The study investigated Medicial Students use of internet at the College of Health Sciences, Delta State University, Abraka, library y and its branches. Using a questionnnaire, data were collted fro…
The traditional audio de-noising technique using Daubechies wavelet is improved by using statistical grazing estimation. 'Noisy' signals were synthetically generated by introducing 'noise' to a 'cl…
This atricle is built on the basis of the network protocol, to restore the original network data information, mainly for the network users to acces the network, the transmission of image resources …
This paper develops neural network (NN) method using conjugate gradient (CG) with combination of particle swarm optimization (PSQ) and genetic algorithm (GA). The combinasion of PSO and GA is used …
Many institutions in the hingher education sector use electronic information sharing to enhance their service and decision making. Ministry of Higher Education and Scientific Research (MOHESR) in I…
The system based on intelligent sensors are currtely expanding, due to theirs fuctions and theirs performances of intellingence: trasmitting and receiving data in real-time, computation and process…
This paper concentrates on growth; one of the important aspects of firm behavior, in in the Malaysian manufacturing sector between 2000 and 2006. It attempts to analyze the effects of information t…
nd minimize the use of expensive experimental designs, such as, for example, animal testing. This paper, presents a survey of the machine learning algorithms' roles in the field of QSAR modeling an…
With network technology development, Grid Computing satisfies the demand of scientific community's computing power. grid facilitates global computing infrastructure for user to utilize the service …
Most of the digital cameras used now has single sensor with an array of color filters to capture the digital images. Color Filter Array(CFA) uses alternating color filters to sample only one color …
In the era of digital space, the enterprise applications should be accessible from mobile and different channels like SMS
The problem of missing values in data tables aries in almost all domains. With the volume of the information growing every day on the communication channels and the necessity of the integration of …
Linear wireless sensor networks(LWSNs) are captiving significant attention because of their suitability for wide-range of applications. These applications dictate the topology of the network (i.e..…
School bus routing problem has been a significant concern of most people related to school and school bus system as one of vehicle routing problems. Making an appropriate problem formulation dpends…
Advances in digital technology and the World Wide Web as led to increase of digital documents that are used for various purpose such as publising and digital libary. This phenomenon raises awarenes…
In classical teaching, the teacher can supervise his leaners througt their writings, dialogues and their behaviors. He has the possibility to evaluate them from their productions the during activit…
Research regarding Indonesian languange document similarity measurenment has not yet broad to do. Mostly those researches using Karp Rabin Algorithm and string matching method, and the documents us…
Cloud computing is a cost effective alternative for the scientific community to deploy large scale warkflow applications.For executing large scale scienfic workflow applications in a distributed he…
Advances in digital technology and the World Wide Weh has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises …
Adnvanced Encryption Standart (AES) crytographic system are widely used in embedded systems to secure secret infomation. One of the most powerful sryptanalysis techniques against the cryptograhpic …
Maximizing detection accuracy and miniziming the false alarm rate are two major chellenges in the design of an anomaly Itrusion Detection System (IDS). These challenges can be handled by designing …
Carrier aggregation (CA) is one the of main features in long Term Evolution- Advanced (LTE-A). CA will allow the target peak data retes in axcess of 1 Gbps in the downlink and 500 Mbps in the uUpli…
A large number of interactive queries are being excuted day by day. The user expects for an answer without no time after the execution. Even is scientific executions the user needs the intial query…
Multiple sequence alignment (MSA) is a cornerstone process in computational biology and bioinformastics and it is necessary for sequence analysis. Through decades of extensive research to solve the…
Chemical documents, especially those involving drug informstion, comprise a variety of types - the most common being journal articles, patents and these. THey typically contain large amounts of che…
Arabic noun compound extraction has become a challenging issue in the flied of NLP. SEveral approaches have beeb proposed in trems of extracting Arabic noun compouds. Some of them have usen linghui…
Cloud Computing is a major evolution of computing. It changes the way we produce and consume IT and actually evolved the positions of all the players in the computer. This technology is also consid…
In the era of digital space, the enterprise applications should be accessible from mobile and different channels like SMS,IVR
Vision towards establishing an all fiber configuration is the motivation behind this work. With the incresing need for high capcity systems, Broadband sources have become a necesity. Broadband opti…
In mobile ad hoc networks (MANET), Artifical Intelligence (AI) based distributed intrusion detection (DIDS) technique are very rarely available. In general, these technique are used for either dete…