Effects of Upper Rivulet During Rain-wind Induced Vibration
P. Xie, C.Y. Zhou, J.Y. Zhu and C. Wang
Information Technology Journal Volume 11, Number 2, 181-190, 2012
Abstract PDF Fulltext Citations XML References
Effectiveness of Security Tools to Anomalies on Tunneled Traffic
Nazrulazhar Bahaman, Anton Satria Prabuwono, Mohd Zaki Mas`ud and Mohd Faizal Abdollah
Information Technology Journal Volume 11, Number 2, 191-199, 2012
Abstract PDF Fulltext Citations XML References
An Incremental Learning Approach with Support Vector Machine for Network Data Stream Classification Problem
Yuan Yao, Lin Feng, Bo Jin and Feng Chen
Information Technology Journal Volume 11, Number 2, 200-208, 2012
Abstract PDF Fulltext Citations XML References
Reversible Data Hiding Based on Hilbert Curve Scan and Histogram Modification
Zhenfei Zhao and Hao Luo
Information Technology Journal Volume 11, Number 2, 209-216, 2012
Abstract PDF Fulltext Citations XML References
An Approach to Identify Behavior Parameter in Image-based Visual Servo Control
Zhenyu Wu, Yue Sun, Bo Jin and Lin Feng
Information Technology Journal Volume 11, Number 2, 217-224, 2012
Abstract PDF Fulltext Citations XML References
Influence Analysis and Evaluation of Wheel Parameters on Motion Performance of Lunar Rover
Jicheng Liu, Senlong Tang, Pengwei Cheng and Shulin Liu
Information Technology Journal Volume 11, Number 2, 225-232, 2012
Abstract PDF Fulltext Citations XML References
Less Conservative Delay-dependent Asymptotic Stability Criteria for Stochastic Neural Networks of Neutral-type with Distributed Delay
Guoquan Liu, Simon X. Yang and Yi Chai
Information Technology Journal Volume 11, Number 2, 233-240, 2012
Abstract PDF Fulltext Citations XML References
Research of Web Service Security Model Based on SOAP Information
Shujun Pei, Deyun Chen, Yuyuan Chu, Qingfeng Xu and Shi Xi
Information Technology Journal Volume 11, Number 2, 241-247, 2012
Abstract PDF Fulltext Citations XML References
Flexible Navigation Strategies by Predicting Human Motion Tendency
Zhiwei Liang, Songhao Zhu and Cheng Yanyun
Information Technology Journal Volume 11, Number 2, 248-254, 2012
Abstract PDF Fulltext Citations XML References
Performance Assessment of AGRED, RED and GRED Congestion Control Algorithms
Mahmoud Baklizi, Hussein Abdel- jaber, Sureswaran Ramadass, Nibras Abdullah and Mohammed Anbar
Information Technology Journal Volume 11, Number 2, 255-261, 2012
Abstract PDF Fulltext Citations XML References
The Banzhaf Value for Fuzzy Games with Fuzzy Payoffs
Fanyong Meng, Jinxian Zhao and Qiang Zhang
Information Technology Journal Volume 11, Number 2, 262-268, 2012
Abstract PDF Fulltext Citations XML References
Hurst Parameter for Security Evaluation of LAN Traffic
Information Technology Journal Volume 11, Number 2, 269-275, 2012
Abstract PDF Fulltext Citations XML References
An Approach for Camera Self-Calibration using Vanishing-Line
Information Technology Journal Volume 11, Number 2, 276-282, 2012
Abstract PDF Fulltext Citations XML References
Access Point Selection for Fair Load Balancing in Wireless LAN
S. Venkatesan and C. Manoharan
Information Technology Journal Volume 11, Number 2, 283-288, 2012
Abstract PDF Fulltext Citations XML References
Camera Calibration for Direct-Reading Water-Meter Based on Round Feature
Li Xue-Cong, Wang Ren-Huang and Liu Hong-Jiang
Information Technology Journal Volume 11, Number 2, 289-293, 2012
Abstract PDF Fulltext Citations XML References
Financial Distress Prediction Based on Cost Sensitive Learning
Wang Hong-Bao, Wang Fu-Sheng and Yang Xian-Fei
Information Technology Journal Volume 11, Number 2, 294-300, 2012
Abstract PDF Fulltext Citations XML References