2012
2012
Volume 5, Number 4, 2012 December
-
- The AreaMap Operator and its Application to Vickers Hardness Testing Images, Andreas Maier and Andreas Uhl (pp. 1-16).
- Developed Algorithm for Supervising Identification of Non Linear Systems using Higher Order Statistics: Modeling Internet Traffic, J. Antari, A. El Khadimi, D. Mammas and A. Zeroual (pp. 17-28).
- Improving 3D Shape Retrieval Methods based on Bag-of-Feature Approach by using Local Codebooks, El Wardani Dadi, El Mostafa Daoudi and Claude Tadonki (pp. 29-38).
- Implementation of Smartcard Personalization Software, Hafid Mammass (pp. 39-54).
- Missing Observations and Evolutionary Spectrum for Random Fields, Rachid Sabre (pp. 55-64).
- Multi-modal Fusion Framework with Particle Filter for Speaker Tracking, Anwar Saeed, Ayoub Al-Hamadi and Michael Heuer (pp. 65-76).
- Broker’s Communication for Service Oriented Network Architecture, AP Manu, Bhawana Rudra, Vipin Kumar and OP Vyas (pp. 77-88).
- An Energy-Efficient Multi-hop Hierarchical Routing Protocol for Wireless Sensor Networks, Jin Wang, Xiaoqin Yang, Yuhui Zheng, Jianwei Zhang and Jeong-Uk Kim (pp. 89-98).
- An Density-based Energy-efficient Routing Algorithm in Wireless Sensor Networks Using Game Theory, Zhanyang Xu, Yue Yin and Jin Wang (pp. 99-112).
- Analytical Study on Effects of Substrate Properties on the Performance of Microstrip Patch Antenna, Bilal Ahmed, Ilyas Saleem, H. Zahra, Hunaina Khurshid and S. Muzahir Abbas (pp. 113-122).
- Implementation of Network Level Security Process through Stepping Stones by Watermarking Methodology, B. Bazeer Ahamed and S. Hariharan (pp. 123-130).
- A Visible Obstacle Mobility Model based on Activity Area, Zhou Shasha, Wang Dong and Li Xiaohong (pp. 131-140).
- An Algorithm for Data Aggregation Scheduling with Long-lifetime and Low-latency in Wireless Sensor Networks, Zhengyu Chen, Geng Yang, Lei Chen and Jin Wang (pp. 141-152).
- A Password and Smart Card Based User Authentication Mechanism for Multi-Server Environments, Chun-Ta Li, Cheng-Chi Lee, Hsing Mei and Chia-Hao Yang (pp. 153-164).
- Distributed Key Management in Wireless Mesh Networks based on Verifiable Secret Sharing, Peng Xiao, Jingsha He and Yingfang Fu (pp. 165-176).