Electricity Demand Function for the Industries of Iran
S. Farid Ghaderi, M.A. Azadeh and S. Mohammadzadeh
Information Technology Journal Volume 5, Number 3, 401-404, 2006
Abstract PDF Fulltext Citations XML References
Performance Analysis of Rekeying Protocols in Multicast Group Key Management
B. Varthini and S Valli
Information Technology Journal Volume 5, Number 3, 405-408, 2006
Abstract PDF Fulltext Citations XML References
Online Evaluation of Ibn Sina Elearning Environment
Samir Zidat and Mahieddine Djoudi
Information Technology Journal Volume 5, Number 3, 409-415, 2006
Abstract PDF Fulltext Citations XML References
Hardware Implementation of Instruction Level Parallel Architecture Incorporating Special Functional Units for Image Processing Algorithms
Information Technology Journal Volume 5, Number 3, 416-421, 2006
Abstract PDF Fulltext Citations XML References
Deblocking in BDCT Image and Video Coding Using a Simple and Effective Method
Information Technology Journal Volume 5, Number 3, 422-426, 2006
Abstract PDF Fulltext Citations XML References
Network Border Patrol, a Novel Congestion Avoidance Mechanism for Improving QOS in Wireless Networks
T . Sasipraba and S.K . Srivatsa
Information Technology Journal Volume 5, Number 3, 427-432, 2006
Abstract PDF Fulltext Citations XML References
Design and Study of an Optical Fiber Digital Transmitter
R . Raza and S.A . Hayat
Information Technology Journal Volume 5, Number 3, 433-438, 2006
Abstract PDF Fulltext Citations XML References
Least Squares Support Vector Machine on Morlet Wavelet Kernel Function and its Application to Nonlinear System Identification
Fangfang . Wu and Yinliang . Zhao
Information Technology Journal Volume 5, Number 3, 439-444, 2006
Abstract PDF Fulltext Citations XML References
A Numerically Approximate High-speed Divider for Image Processing Applications
N . Venkateswaran and Y.V. Ramana Rao
Information Technology Journal Volume 5, Number 3, 445-447, 2006
Abstract PDF Fulltext Citations XML References
QoS Provisioning Through a Delay Based Endpoint Admission Control for a DiffServ Network
L . Senthilkumar and V . Sankaranarayanan
Information Technology Journal Volume 5, Number 3, 448-453, 2006
Abstract PDF Fulltext Citations XML References
A Model-driven Approach for Business Constraints Discovery
Information Technology Journal Volume 5, Number 3, 454-459, 2006
Abstract PDF Fulltext Citations XML References
An Aspect Architecture for Modeling Organizational Controls in Workflow Systems
Vu . Nguyen, Ronald . Lee and Kaushik . Dutta
Information Technology Journal Volume 5, Number 3, 460-470, 2006
Abstract PDF Fulltext Citations XML References
A Comprehensive Analysis of Digital Watermarking
Muhammad Aamir Qureshi and Ran Tao
Information Technology Journal Volume 5, Number 3, 471-475, 2006
Abstract PDF Fulltext Citations XML References
Writer Independent Online Handwritten Character Recognition Using a Simple Approach
Muhammad Faisal Zafar, Dzulkifli . Mohamad and Razib M. Othman
Information Technology Journal Volume 5, Number 3, 476-484, 2006
Abstract PDF Fulltext Citations XML References
A High-performance Psychoacoustics Approach to Speech Quality Evaluation
Zhang . Jun, Gao . Lei and Zhang . Deyun
Information Technology Journal Volume 5, Number 3, 485-488, 2006
Abstract PDF Fulltext Citations XML References
Network Topology Against Distributed Denial of Service Attacks
S. Behin Sam, S . Sujatha, A . Kannan and P . Vivekanandan
Information Technology Journal Volume 5, Number 3, 489-493, 2006
Abstract PDF Fulltext Citations XML References
Introduction to Multitone Multiresolution Wavelet Analysis
Information Technology Journal Volume 5, Number 3, 494-502, 2006
Abstract PDF Fulltext Citations XML References
Simulation of Improved MODFET Characteristics under Backside Illumination
V. Kannan, P.E. Sankarnarayanan and S.K. Srivatsa
Information Technology Journal Volume 5, Number 3, 503-506, 2006
Abstract PDF Fulltext Citations XML References
A Face Detection and Recognition System for Intelligent Vehicles
Khairul Anuar Ishak, Salina Abdul Samad and Aini Hussain
Information Technology Journal Volume 5, Number 3, 507-515, 2006
Abstract PDF Fulltext Citations XML References
Image Encryption Using Genetic Algorithm
Information Technology Journal Volume 5, Number 3, 516-519, 2006
Abstract PDF Fulltext Citations XML References
The Subset Search Algorithm: A New Attack on the Discrete Logarithm Problem over Finite Fields and Elliptic Curves
Information Technology Journal Volume 5, Number 3, 520-523, 2006
Abstract PDF Fulltext Citations XML References
Adaptive SAGA Based on Mutative Scale Chaos Optimization Strategy
Haichang . Gao, Boqin . Feng, Yun . Hou, Bin . Guo and Li . Zhu
Information Technology Journal Volume 5, Number 3, 524-528, 2006
Abstract PDF Fulltext Citations XML References
Predict Chaotic Time Series Using Minimax Probability Machine Regression
Liu . Zunxiong, Xie . Xin and Zhang . Deyun
Information Technology Journal Volume 5, Number 3, 529-533, 2006
Abstract PDF Fulltext Citations XML References
Source Routing Directed Diffusion in Wireless Sensor Networks
Information Technology Journal Volume 5, Number 3, 534-539, 2006
Abstract PDF Fulltext Citations XML References
Research on Learning Bayesian Networks by Particle Swarm Optimization
Xing-Chen Heng, Zheng Qin, Xian-Hui Wang and Li-Ping Shao
Information Technology Journal Volume 5, Number 3, 540-545, 2006
Abstract PDF Fulltext Citations XML References
The Activity-based Costing Approach for Estimation of Part`s Cost in FMS with A(2)-Degree Automation: A Case Study in a Forging Industry
K . Rezaie and B . Ostadi
Information Technology Journal Volume 5, Number 3, 546-550, 2006
Abstract PDF Fulltext Citations XML References
A Comparative Study of Clustering Algorithms
Satchidanandan . Dehuri, Chinmay . Mohapatra, Ashish . Ghosh and Rajib . Mall
Information Technology Journal Volume 5, Number 3, 551-559, 2006
Abstract PDF Fulltext Citations XML References
Data Mining Model for a Better Higher Educational System
K . Shyamala and S.P . Rajagopalan
Information Technology Journal Volume 5, Number 3, 560-564, 2006
Abstract PDF Fulltext Citations XML References
Partitioned Cube: Condensed Storage and Fast Access for Data Cube
Information Technology Journal Volume 5, Number 3, 565-572, 2006
Abstract PDF Fulltext Citations XML References
A Model-driven Approach to Aspect Mining
Bounour . Nora and Ghoul . Said
Information Technology Journal Volume 5, Number 3, 573-576, 2006
Abstract PDF Fulltext Citations XML References
Analysis and Review of Chest Radiograph Enhancement Techniques
I.C . Mehta, Z.J . Khan and R.R . Khotpal
Information Technology Journal Volume 5, Number 3, 577-582, 2006
Abstract PDF Fulltext Citations XML References
Business Process Simulation with Algebra Event Regular Expression
Safwan Al . Salaimeh and Khaled . Batiha
Information Technology Journal Volume 5, Number 3, 583-589, 2006
Abstract PDF Fulltext Citations XML References
A Research Study: Using Data Mining in Knowledge Base Business Strategies
Information Technology Journal Volume 5, Number 3, 590-600, 2006
Abstract PDF Fulltext Citations XML References
A Survey of Concurrent Object-oriented Languages (Cools)
Kalim . Qureshi and Paul . Manuel
Information Technology Journal Volume 5, Number 3, 601-611, 2006
Abstract PDF References