Journal: Computer and Information Science

Volume 4, Issue 6

2 -- 17Muna F. Al-sammaraie. Medical Images Compression Using Modified SPIHT Algorithm and Multiwavelets Transformation
18 -- 27Hamid Reza Mohebbi, Omid Kashefi, Mohsen Sharifi. ZIVM: A Zero-Copy Inter-VM Communication Mechanism for Cloud Computing
28 -- 37Fanjun Li, Ying Li. Cascade-Correlation Algorithm with Trainable Activation Functions
38 -- 47Mohammed Abbas Fadhil Al-Husainy. A New Image Steganography Based on Decimal-Digits Representation
48 -- 56Nayereh Ghahreman, Ahmad Baraani-Dastjerdi. Semi-Automatic Labeling of Training Data Sets in Text Classification
57 -- 65Kai Cheng, Hongjun Zhang, Luyuan Zhang, Liang Wang. The Operation Effectiveness Evaluation Based on Statistic Analysis
66 -- 74Benjamin Tatira, Lillias Hamufari Natsai Mutambara, Conilius J. Chagwiza, Lovemore J. Nyaumwe. Computerized Summative Assessment of Multiple-choice Questions: Exploring Possibilities with the Zimbabwe School Examination Council Grade 7 Assessments
75 -- 82O. Obe, O. O. Sangodoyin, T. A. Lasisi, D. K. Shangodoyin, O. O. Adedoyin. ICT: Opportunities and Challenges of Third World Tertiary Institutions
83 -- 104Rahul Malhotra, Minu Sethi, Parminder Kumar Luthra. Denoising, Segmentation and Characterization of Brain Tumor from Digital MR Images
105 -- 0Xiaoyan Ma, Hao Zou, Yujuan Li. Research and Application of Contingency Plan Based on Hospital Network and Information System Security

Volume 4, Issue 5

2 -- 13Aliaa A. A. Youssif, Shereen A. Hussein, Ahmed S. Ibrahim. Three-Dimensional Detection of Pulmonary Nodules in Chest CT Images
14 -- 19Ruijuan Hu. Medical Data Mining Based on Decision Tree Algorithm
20 -- 27Nour-Mohammad Yaghoubi, Badroddin Oraee Yazdani, Nasir Ahoorani, Seyyed Ali Banihashemi. Information Technology Infrastructures and Knowledge Management: Towards Organizational Excellence
28 -- 35Wanhai Geng, Yiming Chen, Yulian Li, Dong Wang. Wavelet Method for Nonlinear Partial Differential Equations of Fractional Order
36 -- 44Rahul Malhotra, Subhash Singh, Harkirtan Singh, Parminder Kumar Luthra. Analysis of Intensity Modulation and Switched Fault Techniques for Different Optical Fiber Cables
45 -- 52Xuemei Bai, Bin Guo, Zhiyong An. Design of the Wide-view Collimator Based on ZEMAX
53 -- 58Puxi Hu, Wei Qian, Jian Liao. Intelligent Control System of CNC Mill Machineing Based on the Feed-Driven Linear Motor
59 -- 70Wen Liu, Ligong Zhang, Xiangzhong Bai, Feng Liu. Dynamic Response of Electromagnetic Launcher's Rail Subjected to Cosine Pressure
71 -- 77Haijian Yang. Design of Time Division MUX and DEMUX for Large Optical Transceiver
78 -- 91Abdallah Chouarfia, Hafida Bouziane. Dynamic Maintenance and Evolution of Critical Components-Based Software Using Multi Agent Systems
92 -- 96Siqin Qimuge, Chunsheng Zhang. The Necessity and the Scheme of Super Cloud and Super Cloud Language Existence
97 -- 103Zhao MingXia, Qiuyan He. A Simulation System of Social Economic
104 -- 110Ramanathan. P, Pradip Manjrekar. P. Wireless Sensor Network for Continuous Monitoring a Patient's Physiological Conditions Using ZigBee
111 -- 0Jianwen Li, Yuanyuan Hou, Jianghong Li. Study on the Four-channel Skin-hearing Aid Based on Morse Codes

Volume 4, Issue 4

2 -- 9David Salb, Hershey H. Friedman, Linda Weiser Friedman. The Role of Information Technology in Fulfilling the Promise of Corporate Social Responsibility
10 -- 28Shafinah Kamarudin, Mohd Ikram Mohammad. File Security based on Pretty Good Privacy (PGP) Concept
29 -- 45Pedro Ivan Tello Flores, Luis Enrique Colmenares Guillén, Omar Ariosto Niño Prieto. Approach of RSOR Algorithm Using HSV Color Model for Nude Detection in Digital Images
46 -- 57Marwa Salah Farhan, Mohamed E. Marie, Laila Mohamed El Fangary, Yehia K. Helmy. An Integrated Conceptual Model for Temporal Data Warehouse Security
72 -- 82Ali Bazghandi, Ali A. Pouyan. An Agent-Based Simulation Model for Urban Traffic System
83 -- 89Liang Chen, Yingqing Guo. Design of the Distributed Control System Based on CAN Bus
90 -- 99Ahmad Jawdat, Qasem Obeidat, Alaa Aljanaby. On The Design of User Experience Based Persuasive Systems
100 -- 108Mojgan Taheri, Mohammad Ali Afshar Kazemi, Abbas Toloui Ashlaghi. Improvement of Mobility Management in Heterogeneous Wireless Networks by Using Multiple Attribute Decision Making
109 -- 119Lim Kah Seng, Norafida Ithnin, Hazinah Kutty Mammi. Identifying the Re-usability of Triangle Scheme and Intersection Scheme on Mobile Device
120 -- 122Feng Bao, Fengzhi Zhao. Study on the E-government Call Center System Based on SOA
123 -- 133Shaimaa Ezzat Salama, Mohamed I. Marie, Laila Mohamed El Fangary, Yehia K. Helmy. Web Server Logs Preprocessing for Web Intrusion Detection
145 -- 148Ruicheng Li. Analysis on the Method and Importance of Practical Teaching in Vocational College
149 -- 0Kavita Saini, Abdul Wahid, G. N. Purohit. Designing And Implementing WBIs for Algorithms

Volume 4, Issue 3

3 -- 17Ibrahim A. Alghamdi, Robert Goodwin, Giselle Rampersad. E-Government Readiness Assessment for Government Organizations in Developing Countries
18 -- 32Huiran Zhang, Yantao Li, Zheng Tang. Study on Brainwave Responses from Ears: the Event-related Synchronization under the Auditory Stimulus
33 -- 42Samer M. Barakat, Khalil Yaghi, Zaina Hamdan. MIS Students Perception of Most Wanted MIS Job Market Skills
43 -- 59Latef Oladimeji Yusuf, Olusegun Folorunso, Adio T. Akinwale, I. A. Adejumobi. Visualizing and Assessing a Compositional Approach to Service-Oriented Business Process Design Using Unified Modelling Language (UML)
60 -- 66Changyong Liang, Enqiao Zhang, Yong Ding, Xiaowen Qi. Comprehensive Evaluation System and Selection Method of Tax Software
67 -- 75Hanadi Al-Zegaier, Hasan Ali Al-Zu'bi, Samer Barakat. Investigating the Link between Web Data Mining and Strategic Human Resources Planning
76 -- 87Saeid Jorfi, Khalil Md Nor, Lotfi Najjar. Assessing the Impact of IT Connectivity and IT Capability on IT-Business Strategic Alignment: An Empirical Study
88 -- 94Min Feng, Zhenyan Wang. A Genetic K-means Clustering Algorithm Based on the Optimized Initial Centers
95 -- 98Mingtao Shi. Capturing Software Requirements of Business Processes in Multinational Firms: A Conceptual Framework for Practitioners
99 -- 105Baoling Qin, Minwei Yang, Yao He. Research and Development of the Thin Terminal Technology of Broadband Computer
106 -- 115Rahmat Widia Sembiring, Jasni Mohamad Zain. The Design of Pre-Processing Multidimensional Data Based on Component Analysis
116 -- 124Deyuan Zhang, Bingquan Liu, Chengjie Sun, Xiaolong Wang. Learning to Combine Kernels for Object Categorization
125 -- 130Z. Sakhi, Abderrahim Tragha, R. Kabil, M. Bennai. Grover Algorithm Applied to Four Qubits System
131 -- 137Kone Forokoro, Zhong Xie. WebGIS to Managing Natural Resource: Case of Flooded Pasture in Lake Débo and Walado Débo
138 -- 150Nabil Keskes, Ahmed Lehireche, Abdellatif Rahmoun. Web Services Selection Based on Mixed Context and Quality of Service Ontology
151 -- 156Peng Li. Study on the Wireless Ad Hoc Network Secure Routing Based on the SAR Technology
157 -- 168Karim Q. Hussein, Ayman J. Nsour. Multimedia Enhancing Computer Based Training Modules for The Deaf, Supported by Case Study
169 -- 180Yun Niu, Xuguang Wu, Junhong He, Liang Hong. Integrated Synthesis of Control and Bandwidth Scheduling on Networked Control Systems
181 -- 183Yujuan Li, Mei Wang, Zhunan Zhou. A NCRE-oriented Teaching Mode
184 -- 0Abbas Toloie Eshlaghy, Alireza Pourebrahimi, Azam Farmanara. Pathology of E-commerce with an Approach to Information Technology (A Case Study: Knauf Iran Company)

Volume 4, Issue 2

2 -- 16Rusli Abdullah, Zainab Mohamed Shah, Amir Mohamed Talib. A Framework of Tools for Managing Software Architecture Knowledge
17 -- 20Mingtao Shi. Necessities and Tactics of Tool-Based Software Testing
34 -- 38Jing Huang, Deming Liu, Cheng Zeng. 10 Gb/s WDM-PON Using Downstream OFDM and Upstream OOK
39 -- 54Rahul Malhotra, Narinder Singh, Yaduvir Singh. Genetic Algorithms: Concepts, Design for Optimization of Process Controllers
55 -- 63Huey Fang Ong, Norwati Mustapha, Md Nasir Sulaiman. Integrative Gene Selection for Classification of Microarray Data
64 -- 74Mojtaba Karami, Marjan Kuchaki Rafsanjani, Amir Hosein Fathi Navid, Yaeghoob Yavari. QAIDS: Quantitative and Agent based Intrusion Detection System
75 -- 80K. Duraiswamy, B. Jayanthi. A New Approach to Discover Periodic Frequent Patterns
88 -- 95Sara Sahebdel, Hamidreza Bakhshi. Relay Selection Schemes for Cooperative Communications Systems Sensor Networks
96 -- 101Edem E. Williams, Bassey Eyo, Stephen Akpan. Linden Labs Second Life: Understanding the Business Model and Sources of Commercial and Social Success or Decline of Second Life
102 -- 114Seyyed Mohammad Reza Farshchi, Seyyede Aliye NezhadHoseini, Fateme Mohammadi. A Novel Implementation of G-Fuzzy Logic Controller Algorithm on Mobile Robot Motion Planning Problem
115 -- 124Aliaa A. A. Youssif, Wesam A. A. Asker. Automatic Facial Expression Recognition System Based on Geometric and Appearance Features
125 -- 131Huafeng Xie, Fang Wu, Xuying Lu. Study on the Optimization Design of the Subject Indexing Based on the Word-frequency Statistics
132 -- 147Latef Oladimeji Yusuf, Olusegun Folorunso, Adio T. Akinwale, I. A. Adejumobi. Service Oriented Application in Agent Based Virtual Knowledge Community
148 -- 151Lanhua Zhang, Xiaochen Xu. A Community Public Health System Design based on HL7 Criterions

Volume 4, Issue 1

3 -- 13Vahid Garousi. Experience in Developing a Robot Control Software
14 -- 27Thanongsak Aneksrup, Pipat Hiranvanichakorn. Efficient Group Key Agreement on Tree-based Braid Groups
28 -- 41Waheed Yasin, Hamidah Ibrahim, Nor Asila Wati Abdul Hamid, Nur Izura Udzir. A Systematic Review of File Sharing in Mobile Devices Using Peer-To-Peer Systems
42 -- 52S. Karpagachelvi, M. Arthanari, M. Sivakumar. Classification of ECG Signals Using Extreme Learning Machine
53 -- 59Edem E. Williams, Essien Eyo. Building a Cost Effective Network for E-learning in Developing Countries
60 -- 67Mazen Abu-Zaher. Modified Least Significant Bit (MLSB)
68 -- 71Ling Zhang, Yucai Dong, Hongtao Shi, Ping Chen, Xuhui Li. The Extraction of the FAE Image Profilogram Based on the Grey Level Thresholding
72 -- 78Abbas Toloie Eshlaghy, Alireza Pourebrahimi, Babak Zendehdel Nobari. Presenting a Model for Ranking Organizations Based on the Level of the Information Security Maturity
79 -- 89Olusegun Folorunso, Gladys Adewale, Adewale Opeoluwa Ogunde, Julius Olatunji Okesola. Pinch Analysis as a Knowledge Management Tool for Optimization in Supply Chain
90 -- 99Qiang Zhang, Jun Zhou, Xiaozhou Yu. A Kind of Low-cost Non-intrusive Autonomous Fault Emulation System
110 -- 115Feng Xue, Gang Lv. Tracking Formant Trajectory of Tracheoesophageal Speech Using Hidden Dynamic Model
130 -- 141Ali Keshavarzi, Fereydoon Sarmadian, Reza Labbafi, Abbas Ahmadi. Developing Pedotransfer Functions for Estimating Field Capacity and Permanent Wilting Point Using Fuzzy Table Look-up Scheme
142 -- 150Shuhua Jiang. Research on Image Acquisition System Based on Binocular Stereo Vision
151 -- 159Farzaneh Pakzad, Marjan Kuchaki Rafsanjani. Intrusion Detection Techniques for Detecting Misbehaving Nodes
160 -- 162Dan Wang, Yufei Zhang. A Dynamic Secret Sharing Scheme Based on Factorization
163 -- 171E. Vinod kumar, L. v. v. r. k. Sriharsha, Suresh Chandra Satapathy, P. V. G. D. Prasad Reddy. PSO Clustering with Preprocessing of Data Using Artificial Immune System
172 -- 185Alireza Jolfaei, Abdolrasoul Mirghadri. Image Encryption Using Chaos and Block Cipher
186 -- 190Zhaoxing Liu, Ning Zhang. One Improved Collaborative Filtering Method Based on Information Transformation
191 -- 197Wan Malini Wan Isa, Jamaliah Abdul Hamid, Hamidah Ibrahim, Mohd Hasan Selamat, Rusli Abdullah, Nurul Amelina Nasharuddin. Testing the Accuracy of Text Deconstruction using PTree tool
198 -- 204Juan Tian, Cheng Wang, Xixue Zhang. Design of the Storage Battery Online Monitoring System
205 -- 216Roslina Ibrahim, Rasimah Che Mohd Yusoff, Hasiah Mohamed Omar, Azizah Jaafar. Students Perceptions of Using Educational Games to Learn Introductory Programming
224 -- 0Lanhua Zhang. Studies of the HMIS Based on HL7 Criterions