Journal: IJICT

Volume 5, Issue 3/4

218 -- 233Qingke Zhang, Bo Yang, Lin Wang, Jianzhang Jiang. An improved multi-expression programming algorithm applied in function discovery and data prediction
234 -- 242Deng-yin Zhang, Zhou-yang Wang. The method of gaze tracking based on iris detection
243 -- 256Yi-Nan Guo, Jian Cheng, Meirong Chen, Dandan Liu. Community-based multi-agent cooperative interactive evolutionary computation model
257 -- 262Xiang Jian. 3D motion retrieval based on double index and user interaction
263 -- 271Qigang Liu, Li Zhou, Xiangyang Sun. A fast fuzzy c-means algorithm for colour image segmentation
272 -- 282Jun Shi, Hui Li, Lidong Zhou. The technical security issues in cloud computing
283 -- 295Sarot Srang, Masaki Yamakita. Adaptive friction compensation for a position control system with Stribeck friction using hybrid unscented Kalman filter
296 -- 306Jun Yang, Weiwei Shan, Junyin Liu, Huafang Sun. Implementation of correlation power analysis attack on an FPGA DES design
307 -- 320Jianhua Han, Yuan Luo, Jianping Huang. A study on the scalable flow model of web services choreography and orchestration based on dynamic workflow
321 -- 331Sheng Luo, Junjie Peng, Yuanyuan Chen, Rong Shen. A low energy consumption wireless sensor network control system
332 -- 342Deng-yin Zhang, Lei Cui. Domain-epidemic spray and forward routing algorithm of opportunistic networks
343 -- 353Ruoqing Wang, Sufei Li, Ercan E. Kuruoglu. A novel algorithm for image denoising based on unscented Kalman filtering

Volume 5, Issue 2

97 -- 121Manu Vardhan, Dharmender Singh Kushwaha. TBFR: a threshold-based file replication approach for increased file availability and its formal verification
122 -- 136Kandarpa Kumar Sarma, Abhijit Mitra. Stochastic MIMO channel modelling using FMLP-based inference engine
137 -- 149Peng Xiao, Dongbo Liu. Configurable performance analysis and evaluation framework for cloud systems
150 -- 166Arockia Anand Raj, T. Mala. Cloudpress 2.0: a new-age news retrieval system on the cloud
167 -- 186B. R. Purushothama, B. Shrinath, B. B. Amberker. Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
187 -- 204Pradeep Kumar, Yogesh Singh. A study on software reliability prediction models using soft computing techniques
205 -- 215Srimathi Chandrasekaran, Veeranjaneyulu Gangineni. Performance analysis of replication mechanism using mobile agent in computational grid using WADE

Volume 5, Issue 1

1 -- 21Anwar Mousa. Interoperability mechanisms and criteria for LTE and mobile-WIMAX
22 -- 44Mohamed Aissani, S. Bouznad, A. Fareb, M. A. Laidoui. EA-SPEED: energy-aware real-time routing protocol for wireless sensor networks
45 -- 63Rajender Kumar, Brahmjit Singh. Reduced VHO latency using EVM measurement and ad hoc cooperation for heterogeneous ubiquitous networks
64 -- 74Razvan-Daniel Albu, Florin Popentiu-Vladicescu. A prototype for web services reliability prediction
75 -- 94Govind P. Gupta, Manoj Misra, Kumkum Garg. Energy efficient data gathering using prediction-based filtering in wireless sensor networks