A Multi-Channel Multimedia Content Distribution Strategy using Multiple Description Coding
Xuefeng Jiang, Shan Jiang and Ting Peng
Information Technology Journal Volume 8, Number 8, 1084-1093, 2009
Abstract PDF Fulltext Citations XML References
Characteristics of Flow past a Square Cylinder using the Lattice Boltzmann Method
S. Ul-Islam and C.Y. Zhou
Information Technology Journal Volume 8, Number 8, 1094-1114, 2009
Abstract PDF Fulltext Citations XML References
Processing Techniques for Querying Multimedia Contents
Zhongsheng Cao, Zongda Wu, Yuanzhen Wang and Guiling Li
Information Technology Journal Volume 8, Number 8, 1115-1128, 2009
Abstract PDF Fulltext Citations XML References
Towards Common Acquaintance Immunization Strategy for Complex Network
Pan Liu, Huaikou Miao and Jia Mei
Information Technology Journal Volume 8, Number 8, 1129-1139, 2009
Abstract PDF Fulltext Citations XML References
Realization of a Covert Communication System Over the Public Switching Telephone Network
Jixin Liu and Zheming Lu
Information Technology Journal Volume 8, Number 8, 1140-1149, 2009
Abstract PDF Fulltext Citations XML References
Design of Full Order Observer in Speed Sensorless Induction Motor Drive
Deng Xin, Zhao Jin, Geng Tao and Liu Yang
Information Technology Journal Volume 8, Number 8, 1150-1159, 2009
Abstract PDF Fulltext Citations XML References
The Analysis of the Synthetic Range Profile Based on Doppler Filter Bank using FFT
Wei Peng, Xuegang Wang, Kesong Chen and Bin Tang
Information Technology Journal Volume 8, Number 8, 1160-1169, 2009
Abstract PDF Fulltext Citations XML References
The Security Analysis and Enhancement of Photographic Authentication
Hsien-Chou Liao, Cheng-Hsiung Hsieh, Ching-Wen Chen and Wei-Chiang Chen
Information Technology Journal Volume 8, Number 8, 1170-1179, 2009
Abstract PDF Fulltext Citations XML References
Using Renyi Cross Entropy to Analyze Traffic Matrix and Detect DDoS Attacks
Information Technology Journal Volume 8, Number 8, 1180-1188, 2009
Abstract PDF Fulltext Citations XML References
A View-Based Approach to Three Dimensional Object Recognition
Xu Sheng and Peng Qi-Cong
Information Technology Journal Volume 8, Number 8, 1189-1196, 2009
Abstract PDF Fulltext Citations XML References
Distributed Index based on Geographic Hashing Table for Mobile Ad Hoc Networks
Yongsheng Fu, Xinyu Wang and Shanping Li
Information Technology Journal Volume 8, Number 8, 1197-1204, 2009
Abstract PDF Fulltext Citations XML References
Auto Rate MAC Protocol Based on Congestion Detection for Wireless Ad Hoc Networks
Wei Wu, Zhongzhao Zhang, Xuejun Sha and Chenguang He
Information Technology Journal Volume 8, Number 8, 1205-1212, 2009
Abstract PDF Fulltext Citations XML References
Tower Bridge Movement Analysis with GPS and Accelerometer Techniques: Case Study Yonghe Tower Bridge
Information Technology Journal Volume 8, Number 8, 1213-1220, 2009
Abstract PDF Fulltext Citations XML References
First-Price Sealed Auction Model with Increased Fairness for Resource
Allocation in Grids
M. Mirzayi and M.R. Khayyambashi
Information Technology Journal Volume 8, Number 8, 1221-1227, 2009
Abstract PDF Fulltext Citations XML References
An Extended iSCSI Protocol Recognizing Multicast Session: iTRM
Huailiang Tan, Weixin Tang and Bin Yin
Information Technology Journal Volume 8, Number 8, 1228-1234, 2009
Abstract PDF Fulltext Citations XML References
A Fast Association Rules Mining Algorithm for Dynamic Updated Databases
Ni Tian-quan, Wang Jian-dong, Peng Xiao-bing and LiuYi- an
Information Technology Journal Volume 8, Number 8, 1235-1241, 2009
Abstract PDF Fulltext Citations XML References
An Intelligent Topic Map-Based Approach to Detecting and Resolving Conflicts for Multi-Resource Knowledge Fusion
Huimin Lu and Boqin Feng
Information Technology Journal Volume 8, Number 8, 1242-1248, 2009
Abstract PDF Fulltext Citations XML References
Intelligent Model for Automatic Text Summarization
M.S. Binwahlan, N. Salim and L. Suanmali
Information Technology Journal Volume 8, Number 8, 1249-1255, 2009
Abstract PDF Fulltext Citations XML References
K-Means Clustering to Improve the Accuracy of Decision Tree Response Classification
S.A. Ali, N. Sulaiman, A. Mustapha and N. Mustapha
Information Technology Journal Volume 8, Number 8, 1256-1262, 2009
Abstract PDF Fulltext Citations XML References
An Enhanced Particle Swarm Optimization Algorithm
Xue-yao Gao, Li-quan Sun and Da-song Sun
Information Technology Journal Volume 8, Number 8, 1263-1268, 2009
Abstract PDF Fulltext Citations XML References
A Review of Software Transactional Memory in Multicore Processors
Chen Fu, Zhibo Wu, Xiaoqun Wang and Xiaozong Yang
Information Technology Journal Volume 8, Number 8, 1269-1274, 2009
Abstract PDF Fulltext Citations XML References
The Characteristics of Orthogonal Trivariate Wavelet Packets
Qingjiang Chen and Zongtian Wei
Information Technology Journal Volume 8, Number 8, 1275-1280, 2009
Abstract PDF Fulltext Citations XML References
Steganalysis Based on Difference Statistics for LSB Matching Steganography
Jiaohua Qin, Xingming Sun, Xuyu Xiang and Zhihua Xia
Information Technology Journal Volume 8, Number 8, 1281-1286, 2009
Abstract PDF Fulltext Citations XML References
Blockwise Reversible Data Hiding by Contrast Mapping
Wien Hong, Jeanne Chen and Tung-Shou Chen
Information Technology Journal Volume 8, Number 8, 1287-1291, 2009
Abstract PDF Fulltext Citations XML References