•  
  •  
 

Nov. 2014

Articles

PDF

On the Relation between Outage Probability and Effective Frequency Diversity Order
Yongjune Kim, Minjoong Rim, Xianglan Jin, and Dae-Woon Lim

PDF

I/O Conformance Test Generation with Colored Petri Nets
Jing Liu, Xinming Ye, Jiantao Zhou, and Xiaoyu Song

PDF

Inter-Temporal Optimal Asset Allocation and Time-Varying Risk Aversion
Honglin Yang, Penglan Fang, Hong Wan, and Yong Zha

PDF

Approximations of the Jensen Divergence
E. Kikianty, S. S. Dragomir, and L. Ndlovu

PDF

Towards Secure Data Exchange in Peer-to-Peer Data Management Systems
Sk. Md. Mizanur Rahman, Mehedi Masud, Ali N M Noman, Atif Alamri, and Mohammad Mehedi Hassan

PDF

Dimension Reduction Parameters for Leukemia Diagnostic based in Subspace Arrangement Segmentation
Leticia Flores-Pulido, Gustavo Rodr?guez-G?mez, and Jes?s A. A. Gonz?lez

PDF

New Symmetric Identities Involving q-Zeta Type Functions
Serkan Araci, Armen Bagdasaryan, Cenap ?zel, and H. M. Srivastava

PDF

An Optimization Algorithm for Solving Systems of Singular Boundary Value Problems
Zaer Abo-Hammour, Omar Abu Arqub, Othman Alsmadi, and Shaher Momani

PDF

Digital Watermarking for Images Security using Discrete Slantlet Transform
Myasar Mundher, Dzulkifli Muhamad, Amjad Rehman, Tanzila Saba, and Firdous Kausar

PDF

Group Analysis of a Generalized KdV Equation
Motlatsi Molati and Chaudry Masood Khalique

PDF

Fuzzy Bi-Level Multi-Objective Fractional Integer Programming
E. A. Youness, O. E. Emam, and M. S. Hafez

PDF

Fractional Hermite-Hadamard Inequalities for some New Classes of Godunova-Levin Functions
Muhammad Aslam Noor, Khalida Inayat Noor, Muhammad Uzair Awan, and Sundas Khan

PDF

A Fast and Efficient Parameter Estimation Algorithm for Generalized Output Error Models
Jie Jia, Hua Huang, Yong Yang, Ke Lv, Feng Ding, and Shuying Huang

PDF

A New Image Watermarking Scheme using Multi- Objective Bees Algorithm
Jiann-Shu Lee, Jing-Wein Wang, and Kung-Yo Giang

PDF

DT-AODV: An On-Demand Routing Protocol based DTN in VANET
Dongjie Zhu, Gang Cui, and Zhongchuan Fu

PDF

Characterizing Microwave Power in a MPCVD System using Gaussian Mixture Modeling
Jen-Hsiang Chou, Chih-Ming Hsu, Shun-Yuan Wang, Chii-Ruey Lin, and June-Yen Jhuang

PDF

A Novel Authentication Scheme with Anonymity for Wireless Communications
Liaojun Pang, Huixian Li, Xia Zhou, and Yumin Wang

PDF

An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack
Yu-Fang Chung, Tzer-Shyong Chen, and Tzer-Long Chen

PDF

Development of Simulation Task Unit Model based on Role and State Mode
Zhiteng Wang, Hongjun Zhang, Rui Zhang, Yong Li, and Youliang Zhang

PDF

The Implementation of LSMR in Image Deblurring
Hao Xu, Ting-Zhu Huang, Xiao-Guang Lv, and Jun Liu

PDF

The Research of Multi-point Function Opaque Predicates Obfuscation Algorithm
YANG Yubo, FAN Wenqing, HUANG Wei, XU Guoai, and YANG Yixian

PDF

Breadth First Search Sequence based Method for Efficient Process Retrieval
Ye Yanming, Yin Yuyu, Yin Yuyu, Xu Yueshen, and Yin Jianwei

PDF

Finger Vein Recognition based on Personalized Discriminative Bit Map
Xuzhou Li, Xiaoming Xi, Yilong Yin, and Gongping Yang

PDF

Cloud Model and Tolerance Granular Space-based Image Retrieval Methods
Jiucheng Xu, Jinyu Ren, Lin Sun, and Tianhe Xu

PDF

Joint Frequency Offset and Channel Estimation for Distributed MIMO in Time-Varying Channels
Lijun Song, Zhaofu Kong, Yang Luo, Yinze Li, Xiao Chen, and Xia Lei

PDF

Attribute-based Server-Aided Verification Signature
Zhiwei Wang, Ruirui Xie, and Shaohui Wang

PDF

Two Self-Dual Lattices of Signed Integer Partitions
Giampiero Chiaselotti, William Keith, and Paolo A. Oliverio