxin Li, Chengdong Wu, Hui Lin:
An Optimised Method-Based an Improved Neural Network Classifier. 137-142 - Li Fu:
Relative Truth Degree of Logic Formulas and Graded Fuzzy Logic. 143-148 - Guilin Lu, Shaohong Wan, Kaiqing Xu:
Study on the UWB Rader Synchronization Technology. 149-153 - Zheng Li:
A Species-Coexistence Model Defending against Credit Cheating in E-Commerce. 154-160 - Peng Li, Yulian Shang, Jifeng Wang, Yufei Zhang:
Study on the Multiple-Key-Pair Generation Scheme Based on Grey Half-generation. 161-165 - Nafaizatulnaniah Hashim, Abu Bakar Md Sultan:
Knowledge Management and Usability Model for Knowledge Management System. 166-175 - Xianjun Wang, Wencheng Guo:
The Design of RS232 and CAN Protocol Converter Based on PIC MCU. 176-181 - Zaki Ahmad Dahlan, Nor Arzami Othman, Mohd Fazril Izhar Mohd Idris, Jusoff Hj. Kamaruzaman:
Development of Individual Learners: Perspective on the Uncertain Future Contribution of E-Learning. 182-189
Volume 2, Number 4, 2009
- Larry King, Natarajan Meghanathan:
A Weighted-Density Connected Dominating Set Data Gathering Algorithm for Wireless Sensor Networks. 3-13 - Ziming Zeng:
An Agent-based Online Shopping System in E-commerce. 14-19 - Shivendra Gajraj Tewari:
CalOra: A software to simulate calcium diffusion. 20-30 - Lang Su, Zheng Gao:
Radial Projection Fourier Transform and its Application for Scene Matching with Rotation Invariance. 31-46 - Marzanah A. Jabar, Fatimah Sidi, Mohd Hasan Selamat, Abdul Azim Abdul Ghani, Hamidah Ibrahim:
An Investigation into Methods and Concepts of Qualitative Research in Information System Research. 47-54 - Jun Lang, Bing Qin, Ting Liu, Sheng Li:
Unsupervised Coreference Resolution with HyperGraph Partitioning. 55-63 - Plaban Kumar Bhowmick:
Reader Perspective Emotion Analysis in Text through Ensemble based Multi-Label Classification Framework. 64-74 - Zhicheng Dong, Wei Xiao, Xiping Zhang:
Artificial Fish Swarm Algorithm-Assisted and Receive-Diversity Aided Multi-user Detection for MC-CDMA Systems. 75-80 - Farhah Abdullah, Jusoff Hj. Kamaruzaman, Hasiah Mohamed, Roszainora Setia:
Strict versus Negligence Software Product Liability. 81-88 - Xuxing Ding, Fangfang Xie, Qing Wu:
Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network. 89-93 - Rossey Ginsawat, Rusli Abdullah, Mohd Zali Mohd Nor:
Applying Knowledge Management System Architecture in Software Maintenance Environment. 94-99 - Xun-Yi Ren, Ruchuan Wang, Hejun Zhou:
Intrusion Detection Method Using Protocol Classification and Rough. 100-108 - Fatimah Sidi, Marzanah A. Jabar, Mohd Hasan Selamat, Abdul Azim Abdul Ghani, Md Nasir Sulaiman:
Framework for Interrogative Knowledge Identification. 109-115 - Fengjuan Yang:
Analysis and Design of ETL in Hospital Performance Appraisal System. 116-121 - Siti Rafidah Muhamat Dawam, Khairul Adilah Ahmad, Jusoff Hj. Kamaruzaman, Taniza Tajuddian, Shamsul Jamel Elias, Suhardi Wan Mansor:
The Use of ICT in Public and Private Institutions of Higher Learning, Malaysia. 122-128 - Shan Gai, Peng Liu, Jiafeng Liu, Xianglong Tang:
A NN Image Classification Method Driven by the Mixed Fitness Function. 129-136 - Khairul Anwar Sedek, Norlis Osman, Mohd Nizam Osman, Jusoff Hj. Kamaruzaman:
Developing a Secure Web Application Using OWASP Guidelines. 137-143 - Yuan Cui:
DOA Estimation for Coherent Sources in Transformed Space. 144-147 - Juan Xu:
Construction of Information Disaster Recovery for Hospitals. 148-152 - Jihong Song, Shaopeng Wang:
The Pastry Algorithm Based on DHT. 153-157 - Yang Liu, Junle Yu:
Research of Education Evaluation Information Mining Technology Based on Gray Clustering Analysis and Fuzzy Evaluation Method. 158-164 - Ruicheng Li:
The Application of the Real-time Temperature Monitoring System for Electric Transmission Lines. 165-168 - Junying Gan, Sibin He:
Two-Dimensional Heteroscedastic Discriminant Analysis for Facial Gender Classification. 169-174 - Xingman Li, Chunqing Li, Zhiyong Wang:
Grid-based Data Quality and Data Integration Research. 175-178
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.