Journal title
ISSN: 1841-9836    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 5 Number 4 Year 2010

20 articles in this issue 

Morteza Analoui,Mohsen Sharifi,Mohammad Hossein Rezvani

Nowadays, content distribution has received remarkable attention in distributed computing researches and its applications typically allow personal computers, called peers, to cooperate with each other in order to accomplish distributed operations such as ... see more

Pags. 418 - 431  

Razvan Andonie,Ioan Dzitac

The academic world has come to place enormous weight on bibliometric measures to assess the value of scientific publications. Our paper has two major goals. First, we discuss the limits of numerical assessment tools as applied to computer science publicat... see more

Pags. 432 - 446  

Aydin Aybar

A decentralized controller design approach is developed for the timed discrete event systems which are modelled by timed automata in this work. An approach, called augmentation, is presented to obtain the new modelling method such that each unit delay of ... see more

Pags. 447 - 457  

Mahua Bhattacharya,Arpita Das

The problem of feature selection consists of finding a significant feature subset of input training as well as test patterns that enable to describe all information required to classify a particular pattern. In present paper we focus in this particular pr... see more

Pags. 458 - 468  

Zalán Bodó,Lehel Csató

Recently semi-supervised methods gained increasing attention and many novel semi-supervised learning algorithms have been proposed. These methods exploit the information contained in the usually large unlabeled data set in order to improve classification ... see more

Pags. 469 - 476  

Adrian Bra?oveanu,Mariana Nagy,Oana Mateu?-Petri?or,Ramona Urziceanu

When the first articles about the SemanticWeb (SW) appeared, there were hardly any signals that the next revolution would be related to social networking. Social networking services (SNS) have grown after MySpace, LinkedIn and Facebook were launched in 20... see more

Pags. 477 - 482  

Dominic Bucerzan,Mihaela Craciun,Violeta Chi?,Crina Ra?iu

The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. The tests were made on some algorithms and also on the personal symmetric cryptographic algorithm, HENKOS, based on a ... see more

Pags. 483 - 489  

Zhen Cheng,Zhihua Chen,Yufang Huang,Xuncai Zhang,Jin Xu

DNA self-assembly is a promising paradigm for nanotechnology. Recently, many researches demonstrate that computation by self-assembly of DNA tiles may be scalable. In this paper, we show how the tile self-assembly process can be used for implementing the ... see more

Pags. 490 - 505  

Ali Douik,Mehrez Abdellaoui

The present paper focused on the classification of cereal grains using different classifiers combined to morphological, colour and wavelet features. The grain types used in this study were Hard Wheat, Tender Wheat and Barley. Different types of features (... see more

Pags. 506 - 516  

Nikolaos D. Hasanagas,Athanasios D. Styliadis,Eleni I. Papadopoulou,Lazaros A. Sechidis

Is an effective knowledge exchange and cooperation between academic community and practitioners possible? Implementation of e-learning in specialized policy fields pertains to the most challenging priorities of ICTs and software engineering. In multidisci... see more

Pags. 517 - 524  

Ion Iancu,Nicolae Constantinescu,Mihaela Colhon

This paper presents an optimized method to reduce the points number to be used in order to identify a person using fuzzy fingerprints. Two fingerprints are similar if n out of N points from the skin are identical. We discuss the criteria used for choosing... see more

Pags. 525 - 531  

Gu-Min Jeong,Jong-Duck Lee,Sang-Il Choi,Dong-Wook Kang

This paper presents a new JPEG quantization table design method for mobile phone images. Although the screen size of mobile phones is very small, the full information of the image should nevertheless be represented. Moreover, the high frequency components... see more

Pags. 532 - 539  

Chun Lu,Xingyi Zhang

Tissue P systems is a computing model in the framework of membrane computing inspired from intercellular communication and cooperation between neurons. Many different variants of this model have been proposed. One of the most important models is known as ... see more

Pags. 540 - 550  

Horea Oros,Constantin Popescu

An electronic cash system allows the exchange of digital coins with value assured by the bank’s signature and with concealed user identity. In an electronic cash system, a user can withdraw coins from the bank and then spends each coin anonymously and unl... see more

Pags. 551 - 557  

Daniela Elena Popescu,Madalina Lonea,Doina Zmaranda,Codruta Vancea,Cristian Tiurbe

Based on the available information (eg.multiple functional faults or sensor errors give rise to similar alarm patterns or outcomes), some states in the behaviour of a network can not be distinguished from one another. So, the computer network’s fault tree... see more

Pags. 558 - 566  

Predrag Stanisic,Savo Tomovic

In this paper we suggest a new method for frequent itemsets mining, which is more efficient than well known Apriori algorithm. The method is based on special structure called Rymon tree. For its implementation, we suggest modified sort-merge-join algorith... see more

Pags. 567 - 577  

Davide Taibi,Manuel Gentile,Giovanni Fulantelli,Mario Allegra

Web 2.0 applications and the increasingly use of social networks have been creating new informal learning opportunities. Students interact and collaborate using new learning environments which are structurally different from traditional e-learning environ... see more

Pags. 578 - 585  

Futai Zhang,Sujuan Li,Songqin Miao,Yi Mu,Willy Susilo,Xinyi Huang

Certificateless cryptography has attracted a lot of attention from the research community, due to its applicability in information security. In this paper, we analyze two recently proposed certificateless signature schemes and point out their security fla... see more

Pags. 586 - 591  

Xizheng Zhang,Yaonan Wang,Xiaofang Yuan

This paper presents the fuzzy design of sliding mode control (SMC) for nonlinear systems with state delay, which can be represented by a Takagi-Sugeno (TS) model with uncertainties. There exist the parameter uncertainties in both the state and input matri... see more

Pags. 592 - 602