Survey on Inter-Vehicle Communication Applications: Current Trends and Challenges
M.S. Javadi, S. Habib and M.A. Hannan
Information Technology Journal Volume 12, Number 2, 243-250, 2013
Abstract PDF Fulltext Citations XML References
Self-assessment of an 5S Audit in Semiconductor Manufacturing
Yung-Chia Chang, Chuan-Yung Chen and Kuei-Hu Chang
Information Technology Journal Volume 12, Number 2, 251-263, 2013
Abstract PDF Fulltext Citations XML References
Hybrid Traffic Oriented Energy Efficiency Access Strategy of Wireless Sensor Network
Yasong Wang, Qinyu Zhang and Yunhe Li
Information Technology Journal Volume 12, Number 2, 264-275, 2013
Abstract PDF Fulltext Citations XML References
Generalized S Transform with Adaptive Optimized Window and its Application in Seismic Signal Analysis
Jicheng Liu, Jianhong Yao and Xia Liu
Information Technology Journal Volume 12, Number 2, 276-286, 2013
Abstract PDF Fulltext Citations XML References
Adaptive Peak Decomposition Approach for the Fault Diagnosis of Reciprocating Compressor based on General Frequency
Tang Youfu, Liu Shulin, Lei Na and Jiang Ruihong
Information Technology Journal Volume 12, Number 2, 287-296, 2013
Abstract PDF Fulltext Citations XML References
Privacy-protected Multimodal Biometric-based Group Authentication Scheme for ATM
B. Shanthini and S. Swamynathan
Information Technology Journal Volume 12, Number 2, 297-305, 2013
Abstract PDF Fulltext Citations XML References
Commercial Banking Efficiency in Nepal: Application of DEA and Tobit Model
Suvita Jha, Xiaofeng Hui and Baiqing Sun
Information Technology Journal Volume 12, Number 2, 306-314, 2013
Abstract PDF Fulltext Citations XML References
ECG Signal Pre-processing by Lifting Scheme Constructing Multi-resolution Morphological Decomposition
Pu Zhang, Qinyu Zhang, Masatake Akutagawa, Yousuke Kinouchi and Shinsuke Konaka
Information Technology Journal Volume 12, Number 2, 315-322, 2013
Abstract PDF Fulltext Citations XML References
Localization using a Mobile Beacon in Wireless Sensor Networks
Wei Zhou, Weiren Shi, Peng Gao, Hongde Zhang and Xiaogang Wang
Information Technology Journal Volume 12, Number 2, 323-330, 2013
Abstract PDF Fulltext Citations XML References
A Monitoring Experiment for Gas Path Electrostatic Probe-type Sensor on Turbojet Engine
Yu Fu, Hongfu Zuo, Ruiming Wang, Pengpeng Liu, Jing Cai and Zhenhua Wen
Information Technology Journal Volume 12, Number 2, 331-337, 2013
Abstract PDF Fulltext Citations XML References
A Novel Detector Generation Scheme for Detecting the Level of Abnormality of Equipment
Yinghui Liu, Shulin Liu and Yuzhen Li
Information Technology Journal Volume 12, Number 2, 338-344, 2013
Abstract PDF Fulltext Citations XML References
The Entropy Rate Estimation for Scalable Wavelet Video Coders using Hidden Markov Process
Lizhi Zhang, Zhijie Zhao, Xuesong Jin and Huadong Sun
Information Technology Journal Volume 12, Number 2, 345-350, 2013
Abstract PDF Fulltext Citations XML References
Study of OSPF Routing Optimization among Forwarding Elements in the ForCES Router
Dan-Dan Wang, Li-Gang Dong, Fu-Rong Zhou and Wei-Ming Wang
Information Technology Journal Volume 12, Number 2, 351-356, 2013
Abstract PDF Fulltext Citations XML References
Synchronizability Optimization for the Edge Iteration Based Deterministic Small-world Network with the Modified Simulated Annealing Algorithm
Xin-Feng Li, Shi-Ze Guo, Yu-Xin Su and Zhe-Ming Lu
Information Technology Journal Volume 12, Number 2, 357-362, 2013
Abstract PDF Fulltext Citations XML References
A Spatial Database Index Method Based on Doubletree Structure
Dengyin Zhang, Hao Wu and Chunling Chen
Information Technology Journal Volume 12, Number 2, 363-368, 2013
Abstract PDF Fulltext Citations XML References
Node Stability Based Client Routing for 802.11s Networks
A. Prasina, T. Yogamithra and M.A. Bhagyaveni
Information Technology Journal Volume 12, Number 2, 369-374, 2013
Abstract PDF Fulltext Citations XML References
Enhanced Dynamic Self-organizing Maps For Data Cluster
Li Feng and Li-Quan Sun
Information Technology Journal Volume 12, Number 2, 375-379, 2013
Abstract PDF Fulltext Citations XML References
Malware Detection Through Mining Symbol Table of Linux Executables
Jinrong Bai, Yanrong Yang, Shiguang Mu and Yu Ma
Information Technology Journal Volume 12, Number 2, 380-384, 2013
Abstract PDF Fulltext Citations XML References