Abstract is missing.
- Anomaly, novelty, one-class classification: A short introductionAnna Bartkowiak. 1-6 [doi]
- Intrusion detection: Ad-hoc networks to ambient intelligence frameworkRituparna Chaki. 7-12 [doi]
- Integration of different computational models in a computer vision frameworkWlodzimierz Kasprzak. 13-18 [doi]
- Security of biometric authentication systemsVáclav Matyás Jr., Zdenek Ríha. 19-28 [doi]
- The modern techniques of latent fingerprint imagingPiotr Porwik. 29-33 [doi]
- Computers in psychology and psychology in computer scienceRyszard Tadeusiewicz. 34-38 [doi]
- Construction of monitoring agent systems for an era of ubiquitous medical engineeringTakashi Uozumi, Junichiro Wakatsuki, Kentarou Fukuta, Takahiko Shinmi, Haruyuki Tatsumi. 39-41 [doi]
- Chosen problems of designing effective Multiple Classifier SystemsMichal Wozniak, Marcin Zmyslony. 42-47 [doi]
- Preprocessing methods for SVD-based iris recognitionPetr Gajdos, Pavel Moravec, Václav Snásel. 48-53 [doi]
- On recognition of spoken Bengali numeralsSumit Kumar Ghanty, Soharab Hossain Shaikh, Nabendu Chaki. 54-59 [doi]
- Audio classification based on a closed itemset mining algorithmYoshifumi Okada, Takahiro Tada, Kentarou Fukuta, Tomomasa Nagashima. 60-65 [doi]
- The performance and physical responses during an attention shift task with grapefruit and skatole odor presentationHiroshi Yamada, Hironobu Kamimura, Noriaki Kaneki, Takayuki Koike. 66-68 [doi]
- The Graphical modeling of the physiological and psychological effects of odors on the human body during a footbathHironobu Kamimura, Noriaki Kaneki, Takayuki Koike, Hiroshi Yamada. 69-74 [doi]
- Media biotope: Media designing analogous with biotopeHidetsugu Suto. 75-80 [doi]
- The pleasant odor reduces the brain activity and enhances behavioral performance during kanji word-color stroop task: A multi-fiber NIRS studyTakayuki Koike, Hiroshi Yamada, Noriaki Kaneki, Hironobu Kamimura. 81-85 [doi]
- An efficient method for relating various human impressions to physical featuresMasahiro Sawai, Yoshifumi Okada, Tomomasa Nagashima. 86-89 [doi]
- Analysis of digital DSP blocks using GDI technologyMehdi Faed, Mohammad Mortazavi, Alireza Faed. 90-95 [doi]
- Automatic MPEG4 compatible face representation using clustering-based modeling schemesAlireza Ghahari, Mohsen Mosleh. 96-102 [doi]
- Simple system for determining starting position of cable-driven manipulatorJanusz Baczynski, Michal Baczynski. 103-106 [doi]
- Safe and flexible human-robot cooperation in industrial applicationsJuan J. Bosch, Fanny Klett. 107-110 [doi]
- Constructing causal networks for facial packsJunichiro Wakatsuki, Takaaki Saito, Ali Abrishamian, Makiba Sakamoto, Takashi Uozumi. 111-115 [doi]
- Nature inspired solutions for green energyJae Hoon Cho, Dong Hwa Kim, Ajith Abraham. 116-119 [doi]
- Exact and metahueristic approaches for optimizing the operations of chip mounter machinesHüseyin Demirkale, Ekrem Duman, Ali Fuat Alkaya. 120-125 [doi]
- ANFIS tuned no-reference quality prediction of distorted/decompressed images featuring wavelet entropyIndrajit De, Jaya Sil. 126-131 [doi]
- Stock market value prediction using neural networksMahdi Pakdaman Naeini, Hamid Reza Taremian, Homa Baradaran Hashemi. 132-136 [doi]
- Automated dictionary construction from Arabic corpus for meaningful crime information extraction and document classificationMeshrif Alruily, Aladdin Ayesh, Hussein Zedan. 137-142 [doi]
- Prion neural system: Modeling the binding affinities between neurons of a networkLuciana Morogan. 143-147 [doi]
- Preliminary investigation on relations between complex networks and evolutionary algorithms dynamicsIvan Zelinka, Donald Davendra, Václav Snásel, Roman Jasek, Roman Senkerik, Zuzana Oplatková. 148-153 [doi]
- Object relational implementation of Graph based conceptual level Multidimensional Data ModelAnirban Sarkar, Swapan Bhattacharya, Sankhayan Choudhury, Nabendu Chaki. 154-159 [doi]
- The detection of shifts in autocorrelated processes with MR and EWMA chartsKarin Kandananond. 160-165 [doi]
- Gene analysis framework for biomarker miningKentarou Fukuta, Tomomasa Nagashima, Takashi Uozumi, Yoshifumi Okada. 166-170 [doi]
- Modeling and comparing energy consumption in basic metal industries by neural networks and ARIMAM. Jeihoonian, Seyed Farid Ghaderi, Mehdi Piltan. 171-175 [doi]
- Large data real-time classification with Non-negative Matrix Factorization and Self-Organizing Maps on GPUJan Platos, Petr Gajdos. 176-181 [doi]
- Evaluating the statistical process control performance for monitoring stationary observations using Monte Carlo simulationKarin Kandananond. 182-186 [doi]
- Implementation and comparison of machine learning classifiers for information security risk analysis of a human resources departmentMete Eminagaoglu, Saban Eren. 187-192 [doi]
- Comparing performances of logistic regression, decision trees, and neural networks for classifying heart disease patientsAnchana Khemphila, Veera Boonjing. 193-198 [doi]
- Predicting trend in the next-day market by Hierarchical Hidden Markov ModelLuigi Troiano, Pravesh Kriplani. 199-204 [doi]
- A new approach for mutation analysis using data mining techniquesHüseyin Kaya, Sule Gündüz Ögüdücü. 205-210 [doi]
- MinEDec: A decision support model that combines text mining with competitive intelligenceYue Dai, Tuomo Kakkonen, Erkki Sutinen. 211-216 [doi]
- XML compression improvements based on the clustering of elementsPavel Hruska, Jan Martinovic, Jiri Dvorský, Václav Snásel. 217-221 [doi]
- A basic concept of displaying electronic text with seamless pages: Wheel Action for Reeling Paragraphs (WaRP) in the MaSSTExtSeiji Sugiyama, Atsushi Ikuta, Miyuki Shibata. 222-227 [doi]
- V-LearningFerhat Khenak. 228-232 [doi]
- A comprehensive review on wormhole attacks in MANETReshmi Maulik, Nabendu Chaki. 233-238 [doi]
- Social relevance, then protection: A social-technical approach to CIIPCheng-Chieh Huang, Ching-Cha Hsieh. 239-243 [doi]
- Quasigroups with good statistical propertiesJiri Dvorský, Eliska Ochodkova, Václav Snásel. 244-249 [doi]
- On enhancing the WEP security against brute-force and compromised keysSaif-Ur Rehman, Saeed Ullah, Sardar Ali. 250-254 [doi]
- Protecting corporate ICT infrastructures by using digital forensicsSyed Naqvi, Gautier Dallons, Christophe Ponsard. 255-258 [doi]
- 2P: A Location Aided Reactive Routing Protocol for near-optimal route discovery in MANETNabendu Chaki. 259-264 [doi]
- Time slot schedule based minimum delay graph in TDMA supported wireless industrial systemYonghoon Chung, Ki-Hyung Kim, Seung-Wha Yoo. 265-268 [doi]
- Probabilistic spreading of information in a spatial networkKrzysztof Malarz, Vikas Chandra, Eve Mitleton-Kelly, Krzysztof Kulakowski. 269-272 [doi]
- Context protecting privacy preservation in ubiquitous computingArijit Ukil. 273-278 [doi]
- Simulating interaction with Wireless Sensor NetworksAdam Brennan, Michael J. O'Grady, Gregory M. P. O'Hare. 279-282 [doi]
- An efficient algorithm for detection of selfish packet dropping nodes in Wireless Mesh NetworksJaydip Sen. 283-288 [doi]
- The recurrence plot as a tool in the analysis of network traffic anomaly detectionAida Saeed-Baginska, Romuald Mosdorf. 289-294 [doi]
- Band width of rectangular microstrip patch antenna with the use of Clonal selection algorithmDipak Kr. Neog, Reeta Devi. 295-298 [doi]
- The traffic flow through different form of intersectionsTomasz M. Gwizdalla, Sebastian Grzebielucha. 299-304 [doi]
- Towards a generic framework for the evaluation of knowledge-based infrastructuresJuan J. Bosch, Fanny Klett. 305-308 [doi]
- Generation of linear maximum length sequencesZenon Syroka, Tomasz Zajac, Pawel Dubilowicz. 309-313 [doi]
- A conceptual model for interactivity, complaint and expectation for CRMAlireza Faed. 314-318 [doi]
- A methodology to manage the changing requirements of a software projectMuhammad Wasim Bhatti, Farah Hayat, Nadeem Ehsan, Sohail Ahmed, Azam Ishaque, Ebtisam Mirza. 319-322 [doi]
- An investigation of changing requirements with respect to development phases of a software projectMuhammad Wasim Bhatti, Farah Hayat, Nadeem Ehsan, Sohail Ahmed, Azam Ishaque, Sheikh Zahoor Sarwar. 323-327 [doi]
- Building process definition with ontology backgroundSvatopluk Stolfa, Jan Kozusznik, Michal Kosinár, Marie Duzí, Martina Cíhalová, Ivo Vondrák. 328-334 [doi]
- An event oriented data management method for displaying genealogy: Widespread Hands to InTErconnect BASic Elements (WHIteBasE)Seiji Sugiyama, Atsushi Ikuta, Miyuki Shibata, Tohru Matsuura. 335-340 [doi]
- Optimal design of induction motor for a spinning machine using population based metaheuristicsRadha Thangaraj, C. Thanga Raj, Pascal Bouvry, Millie Pant, Ajith Abraham. 341-346 [doi]
- CMYK model color image segmentation using type 2 fuzzy setsSeba Maity, Jaya Sil. 347-352 [doi]
- Recovery in multithreaded applications using execution monitoring and recovery engine (EMRE)Rupesh Kumar. 353-358 [doi]
- A requirement framework for enablement of automatic generation of domain modelAbhijit Sanyal, Soumya Sankar Basu, Sankhayan Choudhury. 359-364 [doi]
- Mining the Blogosphere from a socio-political perspectiveVivek Kumar Singh, Debanjan Mahata, Rakesh Adhikari. 365-370 [doi]
- Pattern-based customisable transformations for style-based service architecture evolutionAakash Ahmad, Claus Pahl. 371-376 [doi]
- Autonomic University Administration SystemBrian McIntyre, Mansi Alsmarah, Sreela Sasi. 377-382 [doi]
- Building semantic ontologies for RESTful web servicesYong-Ju Lee, Chang-Su Kim. 383-386 [doi]
- Financial forecasting using generalized neural methodSanjeev Kumar, Devendra K. Chaturvedi. 387-391 [doi]
- Security enforcement using PKI in Semantic WebSuresh Kumar, Rakesh K. Prajapati, Manjeet Singh, Asok De. 392-397 [doi]
- Application of fuzzy multi attribute decision making analysis to rank web servicesRamakanta Mohanty, Vadlamani Ravi, Manas Ranjan Patra. 398-403 [doi]
- Enriching city entities in the EKOSS failure cases knowledge base with Linked Open DataWeisen Guo, Steven B. Kraines. 404-409 [doi]
- A design framework of Orchestrator for computing systemsRaj Kamal, Shweta Agrawal. 410-413 [doi]
- Using association rules for discovering tag bundles in social tagging dataWalter Christian Kammergruber, Maximilian Viermetz, Karsten Ehms, Manfred Langen. 414-419 [doi]
- Autonomous Matchmaking Web ServicesHong Qing Yu, Stefan Dietze, Neil Benn. 420-425 [doi]
- A simple approach to optimize XML RetrievalTanakorn Wichaiwong, Chuleerat Jaruskulchai. 426-431 [doi]
- Blog content based recommendation framework using WordNet and multiple OntologiesSantosh Kumar Ray, Shailendra Singh. 432-437 [doi]
- Web services regression test case prioritizationB. Athira, Philip Samuel. 438-443 [doi]
- Finding user groups on the basis of GSM logs - a surveyS. S. Deshpande, Rajiv V. Dharaskar. 444-447 [doi]
- A two stage and three stage CMOS OPAMP with fast settling, high DC gain and low power designed in 180nm technologyAnshu Gupta, D. K. Mishra, R. Khatri, U. B. S. Chandrawat, Preet Jain. 448-453 [doi]
- Structure of Dictionary Entries of Bangla morphemes for morphological rule generation for Universal Networking LanguageMohammed Firoz Mridha, Mohammad Nurul Huda, Md. Sadequr Rahman, Chowdhury Mofizur Rahman. 454-459 [doi]
- Open morphological machine translation: Bangla to EnglishMd. Sadequr Rahman, Sangita Rani Poddar, Mohammed Firoz Mridha, Mohammad Nurul Huda. 460-465 [doi]
- Knowledge grid based knowledge discovery in distributed environmentMuqeem Ahmed, S. Zeeshan Hussain, S. A. M. Rizvi. 466-470 [doi]
- A comparative study of various variants of SPARQL in semantic webShaily Malik, Anisha Goel, Saurabh Maniktala. 471-474 [doi]
- Intelligent Mobile Web Pre-fetching (IMWeP) using XML technologySarina Sulaiman, Siti Mariyam Shamsuddin, Ajith Abraham, Shahida Sulaiman. 475-480 [doi]
- Anomaly detection using negative security model in web applicationMichael Auxilia, D. Tamilselvan. 481-486 [doi]
- A new approach based on XMPP and OSGi technology to home automation on WebMong-Fong Horng, Mao-Hsiung Hung, Yi-Ting Chen, Jeng-Shyang Pan, Wen Huang. 487-490 [doi]
- Secure data collection in Sensor Networks using tree based key management scheme and secret sharingA. S. Poornima, B. B. Amberker, H. S. Likith Raj, S. Naveen Kumar, K. N. Pradeep, S. V. Ravithej. 491-496 [doi]
- Extra-Tree: A model to organize execution traces of Web servicesSubrata Sinha, Smriti Kumar Sinha, Bipul Syam Purkayastha. 497-501 [doi]
- A new trust model using Hidden Markov Model based mixture of expertsSarangthem Ibotombi Singh, Smriti Kumar Sinha. 502-507 [doi]
- Software implementation issues in RFD analysisNeha Verma, Niti Verma, Rishika Bansal, Bhagyashree Kulkarni, A. B. Patki, R. C. Meharde. 508-513 [doi]
- Database technology analysis for obtaining knowledge with support Web servicesMilena Janakova. 514-517 [doi]
- An efficient model for information gain of sequential pattern from web logs based on dynamic weight constraintDhirendra Kumar Jha, Anil Rajput, Manmohan Singh, Archana Tomar. 518-523 [doi]
- Personalised and domain specific user interface for a search engineSusmitha Dey, Siby Abraham. 524-529 [doi]
- Comparison of Ad-hoc reactive routing protocols using OPNET modelerMonika Rajput, Pallavi Khatri, Alankar Shastri, Keshav Solanki. 530-534 [doi]
- Ontology modeling of UBL process diagrams using OWLSuman Roy, Kiran Prakash Sawant, Aditya K. Ghose. 535-540 [doi]
- Interactive Service Provider Architecture for Interactive Digital Television systemsGabriel M. Prado, Sérgio Donizetti Zorzo. 541-546 [doi]
- An event based, non-intrusive monitoring framework for Web Service Based SystemsAjaya Kumar Tripathy, Manas Ranjan Patra. 547-552 [doi]
- Pruned-AZB for reduced complexity block matching in video compressionAmit Kant Pandit, Shekhar Verma, Geetam S. Tomar. 553-556 [doi]
- On maps comparison methodsJiri Dvorský, Václav Snásel, Vit Vozenilek. 557-562 [doi]
- CMAC: A cluster based MAC protocol for VANETsNemi Chandra Rathore, Shekhar Verma, Ranjeet Singh Tomar, Geetam S. Tomar. 563-568 [doi]
- An optimized ontology transfer learning methodHong Tian, Yunhong Li, Hongbo Liu, Ajith Abraham. 569-572 [doi]
- An executable business model for generic web applicationsYuehui Chen, Bo Yang 0001, Kun Ma, Runyuan Sun, Ajith Abraham. 573-577 [doi]
- Hybrid clustering-based 3D face modeling upon non-perfect orthogonality of frontal and profile viewsAlireza Ghahari, Mohsen Mosleh. 578-584 [doi]
- Chaotic time series prediction using combination of Hidden Markov Model and Neural NetsSaurabh Bhardwaj, Smriti Srivastava, S. Vaishnavi, J. R. P. Gupta. 585-589 [doi]
- ArSLAT: Arabic Sign Language Alphabets TranslatorNashwa El-Bendary, Hossam M. Zawbaa, Mahmoud S. Daoud, Aboul Ella Hassanien, Kazumi Nakamatsu. 590-595 [doi]
- Comparison of anfis Neural Network with several other ANNs and Support Vector Machine for diagnosing hepatitis and thyroid diseasesSaeed Shariati, Mahdi Motavalli Haghighi. 596-599 [doi]
- Known-ciphertext cryptanalysis approach for the Data Encryption Standard techniqueWafaa Abd-Elmonim Ghnaim, Neveen I. Ghali, Aboul Ella Hassanien. 600-603 [doi]
- A framework for interoperable healthcare information systemsC. Sunil Kumar, C. V. Guru Rao, A. Govardhan. 604-608 [doi]
- Reducing the influence of normalization on data classificationMostafa A. Salama, Aboul Ella Hassanien, Aly A. Fahmy. 609-613 [doi]
- A novel method for de-warping in Persian document images captured by camerasHadi Dehbovid, Farbod Razzazi, Shapour Alirezaii. 614-619 [doi]
- Extraction test cases by using data mining; reducing the cost of testingAli Ilkhani, Golnoosh Abaee. 620-625 [doi]
- Using Fuzzy Logic & Full Search for Distributed generation allocation to reduce losses and improve voltage profileMohammad Taghi Ameli, Vahid Shokri, Saeed Shokri. 626-630 [doi]