首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of New Computer Architectures and their Applications
ISSN Print: 2220-9085
ISSN Online:
主页:
http://www.sdiwc.net/ijncaa/
分享:
Go
SEMANTIC TECHNOLOGY AND SUPER-PEER ARCHITECTURE FOR INTERNET BASED DISTRIBUTED SYSTEM RESOURCE DISCOVERY
Mahamat Issa Haasn
AGENT-BASED MOM INTEROPERABILITY FRAMEWORK FOR INTEGRATION AND COMMUNICATION OF DIFFERENT SOA APPLICATIONS
Najhan M.Ibrahim
,
Mohd Fadzil Hassan
,
Zain Balfagih
ONLINE INSTRUCTIONAL CONSULTATION FOR HIGHER EDUCATION INSTITUTIONS IN MALAYSIA: THE SYSTEM ARCHITECTURE
Ang Ling Weay
,
Abd Hadi Bin Abd Razak
WEB CONTENT ADAPTATION FOR MOBILE DEVICES: A GREEDY APPROACH
Rajibul Anam
,
Chin Kuan Ho and Tek Yong Lim
COOPERATIVE MECHANISMS TO CARRY AND FORWARD PACKETS IN A DTN VANET
Gianni Fenu
,
Marco Nitti
EMPIRICAL INVESTIGATION ON COGNITIVE USER INTERFACE DIMENSIONS
Natrah Abdullah
,
Wan Adilah Wan Adnan
,
Nor Laila Md Noor
COLLABORATIVE LEARNING THROUGH FACIAL EXPRESSION FOR SPECIAL CHILDREN
Nia Valeria
,
Lau Bee Theng
AN EFFICIENT TEMPORAL PARTITIONING ALGORITHM TO MINIMIZE COMMUNICATION COST FOR RECONFIGURABLE COMPUTING SYSTEMS
Ramzi. Ayadi
,
Bouaoui. Ouni
,
Abdellatif. Mtibaa
APPLYING ROUGH SET THEORY IN MULTIMEDIA DATA CLASSIFICATION
M Nordin A Rahman
,
Yuzarimi M Lazim
,
Farham Mohamed
AUTOMATIC DOCUMENT STRUCTURE ANALYSIS OF STRUCTURED PDF FILES
Rosmayati Mohemad
,
Abdul Razak Hamdan
,
Zulaiha Ali Othman
,
Noor MaizuraMohamad Noor
PERFORMANCE ANALYSIS OF TWO-DIMENSIONAL SYSTOLIC ARRAY MATRIX MULTIPLICATION WITH ORTHOGONAL INTERCONNECTIONS
A.H.M. Shapri
,
N.A.Z. Rahman
AN EXTENDED SIMULATION OF COMPLEX TASK PARTITIONING METHOD IN ASELF-ORGANIZED ROBOTICS SWARM
Mehrdad Jangjou
,
Alireza Bagheri
,
Mohammad Mansour Riahi Kashani
,
Koosha Sadeghi Oskooyee
HEP: CONTEXT-AWARE COMMUNICATION SYSTEM
Bachir Chihani
,
Emmanuel Bertin
,
Fabrice Jeanne
,
Noel Crespi
DIFFERENCES BETWEEN THE ANSWERS OF QUESTIONNAIRE INVESTIGATION AND REAL BEHAVIOR OF THE STUDENTS IN THE E-COURSE FOR HEALTHCARE
Martin C??pay
,
Zolt??n Balogh
,
Michal Munk
,
Miroslava Mes??ro??ov??
A DATA MINING APPROACH TO CONSTRUCT GRADUATES EMPLOYABILITY MODEL IN MALAYSIA
Myzatul Akmam Sapaat
,
Aida Mustapha
,
Johanna Ahmad
,
Khadijah Chamili
DYNAMIC LOAD BALANCING POLICY WITH COMMUNICATION AND COMPUTATION ELEMENTS IN GRID COMPUTING WITH MULTI-AGENT SYSTEM INTEGRATION
Bakri Yahaya
,
Rohaya Latip
,
Mohamed Othman
,
Azizol Abdullah
T-WAY STRATEGIES AND ITS APPLICATIONS FOR COMBINATORIAL TESTING
Rozmie R. Othman
,
Kamal Z. Zamli
EVALUATING COMPLEXITY OF TASK KNOWLEDGE PATTERNS THROUGH REUSABILITY ASSESSMENT
Cheah WaiShiang
,
Cheah WaiShiang
,
Edwin Mit
,
Azman Bujang Masli
TOWARDS A DYNAMIC FILE INTEGRITY MONITOR THROUGH A SECURITY CLASSIFICATION
Zul Hilmi Abdullah
,
Nur Izura Udzir
,
Ramlan Mahmod
,
and Khairulmizam Samsudin
AN EMPIRICAL FRAMEWORK DESIGN TO EXAMINE THE IMPROVEMENT IN SOFTWARE REQUIREMENTS THROUGH NEGOTIATION
Sabrina Ahmad
,
Noor Azilah Muda
MINING FEATURE-OPINION IN EDUCATIONAL DATA FOR COURSE IMPROVEMENT
Alaa El-Halees
A STUDY ON THE EVALUATION OF UNIT TESTING FOR ANDROID SYSTEMS
Ben Sadeh
,
Sundar Gopalakrishnan
A MUTLI-AGENT SYSTEM FOR FIREWALL FORENSICS ANALYSIS
Hassina Bensefia
,
Nacira Ghoualmi
OPTIMIZING DECISION TREE IN MALWARE CLASSIFICATION SYSTEM BY USING GENETIC ALGORITHM
Mohd Najwadi Yusoff
,
Aman Jantan
EVALUATION AND SELECTION COTS SOFTWARE PROCESS: THE STATE OF THE ART
Feras Tarawneh
,
Fauziah Baharom
,
Jamaiah Hj. Yahaya
,
Faudziah Ahmad
COMBINING STEGANOGRAPHY AND CRYPTOGRAPHY: NEW DIRECTIONS
Khalil Challita
,
Hikmat Farhat
NEURAL NETWORK APPLICATION IN RESERVOIR WATER LEVEL FORECASTING AND RELEASE DECISION
Wan Hussain Wan Ishak
,
Ku Ruhana Ku-Mahamud
,
Norita Md Norwawi
ANALYSIS OF COMPOUND ENHANCEMENT ALGORITHMS (CEA) BASED ON ADAPTIVE HISTOGRAM EQUALIZATION (AHE) ON INTRA-ORAL DENTAL RADIOGRAPHS IMAGES
Siti Arpah Ahmad
,
Mohd Nasir Taib
,
NoorElaiza Abd Khalid
,
Rohana Ahmad
ONE-TIME KEY AND DIAMETER MESSAGE AUTHENTICATION PROTOCOL FOR PROXY MOBILE IPV6
Md. Mahedi Hassan
,
Poo Kuan Hoong
ANALYSIS OF DELAY PERFORMANCE IN EFFICIENT DBA WITH GLOBAL PRIORITY FOR EPON
Nurul Asyikin Mohamed Radzi
,
Norashidah Md. Din
,
Mohammed Hayder AlMansoori
,
Mohd. Shahmi Abdul Majid
A TRAINING BASED TRANSMISSION PERIOD SETTING PROTOCOL
Guangri Jin
,
Li Gong
,
Hiroshi Furukawa
STRUCTURING THE INFORMATION SYSTEM ARCHITECTURE USING PATTERNS
Shokoofeh Ketabchi
,
Navid Karimi Sani
,
Kecheng Liu
APPLICATION OF HYBRID WAVELET-FRACTAL COMPRESSION ALGORITHM FOR RADIOGRAPHIC IMAGES OF WELD DEFECTS
Faiza Mekhalfa
,
Daoud Berkani
MODEL-BASED WEB COMPONENTS TESTING: PRIORITIZATION USING MIDS AND CENTRALITY MEASURES
Ahmed Al-Herz
,
Moataz Ahmed
REUSABILITY ASSESSMENT OF OPEN SOURCE COMPONENTS FOR SOFTWARE PRODUCT LINES
Fazal-e- Amin
,
Ahmad Kamil Mahmood
,
Alan Oxley
HUMAN IDENTIFICATION BASED ON EXTRACTED GAIT FEATURES
Hu Ng
,
Hau-Lee Ton
,
Wooi-Haw Tan
,
Timothy Tzen-Vun Yap
CYBER FORENSICS COMPETENCY-BASED FRAMEWORK - AREVIEW
Elfadil Sabeil
,
Azizah Bt Abdul Manaf
,
Zuraini Ismail
,
Mohamed Abas
BLOG QUALITY MEASUREMENT: ANALYSIS OF CRITERIA USING THE RASCH MODEL
Zuhaira Muhammad Zain
,
Abdul Azim Abd Ghani
,
Rusli Abdullah
,
Rodziah Atan
JOINT CHANNEL-DIVERSITY CODING FOR THE THREE-WAY FREE-SPACE OPTICAL SYSTEMS THROUGH ATMOSPHERIC-TURBULENCE CHANNELS
Chadi Abou-Rjeily
MITIGATION OF BLACK HOLE ATTACKS FOR AODV ROUTING PROTOCOL
Kamarularifin Abd. Jali
,
Zaid Ahmad
,
Jamalul-Lail Ab Manan
REVIEW ON TRADITIONAL AND AGILE COST ESTIMATION SUCCESS FACTOR IN SOFTWARE DEVELOPMENT PROJECT
Zulkefli Mansor
,
Saadiah Yahya
,
Noor Habibah Hj Arshad
PROTECTION OF PERSONAL INFORMATION BASED ON USER PREFERENCE
Kenichi Takahashi
,
Takanori Matsuzaki
,
Tsunenori Mine
,
Takao Kawamura
ASSESSMENT PROCEDURE OF THE EM INTERACTION BETWEEN MOBILE PHONE ANTENNAE AND HUMAN BODY
Salah I. Al-Mously
BUILDING FUZZY GOAL PROGRAMMING WITH FUZZY RANDOM LINEAR PROGRAMMING FOR MULTI-LEVEL MULTI-OBJECTIVE PROBLEM
Nureize Arbaiy
,
Junzo Watada
IMPROVING TRANSPORT PROTOCOL PERFORMANCE IN MANET BY EXPLOITING THE BACKOFF ALGORITHM OF MAC PROTOCOL
Sofiane Hamrioui
,
Mustapha Lalam
COLLABORATION, WEALTH AND VALUE CREATION, SMES €' HALAL PRODUCTS COMMUNITIES, AND INFORMATION SYSTEMS
Alfi Khairiansyah Machfud
,
Abdul Rahman Ahmad Dahlan
,
Jawdat Khatib
,
Ahmed Abdulaziz Haji-Ahmed
A SCALABLE BLOCK COMPENSATION WITH INDEX SELECTION MECHANISM TO ACHIEVE HIGH VIDEO QUALITY RETRIEVAL
Ta- Te Lu
,
Tsung-Hsuan Tsai
,
Jia-Yuan Wu
CLASSIFICATION AND MEASUREMENT ON C OVERFLOW VULNERABILITIES ATTACK
Nurul Haszeli Ahmad
,
Syed Ahmad Aljunid
,
Jamalul-lail Ab Manan
CONVERSION STRATEGY OF A SYSTEM OF COLLABORATING DESIGN PATTERNS INTO UML DIAGRAM FOR DESIGN PATTERN
Muhazam Mustapha
,
Nik Ghazali Nik Daud
,
Indika Udawatta
,
Manjula Atapattu
Go