|
|
Volume 1, Number 4: 2007
|
Article#
|
Article Title & Authors (Volume 1 Number 4
2007)
|
Page
|
1
|
Design and Control Analysis of
(2n+2 / 0 ≤n≤3) Wheels Mobile Rover Using PI Controller
Amel ZERIGUI, Xiang WU, and Zong-Quan DENG
|
235-239
|
2
|
The DTW Data Distribution over a
Grid Computing Architecture
Maher KHEMAKHEM, Abdelfattah BELGHITH, and Mohamed LABIDI
|
241-247
|
3
|
Simulating Crowd Evacuation with a
Leader-Follower Model
Qingge JI, and Can GAO
|
249-252
|
4 Invited
|
An Optimized Approach on Applying
Genetic Algorithm to Adaptive Cluster Validity Index
Tzu-Chieh LIN, Hsiang-Cheh HUANG, Bin-Yih LIAO, and Jeng-Shyang PAN
|
253-257
|
5
|
Overview of Secure Network System
Karan SINGH, and Rama Shankar YADAV
|
259-265
|
6
|
Guidelines and Notations towards a
Simulation Temporal Data Base Management System
Abdelhak BOUBETRA
|
267-272
|
7
|
A Proposition to Enhance a
Countermeasure Scheme against Power Analysis Attack for AES
Yuan-Man TONG, Hong-Yi LU, Zhi-Ying WANG, and Kui DAI
|
273-278
|
8
|
Efficient Graph Structure for the
Mining of Frequent Itemsets from Data Streams
E.R. NAGANTHAN, and F. Ramesh DHANASEELAN
|
279-281
|
9
|
Advanced Routing Algorithms to
Reduce Time Complexity in Mobile
Corporative Network
Khalil AL-SHQEERAT
|
283-290
|
10
|
New Arithmetic Residue to Binary
Converters
Amir Sabbagh MOLAHOSSEINI, and Keivan NAVI
|
291-295
|
Volume 1, Number 3: 2007
|
Article#
|
Article Title & Authors (Volume 1 Number 3
2007)
|
Page
|
1
|
Enhanced Rate Monotonic Time
Demand Analysis
Nasro Min- Allah, Yong-Ji WANG, and Jian-Sheng XING
|
149-154
|
2
|
A Predictive VQ Based Video
Compression Scheme
Yue-Yang ZHANG, Zhen LI, and Zhe-Ming LU
|
155-158
|
3
|
Object-based Color Image Retrieval
Using Concentric Circular Invariant Features
Yong-Hua XIE, Lokesh SETIA, and Hans BURKHARDT
|
159-166
|
4
|
Morphological Ending-based
Strategies of Unknown Word Estimation for Statistical POS Urdu Tagger
Waqas ANWAR,Xuan WANG, Lu LI, and Xiaolong WANG
|
167-173
|
5
|
The Network Monitoring, Analysis
and Early Detection of Internet Worm
Bo CHEN, Bin-Xing FANG, and Xiao-Chun YUN
|
175-186
|
6 Invited
|
A Survey of Information Hiding
Schemes for Digital Images
Chi-Shiang CHAN,
and Chin-Chen CHANG
|
187-200
|
7
|
Design and Performance testing of
Arithmetic Operators Library for Cryptographic Application
El hadj youssef WAJIH, Zeghid MEDIEN, Machhout MOHSEN, and
Tourki RACHED
|
201-212
|
8
|
Performance Evaluation of Novel
Combined Input Crossbar Queue Switch with Virtual Crossbar Queues
Jaidhar C.D, and A.V. Reddy
|
213-218
|
9
|
A New Method for Interactive
Frequent Itemsets Mining
Hai-Tao HE, and Shi-Ling ZHANG
|
219-224
|
10 Invited
|
A Review of Survivable Transport
Networks Based on p-Cycles
Raghav YADAV, Rama Shankar YADAV, and Hari Mohan SINGH
|
225-233
|
Volume
1, Number 2: 2007
Article#
|
Article Title & Authors (Volume 1 Number 2
2007)
|
Page
|
1
|
Research on the Temporal Model in
Video Compression
Wei CUI, Huai-Kun XIANG, Yong YAO,
Jian-Wei LIU and Quan CAO
|
71-76
|
2
|
Image Authentication Method by
Combining Digital Signature and Watermarking
Chia-Hung LU, Hao-Kuan TSO, Der-Chyuan LOU*, and Jian-Ting DAI
|
77-83
|
3
|
Guaranteed Cost Control of
Discrete-time Fuzzy Systems Based on Fuzzy Lyapunov Function Approach
Yan WANG, Zeng-Qi SUN, Fu-Chun SUN
|
85-91
|
4
|
Towards Dynamic Voltage Scaling in
Real Time Systems - A Survey
Nasro Min-Allah, Yong-Ji WANG, Jian-Sheng XING, Wasif Nisar, and Syed Asad
Raza Kazmi
|
93-103
|
5
|
A Survey of Rover Control Systems
Amel ZERIGUI, Xiang WU, Zong-Quan DENG
|
105-109
|
6
|
MIS: Mobile
Intelligent System I2C
Bus controller Wireless
Ahmed HABBANI, Jamal EL ABBADI
|
111-117
|
7
|
Image Watermark using Visual Model
Based Discrete Wavelet Transform
Cong JIN, Liang-Gang PAN and Ting SU
|
119-124
|
8
|
Variable Length Packets Switching
using Novel Combined Input Crossbar Queue Switch with Virtual Crossbar
Queues
C.D. JAIDHAR, and A.V. REDDY
|
125-129
|
9
|
Embedded Wavelet Image Compression
Algorithm Based On Full Zerotree
Yuan-Yuan HU, Xia-Mu NIU, Bian YANG, Yong ZHANG
|
131-138
|
10
|
Different Methods To Control
Nonlinear Systems Adapted To Constrained Generalized Predictive Control
M. SEDRAOUI, K. KEMIH, M. L. FAS and S. FILALI
|
139-147
|
Volume
1, Number 1: 2007
Article#
|
Article Title & Authors (Volume 1 Number 1
2007)
|
Page
|
1
|
Research on Traffic
Data-Collecting System Based on MC9S12D64 Microcontroller
Zhi-Gang ZHU, Huai-Kun XIANG, Jian-Wei LIU, Quan CAO and Tian YU
|
1-6
|
2
|
Block Truncation Coding Based
Histograms for Colour Image Retrieval
Zhe-Ming LU, and Hans BURKHARDT
|
7-9
|
3
|
Shape Constancy Computation Based
on Visual Perceptual Theory
Bing LI, Xi LI, De XU and Song-He FENG
|
11-14
|
4
|
Super-Resolution Reconstruction of
Compressed Video based on Various Noise Models
Zhong-Qiang XU and Xiu-Chang ZHU
|
15-21
|
5
|
Parameters Optimization for
Control System Model Based on Genetic Algorithm
Xiao-Hong Zhou
|
23-28
|
6
|
Efficient Systolic Arrays for
Power-Sum, Inversion, and Division in GF(2m)
Che Wun CHIOU, Chiou-Yng LEE and Jim-Min LIN
|
29-41
|
7
|
Multimodal Biometric
Identification System with One Training Sample Based on Face and Palmprint
Jian-Wei TANG, Xiao-Yuan JING and David ZHANG
|
43-48
|
8
|
A Hybrid Approach for Mobile Agent Security using Reversible Watermarking
and Dynamic Data Structure
Abid KHAN, Xia-Mu NIU and Yong ZHANG
|
49-54
|
9
|
On the Explicit Analytical
Solution of a Slider bearing with Non-Newtonian Fluid
A. SHAH, S. ISLAM, A. M. SIDDIQUI
|
55-63
|
10
|
An FPGA Prototyping of
Gabor-wavelets Transform for Motion Detection
Bing XIONG, Ce ZHU, Charayaphan CHAROANSAK and Wei YU
|
65-70
|
|