Generalized Information Theory: A Review and Outlook
Information Technology Journal Volume 10, Number 3, 461-469, 2011
Abstract PDF Fulltext Citations XML References
Understanding Information Technology Configuration in Business Diversification: A Political View
Tao Hu, Xihui Zhang and Wen-Yuan Teng
Information Technology Journal Volume 10, Number 3, 470-477, 2011
Abstract PDF Fulltext Citations XML References
A Survey of Partition based Clustering Algorithms in Data Mining: An Experimental Approach
T. Velmurugan and T. Santhanam
Information Technology Journal Volume 10, Number 3, 478-484, 2011
Abstract PDF Fulltext Citations XML References
Object Visualization Support for Learning Data Structures
Information Technology Journal Volume 10, Number 3, 485-498, 2011
Abstract PDF Fulltext Citations XML References
Communication in Second Life and E-business Opportunities: A Case Analysis
Sharma Gajendra, Wenjun Sun and Qi Lu
Information Technology Journal Volume 10, Number 3, 499-510, 2011
Abstract PDF Fulltext Citations XML References
A Mixed MRAC for Adaptation of Rotor Time Constant of Induction Motor based on the Parameter Sensitivity Analysis
Wang Rui, Zhao Jin, Liu Huan and Geng Tao
Information Technology Journal Volume 10, Number 3, 511-521, 2011
Abstract PDF Fulltext Citations XML References
A Novel Network Control Algorithm for Multi-Axis Manipulator Systems
Kuei-Shu Hsu, Jung-Hui Yu and Tsung-Han Li
Information Technology Journal Volume 10, Number 3, 522-531, 2011
Abstract PDF Fulltext Citations XML References
The Extended State Particle Filter for Unknown Process Models
Jian Jun Yin and Jian Qiu Zhang
Information Technology Journal Volume 10, Number 3, 532-540, 2011
Abstract PDF Fulltext Citations XML References
Developing a Case-based Reasoning System of Leisure Constraints
Fei-Rung Chiu, Cheng-Yi Wang, Yu-Cheng Huang and Yan-Kwang Chen
Information Technology Journal Volume 10, Number 3, 541-548, 2011
Abstract PDF Fulltext Citations XML References
Discussing Performance Index of Human Resource Valuation with AHP-occupational Safety Section in T Company in Taiwan as the Case Study
Yung-Fu Huang, Kuang-Hua Hsu, Po-Shun Chen and Shih-Hao Dong
Information Technology Journal Volume 10, Number 3, 549-556, 2011
Abstract PDF Fulltext Citations XML References
A Cluster-based and Tree-based Power Efficient Data Collection and Aggregation Protocol for Wireless Sensor Networks
Wei Wang, Bingwen Wang, Zhuo Liu, Lejiang Guo and Wei Xiong
Information Technology Journal Volume 10, Number 3, 557-564, 2011
Abstract PDF Fulltext Citations XML References
Identifying P2P Application with DHT Behaviors
Lin Ye, Hongli Zhang and Qiang Dai
Information Technology Journal Volume 10, Number 3, 565-572, 2011
Abstract PDF Fulltext Citations XML References
A New Differential Evolutionary Algorithm with Neighborhood Search
Yuzhen Liu and Shoufu Li
Information Technology Journal Volume 10, Number 3, 573-578, 2011
Abstract PDF Fulltext Citations XML References
Probing Mechanism Scheduling for Connected Coverage Wireless Sensor Network
M. Mahdavi, M. Ismail, K. Jumari and Z.M. Hanapi
Information Technology Journal Volume 10, Number 3, 579-584, 2011
Abstract PDF Fulltext Citations XML References
A Scenario of Applying Cusp Catastrophe Model in Determining State of Organization
Saerue Yingluk and Zhang Tie Nan
Information Technology Journal Volume 10, Number 3, 585-590, 2011
Abstract PDF Fulltext Citations XML References
A Novel Protection Architecture Scheme for EPON
Xiao-Lin Zhou, Fa-Xin Yu, Yu-Chun Wen and Zhe-Ming Lu
Information Technology Journal Volume 10, Number 3, 591-596, 2011
Abstract PDF Fulltext Citations XML References
Research on Preprocessing of Color Image for Vision based Mobile Robot Navigation
Zang Guo Quan and Li Zhan Ming
Information Technology Journal Volume 10, Number 3, 597-601, 2011
Abstract PDF Fulltext Citations XML References
The Research of the Evaluation Indicator System for Enterprise Scientific Information Services
Information Technology Journal Volume 10, Number 3, 602-606, 2011
Abstract PDF Fulltext Citations XML References
Novel Fuzzy Clustering-based Image Segmentation with Simultaneous Uneven Illumination Estimation
Wei Wei-Yi, Li Zhan-Ming and Zhang Guo-Quan
Information Technology Journal Volume 10, Number 3, 607-610, 2011
Abstract PDF Fulltext Citations XML References
Computationally Sound Mechanized Proofs for Deniable Authentication Protocols with a Probabilistic Polynomial Calculus in Computational Model
Information Technology Journal Volume 10, Number 3, 611-625, 2011
Abstract PDF Fulltext Citations XML References
Research on Internal Flow Control Mechanism of For CES Routers
Bin Zhuge, Cheng Yu, Kang-ping Liu and Wei-ming Wang
Information Technology Journal Volume 10, Number 3, 626-638, 2011
Abstract PDF Fulltext Citations XML References
An Improved Water-filling Power Allocation Method in MIMO OFDM Systems
Information Technology Journal Volume 10, Number 3, 639-647, 2011
Abstract PDF Fulltext Citations XML References
A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection
Z. Muda, W. Yassin, M.N. Sulaiman and N.I. Udzir
Information Technology Journal Volume 10, Number 3, 648-655, 2011
Abstract PDF Fulltext Citations XML References
Discussion on Energy-saving Applications of Fanless Cooling Tower
Kuang-Cheng Yu, Hsin-Chang Chang and Shr-Je Hung
Information Technology Journal Volume 10, Number 3, 656-662, 2011
Abstract PDF Fulltext Citations XML References
Behavior of cwnd for TCP Source Variants over Parameters of LTE Networks
Ghassan A. Abed, Mahamod Ismail and Kasmiran Jumari
Information Technology Journal Volume 10, Number 3, 663-668, 2011
Abstract PDF Fulltext Citations XML References
Outage Capacity Region of MIMO BC Channel under Long-term Average Power Constraint
Information Technology Journal Volume 10, Number 3, 669-674, 2011
Abstract PDF Fulltext Citations XML References
Stereo Matching Algorithm based on Aligning Genomic Sequence
S. Yu, D. Yan, Y. Dong, H. Tian, Y. Wang and X. Yu
Information Technology Journal Volume 10, Number 3, 675-680, 2011
Abstract PDF Fulltext Citations XML References
Joint Secret Sharing and Data Hiding for Block Truncation Coding Compressed Image Transmission
Hao Luo, Zhenfei Zhao and Zhe-Ming Lu
Information Technology Journal Volume 10, Number 3, 681-685, 2011
Abstract PDF Fulltext Citations XML References
Encryption Algorithm of RSH (Round Sheep Hash)
Chaoqun Liu, Yang Zhou, Yunhua Xiao and Guang Sun
Information Technology Journal Volume 10, Number 3, 686-690, 2011
Abstract PDF Fulltext Citations XML References