default search action
Journal of Computers, Volume 12
Volume 12, Number 1, January 2017
- Roberto Saia, Ludovico Boratto, Salvatore Carta:
Popularity Does Not Always Mean Triviality: Introduction of Popularity Criteria to Improve the Accuracy of a Recommender System. 1-9 - Ayman E. Khedr, Amira M. Idrees:
Enhanced e-Learning System for e-Courses Based on Cloud Computing. 10-19 - Ahmed B. Altamimi:
Buffer Management in Mobile Social Networks. 20-27 - Taha Arian, Amir Kusedghi, Bijan Raahemi, Ahmad Akbari:
A Collaborative Load Balancer for Network Intrusion Detection in Cloud Environments. 28-47 - Daniel G. Cantón-Puerto, Francisco Moo-Mena, Víctor Uc-Cetina:
QoS-Based Web Services Selection Using a Hidden Markov Model. 48-56 - Vivek Agrawal:
A Comparative Study on Information Security Risk Analysis Methods. 57-67 - Malgorzata Goldhoorn, Ronny Hartanto:
Enhancing Object Detection by Using Probabilistic Spatial-Semantic Knowledge. 68-75 - Efthymios Chondrogiannis, Efstathios Karanastasis, Vassiliki Andronikou, Theodora A. Varvarigou:
Building a Repository for Inferring the Meaning of Abbreviations Used in Clinical Studies. - Christian Brandstatter, Samer Schaat, Alexander Wendt, Martin Fittner:
How Agents Use Breadcrumbs to Find Their Way. 89-96
Volume 12, Number 2, March 2017
- Guopeng Zhang, Ao Li, Yong Zhou, Yao Du:
Towards Underlying Radio Technologies for LTE Based Public Safety Networks. 97-104 - Tingting Dong, Yoshiharu Ishikawa, Chuan Xiao, Jing Zhao:
k-Expected Nearest Neighbor Search over Gaussian Objects. 105-115 - Dietmar Dietrich, Matthias Jakubec, Samer Schaat, Klaus Doblhammer, Georg Fodor, Christian Brandstatter:
The Fourth Outrage of Man (Is the Turing-Test Still up to Date?). 116-126 - Li Wei, Yuefei Sui:
The R-Calculus and the Finite Injury Priority Method. 127-134 - B. K. Patle, Dayal Parhi, Anne Jagadeesh, O. P. Sahu:
Real Time Navigation Approach for Mobile Robot. 135-142 - Ivan Homoliak, Dominik Breitenbacher, Petr Hanácek:
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. 143-155 - Kanjar De, V. Masilamani:
Image Quality Assessment for Blurred Images Using Nonsubsampled Contourlet Transform Features. 156-164 - Bunil Kumar Balabantaray, Om Prakash Sahu, Nibedita Mishra, Bibhuti Bhusan Biswal:
A Quantitative Performance Analysis of Edge Detectors with Hybrid Edge Detector. 165-173 - Ali Alkhalifah, Sulaiman Al Amro:
Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems. 174-182 - Teh Faradilla Abdul Rahman, Alya Geogiana Buja, Kamarularifin Abd. Jalil, Fakariah Mohd Ali:
SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm. 183-189 - Deepika R., Arvinth Prasath V. S., M. Indhumathi, Ponnai Manogaran Ashok Kumar, Vaidehi V.:
Anomalous Event Detection in Traffic Video Surveillance Based on Temporal Pattern Analysis.
Volume 12, Number 3, May 2017
- How Should My Device Behave Now? Adapting Consensus Protocols for Autonomous Context Management. 200-211
- V. Soundarya, U. Kanimozhi, D. Manjula:
Recommendation System for Criminal Behavioral Analysis on Social Network using Genetic Weighted K-Means Clustering. 212-220 - G. Jemilda, S. Baulkani, D. George Paul, J. Benjamin Rajan:
Tracking Moving Objects in Video. 221-229 - Jiexi Shen, Bailing Zhou:
Research on GIS Based Reservoir Resettlement Data Management System - An Example of Guangdong Reservoir Resettlement Project. 230-237 - Nahla H. Barakat:
Cascade Generalization: One versus Many. 238-249 - Ayman E. Khedr, Amira M. Idrees:
Adapting Load Balancing Techniques for Improving the Performance of e-Learning Educational Process. 250-257 - Ekaterina Prasolova-Førland, Henrik Hjelle, Hege Tunstad, Frank Lindseth:
Simulation and Visualization of the Positioning System of the Brain in Virtual Reality. 258-269 - Wernhuar Tarng, Chia-Chun Hsie, Chih-Ming Lin, Chi-Young Lee:
Development and Application of a Virtual Laboratory for Synthesizing and Analyzing Nanogold Particles. 270-283
Volume 12, Number 4, July 2017
- Erman Çakit, Waldemar Karwowski:
Potential Applications of Soft-Computing Techniques for Human Socio-Cultural Behavior Modeling. 284-290 - Madallah Alruwaili, Lalit Gupta:
Formulating Enhancement and Restoration Strategy to Improve the Quality of Dusty Images. 291-300 - Rubén Javier Medina-Daza, Nelson Enrique Vera Parra, Erika Upegui:
Wavelet Daubechies (db4) Transform Assessment for WorldView-2 Images Fusion. 301-308 - Jiradett Kerdsri, Tawiwat Veeraklaew:
Visualization of Spatial Distribution of Random Waypoint Mobility Models. 309-316 - Dong Wang, Mingquan Zhou, Sajid Ali, Yusong Liu, Pengbo Zhou:
A Novel Engine: Complex Event Processing with LAIPE. 317-334 - Khadija Louzaoui, Khalid Benlhachmi:
A Robustness Testing Approach for an Object Oriented Model. 335-353 - Sandipkumar Patel, Ritesh Patel, Parth Shah:
Optimal RP Based Dynamic Load Balancing in Amazon EC2 Environment. 354-361 - Priteshkumar Prajapati, Parth Shah, Amit Ganatra, Sandipkumar Patel:
Efficient Cross User Client Side Data Deduplication in Hadoop. 362-370 - Ci-Bin Jiang, Jung-Shian Li:
Exploring Global IP-Usage Patterns in Fast-Flux Service Networks. 371-379
Volume 12, Number 5, September 2017
- Vethapriyan Kugamoorthy, Dinithi Nallaperuma:
Prediction of Baby Emotions through Pattern Recognition by Monitoring Baby's Biological Measurements. 381-388 - Miao Liu:
Consensus of Two Leader-Following Multi-agent Systems between the Cooperation Network and the Competition Network. 389-395 - Monir Foqaha, Mohammed Awad:
Hybrid Approach to Optimize the Centers of Radial Basis Function Neural Network Using Particle Swarm Optimization. 396-407 - Kitsiri Chochiang, Fouad Hanna, Marie-Laure Betbeder, Jean-Christophe Lapayre:
New Techniques in Thai-English Transliterated Words Searching, Applied to Our New Webservices Platform for Tourism (WICHAI). 408-415 - Muhammad Ilyas, Siffat Ullah Khan:
Software Integration Challenges for GSD Vendors: An Exploratory Study Using a Systematic Literature Review. 416-422 - Inés Bayoudh Saâdi, Nesrine Ben Salah:
A Five Views Framework for Evaluating Learning Service Selection in Context-Aware Ubiquitous Learning Systems. 423-432 - T. Vigneswari, M. A. Maluk Mohamed:
An Insight into Scheduling Algorithms for Mobile Grid: A Survey. 433-441 - Yiqin Lu, Peikun Wang, Jiancheng Qin:
A Hardware Architecture of Particle Swarm Optimization. 442-450 - Imran Sarwar Bajwa, Fatim Karim, M. Asif Naeem, Riaz ul Amin:
A Semi Supervised Approach for Catchphrase Classification in Legal Text Documents. 451-461 - A. A. Abd El-Aziz:
An Overview on XML Security Technologies. 462-469 - Umar Farooq, Hasan Mansoor, Antoine Nongaillard, Yacine Ouzrout, Muhammad Abdul Qadir:
Negation Handling in Sentiment Analysis at Sentence Level. 470-478 - Abidin Çaliskan, Ulus Çevik:
Three-Dimensional Modeling in Medical Image Processing by Using Fractal Geometry. 479-485
Volume 12, Number 6, November 2017
- Chuan Yin, Ju Qian, Ming Zhang, Yaming Bo:
Fast Ray Simulation Method Applied in Microwave Radiation Brightness Temperature Imaging. 486-499 - Yancong Xie, Hongxun Jiang:
Stock Market Forecasting Based on Text Mining Technology: A Support Vector Machine Method. 500-510 - Md. Mostofa Akbar, S. M. Farhad, Munima Jahan, Md. Humayun Kabir:
Distributed Client-Assisted Patching for Multicast Video-on-Demand Service in an Enterprise Network. 511-520 - Muhammad Asif Khan, Essa Abdullah Hezzam:
Towards the Effectiveness of a Co-evolutionary Framework in Information Systems Organizations. 521-526 - Tianping Bi, Xuemei Yang, Meili Ren:
The Design and Implementation of Smart Campus System. 527-533 - Luyi Bai, Yin Li, Jiemin Liu:
Fast Leaf-to-Root Holistic Twig Query on XML Spatiotemporal Data. 534-542 - Yildiz Aydin, Durmus Özdemir, Gulsah Tumuklu Ozyer:
Traffic Sign Recognition System for Imbalanced Dataset. 543-549 - Sagar M. Patel, Vipul K. Dabhi, Harshadkumar B. Prajapati:
Extractive Based Automatic Text Summarization. 550-563 - Luyi Bai, Zhulei Shao, Zhuo Lin, Shaohui Cheng:
Fixing Consistencies of Fuzzy Temporal XML Data. 564-570 - Deng-Ao Li, Yanfei Bai, Ju-Min Zhao:
Effective Learning Rate Adjustment of EASI Algorithm Based on the Fuzzy Neural Network. 579-590 - Yue Chi, Ning He, Qi Zhang:
A Fast Image Restoration Method Based on an Improved Criminisi Algorithm. 591-601
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.