default search action
International Journal of Information and Communication Technology, Volume 7
Volume 7, Number 1, 2015
- E. Umamaheswari, T. V. Geetha:
Learning event patterns from news text using bootstrapping. 1-13 - Guangtao Ma, Yang Zhou, Tao Liu, Jun Li:
The quality of luminous environment of man-machine systems. 14-24 - Yasushi Yamaguchi:
Extended visual cryptography for continuous-tone images: effect of the optimum tone mapping. 25-39 - Sunil Pratap Singh, Preetvanti Singh:
Design and implementation of a location-based multimedia mobile tourist guide system. 40-51 - Mandana Farzaneh, Fatemeh Najafloo, Hatef Rasouli:
A study of employees' views of strategic information systems in Iranian banks: the case of internet banking. 52-72 - Cheng-Wen Yao, Te-Yi Lin:
Consumer behaviour with negative emotion in e-tailing service environment. 73-87 - Smita Prava Mishra, Debahuti Mishra, Srikanta Patnaik:
A new improved cluster validity indexing technique: harnessed from Goodman-Kruskal validity index. 88-99 - Zhaojie Zhu, Zhenhong Jia, Xizhong Qin, Chuanling Cao, Chun Chang:
Application of modified particle swarm optimisation on forecasting diffusion of mobile internet. 100-108 - Ming Jiang, Jian Wang, Xingqi Wang, Jingfan Tang, Chunming Wu:
A mixture language model for the classification of Chinese online reviews. 109-122
Volume 7, Numbers 2/3, 2015
- Chunying Wu, Shundong Li, Yiying Zhang:
Key management scheme based on secret sharing for wireless sensor networks. 126-140 - Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong:
Attribute-based signature schemes with accountability. 141-158 - Hiren J. Patel, Christine M. Schubert-Kabban, Rusty O. Baldwin, David P. Montminy:
Statistical analysis and comparison of linear regression attacks on the advanced encryption standard. 159-184 - Zhiqiang Lin:
On two circuit configurations of non-linear feedback shift registers. 185-201 - Dongyan Zhang, Tao Zhang, Pingxin Du:
A real-time data backup model and methods based on peer-to-peer network. 202-217 - Tapashi Kashyap Das, P. H. Talukdar, Kishore Dutta:
Hidden Markov model-based Assamese vowel phoneme recognition using cepstral features. 218-234 - Haining Luo, Xu An Wang:
New signature schemes in the standard model based on publicly verifiable CCA-secure public key encryption. 235-246 - Shangping Wang, Lihua Liu, Jin Sun, Yaling Zhang:
Multi-party concurrent signatures scheme from lattice. 247-262 - Xia Deng, Jianxin Wang, Le Chang:
Sociality-based comprehensive buffer management for multicast in DTNs. 263-277 - Huai Wu, Chunxiang Xu, Jiang Deng:
Server-aided aggregate verification signature: security definition and construction. 278-286 - Lin Cheng, Qiaoyan Wen:
Provably secure and efficient certificateless signature in the standard model. 287-301 - Peng Xiao, Dongbo Liu:
Improving network routing energy-efficiency for real-time workloads by stochastic service model. 302-315 - Xia Shao, Weidang Zhang, Ping Li:
Decreasing the BER of turbo codes with short frame by optimising the energy allocation. 316-323 - Xueyu Huang, Yongbo Xiang, Chuangming Tong, Na Wei:
Design of a microwave down-converter module. 324-332
Volume 7, Numbers 4/5, 2015
- S. B. Rini Jones, P. Poongodi, A. Immanuel Selvakumar:
Model reference fuzzy cascade controller: a novel method for attaining desired mass flow in a wind tunnel. 336-347 - Abdeldjalil Khelassi, Mohammed Amine Chikh:
Cognitive amalgam with a distributed fuzzy case-based reasoning system for an accurate cardiac arrhythmias diagnosis. 348-365 - A. Albert Rajan, S. Vasantharathna:
Experimental investigation on fuzzy-based dynamic PWM controller using FPGA for harmonics and torque ripple minimisation in BLDC motor drive. 366-384 - Amer Draa, Zeyneb Benayad, Fatima Zahra Djenna:
An opposition-based firefly algorithm for medical image contrast enhancement. 385-405 - Amsaveni Avinashiappan, P. T. Vanathi:
A comprehensive study on image steganography and steganalysis techniques. 406-424 - Shanty Chacko, J. Jayakumar:
Directional Gaussian filter with variable filtering strength and variable window size for deblocking digital images. 425-436 - S. Sridevi Sathya Priya, P. Karthigaikumar, N. M. Siva Mangai, R. Sandhya:
Efficient hardware implementation of AES algorithm using bio metric key. 437-454 - Tanuja Srivastava, Nirmal Yadav:
Error estimation of discrete convolution back projection for discrete Radon transform. 455-468 - Swati Tevatia, Rajesh Prasad:
Multi-patterns parameterised matching with application to computational biology. 469-480 - James Daniel Correa De Freitas, Henrique Rego Monteiro Da Hora, Dalessandro Soares Vianna, Helder Gomes Costa:
RIOT - a tool for estimating the reliability of surveys. 481-494 - Lihe Zhang, Chen Ma:
Multi-level K-means clustering and group sparse coding with quasi-SIFT feature for image classification. 495-507 - Zhaogan Lu, Chunmei Xu:
Multiple scale image segmentation-based multiple scale approximation with support vector machines. 508-520 - S. Uma Maheswari, D. Jude Hemanth:
Different methodology for image steganography-based data hiding: review paper. 521-536
Volume 7, Number 6, 2015
- Suman Das, Ranjan Ghosh:
Study of randomness in AES ciphertexts produced by various types of dynamic S-boxes. 537-561 - Omprakash Kaiwartya, Sushil Kumar:
Cache agent-based geocasting in VANETs. 562-584 - Subhankar Joardar, Vandana Bhattacherjee, Debasis Giri:
SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs. 585-606 - P. Latchoumy, P. Sheik Abdul Khader:
Reliable job execution with process failure recovery in computational grid. 607-631 - Sunil Kumar Singh, Rajesh Duvvuru, Jyoti Prakash Singh:
TCP and UDP-based performance evaluation of proactive and reactive routing protocols using mobility models in MANETS. 632-644 - Subasish Mohapatra, Banshidhar Majhi, Srikanta Patnaik:
An efficient event matching algorithm for publish/subscribe system in sensor cloud platform. 645-661 - Vivek Arya, Charu Gandhi:
Energy aware routing protocols for mobile ad hoc networks - a survey. 662-675 - H. Anandakumar, K. Nisha:
Enhanced multicast cluster-based routing protocol for delay tolerant mobile networks. 676-686
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.