


default search action
Journal of Next Generation Information Technology, Volume 3
Volume 3, Number 1, February 2012
- Kelvin C. K. Wong, William K. Cheung

:
Evaluating ICT Literacy Differences in Arts and Science Students. 1-6 - Ganesh Chandra Deka, Jasni Mohamad Zain

, Prabhat Mahanti:
ICT's Role in e-Governance in India and Malaysia: A Review. 7-16 - Yadav Kuleesha, Lin Feng:

Biomedical Image Visualization as a Web Application. 17-27 - Xiangyan Zeng, Yenwei Chen, Owen Hughes, Henning Stahlberg

:
Iterative Transform Algorithms for 3D Reconstruction of 2D Crystals. 28-35 - Inwhee Joe, Hyojin Lee, Kyu-Seek Sohn:

A Group-based Mobile MPLS Protocol for Fast Handover and Low Power Consumption. 36-46 - Fernando Ferri

, Arianna D'Ulizia
, Patrizia Grifoni
:
Multimodal Language Specification for Human Adaptive Mechatronics. 47-57 - Ruth Agada, Jie Yan:

Research to Improve Communication by Animated Pedagogical Agents. 58-69
Volume 3, Number 2, May 2012
- Pusik Park, Rustam Rakhimov Igorevich

, Jongchan Choi, Dugki Min, Jongho Yoon:
Angular Depth Map Generation for Gesture Recognition. 1-8 - Zahra Riahi Samani, Mehrnoush Shamsfard:

On The Application of Fuzzy Ontology for Qualitative Spatial Reasoning. 9-18 - Ali Amer Ahmed, R. B. Ahmad

, Saadi A. Alobaidi
, Abid Yahya
, Layth A. Hassnawi, Zaid Ghanim Ali
, Hazim H. Tahir:
Sliding Mode Simulation and Robustness Controller. 19-28 - Zhijiang Gao, Huaxin Zeng, Yu Xia:

Bidirectional Feedback Packet Scheduling for CICQ Switches. 28-36 - Gongjun Yan, Weiming Yang, Jingli Lin, Danda B. Rawat:

Cross-layer Location Information Security in Vehicular Networks. 37-56 - Abbas Fadhil Mohammed Ali Aljuboori, Do Jae Su, Franz Ko:

Web Site Evaluation: Trends and Existing Approaches. 57-64
Volume 3, Number 3, August 2012
- Akira Murayama, Akinori Kanasugi:

A Processor for GA based on Redundant Binary Number using FPGA. 1-9 - Guifang Duan, Shuci Wu, Yen-Wei Chen:

Robust Facial Feature Point Extraction via Viewpoint-Specific Active Appearance Model. 10-18 - Jigisha N. Patel, Suprava Patnaik

, Murali D.:
Multilayered JPEG Image Transmission over SUI Channel Using UEP and Error Concealment Techniques. 19-26 - Sangyun Lee:

Java Garbage Collection for Embedded Java Virtual Machines: Design, Implementation, and Performance Evaluation. 27-40 - Kun Lee:

Multiresolution Volumetric Medical Data Modeling Based on Gaussian Curvature by Using Weighted Alpha. 41-51 - Sherin M. Youssef

, Saleh Mesbah, Yasmine M. Mahmoud:
A Hybrid Wavelet-based Image Retrieval. 52-65 - Farid Ghani, Musfira Jilani, Mohit Raghav, Omar Farooq

, Yusuf Uzzaman Khan:
Development of Brain Computer Interface for Elbow Movement Detection. 66-74 - Masoud Barati, Ehsan Akbari:

A Backbone Formation And Learning Automata-Based Algorithm for Improving Life Time in Wireless Sensor Networks. 75-86 - Marjan Gusev

, Sasko Ristov
:
Performance Gains and Drawbacks using Set Associative Cache. 87-98 - Hajar Mat Jani:

Modeling Total Quality Management in Higher Education with Case-Based Reasoning. 99-109
Volume 3, Number 4, November 2012
- Anwar Alyatama

, Kassem Saleh, Nidal Nasser
:
A Novel Hierarchical and Heterogeneous Mobile Agent-Based Wireless Sensor Networks (HHMA-WSN) Architecture. 1-9 - Fazal Wahab Karam, Terje Jensen:

Vertical Handover in Next Generation Wireless Networks. 10-25 - Donggyu Kim

, Kwang-Seok Hong, Kwang-Woo Chung:
Implementation of Portable Multi-Channel EEG and Head Motion Signal Acquisition System. 26-34 - Sunil K. Timalsina, Sangman Moh:

A Review on NFC and NFC-Based Mobile Payment Solution. 35-44 - Cahyo Crysdian

, Abdul Hanan Abdullah:
The Application of Multi Gradient Operators to Enhance Watershed Transform for Generic Medical Segmentation. 45-53 - Seonmin Hwang, Bok-Hee Song, Han-Kyung Yun:

Fuzzy Inference of Textile Animation Using Explicit Midpoint Rule. 54-62 - Faisal Alshuwaier, Abdullah A. Alshwaier, Ali Areshey

:
Effective Use of Cloud Computing Services in Education. 62-77 - Sabah S. Al-Fedaghi

:
Toward a New Methodology of Software Evolution. 78-87

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














