• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Volume 8, Number 8, 2009
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Publisher: Asian Network for Scientific Information

Citations


Search


Most Cited


Modeling Deflection Basin Using Neurofuzzy in Backcaluculating Flexible Pavement Layer Moduli
414 Citations

A Cloud-Based Collaborative Manufacturing Resource Sharing Services
307 Citations

An Overview of Robot Calibration
267 Citations

Indexed In


  • ASCI-Database
  • Asian Digital Library
  • Google Scholar
Asian Digital Library
Google Scholar

Volume 8, Number 8, 2009


A Multi-Channel Multimedia Content Distribution Strategy using Multiple Description Coding

Xuefeng Jiang, Shan Jiang and Ting Peng

Information Technology Journal Volume 8, Number 8, 1084-1093, 2009

Abstract PDF Fulltext Citations XML References

Characteristics of Flow past a Square Cylinder using the Lattice Boltzmann Method

S. Ul-Islam and C.Y. Zhou

Information Technology Journal Volume 8, Number 8, 1094-1114, 2009

Abstract PDF Fulltext Citations XML References

Processing Techniques for Querying Multimedia Contents

Zhongsheng Cao, Zongda Wu, Yuanzhen Wang and Guiling Li

Information Technology Journal Volume 8, Number 8, 1115-1128, 2009

Abstract PDF Fulltext Citations XML References

Towards Common Acquaintance Immunization Strategy for Complex Network

Pan Liu, Huaikou Miao and Jia Mei

Information Technology Journal Volume 8, Number 8, 1129-1139, 2009

Abstract PDF Fulltext Citations XML References

Realization of a Covert Communication System Over the Public Switching Telephone Network

Jixin Liu and Zheming Lu

Information Technology Journal Volume 8, Number 8, 1140-1149, 2009

Abstract PDF Fulltext Citations XML References

Design of Full Order Observer in Speed Sensorless Induction Motor Drive

Deng Xin, Zhao Jin, Geng Tao and Liu Yang

Information Technology Journal Volume 8, Number 8, 1150-1159, 2009

Abstract PDF Fulltext Citations XML References

The Analysis of the Synthetic Range Profile Based on Doppler Filter Bank using FFT

Wei Peng, Xuegang Wang, Kesong Chen and Bin Tang

Information Technology Journal Volume 8, Number 8, 1160-1169, 2009

Abstract PDF Fulltext Citations XML References

The Security Analysis and Enhancement of Photographic Authentication

Hsien-Chou Liao, Cheng-Hsiung Hsieh, Ching-Wen Chen and Wei-Chiang Chen

Information Technology Journal Volume 8, Number 8, 1170-1179, 2009

Abstract PDF Fulltext Citations XML References

Using Renyi Cross Entropy to Analyze Traffic Matrix and Detect DDoS Attacks

Ruoyu Yan and Qinghua Zheng

Information Technology Journal Volume 8, Number 8, 1180-1188, 2009

Abstract PDF Fulltext Citations XML References

A View-Based Approach to Three Dimensional Object Recognition

Xu Sheng and Peng Qi-Cong

Information Technology Journal Volume 8, Number 8, 1189-1196, 2009

Abstract PDF Fulltext Citations XML References

Distributed Index based on Geographic Hashing Table for Mobile Ad Hoc Networks

Yongsheng Fu, Xinyu Wang and Shanping Li

Information Technology Journal Volume 8, Number 8, 1197-1204, 2009

Abstract PDF Fulltext Citations XML References

Auto Rate MAC Protocol Based on Congestion Detection for Wireless Ad Hoc Networks

Wei Wu, Zhongzhao Zhang, Xuejun Sha and Chenguang He

Information Technology Journal Volume 8, Number 8, 1205-1212, 2009

Abstract PDF Fulltext Citations XML References

Tower Bridge Movement Analysis with GPS and Accelerometer Techniques: Case Study Yonghe Tower Bridge

Mosbeh R. Kaloop and Hui Li

Information Technology Journal Volume 8, Number 8, 1213-1220, 2009

Abstract PDF Fulltext Citations XML References

First-Price Sealed Auction Model with Increased Fairness for Resource Allocation in Grids

M. Mirzayi and M.R. Khayyambashi

Information Technology Journal Volume 8, Number 8, 1221-1227, 2009

Abstract PDF Fulltext Citations XML References

An Extended iSCSI Protocol Recognizing Multicast Session: iTRM

Huailiang Tan, Weixin Tang and Bin Yin

Information Technology Journal Volume 8, Number 8, 1228-1234, 2009

Abstract PDF Fulltext Citations XML References

A Fast Association Rules Mining Algorithm for Dynamic Updated Databases

Ni Tian-quan, Wang Jian-dong, Peng Xiao-bing and LiuYi- an

Information Technology Journal Volume 8, Number 8, 1235-1241, 2009

Abstract PDF Fulltext Citations XML References

An Intelligent Topic Map-Based Approach to Detecting and Resolving Conflicts for Multi-Resource Knowledge Fusion

Huimin Lu and Boqin Feng

Information Technology Journal Volume 8, Number 8, 1242-1248, 2009

Abstract PDF Fulltext Citations XML References

Intelligent Model for Automatic Text Summarization

M.S. Binwahlan, N. Salim and L. Suanmali

Information Technology Journal Volume 8, Number 8, 1249-1255, 2009

Abstract PDF Fulltext Citations XML References

K-Means Clustering to Improve the Accuracy of Decision Tree Response Classification

S.A. Ali, N. Sulaiman, A. Mustapha and N. Mustapha

Information Technology Journal Volume 8, Number 8, 1256-1262, 2009

Abstract PDF Fulltext Citations XML References

An Enhanced Particle Swarm Optimization Algorithm

Xue-yao Gao, Li-quan Sun and Da-song Sun

Information Technology Journal Volume 8, Number 8, 1263-1268, 2009

Abstract PDF Fulltext Citations XML References

A Review of Software Transactional Memory in Multicore Processors

Chen Fu, Zhibo Wu, Xiaoqun Wang and Xiaozong Yang

Information Technology Journal Volume 8, Number 8, 1269-1274, 2009

Abstract PDF Fulltext Citations XML References

The Characteristics of Orthogonal Trivariate Wavelet Packets

Qingjiang Chen and Zongtian Wei

Information Technology Journal Volume 8, Number 8, 1275-1280, 2009

Abstract PDF Fulltext Citations XML References

Steganalysis Based on Difference Statistics for LSB Matching Steganography

Jiaohua Qin, Xingming Sun, Xuyu Xiang and Zhihua Xia

Information Technology Journal Volume 8, Number 8, 1281-1286, 2009

Abstract PDF Fulltext Citations XML References

Blockwise Reversible Data Hiding by Contrast Mapping

Wien Hong, Jeanne Chen and Tung-Shou Chen

Information Technology Journal Volume 8, Number 8, 1287-1291, 2009

Abstract PDF Fulltext Citations XML References

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved