Vol. 6, No. 6, 2013
- Research of DSP-based Embedded Systems Connected to the Internet
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.01
by: Qing-yun Dai, Jin-dou Wang, Rui-tao Liu, Jun-hong Cheng and Yi li
- Ant Colony System: A New Concept to Robot Path Planning
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.02
by: Subhadeep Chakraborty
- A New Quadtree Histogram-based Spatial Modeling based on
Cloud Model
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.03
by: Zhaohui Wang
- Study on Electronic Commerce Credit Scoring Model Based on the
Dynamic Adjustment of Multi-factors
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.04
by: Xiao Qiang and Liao Hui
- An Adaptive Redundant Reservation Strategy in Distributed High-performance Computing Environments
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.05
by: Peng Xiao, Peixin Qu and Xilong Qu
- Quality Requirements Framework For Resolution of IT Requirement Management Challenges
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.06
by: Humaira Naz and Muhammad Ilyas
- The Determination of Workpiece Fixturing Scheme Based on Gray Relation Analysis Method
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.07
by: Tiejun Wu
- The Design and Control Simulation of Trans-femoral Prosthesis Based on Virtual Prototype
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.08
by: Hualong Xie, Guocun Kang and Fei Li
- Fault diagnosis of Steam Turbine Generator Unit Based on
Support Vector Machine
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.09
by: Lin Sang and Tieshan Zhang
- Detecting Arabic Cloaking Web Pages Using Hybrid Techniques
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.10
by: Heider A. Wahsheh, Mohammed N. Al-Kabi and Izzat M. Alsmadi
- Discussion on Writing of Recursive Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.11
by: Song Jinping
- Virtual Prototyping-based Integrated Information Modeling and Its Application in the Jacking System of Offshore Platform
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.12
by: Bin He, Shuangchao Hou, Xiaolin He and Jiecong Nie
- A Quick Query Methods for ONS System based on EPC
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.13
by: Jun Bai, Qiang Zhu, Qiang Chen, Bai-ling Wang and Liu Yang
- A New Model on the Spread of Malicious Objects in Computer Network
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.14
by: Munna Kumar, Bimal Kumar Mishra and T. C. Panda
- Smart Subway Information Platform based on Internet of Things
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.15
by: Jun-Song Fu, Zhen-Jiang Zhang*, Xin-Lei Jin and Zi-Qi Hao
- Focused Crawler Research for Business Intelligence Acquisition
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.16
by: Peng Xin and Qin Qiuli
- Implementing a Consistency Checker for Uncertain or Incomplete Temporal System
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.17
by: Yue Wang, Jixin Ma and Brian Knight
- Verification of Embedded Real-Time Systems Using Symbolic Model Checking: A Case Study
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.18
by: Tao Pang, Zhenhua Duan and Xiaofang Liu
- An Efficiency Optimization Method for Mobile Application with Reconfigurable Software
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.19
by: Yonghua Zhu and Congqi Xia
- Comparative Study of Optical Unipolar Codes for Incoherent DS-OCDMA system
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.20
by: Mouweffeq Bouregaa, Mohamed Chikh-Bled and Redouane Boudaoud
- Development of CMOS Image Sensor System based on Chaos Particle Swarm
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.21
by: Hongyu Duan and Fengxia Yang
- An Improved Framework for Managing Requirements Changes
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.22
by: Jianxiu Bai, Ying Jin, Yirui Zhang and Jing Zhang
- Path Analysis on the Antecedents of IT Application Innovation Level: An Empirical Investigation
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.23
by: Wenwen Pan and Guangwei Hu
- At-Speed Wordy-R-CRESTA Optimal Analyzer to Repair Word-Oriented Memories
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.24
by: Rahebeh Niaraki Asli, Shahin Khodadadi and Payam Habiby
- Enterprise Business Processes System Analysis and Design
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.25
by: Geng Yushui and Sun Jianjun
- Botnet Detection Based on Correlation of Malicious Behaviors
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.26
by: Chunyong Yin, Mian Zou, Darius Iko and Jin Wang
- Server Re-Tag Provable Data Possession in Public Cloud
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.27
by: Yongjun Ren, Jiang Xu, Jin Wang and Jeong-Uk Kim
- Multi Beam DOA Estimation Using Robust Convergence Adaptive
Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.28
by: Y. Murali Krishna, N. Sayedu Khasim and M. Sreedhar
- An Robust Watermarking Algorithm based on Coefficients Group Quantization
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.29
by: WenJi Quan, De Li and JongWeon Kim
- Constraint Programming based Virtual Cloud Resources Allocation
Model
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.30
by: Long Zhang, Yi Zhuang and Wei Zhu
- An Analytical Framework for Web Information Filtering Techniques
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.31
by: Narges Sadat Khozooii, Saman Haratizadeh and Mohammad Reza Keyvanpour
- The Research of Wind- thermal Power Random Multi-objective Scheduling Based on Combined MIPSO
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.32
by: Min Lu and Mi Zhao
- Forecasting Chaotic Time Series with Wavelet Neural Network Improved by Particle Swarm Optimization
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.33
by: Hui Li, Dechang Pi and Min Jiang
- Impact of STBC Scheme on BER Performance Assessment of a Single Amplify and Forward Relaying Protocol Based Cooperative MIMO-OFDM System
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.34
by: K. J. A. Chisty, S. M. A. Islam, S. E. Ullah and S. R. Sabuj
- Dynamic Composition of Web Service Based on Cloud Computing
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.35
by: Wu Nai-zhong
- A QPSO based Damping Controller for STATCOM
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.6.36
by: Amin Safari