3 | -- | 16 | Rashmi Mantri, Junkang Feng. Identification of the Most Specific Information that a Signal Carries by Using Barwise-Seligman Theory of Information Channel |
17 | -- | 23 | Muhammad Nabeel Talib, Shuqin Cai, Muhai Hu. Voice Browsing Approach to E-Business Access: A Blind s Perspective |
24 | -- | 34 | Jakia Afruz, Va Juanna Wilson, Scott E. Umbaugh. Frequency Domain Pseudo-color to Enhance Ultrasound Images |
35 | -- | 48 | Jie Xu, Luiz Fernando Capretz, Danny Ho. Exploratory Analysis of Quality Practices in Open Source Domain |
49 | -- | 52 | Mingtao Shi. Software Functional Testing from the Perspective of Business Practice |
53 | -- | 59 | Apostolos Axenopoulos, Charalampos Doulaverakis, Nicholas Protogeros, Panayiotis Tahinakis, John Mylonakis. The Safety Issue in a Web Travel Booking Services Scenario Based on Business Process Execution Language |
60 | -- | 71 | Zaiyong Tang, Kallol Kumar Bagchi. Globally Convergent Particle Swarm Optimization via Branch-and-Bound |
72 | -- | 79 | Siti Zulaiha Ahmad, Arifah Fasha Rosmani, Mohammad Hafiz Ismail, Suraya Shakeri. An Introductory of Mental Arithmetic Using Interactive Multimedia for Pre-School Children |
80 | -- | 92 | Olusegun Folorunso, Oluwatobi O. Akande, Adewale Opeoluwa Ogunde, Olufunke R. Vincent. ID-SOMGA: A Self Organising Migrating Genetic Algorithm-Based Solution for Intrusion Detection |
104 | -- | 108 | Ruijuan Hu. Medical Data Mining Based on Association Rules |
116 | -- | 124 | Guohua Chen. Fuzzy Data Decision Support in Portfolio Selection: a Possibilistic Safety-first Model |
125 | -- | 130 | Vinodu George, M. P. Sebastian. An Efficient Homomorphic Coercion Resistant and E2E Verifiable Voting Scheme |
131 | -- | 134 | Chaoji Chen, Na Zhao, Hongtao Jin, Yongjin Zhao. Design and Implementation of the Servo Control System Based on DSP |
135 | -- | 154 | Ahmed Yakout A. Mohamed, Abdel Fatah A. Hegazy, Ahmed R. Dawood. Aspect Oriented Requirements Engineering |
155 | -- | 158 | Rongbo Cui, Xiaobing Xu. The Research and Application of the Virtualization and Clustering on Linux Server |
171 | -- | 174 | Gang Lv. Acoustic Characteristics Analysis on the Tracheoesophageal Speech |
175 | -- | 186 | Amir Mohamed Talib, Rodziah Binti Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad. Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review |
187 | -- | 199 | Lin Yao, Chengjie Sun, Lu Li, Zhixin Hao, Xiaolong Wang. Hybrid learning of Syntactic and Semantic Dependencies |
200 | -- | 207 | M. R. S. Mitra, M. N. Santhi, M. V. P. Kumar, P. R. Sudha. Sensor Networks Routing |
208 | -- | 214 | Mengxin Li, Xinghua Xia, Ying Zhang, Tonglin Liu. A Path Planning Method Based on Adaptive Genetic Algorithm for a Shape-shifting Robot |
215 | -- | 223 | Arulanand Natarajan, S. Subramanian. Payload Inspection Using Parallel Bloom Filter in Dual Core Processor |
224 | -- | 228 | Yulian Shang, Min Feng, Peng Li, Kaiquan Shi. Application of the Central Encryption System in the Dynamic Secret Sharing Scheme (II) |
229 | -- | 235 | Samir Kumar Bandyopadhyay, Tuhin Utsab Paul, Avishek Raychoudhury. A Novel Steganographic Technique Based on 3D-DCT Approach |
236 | -- | 239 | Gang Wang. Methodology Research of Ontology Building in Semantic Web |
240 | -- | 251 | Olusegun Folorunso, Adio T. Akinwale, Aderonke Ikuomola. Using Visual Analytics to Develop Situation Awareness in Network Intrusion Detection System |
252 | -- | 256 | Yuehua Zhao, Yu Tao. Research of Dynamic Information Flow Monitoring Based on Finite State Automaton |
264 | -- | 0 | Juan Tian, Xiujuan Wang, Lanhua Zhang. Design and Application of the RFID Technology in ERP |