Sciweavers

Share
JDCTA
2010
163views more  JDCTA 2010»
8 years 5 months ago
Predictive Analysis for Customer Relationship Management
The approach for predictive analysis focuses on a business strategy to streamline business-customer relationships in order to maximize client satisfaction and thereby improve cust...
Manisha Rathi, Anand Priyadarshini, Ankit Rastogi
JDCTA
2010
121views more  JDCTA 2010»
8 years 5 months ago
Medical Information System With Iconic User Interfaces
Yucel Batu Salman, Hong-In Cheng, Ji Young Kim, Pa...
JDCTA
2010
203views more  JDCTA 2010»
8 years 5 months ago
Preprocessing Method for NaXi Pictographs Character Recognition Using Wavelet Transform
Preprocessing, a major component of Character Recognition System, has direct effect on the recognition system by its performance. Using wavelet transform, this paper mainly focuse...
Hai Guo, Jing-ying Zhao, Xiao-niu Li
JDCTA
2010
152views more  JDCTA 2010»
8 years 5 months ago
A Semantic Approach to Extract the Final Answer in SBUQA Question Answering System
In this paper we introduce the semantic approach of the answer extraction component of a question answering system called SBUQA. The answer extraction component gets the retrieved...
Mehrnoush Shamsfard, Mahsa Arab Yarmohammadi
JDCTA
2010
139views more  JDCTA 2010»
8 years 5 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
JDCTA
2010
171views more  JDCTA 2010»
8 years 5 months ago
A Complex XML Schema to Map the XML Documents of Distance Education Technical Specifications into Relational Database
To manage the complicated data such as recursive elements, multiply namespaces, repeatable structures, extended elements and attributes in the XML Binding documents of distance ed...
Xin-hua Zhu, Qing-ling Zeng, Qing-hua Cao
JDCTA
2010
125views more  JDCTA 2010»
8 years 5 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
books