Vol. 8, No. 5, 2015
- Position Location Scheme Using Nonlinear Programming Based on RSSI and DV-Hop
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.01
by: Fengjun Shang, Lan Lan and Maojian Dong
- A Novel ZCS-Clipping Precoding Technique for PAPR Reduction using DCT-OFDM in Vehicular Channels
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.02
by: Ahmed Ali, Wang Dong and Li Renfa
- Constructs of Sequence Pairs with Optimal Three-level Autocorrelation
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.03
by: Jin Hui-long, Zhang Miao and Qi Shu-li
- Semantic Similarity Computation Based on Multi-Features Fusion
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.04
by: Bo Ma, Yating Yang, Fan Zhao, Rui Dong and Xi Zhou
- Predictor Variables’ Influence on Classification Outcome in Insurance Fraud Detection
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.05
by: Saliu Adam Muhammad, Xiangtao Chen and Liao Bo
- Portfolio Selection Problem Based on Loss Aversion under Uncertain Environment
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.06
by: Dongjing Pan
- Research on Detecting Design Pattern Variants from Source Code Based on Constraints
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.07
by: Li Wen-Jin, Pan Ju-long and Wang Kang-Jian
- Intelligent Trajectory Tracking Control of Robot-Assisted Surgery
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.08
by: Mohammad Reza Avazpour, Farzin Piltan, Hooton Ghiasi, Mohammad Hadi Mazloom and Amirzubir Sahamijoo
- Constructions of Generalized Bent Boolean Functions on Odd Number of Variables
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.09
by: Yong-Bin Zhao, Feng-Rong Zhang and Yu-Pu Hu
- A Comprehensive Survey of Test Functions for Evaluating the Performance of Particle Swarm Optimization Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.10
by: Er. Avneet Kaur and Er. Mandeep Kaur
- Analysis of Scientific Papers Research Trend Based on Granular Computing
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.11
by: Wang Xiaodan, Yu Guang and Li Xueting
- A DE Algorithm Combined with Lévy Flight for Reliability Redundancy Allocation Problems
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.12
by: Yubao Liu and Guihe Qin
- Building Mobile Agents’ Applications Fault Tolerant
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.13
by: Preeti and Praveena Chaturvedi
- Clustering Outlier Detection Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.14
by: Huangtao and Tan Yanna
- Implementing Particle Swarm Optimization with Aging Leader and Challengers (ALC-PSO)
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.15
by: Avneet Kaur and Mandeep Kaur
- Research on the Effects of Spatial Cognition by Emulation Model and Perspective Model in MCT
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.16
by: Li Ping
- Numerical Study of Debris Distribution in Ultrasonic Assisted EDM of Hole Array under Different Amplitude and Frequency
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.17
by: Baocheng Xie, Yanwen Zhang, Jingwei Zhang and Shengle Rend
- Clock Gated Multi Coding Technique for the Estimation of Transition Activities in Digital Circuits
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.18
by: R. Preyadharan, M. Siva Sankari, A.Tamilselvan, K. Rathinakumar, M. Nithiyaa
- A Novel Action Recognition Method Based on Improved Spatio-Temporal Features and AdaBoost-SVM Classifiers
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.19
by: Xiaofei Ji, Lu Zhou and Qianqian Wu
- A Vor-KVGQ Index Structure of Mobile Objects Based on CoveRed Area
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.20
by: Zeng Ziwei, Ma Chi, Huang Yubin and Wei Jing
- Performance Analysis of SACOCDMA-FSO System Using MD Codes
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.21
by: Bhanu Priya
- Two-Phases Learning Shuffled Frog Leaping Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.22
by: Jia Zhao and Li Lv
- Research on Patent Information Analyzing and Predicting System Based on Data Mining
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.23
by: Yang Liu
- Two Lagrange Optimization Theory Based Methods for Solving Economic Load Dispatch Problems
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.24
by: Nguyen Dao, Nguyen Thuy Linh, Tran Hoang Quang Minh and Nguyen Trung Thang
- Block Compressed Sensing of Self-adaptive Measurement and Combinatorial Optimization
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.25
by: Li Mingxing, Chen Xiuxin, Su Weijun and Yu Chongchong
- A Cloud Service Model Based on Indirect Addressing
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.26
by: Guorong Chen, Tianyan Mao Juli Deng, Xue Wu and Chengrun Ji
- Application of Game Theory to Cognitive Radio Networks for Power Allocation: An Overview
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.27
by: Sonia Garg, Poonam Mittal and C. K. Nagpal
- Differential Evolution Algorithm for Constraint Joint Replenishment Problem with Indirect Grouping Strategy
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.28
by: Li Chengyan, Gao Jun, Zhang Tianwei and Wang Xiaotian
- An Efficient Neuro-Fuzzy-Genetics Approach for Multi Criteria Decision Making
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.29
by: Chandrasekhar Mesh ram and Shyam Sundar Agrawal
- Research on Traffic Sign Classification Algorithm Based on SVM
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.30
by: Ye Sun
- Research on Remote Sensing Image Fusion Algorithm Based on Compressed Sensing
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.31
by: Qiang Yang, Hua Jun Wang and Xuegang Luo
- DCT-JPEG Image Coding Based on GPU
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.32
by: Rongyang Shan, Chengyou Wang, Wei Huang and Xiao Zhou
- Chinese Accent Detection Research Based on Features Structured
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.33
by: Zhao YunXue, Zhang Long, Zheng ShiJie and Zhang Wei
- Study on the Patterns of Library Resource Construction and Services in MOOC
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.34
by: Sun Ji-Zhou and Liao Sheng-Feng
- Towards Program Risk Management and Perceived Risk Management Barriers
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.35
by: Shahid Rasheed, Wang ChangFeng and Faiza Yaqub
- An Improved Locally Linear Embedding Algorithm for Ear Recognition
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.36
by: Peng Ling
- A Survey: Data Warehouse Architecture
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.37
by: Muhammad Arif and Ghulam Mujtaba
- Outage Probability Analysis of the VAF Relaying M2M Networks
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.38
by: Lingwei Xu, Hao Zhang, Tingting Lu, T. Aaron Gulliver
- The Research of Adaptive Ability Evaluation Architecture for National Defense Students Based on Fuzzy Models
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.5.39
by: Lina Shan