Journal title
ISSN: 1841-9836    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 9 Number 1 Year 2014

14 articles in this issue 

Jing Yuan,Ruixi Yuan,Xi Chen

This paper proposes a novel detection engine, called the Wavelet-Recurrence-Clustering (WRC) detection model, to study the network anomaly detection problem that is widely attractive in Internet security area. The WRC model firstapplies the wavelet t... see more

Pags. 101 - 112  

Junsan Zhang,Youli Qu,Shengfeng Tian

Entity is an important information carrier in Web pages. Searchers often want a ranked list of relevant entities directly rather a list of documents. So the research of related entity finding (REF) is a meaningful work. In this paper we investigate the mo... see more

Pags. 113 - 124  

Lucian Morgos

Typically, gene expression data are formed by thousands of genes associated to tens or hundreds of samples. Gene expression data comprise relevant (discriminant)information as well as irrelevant information often interpreted as noise. The irrele... see more

Pags. 16 - 23  

Mahdi Nouri,Mahyar Safarinia,Payam Pourmahdi,Mohammad Hossein Garshasebi

In this paper a parallel Hash algorithm construction based on the Chebyshev Halley methods with variable parameters is proposed and analyzed. The two core characteristics of the recommended algorithm are parallel processing mode and chaotic... see more

Pags. 24 - 36  

Ponnusamy Ramalingam,Satish Babu,T. Chitralekha

In the modern age everyone needs access to Internet; Visually handicapped are not an exception for that. SPECS (SPEcialized Computer System) is a system developed to give access to the visually handicapped.  It has a Braille shell. The user can enter... see more

Pags. 37 - 47  

Mani Ranjani,Palzha Murugesan

A new method of speed control of DC drives using series Quasi-Resonant (QR) Zero current switching (ZCS)DC to DC converters is proposed.  .It employs a Fuzzy logic controller (FLC) in feed back loop conventionally but due to the advent of new intelli... see more

Pags. 48 - 55  

santhi P,V.Murali Bhaskaran

The Image is very important for the real world to transfer the messages from any source to destination. So, these images are converted in to useful information using data mining techniques. In existing all the research papers using kmeans and&nb... see more

Pags. 56 - 61  

Florin Stoica,Cornel Boitor

For the prediction of the unerupted canine and premolars mesiodistal size, have been proposed different variants of multiple linear regression equations (MLRE). These are based on the amount of the upper and lower permanent incisors with a tooth of the la... see more

Pags. 62 - 70  

N. Suganthi,Sumathy Vembu

A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes deployed over a geographical area. Each node is a low-power device that integrates computing, wireless communication, and sensing abilities. Many applications that make use of s... see more

Pags. 71 - 78  

Horia-Nicolai L. Teodorescu,Emanuel-Florin Iftene

We analyze the eciency of the masking of instruction patterns using a chaotic driven clock and power supply, in front of a side attack intruding the power supply of a microsystem. The differential analysis is supposedly conducted by correlation power anal... see more

Pags. 79 - 84  

Costin Anton Boiangiu,Mihai Cristian Tanase,Radu Ioanitescu

The first step in the text recognition process is represented by the text line segmentation procedures. Only after text lines are correctly identified can the process proceed to the recognition of individual characters. This paper proposes a lin... see more

Pags. 8 - 15  

Zhendong Wang,Huiqiang Wang,Hongwu Lv,Guangsheng Feng

This study intends to improve the QoS of SUs and CRNs performance. A novel spectrum migration approach based on pre-decision aid and interval Mamdani fuzzy inference is presented. we first define spectrum migration factors as spectrum chara... see more

Pags. 85 - 92  

Donghee Yoo,Sungchun No,Minyoung Ra

The purpose of this research is to construct a military ontology as the core element for implementing the intelligent Army Tactical Command Information System (ATCIS). Using the military ontology, the system can automatically understand and manage the mea... see more

Pags. 93 - 100