Title Author Keyword Abstract


Most clicked Papers

No.   Subject
01  [IJACT] Ontology based Image Semantics Recognition using Description Logics
, Xu Chuanyun, Zhang Yang, Yang Dan, "Ontology based Image Semantics Recognition using Description Logics", IJACT, Vol. 3, No. 10, pp. 1 ~ 8, 2011
Aimed at the lack of methods to describe image semantics and map low level semantics to high level semantics, Hiberarchy Model of Image Semantic is designed to extract image features from inherent i... (View: 7609)
02  [IJACT] Creating Challengeable and Satisfactory Game Opponent by the Use of CI Approaches
Suoju He, Yuan Gao, Jiajian Yang, Yiwen Fu, Xiao Liu, "Creating Challengeable and Satisfactory Game Opponent by the Use of CI Approaches", IJACT, Vol. 2, No. 1, pp. 41 ~ 63, 2010
The goal for video game AI (artificial intelligence) is to generate AI that is both challengeable and satisfactory. Most existing game AI is implemented by FSM (finite state machine) which has drawbac... (View: 5896)
03  [JCIT] A New Method of Tank Detection for SAR Images
Huozhen Hu, Jinwen Tian, Guangming Dai, Maocai Wang, "A New Method of Tank Detection for SAR Images", JCIT, Vol. 6, No. 11, pp. 441 ~ 449, 2011
The tank is one of important military targets. Tanks detection is the study focus of the synthetic aperture radar(SAR) image processing currently. But there may be many false alarms existed in the d... (View: 4053)
04  [JDCTA] Practicability of Dataspace Systems
Hamid Turab Mirza, Ling Chen, Gencai Chen , "Practicability of Dataspace Systems", JDCTA, Vol. 4, No. 3, pp. 233 ~ 243, 2010
Nowadays there is rarely a scenario where all the data can be fit nicely into one relational database management system or any other single data model. In acknowledgement of this fact a new concept of... (View: 3151)
05  [JDCTA] Robust Digital Image Watermarking Based on Joint DWT-DCT
Saeed K. Amirgholipour , Ahmad R. Naghsh-Nilchi, , "Robust Digital Image Watermarking Based on Joint DWT-DCT ", JDCTA, Vol. 3, No. 2, pp. 42 ~ 54, 2009
In this paper, a new robust digital image watermarking algorithm based on Joint DWT-DCT Transformation is proposed. A binary watermarked logo is scrambled by Arnold cat map and embedded in cer... (View: 2960)
06  [JCIT] Trading Strategies based on Pattern Recognition in Stock Futures Market using Dynamic Time Warping Algorithm
Lee, Suk Jun, Jeong, Suk Jae, "Trading Strategies based on Pattern Recognition in Stock Futures Market using Dynamic Time Warping Algorithm", JCIT, Vol. 7, No. 10, pp. 185 ~ 196, 2012
Traditional technical analysis is forecasting the up and down trends in the stock market. However, it is difficult to apply technical analysis directly because it relies on human experience to select... (View: 2886)
07  [IJACT] Logical Trees: an Essential Method of Parsing SQL Statement with Semantic Analysis
Gang Lu, Kevin Lü, "Logical Trees: an Essential Method of Parsing SQL Statement with Semantic Analysis", IJACT, Vol. 5, No. 1, pp. 270 ~ 278, 2013
Comparing where sub-clauses between different SQL statements is important in analyzing SQL statements, which is usually the key for databases security. Comparing them literally is not sufficient, be... (View: 2802)
08  [IJIPM] A Decentralized Attribute Management Method and its Implementation
Yoshio KAKIZAKI and Hidekazu TSUJI, "A Decentralized Attribute Management Method and its Implementation", IJIPM, Vol. 3, No. 1, pp. 61 ~ 69, 2012
Individual attributes such as name, sex, date of birth, address, job, and affiliation are private and must be secured. A centralized management system for attribute information has a critical problem... (View: 2734)
09  [AISS] Study on Algorithm of Statistics for Bolts Information of Steel Bridge and Iron Tower Based on Assembly Feature
Lei Chen, Mingran Deng, "Study on Algorithm of Statistics for Bolts Information of Steel Bridge and Iron Tower Based on Assembly Feature", AISS, Vol. 3, No. 10, pp. 1 ~ 11, 2011
Main structure of a steel bridge and iron tower is mainly composed of plates and angle steels, which posses ten thousands of high strength bolts. Bolts information obtained through artificial estima... (View: 2489)
10  [JDCTA] Utilizing Hybrid Method for Video Image Compression
Assist Dr. Prof. Abbas M. AL-Bakry, Assist Prof. Baheeja Kuthaier shukur, "Utilizing Hybrid Method for Video Image Compression", JDCTA, Vol. 5, No. 11, pp. 1 ~ 7, 2011
Video compression techniques play a vital role in storage & transmission through a limited bandwidth. As a resulted containing video files repeated sequence of still image, each second represented b... (View: 2469)
  Recently Published Papers

No.   Subject
01  [JCIT] Feature Selection approach for Chemical Compound Classification based on CSO and PSO
Ahmed Elsawy, Mahmoud Mousa, Mahmoud Sobhy, "Feature Selection approach for Chemical Compound Classification based on CSO and PSO ", JCIT, Vol. 13, No. 3, pp. 60 ~ 69, 2018
with the improvement of profoundly efficient chemoinformatics data collection technology, classification of chemical data emerges as a vital topic in chemoinformatics. Towards building highly accura... (Last: 2018-11-05)
02  [JCIT] Network flow prediction based on GA-BPNN
XIANG Changsheng, "Network flow prediction based on GA-BPNN", JCIT, Vol. 13, No. 3, pp. 53 ~ 59, 2018
Abstract:In order to improve the performance of network flow prediction model, a novel network flow prediction model is proposed in this paper which genetic algorithm and BP neural network. Firstly, ... (Last: 2018-11-05)
03  [JCIT] Proposal of indicator to support risk management in environments of software development projects
Julio Menezes Jr., Cristine Gusmão, Hermano Moura, "Proposal of indicator to support risk management in environments of software development projects", JCIT, Vol. 13, No. 3, pp. 41 ~ 52, 2018
The management of software projects is not a trivial activity. On the other hand, its practices highlight the factors that can lead projects to failure, helping to control them. In software developme... (Last: 2018-11-05)
04  [JCIT] A Proposed OpenFlow based Load Balancing Technique for http Adaptive Streaming
Waleed M. Bahgat, M. Ghali, and M.A. Mohamed, "A Proposed OpenFlow based Load Balancing Technique for http Adaptive Streaming", JCIT, Vol. 13, No. 3, pp. 28 ~ 40, 2018
HTTP Adaptive streaming (HAS) is considered the dominant technology for video transmission over the internet for the past few years. Software Defined Networking (SDN) is used over (HAS) to provide th... (Last: 2018-11-05)
05  [JCIT] Factors and Variables Behind Social Networking Sites Usage
Narjes Bahrani, Sana Buhamra, Kassem Saleh, "Factors and Variables Behind Social Networking Sites Usage", JCIT, Vol. 13, No. 2, pp. 57 ~ 72, 2018
In recent years, people from across the globe started using social networking sites (SNS) widely. This increasing pervasiveness has been taking so many different forms among people, thus created new ... (Last: 2018-07-16)
06  [JCIT] Feature Extraction Techniques of Ultrasound Kidney Images: A study of Performance
Mariam Wagih Attia, F.E.Z. Abou-Chadi, Hossam El-Din Moustafa, Nagham Mekky, "Feature Extraction Techniques of Ultrasound Kidney Images: A study of Performance", JCIT, Vol. 13, No. 2, pp. 49 ~ 56, 2018
A comparative study was performed to analyze and discuss the performance of three feature extraction techniques in the classification of ultrasound kidney images. An automated computer-aided system ... (Last: 2018-07-16)
07  [JCIT] Development and Assessment of E-Learning Software and Instructional Training Devices
Dr. Eunice B. Custodio, "Development and Assessment of E-Learning Software and Instructional Training Devices", JCIT, Vol. 13, No. 2, pp. 37 ~ 48, 2018
The purpose of this study is to develop and assess different E-learning software and instructional training devices in selected major subjects of the BSIT and BIT Computer Technology of the College o... (Last: 2018-07-16)
08  [JCIT] Bankruptcy Prediction using Random Forest and Particle Swarm Optimization
Waheeda Almayyan, Hind Almayyan, "Bankruptcy Prediction using Random Forest and Particle Swarm Optimization", JCIT, Vol. 13, No. 2, pp. 25 ~ 36, 2018
Bankruptcy is a critical issue in the accounting and finance division. This research aims to develop a model to enhance bankruptcy prediction by integrating the merits of random forest ensemble machi... (Last: 2018-07-16)
09  [JCIT] Consumer Behavior Analysis of Football Clubs of the German Football League in Times of Sporting Success
Julian Bretz, Daewon Kim, "Consumer Behavior Analysis of Football Clubs of the German Football League in Times of Sporting Success", JCIT, Vol. 13, No. 2, pp. 13 ~ 24, 2018
The purpose of the study is to analyze relationship between a successful season of German football teams and changes in the spending patterns of their fans. This study is based on the data collected ... (Last: 2018-07-16)
10  [JCIT] An Adaptable Maturity Strategy for Information Security
, Gliner Dias Alencar, Hermano Perrelli de Moura, Ivaldir Honório de Farias Júnior, , "An Adaptable Maturity Strategy for Information Security", JCIT, Vol. 13, No. 2, pp. 1 ~ 12, 2018
The lack of security in information systems has caused numerous financial and moral losses to several organizations. The organizations have a series of information security measures recommended by l... (Last: 2018-07-16)




(c) 2005-2019. Convergence Information Society. Korea(Rep. of). All rights reserved.