default search action
International Journal of Information and Communication Technology, Volume 9
Volume 9, Number 1, 2016
- M. Nageswara Guptha, A. Chitra:
An efficient service composition using frequent service sequence patterns over extended web service architecture. 1-16 - Vijayasundaram Uma, Gnanasekaran Aghila:
Mining frequent arrangements and sequencing of events for diseases prognosis using reference event-based temporal relations. 17-42 - Balamurugan Rengeswaran, A. M. Natarajan, K. Premalatha:
Biclustering microarray gene expression data using modified Nelder-Mead method. 43-63 - Asmaa Mountassir, Houda Benbrahim, Ilham Berrada:
New under-sampling methods to address the problem of unbalanced sentiment classification: application on Arabic datasets. 64-77 - Zhenhuan He:
Analysis on impact of redundant time on train rescheduling in high speed railway. 78-87 - S. Anto, S. Chandramathi, S. Aishwarya:
An expert system based on LS-SVM and simulated annealing for the diagnosis of diabetes disease. 88-100 - Noureddine Bouhmala:
A multilevel genetic algorithm for the clustering problem. 101-116 - Yugal Kumar, Gadadhar Sahoo:
A hybridise approach for data clustering based on cat swarm optimisation. 117-141
Volume 9, Number 2, 2016
- Vandana Singh:
Trademark law and comparative advertisement in India. 145-159 - Mohammed Khalil, Abdellah Adib:
Multiple audio watermarking system based on CDMA. 160-176 - Jenny Ng:
International cybercrime, transnational evidence gathering and the challenges in Australia: finding the delicate balance. 177-198 - P. M. Durai Raj Vincent, E. Sathiyamoorthy:
A novel and efficient public key encryption algorithm. 199-211 - Asutosh Kar, Mahesh Chandra:
Suppression of remnant nonlinear echo due to harmonic distortions in intelligent communication networks. 212-231 - Bangqiang Long, Zhoumo Zeng, Jing Dai:
A new method of fault tolerance based on partial reconfiguration. 232-241
Volume 9, Number 3, 2016
- Xin Jin, Mei Yu, Jiangying Zhu, Gangyi Jiang, Feng Shao, Zongju Peng:
Binocular visual characteristics-based stereoscopic image quality assessment metric for 3D video system. 243-260 - Suhua Zhou:
Optimation of simplified serial concatenated overlapped code division multiplexing system. 261-270 - Chaojin Qing, Xiucheng Dong, Hong Peng, Mintao Zhang, Kai Deng:
Frame synchronisation based on compressed sensing with correlation rule. 271-281 - Xiaoxu Diao, Bin Liu, Shihai Wang:
A survey of avionics analysis and simulation based on AADL model. 282-299 - Liyan Chen, Long Tan, Jun Lu:
Component identification method based on semantic similarity and the cluster algorithm. 300-311 - Shi Huishu, San Ye, Zhu Yi:
A rapid parameter selection method of kernel function. 312-321 - Chuanbao Du, Houde Quan, Peizhang Cui:
Performance analysis and optimisations of code resources in wireless dual-channel ad hoc network. 322-336 - Soumendu Chakraborty, Anand Singh Jalal:
High capacity secret image sharing using multilayer image steganography with primary cover predictive error. 337-355 - Vibhas Satyawan Tarfe, A. Arockia Selvakumar:
Path tracing for ground wheeled robot in partially known environment. 356-365 - B. Yamuna, T. R. Padmanabhan:
Reliability level list-based decoding of multilevel modulated block codes. 366-376
Volume 9, Number 4, 2016
- S. R. Mugunthan, C. Palanisamy:
Localised multi-root node mesh model for seamless handover in wireless personal networks. 377-388 - Miriyala Sridhar, K. Padma Raju, Ch. Srinivasa Rao, Devanaboyina Venkata Ratnam:
Mitigation of ionospheric scintillations for GPS signals under geomagnetic storm conditions using LMS adaptive filter. 389-407 - K. Baskaran, K. Muthulakshmi:
On the construction of localised topology structures in wireless networks. 408-419 - Rebekka B., S. Sudheep, B. Malarkodi:
Priority-based quality of service guaranteed radio resource allocation in long term evolution network. 420-437 - Amir Hassani Karbasi, Reza Ebrahimi Atani:
Projective plane-based key pre-distribution by key copying and exchanging based on connected dominating set in distributed wireless sensor networks. 438-462 - Zaihui Deng, Xiaojun Tong, Benshun Yi, Liangcai Gan:
Fountain codes based on modulo and neural network. 463-472 - Ganesh Gopal Deverajan, R. Saravanan:
Selfish node detection based on evidence by trust authority and selfish replica allocation in DANET. 473-491 - Nik Khadijah Nik Aznan, Kyung-Moo Huh, Yeon-Mo Yang:
EEG-based motor imagery classification in BCI system by using unscented Kalman filter. 492-508
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.