Journal: JNIT

Volume 2, Issue 4

1 -- 9Tetsuya Iizuka, Makoto Ikeda, Kunihiro Asada. Timing-Aware Cell Layout Regularity Enhancement for Reduction of Systematic Gate Critical Dimension Variation
10 -- 23Sunil K. Timalsina, Sangman Moh, Jinyi Lee. Cooperative Approaches to Spectrum Sensing and Sharing for Cognitive Radio Networks: A Comparative Study
24 -- 39Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi. Design and Implementation of Conflict Detection System for Time-Based Firewall Policies
40 -- 46Yaping Huang. A Study of Social Media Impact on Metacognition in an Online Inquiry Learning Activity
47 -- 58Eunil Park, Sungyeon Kim, Angel Pascual del Pobil. Can I go there? : The Effects of Digital Signage on Psychology of Wayfinding Users
59 -- 68JuYong Kim, Junewhan Choi, Kyoung Choi. Automatic Energy Saving system to reduce the waste of PC electricity
69 -- 77Nunnapus Benjamas, Putchong Uthayopas. Enhancing Parallel Data Mining Performance on a Large Cluster by Using UCE Scheduling
78 -- 84Jinhee Park, JinWook Chung. Integrated Disaster Alert Network Gateway

Volume 2, Issue 3

1 -- 22Mark Gaynor, Cynthia LeRouge, Jiao Ma, Chien-Ching Li. A China-specified Multi-level Technical Infrastructure for Diabetes
23 -- 34Wan Nural Jawahir Hj Wan Yussof, Hans Burkhardt. Automatic 3D Liver Segmentation Using Morphological
35 -- 48Yoshihiro Ichinomiya, Motoki Amagasaki, Masahiro Iida, Morihiro Kuga, Toshinori Sueyoshi. Improving the Soft-error Tolerability of a Soft-core Processor on
49 -- 59Jiang Yu, Olav Tirkkonen, Danpu Liu. Distributed Greedy Synchronization with Memory in Self-Organized
60 -- 71Chih-Yao Lo, Yu-Teng Chang, Hung-Teng Chang, Rueifong Dai. Integration of Wireless Digital Information Services Possessing
72 -- 83Stefan Rass. Information-Theoretic Security as an Optimization Problem
84 -- 91Józef B. Lewoc, Antoni Izworski, Slawomir Skowronski, Georgi M. Dimirovski, Vesna M. Ojleska. An Approximate Actual Network Performance Evaluation Method
92 -- 100Mircea Popa. Smart Meters Reading Through Power Line Communications
101 -- 111Rodolfo Romero-Herrera, Jesus Yalja Montiel Perez, Antonio Juarez Gracia. Tracking Facial Expressions by Using Stereoscopy Video and Back
112 -- 121Yizhi Ren, Lanping Yu, Wei Yang, Bin Feng. PPS: A Scheme of Predicting User Preference based on Multivariate
122 -- 125Shiva Taghipour Eivazi, Mehdi Hosseinzadeh 0001, Mohammad Teshnehlab. A Novel Adder Circuit for Module rn using One-hot Residue Number

Volume 2, Issue 2

1 -- 7Yong-Dal Shin. New Model for Cyber Crime Investigation Procedure
8 -- 14Xin Nie, Yuanxiang Li, Peng Ke. Research on the Architecture of Intrinsic Evolvable Digital Circuits
15 -- 21Sean Tungxiung Wu, Mingtzong Wang. The Predicament and Solution of Digital Music: A Comparative Study between Audio and Visual Contents
22 -- 30Mingyu Lim, HyungSeok Kim, Jee-In Kim. Lessening Forwarding Load of Application Server in Distributed Multi-User Systems
31 -- 37Chih-Chin Yang, Ping-Chen Wu. New Measurement Information System of Biosensor in Relativity Humidity
38 -- 44Liping Zheng, Guangyao Li, Junqing Li. The Design and Implementation of Oral Disease Aided Diagnosis System
45 -- 55Hideaki Ito, Masaru Shimizu, Saburou Iida. Parallel Algorithms of Basic Image Processing Implemented on a Linearly Connected Parallel Processor - Gray-scale and Binary Images -
56 -- 68Mohamed Hammami, Salma Kammoun Jarraya, Hanêne Ben-Abdallah. A Comparative Study of Proposed Moving Object Detection Methods
69 -- 76Suk-Jae Jeong, Suk Jun Lee. Adaptive Response Mechanism Based on the Hybrid Simulation and Optimization for the Real Time Event Management
77 -- 88Fazal Wahab Karam, Terje Jensen, Qazi Ziaullah. Ranking of Neighbor Access Networks as Candidates for Handover
89 -- 96Chen Yu, Yu Yang, Liu Zhizhong, Shen Junyi. Semantic Service Discovery Based on QoS Ontology
97 -- 100Kazuya Takemata, Sumio Nakamura, Akiyuki Minamide, Shin Takeuchi. Development of a Handedness Exchange Support System Using Tangible Devices

Volume 2, Issue 1

1 -- 8Kyungmi Kim, HyunSook Kim. A Self Localization Scheme with Relay Nodes for Mobile Wireless Sensor Networks
9 -- 16Tadashi Nakanomichael Moore. Molecular Communication Paradigm Overview
17 -- 26Zhikun Zhang, Xiangning Kong, Jianguo Xiao, Zhonghui Huang. XML-Based Context-Constraint Access Control Model and Policy
27 -- 36Jingtao Zhou, Haicheng Yang, Mingwei Wang 0001. SDDG: a P2P-Semantic-Grid Enabled Information Sharing Infrastructure
37 -- 48Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir. A Framework for Checking and Ranking Integrity Constraints in a Distributed Database
49 -- 57Kyota Aoki. Estimation of Translation, Rotation and Scaling Based on Multiple Motion Estimations
58 -- 65Kelvin C. K. Wong, William K. Cheung. Enhancing a University Information Technology Course with Information Literacy Perspective Integrated
66 -- 80Rakpong Kaewpuang, Juta Pichitlamken. Building a Service Oriented Cloud Computing Infrastructure Using Microsoft CCR/DSS System
81 -- 87Youxiang Duan, Gao Yang. Evaluating Vulnerabilities Quantitatively Based On the Rank of Web Services Confidentiality
88 -- 96Yong Han, Yan Li 0025, Jing Liu, Yonghua Wang, Shuwei Zhang. Dynamic Analysis of Feedback Loops in Extra-Cellular Signal Regulated Kinase Signal Network
97 -- 104Shuk Ying Ho, Sarah Bull. Users' Trust and Intention to Adopt Personalized Mobile Services
105 -- 116Mohammad Athar Ali, Eran A. Edirisinghe. Reversible Watermarking using Differential Expansion on IPCM Macroblocks in H.264/AVC