Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Revista de Letras (UFC)
Pamukkale University Journal of Engineering Sciences
INMATEH - Agricultural Engineering
Animal Research International



Register Journal



Visitors Counter

TodayToday
1267
YesterdayYesterday
2099
This weekThis week
10202
Last WeekLast week
9202
This monthThis month
31094
Last monthLast month
43360
All daysAll days
5807380

International Journal of New Computer Architectures and their Applications

Number 1-4, 2011

  • 797-809
    PROTECTION OF PERSONAL INFORMATION BASED ON USER PREFERENCE
    Authors: Kenichi Takahashi, Takanori Matsuzaki, Tsunenori Mine, Takao Kawamura, Kazunori Sugahara
    Number of views: 555
  • 810-820
    SOLVING SMALL SAMPLE RECIPE GENERATION PROBLEM WITH HYBRID WKRCF-PSO
    Authors: Mohd Ibrahim Shapiai, Zuwairie Ibrahim, Marzuki Khalid, Lee Wen Jau, Soon-Chuan Ong, Vladimir Pavlovich
    Number of views: 613
  • 821-837
    MODEL-BASED WEB COMPONENTS TESTING: PRIORITIZATION USING MIDS AND CENTRALITY MEASURES
    Authors: Ahmed Al-Herz, Moataz Ahmed
    Number of views: 545
  • 838-847
    IMPROVING THE ACCURACY OF GRADIENT DESCENT BACK PROPAGATION ALGORITHM (GDAM) ON CLASSIFICATION PROBLEMS
    Authors: M. Z. Rehman, N. M. Nawi
    Number of views: 676
  • 848-865
    SEMANTIC TECHNOLOGY AND SUPER-PEER ARCHITECTURE FOR INTERNET BASED DISTRIBUTED SYSTEM RESOURCE DISCOVERY
    Authors: Mahamat Issa Haasn
    Number of views: 550
  • 866-878
    IMPROVEMENTS OF BACK PROPAGATION ALGORITHM PERFORMANCE BY ADAPTIVELY CHANGING GAIN, MOMENTUM AND LEARNING RATE
    Authors: Norhamreeza Abdul Hamid, Nazri Mohd Nawi, Rozaida Ghazali, Mohd Najib Mohd Salleh
    Number of views: 587
  • 879-893
    ANALYSIS OF COMPOUND ENHANCEMENT ALGORITHMS (CEA) BASED ON ADAPTIVE HISTOGRAM EQUALIZATION (AHE) ON INTRA-ORAL DENTAL RADIOGRAPHS IMAGES
    Authors: Siti Arpah Ahmad, Mohd Nasir Taib, NoorElaiza Abd Khalid, Rohana Ahmad
    Number of views: 636
  • 894-910
    A COMPARATIVE PERFORMANCE ANALYSIS OF GAUSSIAN DISTRIBUTION FUNCTIONS IN ANT SWARM OPTIMIZED ROUGH REDUCTS
    Authors: Lustiana Pratiwi, Yun-Huoy Choo, Azah Kamilah Muda
    Number of views: 638
  • 911-925
    BUILDING FUZZY GOAL PROGRAMMING WITH FUZZY RANDOM LINEAR PROGRAMMING FOR MULTI-LEVEL MULTI-OBJECTIVE PROBLEM
    Authors: Nureize Arbaiy, Junzo Watada
    Number of views: 589
  • 926-941
    A STUDY ON THE EVALUATION OF UNIT TESTING FOR ANDROID SYSTEMS
    Authors: Ben Sadeh, Sundar Gopalakrishnan
    Number of views: 554
  • 942-952
    REVIEW ON TRADITIONAL AND AGILE COST ESTIMATION SUCCESS FACTOR IN SOFTWARE DEVELOPMENT PROJECT
    Authors: Zulkefli Mansor, Saadiah Yahya, Noor Habibah Hj Arshad
    Number of views: 718
  • 953-976
    A PROPOSED FRAMEWORK FOR USE CASE BASED EFFORT ESTIMATION USING FUZZY LOGIC: BUILDING UPON THE OUTCOMES OF A SYSTEMATIC LITERATURE REVIEW
    Authors: Mohammed Wajahat Kamal, Moataz A. Ahmed
    Number of views: 577
  • 977-990
    AUGMENTING INTUITIVENESS WITH WHEELCHAIR INTERFACE USING NINTENDO WIIMOTE
    Authors: Mahmood Ashraf, Masitah Ghazali
    Number of views: 646
  • 991- 1000
    CYBER FORENSICS COMPETENCY-BASED FRAMEWORK - A REVIEW
    Authors: Elfadil Sabeil, Azizah Bt Abdul Manaf, Zuraini Ismail, Mohamed Abas
    Number of views: 770

Number 1-3, 2011

  • 519-533
    REUSABILITY ASSESSMENT OF OPEN SOURCE COMPONENTS FOR SOFTWARE PRODUCT LINES
    Authors: Fazal-e- Amin, Ahmad Kamil Mahmood, Alan Oxley
    Number of views: 621
  • 534-541
    DETECTING SLEEP DEPRIVATION ATTACK OVER MANET USING A DANGER THEORY-BASED ALGORITHM
    Authors: Maha Abdelhaq, Rosilah Hassan, Mahamod Ismail, Raed Alsaqour, Daud Israf
    Number of views: 569
  • 542-552
    QOS MEASUREMENT OF SINGLE-HOP PERIODIC COMMUNICATION IN VEHICULAR ENVIRONMENT
    Authors: Bilal Munir Mughal, Asif Ali Wagan, Halabi Hasbullah
    Number of views: 552
  • 553-564
    EXPLORATION ON SCALABILITY OF DATABASE BULK INSERTION WITH MULTITHREADING
    Authors: Boon-Wee Low, Boon-Yaik Ooi, and Chee-Siang Wong
    Number of views: 617
  • 565-580
    MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL
    Authors: Muhammad Qaiser Saleem, Jafreezal Jaafar, Mohd Fadzil Hassan
    Number of views: 540
  • 581-598
    COMPUTATIONALLY INEXPENSIVE SEQUENTIAL FORWARD FLOATING SELECTION FOR ACQUIRING SIGNIFICANT FEATURES FOR AUTHORSHIP INVARIANCENESS IN WRITER IDENTIFICATION
    Authors: Satrya Fajri Pratama, Azah Kamilah Muda, Yun-Huoy Choo, and Noor Azilah Muda
    Number of views: 612
  • 599-614
    AN EMPIRICAL FRAMEWORK DESIGN TO EXAMINE THE IMPROVEMENT IN SOFTWARE REQUIREMENTS THROUGH NEGOTIATION
    Authors: Sabrina Ahmad, Noor Azilah Muda
    Number of views: 553
  • 615-623
    FACTORS FOR KMS POST ADOPTION: THE EXPLORATORY STUDY IN OIL AND GAS INDUSTRY IN MALAYSIA
    Authors: Sureena Matayong, Ahmad Kamil Bin Mahmood
    Number of views: 612
  • 624-639
    ONE-TIME KEY AND DIAMETER MESSAGE AUTHENTICATION PROTOCOL FOR PROXY MOBILE IPV6
    Authors: Md. Mahedi Hassan, Poo Kuan Hoong
    Number of views: 638
  • 640-651
    SEMANTIC WEB SERVICE COMPOSITION APPROACHES: OVERVIEW AND LIMITATIONS
    Authors: Furkh Zeshan, Radziah Mohamad
    Number of views: 552
  • 652-664
    CLASSIFICATION AND MEASUREMENT ON C OVERFLOW VULNERABILITIES ATTACK
    Authors: Nurul Haszeli Ahmad, Syed Ahmad Aljunid, Jamalul-lail Ab Manan
    Number of views: 676
  • 665-682
    BLOG QUALITY MEASUREMENT: ANALYSIS OF CRITERIA USING THE RASCH MODEL
    Authors: Zuhaira Muhammad Zain, Abdul Azim Abd Ghani, Rusli Abdullah, Rodziah Atan, Razali Yaakob
    Number of views: 625
  • 683-693
    APPLYING ROUGH SET THEORY IN MULTIMEDIA DATA CLASSIFICATION
    Authors: M Nordin A Rahman, Yuzarimi M Lazim, Farham Mohamed
    Number of views: 602
  • 694-713
    OPTIMIZING DECISION TREE IN MALWARE CLASSIFICATION SYSTEM BY USING GENETIC ALGORITHM
    Authors: Mohd Najwadi Yusoff, Aman Jantan
    Number of views: 570
  • 714-720
    AN EXTENDED SIMULATION OF COMPLEX TASK PARTITIONING METHOD IN ASELF-ORGANIZED ROBOTICS SWARM
    Authors: Mehrdad Jangjou, Alireza Bagheri, Mohammad Mansour Riahi Kashani, Koosha Sadeghi Oskooyee
    Number of views: 556
  • 721-742
    DERIVATION OF STOCHASTIC REWARD NET (SRN) FROM UML SPECIFICATION CONSIDERING COST EFFICIENT DEPLOYMENT MANAGEMENT OF COLLABORATIVE SERVICE COMPONENTS
    Authors: Razib Hayat Khan, Poul E. Heegaard
    Number of views: 569
  • 743-756
    INTEGRATED KMS@EWS OF CONCEPTUAL IMPLEMENTATION MODEL FOR CLINICAL DENGUE FEVER ENVIRONMENT
    Authors: Norzaliha Mohamad Noor, Rusli Abdullah, Mohd Hasan Selamat
    Number of views: 614
  • 757-765
    DYNAMIC LOAD BALANCING POLICY WITH COMMUNICATION AND COMPUTATION ELEMENTS IN GRID COMPUTING WITH MULTI-AGENT SYSTEM INTEGRATION
    Authors: Bakri Yahaya, Rohaya Latip, Mohamed Othman, Azizol Abdullah
    Number of views: 618
  • 766-779
    TOWARDS A DYNAMIC FILE INTEGRITY MONITOR THROUGH A SECURITY CLASSIFICATION
    Authors: Zul Hilmi Abdullah, Nur Izura Udzir, Ramlan Mahmod, and Khairulmizam Samsudin
    Number of views: 672
  • 780-796
    EVALUATING COMPLEXITY OF TASK KNOWLEDGE PATTERNS THROUGH REUSABILITY ASSESSMENT
    Authors: Cheah WaiShiang, Cheah WaiShiang, Edwin Mit, Azman Bujang Masli
    Number of views: 547

Number 1-2, 2011

  • 257-264
    AN AGENT TOOL FOR INTEGRATING COMPONENT BASED APPLICATIONS
    Authors: Ebtehal Alsaggaf, Prof.Dr. Fathy albouraey
    Number of views: 689
  • 265-274
    NEURAL NETWORK APPLICATION IN RESERVOIR WATER LEVEL FORECASTING AND RELEASE DECISION
    Authors: Wan Hussain Wan Ishak, Ku Ruhana Ku-Mahamud, Norita Md Norwawi
    Number of views: 628
  • 275-281
    SHADOW MAPPING OR SHADOW VOLUME?
    Authors: Hoshang Kolivand, Mohd Shahrizal Sunar
    Number of views: 616
  • 282-291
    THE USE OF SOFT COMPUTING FOR MEASURING THE QUALITY OF EDUCATION
    Authors: Sergio Valdés-Pasarón, Bogart Yail Márquez, Juan Manuel Ocegueda-Hernández
    Number of views: 575
  • 292-303
    FUZZY MODELS APPLIED TO COMPLEX SOCIAL SYSTEMS: MODELING POVERTY USING DISTRIBUTED AGENCIES
    Authors: Bogart Yail Márquez, Manuel Castañon-Puga, Juan R. Castro, Eugenio D. Suarez, José Sergio Magdaleno-Palencia
    Number of views: 589
  • 304-315
    A BIO-INSPIRED MUSIC GENRE CLASSIFICATION FRAMEWORK USING MODIFIED AIS-BASED CLASSIFIER
    Authors: Noor Azilah Draman, Sabrina Ahmad, Azah Kamilah Muda
    Number of views: 548
  • 316-324
    A SCALABLE BLOCK COMPENSATION WITH INDEX SELECTION MECHANISM TO ACHIEVE HIGH VIDEO QUALITY RETRIEVAL
    Authors: Ta- Te Lu, Tsung-Hsuan Tsai, Jia-Yuan Wu
    Number of views: 602
  • 325-335
    A STUDY ON RISK ASSESSMENT FOR SMALL AND MEDIUM SOFTWARE DEVELOPMENT PROJECTS
    Authors: Abdullahi Mohamud Sharif, Shuib Basri
    Number of views: 596
  • 336-343
    MITIGATION OF BLACK HOLE ATTACKS FOR AODV ROUTING PROTOCOL
    Authors: Kamarularifin Abd. Jali, Zaid Ahmad, Jamalul-Lail Ab Manan
    Number of views: 575
  • 344-357
    EVALUATION AND SELECTION COTS SOFTWARE PROCESS: THE STATE OF THE ART
    Authors: Feras Tarawneh, Fauziah Baharom, Jamaiah Hj. Yahaya, Faudziah Ahmad
    Number of views: 635
  • 358-370
    HUMAN IDENTIFICATION BASED ON EXTRACTED GAIT FEATURES
    Authors: Hu Ng, Hau-Lee Ton, Wooi-Haw Tan, Timothy Tzen-Vun Yap, Pei-Fen Chong, Junaidi Abdullah
    Number of views: 618
  • 371-383
    REQUIREMENT ELICITATION: IDENTIFYING THE COMMUNICATION CHALLENGES BETWEEN DEVELOPER AND CUSTOMER
    Authors: Noraini Che Pa, Abdullah Mohd Zin
    Number of views: 591
  • 384-395
    AN ENHANCED REMOTE AUTHENTICATION SCHEME USING SECURE KEY EXCHANGE PROTOCOL WITH PLATFORM INTEGRITY ATTESTATION
    Authors: Fazli Bin Mat Nor, Kamarularifin Abd Jalil, Jamalul-lail Ab Manan
    Number of views: 580
  • 396-403
    THE CONSTRUCTION OF BALANCED BOUNDING-VOLUME HIERARCHIES USING SPATIAL OBJECT MEDIAN SPLITTING METHOD FOR COLLISION DETECTION
    Authors: Hamzah Asyrani Sulaiman, Abdullah Bade
    Number of views: 1102
  • 404-411
    AUTOMATIC DOCUMENT STRUCTURE ANALYSIS OF STRUCTURED PDF FILES
    Authors: Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, Noor MaizuraMohamad Noor
    Number of views: 573
  • 412-427
    AGENT-BASED MOM INTEROPERABILITY FRAMEWORK FOR INTEGRATION AND COMMUNICATION OF DIFFERENT SOA APPLICATIONS
    Authors: Najhan M.Ibrahim, Mohd Fadzil Hassan, Zain Balfagih
    Number of views: 684
  • 428-436
    QUANTIFYING TEXT-BASED PUBLIC€'S EMOTION AND DISCUSSION ISSUES IN ONLINE FORUM
    Authors: Siti Z. Z. Abidin, Nasiroh Omar, Muhammad H.M. Radzi and Mohammad B.C. Haron
    Number of views: 553
  • 437-458
    GUIDELINES FOR COLLECTING AND CENTRALIZING NETWORK DIGITAL EVIDENCES
    Authors: Mohammed Abbas, Azizah Abdul Manaf, Elfadil Sabeil
    Number of views: 568
  • 459-473
    T-WAY STRATEGIES AND ITS APPLICATIONS FOR COMBINATORIAL TESTING
    Authors: Rozmie R. Othman, Kamal Z. Zamli
    Number of views: 590
  • 474-483
    USING SUBTHRESHOLD SRAM TO DESIGN LOW-POWER CRYPTO HARDWARE
    Authors: Adnan Abdul-Aziz Gutub, Esam Ali Khan
    Number of views: 546
  • 484-489
    ANALYSIS OF DELAY PERFORMANCE IN EFFICIENT DBA WITH GLOBAL PRIORITY FOR EPON
    Authors: Nurul Asyikin Mohamed Radzi, Norashidah Md. Din, Mohammed Hayder AlMansoori, Mohd. Shahmi Abdul Majid
    Number of views: 618
  • 490-509
    COLLABORATIVE LEARNING THROUGH FACIAL EXPRESSION FOR SPECIAL CHILDREN
    Authors: Nia Valeria, Lau Bee Theng
    Number of views: 595
  • 510-518
    COLLABORATION, WEALTH AND VALUE CREATION, SMES' HALAL PRODUCTS COMMUNITIES, AND INFORMATION SYSTEMS
    Authors: Alfi Khairiansyah Machfud, Abdul Rahman Ahmad Dahlan, Jawdat Khatib, Ahmed Abdulaziz Haji-Ahmed
    Number of views: 609

Number 1-1, 2011

  • 1-14
    ASSESSMENT PROCEDURE OF THE EM INTERACTION BETWEEN MOBILE PHONE ANTENNAE AND HUMAN BODY
    Authors: Salah I. Al-Mously
    Number of views: 551
  • 15-24
    HEP: CONTEXT-AWARE COMMUNICATION SYSTEM
    Authors: Bachir Chihani, Emmanuel Bertin, Fabrice Jeanne, Noel Crespi
    Number of views: 594
  • 25-33
    A MUTLI-AGENT SYSTEM FOR FIREWALL FORENSICS ANALYSIS
    Authors: Hassina Bensefia, Nacira Ghoualmi
    Number of views: 557
  • 34-51
    DNA SECURITY USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY
    Authors: Radu Terec, Mircea-Florin Vaida, Lenuta Alboaie, Ligia Chiorean
    Number of views: 567
  • 52-60
    REVERSIBLE DATA HIDING BASED ON STATISTICAL CORRELATION OF BLOCKED SUB-SAMPLED IMAGE
    Authors: Mona Nafari, Mansour Nejati Jahromi, Gholam HoseinSheisi
    Number of views: 594
  • 61-73
    DATABASE PREPROCESSING AND COMPARISON BETWEEN DATA MINING METHODS
    Authors: Yas A. Alsultanny
    Number of views: 536
  • 74-83
    EVALUATING SOFTWARE MAINTENANCE TESTING APPROACHES TO SUPPORT TEST CASE EVOLUTION
    Authors: Othman Mohd Yusop, Suhaimi Ibrahim
    Number of views: 617
  • 84-96
    A TRAINING BASED TRANSMISSION PERIOD SETTING PROTOCOL
    Authors: Guangri Jin, Li Gong, Hiroshi Furukawa
    Number of views: 641
  • 97-111
    METADATA-DERIVED KEYWORDS FOR EFFECTIVE NAVIGATION AND ACCESS IN PERSONAL FILE HIERARCHIES
    Authors: Gontlafetse Mosweunyane, Leslie Carr, Nicholas Gibbins
    Number of views: 574
  • 112-122
    AN EFFICIENT TEMPORAL PARTITIONING ALGORITHM TO MINIMIZE COMMUNICATION COST FOR RECONFIGURABLE COMPUTING SYSTEMS
    Authors: Ramzi. Ayadi, Bouaoui. Ouni, Abdellatif. Mtibaa
    Number of views: 552
  • 123-132
    APPLICATION OF HYBRID WAVELET-FRACTAL COMPRESSION ALGORITHM FOR RADIOGRAPHIC IMAGES OF WELD DEFECTS
    Authors: Faiza Mekhalfa, Daoud Berkani
    Number of views: 551
  • 133-148
    EMPIRICAL INVESTIGATION ON COGNITIVE USER INTERFACE DIMENSIONS
    Authors: Natrah Abdullah, Wan Adilah Wan Adnan, Nor Laila Md Noor
    Number of views: 543
  • 149-161
    IMPROVING TRANSPORT PROTOCOL PERFORMANCE IN MANET BY EXPLOITING THE BACKOFF ALGORITHM OF MAC PROTOCOL
    Authors: Sofiane Hamrioui, Mustapha Lalam
    Number of views: 539
  • 162-175
    JOINT CHANNEL-DIVERSITY CODING FOR THE THREE-WAY FREE-SPACE OPTICAL SYSTEMS THROUGH ATMOSPHERIC-TURBULENCE CHANNELS
    Authors: Chadi Abou-Rjeily
    Number of views: 528
  • 176-184
    ENHANCEMENT OF LEARNING AND TEACHING IN COMPUTER GRAPHICS THROUGH MARKER AUGMENTED REALITY TECHNOLOGY
    Authors: Malinka Ivanova, Georgi Ivanov
    Number of views: 593
  • 185-198
    DIFFERENCES BETWEEN THE ANSWERS OF QUESTIONNAIRE INVESTIGATION AND REAL BEHAVIOR OF THE STUDENTS IN THE E-COURSE FOR HEALTHCARE
    Authors: Martin Cápay, Zoltán Balogh, Michal Munk, Miroslava Mesárošová
    Number of views: 606
  • 199-208
    COMBINING STEGANOGRAPHY AND CRYPTOGRAPHY: NEW DIRECTIONS
    Authors: Khalil Challita, Hikmat Farhat
    Number of views: 664
  • 223-235
    SIMPLE DESIGN METHOD OF MIMO MULTIUSER DOWNLINK SYSTEM BASED ON BLOCK-DIAGONALIZATION
    Authors: T. taniguchi, Y. Karasawa, N. Natajima
    Number of views: 623
  • 236-244
    A REGION-BASED MODEL AND BINARY LEVEL SET FUNCTION APPLIED TO WELD DEFECTS DETECTION IN RADIOGRAPHIC IMAGES
    Authors: Yamina Boutiche
    Number of views: 569
  • 245-256
    COOPERATIVE MECHANISMS TO CARRY AND FORWARD PACKETS IN A DTN VANET
    Authors: Gianni Fenu, Marco Nitti
    Number of views: 542


1
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us