Abstract is missing.
- Recent developments in MIMO channel estimation techniquesVikash Sharma, Sanjay Kumar. 1-6 [doi]
- WSeH: Proposal for an adaptive monitoring framework for WSNs, with enhanced security and QoS supportVasile Dadarlat. 7-12 [doi]
- An efficient routing technique that maximizes the lifetime and coverage of wireless sensor networksSaleh Al-Sharaeh, Reema Hasan, Imad Salah. 13-18 [doi]
- 2-Connected relay placement problem in wireless sensor networksWei-Lun Wang, Bang-Heng Liou, Aaron Solomon. 19-24 [doi]
- Performance enhancement of mobile networks using cooperative MIMO techniqueThossaporn Chanpuek, Peerapong Uthansakul, Monthippa Uthansakul. 25-29 [doi]
- Multipath load balancing & rate based congestion control for mobile ad hoc networks (MANET)S. Soundararajan, Raghuvel S. Bhuvaneswaran. 30-35 [doi]
- Investigating QoS support in WiMAX over Metro-Ethernet backhaulS. D. Sepehr, Naser Movahhedinia, Ahmad Baraani. 36-41 [doi]
- A decomposition method for pilot power planning in UMTS systemsWei Ding, Di Yuan. 42-47 [doi]
- Services composition in IMS environment: An evolved SCIM based approachCuiting Huang, Noël Crespi, Abderrahmane Maaradji. 48-51 [doi]
- Possible schemes on baseband signal joint detection concept for multimode terminalHendra Setiawan, Firdaus. 52-57 [doi]
- LDPC coding for MIMO wireless sensor networks with clusteringJamal S. Rahhal. 58-61 [doi]
- Fast fault detection in wireless sensor networksMohammad Hajibegloo, Amir Javadi. 62-66 [doi]
- DFMC: Decentralized fault management mechanism for cluster based wireless sensor networksTohid Bagheri. 67-71 [doi]
- Fast motion estimation using two-step bit-transform-based normalized partial distortion search algorithmChou-Chen Wang, Chih-Yuan Chang, Yun-Yi Huang. 72-76 [doi]
- Robust video transmission for H.264 scalable video coding using unequal error protectionChou-Chen Wang, Jin-long Li, Teng-Yao Wang, Chi-Wei Tung. 77-81 [doi]
- Study of ICA algorithm for separation of mixed imagesArti Khaparde. 82-86 [doi]
- Faster and more accurate feature-based calibration for widely spaced camera pairsDeepak Dwarakanath, Alexander Eichhorn, Carsten Griwodz, Pål Halvorsen. 87-92 [doi]
- A framework of multi-objective particle swarm optimization in motion segmentation problemNilam Nur Amir Sjarif, Siti Mariyam Shamsuddin, Siti Zaiton Mohd Hashim. 93-98 [doi]
- Face recognition using Oriented Laplacian of Gaussian (OLOG) and Independent Component Analysis (ICA)J. Kailash Karande, N. Sanjay Talbar, S. Sandeep Inamdar. 99-103 [doi]
- Hierarchical requantization of depth data for 3D visual communicationsIsmaël Daribo. 104-109 [doi]
- Puppet modeling for real-time and interactive virtual shadow puppet playSirot Piman, Abdullah Zawawi Talib. 110-114 [doi]
- MATLAB based defect detection and classification of printed circuit boardSiti Hazurah Indera Putera, Syahrul Fahmi Dzafaruddin, Maziah Mohamad. 115-119 [doi]
- Development of system supervision and control software for a micromanipulation systemAhmet Teoman Naskali, Emrah Deniz Kunt, Asif Sabanovic, Gonen Eren. 120-124 [doi]
- An efficient algorithm for human cell detection in electron microscope images based on cluster analysis and vector quantization techniquesMohammad V. Malakooti, Ahmad Pahlavan Tafti, Hamid Reza Naji. 125-129 [doi]
- Hybrid approach for georeferencing RadarSat2 imagesA. Haddoud, M. Belhadj Aissa, F. Hocine, M. Fekir, Aichouche Belhadj-aissa. 130-134 [doi]
- An edge-region cooperative multi-agent approach for buildings extractionAymen Sellaouti, Moslem Ouled Sghaier, Atef Hamouda. 135-140 [doi]
- A study on the comparison of positioning tolerances depending on the state of vision sensorsYounghoon Kho, Yongjin (James) Kwon. 141-144 [doi]
- Community of practice mediated by Internet: The case of Philanthropy-QuebecMichel Plaisent, Lassana Maguiraga, Prosper Bernard, Sylvain Favreau, Diane Mercier. 145-148 [doi]
- Rich information service delivery to mobile users using smart postersMedia A. Ayu, Teddy Mantoro, Siti Aisyah Ismail, Nurul Syafiqah Zulkifli. 149-153 [doi]
- Semantic web E-portal for tourismFatima Faiza Ahmed, Syed Farrukh Hussain, Sabah Hameed, Sharjeel Mustafa Ali. 154-158 [doi]
- A database design for complex linguistic data in collaborative web applicationC.-L. Chan, H. B. Yan, S. Y. Lee, J. Webster, Kim H. K. Wong. 159-165 [doi]
- Framework development for evaluating e-government portals in Myanmar using analytic hierarchy processAung Kyaw Oo, Thein Lwin, Ko Ko Oo, Pyi Aung, Thant Zin Ohn. 166-171 [doi]
- Applying prototype for software engineering in pilot project of research tracking systemWaralak Vongdoiwang Siricharoen. 172-176 [doi]
- Performance evaluation of object serialization libraries in XML, JSON and binary formatsKazuaki Maeda. 177-182 [doi]
- A study on the use of "Yams" for enterprise knowledge sharingAngela Lee Siew Hoong, Tong-Ming Lim, Soo Kar Leow, Justin Lim Renn Aun. 183-188 [doi]
- Towards a standard for Service Behavior Trustworthiness ManagementJørgen Bøegh, Yuyu Yuan. 189-194 [doi]
- Research on mobile cloud computing: Review, trend and perspectivesHan Qi, Abdullah Gani. 195-202 [doi]
- Network intrusion detection using multi-attributed frame decision treeKrung Sinapiromsaran, Narudom Techaval. 203-207 [doi]
- Trust-aware access control: How recent is your transaction history?Ali Ahmed, Abdullah Alnajem. 208-213 [doi]
- FPGA based pipelined architecture for RC5 encryptionA. Ruhan Bevi, S. S. V. Sheshu, S. Malarvizhi. 214-219 [doi]
- Improved secure dynamic key management scheme with access control in user hierarchyAtanu Basu, Indranil Sengupta. 220-225 [doi]
- Fast modular reduction for large-integer multiplication for cryptosystem applicationSuhas Sreehari, Huapeng Wu, Majid Ahmadi. 226-229 [doi]
- Specification of role and attribute transitions for secure information system accessMark Evered. 230-235 [doi]
- A Lossless Secure data embedding in image using DCT and Randomize key generatorMohammad V. Malakooti, Mehrzad Khederzdeh. 236-239 [doi]
- A lossless digital encryption system for multimedia using orthogonal transformsMohammad V. Malakooti, Mojtaba Raeisi Nejad Dobuneh. 240-244 [doi]
- Biometric ID cards at CTU in PragueRadek Holy, Marek Kalika, Jan Scherks. 245-249 [doi]
- Towards designing secure virtualized systemsHedi Benzina. 250-255 [doi]
- Evaluation effectiveness of hybrid IDS using Snort with Naïve Bayes to detect attacksSafwan Mawlood Hussein, Fakariah Hani Mohd Ali, Zolidah Kasiran. 256-260 [doi]
- TRUNCMAN: Trust based routing mechanism using non-cooperative movement in mobile ad-hoc networkG. Thanigaivel, N. Ashwin Kumar, P. Yogesh. 261-266 [doi]
- Current-controlled quadrature oscillator using a new single ZC-CG-CCCCTAMontree Kumngern, Usa Torteanchai. 267-270 [doi]
- On linear dynamic systems with parametrized perturbations and time delaysManuel de la Sen, Raul Nistal. 271-276 [doi]
- On adaptability issues of networked service systemsFinn Arve Aagesen, Patcharee Thongtra. 277-282 [doi]
- CMOS current-mode precision full-wave rectifier with improved bandwidthMontree Kumngern. 283-286 [doi]
- A novel memory compression technique for embedded systemSicheng Tang, Huailiang Tan, Lun Li. 287-292 [doi]
- Unified matrix processor design for FCT-based filtering, convolution and correlation of signalsQadri Hamarsheh. 293-299 [doi]
- Electronically tunable versatile voltage-mode biquadratic filter with three-input six-output using OTAs and grounded capacitorsMontree Kumngern. 300-304 [doi]
- Voltage-mode first-order allpass filter using single-ended OTAs and grounded capacitorMontree Kumngern, Jirasak Chanwutitum. 305-308 [doi]
- Current-mode multifunction biquad filter with three inputs five outputs using ZC-CDTAsMontree Kumngern, Kobchai Dejhan. 309-313 [doi]
- Evaluating the ergonomic performance of Dive computersTamer Ozyigit, Salih Murat Egi. 314-318 [doi]
- Bit synchronization and viterbi equalization for GSM BTS - Hardware implementation on TMS320C6424 TI DSPPradeep Goutam, K. M. Nitin Babu, S. V. Hariprasad, Vidya Sagar, P. Laxmaiah. 319-323 [doi]
- Improved Gradient Descent Bit Flipping algorithms for LDPC decodingTharathorn Phromsa-ard, Jiratchaporn Arpornsiripat, Jutaphet Wetcharungsri, Paramin Sangwongngam, Keattisak Sripimanwat, Pisit Vanichchanunt. 324-328 [doi]
- A study on the agent-based simulation for analysis of armed helicopter's mission effectiveness: Analysis of mission effectiveness based on a combination of agentsJungwan Hong, Yongjin (James) Kwon, Sang C. Park. 329-332 [doi]
- A dual-band filter using coupled-feed with asymmetrical stepped-impedance resonatorJessada Konpang. 333-337 [doi]
- Power efficient scalable hybrid processor architectureMuhammad Bilal, Sana Imtiaz, Shahzad Asif, Wadood Abdul. 338-342 [doi]
- A new available bandwidth measurement method based on ImTCPHiroki Oda, Hiroyuki Hisamatsu, Hiroshi Noborio. 343-347 [doi]
- Cross-layer handover for SIP applications based on media-independent pre-authentication with redirect tunnelingWei-Kuo Chiang, Hung-Jiun Dai, Cheng Luo. 348-353 [doi]
- Performance analysis of adaptive power control based on Signal to Interference Ratio (SIR) using fuzzy genetic for WCDMAFirdaus, Ali Muayyadi, Rina Puji Astuti. 354-358 [doi]
- Multi-adaptive routing protocol for vehicular ad hoc networkWuttichai Vijitkunsawat, Pramote Anunvrapong. 359-362 [doi]
- A review of VHD approaches in next generation wireless networksAbubeker A. Yussuf, Wan H. Hassan, Sinzobakwira Issa. 363-367 [doi]
- rd generation for rural/semi urban mobile communication system in IndiaHarish Kumar, Pushpneel Verma, Rudrapratap Ojha, G. Venkat Babu. 368-372 [doi]
- A parallel compiler for multi-core microcontrollersW. Pornsoongsong, P. Chongstitvatana. 373-377 [doi]
- Constructing transition matrices for routing BPC permutations on shuffle-exchange recirculating networksGennady Veselovsky, Sermvut Ackarachalanonth. 378-382 [doi]
- A critical performance analysis of Thin Client platformsRenatus Michael, Faith Shimba. 383-387 [doi]
- Performance enhancement for Distributed Lock Manager using Hybrid Multicast and Ring algorithmSalah Bindahman, Chan Huah Yong. 388-393 [doi]
- Extended OTIS-Arrangment a new efficient interconnection networkAhmad Awwad, Jehad A. Al-Sadi. 394-399 [doi]
- Spectrum of Sierpiński triangles using MATLABBharati Rajan, Indra Rajasingh, Sudeep Stephen, Cyriac Grigorious. 400-403 [doi]
- Energy of grid based networks using MATLABBharati Rajan, Indra Rajasingh, Cyriac Grigorious, Sudeep Stephen. 404-408 [doi]
- A hybrid Semantic driven recommender for services in the eGovernment domainLuis Álvarez Sabucedo, Roberto Soto Barreiros, Juan M. Santos-Gago, Manuel J. Fernández Iglesias. 409-414 [doi]
- User persona roles in the end-user web developing approachWaralak Vongdoiwang Siricharoen. 415-420 [doi]
- Development of an automatic health screening system for Student Health Education of UniversityEiichi Miyazaki, Hiroshi Kamano, Daisuke Yamakata, Yukio Hori, Yoshiro Imai. 421-427 [doi]
- Quality metrics a quanta for retrieving learning object by clustering techniquesA. Sai Sabitha, Deepti Mehrotra, Abhay Bansal. 428-433 [doi]
- Software quality in use characteristic mining from customer reviewsWarit Leopairote, Athasit Surarerks, Nakornthip Prompoon. 434-439 [doi]
- Technology assisted enhanced teaching and learning methods: A research project at Monash UniversityA. G. M. Das. 440-446 [doi]
- Animation and prior knowledge in a multimedia application: A case study on undergraduate computer science students in learningRiaza Mohd Rias, Wan Khadijah Yusof. 447-452 [doi]
- Advisory system architecture in agricultural environment to support decision making processJunaidah Mohamed Kassim, Rusli Abdullah. 453-456 [doi]
- TFRS: Thai finger-spelling sign language recognition systemSupawadee Saengsri, Vit Niennattrakul, Chotirat Ann Ratanamahatana. 457-462 [doi]
- Association rules for data mining in item classification algorithm: Web service approachManop Phankokkruad. 463-468 [doi]
- Hybrid recommender systems: Survey and experimentsVipul Vekariya, G. R. Kulkarni. 469-473 [doi]
- The compact Genetic Algorithm for likelihood estimator of first order moving average modelRawaa Dawoud Al-Dabbagh, Mohd. Sapiyan Baba, Saad Mekhilef, Azeddien Kinsheel. 474-481 [doi]
- Observation and motion models for indoor pedestrian trackingIncheol Kim, Eunmi Choi, Huikyung Oh. 482-485 [doi]
- An accelerated learning algorithm of Gaussian mixture processesIsamu Shioya, Takao Miura. 486-491 [doi]
- Entropy rate of Thai text and testing author authenticity using character combination distributionTheerawat Kiatdarakun, Prapun Suksompong. 492-497 [doi]
- The effect of organizational, external, social, trust, information technology factors and knower's attitude on knowledge sharing: A case of financial service firm in South AfricaLean Makhubele, Johnson Kinyua, Ray Kekwaletswe. 498-503 [doi]
- A journal of real peak recognition of electrocardiogram (ECG) signals using neural networkIzzah Amani Tarmizi, Syed Sahal Nazli Alhady Syed Hassan, Wan Pauzi Wan Ibrahim. 504-509 [doi]
- A fast implementation of Quasi-Newton LMS algorithm using FFTMohammad Shukri Salman, Osman Kukrer, Aykut Hocanin. 510-513 [doi]
- Fluency DA functions approximation-based adaptive coding method of contours and regions for animation imagesKazuto Ohara, Kazuki Katagishi, Kazuo Toraichi. 514-519 [doi]
- The importance of customized advertisement delivery using 3D tracking and facial recognitionMete Taspinar, Ahmet Teoman Naskali, Gonen Eren, Merve Kurt. 520-524 [doi]