Journal: JDCTA

Volume 3, Issue 4

10 -- 20Yang Wang. On the shift-table in Boyer-Moore s String Matching Algorithm
21 -- 33Robert Niese, Ayoub Al-Hamadi, Axel Panning, Dominik G. Brammen, Uwe Ebmeyer, Bernd Michaelis. Towards Pain Recognition in Post-Operative Phases Using 3D-based Features From Video and Support Vector Machines
34 -- 43Ahmad Hoirul Basori, Abdullah Bade, Mohd Shahrizal Sunar, Daut Daman, Nadzari Saari. A Vibration Tactile Aesthetic to Enhance the Realism of Interactive Game Avatar
44 -- 59Ning Ye, Ruchuan Wang, Shou-ming Ma, Zhili Wang. Multi-Agent System for Search Engine based Web Server - A Conceptual Framework
60 -- 68Bruce Moulton, Gauri Pradhan, Zenon Chaczko. Voice Operated Guidance Systems for Vision Impaired People - Investigating a User-Centered Open Source Model
69 -- 73Zheng Zhong, Guoxin Tan. Intelligent Characters in Virtual Environment
74 -- 79N. Sankar Ram, Paul Rodrigues. Enhanced Quantitative Trade-off Analysis in Quality Attributes of a Software Architecture Using Bayesian Network Model
80 -- 84Reza Ebrahimpour, Hamid Sarmadi. A New Approach to Combine Classifiers Trained by NCL
85 -- 90Monika Jain, P. C. Jain, Sharad Jain, Ankit Jain. Novel Clock Recovery Module for MPEG-2 Transport Stream in Terrestrial Television
91 -- 99Saeed Parsa, Reza Entezari-Maleki. RASA-A New Grid Task Scheduling Algorithm
100 -- 111Sedigheh Asiaban, Mohsen Ebrahimi Moghaddam, Maghsoud Abbaspour. A Real-Time Scheduling Algorithm for Soft Periodic Tasks
112 -- 115Chetna Gupta, Yogesh Singh, Durg Singh Chauhan. An Efficient Dynamic Impact Analysis using Definition and Usage Information
116 -- 119Zhendong Mu, Dan Xiao, Jianfeng Hu. Classification of Motor Imagery EEG Signals Based on Time-Frequency Analysis
120 -- 127Bruce Moulton, Zenon Chaczko, Mark Karatovic. Data Fusion and Aggregation Methods for Pre-Processing Ambulatory Monitoring and Remote Sensor Data for Upload to Personal Electronic Health Records
128 -- 132Weiwei Zhang, Zhijin Zhao, Junna Shang, Haiquan Wang. A Requirement-based Short-time Handoff Algorithm Between CR Users
133 -- 140Montserrat Mateos Sánchez, Miguel Ángel Sánchez Vidales, Roberto Berjón Gallinas, E. Beato Gutierrez, A. Fermoso Garcia. M-Library. A New Platform to Provide Mobile-Services of Libraries

Volume 3, Issue 3

10 -- 18Ippei Torii, Yousuke Okada, Masayuki Mizutani, Naohiro Ishii. A Simple Method for 3-Dimensional Photorealistic Modeling and Consideration of Reconstructing Error
19 -- 28Hani Alzaid, Suhail Abanmi. A Wireless Sensor Networks Test-bed for the Wormhole Attack
29 -- 35Changbok Jang, Eui-in Choi, Gang-Soo Lee. Technique of Profile Storage for Improving Recommendation Accuracy on Ubiquitous Computing
36 -- 41Ning Ye, Ruchuan Wang, Shou-ming Ma, Zhili Wang. Fuzzy Logic Based Middleware Approach for Context Processing
42 -- 46Reza Ebrahimpour, Mohammad R. Moradian, Alireza Esmkhani, Farzad M. Jafarlou. Recognition of Persian handwritten digits using Characterization Loci and Mixture of Experts
60 -- 73Mohammad Ghaleb Ali, Wail Mardini, Akbar Ghaffar Pour Rahbar, Yaser Khamayseh. Improvement of Metropolitan Wireless Networking Using Wireless Optical Mesh Networks
74 -- 80Waralak V. Siricharoen, Thitima Puttitanun. Creating Ontology Chart Using Economy Domain Ontologies
86 -- 90Okba Kazar, Hatem Ghodbane, Manel Moussaoui, Abir Belkacemi. A Multi-Agent Approach Based on Fuzzy Logic For a Robot Manipulator
91 -- 96Rezvan Ghaderi, Behrouz Minaei-Bidgoli. Detecting Data Errors with Employing Negative Association Rules
96 -- 102Rerkchai Fooprateepsiri, Werasak Kurutach. An Efficient Face Reconstruction Framework for Face Recognition Systems
103 -- 108Md. Moniruzzaman, Md. Junaid Arafeen, Saugata Bose. Overview of Wireless Sensor Networks - Detection of Cloned Node Using RM, LSN, SET, Bloom Filter and AICN Protocol and Comparing Their Performances
109 -- 115Md. Junaid Arafeen, Saugata Bose. Improving Software Development Using Scrum Model by Analyzing Up and Down Movements On The Sprint Burn Down Chart - Proposition for Better Alternatives
116 -- 123Yogesh Singh, Arvinder Kaur, Bharti Suri. Empirical Validation of Variable based Test Case Prioritization/Selection Technique
124 -- 135Kimio Oguchi. Content Transfer and Supporting Technologies in a Home Environment over Next Generation Convergence Home Network- From Vital Information Transfer to Broadband Content Transfer
136 -- 148Li Huang, Maryam Ashouei, Refet Firat Yazicioglu, Julien Penders, Ruud J. M. Vullers, Guido Dolmans, Patrick Merken, Jos Huisken, Harmke de Groot, Chris Van Hoof, Bert Gyselinckx. Ultra-Low Power Sensor Design for Wireless Body Area Networks - Challenges, Potential Solutions, and Applications
149 -- 155Niamat Ullah, Pervez Khan, Mst. Najnin Sultana, Kyung Sup Kwak. A Telemedicine Network Model for Health Applications in Pakistan - Current Status and Future Prospects
156 -- 166M. Sanaullah Chowdhury, Humaun Kabir, Kazi Ashrafuzzaman, Kyung Sup Kwak. A Telecommunication Network Architecture for Telemedicine in Bangladesh and Its Applicability
167 -- 172Asdaque Hussain, Kyung Sup Kwak. Positioning in Wireless Body Area Network using GSM
173 -- 177Humaun Kabir, Mst. Najnin Sultana, Kyung Sup Kwak. WBAN in-Body Channel - Dielectric Perspective
178 -- 184Shahnaz Saleem, Sana Ullah, Hyeong Seon Yoo. On the Security Issues in Wireless Body Area Networks
185 -- 193Pervez Khan, Asdaque Hussain, Kyung Sup Kwak. Medical Applications of Wireless Body Area Networks

Volume 3, Issue 2

10 -- 20Osamu Fukuda, Masayoshi Tsubai, Masahiro Inoue, Nan Bu, Naohiro Ueno, Hiroshi Okumura, Kohei Arai. Development of a Ubiquitous Echographic Device for Evaluating Human Body Composition
21 -- 25Chwen-Fu Horng, Gwo-Jiun Horng. Web 2.0 and RuBee with NFC of Mobile Learning for Technical and Vocational Education and Training
26 -- 32B. Kaarthick, N. Nagarajan, E. Raguvaran, A. Raja Mohamed, G. Saimethun. Adaptive Routing algorithm to support Distributed Services in WiMAX
33 -- 41Hocheal Kim. An Enhancement of FMIPv6 for the Packet Radio Networks which Supports the QoS Provisioning on the MIPv6
42 -- 54Saeed K. Amirgholipour, Ahmad R. Naghsh-Nilchi. Robust Digital Image Watermarking Based on Joint DWT-DCT
55 -- 61Fugui Wang, Yajun Du, Qinhua Dong. A search quality evaluation based on FCA
62 -- 66Hamid Parvin, Hosein Alizadeh, Behrouz Minaei-Bidgoli. A New Method for Constructing Classifier Ensembles
67 -- 74Rerkchai Fooprateepsiri, Werasak Kurutach. Facial Recognition using Hausdorff- Shape- Radon Transform
75 -- 82Emad Issa Abdul Kareem, Aman Jantan. An approach for monitoring pedestrian by using multi-connect architected MCA associative memory
83 -- 90Jianfeng Hu, Dan Xiao, Zhendong Mu. Application of Energy Entropy in Motor Imagery EEG Classification
91 -- 94Jianfeng Hu, Jinli Wang, Xuecai Bao. Characteristics of Coupled Solitary Waves in Nerve Impulse Transmission with Dissipation
95 -- 102Jeonghye Han, Eunja Hyun, Miryang Kim, Hyekyung Cho, Takayuki Kanda, Tatsuya Nomura. The Cross-cultural Acceptance of Tutoring Robots with Augmented Reality Services
103 -- 110Siwar Zribi Boujelbene, Dorra Ben Ayed Mezghanni, Noureddine Ellouze. Robust Text Independent Speaker Identification Using Hybrid GMM-SVM System
111 -- 119Yeon-Jin Cho, Hyeoncheol Kim, Heung-Bum Oh. Generating Rules for Predicting MHC Class I Binding Peptide using ANN and Knowledge-based GA
120 -- 126Muhammad Adeel, Laurissa Tokarchuk, Laurie G. Cuthbert, Chao-sheng Feng, Zhiguang Qin. Improved Distributed Framework for Worm Detection & Throttling in Mobile Peer-to-Peer Networks
127 -- 131Fajri Kurniawan, Amjad Rehman, Dzulkifli Mohamad. Contour vs Non-Contour based Word Segmentation from Handwritten Text Lines- an Experimental Analysis
132 -- 136M. Bani Yassein, A. Al-zou bi, Yaser Khamayseh, Wail Mardini. Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH)
137 -- 142Abdur Rashid Khan, Muhammad Shuaib Qureshi. Web-Based Information System for Blood Donation
143 -- 146Abdur Rashid Khan, Muhammad Zubair Asghar. An Intelligent Agent for a Vacuum Cleaner
147 -- 151Nida Aslam, Irfanullah, Kok-Keong Loo, Roohullah. Growing Trend from Uni-to-Multimodal Video Indexing
152 -- 156Irfanullah, Nida Aslam, Kok-Keong Loo, Roohullah. Semantic Multimedia Annotation - Text Analysis

Volume 3, Issue 1

4 -- 15Anestis A. Toptsis, Alexander Dubitski. On the Affective Bias of Emotional and Physiological States
16 -- 22Ming-Chang Lee. An Enterprise Financial Evaluation Model Based on Rough Set theory with Information Entropy
23 -- 33Qing Ding, Xi Li, Ming Jiang, Xuehai Zhou. Trust Management in the P2P Grid
34 -- 39Mohammad Reza HeidariNezhad, Zuriati Zukarnain. A Host Mobility Support with Adaptive Network Selection Method in Hybrid Wireless Environment
40 -- 45Jee-Hee Koo, Tae-Woong Jung, Bok-hwan Kim. Design Status Analysis for Development of U-City Education and Training Course
46 -- 50Marini Othman, Abdullah Mohd Zain, Abdul Razak Hamdan. A Survey on Chaotic Disruption of ICT Project Management and Planning- Triggers, Impact, Challenges, and Recommended Measures
51 -- 57Hamid Parvin, Hosein Alizadeh, Behrouz Minaei-Bidgoli. Using Clustering for Generating Diversity in Classifier Ensemble
58 -- 65Majid Iranpour Mobarakeh, Behrouz Minaei-Bidgoli. Verb Detection in Persian Corpus
66 -- 72S. Janakiraman, V. Vasudevan. ACO based Distributed Intrusion Detection System
73 -- 87Yazed Al-Sawi, Ajlan Al-Ajlan, Khalid Al-Drewiesh, Abdullah Bajahzer. An Efficient Search Agent Software for Multi-Agent Systems
88 -- 93Tahir Naeem, Kok-Keong Loo. Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802-11 Wireless Mesh Networks
94 -- 97Irfanullah, Nida Aslam, Kok-Keong Loo, Roohullah. Semantic Annotation Gap: Where to put Responsibility?
98 -- 102Nida Aslam, Irfanullah, Kok-Keong Loo, Roohullah. Limitation and Challenges- Image/Video Search & Retrieval
103 -- 109Ayesha Altaf, M. Younus Javed, Sheraz Naseer, Aisha Latif. Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005
110 -- 122Lansheng Han, Ming Liu, Qiwen Liu, Mengsong Zou. Sub-connection Based Isolation Against Network Virus
123 -- 134Noor Mast, Muhammad Nisar Afridi, Kok-Keong Loo. TCP Performance Analysis in Mobile Ad Hoc Networks with Different Routing Protocols and Varying Payload