Vol. 8, No. 8, 2015
- Research on Localization Algorithm Based on Improved Bayesian Filtering Model
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.01
by: Zeyu Sun and Xiaoguang Li
- Robust Auto-Intelligent Sliding Accuracy for High Sensitive Surgical Joints
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.02
by: Amirzubir Sahamijoo, Farzin Piltan, Mohammad Reza Avazpour, Hootan Ghiasi and Mohammad Hadi Mazloom
- Task Scheduling Model of Cloud Computing based on Firefly Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.03
by: Jichao Hu and Yue Fu
- Complexity Comparison for Drinkers' and Normal People's EEG Using Wavelet Entropy
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.04
by: Jiufu Liu, Lei Gao, Zaihong Zhou, Haiyang Liu, Zhengqian Wang, Wenyuan Liu and Jianyong Zhou
- Virtual Memory Systems Should Use Larger Pages rather than the Traditional 4KB Pages
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.05
by: Pinchas Weisberg and Yair Wiseman
- Research on Travelers’ Purchase Situations Influenced by Social Media Marketing
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.06
by: ZhaoGui-hong and FangYu
- An Efficient Task Scheduling of Multiprocessor using Genetic Algorithm based on Task Height
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.07
by: Ashish Sharma and Mandeep Kaur
- A New Fundamental and Numerical Method for the Fractional Partial Differential Equations
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.08
by: Tie Liu
- Best Moments Magnetotactic Bacteria Algorithm for Optimization
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.09
by: Ce Yang and Zhaofeng Chen
- A Novel Security Approach for Data Flow and Data Pattern Analysis to Mitigate DDOS Attacks in VANETs
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.10
by: Mandeep Kaur and Manish Mahajan
- Comparative Analysis on the Integration Level of Informatization and Industrialization: Evidence from China
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.11
by: Changqi Tao and Mengxi Yu
- Analysis of the Influence of Tension on the Fiber Winding Track
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.12
by: Huijun Li, Shuxiang Guo and Xiufen Ye
- A Study of Time Series Model for Forecasting of Boot in Shoe Industry
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.13
by: Amrit Pal singh, Manoj Kumar Gaur, Dinesh KumarKasdekar and Sharad Agrawal
- Different Impact on the Stability Limits Caused by the Selection of Milling Force Coefficient under the State of High-Speed Milling
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.14
by: Zhao Can, Tao GuangFu, Liu Yubo and Guo Yanyan
- E-Voting System with Physical Verification Using OTP Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.15
by: Indrajeet Sharma and Dr. Sanjay Kumar Dubey
- Research on SOC Test Bus Allocation Algorithm under the Constraint of Temperature
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.16
by: Xiaomin Li and Shuanghua Huang
- Hierarchical Reinforcement Learning Based on KNN Classification Algorithms
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.17
by: Shanhong Zhu, Weipeng Dong and Wei Liu
- Transmission Performance of Spectral Amplitude Code Optical Code Division Multiple Access with Using RZ Format
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.18
by: Krishma Bakshi, Himali Sarangal and Dr. Jyoteesh Malhotra
- Recommended Study of the Flow of Information based on TF-IDF
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.19
by: Liuqing Li and Rui Zhang
- Open Ended Tool for Self Paced Learning
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.20
by: Paden Rinchen, Udit Kumar Chakraborty
- Research on Simulation and Experiment of Chip Shape for Machining High Temperature Alloy
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.21
by: Fengyun Yu, YuanTu, He Wang and Yunliang Fu
- A study of Ultrasonic guided wave NDT Technique based on PEEK rod
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.22
by: Yang Hu, Ma Wenliang and Wang Zhaoba
- The Review of New NDT Methods of Metal Material Fatigue Monitoring
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.23
by: Jingwei Dong, Qijian Wu, Wenwen Jiang and Qi Xu
- Improved Inventory Management for Retail Stores based on Intelligent Demand Forecasts
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.24
by: Xiaomin Zhu, Xi Xiang and Donghua Chen
- Design of Sierpinski Carpet Fractal Antennas by Improving the Performance and Reducing the Size for Wide Band and Mobile Applications
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.25
by: Arshad Wahab and Xu Jiadong
- Analysis and Synthesis of Geneva Mechanism with Elliptic Crank
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.26
by: Han Jiguang Yu Kang
- An Improved Haze Removal Algorithm Based on Genetic Fuzzy Clustering
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.27
by: Xiaoguang Li and Huiying Huang
- A Hybrid Technique to Secure E commerce Transaction with the Help of AES Encryption and Stenography in Image
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.28
by: Ekta Chauhan and Unmukh Datta
- Biomedical Named Entity Recognition based on Deep Neutral Network
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.29
by: Lin Yao, Hong Liu, Yi Liu, Xinxin Li and Muhammad Waqas Anwar
- A Comparative Analysis of Adaptive IIR Filtering Techniques using LabVIEW
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.30
by: Divya Sharma, Rashpinder Kaur and Gurjinder Singh
- Concept Similarity Measure with Hierarchy Structure and Information
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.31
by: Cong Dai, Dongmei Li, Hui han, Qichen Han and Jiajia Hou
- Surface Affected Character Analysis based on Field Characteristic Parameter
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.32
by: Zhang Wei, Wu Tong and Cheng Xiaoliang
- Morpheme Segmentation and Concatenation Approaches for Uyghur LVCSR
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.33
by: Mijit Ablimit, Tatsuya Kawahara, Askar Hamdulla
- Based on the Final Decision of Particle Group Algorithm Applied Research
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.34
by: Fenghua Liu
- The Rejection of Particle Group Algorithm based on Nonlinear Strains Fell to Choose in the Application of Artificial Neural Network
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.35
by: Xie Hongsheng and Zhao Xiaofeng
- Effect of Temperature & Supply Voltage Variation on the Stability of Existing 7T SRAM Cell
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.36
by: Prabodh Kumar
- A New Statistical Time of Arrival Ranging Algorithm
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.37
by: Xiaolin Liang, Tingting Lu, Hao Zhang and T. Aaron. Gulliver
- Analysis of Privacy Protection Model under Web Service Composition Framework
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.38
by: Wang Wang, Huang Zhiqiu and Peng Huanfeng
- A Nonlinear System Identification based on Additive Expression Tree Model with Cuckoo Searc
DOI: http://dx.doi.org/10.14257/ijhit.2015.8.8.39
by: Bin Yang