Vol. 6, No. 3, 2013
- Applying Multi-Criteria Method to the Decision of Assessment Tools for High-care Student Groups
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.3.01
by: Chen-Feng Wu, Chun-Ta Lin and Pei-Min Wang
- Test Case Generation from Formal Models of Cyber Physical System
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.3.02
by: Lichen Zhang, Jifeng He and Wensheng Yu
- QoS Guarantee for VOIP over Wireless LANs
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.3.03
by: Muhammad Naeem, Sheneela Naz and Sohail Asghar
- A New Technique of Indirect Component Mode Synthesis and Model Test Validation for Truss Bridge Modal Analysis
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.3.04
by: Kai-liang Lu, Wei Yan, Qiu-yi Ding and Chao Wang
- Specification of Cyber Physical Systems Based on Clock Theory
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.3.05
by: Bingqing Xu, Jifeng He, and Lichen Zhang
- Protocol Identification System Based on Apriori Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.3.06
by: Wang XiaoPeng, Sun Yunxiao, Wang Bailing, He Hui and Liu Yang
- A Study on the Impact of Multiple Failures on OSPF Convergence
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.3.07
by: Dan Zhao, Xiaofeng Hu and Chunqing Wu
- LabVIEW Based Ventilator Algorithm Design
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.3.08
by: Chunyan Meng
- Fuzzy Sequential Patterns Summarization with Lattice Structure
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.3.09
by: Bhawna Mallick, Deepak Garg and P. S. Grover
- Anti-collision Algorithm based on Multi-threaded RFID Lock Position
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.3.10
by: YanMin Ma and Di Jin