Vol. 8, No. 7, 2015
- A Three-Level Thresholding Technique based on Nonextensive Entropy and Fuzzy Partition with Artificial Bee Colony Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.01
by: Fangyan Nie
- Design Second Order Vibration Reduction
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.02
by: Meysam Kazeminasab, Zahra Esmaeili, Alireza Salehi, Mahdi Mirshekaran and Farzin Piltan
- A Policy Conflict Detecting Algorithm of RBAC Based on Concept Lattice Model
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.03
by: Daojun Han, Lei Zhang, Xiajiong Shen and Peiyan JiaFeng Shen and Guanghui Xu
- Reconstructing Fragmented YAFFS2 Files for Forensic Analysis
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.04
by: Na Huang, Jingsha He, Bin Zhao, Gongzheng Liu and Xuejiao Wan
- Node Designing of Complex Networks in Cloud Computing Environment
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.05
by: Ranjan Kumar Mondal and Debabrata Sarddar
- State of Health Estimation for Lithium-ion Battery Based on D-UKF
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.06
by: Wang Qiuting, Jiang Yinzhu and Lu Yunhao
- Enhanced Cloud Web Services Using Community Structure Based Complex Networks
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.07
by: Mini Singh Ahuja and Sonia Jasrotia
- Integrate Advantage of Geographic Routing and Reactive Mechanism for Aeronautical Ad Hoc Networks
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.08
by: Xiaoheng Tan, Xiaonan Hu, Pengfei Qu, Zhengnan Zhu and Yan Zhang
- Dual-hop Transmissions with Fixed Gain Relays over Composite Fading Channels using Mixture Gamma Distribution
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.09
by: Weijun Cheng and Yan Huang
- Realization and Evaluation of an Information Morals Education System by Experience of an Assailant and a Victim by Virtual Reality
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.10
by: Abdusalam Dawut, Hiroshi Nakayama, Rintarou Iwasaki and Toshiki Matsuda
- Digital Design of Streamlined EMU Head Car and Its Smoothness Evaluation
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.11
by: Zhenfeng Wu, Zhoufeng Chen and Wangcai Ding
- Stability Analysis of a Quarantined Epidemic Model with Latent and Breaking-Out over the Internet
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.12
by: Munna Kumar, Bimal Kumar Mishra and T. C. Panda
- High-Precision Correlation Algorithm Based On Moments
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.13
by: Zhenbing Liu and Qijia He
- Triangular Fuzzy Multi-attribute Decision Making Based on Risk Attitude of Decision Maker
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.14
by: Haiping Ren and Hui Zhou
- Transmission Scheme for Asymmetric MIMO Two-way Relay with Channel Estimation Error
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.15
by: Jinhong Fan, Chaowei Yuan and Ke Xiao
- Research on Automatic Mapping Method of Geologic Column
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.16
by: Shao YanLin, Shao YaXiong, Xu XiaoHong, He ZhenMing and Li GongQuan
- Incorporating Bidirectional Heuristic Search and Improved ACO in Route Planning
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.17
by: Guangming Xiong, Xiaoyun Li, Shuai Zhou, Hao Lu, Yan Jiang and Jianwei Gong
- Study on SOC Estimation of Power Battery Based on Kalman Filter Optimization Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.18
by: Yuheng Yin and Weifeng Zhong
- Performance Analysis for Recognition of Image with Alphanumeric Characters Under Different Environmental Conditions
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.19
by: Paramvir Singh, Rashpinder Kaur and Gurjinder Singh
- A New Clustering Algorithm of Hybrid Strategy Optimization
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.20
by: Li Yi-ran and Zhang Chun-na
- Using Additive Expression Programming for Gene Regulatory Network Inference
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.21
by: Bin Yang
- Association Rule Mining: A Survey
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.22
by: Jagmeet Kaur and Neena Madan
- Analysis and Proofs of Properties in Intransitive Noninterference
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.23
by: Congdong Lv, Xiaoyong Li, Fei Li, and Wei Ma
- Multi-GPU Parallel Computing and Task Scheduling under Virtualization
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.24
by: Yujie Zhang, Jiabin Yuan, Xiangwen Lu and Xingfang Zhao
- Multi-target Tracking Algorithm Based on TLD under Dynamic Background
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.25
by: Lixia Xue, Zuocheng Wang and Yanxiang Chen
- A Novel Feature Gene Selection Method Based On Neighborhood Mutual Information
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.26
by: Tao Chen, Zenglin Hong, Hui Zhao, Xiao Yang and Jun Wei
- Design and Simulation of Novel 10-T Subtraction Logic for ALU Design Using GDI Technique
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.27
by: Haramardeep Singh and Harmeet Kaur
- Multi-objective Integration of Flexible Collaborative Planning and Fuzzy Flexible Lot-Splitting Scheduling Based on the Pareto Optimal
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.28
by: Zhenqiang Bao, Xiaoqing Ren, Yulu Yang, Junwu Zhu, Cheng Wang and Richao Yin
- Analysis of HEVC Coding Standard
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.29
by: Jianjun Wang and Li Zhou, and Tao Sun
- A Novel Approach of Trust Based Routing To Select Trusted Location In AODV Based VANET: A Survey
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.30
by: Kumud Dixit, Krishna Kumar Joshi, Neelam Joshi
- The Simulation of RS Codes and QC-LDPC Codes Concatenated in COFDM System
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.31
by: Zhongmin Zhang, Xin Liu and Xiushan Kong
- PID Controller Optimization By Soft Computing Techniques-A Review
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.32
by: Neha Tandan and Kuldeep Kumar Swarnkar
- Comparative Analysis of Newmark and Rungekutta Method for Solving A TBM Cutterhead Multi-DOF Dynamic Model
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.33
by: Junzhou Huo, Hanyang Wu, Jing Chen, Jingxiu Ling nad Guangqing Li
- GEMM Optimization for a Decoupled Access/Execute Architecture Processor
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.34
by: Zeng Zhao, Naijie Gu and Yangzhao Yang
- A Cost-AWARE Approach Based ON Learning Automata FOR Resource Auto-Scaling IN Cloud Computing Environment
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.35
by: Khosro Mogoui and Mostafa Ghobaei Arani
- A New Multi-View and Controllable Community-Uncovering Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.36
by: Zhang Xin, Wang Xiaolong and Liu Bingquan
- Optimization Design Based On Self-Adapted Ant Colony and Genetic Mix Algorithm for Parameters of PID Controller
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.37
by: Wang Xiao-Yu
- Lead-Lag PSS Design Based on H∞ Control Theory and Genetic Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.38
by: Dharam Singh noroji and Rakesh Narvey
- Study on Active Defense Technology and Detection Algorithm of Virus Based on Computer Network
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.7.39
by: Gao Rui