Using High Performance Computing to Explore Large Complex Bioacoustic Soundscapes: Case Study for Right Whale Acoustics Fulltext Access 7 Pages 2013
Toward Theory and Practice of Continuous Imprecise Numbers and Categories Fulltext Access 7 Pages 2013
Multi-objective Evolutionary Algorithm with Strong Convergence of Multi-area for Assembly Line Balancing Problem with Worker Capability Fulltext Access 7 Pages 2013
Selective Power Aware Data Management Approach for Wireless Sensor Networks Fulltext Access 7 Pages 2013
Analyzing the Impact of UMLS Relations on Word-sense Disambiguation Accuracy Fulltext Access 7 Pages 2013
Stack Memory Buffer Overflow Protection based on Duplication and Randomization Fulltext Access 7 Pages 2013
Personalized Security Approaches in E-banking Employing Flask Architecture over Cloud Environment Fulltext Access 7 Pages 2013
The Influence Factor Analysis of Comprehensive Energy Consumption in Manufacturing Enterprises Fulltext Access 7 Pages 2013
Research of the Influence of Macro-Economic Factors on the Price of Gold Fulltext Access 7 Pages 2013
Data, Information, Knowledge, Wisdom and Meta-Synthesis of Wisdom-Comment on Wisdom Global and Wisdom Cities Fulltext Access 7 Pages 2013
Method of Value-at-Risk and Empirical Research for Shanghai Stock Market Fulltext Access 7 Pages 2013
The Impact of Investors’ Risk Attitudes on Skewness of return Distribution Fulltext Access 7 Pages 2013
A Multi-Level Analysis Framework in Network Security Situation Awareness Fulltext Access 7 Pages 2013
A Computational and Mathematical Approach towards the Design and Synthesis of Uniform Au Seed Decorated Fe3O4 Nanoparticle for Potential Bio-application Fulltext Access 7 Pages 2013
Realizing the Benefits from Enterprise Information Systems: A Sociomaterial Perspective Fulltext Access 7 Pages 2013
Survey on Important Cloud Service Provider Attributes Using the SMI Framework Fulltext Access 7 Pages 2013
An Effective Approach: Image Quality Enhancement for Microaneurysms Detection of Non-dilated Retinal Fundus Image Fulltext Access 7 Pages 2013
Feature Points Extraction of Thermal Face Using Harris Interest Point Detection Fulltext Access 7 Pages 2013
Neural Network Modeling of Color Array Filter for Digital Forgery Detection Using Kernel LDA Fulltext Access 7 Pages 2013
Construction of GA-optimized Radial Basis Neural Network from HIV-1 Vpr Mutant Microarray Gene Expression Data Fulltext Access 7 Pages 2013
Complexity Analysis of Chaotically Encrypted Rate-1/n Convolutional Encoders Fulltext Access 7 Pages 2013
Analyzing Structural & Temporal Characteristics of Keyword System in Academic Research Articles Fulltext Access 7 Pages 2013
An Alternative Approach to Reduce Massive False Positives in Mammograms Using Block Variance of Local Coefficients Features and Support Vector Machine Fulltext Access 7 Pages 2013
An Approach to Advance Higher Order Cross-cultural Awareness in Dismounted Soldiers Fulltext Access 7 Pages 2013
A comparison between the reduced differential transform method and the Adomian decomposition method for the Newell–Whitehead–Segel equation Fulltext Access 7 Pages 2013
The unbounded solution of a periodic mixed Sturm–Liouville problem in an infinite strip for the Laplacian Fulltext Access 7 Pages 2013
A basic formula for performance gradient estimation of semi-Markov decision processes Fulltext Access 7 Pages 2013
Economic value of greenhouse gases and nitrogen surpluses: Society vs farmers’ valuation Fulltext Access 7 Pages 2013
An efficient super-resolution approach for obtaining isotropic 3-D imaging using 2-D multi-slice MRI Fulltext Access 7 Pages 2013
An assignment-based lower bound for a class of two-machine flow shop problems Fulltext Access 7 Pages 2013
On some new sequence spaces of non-absolute type and matrix transformations Fulltext Access 7 Pages 2013
‘Modernising’ data protection Convention 108: A safe basis for a global privacy treaty? Fulltext Access 7 Pages 2013
Some reflections on the duality of regime for software protection in the European Union Fulltext Access 7 Pages 2013
The EU Proposal for a General Data Protection Regulation and the roots of the ‘right to be forgotten’ Fulltext Access 7 Pages 2013
Near optimal performance joint semi-blind channel estimation and data detection techniques for Alamouti coded single-carrier (SC) MIMO communication systems Fulltext Access 7 Pages 2013
A novel hybrid simulation methodology for capacity estimation in mobile networks Fulltext Access 7 Pages 2013
Cooperation within the Small Cell: The indoor, correlated shadowing case Fulltext Access 7 Pages 2013
“Electronic transport records”: Assessing the contribution of the Rotterdam Rules to e-commerce Fulltext Access 7 Pages 2013
Design and Implementation of Smart Energy Management System for Reducing Power Consumption Using ZigBee Wireless Communication Module Fulltext Access 7 Pages 2013
A New Approach to Detect and Extract Characters from Off-Line Printed Images and Text Fulltext Access 7 Pages 2013
Towards the Definition of Relations between Clusters in Multicriteria Decision Aid Clustering Fulltext Access 7 Pages 2013
Advancing Innovation and Development of IT and Quantitative Management: Preface for ITQM 2013 Fulltext Access 7 Pages 2013
Toward an FPGA Hardware Implementation of the Alamouti 4x2 Space-time Block Coding Fulltext Access 7 Pages 2013
Matsuoka Neuronal Oscillator for Traffic Signal Control Using Agent-based Simulation Fulltext Access 7 Pages 2013
Dynamic Distributed Flow Scheduling with Load Balancing for Data Center Networks Fulltext Access 7 Pages 2013
Applying Non-negative Matrix Factorization to Classify Superimposed Handwritten Digits Fulltext Access 7 Pages 2013
Hybrid of Rule-based Systems Using Genetic Algorithm to Improve Platform Game Performance Fulltext Access 7 Pages 2013
Autonomous mobile robot localization based on RSSI measurements using an RFID sensor and neural network BPANN Fulltext Access 7 Pages 2013
Pairwise correlations via quantum discord and its geometric measure in a four-qubit spin chain Fulltext Access 7 Pages 2013
A novel statistical approach for detection of suspicious regions in digital mammogram Fulltext Access 7 Pages 2013