Journal: Computer and Information Science

Volume 4, Issue 1

3 -- 13Vahid Garousi. Experience in Developing a Robot Control Software
14 -- 27Thanongsak Aneksrup, Pipat Hiranvanichakorn. Efficient Group Key Agreement on Tree-based Braid Groups
28 -- 41Waheed Yasin, Hamidah Ibrahim, Nor Asila Wati Abdul Hamid, Nur Izura Udzir. A Systematic Review of File Sharing in Mobile Devices Using Peer-To-Peer Systems
42 -- 52S. Karpagachelvi, M. Arthanari, M. Sivakumar. Classification of ECG Signals Using Extreme Learning Machine
53 -- 59Edem E. Williams, Essien Eyo. Building a Cost Effective Network for E-learning in Developing Countries
60 -- 67Mazen Abu-Zaher. Modified Least Significant Bit (MLSB)
68 -- 71Ling Zhang, Yucai Dong, Hongtao Shi, Ping Chen, Xuhui Li. The Extraction of the FAE Image Profilogram Based on the Grey Level Thresholding
72 -- 78Abbas Toloie Eshlaghy, Alireza Pourebrahimi, Babak Zendehdel Nobari. Presenting a Model for Ranking Organizations Based on the Level of the Information Security Maturity
79 -- 89Olusegun Folorunso, Gladys Adewale, Adewale Opeoluwa Ogunde, Julius Olatunji Okesola. Pinch Analysis as a Knowledge Management Tool for Optimization in Supply Chain
90 -- 99Qiang Zhang, Jun Zhou, Xiaozhou Yu. A Kind of Low-cost Non-intrusive Autonomous Fault Emulation System
110 -- 115Feng Xue, Gang Lv. Tracking Formant Trajectory of Tracheoesophageal Speech Using Hidden Dynamic Model
130 -- 141Ali Keshavarzi, Fereydoon Sarmadian, Reza Labbafi, Abbas Ahmadi. Developing Pedotransfer Functions for Estimating Field Capacity and Permanent Wilting Point Using Fuzzy Table Look-up Scheme
142 -- 150Shuhua Jiang. Research on Image Acquisition System Based on Binocular Stereo Vision
151 -- 159Farzaneh Pakzad, Marjan Kuchaki Rafsanjani. Intrusion Detection Techniques for Detecting Misbehaving Nodes
160 -- 162Dan Wang, Yufei Zhang. A Dynamic Secret Sharing Scheme Based on Factorization
163 -- 171E. Vinod kumar, L. v. v. r. k. Sriharsha, Suresh Chandra Satapathy, P. V. G. D. Prasad Reddy. PSO Clustering with Preprocessing of Data Using Artificial Immune System
172 -- 185Alireza Jolfaei, Abdolrasoul Mirghadri. Image Encryption Using Chaos and Block Cipher
186 -- 190Zhaoxing Liu, Ning Zhang. One Improved Collaborative Filtering Method Based on Information Transformation
191 -- 197Wan Malini Wan Isa, Jamaliah Abdul Hamid, Hamidah Ibrahim, Mohd Hasan Selamat, Rusli Abdullah, Nurul Amelina Nasharuddin. Testing the Accuracy of Text Deconstruction using PTree tool
198 -- 204Juan Tian, Cheng Wang, Xixue Zhang. Design of the Storage Battery Online Monitoring System
205 -- 216Roslina Ibrahim, Rasimah Che Mohd Yusoff, Hasiah Mohamed Omar, Azizah Jaafar. Students Perceptions of Using Educational Games to Learn Introductory Programming
224 -- 0Lanhua Zhang. Studies of the HMIS Based on HL7 Criterions