default search action
International Journal of Computers and Their Applications, Volume 17
Volume 17, Number 1, March 2010
- Baoying Wang, Imad Rahal, William Perrizo:
DAVYD: An iterative Density-Based Approach for Clusters with VarYing Densities. Int. J. Comput. Their Appl. 17(1): 2-15 (2010) - Sharad Sharma:
Fuzzy Approach for Predicting Probability of Reaching a Target in a Battlefield Environment. Int. J. Comput. Their Appl. 17(1): 16-24 (2010) - Wei Dong, Yang Wang, Hua Li, Chang Nian Zhang:
A Novel Watermarking Scheme for Blind Objective Image Quality Assessment. Int. J. Comput. Their Appl. 17(1): 25-33 (2010) - T. Justin Jose, P. Mythilli:
A Novel Hybrid Model for Content Based Mammogram Image Retrieval. Int. J. Comput. Their Appl. 17(1): 34-40 (2010) - Sandip C. Patel, Jeffrey L. Hieb, James H. Graham:
Secure Internet-Based SCADA for Monitoring and Control of Industrial Processes. Int. J. Comput. Their Appl. 17(1): 41-51 (2010) - Rong Yang, Adel Said Elmaghraby:
Simulating Web Domains Using Graph Models. Int. J. Comput. Their Appl. 17(1): 52-57 (2010)
Volume 17, Number 2, June 2010
- Bradley F. Dutton, Charles E. Stroud:
On-Line Single Event Upset Detection and Correction in Field Programmable Gate Array Configuration Memories. Int. J. Comput. Their Appl. 17(2): 59-69 (2010) - Smita S. Potdar, Kenneth G. Ricks:
Overhead Reduction for an Off-the-Shelf Real-Time Operating System. Int. J. Comput. Their Appl. 17(2): 70-83 (2010) - Sin Ming Loo, JingXia Wang:
Optimizing Reconfigurable Hardware Resource Usage in System-on-a-Programmable-Chip with Location Aware Genetic Algorithm. Int. J. Comput. Their Appl. 17(2): 84-94 (2010) - JingXia Wang, Sin Ming Loo:
Case Study of Finite Resource Optimization in FPGA using Genetic Algorithm. Int. J. Comput. Their Appl. 17(2): 95-101 (2010) - Chang N. Zhang, Hua Li:
Design of Optimal Fault-Tolerant VLSI Systolic Array. Int. J. Comput. Their Appl. 17(2): 102-107 (2010) - Mustafa Al-Fayoumi, Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi:
A New Digital Signature Scheme Based on Integer Factoring and Discrete Logarithm Problem. Int. J. Comput. Their Appl. 17(2): 108-115 (2010)
Volume 17, Number 3, September 2010
- Sarah Tasneem, Reda A. Ammar, Lester Lipsky, Howard A. Sholl:
Improvement of Real-Time Job Completion Using Residual Time-Based (RTB) Scheduling. Int. J. Comput. Their Appl. 17(3): 117-132 (2010) - Ahmad Alsaeed Tolba, Hamayun Ahmed Khan, Hazem M. Raafat:
Feature Fusion for Automated Visual Inspection of Flat Surface Products. Int. J. Comput. Their Appl. 17(3): 133-143 (2010) - Arunu Anand, Gautam B. Singh:
Modified SACO Algorithm for Productive Emergence. Int. J. Comput. Their Appl. 17(3): 144-149 (2010) - Dayong Ye, Minjie Zhang, Quan Bai, Khin Than Win:
A Novel Task Allocation Protocol in Agent Organizations and Its Application to Health Care Problems. Int. J. Comput. Their Appl. 17(3): 150-160 (2010) - Yasser Fouad Hassan:
Rough Set Genetic Programming. Int. J. Comput. Their Appl. 17(3): 161-171 (2010) - Paolino Di Felice, Massimo Ianni, Luigi Pomante:
Design and Evaluation of a Spatial Extension of TinyDB for Wireless Sensor Networks. Int. J. Comput. Their Appl. 17(3): 172-193 (2010)
Volume 17, Number 4, December 2010
- Dunren Che:
Guest Editor's Note. Int. J. Comput. Their Appl. 17(4): 195 (2010) - Gongzhu Hu:
Sentiment Analysis of Surveys using Both Numeric Ratings. Int. J. Comput. Their Appl. 17(4): 196-203 (2010) - Gordon K. Lee, Edward Grant:
Adaptive Fuzzy Inference for Edge Detection Using Compander Functions and Linear Fitness Function Transformations. Int. J. Comput. Their Appl. 17(4): 204-211 (2010) - Ahmad M. Sarhan:
Cancer Classification Based on DNA Microarray Data Using Cosine Transformation and Vector Quantization. Int. J. Comput. Their Appl. 17(4): 212-222 (2010) - Ziping Liu, Bidyut Gupta:
Data Broadcast Scheduling With Multiple Channels. Int. J. Comput. Their Appl. 17(4): 223-232 (2010) - Gary Thorpe, Nagi N. Mekhiel:
Modeling an Adaptable Memory Controller. Int. J. Comput. Their Appl. 17(4): 233-240 (2010) - Chet Langin, Dunren Che, Michael S. Wainer, Shahram Rahimi:
SOM with Vulture Fest Model Discovers Feral Malware and Visually Profiles the Security of Subnets. Int. J. Comput. Their Appl. 17(4): 241-249 (2010) - Guangzhi Qu, Osamah A. Rawashdeh, Dunren Che:
Self-Protection against Attacks in an Autonomic Computing Environment. Int. J. Comput. Their Appl. 17(4): 250-256 (2010)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.