callback( { "result":{ "query":":facetid:toc:\"db/journals/ccsecis/ccsecis1.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"206.10" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"82", "@dc":"82", "@oc":"82", "@id":"43440176", "text":":facetid:toc:db/journals/ccsecis/ccsecis1.bht" } }, "hits":{ "@total":"82", "@computed":"82", "@sent":"82", "@first":"0", "hit":[{ "@score":"1", "@id":"5248266", "info":{"authors":{"author":[{"@pid":"93/8175","text":"Qinghai Bai"},{"@pid":"48/2056","text":"Chunsheng Zhang"},{"@pid":"87/660","text":"Yan Li"},{"@pid":"92/9098","text":"Yufeng Bai"}]},"title":"The Research on the Mode of Making Use of the Microcomputer Circularly.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"80-84","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/BaiZLB08","doi":"10.5539/CIS.V1N2P80","ee":"https://doi.org/10.5539/cis.v1n2p80","url":"https://dblp.org/rec/journals/ccsecis/BaiZLB08"}, "url":"URL#5248266" }, { "@score":"1", "@id":"5248267", "info":{"authors":{"author":[{"@pid":"58/5017","text":"R. Baskaran"},{"@pid":"45/1516","text":"S. Arunachalam"},{"@pid":"09/9099","text":"K. Manjunath"},{"@pid":"93/9098","text":"T. R. Kubendran"}]},"title":"Artificial Neural Networks for the Prediction of Thermo Physical Properties of Liquid Mixtures.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"3-12","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/BaskaranAMK08","doi":"10.5539/CIS.V1N3P3","ee":"https://doi.org/10.5539/cis.v1n3p3","url":"https://dblp.org/rec/journals/ccsecis/BaskaranAMK08"}, "url":"URL#5248267" }, { "@score":"1", "@id":"5248268", "info":{"authors":{"author":[{"@pid":"85/1795","text":"Abdul Talib Bon"},{"@pid":"99/720","text":"Jean-Marc Ogier"},{"@pid":"83/4403","text":"Ahmad Mahir Razali"},{"@pid":"87/9098","text":"Ihsan M. Yassin"}]},"title":"Feature Selection in Extrusion Beltline Moulding Process Using Particle Swarm Optimization.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"20-26","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/BonORY08","doi":"10.5539/CIS.V1N2P20","ee":"https://doi.org/10.5539/cis.v1n2p20","url":"https://dblp.org/rec/journals/ccsecis/BonORY08"}, "url":"URL#5248268" }, { "@score":"1", "@id":"5248269", "info":{"authors":{"author":{"@pid":"05/3054","text":"Xiao Chen"}},"title":"Design of Calendar Clock Based on DS12C887 Chip.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"95-99","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Chen08","doi":"10.5539/CIS.V1N3P95","ee":"https://doi.org/10.5539/cis.v1n3p95","url":"https://dblp.org/rec/journals/ccsecis/Chen08"}, "url":"URL#5248269" }, { "@score":"1", "@id":"5248270", "info":{"authors":{"author":{"@pid":"05/3054-6","text":"Xiao Chen 0006"}},"title":"Design of Temperature Monitor Device for DC Source Based on 1-Wire Bus.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"31-36","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Chen08a","doi":"10.5539/CIS.V1N4P31","ee":"https://doi.org/10.5539/cis.v1n4p31","url":"https://dblp.org/rec/journals/ccsecis/Chen08a"}, "url":"URL#5248270" }, { "@score":"1", "@id":"5248271", "info":{"authors":{"author":[{"@pid":"02/9099","text":"Huihong Chen"},{"@pid":"96/6090","text":"Zhigang Chen"}]},"title":"The Role of Session Border Controllers in the DMZ of Voice over IP(VoIP) Networks.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"27-31","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ChenC08","doi":"10.5539/CIS.V1N3P27","ee":"https://doi.org/10.5539/cis.v1n3p27","url":"https://dblp.org/rec/journals/ccsecis/ChenC08"}, "url":"URL#5248271" }, { "@score":"1", "@id":"5248272", "info":{"authors":{"author":[{"@pid":"42/5877","text":"Huadong Chen"},{"@pid":"14/9099","text":"Dianhua Hou"},{"@pid":"89/120","text":"Xing Chen"}]},"title":"The Implementation of CAN Bus Adapter Based on CH372.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"166-171","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ChenHC08","doi":"10.5539/CIS.V1N4P166","ee":"https://doi.org/10.5539/cis.v1n4p166","url":"https://dblp.org/rec/journals/ccsecis/ChenHC08"}, "url":"URL#5248272" }, { "@score":"1", "@id":"5248273", "info":{"authors":{"author":[{"@pid":"72/9098","text":"Erjun Chen"},{"@pid":"40/9099","text":"Shaohong Yin"}]},"title":"Adjustment of Performance for the Application of PL/SQL.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"135-138","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ChenY08","doi":"10.5539/CIS.V1N4P135","ee":"https://doi.org/10.5539/cis.v1n4p135","url":"https://dblp.org/rec/journals/ccsecis/ChenY08"}, "url":"URL#5248273" }, { "@score":"1", "@id":"5248274", "info":{"authors":{"author":[{"@pid":"38/9099","text":"Dansong Cheng"},{"@pid":"21/103","text":"Xianglong Tang"},{"@pid":"02/919","text":"Jiafeng Liu"},{"@pid":"68/4833","text":"Xiaofang Liu"}]},"title":"Multi-object Segmentation Based on Improved Pulse Coupled Neural Network.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"91-98","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ChengTLL08","doi":"10.5539/CIS.V1N4P91","ee":"https://doi.org/10.5539/cis.v1n4p91","url":"https://dblp.org/rec/journals/ccsecis/ChengTLL08"}, "url":"URL#5248274" }, { "@score":"1", "@id":"5248275", "info":{"authors":{"author":[{"@pid":"00/9099","text":"Amel Chowdhury"},{"@pid":"71/9098","text":"Jakia Afruz"},{"@pid":"20/9099","text":"Jalalur Rahman"}]},"title":"Analysis of Telephone System of a University Campus and Design of a Converged VoIP System.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"16-30","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ChowdhuryAR08","doi":"10.5539/CIS.V1N4P16","ee":"https://doi.org/10.5539/cis.v1n4p16","url":"https://dblp.org/rec/journals/ccsecis/ChowdhuryAR08"}, "url":"URL#5248275" }, { "@score":"1", "@id":"5248276", "info":{"authors":{"author":[{"@pid":"05/4331","text":"Joan Condell"},{"@pid":"26/9099","text":"J. McDevitt"},{"@pid":"36/9099","text":"D. McGilloway"},{"@pid":"17/9099","text":"J. McGlinchey"},{"@pid":"31/9099","text":"G. Galway"}]},"title":"Seat Booking System for a Cineplex.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"67-79","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/CondellMMMG08","doi":"10.5539/CIS.V1N2P67","ee":"https://doi.org/10.5539/cis.v1n2p67","url":"https://dblp.org/rec/journals/ccsecis/CondellMMMG08"}, "url":"URL#5248276" }, { "@score":"1", "@id":"5248277", "info":{"authors":{"author":{"@pid":"37/9099","text":"Yuan Cui"}},"title":"A New Mixing Programming Method.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"106-109","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Cui08","doi":"10.5539/CIS.V1N2P106","ee":"https://doi.org/10.5539/cis.v1n2p106","url":"https://dblp.org/rec/journals/ccsecis/Cui08"}, "url":"URL#5248277" }, { "@score":"1", "@id":"5248278", "info":{"authors":{"author":[{"@pid":"79/1071","text":"Kevin Curran"},{"@pid":"88/9098","text":"Gary O' Callaghan"},{"@pid":"27/9099","text":"Fionnuala McCullough"}]},"title":"Cognitive Radio.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"17-19","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/CurranCM08","doi":"10.5539/CIS.V1N1P17","ee":"https://doi.org/10.5539/cis.v1n1p17","url":"https://dblp.org/rec/journals/ccsecis/CurranCM08"}, "url":"URL#5248278" }, { "@score":"1", "@id":"5248279", "info":{"authors":{"author":[{"@pid":"79/1071","text":"Kevin Curran"},{"@pid":"85/9098","text":"Joanne Mc Devitt"}]},"title":"Image Analysis for Online Dynamic Steganography Detection.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"32-41","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/CurranD08","doi":"10.5539/CIS.V1N3P32","ee":"https://doi.org/10.5539/cis.v1n3p32","url":"https://dblp.org/rec/journals/ccsecis/CurranD08"}, "url":"URL#5248279" }, { "@score":"1", "@id":"5248280", "info":{"authors":{"author":[{"@pid":"79/1071","text":"Kevin Curran"},{"@pid":"80/9098","text":"James Knox"}]},"title":"Disruption Tolerant Networking.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"69-71","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/CurranK08","doi":"10.5539/CIS.V1N1P69","ee":"https://doi.org/10.5539/cis.v1n1p69","url":"https://dblp.org/rec/journals/ccsecis/CurranK08"}, "url":"URL#5248280" }, { "@score":"1", "@id":"5248281", "info":{"authors":{"author":[{"@pid":"79/1071","text":"Kevin Curran"},{"@pid":"79/1849","text":"David King"}]},"title":"Investigating the Human Computer Interaction Problems with Automated Teller Machine (ATM) Navigation Menus.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"34-51","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/CurranK08a","doi":"10.5539/CIS.V1N2P34","ee":"https://doi.org/10.5539/cis.v1n2p34","url":"https://dblp.org/rec/journals/ccsecis/CurranK08a"}, "url":"URL#5248281" }, { "@score":"1", "@id":"5248282", "info":{"authors":{"author":[{"@pid":"79/1071","text":"Kevin Curran"},{"@pid":"87/6292","text":"James Lee"}]},"title":"Autonomic Vehicles.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"104-106","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/CurranL08","doi":"10.5539/CIS.V1N1P104","ee":"https://doi.org/10.5539/cis.v1n1p104","url":"https://dblp.org/rec/journals/ccsecis/CurranL08"}, "url":"URL#5248282" }, { "@score":"1", "@id":"5248283", "info":{"authors":{"author":[{"@pid":"67/4036","text":"K. Duraiswamy"},{"@pid":"36/3457","text":"N. Maheswari"}]},"title":"Identification of Sensitive Items in Privacy Preserving - Association Rule Mining.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"85-89","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/DuraiswamyM08","doi":"10.5539/CIS.V1N2P85","ee":"https://doi.org/10.5539/cis.v1n2p85","url":"https://dblp.org/rec/journals/ccsecis/DuraiswamyM08"}, "url":"URL#5248283" }, { "@score":"1", "@id":"5248284", "info":{"authors":{"author":[{"@pid":"67/4036","text":"K. Duraiswamy"},{"@pid":"10/9099","text":"V. Valli Mayil"}]},"title":"Similarity Matrix Based Session Clustering by Sequence Alignment Using Dynamic Programming.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"66-72","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/DuraiswamyM08a","doi":"10.5539/CIS.V1N3P66","ee":"https://doi.org/10.5539/cis.v1n3p66","url":"https://dblp.org/rec/journals/ccsecis/DuraiswamyM08a"}, "url":"URL#5248284" }, { "@score":"1", "@id":"5248285", "info":{"authors":{"author":[{"@pid":"67/4036","text":"K. Duraiswamy"},{"@pid":"47/949","text":"D. Manjula"},{"@pid":"36/3457","text":"N. Maheswari"}]},"title":"A New Approach to Sensitive Rule Hiding.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"107-111","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/DuraiswamyMM08","doi":"10.5539/CIS.V1N3P107","ee":"https://doi.org/10.5539/cis.v1n3p107","url":"https://dblp.org/rec/journals/ccsecis/DuraiswamyMM08"}, "url":"URL#5248285" }, { "@score":"1", "@id":"5248286", "info":{"authors":{"author":[{"@pid":"25/9099","text":"C. Gomathi"},{"@pid":"74/9098","text":"M. Moorthi"},{"@pid":"67/4036","text":"K. Duraiswamy"}]},"title":"Web Access Pattern Algorithms in Education Domain.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"183-186","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/GomathiMD08","doi":"10.5539/CIS.V1N4P183","ee":"https://doi.org/10.5539/cis.v1n4p183","url":"https://dblp.org/rec/journals/ccsecis/GomathiMD08"}, "url":"URL#5248286" }, { "@score":"1", "@id":"5248287", "info":{"authors":{"author":[{"@pid":"41/9099","text":"Lenin Gopal"},{"@pid":"94/3731-1","text":"Ashutosh Kumar Singh 0001"},{"@pid":"33/9099","text":"Veeramani Shanmugam"}]},"title":"Power Estimation in Mobile Communication Systems.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"88-94","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/GopalSS08","doi":"10.5539/CIS.V1N3P88","ee":"https://doi.org/10.5539/cis.v1n3p88","url":"https://dblp.org/rec/journals/ccsecis/GopalSS08"}, "url":"URL#5248287" }, { "@score":"1", "@id":"5248288", "info":{"authors":{"author":[{"@pid":"35/6453","text":"Zhen Guo"},{"@pid":"43/2621","text":"Xiaoyan Zhou"},{"@pid":"08/6077","text":"Suzhen Wang"}]},"title":"The Design of Switched Reluctance Motor Controller Based on DSP.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"20-24","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/GuoZW08","doi":"10.5539/CIS.V1N1P20","ee":"https://doi.org/10.5539/cis.v1n1p20","url":"https://dblp.org/rec/journals/ccsecis/GuoZW08"}, "url":"URL#5248288" }, { "@score":"1", "@id":"5248289", "info":{"authors":{"author":[{"@pid":"81/9098","text":"Donna F. Herring"},{"@pid":"99/9098","text":"Charles E. Notar"},{"@pid":"84/9098","text":"Judy McEntyre"}]},"title":"Creating Websites: Adobe Go Live vs. LiveText.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"100-103","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/HerringNM08","doi":"10.5539/CIS.V1N3P100","ee":"https://doi.org/10.5539/cis.v1n3p100","url":"https://dblp.org/rec/journals/ccsecis/HerringNM08"}, "url":"URL#5248289" }, { "@score":"1", "@id":"5248290", "info":{"authors":{"author":[{"@pid":"23/9099","text":"Azleen Ilias"},{"@pid":"78/9098","text":"Norazah Mohd Suki"},{"@pid":"95/9098","text":"Mohd Rushdan Yasoa'"},{"@pid":"42/9099","text":"Rahida Abdul Rahman"}]},"title":"A Study of Taxpayers' Intention in Using E-Filing System: A Case in Labuan F.T s.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"110-119","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/IliasSYR08","doi":"10.5539/CIS.V1N2P110","ee":"https://doi.org/10.5539/cis.v1n2p110","url":"https://dblp.org/rec/journals/ccsecis/IliasSYR08"}, "url":"URL#5248290" }, { "@score":"1", "@id":"5248291", "info":{"authors":{"author":[{"@pid":"73/3893","text":"Dino Isa"},{"@pid":"37/4063","text":"Lam Hong Lee"},{"@pid":"21/3711","text":"V. P. Kallimani"},{"@pid":"40/5954","text":"R. Prasad"}]},"title":"Polychotomiser for Case-based Reasoning beyond the Traditional Bayesian Classification Approach.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"57-68","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/IsaLKP08","doi":"10.5539/CIS.V1N1P57","ee":"https://doi.org/10.5539/cis.v1n1p57","url":"https://dblp.org/rec/journals/ccsecis/IsaLKP08"}, "url":"URL#5248291" }, { "@score":"1", "@id":"5248292", "info":{"authors":{"author":[{"@pid":"73/3893","text":"Dino Isa"},{"@pid":"37/4063","text":"Lam Hong Lee"},{"@pid":"21/3711","text":"V. P. Kallimani"},{"@pid":"82/2424","text":"Rajprasad Rajkumar"}]},"title":"Text Document Pre-Processing Using the Bayes Formula for Classification Based on the Vector Space Model.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"79-90","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/IsaLKR08","doi":"10.5539/CIS.V1N4P79","ee":"https://doi.org/10.5539/cis.v1n4p79","url":"https://dblp.org/rec/journals/ccsecis/IsaLKR08"}, "url":"URL#5248292" }, { "@score":"1", "@id":"5248293", "info":{"authors":{"author":[{"@pid":"03/9099","text":"Akilandeswari Jeyapal"},{"@pid":"29/9099","text":"Gopalan Palanisamy"}]},"title":"Multi-level Frontier based Topic-specific Crawler Design with Improved URL Ordering.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"99-105","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/JeyapalP08","doi":"10.5539/CIS.V1N4P99","ee":"https://doi.org/10.5539/cis.v1n4p99","url":"https://dblp.org/rec/journals/ccsecis/JeyapalP08"}, "url":"URL#5248293" }, { "@score":"1", "@id":"5248294", "info":{"authors":{"author":{"@pid":"01/9099","text":"Xiaonan Jin"}},"title":"The Drive and Support of Web3.0 to Rich Media Advertisement.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"83-87","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Jin08","doi":"10.5539/CIS.V1N3P83","ee":"https://doi.org/10.5539/cis.v1n3p83","url":"https://dblp.org/rec/journals/ccsecis/Jin08"}, "url":"URL#5248294" }, { "@score":"1", "@id":"5248295", "info":{"authors":{"author":{"@pid":"70/9098","text":"Kamaruzaman Jusoff"}},"title":"Geospatial Information Technology for Conservation of Coastal Forest and Mangroves Environment in Malaysia.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"129-134","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Jusoff08","doi":"10.5539/CIS.V1N2P129","ee":"https://doi.org/10.5539/cis.v1n2p129","url":"https://dblp.org/rec/journals/ccsecis/Jusoff08"}, "url":"URL#5248295" }, { "@score":"1", "@id":"5248296", "info":{"authors":{"author":{"@pid":"70/9098","text":"Kamaruzaman Jusoff"}},"title":"Construction of New Forest Roads in Malaysia Using a GIS-Based Decision Support System.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"48-59","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Jusoff08a","doi":"10.5539/CIS.V1N3P48","ee":"https://doi.org/10.5539/cis.v1n3p48","url":"https://dblp.org/rec/journals/ccsecis/Jusoff08a"}, "url":"URL#5248296" }, { "@score":"1", "@id":"5248297", "info":{"authors":{"author":[{"@pid":"07/9099","text":"Jusoff Hj. Kamaruzaman"},{"@pid":"147/5858","text":"Ya'acob Norsuzila"}]},"title":"Mapping of Power Transmission Lines on Malaysian Highways Using UPM-APSB's AISA Airborne Hyperspectral Imaging System.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"88-94","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/KamaruzamanN08","doi":"10.5539/CIS.V1N1P88","ee":"https://doi.org/10.5539/cis.v1n1p88","url":"https://dblp.org/rec/journals/ccsecis/KamaruzamanN08"}, "url":"URL#5248297" }, { "@score":"1", "@id":"5248298", "info":{"authors":{"author":[{"@pid":"96/3078","text":"Ku Ruhana Ku-Mahamud"},{"@pid":"91/8181","text":"Norita Md Norwawi"},{"@pid":"22/6071","text":"Norliza Katuk"},{"@pid":"92/2662","text":"Safaai Deris"}]},"title":"Autonomous Notification and Situation Reporting for Flood Disaster Management.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"20-26","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Ku-MahamudNKD08","doi":"10.5539/CIS.V1N3P20","ee":"https://doi.org/10.5539/cis.v1n3p20","url":"https://dblp.org/rec/journals/ccsecis/Ku-MahamudNKD08"}, "url":"URL#5248298" }, { "@score":"1", "@id":"5248299", "info":{"authors":{"author":[{"@pid":"93/9098","text":"T. R. Kubendran"},{"@pid":"58/5017","text":"R. Baskaran"},{"@pid":"83/9098","text":"M. Balakrishna"}]},"title":"Artificial Neural Networks for the Prediction of Thermo Physical Properties of Diacetone Alcohol Mixtures.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"66-71","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/KubendranBB08","doi":"10.5539/CIS.V1N4P66","ee":"https://doi.org/10.5539/cis.v1n4p66","url":"https://dblp.org/rec/journals/ccsecis/KubendranBB08"}, "url":"URL#5248299" }, { "@score":"1", "@id":"5248300", "info":{"authors":{"author":{"@pid":"32/9099","text":"Zheng Lai"}},"title":"The Application of PLC in the Auto-control System of Chemical Makeup Water Treatment of Boiler.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"63-66","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Lai08","doi":"10.5539/CIS.V1N2P63","ee":"https://doi.org/10.5539/cis.v1n2p63","url":"https://dblp.org/rec/journals/ccsecis/Lai08"}, "url":"URL#5248300" }, { "@score":"1", "@id":"5248301", "info":{"authors":{"author":[{"@pid":"63/556","text":"David D. Langan"},{"@pid":"h/ThomasFHain","text":"Thomas F. Hain"},{"@pid":"89/9098","text":"W. Christopher Camery"}]},"title":"A Model for Voice-activated Expression Editing.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"2-11","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/LanganHC08","doi":"10.5539/CIS.V1N1P2","ee":"https://doi.org/10.5539/cis.v1n1p2","url":"https://dblp.org/rec/journals/ccsecis/LanganHC08"}, "url":"URL#5248301" }, { "@score":"1", "@id":"5248302", "info":{"authors":{"author":[{"@pid":"69/5545","text":"Rohaya Latip"},{"@pid":"12/1074","text":"Hamidah Ibrahim"},{"@pid":"06/635","text":"Mohamed Othman"},{"@pid":"10/5784","text":"Md Nasir Sulaiman"},{"@pid":"29/5266","text":"Azizol Abdullah"}]},"title":"High Availability with Diagonal Replication in 2D Mesh (DR2M) Protocol for Grid Environment.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"95-105","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/LatipIOSA08","doi":"10.5539/CIS.V1N2P95","ee":"https://doi.org/10.5539/cis.v1n2p95","url":"https://dblp.org/rec/journals/ccsecis/LatipIOSA08"}, "url":"URL#5248302" }, { "@score":"1", "@id":"5248303", "info":{"authors":{"author":{"@pid":"22/1805","text":"Ying Li"}},"title":"A Study on the Issue of Chinese Character in Ruby on Rails and Relevant Solving Scheme.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"33-35","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Li08","doi":"10.5539/CIS.V1N1P33","ee":"https://doi.org/10.5539/cis.v1n1p33","url":"https://dblp.org/rec/journals/ccsecis/Li08"}, "url":"URL#5248303" }, { "@score":"1", "@id":"5248304", "info":{"authors":{"author":{"@pid":"72/2639","text":"Hongyu Li"}},"title":"Summarization of Program Development in Multi-core Environment.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"135-139","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Li08a","doi":"10.5539/CIS.V1N3P135","ee":"https://doi.org/10.5539/cis.v1n3p135","url":"https://dblp.org/rec/journals/ccsecis/Li08a"}, "url":"URL#5248304" }, { "@score":"1", "@id":"5248305", "info":{"authors":{"author":[{"@pid":"17/2357","text":"Lijun Li"},{"@pid":"81/669","text":"Guilin Lu"}]},"title":"Radio Propagation for Wireless Ultra-wide Band Systems.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"146-149","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/LiL08","doi":"10.5539/CIS.V1N4P146","ee":"https://doi.org/10.5539/cis.v1n4p146","url":"https://dblp.org/rec/journals/ccsecis/LiL08"}, "url":"URL#5248305" }, { "@score":"1", "@id":"5248306", "info":{"authors":{"author":[{"@pid":"37/4190-142","text":"Yang Li 0142"},{"@pid":"49/1245","text":"Jia Liu"},{"@pid":"80/6061","text":"Liqun Gao"},{"@pid":"15/2370","text":"Zhi Kong"}]},"title":"Peak Load Shifting Distribution of Multi-zone Fuzzy Group Decision-Making.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"81-87","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/LiLGK08","doi":"10.5539/CIS.V1N1P81","ee":"https://doi.org/10.5539/cis.v1n1p81","url":"https://dblp.org/rec/journals/ccsecis/LiLGK08"}, "url":"URL#5248306" }, { "@score":"1", "@id":"5248307", "info":{"authors":{"author":[{"@pid":"43/8779","text":"Mengxin Li"},{"@pid":"26/1959","text":"Chengdong Wu"}]},"title":"A New Vision Inspection Method for Wood Veneer Classification.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"129-134","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/LiW08","doi":"10.5539/CIS.V1N3P129","ee":"https://doi.org/10.5539/cis.v1n3p129","url":"https://dblp.org/rec/journals/ccsecis/LiW08"}, "url":"URL#5248307" }, { "@score":"1", "@id":"5248308", "info":{"authors":{"author":[{"@pid":"75/8776","text":"Yinglin Li"},{"@pid":"19/9099","text":"Lianhe Yang"},{"@pid":"21/8495","text":"Fang Ma"},{"@pid":"66/9098","text":"Yingzhong Li"}]},"title":"Design of the Automatic Spreader Control System Based on Embedded System.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"72-78","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/LiYML08","doi":"10.5539/CIS.V1N4P72","ee":"https://doi.org/10.5539/cis.v1n4p72","url":"https://dblp.org/rec/journals/ccsecis/LiYML08"}, "url":"URL#5248308" }, { "@score":"1", "@id":"5248309", "info":{"authors":{"author":{"@pid":"87/2673","text":"Zhengyong Liu"}},"title":"Study on the Quality Evaluation System of College Information Network.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"106-111","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Liu08","doi":"10.5539/CIS.V1N4P106","ee":"https://doi.org/10.5539/cis.v1n4p106","url":"https://dblp.org/rec/journals/ccsecis/Liu08"}, "url":"URL#5248309" }, { "@score":"1", "@id":"5248310", "info":{"authors":{"author":{"@pid":"76/9098","text":"Huran Liu"}},"title":"The Forming Theory and Computer Simulation of the Rotary Cutting Tools with Helical Teeth and Complex Surfaces.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"158-162","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Liu08a","doi":"10.5539/CIS.V1N4P158","ee":"https://doi.org/10.5539/cis.v1n4p158","url":"https://dblp.org/rec/journals/ccsecis/Liu08a"}, "url":"URL#5248310" }, { "@score":"1", "@id":"5248311", "info":{"authors":{"author":[{"@pid":"77/891","text":"Yongping Liu"},{"@pid":"14/2107","text":"Xiaobo Guo"}]},"title":"Improved Gabor Filtering Application in the Identification of Handwriting.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"90-94","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/LiuG08","doi":"10.5539/CIS.V1N2P90","ee":"https://doi.org/10.5539/cis.v1n2p90","url":"https://dblp.org/rec/journals/ccsecis/LiuG08"}, "url":"URL#5248311" }, { "@score":"1", "@id":"5248312", "info":{"authors":{"author":[{"@pid":"49/1245","text":"Jia Liu"},{"@pid":"37/4190-142","text":"Yang Li 0142"},{"@pid":"80/6061","text":"Liqun Gao"}]},"title":"Application of Particle Swarm Optimization Algorithm to Electric Power Line Overhaul Plan.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"52-55","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/LiuLG08","doi":"10.5539/CIS.V1N2P52","ee":"https://doi.org/10.5539/cis.v1n2p52","url":"https://dblp.org/rec/journals/ccsecis/LiuLG08"}, "url":"URL#5248312" }, { "@score":"1", "@id":"5248313", "info":{"authors":{"author":[{"@pid":"24/9099","text":"Shangchen Liu"},{"@pid":"64/4478","text":"Dakun Zhang"}]},"title":"Panoramic Images Automatically Stitching Algorithm Introduction.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"179-182","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/LiuZ08","doi":"10.5539/CIS.V1N4P179","ee":"https://doi.org/10.5539/cis.v1n4p179","url":"https://dblp.org/rec/journals/ccsecis/LiuZ08"}, "url":"URL#5248313" }, { "@score":"1", "@id":"5248314", "info":{"authors":{"author":[{"@pid":"66/7653","text":"Gang Lv"},{"@pid":"19/7657","text":"Heming Zhao"}]},"title":"A Modified Adaptive Algorithm for Formant Bandwidth in Whisper Conversion.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"121-126","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/LvZ08","doi":"10.5539/CIS.V1N4P121","ee":"https://doi.org/10.5539/cis.v1n4p121","url":"https://dblp.org/rec/journals/ccsecis/LvZ08"}, "url":"URL#5248314" }, { "@score":"1", "@id":"5248315", "info":{"authors":{"author":{"@pid":"15/9099","text":"Mohd Nazri Mahmud"}},"title":"Modelling the Dynamics of Internet Adoption.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"95-103","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Mahmud08","doi":"10.5539/CIS.V1N1P95","ee":"https://doi.org/10.5539/cis.v1n1p95","url":"https://dblp.org/rec/journals/ccsecis/Mahmud08"}, "url":"URL#5248315" }, { "@score":"1", "@id":"5248316", "info":{"authors":{"author":[{"@pid":"08/9099","text":"J. Premalatha"},{"@pid":"96/4677","text":"P. Balasubramanie 0001"}]},"title":"Performance Evaluation of QoS by Combining Medium Access Control and Slow Start in MANETS.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"127-134","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/PremalathaB08","doi":"10.5539/CIS.V1N4P127","ee":"https://doi.org/10.5539/cis.v1n4p127","url":"https://dblp.org/rec/journals/ccsecis/PremalathaB08"}, "url":"URL#5248316" }, { "@score":"1", "@id":"5248317", "info":{"authors":{"author":[{"@pid":"90/9098","text":"K. Premalatha"},{"@pid":"05/5714","text":"A. M. Natarajan"}]},"title":"A New Approach for Data Clustering Based on PSO with Local Search.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"139-145","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/PremalathaN08","doi":"10.5539/CIS.V1N4P139","ee":"https://doi.org/10.5539/cis.v1n4p139","url":"https://dblp.org/rec/journals/ccsecis/PremalathaN08"}, "url":"URL#5248317" }, { "@score":"1", "@id":"5248318", "info":{"authors":{"author":[{"@pid":"79/9098","text":"Chunlan Qiu"},{"@pid":"13/9099","text":"Yonglin Xiao"}]},"title":"The Application of AHP in Electric Resource Evaluation.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"135-140","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/QiuX08","doi":"10.5539/CIS.V1N2P135","ee":"https://doi.org/10.5539/cis.v1n2p135","url":"https://dblp.org/rec/journals/ccsecis/QiuX08"}, "url":"URL#5248318" }, { "@score":"1", "@id":"5248319", "info":{"authors":{"author":[{"@pid":"28/9099","text":"Rajalaxmi Ramasamy Rajammal"},{"@pid":"05/5714","text":"A. M. Natarajan"}]},"title":"A Novel Sanitization Approach for Privacy Preserving Utility Itemset Mining.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"77-82","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/RajalaxmiN08","doi":"10.5539/CIS.V1N3P77","ee":"https://doi.org/10.5539/cis.v1n3p77","url":"https://dblp.org/rec/journals/ccsecis/RajalaxmiN08"}, "url":"URL#5248319" }, { "@score":"1", "@id":"5248320", "info":{"authors":{"author":[{"@pid":"30/9099","text":"Siti Aekbal Salleh"},{"@pid":"22/9099","text":"Wan Mohd Naim Wan Salleh"},{"@pid":"12/9099","text":"Abdul Hadi Nawawi"},{"@pid":"35/9099","text":"Eran Sadek Said Md. Sadek"}]},"title":"The Integration of 3D GIS and Virtual Technology in the Design and Development of Residential Property Marketing Information System (GRPMIS).","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"37-61","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/SallehSNS08","doi":"10.5539/CIS.V1N4P37","ee":"https://doi.org/10.5539/cis.v1n4p37","url":"https://dblp.org/rec/journals/ccsecis/SallehSNS08"}, "url":"URL#5248320" }, { "@score":"1", "@id":"5248321", "info":{"authors":{"author":[{"@pid":"04/9099","text":"Noraini Seman"},{"@pid":"70/9098","text":"Kamaruzaman Jusoff"}]},"title":"Acoustic Pronunciation Variations Modeling for Standard Malay Speech Recognition.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"112-120","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/SemanJ08","doi":"10.5539/CIS.V1N4P112","ee":"https://doi.org/10.5539/cis.v1n4p112","url":"https://dblp.org/rec/journals/ccsecis/SemanJ08"}, "url":"URL#5248321" }, { "@score":"1", "@id":"5248322", "info":{"authors":{"author":[{"@pid":"43/9099","text":"Yulian Shang"},{"@pid":"18/9099","text":"Wuyuan Jia"},{"@pid":"83/6353","text":"Peng Li"},{"@pid":"40/6172","text":"Pengfei Zhu"}]},"title":"Study on the Scheme for RSA Iterative Encryption System.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"120-124","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ShangJLZ08","doi":"10.5539/CIS.V1N3P120","ee":"https://doi.org/10.5539/cis.v1n3p120","url":"https://dblp.org/rec/journals/ccsecis/ShangJLZ08"}, "url":"URL#5248322" }, { "@score":"1", "@id":"5248323", "info":{"authors":{"author":[{"@pid":"03/7894","text":"Arif Shaon"},{"@pid":"w/AndrewWoolf","text":"Andrew Woolf"}]},"title":"An OAIS Based Approach to Effective Long-term Digital Metadata Curation.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"2-16","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ShaonW08","doi":"10.5539/CIS.V1N2P2","ee":"https://doi.org/10.5539/cis.v1n2p2","url":"https://dblp.org/rec/journals/ccsecis/ShaonW08"}, "url":"URL#5248323" }, { "@score":"1", "@id":"5248324", "info":{"authors":{"author":[{"@pid":"94/3731-1","text":"Ashutosh Kumar Singh 0001"},{"@pid":"24/5508","text":"Anand Mohan"}]},"title":"An Efficient Method for Generating Optimal OBDD of Boolean Functions.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"56-62","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/SinghM08","doi":"10.5539/CIS.V1N2P56","ee":"https://doi.org/10.5539/cis.v1n2p56","url":"https://dblp.org/rec/journals/ccsecis/SinghM08"}, "url":"URL#5248324" }, { "@score":"1", "@id":"5248325", "info":{"authors":{"author":[{"@pid":"05/9099","text":"Lixin Tan"},{"@pid":"73/9098","text":"Juemin Liu"}]},"title":"Study of Genetic Algorithms on Optimizing PI Parameters in Prime Mover Simulation System.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"172-178","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/TanL08","doi":"10.5539/CIS.V1N4P172","ee":"https://doi.org/10.5539/cis.v1n4p172","url":"https://dblp.org/rec/journals/ccsecis/TanL08"}, "url":"URL#5248325" }, { "@score":"1", "@id":"5248326", "info":{"authors":{"author":{"@pid":"12/8314","text":"Yuanzhe Wang"}},"title":"Accelerated Routing Strategy of Application Service in the Multi-addressing Mode of College Campus Network.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"62-65","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Wang08","doi":"10.5539/CIS.V1N4P62","ee":"https://doi.org/10.5539/cis.v1n4p62","url":"https://dblp.org/rec/journals/ccsecis/Wang08"}, "url":"URL#5248326" }, { "@score":"1", "@id":"5248327", "info":{"authors":{"author":{"@pid":"51/8880","text":"Dongdong Wang"}},"title":"Architecture of Embedded System Software.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"155-157","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Wang08a","doi":"10.5539/CIS.V1N4P155","ee":"https://doi.org/10.5539/cis.v1n4p155","url":"https://dblp.org/rec/journals/ccsecis/Wang08a"}, "url":"URL#5248327" }, { "@score":"1", "@id":"5248328", "info":{"authors":{"author":[{"@pid":"68/6610","text":"Limin Wang"},{"@pid":"67/4461","text":"Xiongfei Li"}]},"title":"Research on Decision Forest Learning Algorithm.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"17-19","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/WangL08","doi":"10.5539/CIS.V1N2P17","ee":"https://doi.org/10.5539/cis.v1n2p17","url":"https://dblp.org/rec/journals/ccsecis/WangL08"}, "url":"URL#5248328" }, { "@score":"1", "@id":"5248329", "info":{"authors":{"author":[{"@pid":"68/9098","text":"Ruoping Wang"},{"@pid":"75/9098","text":"Liguo Lai"}]},"title":"The Design and Implementation of Precious Test and Quality Control System Based on Delphi.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"125-128","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/WangL08a","doi":"10.5539/CIS.V1N3P125","ee":"https://doi.org/10.5539/cis.v1n3p125","url":"https://dblp.org/rec/journals/ccsecis/WangL08a"}, "url":"URL#5248329" }, { "@score":"1", "@id":"5248330", "info":{"authors":{"author":[{"@pid":"92/5314","text":"Jiali Wang"},{"@pid":"93/3489","text":"Jun Zheng"},{"@pid":"26/7764","text":"Wen-xin Hu"}]},"title":"Model of On-line Room Reservation System Based on Web Service and XPMS.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"42-47","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/WangZH08","doi":"10.5539/CIS.V1N3P42","ee":"https://doi.org/10.5539/cis.v1n3p42","url":"https://dblp.org/rec/journals/ccsecis/WangZH08"}, "url":"URL#5248330" }, { "@score":"1", "@id":"5248331", "info":{"authors":{"author":[{"@pid":"10/2678-2","text":"Rui Wu 0002"},{"@pid":"41/1940","text":"Jianhua Huang"},{"@pid":"21/103","text":"Xianglong Tang"},{"@pid":"02/919","text":"Jiafeng Liu"}]},"title":"A Text Image Segmentation Method Based on Spectral Clustering.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"9-15","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/WuHTL08","doi":"10.5539/CIS.V1N4P9","ee":"https://doi.org/10.5539/cis.v1n4p9","url":"https://dblp.org/rec/journals/ccsecis/WuHTL08"}, "url":"URL#5248331" }, { "@score":"1", "@id":"5248332", "info":{"authors":{"author":[{"@pid":"84/6416","text":"Xiaowen Xu"},{"@pid":"74/1572","text":"Jiayin Wang"}]},"title":"Speedy Algorithm of Public Traffic Route Selection Based on Adaptive Backbone Network.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"12-16","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/XuW08","doi":"10.5539/CIS.V1N1P12","ee":"https://doi.org/10.5539/cis.v1n1p12","url":"https://dblp.org/rec/journals/ccsecis/XuW08"}, "url":"URL#5248332" }, { "@score":"1", "@id":"5248333", "info":{"authors":{"author":[{"@pid":"11/4039","text":"Yunyang Yan"},{"@pid":"55/8453","text":"Zhibo Guo"},{"@pid":"65/2850-1","text":"Jingyu Yang 0001"}]},"title":"Fast Feature Value Searching for Face Detection.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"120-128","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/YanGY08","doi":"10.5539/CIS.V1N2P120","ee":"https://doi.org/10.5539/cis.v1n2p120","url":"https://dblp.org/rec/journals/ccsecis/YanGY08"}, "url":"URL#5248333" }, { "@score":"1", "@id":"5248334", "info":{"authors":{"author":[{"@pid":"36/4658","text":"Gang Yang"},{"@pid":"82/9098","text":"Yongxian Du"},{"@pid":"99/311","text":"Ming Chen"}]},"title":"Computer Aided Investigation towards the Wind Power Generation Potentials of Guangzhou.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"13-19","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/YangDC08","doi":"10.5539/CIS.V1N3P13","ee":"https://doi.org/10.5539/cis.v1n3p13","url":"https://dblp.org/rec/journals/ccsecis/YangDC08"}, "url":"URL#5248334" }, { "@score":"1", "@id":"5248335", "info":{"authors":{"author":[{"@pid":"98/9098","text":"Khursiah Zainal-Mokhtar"},{"@pid":"19/1465","text":"Junita Mohamad-Saleh"},{"@pid":"67/9098","text":"Hafizah Talib"},{"@pid":"97/9098","text":"Najwan Osman-Ali"}]},"title":"Flow Regime Classification Using Artificial Neural Network Trained on Electrical Capacitance Tomography Sensor Data.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"25-32","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/Zainal-MokhtarMTO08","doi":"10.5539/CIS.V1N1P25","ee":"https://doi.org/10.5539/cis.v1n1p25","url":"https://dblp.org/rec/journals/ccsecis/Zainal-MokhtarMTO08"}, "url":"URL#5248335" }, { "@score":"1", "@id":"5248336", "info":{"authors":{"author":[{"@pid":"50/4999","text":"Nasriah Zakaria"},{"@pid":"15/1109","text":"Jeffrey M. Stanton"}]},"title":"The Social Dynamic of Health Disclosure Who Do Patients Tell and When?","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"72-80","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZakariaS08","doi":"10.5539/CIS.V1N1P72","ee":"https://doi.org/10.5539/cis.v1n1p72","url":"https://dblp.org/rec/journals/ccsecis/ZakariaS08"}, "url":"URL#5248336" }, { "@score":"1", "@id":"5248337", "info":{"authors":{"author":[{"@pid":"22/1887","text":"Haibin Zhang"},{"@pid":"86/9098","text":"Seok-jea Ok"}]},"title":"General Framework of Chain Store Information System base on Supply Chain Management Theory.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"150-154","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZhangO08","doi":"10.5539/CIS.V1N4P150","ee":"https://doi.org/10.5539/cis.v1n4p150","url":"https://dblp.org/rec/journals/ccsecis/ZhangO08"}, "url":"URL#5248337" }, { "@score":"1", "@id":"5248338", "info":{"authors":{"author":[{"@pid":"55/2270","text":"Hao Zhang"},{"@pid":"188/7759","text":"Chao Wang"},{"@pid":"71/8986","text":"Xiumin Zhang"}]},"title":"A Prediction Model of China Population Growth.","venue":"Comput. Inf. Sci.","volume":"1","number":"2","pages":"27-33","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZhangWZ08","doi":"10.5539/CIS.V1N2P27","ee":"https://doi.org/10.5539/cis.v1n2p27","url":"https://dblp.org/rec/journals/ccsecis/ZhangWZ08"}, "url":"URL#5248338" }, { "@score":"1", "@id":"5248339", "info":{"authors":{"author":[{"@pid":"06/9099","text":"Zhenhui Zhang"},{"@pid":"40/9099","text":"Shaohong Yin"}]},"title":"Hough Transform and Its Application in Vehicle License Plate Tilt Correction.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"116-119","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZhangY08","doi":"10.5539/CIS.V1N3P116","ee":"https://doi.org/10.5539/cis.v1n3p116","url":"https://dblp.org/rec/journals/ccsecis/ZhangY08"}, "url":"URL#5248339" }, { "@score":"1", "@id":"5248340", "info":{"authors":{"author":[{"@pid":"21/9099","text":"Chungsheng Zhang"},{"@pid":"42/807","text":"Liyan Zhuang"}]},"title":"New Path Filling Method on Data Preprocessing in Web Mining.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"112-115","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZhangZ08","doi":"10.5539/CIS.V1N3P112","ee":"https://doi.org/10.5539/cis.v1n3p112","url":"https://dblp.org/rec/journals/ccsecis/ZhangZ08"}, "url":"URL#5248340" }, { "@score":"1", "@id":"5248341", "info":{"authors":{"author":[{"@pid":"33/8898","text":"Lingxia Zhang"},{"@pid":"94/936","text":"Hongzhi Zhang"},{"@pid":"75/8776","text":"Yinglin Li"}]},"title":"The New Development of CAD in Clothing.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"104-106","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZhangZL08","doi":"10.5539/CIS.V1N3P104","ee":"https://doi.org/10.5539/cis.v1n3p104","url":"https://dblp.org/rec/journals/ccsecis/ZhangZL08"}, "url":"URL#5248341" }, { "@score":"1", "@id":"5248342", "info":{"authors":{"author":[{"@pid":"96/9098","text":"Fengzhi Zhao"},{"@pid":"46/1953","text":"Feng Bao"}]},"title":"Application of Image Recognition Technology in Sports Competition.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"52-56","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZhaoB08","doi":"10.5539/CIS.V1N1P52","ee":"https://doi.org/10.5539/cis.v1n1p52","url":"https://dblp.org/rec/journals/ccsecis/ZhaoB08"}, "url":"URL#5248342" }, { "@score":"1", "@id":"5248343", "info":{"authors":{"author":[{"@pid":"16/9099","text":"Gaoying Zhi"},{"@pid":"35/8489","text":"Wencheng Guo"}]},"title":"Study on the Lane Mark Identification Method in Intelligent Vehicle Navigation.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"163-165","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZhiG08","doi":"10.5539/CIS.V1N4P163","ee":"https://doi.org/10.5539/cis.v1n4p163","url":"https://dblp.org/rec/journals/ccsecis/ZhiG08"}, "url":"URL#5248343" }, { "@score":"1", "@id":"5248344", "info":{"authors":{"author":[{"@pid":"03/8595","text":"Liangwei Zhong"},{"@pid":"94/9098","text":"Kangmin Chen"},{"@pid":"19/4324","text":"Jing Ni"},{"@pid":"11/9099","text":"Anyang He"}]},"title":"Research of Information System of Monitoring Remote on Distributed Micro-turbine.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"73-76","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZhongCNH08","doi":"10.5539/CIS.V1N3P73","ee":"https://doi.org/10.5539/cis.v1n3p73","url":"https://dblp.org/rec/journals/ccsecis/ZhongCNH08"}, "url":"URL#5248344" }, { "@score":"1", "@id":"5248345", "info":{"authors":{"author":[{"@pid":"39/9099","text":"Tianbao Zhuang"},{"@pid":"72/4751","text":"Hong Zhao"},{"@pid":"09/6459","text":"Zheng Tang"}]},"title":"Revelations of the New Developments of Brain Science on Early Education.","venue":"Comput. Inf. Sci.","volume":"1","number":"3","pages":"60-65","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZhuangZT08","doi":"10.5539/CIS.V1N3P60","ee":"https://doi.org/10.5539/cis.v1n3p60","url":"https://dblp.org/rec/journals/ccsecis/ZhuangZT08"}, "url":"URL#5248345" }, { "@score":"1", "@id":"5248346", "info":{"authors":{"author":[{"@pid":"47/8657","text":"Ali Hussein Saleh Zolait"},{"@pid":"98/7038","text":"Ainin Sulaiman"}]},"title":"Incorporating the Innovation Attributes Introduced by Rogers'Theory into Theory of Reasoned Action: An Examination of Internet Banking Adoption in Yemen.","venue":"Comput. Inf. Sci.","volume":"1","number":"1","pages":"36-51","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZolaitS08","doi":"10.5539/CIS.V1N1P36","ee":"https://doi.org/10.5539/cis.v1n1p36","url":"https://dblp.org/rec/journals/ccsecis/ZolaitS08"}, "url":"URL#5248346" }, { "@score":"1", "@id":"5248347", "info":{"authors":{"author":[{"@pid":"91/9098","text":"Yong Zulina Zubairi"},{"@pid":"34/9099","text":"Fakhrulrozi Hussain"},{"@pid":"69/9098","text":"Abdul Ghapor Hussin"}]},"title":"An Alternative Analysis of Two Circular Variables via Graphical Representation.","venue":"Comput. Inf. Sci.","volume":"1","number":"4","pages":"3-8","year":"2008","type":"Journal Articles","access":"open","key":"journals/ccsecis/ZubairiHH08","doi":"10.5539/CIS.V1N4P3","ee":"https://doi.org/10.5539/cis.v1n4p3","url":"https://dblp.org/rec/journals/ccsecis/ZubairiHH08"}, "url":"URL#5248347" } ] } } } )