IJCISIM ISSN: 2150-7988 Volume 8, 2016 |
Table of contents
|
Hardware-Oriented Succinct-Data-Structure for Text Processing Based on Block-Size-Constrained Compression Hasitha Muthumala Waidyasooriya, Daisuke Ono and Masanori Hariyama pp. 001 - 011 Full Text PDF |
Feature Points based Fish Image Recognition Takeshi Saitoh, Toshiki Shibata1 and Tsubasa Miyazono pp. 012 - 022 Full Text PDF |
Visualizing Self- and Peer-assessment Data by a Self-organizing Map for Inducing Awareness in Learners Yuta Ueki and Kei Ohnishi pp. 023 - 032 Full Text PDF |
An Integrated Approach for Multilingual Scene Text Detection Wen-Hung Liao1, Yi-Chieh Wu pp. 033 - 041 Full Text PDF |
Potential Information Maximization: Potentiality-Driven Information Maximization and Its Application to Tweets Classification and Interpretation Ryozo Kitajima, Ryotaro Kamimura, Osamu Uchida and Fujio Toriumi pp. 042 - 051 Full Text PDF |
Comparison between two declarative approaches to solve the problem of Pattern Mining in Sequences Akram Rajeb, Zied Loukil and Abdelmajid Ben Hamadou pp. 052 - 056 Full Text PDF |
Performance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking Atta-ur-Rahman, Muhammad Azam and Gohar Zamanbr pp. 057 - 066 Full Text PDF |
A Study on Visualizing Feature Extracted from Deep Restricted Boltzmann Machine using PCA Koki Kawasaki1, Tomohiro Yoshikawa and Takeshi Furuhashi pp. 067 - 076 Full Text PDF |
On Analysis and Visualization of Twitter Data Fathelalem Ali, Yasuki Shima pp. 077 - 082 Full Text PDF |
Multi-zone Building Energy and Comfort Management using Computational Intelligence Approach Ee May Kan, Siew Leong Kan, Ngee Hoo Ling,Yvonne Soh and Matthew Lai pp. 083 - 092 Full Text PDF |
Discovery and Enhancement of Learning Model Analysis through Semantic Process Mining Kingsley Okoye, Abdel-Rahman H. Tawil, Usman Naeem1 and Elyes Lamine pp. 093 - 114 Full Text PDF |
Multi-Agent Segmentation using Region Growing and Contour Detection: Syntetic evaluation in MR Images with 3D CAD Reconstruction Abdelhafid NACHOUR, Latifa OUZIZI, Youssef AOURA pp. 115 - 124 Full Text PDF |
Overview of Bio-Inspired Control Mechanisms for Hexapod Robot Marek Zak, Jaroslav Rozman and Frantisek V. Zboril pp. 125 - 134 Full Text PDF |
The Impact of Term Statistical Relationships on Rocchio’s Model Parameters For Pseudo Relevance Feedback Nesrine Ksentini, Mohamed Tmar, Faiez Gargouri pp. 135 - 144 Full Text PDF |
RFID and XBee based Automated Verification of Put-away Operation for Warehouse Management Systems Burcu BEKTAŞ and Hayriye KORKMAZ pp. 145 - 153 Full Text PDF |
An Evolutionary Algorithm Based On The Aphid Life Cycle Michael Cilliers and Duncan Coulter pp. 155 - 162 Full Text PDF |
ImmunoOptiDrone - A case study on the general suitability of purpose of abstract evolutionary approaches Kevin Downs and Duncan Anthony Coulter pp. 163 - 172 Full Text PDF |
Segmentation approach of Arabic manuscripts text lines based on multi agent systems Youssef Boulid, Abdelghani Souhar, Mohamed Youssfi Elkettani pp. 173 - 183 Full Text PDF |
Automated Extraction of Features from Arabic Emotional Speech Corpus Mohamed Meddeb, Hichem Karray and Adel.M.Alimi pp. 184 - 194 Full Text PDF |
Image segmentation based on community detection approach Youssef Mourchid, Mohammed El Hassouni and Hocine Cherifi pp. 195 - 204 Full Text PDF |
Achieving a Better Energy-Efficient Cognitive Radio Network Efe F. Orumwense, Thomas J. Afullo and Viranjay M. Srivastava pp. 205 - 213 Full Text PDF |
Improving the stability of wrapper variable selection applied to binary classification Silvia Cateni and Valentina Colla pp. 214 - 225 Full Text PDF |
Fuzzy Networks based Information Retrieval Model Kamel Garrouch, Mohamed Nazih Omri pp. 226 - 234 Full Text PDF |
RAID: Robust Algorithm for stemmIng text Document Kabil BOUKHARI and Mohamed Nazih OMRI pp. 235 - 246 Full Text PDF |
Performance evaluation of classification algorithms by excluding the most relevant attributes for dipper/non-dipper pattern estimation in Type-2 DM patients Zehra Aysun Altikardes, Hasan Erdal, Ahmet Fevzi Baba, Ali Serdar Fak and Hayriye Korkmaz pp. 247 - 256 Full Text PDF |
Modeling Insurance Fraud Detection Using Ensemble Combining Classification Amira Kamil Ibrahim Hassan and Ajith Abraham pp. 257 - 265 Full Text PDF |
Advanced Cache Techniques for SLA-Driven Multi-Tenant Application on PaaS K R Remesh Babu, Saranya S and Philip Samuel pp. 266 - 274 Full Text PDF |
A New Security Layer for Improving the security of internet of things (IoT) Hamoud M. Aldosari, Vaclav Snasel, Ajith Abraham pp. 275 - 283 Full Text PDF |
A Novel Method for Outlier Entity Detection in Email Communication Network (ECN) Maqsood Mahmud pp. 284 - 292 Full Text PDF |
Open NLP based Refinement of Software Requirements Murali Mohanan, Philip Samuel pp. 293 - 300 Full Text PDF |
Application of Aesthetic Differential Evolution in Identification of Noisy Sources in a Multi Noise Plant Tarun Kumar Sharma and Millie Pant pp. 301 - 311 Full Text PDF |
An Estimate of Fetal Autonomic State by Time Spectral and Nonlinear Analysis of Fetal Heart Rate Variability Manoj S. Sankhe, Kamalakar D. Desai and Mohan A. Gadam pp. 312 - 325 Full Text PDF |
Hybrid P System with Conditional Communication M. Nithya Kalyani, P. Helen Chandra and S. M. Saroja T. Kalavathy pp. 326 - 335 Full Text PDF |
Flat Splicing Array Grammar Systems Generating Picture Arrays G. Samdanielthompson, N. Gnanamalar David, Atulya K. Nagar and K.G. Subramanian pp. 336 - 344 Full Text PDF |
Multi-Trip Vehicle Routing Problem with Time Windows and Heterogeneous Fleet François Despaux, Sebastián Basterrech pp. 355 - 363 Full Text PDF |
Copyright © 2005 - 2016, Mirlabs, USA |