​
Login / Signup
Int. J. Adv. Comp. Techn.
2010
2010
2010
Keyphrases
Publications
volume 2, number 3, 2010
Hee-Cheul Kim
,
Hyoung-Keun Park
The Comparative Study of Software Optimal Release Time Based on Burr Distribution.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Ali H. Hamad
,
Fatima B. Ibrahim
Path Planning of Mobile Robot Based on Modification of Vector Field Histogram using Neuro-Fuzzy Algorithm.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Vasi Narasimhulu
,
Pothula Sujatha
,
P. Dhavachelvan
,
M. S. Saleem Basha
Enhanced Named Entity Transliteration Model Using Machine Learning Algorithm.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Ahmed J. Jameel
Performance Enhancement of Wireless Communication Systems using Transmit and Receive diversity.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Yi-Sheng Huang
,
Yen-Liang Pan
An Improved Deadlock Prevention Strategy for FMSs Using Theory of Regions.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Shinya Nozaki
,
Yen-Wei Chen
,
Rumiko Azuma
,
Zensho Nakao
,
Yoshinori Namihira
A Fourier Series Based Method of CT Image Reconstruction for Laser Fusion Research.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Liangji Chen
,
Changyin Gao
,
Xianzhang Feng
Five-axis NURBS Path Real-time Generation Method in CNC System.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Om Pal
,
Peeyush Jain
,
Sudhansu Goyal
,
Zia Saquib
,
Bernard L. Menezes
Intrusion Detection Using Graph Support: A Hybrid Approach of Supervised and Unsupervised Techniques.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Yonsik Lee
,
Jeongsu Lee
The Migration of Mobile Agent Using the Object Replication.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
M. S. Saleem Basha
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Haider Fakher Radhi Al-Saidy
New Proposed Algorithms for nth Order Butterworth Active Filter Computer-Aided Design.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Sook-Young Choi
,
Seong-Hun Ahn
Quality Assurance of Distance Education in Korea.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Muhammad Usman
,
Russel Pears
Integration of Data Mining and Data Warehousing: A Practical Methodology.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
Shailesh Khapre
,
Madarapu Naresh Kumar
,
P. Dhavachelvan
,
S. K. V. Jayakumar
V-Book: Memoryless Editor for eBooks.
Int. J. Adv. Comp. Techn.
2 (3) (2010)
volume 2, number 4, 2010
Jamaiah Haji Yahaya
,
Aziz Deraman
Measuring the Unmeasurable Characteristics of Software Product Quality.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Hao Chen
,
Jianhua Sun
,
Qianjie Zhang
,
Ke Mao
An Execution-flow Based Method for Detecting Cross-Site Scripting of Ajax Applications.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Xiaoling Wang
,
Clement H. C. Leung
Representing Image Search Performance Using Time Series Models.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Urmila Shrawankar
,
Vilas M. Thakare
Voice Activity Detector and Noise Trackers for Speech Recognition System in Noisy Environment.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Fatemeh Kafili Kasmaee
,
Ramin Nassiri
,
Gholamreza Latif Shabgahi
Achieving CMMI Maturity Level 3 by Implementing FEAF Reference Models.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Aihua Zheng
,
Jixin Ma
,
Xiaoyi Zhou
,
Bin Luo
Efficient and Effective State-based Framework for News Video Retrival.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Jane J. Stephan
,
Sana'a Khudayer
Gesture Recognition for Human-Computer Interaction (HCI).
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Sook-Young Choi
,
Seong-Hun Ahn
Quality Assurance for Online Programs.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Jing-Chiou Liou
,
Sujith Bhashyam
On Improving Feasibility and Security Measures of Online Authentication.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Shuxiang Xu
Data Mining Using Higher Order Neural Network Models With Adaptive Neuron Activation Functions.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Saif D. Salman
,
Ahmed A. Bahrani
Segmentation of Tumor Tissue in Gray Medical Images Using Watershed Transformation Method.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
J. G. Flores
,
G. Urquiza
,
J. A. Hernandez
Inverse neural Network to Optimal Performance of the hydraulic Turbine Runner Blades.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Sara-Meshkizadeh
,
Amir Masoud Rahmani
Webpage Classification based on Compound of Using HTML Features & URL Features and Features of Sibling Pages.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Mingwei Wang
,
Shan Li
,
Jingtao Zhou
,
Tao Yue
An Ontology and Agent Based Collaborate Platform in Digital Production Engineering.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Jingtao Zhou
,
Haicheng Yang
,
Mingwei Wang
,
Rongxia Zhang
,
Min Shi
A Review of Enterprise Information Integration from Content Level and System Level Perspectives.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Deepak Dahiya
,
Pooja Jain
Enterprise Systems Development: Impact of Various Software Development Methodologies.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Rahul Malhotra
,
Narinder Singh
,
Yaduvir Singh
An Efficient Fuzzy-GA Flow Control of Turbine Compressor System: A Process Control Case Study.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
Jaydip Sen
An Efficient Certification Scheme for Nodes in a Wireless Ad Hoc Network.
Int. J. Adv. Comp. Techn.
2 (4) (2010)
volume 2, number 5, 2010
Ali Modirkhazeni
,
Norafida Ithnin
,
Othman Ibrahim
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Haider Fakher Radhi Al-Saidy
New Proposed Algorithms for Nth Order Butterworth Passive Filter Computer-Aided Design.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Muththolib Sidheeq
,
Ali Dehghantanha
,
Geetha Kananparan
Utilizing Trusted Platform Module to Mitigate Botnet Attacks.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Fadhil A. Ali
Expert System Design of Two Electrostatic Lenses Column by Mixing Dynamic Programming and AI Techniques.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Bindiya M. Varghese
,
A. Unnikrishnan
,
Paulose Jacob
,
Justin Jacob
Correlation Clustering Model for Crime Pattern Detection.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Dorin Carstoiu
,
Elena Lepadatu
,
Mihai Gaspar
Hbase - non SQL Database, Performances Evaluation.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Bahaa I. Kazem
,
Ali H. Hamad
,
Mustafa M. Mozael
Modified Vector Field Histogram with a Neural Network Learning Model for Mobile Robot Path Planning and Obstacle Avoidance.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Ramzy S. Ali Al-Waily
Design of Robust Mixed H2/H(infinite) PID Controller Using Particle Swarm Optimization.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Fadhil Salman Abed
,
Nada Abdul Aziz Mustafa
A Proposed Technique for Information Hiding Based on DCT.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
J. Joshua Thomas
,
Ahamad Tajudin Abdul Khader
,
Bahari Belaton
,
Amy Leow
VIZSolution: An Interface Tool to Solve Real-world Examination Timetabling Problem.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Mohammad Reza Moohebat
,
Mohammad Davarpanah Jazi
A Comparative Study of Critical Success Factors (CSFs) in Implementation of ERP in Developed and Developing Countries.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Ami T. Choksi
,
Devesh C. Jinwala
Improving Semantic Matching of Grid Resources Using Refined Ontology with Complement Class.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Haiyan Zhu
,
Quansheng Dou
,
Ping Jiang
Further Results on Fault Classes in Boolean Specifications.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Nitin
,
Amanpreet Singh Arora
,
Aditya Patel
,
Radhika Medury
,
Shubhrangshu Naval
,
Rajat Gupta
,
Srishti Sarin
Enhancing E-mail Security by CAPTCHA based Image Grid Master Password.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Osamu Mizuno
,
Hideaki Hata
A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Amir Sabbagh Molahosseini
,
M. Kuchaki Rafsanjani
,
S. H. Ghafouri
,
M. Hashemipour
-1}.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Azzam A. Marouf
,
Ali H. Hamad
,
Sameer A. Abdelrazzak
A Developed Modified OSAP Controller with Repetitive Control Action for UPS.
Int. J. Adv. Comp. Techn.
2 (5) (2010)
Ravi Rastogi
,
Nitin
,
Durg Singh Chauhan
Fast Interconnections: A Case Tool for Developing Fault-tolerant Multi-stage Interconnection Networks.
Int. J. Adv. Comp. Techn.
2 (5) (2010)