Computer and Information Science, Volume 5 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 5, Number 1, January 2012

Raymond Aschheim
, Smain Femmam, M. Faouzi Zerarka:
New "Graphiton" Model: a Computational Discrete Space, Self-Encoded as a Trivalent Graph. 2-12

Ahmed H. Gabr, Sherif Keshk, Aliaa A. A. Youssif:
Effect of Sensor Mobility and Channel Fading on Wireless Sensor Network Clustering Algorithms. 20-31

Huigang Fu, Chongjun Fan, Jianbai Wang, Ding Fang, Lu Yu, Xianglai Ran:
Research and Planning of Application Blueprint for Shanghai Airport Business Intelligence System. 32-37

Thomas J. B. Kropmans
, Barry G. G. O'Donovan, David Cunningham, Andrew W. Murphy, Gerard Flaherty, Debra Nestel, Fidelma P. Dunne:
An Online Management Information System for Objective Structured Clinical Examinations. 38-48

Zhi Wu, Yuedao Jiang, Genzhu Bai:
Segmented Optimal Multi-Degree Reduction Approximation of Bézier Curve. 49-54

Belkacem Athamena
, Zina Houhamdi
:
Structured Acceptance Test Suite Generation Process for Multi-Agent System. 55-61

Azizol Abdullah, Rohaya Latip, Wan Mohd Azraei Wan Mustapha:
Evaluation of an Economy-Based File Replication Strategy for Malaysian Research and Education Network (MYREN) Data Grid Model. 62-76

Mahdi Hariri, Shahriar B. Shokouhi:
Robustness of Multi Biometric Authentication Systems against Spoofing. 77-86

Yahya Salameh Hassan Khraisat:
Design a Wireless Meteorological Station in Jordan. 87-96

Hawrra Hassan Abass, Firas Mahdi Muhsin Al-Salbi:
Rotation and Scaling Image Using PCA. 97-106

Guohua Zhang:
Study on Compound Model of Forest-Pulp Enterprise Production Logistics Intelligent Distribution System. 107-112

Asim M. Murshid, S. N. Ahmad:
VLSI Architecture for Fuzzy Inference Processor using Triangular-Shaped Membership Function. 113-122

Mingqiu Li:
Research on the Simulation of Time-Delay System. 123-127
Volume 5, Number 2, March 2012

Jeff Butterfield, Thad Crews:
Casting a Wider Net: A Longitudinal Study Exploring Gender Differences, Influences and Attitudes Impacting Academic Major Selection in Computing. 2-10

Abdallah Alashqur:
Using a Lattice Intension Structure to Facilitate User-Guided Association Rule Mining. 11-21

Mingqiu Li:
Study on the Simulation of the APT Rough Tracing System Based on the Predictive Control Technology. 22-28

Gary Cantrell, David A. Dampier, Yoginder S. Dandass, Nan Niu, A. Chris Bogen:
Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model. 29-38

Ali Salih Mahmoud Saudi, Aliaa A. A. Youssif, Atef Z. Ghalwash:
Computer Aided Recognition of Vocal Folds Disorders by Means of RASTA-PLP. 39-48

Kaige Chen, Xiaojun Han, Tenghao Huang:
Target Detection Algorithm Based on the Movement of Codebook Model. 49-54

Justice G. Djokoto
:
The Use of Farm Information Systems among Grasscutter Farmers in Ga-South Municipality and Awutu-Senya District in Ghana. 55-68

Yahya Salameh Hassan Khraisat:
Analysis of the Parameters of Symmetrical Multi - Fed Full - Wave Dipole Antenna. 69-74

Chunsheng Zhang:
The Intelligent Decision Supporting Technology of Cloud-Based Public Data Warehouse. 75-78

Marwa M. A. Elfattah, Aliaa A. A. Youssif, Ebada Sarhan Ahmed:
Handset Malwares Threats Feature Extraction Based on Behavior Analysis. 79-87

Sami M. Alhomod, Mohd Mudasir Shafi:
Privacy Policy in E Government Websites: A Case Study of Saudi Arabia. 88-93

Ying Zheng:
Analysis and Design of GRB System Based on WSRF Web Service. 94-97

Siti Zobidah Omar, Hayrol Azril Mohamed Shaffril, Jusang Bolong, Jeffrey Lawrence D'Silva
:
Investigating Rural Library Usage among Rural Youth in Malaysia: Its Corresponding Determinants and Impacts. 98-104

Mostafa Elhachloufi, Ahmed El Oirrak, Driss Aboutajdine, Mohammed Najib Kaddioui:
3D Recognition Using Neural Networks. 105-110

Youyun Ao:
An Empirical Analysis of Fitness Assignment and Diversity-Preserving in Evolutionary Multi-Objective Optimization. 111-128
Volume 5, Number 3, May 2012
Articles

Olabode Olatubosun, Oluwole Charles Akinyokun:
Modeling and Simulation of a Decision Support System for Population Census in Nigerian. 2-19

A. S. Thuneibat:
Error Control Method for Interactive Video Applications over Modern Communication Networks. 20-26

Majed Bouchahma, Wanglin Yan, Mohammed Ouessar:
Island Coastline Change Detection Based on Image Processing and Remote Sensing. 27-36

Youssef Bassil, Mohammad Alwani:
Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information. 37-48

Jing Xu, Wei Zhao, Peng Liu, Xianglong Tang:
An Improved Guidance Image Based Method to Remove Rain and Snow in a Single Image. 49-55

Noreen Sarai, Godfrey Sithole:
Analysis of the Process and Outcomes of Eportfolio Development to Recognise Formal Learning in Zimbabwe. 56-66

Mohamed A. El-Zawawy, Nagwan Moustafa Daoud:
New Error-recovery Techniques for Faulty-Calls of Functions. 67-75

Chao Xu, Hongmei Ge:
An Application Research on Configuration Software System Platform Based on Component Technology. 76-82

Ahmad Khader Haboush, Mohammad Al Nabhan, Motassem Al-Tarazi, Mohammad Al-Rawajbeh:
Load Balancing Using Multiple Node Disjoint Paths. 83-89

Iraky Khalifa, Hala Mohamed Abbas:
Mobility Prediction in Dynamic Grids. 90-96

Mina Elmaallam, Abdelaziz Kriouile:
A Model of Maturity for IS Risk Management Case Study. 97-109

Rafiqul Zaman Khan, Noor Adnan Ibraheem:
Survey on Gesture Recognition for Hand Image Postures. 110-121

Jingchun Feng, Fujie Zhang, Dandan Zhu, Fei Zhang:
Function Point Estimation and Demonstration on Website Projects. 122-135
Volume 5, Number 4, 2012
Articles

Vahid Garousi, Tan Varma:
A Bibliometrics Analysis of Canadian Electrical and Computer Engineering Institutions (1996-2006) Based on IEEE Journal Publications. 1-24

Athanasios Margaris:
Simulation and Visualization of Chaotic Systems. 25-52

Mohamed A. El-Zawawy, Hamada A. Nayel
:
Type Systems Based Data Race Detector. 53-60

Latifa Oubedda, Brahim Erraha, Mohamed Khalfaoui:
Data Intelligent Analysis for Decision-Making at Universities. 61-67

Ahmed Roumane
, Kechar Bouabdellah, Kouninef Belkacem
:
Energy Efficient Fault Tolerant Routing Mechanism for Wireless Sensor Network. 68-76

Chao Xu, Hongmei Ge:
Research and Implementation of the Cloud Platform Based on the B-learning. 77-82

Moses Ekpenyong, Emem Obong Udoh:
Morpho-Syntactic Analysis Framework for Tone Language Text-to-Speech Systems. 83-101

A. K. Akinwole, O. J. Emuoyibofarhe:
Performance Comparison of Mobile Ad Hoc Network Routing Protocol and Transmission Control Protocol. 102-109

Zhisheng Wang, Xiaobing Xu:
Improved SOM-Based High-Dimensional Data Visualization Algorithm. 110-115

Waldo Hasperué, Laura Lanzarini, Armando De Giusti:
Rule Extraction on Numeric Datasets Using Hyper-rectangles. 116-131

Davood Kheyri, Mojtaba Karami:
A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET. 132-139
Volume 5, Number 5, 2012
Articles

Mingtao Shi:
Incorporating Information Security in Analysis of Business Strategy: A Conceptual Framework. 1-16

Maged Bouchahma, Wanglin Yan:
Automatic Measurement of Shoreline Change on Djerba Island of Tunisia. 17-24

Abbass S. Abbass, Aliaa A. A. Youssif, Atef Z. Ghalwash:
Hybrid-Based Compressed Domain Video Fingerprinting Technique. 25-34

Mohd Afzan Othman, Norlaili Mat Safri, Ismawati Abdul Ghani, Fauzan Khairi Che Harun
:
Characterization of Ventricular Tachycardia and Fibrillation Using Semantic Mining. 35-44

John Kamau, Sylvester Namuye:
A Review of Users Adoption of Open Source Software in Africa. 45-49

Jian-bo Wang, Chong-jun Fan, Lei Bai:
Air Traffic Forecast Empirical Research Based on the MCMC Method. 50-54

Pradip Kumar Biswas, Alberto Moreira Baptista
:
Growth of ICT Capital and Deceleration of Labour Productivity in the EU Countries: The Missing Links. 55-68

Qabas Abdal Zahraa Jabbar:
Evaluating Model for E-learning Modules According to Selected Criteria: An Object Oriented Approach. 69-75

Thuneibat S. A., Ababneh M. S.:
Sigma-Delta Modulator Simulation and Analysis Using MatLab. 76-80

Jianhao Tan, Jing Zhang, Ya Wang:
A Kind of CTA Bone Removal Technology Based on the Improved Watershed Algorithm. 81-87

Dawletbay Utebaev:
Finite Element Method for Internal Wave Equation for Stratified Fluid. 88-92

Manuel Alberto M. Ferreira
, Marina Andrade, José António Filipe:
The Age or Excess of the M|G|inf Queue Busy Cycle Mean Value. 93-97
Volume 5, Number 6, 2012
Articles

Nabil Arman:
A Materialized View for the Same Generation Query in Deductive Databases. 1-5

D. N. T. Kumar, Qufu Wei:
A General Computational Framework and Simulations of Branching Programs of Boolean Circuits Using Higher Order Logic (HOL) Software - An Insight into ECAD Tool Design Paradigm. 6-12

Arindam Chaudhuri:
Forecasting Financial Time Series Using Multiple Regression, Multi Layer Perception, Radial Basis Function and Adaptive Neuro Fuzzy Inference System Models: A Comparative Analysis. 13-24

Ahmed S. Rashad, Rowayda A. Sadek, Sherif Abdel Aziz El-Sherif:
An Efficient Hybrid Detection System for Abnormal Masses in Digital and Analog Mammogram. 25-32

Eisa Alanazi, Malek Mouhoub, Bandar Mohammed:
A Preference-Aware Interactive System for Online Shopping. 33-42

Hongmei Ge, Chao Xu, Qian Shi:
A Protection Method of Target Codes. 43-49

Rusli Abdullah, Amir Mohamed Talib
:
Towards a Personal Knowledge Model (PKM) in Collaborative Environment of School Teachers' Community. 50-57

Jésus Antonio Motta, Laurence Capus
, Nicole Tourigny:
Evaluation of Efficiency of Linear Techniques to Optimize Attribute Space in Machine Learning: Relevant Results for Extractive Methods of Summarizing. 58-72

Hend S. Al-Khalifa:
WCAG 2.0 Semi-automatic Accessibility Evaluation System: Design and Implementation. 73-87

Marios Poulos
, Ioannis Deliyannis, Andreas Floros
:
Audio Fingerprint Extraction Using an Adapted Computational Geometry Algorithm. 88-97

Petr Mach, Regina Janíková:
Analysis of the Case Studies Video Recordings. 98-104

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







