Vol 2, No 3 (2009)

Computer and Information Science, Vol. 2, No. 3, August 2009

Table of Contents


Computer and Information Science, Vol. 2, No. 3, August 2009, all in one file, Part A PDF
CIS Editor p0a
Computer and Information, Vol. 2, No. 3, August 2009, all in one file, Part B PDF
CIS Editor p0b
A Hybrid Resource Allocation Strategy with Queuing in Wireless Mobile Communication Networks PDF
K. Venkatachalam, P. Balasubramanie p3
Machine Learning Emulation in Nature-inspired Computation Systems PDF
Jianhao Tan, Jing Zhang, Fu Guo p15
Fuzzy Evaluation of Weapons System PDF
Mahmod Othman, Shaiful Annuar Khalid, Mohammad Ismail, Norshimah Abdul Rahman, Mohamad Fadhili Yahaya p24
Formulas of Retrieval Rate in Database Based on Normalization Design PDF
Bin Yan p32
Effectiveness of Corporate Intranet in Selected Malaysian Companies PDF
Mohamad Noorman Masrek, Kamaruzaman Jusoff, Nor Shariza Abdul Karim, Ramlah Hussein p40
Analysis of Network Security and Risks Prevention Strategies of Hongqiao Airport West Terminal PDF
Chongjun Fan, Honglin Xiong, Haiying Zhang, Wujun Liu, Liqiang Wang, Xiaohui Song p46
Paper Prototyping as a Rapid Participatory Design Technique PDF
Aznoora Osman, Hanif Baharin, Mohammad Hafiz Ismail, Kamaruzaman Jusoff p53
The Design and Implementation of the Distributed Computing Platform for Bioinformatics PDF
Juan Huang, Yaoping Fei p58
Positive Affects Inducer on Software Quality PDF
Sharifah Lailee Syed-Abdullah, Mazni Omar, Mohd Nasir Abdul Hamid, Che Latifah bt Ismail, Kamaruzaman Jusoff p64
Text Emotion Computing under Cognition Vision PDF
Jingzhong Wang, Lu Zhang p71
Back Propagation Wavelet Neural Network Based Prediction of Drill Wear from Thrust Force PDF
Xu Yang, Hiroyuki. Kumehara, Wei Zhang p75
Study on the NN Decoupling Control System of Air-cushioned Headbox PDF
Zhongjun Xiao, Mengxiao Wang p87
Security and Management of Local Computer Data PDF
Ruicheng Li p94
Leveraging an Open Source VPN Technology to End User PDF
Farok Azmat, Md Ikhwan Hamdan, Hj. Kamaruzaman Jusoff p97
Study on the TOPN Abnormal Detection Based on the NetFlow Data Set PDF
Hongzhuo Zhang p103
Study on the Design Principles of Data Disaster Recovery System for Hospitals PDF
Ping Xiao p109
Pattern Extraction and Rule Generation of Forest Fire using Sliding Window Technique PDF
Ku Ruhana Ku-Mahamud, Jia Yun Khor p113
Study on the Fault Diagnosis Technique of Aerial Camera Exposure Board Based on Petri Net PDF
Chengjun Tian, Zhiyong An, Lijuan Li, Chengyu Yang, Jie Duan, Kang Wang p122
Estimation of Saturation Percentage of Soil Using Multiple Regression, ANN, and ANFIS Techniques PDF
Khaled Ahmad Aali, Masoud Parsinejad, Bizhan Rahmani p127
An Optimised Method-Based an Improved Neural Network Classifier PDF
Mengxin Li, Chengdong Wu, Hui Lin p137
Relative Truth Degree of Logic Formulas and Graded Fuzzy Logic PDF
Li Fu p143
Study on the UWB Rader Synchronization Technology PDF
Guilin Lu, Shaohong Wan, Kaiqing Xu p149
A Species-Coexistence Model Defending against Credit Cheating in E-Commerce PDF
Zheng Li p154
Study on the Multiple-Key-Pair Generation Scheme Based on Grey Half-generation PDF
Peng Li, Yulian Shang, Jifeng Wang, Yufei Zhang p161
Knowledge Management and Usability Model for Knowledge Management System PDF
Nafaizatulnaniah Hashim, Abu Bakar Md Sultan p166
The Design of RS232 and CAN Protocol Converter Based on PIC MCU PDF
Xianjun Wang, Wencheng Guo p176
Development of Individual Learners: Perspective on the Uncertain Future Contribution of E-Learning PDF
Zaki Ahmad Dahlan, Nor Arzami Othman, Mohd Fazril Izhar Mohd Idris, Hj. Kamaruzaman Jusoff p182

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

Computer and Information Science   ISSN 1913-8989 (Print)   ISSN 1913-8997 (Online)
Copyright © Canadian Center of Science and Education

To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.