Sciweavers

JCIT
2008
102views more  JCIT 2008»
13 years 4 months ago
Modelling and Simulation for Physical Vapor
1 In this paper we present modeling and simulation for physical vapor deposition for metallic bipolar plates. In the models we discuss the application of different models to simula...
Jürgen Geiser, Robert Rohle
JCIT
2008
112views more  JCIT 2008»
13 years 4 months ago
On the design of metric relations
Metric distances and the more general concept of dissimilarities are widely used tools in instance-based learning methods and very especially in the nearestneighbor classification...
Lluís Belanche, Jorge Orozco
JCIT
2008
245views more  JCIT 2008»
13 years 4 months ago
Quality of Service (QoS) of Voice over MAC Protocol 802.11 using NS-2
Transmitting voice through IP data network can provide significant cost savings. However if not managed properly, voice quality can degrade due to data network congestion. Voice o...
Dileep Kumar, Saleem Ahmed, Yeonseung Ryu
JCIT
2008
117views more  JCIT 2008»
13 years 4 months ago
The New Face Recognition Technique With the use of PCA and LDA
Image recognition using various image classifiers is an active research area. In this paper we will describe a new face recognition method based on PCA (Principal Component Analys...
Seyed Zeinolabedin Moussavi, Saeedreza Ehteram, Al...
JCIT
2008
96views more  JCIT 2008»
13 years 4 months ago
An Intelligent Model and Its Implementation of Search Engine
Intelligence of humankind mostly includes five parts: the observing ability, the memory ability, the practice ability, the thought ability, the imagining ability, etc.. In this pa...
Yajun Du, Haiming Li
JCIT
2008
144views more  JCIT 2008»
13 years 4 months ago
Design Methodology of a Controller to Forecast the Uncertain Cardiac Arrest Using Fuzzy Logic Approach
The main objective of design methodology of a controller for forecasting cardiac arrest using fuzzy logic approach is to provide the prediction of period of life time for the pati...
Nalayini Natarajan, Wahida Banu
JCIT
2008
131views more  JCIT 2008»
13 years 4 months ago
Intelligent Tutoring System: Predicting Students Results Using Neural Networks
In this paper we propose methods to utilize Artificial Neural Networks to obtain knowledge for the management of educational resources. The final evaluations provide us a model th...
E. R. Naganathan, R. Venkatesh, N. Uma Maheswari
JCIT
2008
130views more  JCIT 2008»
13 years 4 months ago
Group-oriented Encryption Secure against Collude Attack
A group oriented encryption scheme is presented in this paper. In this scheme, a sender is allowed to encrypt a message using the group public key and send the ciphertext to the gr...
Chunbo Ma, Jun Ao
JCIT
2008
136views more  JCIT 2008»
13 years 4 months ago
A Packet Partition Scheduling Mechanism for Bandwidth Aggregation over Multiple Paths
This paper proposes a packet partition scheduling mechanism for bandwidth aggregation over end-to-end multi-path through multiple network interfaces. The proposed mechanism effect...
Pyung-Soo Kim, Joo Young Yoon, Hanlim Kim
JCIT
2008
99views more  JCIT 2008»
13 years 4 months ago
Iterative Operator-Splitting Methods for Stiff Problems in Complex Applications
In this paper we deal with the Landau-LifshitzGilbert equation which describes dynamics of ferromagnetism. Based on the strong nonlinearities a stabilised discretisation method is...
Jürgen Geiser