


default search action
Journal of Convergence Information Technology, Volume 5
Volume 5, Number 1, February 2010
- Bruce Moulton, Graham Croucher, Andrew Varis, June Chen:

Method for Increasing the Energy Efficiency of Wirelessly Networked Ambulatory Health Monitoring Devices. 7-14 - Hyung Tae Kim, Sang Bong Kim, Jong Sik Go, Yang Dam Eo, Byoung-kil Lee:

Building 3D Geospatial Information Using Airborne Multi-Looking Digital Camera System. 15-22 - Saber Benharzallah, Okba Kazar:

A Scalable and Efficient Query Answering for a Context and Schema Mediation. 23-32 - Mohd Helmy Abd Wahab, Norzilawati Abdullah, Ayob Johari, Herdawatie Abdul Kadir:

GSM Based Electrical Control System for Smart Home Application. 33-39 - Nahid Amani, Pedram Hajipour, Farzaneh Seyedmostafaei:

An Appropriate Violation Detection Scenario for Service Level Agreements Based on WS-Agreement Protocol. 40-47 - SangBock Lee, Taesoo Lee:

Analysis on the Amount of Physical Activities of Taekwondo Taegeuk Pumsae Using Accelerometers. 48-53 - Li Tian, Zhou Hong:

Design and Research of Self-Adaptive Learning Diagnosis Agent. 54-59 - Mehdi Nasiri, Leyla Sadat Taghavi, Behrouz Minaee:

Multi-Objective Rule Mining Using Simulated Annealing Algorithm. 60-68 - Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Bala Srinivasan, Huamei Qi:

Novel Hybrid Group Key Agreement for Sensitive Information Systems. 69-81 - Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan:

An Individual and Group Authentication Model for Wireless Network Services. 82-94 - Prasanta Gogoi, Bhogeswar Borah, Dhruba K. Bhattacharyya:

Anomaly Detection Analysis of Intrusion Data Using Supervised & Unsupervised Approach. 95-110 - Zichang Shangguan, Shouju Li, Wei Sun, Maotian Luan:

Model Reference Control for Bulkhead Pressure of EPB Shield in Tunneling. 111-115 - Yuehua Tao, Youming Xia, Tianwei Xu, Xiaoxiao Chi:

Research Progress of the Scale Invariant Feature Transform (SIFT) Descriptors. 116-121 - Yu Chen, Dequan Zheng, Bowen Zheng, Tiejun Zhao:

Research on Automatic Pattern Acquisition Based on Construction Extension. 122-127 - Shuoben Bi, Jingtao Liang, Shenjun Xue, Lianghu Lu:

Research on Spatial Knowledge Reasoning about Jiangzhai Settlement in First Period. 128-134 - Shen Yang, Shuchen Li, Xiaoxiao Ye, Fangping He:

Content Mining and Network Analysis of Microblog Spam. 135-140
Volume 5, Number 2, April 2010
- Thair Al-Dala:

Evaluating the Utilisation of Mobile Devices in Online Payments from the Consumer Perspective. 7-16 - Chi-Yen Yin, Jiann-Min Yang:

Assessment of Home Networking Research Trends, 1981-2009. 17-27 - Rezeg Khaled, Mohamed Tayeb Laskri, Sylvie Servigne:

Geospatial Web Services Semantic Discovery Approach Using Quality. 28-35 - Alireza Dehestani, Pedram Hajipour:

Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs. 36-42 - Saeedreza Ehteram, Seyed Zeinolabedin Moussavi, Mohsen Sadeghi, Seyed m. Mahdavi, Abbas Kazemi:

Intelligent Monitoring Approach for Pipeline Defect Detection from MFL Inspection. 43-49 - Zhongbao Chen, Fuliang Bao, Zhigang Fang:

Signal Spectrum Sensing Robust to Noise Uncertainty. 50-58 - Hai Guo, Jing-ying Zhao, Ming-jun Da:

A Preprocessing Method for NaXi Pictograph Character Recognition. 59-66 - Zhengjun Cheng, Yuntao Zhang:

Classification Models of Estrogen Receptor-B Ligands Based on PSO-Adaboost-SVM. 67-83 - Yabin Li:

Research on Simulation and Optimization of Transshipment Port Operation in a Power Coal Ocean Shipping Logistics System on the Basis of WITNESS. 84-87 - Yi-Cheng Chan, Ming-Chun Liao:

Collision-Aware Backoff Mechanisms for IEEE 802, 11 WLANs. 88-100 - Omid Kashefi, Nina Mohseni, Behrouz Minaei:

Optimizing Document Similarity Detection in Persian Information Retrieval. 101-106 - Chen Hong:

A GMDH-Based Traffic Flow Forecasting Model. 107-111 - Geoffrey H. Tanakinjal, Kenneth R. Deans, Brendan J. Gray:

Innovation Characteristics, Perceived Risk, Permissibility and Trustworthiness in the Adoption of Mobile Marketing. 112-123 - Chi-Yen Yin, Johannes K. Chiang:

Bibliometric Analysis of Social Capital Research during 1956 to 2008. 124-132 - Mohammed J. Islam, Q. M. Jonathan Wu, Majid Ahmadi, Maher A. Sid-Ahmed:

Investigating the Performance of Naive- Bayes Classifiers and K- Nearest Neighbor Classifiers. 133-137 - Maha A. Al-Bayati, Karim Q. Hussein:

Evaluating the Efficiency of the Instructional Websites "Which are Oriented to the Deaf Students" According to the Technical Criteria". 138-145 - M. Sami Soliman, Guanzheng Tan:

Conditional Sensor Deployment Using Evolutionary Algorithms. 146-154 - Peishu Chen, Yijuan Zhu:

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers. 155-162 - Tzong-I Wang, Ting-Yuan Yeh:

Development of Low Cost Message Delivery Path for Mobile Agent Communication. 163-173
Volume 5, Number 3, May 2010
- Lien Fu Lai, Liang-Tsung Huang, Chao-Chin Wu, Shi-Shan Chen:

Fuzzy Knowledge Management through Knowledge Engineering and Fuzzy Logic. 7-15 - Ying Wang, Daoping Wang, Guangli Liu, Zhimin Yang:

SVC Method for Textile Weave Recognizing. 16-19 - Ying Wang, Guangli Liu, Shengli Bai, Zhimin Yang:

Attribute Extraction System for Agricultural SEM. 20-23 - Wenjie Zhao, Mingxing He:

Improvement of a Secure Convex Hull Two-Party Computation Protocol. 24-30 - Huali Cai, Li Wang, Lu Liu, Zhiming Liu:

A Temporal Relation-based Method for Extracting Occurrence Time in Chinese Web News of Emergencies. 31-37 - Yinghui Pan:

Digital Watermarking Particle Swarm Optimization Based on Multi-wavelet. 38-45 - Ding Pan:

An Integrative Framework for Continuous Knowledge Discovery. 46-53 - Ding Pan:

Metadata Version Management for DW 2, 0 Environment. 54-60 - Xudong Lin, Hanxing Liu, Piyuan Lin, Meihua Wang:

Chinese Question Classification Using Alternating and Iterative One-against-One Algorithm. 61-67 - Qian Zhu, Xian-Yi Cheng, Zi-juan Gao:

The Recognition Method of Unknown Chinese Words in Fragments Based on Mutual Information. 68-72 - Yihui Qiu, Hong Li:

Application of Feature Extraction Method in Customer Churn Prediction Based on Random Forest and Transduction. 73-78 - Hanxing Liu, Xudong Lin, Caixing Liu:

Research and Implementation of Ontological QA System Based on FAQ. 79-85 - Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao:

Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching. 86-94 - Li Yan, Yi Qin, Zheng Pei:

Linguistic Information Processing Based on Aggregation Operator over the Internet. 95-102 - Peiguang Lin, Lin Zhao:

Research on the Expression and Extraction of WDB. 103-112 - Xudong Lin, Hanxing Liu, Piyuan Lin, Meihua Wang:

Data Mining for Forecasting the Broiler Price Using Wavelet Transform. 113-121 - Chaoqun Li, Hongwei Li:

An Improved Instance Weighted Linear Regression. 122-128 - Mingfeng Zhao, Yajian Zhou, Yixian Yang, We Song, Yajun Du:

A New Method to Detect Useless Service Failure Model in SPN. 129-134
Volume 5, Number 4, June 2010
- Dong Jiang, Gang Chen:

Research on Operation Rules Modeling in Equipment Training System. 8-14 - Gang Chen:

Design and Realization of Equipment Training Simulator. 15-22 - Xun-Yi Ren, Lin Fei, Zheng Yan, Mao Bo-le:

An Efficient Lightweight Testbed for Networks Emulation. 23-28 - Xueliang Wei:

Shunt APF Based on Current Loop Repetitive Control. 29-37 - Peide Liu, Yu Su:

The Extended TOPSIS Based on Trapezoid Fuzzy Linguistic Variables. 38-53 - Weimin Ma, Ke Wang:

Optimal Online Risk-Tolerant Ordering Policy for the Newsvendor with Forecast. 54-65 - Xueying Tian:

Research on Corporate Citizenship Engaging in Social Welfare Activities. 66-74 - Xu Xiang, Jianguo Chen:

A Secure Routing Protocol for Peer-to-Peer Network. 75-83 - Bae-Ling Chen, Wen-Chung Kuo, Yu-Shuan Chu:

Weaknesses of a Secure Dynamic ID Based Remote User Authentication Scheme. 84-89 - Jinlong Wang, Ke Gao, Huy Quan Vu:

SpamCooling: A Parallel Heterogeneous Ensemble Spam Filtering System Based on Active Learning Techniques. 90-102 - Shifei Ding, Weikuan Jia, Chunyang Su, Xiaoliang Liu, Jinrong Chen:

An Improved BP Neural Network Algorithm Based on Factor Analysis. 103-108 - Zhiyong Yuan, Yuanyuan Zhang, Jianhui Zhao, Yihua Ding, Chengjiang Long, Lu Xiong, Dengyi Zhang, Guozhong Liang:

Real-time Simulation for 3D Tissue Deformation with CUDA Based GPU Computing. 109-119 - Zuowen Tan:

An Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography. 120-129 - Taiyo Maeda, Yusuke Aoki, Tadahiko Murata:

Construction of PSE System for Developing Reinforcement Learning Algorithms. 130-140 - Taiyo Maeda, Tadahiko Murata, Daichi Kotaka, Shigeru Matsumoto, Yang Cao:

Social Simulation Based on Human Behavioral Data Collected by Web-Based Experimental System. 141-151 - Hiroyuki Kanazawa, Naoki Onishi, Yuri Mizusawa, Takahiro Tsunekawa, Hitohide Usami:

Application Hosting Services for Research Community on Multiple Grid Environments. 152-163 - Jiang Xie, Guoyong Mao, Shilin Zhang, Wu Zhang:

An Integrated Computing Environment for Bio-Molecular Networks. 164-171 - Koichi Shimizu, Yuji Uehara, Yoshimasa Kadooka:

A PSE for Finite Element Method. 172-186 - Shinji Motoki, Atsushi Nakamura, Koichi Hashimoto, Kiyoshi Mizumaru:

Problem Solving Environment for Lattice QCD on Cell/B, E, . 187-194 - Kentaro Takai, Chioko Kaneta, Yuji Uehara, Yoshimasa Kadooka:

Development of Problem Solving Environment for Large Scale Electronic Structure Calculations Based on Tight Binding Method. 195-203 - Shigeo Kawata:

Review of PSE (Problem Solving Environment) Study. 204-215 - Takayuki Teramoto, Tadashi Okada, Shigeo Kawata:

An Education-Support PSE System: TSUNA-TASTE. 216-224 - Hiromichi Kobashi, Shigeo Kawata, Yasuhiko Manabe, Masami Matsumoto, Hitohide Usami, Daisuke Barada:

PSE Park: Framework for Problem Solving Environments. 225-239
Volume 5, Number 5, July 2010
- Nabendu Chaki, Bidyut Biman Sarkar:

Virtual Data Warehouse Modeling Using Petri Nets for Distributed Decision Making. 8-21 - Bao-sen Wang, Juan Li, Jian-min Sun:

The Study on the Evaluation System of Investment Value of Listed Companies on the GEM. 22-29 - Jeong-Hye Han, Dong-Ho Kim, Jong-Won Kim:

Physical Learning Activities with a Teaching Assistant Robot in Elementary School Music Class. 30-38 - Kuo-Ching Liu, Hui-Feng Huang:

A New Design of Encryption/Decryption for Field Applications. 39-43 - Debajyoti Mukhopadhyay, Sukanta Sinha:

An Algorithm for Construction of High Efficient Web Page Tree. 44-57 - Guimin Huang, Yanzhou Huang, Yan Zhang, Ya Zhou:

A Misspelling Intelligent Analysis Approach for Correcting Misspelled Words in English Text. 58-71 - Debajyoti Mukhopadhyay, Sukanta Sinha:

A Novel Approach for Domain Specific Lucky Web Search. 72-80 - Bin Zhu, Xiao-Ping Zeng, Xian-Sheng Xiong, Chen Qian, Wen-Yan Fan, Wei Geng:

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks. 81-85 - Zhimin Yang, Xiao Yang, Guangli Liu:

A Fuzzy Optimization Method for Data Mining. 86-91 - Deepak Dahiya:

Delivering a Course in Software Engineering: A Hands On Approach. 92-98 - Wei-Chih Hsu, Tsan-Ying Yu, Jan-Lie Guo:

Enhanced Block Motion Estimation Based on Threshold-Aware Two-Path Search Method. 99-110 - Qindong Sun, Qian Wang, Jie Ren:

Modeling and Analysis of the Proactive Worm in Unstructured Peer-to-Peer Network. 111-117 - Pei-Wen Wang, Yi-Jing Su, Meng-Long Shih, Shao-Ding Luo:

Analysis of Online Word-of-Mouth in Online Forums Regarding Notebook Computers. 118-124 - Zonghao Zhou, Yijuan Zhu:

Reliability Analysis of the MAP/M/c Queue with Server Breakdowns. 125-130 - Koun-Tem Sun, Chih-Hsuan Wei, Yi-Yu Hsu, Wen-Chun Liu, Ting-Tsung Chang:

On Deriving an Equation of the Mutation Rate of the Hepatitis B Virus. 131-137 - Zhenyu Wu, Hongyang Yu, Bin Tang:

A Novel Feedback Approach for Image/Video sampling Systems' Performances Improvement. 138-147 - Wann-Jyi Horng:

Dynamic Relationship of Two Exchange Rate Market Returns' Volatility with an European Dollars Factor: Empirical Study of Japan and Korea's Exchange Rate Markets. 148-155 - Li Zhang, Guoxin Zheng, Dongli Jia:

Spectrum Pooling-Based Vertical Handover for Heterogeneous Cognitive Radio Networks with QoS Constrains. 156-169 - Panida Songram:

Efficient Ming of Top-K Closed Sequences. 170-178 - Kuo-Ching Liu, Hui-Feng Huang:

Efficient Access Control in a Hierarchy for Hardware-limited Users. 179-185 - Chaohong Song, Feng Shi:

Using IB1 Algorithm to Predict of Bacterial Toxins with an Improved Feature Extraction. 186-191 - Rishin Haldar, Debajyoti Mukhopadhyay:

An Attempt to Verify Claims of University Departments by Text Mining its Web Pages. 192-202 - Hai Guo, Jing-ying Zhao, Ming-jun Da, Xiao Niu Li:

NaXi Pictographs Edge Detection Using Lifting Wavelet Transform. 203-210
Volume 5, Number 6, August 2010
- Jürgen Geiser, Robert Röhle:

Kinetic Processes and Phase-transition of CVD Processes for Ti2SiC3. 9-32 - Dongsheng Liu, Hao Tian:

A New Anonymous Authentication Method Based on One-way Accumulator. 33-39 - Zheng Wei, Sanyang Liu, Xiaogang Qi:

Integrated Resources Optimization in Three-layer Dynamic Network. 40-46 - Weiguo Zhang, Xia Yin, Jianping Wu, Wei Zhang, Shuangming Huang:

Real Aggregation for Reducing Routing Information Base Size. 47-53 - Chi-Man Pun, Moon-Chuen Lee, Cong Lin:

Geometric Invariant Shape Representation Based on Radon and Adaptive Stationary Wavelet Transforms. 54-65 - Xinwu Li:

A Cell Projection Algorithm Based on Feature Region Segmentation and Cells Sorting. 66-72 - Yinghui Pan, Jian Luo, Jinqiao Chen, Bo Li:

A New Vector Identification Method Based on Vector Structure and Suffix Tree. 73-78 - Hao Jiang, Jie Xu:

Matching Objects in Multi-Camera Surveillance without Geometric Constraints. 79-86 - Hai Guo, Jing-ying Zhao:

Segmentation Method for NaXi Pictograph Character Recognition. 87-98 - Peiquan Jin, Xiaowen Li, Hong Chen, Lihua Yue:

CT-Rank: A Time-aware Ranking Algorithm for Web Search. 99-111 - Yang Peng, Ye-mei Qian:

A Particle Swarm Optimization to Vehicle Routing Problem with Fuzzy Demands. 112-119 - Hui Gao, Min Zhou, Yan Fu:

Analysis of Netizen's Affective Tendency on Public Opinion. 120-124 - Nan Dong, Fuqiang Liu, Zhipeng Li:

Crowd Density Estimation Using Sparse Texture Features. 125-137 - Xue Deng, Rongjun Li:

A Portfolio Selection Model Based on Possibility Theory Using Fuzzy Two-stage Algorithm. 138-145 - Peng Yang, Qingsheng Zhu:

Finding Key Knowledge Attribute Subspace of Outliers for High Dimensional Dataset. 146-154 - Jia Hou, Moon Ho Lee:

Information Hided Jacket Matrix and Its Fast Factorization Algorithm. 155-160 - Qifeng Zhou, Wencai Hong, Linkai Luo, Fan Yang:

Gene Selection Using Random Forest and Proximity Differences Criterion on DNA Microarray Data. 161-170 - Jinlong Wang, Shunyao Wu, Yang Jiao, Huy Quan Vu:

Study on Student Score Based on Data Mining. 171-179 - Weihua Xu, Weimin Ma, Fukun Yu:

An Analysis of the Co-operative Supply Chain's EPQ Model under Trade Credit. 180-188 - Chuntao Lu, Huyin Zhang, Di Wu, Xin Li, Zhou Zhu:

STBH: A Spectrum-tree-based Hybrid Routing Protocol for Cognitive Network. 189-196
Volume 5, Number 7, September 2010
- N. Saravana Selvam, S. Radhakrishnan:

Active Network Based Queue Management for Providing QoS Using IXP 2400 Network Processor. 9-16 - Cheng Xian-yi, Sun Ping, Zhu Qian, Yue-Hong Cai:

The Research of Chinese Semantic Similarity Calculation Introduced Punctuations. 17-23 - Jiaomin Liu, Li Li, Jianli Zhao, Tao Fu:

The Low-voltage Electrical Network Routing Strategy. 24-28 - Guoqiang Cai, Zhongzhi Tong, Zongyi Xing:

Modelling of Electrohydraulic System Using RBF Neural Networks and Genetic Algorithm. 29-35 - Xi Li, Xiaoning Zhu, Guoqiang Cai:

Research on System Integration Alliance of Urban Rail Transit Safety Monitoring. 36-41 - Cui-Xia Li, Wei-Ming Liu, Zi-Nan Fu:

GPS/TDOA Hybrid Location Algorithm Based on Federal Kalman Filter. 42-48 - Youjun Xu, Dantong Ouyang, Yuxin Ye:

Model Counting with Boolean Algebra and Extension Rule. 49-56 - M. S. Saleem Basha, P. Dhavachelvan:

Web Service Based Secure E-Learning Management System- EWeMS. 57-69 - Gang Chen, Huifang Lv, Jun Yang, Yue Zhang:

Key Technologies of Modeling for Equipment Training Environment. 70-77 - Miriam Salcedo H., Darnes Vilariño Ayala, Fabiola López y López, María Josefa Somodevilla García:

Clearing Policy for an Specialist Agent in Marketing Strategies. 78-83 - Mariceia Tatiane Vilani, Mariele Pinheiro, Luciana Sanches Alves, Nara Luisa Reis de Andrade, Marcelo de Carvalho Alves, Jose de Souza Nogueira:

Modelling Net Ecosystem CO2 Exchange by Simple Tropical Ecosystem Model. 84-89 - Tiejun Pan, Leina Zheng, Guoqing Yan:

Research of Information Framework for Fourth Party Logistics. 90-99 - Mayyada Hammoshi, Razan Alani:

A Proposed Model to Implement Load and Throughput of WLAN Implemented as Wi-Fi System. 100-111 - Xiaogang Qi, Chen-xi Qiu:

An Improvement of GAF for Lifetime Elongation in Wireless Sensor Networks. 112-119 - Fu Jianbao, Maotian Luan, Yang Qing, Nian Tingkai:

Three-Dimensional Finite Element Analysis of Wall Pressure on Large Diameter Silos. 120-128 - Renmin Han, Jun Huang:

QoS Routing in General Petersen-Torus Networks: A Case Study. 129-132 - Chang Wang, Yajun Du, Peiying Zhang:

Optimization of Query Expansion Source in Formal Concept Analysis. 133-140 - Ting-gui Chen, Chun-Hua Ju:

Characteristic Description of Coupled Task Sets Based on Design Structure Matrix and Its Optimal Time and Efforts Solution by Genetic Algorithm. 141-147 - Hongjun Guan:

Prevention and Control Model of Enterprise Business Risk Based on Multi-Agent. 148-154 - Peng Wang, Fengqiang Gao:

Full-Information Item Bifactor Analysis of the Job Burnout Scale for Chinese College Teachers. 155-160 - Kunfang Song, Shufen Ruan, Minghua Jiang:

A Flexible Grid Task Scheduling Algorithm Based on QoS Similarity. 161-166 - Hsin-Hsi Lai, Heng-Chang Lin, Yu-Cheng Chen:

A Product Knowledge-Sharing System Focusing on Internet-mediated Mode. 167-174 - Danwei Chen, Yanjun He:

A Study on Secure Data Storage Strategy in Cloud Computing. 175-179 - Zuowen Tan:

A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc Networks. 180-186 - Xiao Yang, Renyong Chi, Zhimin Yang:

Fuzzy Support Vector Machine Method for Evaluating Innovation Sources in Service Firms. 187-196 - Kuang Haibo, Li Wei, Jian Wang:

AMC Non-Performing Assets Disposal with CDO in China. 197-204
Volume 5, Number 8, October 2010
- Ahmed M. Mahdy, Jitender S. Deogun:

Adaptive Optical Wireless Networks: End-to-End Link Delay Optimization. 9-20 - Yongguo Liu, Yi-Dong Shen:

Data Clustering with Cat Swarm Optimization. 21-28 - Shouju Li, Li Wu, Fuzheng Qu, Wei Sun:

Parameter Estimation of Particle Flow Model for Soils Using Neural Networks. 29-35 - Linkai Luo, Dengfeng Huang, Hong Peng, Qifeng Zhou, Guifang Shao, Fan Yang:

A New Parameter Selection Method for Support Vector Machine Based on the Decision Value. 36-41 - Sotiris B. Kotsiantis, Dimitris Kanellopoulos, Vasilis Tampakas:

Financial Application of Multi-Instance Learning: Two Greek Case Studies. 42-53 - Shifei Ding, Li Xu, Chunyang Su, Hong Zhu:

Using Genetic Algorithms to Optimize Artificial Neural Networks. 54-62 - Youfu Wu, Jing Wu:

Recognizing Moving Objects Based on Gaussian-Hermite Moments and ART Neural Networks. 63-70 - Lilin Fan:

Research on Classification Mining Method of Frequent Itemset. 71-77 - Wei-Chih Hsu, Tsan-Ying Yu:

E-mail Spam Filtering Based on Support Vector Machines with Taguchi Method for Parameter Selection. 78-88 - Chih-Feng Chuang, Chao-Jen Cheng:

A Study of Institutional Repository Service Quality and Users' Loyalty to College Libraries in Taiwan: The Mediating & Moderating Effects. 89-99 - Kaipeng Liu, Binxing Fang, Weizhe Zhang:

Incorporating Relevance and Importance for Dynamic Ranking in Folksonomies. 100-112 - Yunni Xia, Zhe Ouyang, Yanxin Wu, Ruilong Yang:

Determing Performance of Choreography-based Composite Services. 113-125 - Chein-Shung Hwang:

Genetic Algorithms for Feature Weighting in Multi-criteria Recommender Systems. 126-136 - Tanzilah Noor Shabnam, Md. Imdadul Islam, M. Ruhul Amin:

Call Admission Control Strategy for System Throughput Maximization Using DOVE. 137-145 - Kai Yang, Jianfeng Ma:

A Hierarchical Hybrid Routing Protocol for Wireless Mesh Network. 146-156 - Yan Chen, Yunjun Gao:

Ranked Continuous Visible Nearest Neighbor Search. 157-164 - Chia-Chen Yen, Jih-Shih Hsu:

Pagerank Algorithm Improvement by Page Relevance Measurement. 165-173 - Yongqing Wei, Ming-ying Xu, Zhen-fang Zhu:

Feature-Denoising Based on Average Fitness of Genetic Population. 174-179 - Peiyu Liu, Jing Zhao, Zhen-fang Zhu:

Email Representation using Noncharacteristic Information and its Application. 180-185 - Jae Kwon Bae:

Forecasting Decisions on Dividend Policy of South Korea Companies Listed in the Korea Exchange Market Based on Support Vector Machines. 186-194 - Zhongzhi Li, Xuegang Wang:

Multiple Target Tracking Using Reverse Prediction Weighted Neighbor Data Association. 195-199 - Changsheng Wan, Aiqun Hu, Juan Zhang:

A Novel Authentication Protocol for Wireless Access Security. 200-207 - Kerui Chen, Jinchao Zhao, Wanli Zuo, Fengling He, Yongheng Chen:

Heterogeneous Deep Web Data Extraction Using Ontology Evolution. 208-215 - Yongheng Chen, Wanli Zuo, Fengling He, Kerui Chen:

Optimization Strategy of Parallel Query Processing Based on Multi-core Architecture. 216-225 - Yitian Xu, Haozhi Zhang, Laisheng Wang:

Rough Margin-Based Linear v Support Vector Machine. 226-232 - Xueying Tian:

Influence of Philanthropy Donation on Competitive Advantage: From the Perspective of Corporate Social Capital. 233-240 - Wei Min:

Construction of Marketing Management Information System of Travel Agency Based on Customer Relationship Management. 241-251 - Nitul Dutta, Iti Saha Misra, Abhishek Majumder:

Mathematical Analysis of Signaling Overhead in MIPv6 Based N-Layer Architecture. 252-261
Volume 5, Number 9, November 2010
- Massimo Orazio Spata, Salvatore Rinaudo:

Merging Nash Equilibrium Solution with Genetic Algorithm : The Game Genetic Algorithm. 9-15 - Yang Zhao, Mingjing Guo, Kaisa Varis:

The Information Resources Allocation Mechanisms in The National Innovation System of Finland. 16-26 - Ying Huang, Lu Lu:

A Methodology for Test Suit Reduction in User-session-based Testing. 27-44 - LiYue Zhu, Zilei Wang, Hongsheng Xi:

Markov Decision Process Model for Path Selection Algorithm on Multi-Business System with Services Composition. 45-53 - Jianhua Dai, Huaijian Zhang, Xiaochun Liu, Shaomin Zhang, Weidong Chen, Xiaoxiang Zheng:

A Novel Matched Filter for Neural Action Potential Detection. 54-60 - Jui-Hung Chen, Han-Bin Chang, Chun-Yi Shen, Te-Wua Wang, Wen-Chih Chang, Timothy K. Shih:

Immersive Learning Environment with Integrated Interactive Video and Ubiquitous Technologies. 61-72 - Xue Deng, Junfeng Zhao, Lihong Yang, Rongjun Li:

Constraint Method for Possibilistic Mean-variance Portfolio with Transaction Costs and Lending. 73-84 - Jian-ming Cui:

Traffic Prediction Based on Improved Neural Network. 85-89 - Xu Xiang:

A Flexible Resource Location Protocol for Peer-to-Peer Network. 90-96 - Hongwei Dai, Yu Yang, Cunhua Li:

Immune Network Theory Based Artificial Immune System and Its Application for Pattern Recognition. 97-108 - Qian Zhu, Xian-Yi Cheng:

The Semantic Tagging Model of Chinese Question Chunk Based on Description Logic. 109-117 - Fengxia Wang, Huixia Jin, Xiao Chang:

Relevance Vector Ranking for Information Retrieval. 118-125 - Jui-Hung Chen, David Tawei Ku, Te-Hua Wang, Wen-Chih Chang, Timothy K. Shih:

Using Adventure Game to Facilitate Learning Assessment Process. 126-134 - Yu-Cheng Chen, Hsin-Hsi Lai, Heng-Chang Lin:

Constructing Product Knowledge-Sharing System for Internet Transaction-Matching Model. 135-145 - Minjuan Zhong, Changxuan Wan:

Pseudo-Relevance Feedback Driven for XML Query Expansion. 146-156 - Wenyuan Liu, En-shuang Wang, Zijun Chen, Lin Wang:

An Improved DV-Hop Localization Algorithm based on The Selection of Beacon Nodes. 157-164 - Xudong Song, Dejun Zhu, Zhanzhi Qiu:

Study on Enterprises Group Order Allocation Multi-objective Model. 165-174 - Chunchen Liu, Dayou Liu, Sheng-Sheng Wang:

Dealing with Uncertainty in Situation-aware Computing System. 175-189 - Joseph K. Siror, Guanqun Liang, Kaifang Pang, Huanye Sheng, Dong Wang:

Impact of RFID Technology on Tracking of Export Goods in Kenya. 190-199 - Chengbo Xu, Junping Wang, Jun Huang:

Petersen-Twisted-Torus Networks for Multiprocessor Systems. 200-205 - Reihaneh Khorsand Motlagh Esfahani, Farhad Mardukhi, Naser Nematbakhsh:

Reputation Improved Web Services Discovery Based on QoS. 206-214 - Hong-qi Li, Xu He, Xiaolong Xie, Li Li, Jinyu Zhou, Xiongyan Li:

A New Boundary Condition for Particle Swarm Optimization. 215-221 - Gang Lv, Heming Zhao:

Tracking Formant Trajectory of Continuous Chinese Whispered Speech with Hidden Dynamic Model Based on Dynamic Target Orientation. 222-230 - Zhao-xiong He, Xing Liu, Peng-cheng Luo, Jing-lun Zhou:

Tactical Data Link Channel-PHY Modeling and Simulation in Network Simulator 2. 231-237 - Ying Zhang, Zhong Shen, Yilin Chang, Zhongjiang Yan, Liang Dai:

A Signal Aware Movement Control Algorithm for GPS-free Ad Hoc Networks. 238-245 - Chenming Li, Lizhong Xu, Chunxia Yu, Xiaodong Wei:

Measuring Concept Similarity of Heterogeneous Ontologies in Multi-angent System. 246-256 - Yi Wang, Huosong Xia, Jian Liu:

Commercial Credit Difference Evaluation and Prediction Model: Based on Neural Network. 257-266 - Zhixia Yang, Yingjie Tian:

Second Order Cone Programming Formulations for Handling Data with Perturbation. 267-278 - Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:

Secure Multimedia Distribution Based on Watermarking and Encryption. 279-286 - Shui Wang, Le Wang:

An Implementation of FP-Growth Algorithm Based on High Level Data Structures of Weka-JUNG Framework. 287-294
Volume 5, Number 10, December 2010
- Jianping Ge, Yalin Lei:

Assessing Welfare and Growth Effects of Grain-based Fuel Ethanol Development in China: a General Equilibrium Framework. 1-8 - Jiao-Li Lu, Jia-Heng Zheng, Hong-Ye Tan, Jian Sun:

Chinese Chunking and Consistency Checking Using Rule-Based Method. 9-14 - Li Fan, Yudong Zhang, Zhenyu Zhou, David P. Semanek, Shuihua Wang, Lenan Wu:

An Improved Image Fusion Algorithm Based on Wavelet Decomposition. 15-21 - Huafeng Wu, Chaojian Shi, Seiya Miyazaki:

Spirit: Security and Privacy in Real-Time Monitoring System. 22-28 - Anirban Kundu, Chandan Banerjee:

Multi-layered Service Suite Conceptualization in Cloud Computing. 29-38 - Xian-Yi Cheng, Dan-Qian Lu, Qian Zhu, Jin Wang:

The Overview of Text Representative Model. 39-47 - Xian-Yi Cheng, Ling-ling Zhu, Qian Zhu, Jin Wang:

The Framework of Network Public Opinion Monitoring and Analyzing System Based on Semantic Content Identification. 48-55 - Hongwei Dai, Yu Yang, Cunhua Li:

Distance Maintaining Compact Quantum Crossover Based Clonal Selection Algorithm. 56-65 - Lin Feng, Le Wang, Bo Jin:

Research on Maximal Frequent Pattern Outlier Factor for Online High-Dimensional Time-Series Outlier Detection. 66-71 - Chong Wang, Li Zhao:

Intermediate View Synthesis Based on Adaptive BP Algorithm and View Interpolation. 72-81 - Zhanmao Cao, Limin Peng:

Destination-oriented Routing and Maximum Capacity Scheduling Algorithms in Cayley Graph Model for Wireless Mesh Network. 82-90 - Jie Huang, Bei Huang, Qiucen Huang:

An Improved Dynamic Load Balancing Algorithm for a Distributed System in LAN. 91-98 - Heng-Chang Lin, Yu-Cheng Chen, Hsin-Hsi Lai:

Integrating Product Information Management (PIM) with Internet-Mediated Transactions (IMTs). 99-108 - Fengxia Wang, Xiao Chang:

Cost-Sensitive Support Vector Ranking for Information Retrieval. 109-116 - Xiao Chen, Feifei Lu:

An Improved Rate Control Scheme for H, 264 Based on Frame Complexity Estimation. 117-123 - Jun Tang:

Improved K-means Clustering Algorithm Based on User Tag. 124-130 - Tinghuai Ma, Jian Ge, Wei Tian, Yali Wang, Erasmus Sowah:

Virtual Resource Management Based Meteorological Computational Grid . 131-140 - Lifang Liu, Licheng Jiao:

Moitf GibbsGA: Sampling Transcription Factor Binding Sites Coupled with PSFM Optimization by Genetic Algorithm. 141-148 - Rui Yang, Xiaoju Ning:

Model Checking Cryptographic Protocols with Interval Temporal Logic. 149-158 - Cunli Song, Xiaobing Liu, Wei Wang, Ming Huang:

Dynamic Integrated Algorithm for Production Scheduling Based on Iterative Search. 159-166 - Jinyu Li, Qing Yang, Maotian Luan:

Limit Equilibrium Analysis of the Influence of Matric Suction on Unsaturated Soil Slope Stability. 167-175 - Jianli Wei:

A Risk Evaluation Method for the High-Technology Project Investment Based on ET-WA Operator with 2-Tuple Linguistic Information. 176-180 - Jianli Wei:

TOPSIS Method for Multiple Attribute Decision Making with Incomplete Weight Information in Linguistic Setting. 181-187 - Juchi Hou:

A Model for Software Selection with Fuzzy Linguistic Information. 188-193 - Juchi Hou:

Grey Relational Analysis Method for Multiple Attribute Decision Making in Intuitionistic Fuzzy Setting. 194-199 - Yuanhong Zhong, Jun Gu, Shanshan Wang, Shu Han:

A Cascaded Wireless System of SCCP and FMT with Cyclic Delay Diversity. 200-206 - Zhenlin Wei:

Novel MicroRNAs and Targets Prediction in PRRS Virus Genome. 207-215 - Yiming Li, Yi Li, Mingtian Zhou:

Area Optimization in Floorplanning Using AP-TCG. 216-222 - Qi Yang, Jianghong Shi, Biyu Tang:

Convergence Analysis of Decentralized Slot Synchronization Algorithm for Wireless Ad Hoc Networks. 223-232 - Xiaojiang Liu, Nenghai Yu:

People Summarization by Combining Named Entity Recognition and Relation Extraction. 233-241

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














