Journal: Computer and Information Science

Volume 3, Issue 4

3 -- 16Rashmi Mantri, Junkang Feng. Identification of the Most Specific Information that a Signal Carries by Using Barwise-Seligman Theory of Information Channel
17 -- 23Muhammad Nabeel Talib, Shuqin Cai, Muhai Hu. Voice Browsing Approach to E-Business Access: A Blind s Perspective
24 -- 34Jakia Afruz, Va Juanna Wilson, Scott E. Umbaugh. Frequency Domain Pseudo-color to Enhance Ultrasound Images
35 -- 48Jie Xu, Luiz Fernando Capretz, Danny Ho. Exploratory Analysis of Quality Practices in Open Source Domain
49 -- 52Mingtao Shi. Software Functional Testing from the Perspective of Business Practice
53 -- 59Apostolos Axenopoulos, Charalampos Doulaverakis, Nicholas Protogeros, Panayiotis Tahinakis, John Mylonakis. The Safety Issue in a Web Travel Booking Services Scenario Based on Business Process Execution Language
60 -- 71Zaiyong Tang, Kallol Kumar Bagchi. Globally Convergent Particle Swarm Optimization via Branch-and-Bound
72 -- 79Siti Zulaiha Ahmad, Arifah Fasha Rosmani, Mohammad Hafiz Ismail, Suraya Shakeri. An Introductory of Mental Arithmetic Using Interactive Multimedia for Pre-School Children
80 -- 92Olusegun Folorunso, Oluwatobi O. Akande, Adewale Opeoluwa Ogunde, Olufunke R. Vincent. ID-SOMGA: A Self Organising Migrating Genetic Algorithm-Based Solution for Intrusion Detection
104 -- 108Ruijuan Hu. Medical Data Mining Based on Association Rules
116 -- 124Guohua Chen. Fuzzy Data Decision Support in Portfolio Selection: a Possibilistic Safety-first Model
125 -- 130Vinodu George, M. P. Sebastian. An Efficient Homomorphic Coercion Resistant and E2E Verifiable Voting Scheme
131 -- 134Chaoji Chen, Na Zhao, Hongtao Jin, Yongjin Zhao. Design and Implementation of the Servo Control System Based on DSP
135 -- 154Ahmed Yakout A. Mohamed, Abdel Fatah A. Hegazy, Ahmed R. Dawood. Aspect Oriented Requirements Engineering
155 -- 158Rongbo Cui, Xiaobing Xu. The Research and Application of the Virtualization and Clustering on Linux Server
171 -- 174Gang Lv. Acoustic Characteristics Analysis on the Tracheoesophageal Speech
175 -- 186Amir Mohamed Talib, Rodziah Binti Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad. Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review
187 -- 199Lin Yao, Chengjie Sun, Lu Li, Zhixin Hao, Xiaolong Wang. Hybrid learning of Syntactic and Semantic Dependencies
200 -- 207M. R. S. Mitra, M. N. Santhi, M. V. P. Kumar, P. R. Sudha. Sensor Networks Routing
208 -- 214Mengxin Li, Xinghua Xia, Ying Zhang, Tonglin Liu. A Path Planning Method Based on Adaptive Genetic Algorithm for a Shape-shifting Robot
215 -- 223Arulanand Natarajan, S. Subramanian. Payload Inspection Using Parallel Bloom Filter in Dual Core Processor
224 -- 228Yulian Shang, Min Feng, Peng Li, Kaiquan Shi. Application of the Central Encryption System in the Dynamic Secret Sharing Scheme (II)
229 -- 235Samir Kumar Bandyopadhyay, Tuhin Utsab Paul, Avishek Raychoudhury. A Novel Steganographic Technique Based on 3D-DCT Approach
236 -- 239Gang Wang. Methodology Research of Ontology Building in Semantic Web
240 -- 251Olusegun Folorunso, Adio T. Akinwale, Aderonke Ikuomola. Using Visual Analytics to Develop Situation Awareness in Network Intrusion Detection System
252 -- 256Yuehua Zhao, Yu Tao. Research of Dynamic Information Flow Monitoring Based on Finite State Automaton
264 -- 0Juan Tian, Xiujuan Wang, Lanhua Zhang. Design and Application of the RFID Technology in ERP