|
|
Volume 3, Number 4: 2009
Article#
|
Article Title &
Authors (Volume 3 Number 4 2009)
|
Page
|
1
|
Path Map Generation of an Unknown Area Using a Self Guided
Vehicle by Radon Transform and Shortest Path Calculation by Moore’s
Algorithm
K. AHMED, M. S. MUNIR, and A. S. M.
SHIHAVUDDIN
|
281-287
|
2
|
Optical Recognition of Handwritten Devnagari Numerals with
Multifarious Recognition System
C. Vasantha LAKSHMI, Ritu JAIN and C.
PATVARDHAN
|
289-296
|
3
|
Tunable Bandpass Filter
Using RF MEMS Switches
A.H.M.
Zahirul ALAM, Md. Rafiqul ISLAM, and Sheroz KHAN
|
297-301
|
4
|
Improved Cryptanalysis on the Cryptosystem Based on DLP γ=αaβb
R.PADMAVATHY, and Chakravarthy
BHAGVATI
|
303-306
|
5
|
Exaggeration Cloning From
Example Sequence
Tong-Yee
LEE, Ping-Hsien LIN, Shao-Wei YEN, Ming-Te CHI, Yu-Shuen WANG, Chih-Yuan YAO, and Jin-Lung
LIN
|
307-313
|
6
|
New Approach to Design a Hamilton
p-Cycle
Sanjay Kumar SAHU
|
315-317
|
7
|
Robust Optimal Sliding Mode Tracking Control for PMSM with
Uncertainties
Hai-Ping
PANG, and Xia CHEN
|
319-323
|
8
|
Hepatitis B Disease Diagnosis Using Artificial Neural Network
Ghumbre Shashikant UTTRESHWAR, and A.
A. GHATOL
|
325-333
|
9
|
Scheduling Approach for Run Time Reconfigured Systems
Bouraoui OUNI, Abdellatif
MTIBAA, and EL-bay BOURENNANE
|
335-340
|
10
|
My Agent Oriented Market
Transaction Handling Using Multi-Agent System
Syed Fawad MUSTAFA and Syed Sharaf
ALIJAFFRI
|
341-344
|
11
|
“When to Stop Testing” Using
Non Homogenous Poisson Process Based Cumulative priority Model
Praveen Ranjan SRIVASTAVA, Abhishek
GUPTA, Sushil TIWARI, and Pulkit MATHUR
|
345-350
|
12
|
Image Magnification based on
Directed Linear Interpolation
T. Romen SINGH, O. Imocha SINGH, Kh. Manglem SINGH, Tejmani
SINAM and Th. Rupachandra SINGH
|
351-359
|
13
|
Development of SS7 and IP
Based SIGTRAN protocol analyzer software operated with designed USB E1
interface card
M. S. MUNIR, K. AHMED, A. S. M.
SHIHAVUDDIN, M. Y. RAZIB, and K. R. AHMED
|
361-366
|
14
|
Efficient Application of Association
Rule Mining Algorithms on an Encoded Temporal Database with Weighted
Items
Chelliah BALASUBRAMANIAN, and
Karuppaswamy DURAISWAMY
|
367-372
|
|
Volume 3, Number 3: 2009
|
Article#
|
Article Title & Authors
(Volume 3 Number 3 2009)
|
Page
|
1
|
Texture Analysis
using Haar Wavelet based Laws method
S. SURESH KUMAR
and L .GANESAN
|
173-178
|
2
|
Software Testing
Effort Estimation using Fuzzy Logic Praveen
Ranjan SRIVASTAVA, Suresh SAGGAR, A.P.SINGH and
Raghurama G
|
179-184
|
3
|
Secure the AD HOC
Networks
G. RAMESH,R. UMARANI,S. SELVARAJ, and C. KARPAGAM
|
185-193
|
4
|
Semantic Search
using Conceptual Graphs
R.RENUGA and Dr.SUDHASADASIVAM
|
195-200
|
5
|
DSP
Implementation and Performances Evaluation of 2D DWT for JPEG2000
compression
Ihsen GAZZAH, Chokri SOUANI and Kamel BESBES
|
201-206
|
6
|
A Memetic
Algorithm to Time-Cost Trade off in Project Scheduling
Barmak Hooshyar AZAR and Amir Masoud RAHMANI
|
207-212
|
7
|
Contextual
Frequent Words Mining for Chinese Text Clustering
Xian-Jun Meng, Qing-Cai Chen, Xiao-Long Wang, Ying
Ding, Xuan Wang
|
213-220
|
8
|
A Multi-Document
Summarization Approach Based on Extracts Classification
Fatma KALLEL JAOUA, Lamia HADRICH BELGUITH, Maher JAOUA, and
Abdelmajid BEN HAMADOU
|
221-231
|
9
|
Realization of
Quantum Boolean Circuits using Garbage Free Fredkin Operations
Amlan CHAKRABARTI, and Susmita SUR-KOLAY
|
233-237
|
10
|
Distributed
Computing Techniques for Information Handling in Wireless Ad Hoc Sensor
Networks
M.K.JEYA KUMAR
|
239-245
|
11
|
New Approaches
Reducing Handoff Latency in 802.11 Wireless LANs
Monji ZAIDI, Ridha OUNI, Jamila BHAR and Rached
TOURKI
|
247-255
|
12
|
A Review of
Survivable WDM Optical Networks for Unicast and Multicast Traffic
Baibaswata MOHAPATRA,
Rajendra K. NAGARIA, and Sudarshan TIWARI
|
257-264
|
13
|
Overview of
Intrusion Detection Systems
V. K. PACHGHARE, Dr. Parag KULKARNI and Deven M.
NIKAM
|
265-268
|
14
|
Statistical
Approach for Content-based Face Image Retrieval
Qi HAN, Zhi-fang WANG, Qiong LI and Xia-mu NIU
|
269-274
|
15
|
A Fast Automatic
Registration Scheme of 3D Face Model for Template Protection
Wenjun HUANG, Min LUO and Xiamu.NIU
|
275-280
|
Volume 3, Number 2: 2009
|
Article#
|
Article Title &
Authors (Volume 3 Number 2 2009)
|
Page
|
1
|
A
Software Stress Testing Experiment
Hassan I. MATHKOUR, Ghazy M.R. ASSASSA, and Huda
Bin SADIQ
|
63-70
|
2
|
Med
Search – A Vertical Search Engine
Rajashree SHETTAR, Dr. Shobha G, and Rakshitha IYER
|
71-76
|
3
|
Item
Conflict Based Sanitization to Preserve Privacy in Utility Itemset Mining
R.R.RAJALAXMI, and A.M.NATARAJAN
|
77-83
|
4
|
Specification
and Verification of Hardware Circuits using mCRL
K.L. MAN
|
85-93
|
5
|
A secure Face Recognition System
Zhifang WANG, Qi HAN, Christoph BUSCH, and Xiamu
NIU
|
95-98
|
6
|
Dual
Watermarking Scheme for Copyright Protection
Kh. Manglem SINGH
|
99-106
|
7
|
Diminution
of Space and Size Complexity on Object-Relational Database Using
Principal Component
P. UMAMAHESWARI, and Dr.M.RAJARAM
|
107-113
|
8
|
ROBDD
– Software and Hardware Representations
Mohamed RASEEN, and K. THANUSHKODI
|
115-120
|
9
|
Agent
Based Prototype Model for Requirement Gathering, Categorization and Goal
Extraction
Prabhat RANJAN, and A. K. MISRA
|
121-132
|
10
|
Robust
and Secure Perceptual Hashing Method with Diffusion Capability
Hui ZHANG, Qiong LI, Xiamu NIU, Yanan WANG
|
133-136
|
11
|
QoS-aware
Bandwidth Management using Fuzzy Control Theory in Heterogeneous Wireless
Networks
I-Shyan HWANG, Bor-Jiunn HWANG and Ling-Feng KU
|
137-142
|
12
|
Adaptive
Neural Network Impedance Control for Robotic Manipulators Driven by
Current-Fed Induction Motors
Ming-Chang Hwang
|
143-149
|
13
|
Designing
a Prototype of Living Product
- Interactive Modular Display (IMD)
Yuan-Bang CHENG, and Huei-Sheng YU
|
151-157
|
14
|
Image
Restoration with Missing Edge Detection
Hwei-Jen LIN, I-Chun PAI and Hung-Hsuan WU
|
159-163
|
15
|
Solving
the Scheduling Problem by Swarm Intelligent Optimization Ruey-Maw
CHEN, Chung-Lun WU, and Shih-Tang LO
|
165-171
|
Volume 3, Number 1: 2009
|
Article#
|
Article Title & Authors
(Volume 3 Number 1 2009)
|
Page
|
1
|
A Novel Method for
Content Based Image Retrieval Using Color Features
Huu Quynh NGUYEN, and Quoc Tao NGO
|
1-6
|
2
|
Fingerprint
Recognition Using Principal Component Analysis and Various Distance
Measures
Ismail A. ISMAIL ,
Mohammed A. RAMADAN,
Talaat . El DANF, and
Ahmed H. SAMAK
|
7-10
|
3
|
VLSI Implementation
of an LNS Divider Applicable to Mobile 3D
Graphics Processors
Yong-Hwan LEE, and Young-Sung CHO
|
11-15
|
4
|
Hybrid
Genetic-Particle Swarm Optimizer for Document Clustering
K. PREMALATHA , and Dr. A.M. NATARAJAN
|
17-22
|
5
|
A Finite Element
Approach for Modeling the Capacitive Coupling in Conductors Installed nearby
AC Power Lines
A. H. Al-BADI, and M. A. SALAM
|
23-28
|
6
|
Network on Chip
switch scheduling approach for QoS and hardware resources adaptation
Abdelhamid
HELALI, and Salem NASRI
|
29-35
|
7
|
An Improved Packet
Marking Scheme for Tracing DDoS Attack
Wan-Biao LI, Xiao-Ming CHEN, and Shi-Qiang JI
|
37-42
|
8
|
Improving HG Method
for Content Based Landscape Image Retrieval
Huu Quynh NGUYEN, and Quoc Tao NGO
|
43-47
|
9
|
An Improved
Particle Swarm Optimization for Prediction Model of Macromolecular
Structure
Fuli RONG, Yang YI,and Yang HU
|
49-54
|
10
|
Embedding Secret
Binary Message Using Locally Adaptive Data Compression Coding
Chin-Chen CHANG, Chin-Feng LEE and Lin-Yi CHUANG
|
55-61
|
|