Journal: Int. J. Adv. Comp. Techn.

Volume 2, Issue 5

1 -- 12Osamu Mizuno, Hideaki Hata. A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis
13 -- 24Ravi Rastogi, Nitin, Durg Singh Chauhan. Fast Interconnections: A Case Tool for Developing Fault-tolerant Multi-stage Interconnection Networks
25 -- 41Ali Modirkhazeni, Norafida Ithnin, Othman Ibrahim. Empirical Study on Secure Routing Protocols in Wireless Sensor Networks
42 -- 52Dorin Carstoiu, Elena Lepadatu, Mihai Gaspar. Hbase - non SQL Database, Performances Evaluation
61 -- 65Amir Sabbagh Molahosseini, M. Kuchaki Rafsanjani, S. H. Ghafouri, M. Hashemipour. A Reduced-Area Reverse Converter for the Moduli Set {2:::n:::, 2:::n:::-1, 2:::2n-1:::-1}
75 -- 79Haiyan Zhu, Quansheng Dou, Ping Jiang. Further Results on Fault Classes in Boolean Specifications
80 -- 88J. Joshua Thomas, Ahamad Tajudin Abdul Khader, Bahari Belaton, Amy Leow. VIZSolution: An Interface Tool to Solve Real-world Examination Timetabling Problem
89 -- 98Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta, Srishti Sarin. Enhancing E-mail Security by CAPTCHA based Image Grid Master Password
99 -- 110Mohammad Reza Moohebat, Mohammad Davarpanah Jazi. A Comparative Study of Critical Success Factors (CSFs) in Implementation of ERP in Developed and Developing Countries
111 -- 117Muththolib Sidheeq, Ali Dehghantanha, Geetha Kananparan. Utilizing Trusted Platform Module to Mitigate Botnet Attacks
125 -- 128Bindiya M. Varghese, A. Unnikrishnan, Paulose Jacob, Justin Jacob. Correlation Clustering Model for Crime Pattern Detection
129 -- 139Ami T. Choksi, Devesh C. Jinwala. Improving Semantic Matching of Grid Resources Using Refined Ontology with Complement Class
140 -- 152Fadhil Salman Abed, Nada Abdul Aziz Mustafa. A Proposed Technique for Information Hiding Based on DCT
153 -- 165Azzam A. Marouf, Ali H. Hamad, Sameer A. Abdelrazzak. A Developed Modified OSAP Controller with Repetitive Control Action for UPS
166 -- 173Bahaa I. Kazem, Ali H. Hamad, Mustafa M. Mozael. Modified Vector Field Histogram with a Neural Network Learning Model for Mobile Robot Path Planning and Obstacle Avoidance

Volume 2, Issue 4

6 -- 16Jing-Chiou Liou, Sujith Bhashyam. On Improving Feasibility and Security Measures of Online Authentication
17 -- 29Jingtao Zhou, Haicheng Yang, Mingwei Wang, Rongxia Zhang, Min Shi. A Review of Enterprise Information Integration from Content Level and System Level Perspectives
36 -- 46Sara-Meshkizadeh, Amir Masoud Rahmani. Webpage Classification based on Compound of Using HTML Features & URL Features and Features of Sibling Pages
47 -- 56J. G. Flores, G. Urquiza, J. A. Hernandez. Inverse neural Network to Optimal Performance of the hydraulic Turbine Runner Blades
67 -- 76Hao Chen, Jianhua Sun, Qianjie Zhang, Ke Mao. An Execution-flow Based Method for Detecting Cross-Site Scripting of Ajax Applications
77 -- 87Deepak Dahiya, Pooja Jain. Enterprise Systems Development: Impact of Various Software Development Methodologies
88 -- 94Sook-Young Choi, Seong-Hun Ahn. Quality Assurance for Online Programs
95 -- 106Jamaiah Haji Yahaya, Aziz Deraman. Measuring the Unmeasurable Characteristics of Software Product Quality
107 -- 114Urmila Shrawankar, Vilas Thakare. Voice Activity Detector and Noise Trackers for Speech Recognition System in Noisy Environment
115 -- 122Fatemeh Kafili Kasmaee, Ramin Nassiri, Gholamreza Latif Shabgahi. Achieving CMMI Maturity Level 3 by Implementing FEAF Reference Models
123 -- 127Saif D. Salman, Ahmed A. Bahrani. Segmentation of Tumor Tissue in Gray Medical Images Using Watershed Transformation Method
128 -- 139Rahul Malhotra, Narinder Singh, Yaduvir Singh. An Efficient Fuzzy-GA Flow Control of Turbine Compressor System: A Process Control Case Study
140 -- 150Xiaoling Wang, Clement. H. C. Leung. Representing Image Search Performance Using Time Series Models
151 -- 161Aihua Zheng, Jixin Ma, Xiaoyi Zhou, Bin Luo. Efficient and Effective State-based Framework for News Video Retrival
162 -- 167Mingwei Wang, Shan Li, Jingtao Zhou, Tao Yue. An Ontology and Agent Based Collaborate Platform in Digital Production Engineering
168 -- 177Shuxiang Xu. Data Mining Using Higher Order Neural Network Models With Adaptive Neuron Activation Functions

Volume 2, Issue 3

6 -- 14Ali Awde, Moeiz Miraoui, Chakib Tadj, Yacine Bellik. Modeling and Simulation of a Pervasive Multimodal Multimedia Computing System for Visually-Impaired Users
15 -- 21Yonsik Lee, Jeongsu Lee. The Migration of Mobile Agent Using the Object Replication
22 -- 30Yi-Sheng Huang, Yen-Liang Pan. An Improved Deadlock Prevention Strategy for FMSs Using Theory of Regions
31 -- 46Muhammad Usman, Russel Pears. Integration of Data Mining and Data Warehousing: A Practical Methodology
47 -- 63Shailesh Khapre, Madarapu Naresh Kumar, P. Dhavachelvan, S. K. V. Jayakumar. V-Book: Memoryless Editor for eBooks
64 -- 69Liangji Chen, Changyin Gao, Xianzhang Feng. Five-axis NURBS Path Real-time Generation Method in CNC System
77 -- 83Yonsik Lee, Kwangwoo Nam. The Metatable of Naming Agent for the Naming Service of Sensor Network
84 -- 93Vasi Narasimhulu, P. Sujatha, P. Dhavachelvan, M. S. Saleem Basha. Enhanced Named Entity Transliteration Model Using Machine Learning Algorithm
94 -- 101Ahmad Shabani, Rasul Saadat. Examining the Citations Received by DOAJ's Journals from ISI Web of Science's Articles (2003-2008)
102 -- 113Shinya Nozaki, Yen-Wei Chen, Rumiko Azuma, Zensho Nakao, Yoshinori Namihira. A Fourier Series Based Method of CT Image Reconstruction for Laser Fusion Research
114 -- 118Om Pal, Peeyush Jain, Sudhansu Goyal, Zia Saquib, Bernard L. Menezes. Intrusion Detection Using Graph Support: A Hybrid Approach of Supervised and Unsupervised Techniques
119 -- 129Hee-Cheul Kim, Hyoung-Keun Park. The Comparative Study of Software Optimal Release Time Based on Burr Distribution
129 -- 138Ali H. Hamad, Fatima B. Ibrahim. Path Planning of Mobile Robot Based on Modification of Vector Field Histogram using Neuro-Fuzzy Algorithm
139 -- 154M. S. Saleem Basha. Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
155 -- 162Sook-Young Choi, Seong-Hun Ahn. Quality Assurance of Distance Education in Korea

Volume 2, Issue 2

7 -- 23Jaakko Korpi, Jussi Koskinen. Constructive Dynamic Program Slicing Research
24 -- 34Berdakh Abibullaev, Won-Seok Kang, Seung-Hyun Lee, Jinung An. Classification of Cardiac Arrhythmias using Biorthogonal Wavelets and Support Vector Machines
35 -- 41Prabhjot Kaur, Moin Uddin, Arun Khosla. Adaptive Bandwidth Allocation Scheme for Cognitive Radios
42 -- 55Zahra Khanmirzaei, Mohammad Teshnehlab. Prediction Using Recurrent Neural Network Based Fuzzy Inference system by the Modified Bees Algorithm
56 -- 63Yinliang Yue. An Energy Efficient Shifted Logging Storage Architecture for Write-oriented Workloads
64 -- 78Hanan A. R. Akkar, Firas R. Mahdi. Implementation of Digital Circuits Using Neuro - Swarm Based on FPGA
102 -- 108Li Jin, Yunlong Zhu, Hai Shen, Tao Ku. Research on Two-layer Location-Routing Problem and Optimization Algorithm
109 -- 116Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh. An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients
117 -- 121Davood KeyKhosravi, Ali Ghaffari, Ali Hosseinalipour, Batool Abadi Khasragi. New Clustering Protocol to Decrease Probability Failure Nodes and Increasing the Lifetime in WSNs
122 -- 129Aasia Khanum. An Intelligent Framework for Natural Object Identification in Images
130 -- 143P. Dharanyadevi, P. Dhavachelvan, R. Baskaran, V. S. K. Venkatachalapathy. Qualitative Analysis on Matchmaking Techniques for Web Service Discovery
158 -- 171Antonio Martín, Carlos León, Félix Biscarri. Intelligent Integrated Management for Telecommunication Networks
172 -- 182Omar Walid Abdul-Wahab, Wameedh Nazar Flayyih. Adding PC Connectivity to the MTS-88 Microcomputer Teaching System
183 -- 194Anestis A. Toptsis, Adam Russell. On Some Issues and a System Architecture for Quality-based Blog Evaluation

Volume 2, Issue 1

7 -- 15Youfu Wu, Gang Zhou, Jing Wu. A Monitoring System for Supermarket Based on Trajectory of Palm
33 -- 40Loghman Kaki, Mohammad Teshnehlab, Mahdi Aliyari Shoorehdeli. Classification of Multi-Class Datasets Using 2D Membership Functions in TSK Fuzzy System
41 -- 63Suoju He, Yuan Gao, Jiajian Yang, Yiwen Fu, Xiao Liu. Creating Challengeable and Satisfactory Game Opponent by the Use of CI Approaches
64 -- 71A. N. M. Rezaul Karim, Thwarique. Face Recognition Using Matrix Decomposition Technique Eigenvectors and SVD
72 -- 77Rezwanur Rahman, Joydip Saha, Ashirul Mubin. Fast Scene Change Detection in Surveillance Systems Using ANOVA on Color Histogram
78 -- 85Alaa Aljanaby, Ku Ruhana Ku-Mahamud, Norita Md Norwawi. Interacted Multiple Ant Colonies Optimization Framework: an Experimental Study of the Evaluation and the Exploration Techniques to Control the Search Stagnation
86 -- 92Haider M. AlSabbagh, Ali Amin. Kalman Filter Estimation of the Number of Competing Terminals in an IEEE 802, 11 Network Utilizing Error Pron-Channel
93 -- 99Nils Gruschka, Luigi Lo Iacono, Namhi Kang. Packaged HTTP: Reconsidering Web Efficiency