Title Author Keyword Abstract


Most clicked Papers

No.   Subject
01  [IJACT] Evaluating the Similarity of XML Documents Based on Frequent Label Sequences
Yijun Bei, Xiaolin Zheng, Zhen Lin, "Evaluating the Similarity of XML Documents Based on Frequent Label Sequences", IJACT, Vol. 4, No. 13, pp. 26 ~ 34, 2012
To efficiently and yet accurately cluster XML documents is of great interests to web users. Among different methods to address the problem, clustering XML documents based on the frequent patterns in ... (View: 9104)
02  [IJACT] Ontology based Image Semantics Recognition using Description Logics
, Xu Chuanyun, Zhang Yang, Yang Dan, "Ontology based Image Semantics Recognition using Description Logics", IJACT, Vol. 3, No. 10, pp. 1 ~ 8, 2011
Aimed at the lack of methods to describe image semantics and map low level semantics to high level semantics, Hiberarchy Model of Image Semantic is designed to extract image features from inherent i... (View: 7768)
03  [IJACT] Creating Challengeable and Satisfactory Game Opponent by the Use of CI Approaches
Suoju He, Yuan Gao, Jiajian Yang, Yiwen Fu, Xiao Liu, "Creating Challengeable and Satisfactory Game Opponent by the Use of CI Approaches", IJACT, Vol. 2, No. 1, pp. 41 ~ 63, 2010
The goal for video game AI (artificial intelligence) is to generate AI that is both challengeable and satisfactory. Most existing game AI is implemented by FSM (finite state machine) which has drawbac... (View: 6086)
04  [JCIT] A New Method of Tank Detection for SAR Images
Huozhen Hu, Jinwen Tian, Guangming Dai, Maocai Wang, "A New Method of Tank Detection for SAR Images", JCIT, Vol. 6, No. 11, pp. 441 ~ 449, 2011
The tank is one of important military targets. Tanks detection is the study focus of the synthetic aperture radar(SAR) image processing currently. But there may be many false alarms existed in the d... (View: 4166)
05  [JDCTA] Practicability of Dataspace Systems
Hamid Turab Mirza, Ling Chen, Gencai Chen , "Practicability of Dataspace Systems", JDCTA, Vol. 4, No. 3, pp. 233 ~ 243, 2010
Nowadays there is rarely a scenario where all the data can be fit nicely into one relational database management system or any other single data model. In acknowledgement of this fact a new concept of... (View: 3286)
06  [JDCTA] Robust Digital Image Watermarking Based on Joint DWT-DCT
Saeed K. Amirgholipour , Ahmad R. Naghsh-Nilchi, , "Robust Digital Image Watermarking Based on Joint DWT-DCT ", JDCTA, Vol. 3, No. 2, pp. 42 ~ 54, 2009
In this paper, a new robust digital image watermarking algorithm based on Joint DWT-DCT Transformation is proposed. A binary watermarked logo is scrambled by Arnold cat map and embedded in cer... (View: 3095)
07  [JCIT] Trading Strategies based on Pattern Recognition in Stock Futures Market using Dynamic Time Warping Algorithm
Lee, Suk Jun, Jeong, Suk Jae, "Trading Strategies based on Pattern Recognition in Stock Futures Market using Dynamic Time Warping Algorithm", JCIT, Vol. 7, No. 10, pp. 185 ~ 196, 2012
Traditional technical analysis is forecasting the up and down trends in the stock market. However, it is difficult to apply technical analysis directly because it relies on human experience to select... (View: 2997)
08  [IJACT] Logical Trees: an Essential Method of Parsing SQL Statement with Semantic Analysis
Gang Lu, Kevin Lü, "Logical Trees: an Essential Method of Parsing SQL Statement with Semantic Analysis", IJACT, Vol. 5, No. 1, pp. 270 ~ 278, 2013
Comparing where sub-clauses between different SQL statements is important in analyzing SQL statements, which is usually the key for databases security. Comparing them literally is not sufficient, be... (View: 2903)
09  [IJIPM] A Decentralized Attribute Management Method and its Implementation
Yoshio KAKIZAKI and Hidekazu TSUJI, "A Decentralized Attribute Management Method and its Implementation", IJIPM, Vol. 3, No. 1, pp. 61 ~ 69, 2012
Individual attributes such as name, sex, date of birth, address, job, and affiliation are private and must be secured. A centralized management system for attribute information has a critical problem... (View: 2870)
10  [AISS] Study on Algorithm of Statistics for Bolts Information of Steel Bridge and Iron Tower Based on Assembly Feature
Lei Chen, Mingran Deng, "Study on Algorithm of Statistics for Bolts Information of Steel Bridge and Iron Tower Based on Assembly Feature", AISS, Vol. 3, No. 10, pp. 1 ~ 11, 2011
Main structure of a steel bridge and iron tower is mainly composed of plates and angle steels, which posses ten thousands of high strength bolts. Bolts information obtained through artificial estima... (View: 2603)
  Recently Published Papers

No.   Subject
01  [JCIT] Smartphones Energy Consumption Prediction Using Usage Patterns
Aws F. Hasan, Walaa Medhat, Yasser F. Hassan, "Smartphones Energy Consumption Prediction Using Usage Patterns", JCIT, Vol. 14, No. 2, pp. 54 ~ 65, 2019
Nowadays, Smartphones are playing important role in human life as considered the primary communication tool. Additionally, the users of smartphones can perform variety tasks such watching videos, pl... (Last: 2019-05-18)
02  [JCIT] An Availability Model for Service Function Chains with VM Live Migration and Rejuvenation
, Erico A. C. Guedes, Patricia Takako Endo, Paulo R. M. Maciel, "An Availability Model for Service Function Chains with VM Live Migration and Rejuvenation", JCIT, Vol. 14, No. 2, pp. 42 ~ 53, 2019
Network Function Virtualization (NFV) and Service Function Chains (SFC) technologies have enabled the virtualization of network services, such as load balancer and firewall, with the goal to provide ... (Last: 2019-05-18)
03  [JCIT] A Preliminary Theory of Communication in Distributed Software Development Teams
Nelson Galvão de Sá Leitão Júnior, Ivaldir Honório de Farias Junior, Hermano Perrelli de Moura, "A Preliminary Theory of Communication in Distributed Software Development Teams", JCIT, Vol. 14, No. 2, pp. 30 ~ 41, 2019
Communication plays an essential role in professional software development, as it stands as one of the pillars of this collaborative activity. Communication is also one of the leading challenges in ... (Last: 2019-05-18)
04  [JCIT] Changes in executive compensation ceilings and relationship with firm performance
Jongchul Yoon, "Changes in executive compensation ceilings and relationship with firm performance", JCIT, Vol. 14, No. 2, pp. 21 ~ 29, 2019
This paper examines the relationship between the changes of executive compensation cap and firm performance, and firm value. Executive compensation cap requires shareholder approval at the annual sh... (Last: 2019-05-18)
05  [JCIT] Mobile Learning: Social Implications and Gender Differences
Ahmed Al-Hunaiyyan, Rana Al-Hajri, Salah Al-Sharhan, "Mobile Learning: Social Implications and Gender Differences", JCIT, Vol. 14, No. 1, pp. 133 ~ 143, 2019
It is important to understand challenges that affect the implementation of mobile learning system in a culture. Learners’ expectations are deemed necessary for consideration. There is a lack of stud... (Last: 2019-02-11)
06  [JCIT] A Systematic Review on Brain-Computer Interface based on Steady State Visually Evoked Potentials
, , Harlei M. A. Leite, , Sarah N. Carvalho, Heiko H. Hornung, Dalton S. Arantes, "A Systematic Review on Brain-Computer Interface based on Steady State Visually Evoked Potentials", JCIT, Vol. 14, No. 1, pp. 112 ~ 132, 2019
This paper reports a systematic literature review that has investigated how the interfaces for applications controlled by Brain-Computer Interface based on Steady State Visually Evoked Potentials ha... (Last: 2019-02-11)
07  [JCIT] Dedupeer: An Algorithm for File Deduplication Through Partitioned Processing
Paulo Fernando Almeida Soares, Frederico Araújo Durão, Vinícius Cardoso Garcia, Rodrigo Elia Assad, Diogo Vinícius de Sousa Silva, Anderson Fonseca e Silva, Silvio Romero de Lemos Meira, "Dedupeer: An Algorithm for File Deduplication Through Partitioned Processing", JCIT, Vol. 14, No. 1, pp. 100 ~ 111, 2019
Studies of deduplication techniques started in mid-2004. There are research papers focused on the implementation of algorithms, but they are rare and the main goals are not focused on the integration... (Last: 2019-02-11)
08  [JCIT] A Survey on the State of Practice of Requirement Engineering in GCC Countries
Asaad Alzayed, June M. Verner, "A Survey on the State of Practice of Requirement Engineering in GCC Countries", JCIT, Vol. 14, No. 1, pp. 91 ~ 99, 2019
Requirement Engineering is recognized as one of the most important factors for successful software development. However, of the literature that discusses project failure and success, only few have c... (Last: 2019-02-11)
09  [JCIT] Towards the Improvement of Customer Service by Reducing the Repeated Cases in CRM Systems
Wassim El Hajj Chehade Eman Abed Al Wahab, "Towards the Improvement of Customer Service by Reducing the Repeated Cases in CRM Systems", JCIT, Vol. 14, No. 1, pp. 81 ~ 90, 2019
Firms always seek to improve their customer support services in order to achieve customer satisfaction. The purpose of this study is to contribute to the improvement of customer service in the Custo... (Last: 2019-02-11)
10  [JCIT] Follow Edu: Towards an Integration Architecture for Academic Services in Social BPM
Rômulo César, Wylliams Santos, Patricia Endo, Silvio Meira, "Follow Edu: Towards an Integration Architecture for Academic Services in Social BPM", JCIT, Vol. 14, No. 1, pp. 68 ~ 80, 2019
The use of social networks and the continued need for business process management in organizations have resulted in a new management paradigm, Social Business Process Management (SBPM). Goal: This w... (Last: 2019-02-11)




(c) 2005-2019. Convergence Information Society. Korea(Rep. of). All rights reserved.