Sciweavers

43 search results - page 3 / 9
» ijactaicit 2010
Sort
View
IJACTAICIT
2010
121views more  IJACTAICIT 2010»
13 years 2 months ago
On Improving Feasibility and Security Measures of Online Authentication
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services th...
Jing-Chiou Liou, Sujith Bhashyam
IJACTAICIT
2010
127views more  IJACTAICIT 2010»
13 years 2 months ago
New Proposed Algorithms for nth Order Butterworth Active Filter Computer-Aided Design
This paper describes new proposed algorithms for constructing the transfer function of nth order Butterworth LPF using the idea of the cascade combination of active filters. Compu...
Haider Fakher Radhi Al-Saidy
IJACTAICIT
2010
120views more  IJACTAICIT 2010»
13 years 2 months ago
Representing Image Search Performance Using Time Series Models
Image search engines tend to return a large number of images which the engines consider to be relevant, and such pool of results generally is very large and may be regarded to be ...
Xiaoling Wang, Clement. H. C. Leung
IJACTAICIT
2010
159views more  IJACTAICIT 2010»
13 years 2 months ago
Improving Semantic Matching of Grid Resources Using Refined Ontology with Complement Class
Amidst the proliferation of different resources available on the Grid, today, it is vital to optimally discover the appropriate resource from amongst a repository of the resources...
Ami T. Choksi, Devesh Jinwala
IJACTAICIT
2010
175views more  IJACTAICIT 2010»
13 years 2 months ago
Achieving CMMI Maturity Level 3 by Implementing FEAF Reference Models
The basic purpose of an Enterprise Architecture project is creating integrity among different enterprise components, including processes, systems, technologies, and etc. While CMM...
Fatemeh Kafili Kasmaee, Ramin Nassiri, Gholamreza ...