Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
About the Journal
Submit Article
HOME
Current
Archives
Author Guidelines
Aim and Scope
Publication Fee
Open Access and Publication Ethics
Reviewers Guidelines
Editorial Board
About IJIEE
Contact US
Subscription
FAQS
News
Search
Register
Login
Home
/
Archives
/
Vol. 2 No. 5 (2012): Volume 2 issue 5 (2012)
Vol. 2 No. 5 (2012): Volume 2 issue 5 (2012)
Published:
02.09.2012
Articles
Incremental Convex Hull as an Orientation to Solving the Shortest Path Problem
Phan Thanh An and Tran Van Hoai (Author)
652-655
pdf
Enhanced Patricia Tree with Reordering and Fast Incremental and Decremental Update Functions
Shin-ichi Ishida, Koji Ikehara, and Hiroaki Nishi (Author)
656-660
pdf
Interaction Model for Emotive Video Production
Hiroko Mitarai and Atsuo Yoshitaka (Author)
661-666
pdf
Generalized Backstepping Method Based Control Chen Chaotic System Using Adaptive Neuro-Fuzzy Inference System
A. R. Sahab and M. Taleb Ziabari (Author)
667-671
pdf
Effective Hash-Based Filtering Architecture for High-throughput Regular-Expression Matching
Hayato Yamaki, Yasutsugu Nagatomi, and Hiroaki Nishi (Author)
672-677
pdf
Performance Comparison between Round Robin and Proportional Fair Scheduling Methods for LTE
Mohammad T. Kawser, Hasib M. A. B. Farid, Abduhu R. Hasin, Adil M. J. Sadik, and Ibrahim K. Razu (Author)
678-681
pdf
Occupational Stress Level among Information Technology Professionals in Iran
Alireza Bolhari, Ali Rezaeian, Jafar Bolhari, and Sona Bairamzadeh (Author)
682-685
pdf
Method for Classification of Images in the Medical Field: The Nose Case
Mehdi Louizi and Mohamed Mohsen Gammoudi (Author)
686-690
pdf
Presenting Reusable Service Models in Model-Driven Service Engineering
Selo Sulistyo (Author)
691-696
pdf
Efficient and Semantic OLAP Aggregation Queries in a Peer to Peer Network
Yang Kehua and Agnes Manirakiza (Author)
697-701
pdf
Research Issues in Wireless Sensor Network Applications: A Survey
Edwin Prem Kumar Gilbert, Baskaran Kaliaperumal, and Elijah Blessing Rajsingh (Author)
702-706
pdf
Limiting HARQ Retransmissions in Downlink for Poor Radio Link in LTE
Mohammad T. Kawser, Nafiz Imtiaz Bin Hamid, Md. Nayeemul Hasan, M. Shah Alam, and M. Musfiqur Rahman (Author)
707-709
pdf
Reliability Modeling of Context Aware Wireless Sensor Network
Latha Venkatesan , Chandrasekaran Subramaniam, and Shanmugavel S. (Author)
710-715
pdf
Maputo Bay Wireless Network Cost Analysis
Henriques M. Marcelino and Hua-Shen Zeng, Member, IACSIT (Author)
716-719
pdf
Business Model Framework for Knowledge Intensive Organizations
Nastaran Hajiheydari, Reyhaneh Dehghan Dehnavi, and Leili Habibi (Author)
720-724
pdf
A Success Model for Business Process Management Implementation
A. Zeinab Dabaghkashani, B. Nastsran Hajiheydari, and C. Manijeh Haghighinasab (Author)
725-729
pdf
An Empirical and Architectural Study of Using an SSD-Aware Hybrid Storage System to Improve the Performance of the Data Intensive Applications
A. Aldahlawi, E. El-Araby, S. Suboh, and T. El-Ghazawi (Author)
730-740
pdf
Detection of a Specific Musical Instrument Note Playing in Polyphonic Mixtures by Extreme Learning Machine and Particle Swarm Optimization
Pat Taweewat (Author)
741-747
pdf
Voltage Control of PEMFC Using A New Controller Based on Reinforcement Learning
M. Karimi, M. Imanzadeh, P. Farhadi, and N. Ghadimi (Author)
752- 756
pdf
Downlink SNR to CQI Mapping for Different Multiple Antenna Techniques in LTE
Mohammad T. Kawser, Nafiz Imtiaz Bin Hamid, Md. Nayeemul Hasan, M. Shah Alam, and M. Musfiqur Rahman (Author)
757-760
pdf
Determining the Integrated Marketing Communication Tools for Different Stages of Customer Relationship in Digital Era
Amir Ekhlassi, Vahid Maghsoodi, and Shiva Mehrmanesh (Author)
762-765
pdf
Design Considerations for Optimizing Real-Time Control and Communication for the Kiira Electric Vehicle
Gerald Baguma, Sandy Stevens Tickodri-Togboa, Paul Isaac Musasizi, Nancy Senabulya, and Pauline Korukundo (Author)
766-768
pdf
Daily Discharge Forecasting Using Support Vector Machine
Mahdi Moharrampour, Abdulhamid Mehrabi, and Mahya Katouzi (Author)
769-772
pdf
Robust Control of Inverted Pendulum Using Fuzzy Sliding Mode Control and Genetic Algorithm
Mohamad Reza Dastranj, Mahbubeh Moghaddas, Younes Ghezi, and Modjtaba Rouhani (Author)
773-776
pdf
Surveying Learners’ Attitudes Toward a Saudi E-learning System
J. Zouhair (Author)
777-779
pdf
Genetic-Based Approach for Efficient RFID Reader Antenna Positioning
Nazish Irfan, Mustapha C. E. Yagoub, and Khelifa Hettak (Author)
780-784
pdf
Determination of the Initialization Number of Clusters in K-means Clustering Application Using Co-Occurrence Statistics Techniques for Multispectral Satellite Imagery
Kitti Koonsanit, Chuleerat Jaruskulchai, and Apisit Eiumnoh (Author)
785-789
pdf
A Novel Multi-Client Authentication Method Using Infection of Bacteria
Rezvan Dastanian, Arash Karimi, and Hadi Shahriar Shahhoseini (Author)
790-794
pdf
Optimal Control with Fuzzy State Space Modeling Using Riccati Equation
Venkata Ramu G., Padmanabhan K., and Ananthi S. (Author)
800-805
pdf
Applying Data Analytics to Development of the Web Based Information Security Career Systems
Ming Wang, Hong Liu, and Drew Hwang (Author)
806-809
pdf
On the Feasibility of Key Compromise Impersonation Attacks Against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol
Maurizio Adriano Strangio (Author)
810-812
PDF
Research Outline on Reconfigurable Manufacturing System Production Scheduling Employing Fuzzy Logic
Taravatsadat Nehzati, Napsiah Ismail, Faieza Abdul Aziz, and Seyed Ali Hosseini (Author)
813-816
PDF
Implementation Issues for Developing Credit Card Software for Mobile Phones
Sukhwant Kaur, Mritunjay Ojha, and Anand Pardeshi (Author)
817-820
PDF
Implementation of Multiplayer Bluetooth Memory Game for Mobile Phones
Sukhwant Kaur, Mritunjay Ojha, and Anand Pardeshi, (Author)
821-824
PDF
Design and Simulation of Miniaturized Multiband Fractal Antennas for Microwave Applications
S. Suganthi,D. Kumar, and S. Raghavan (Author)
825-830
PDF
Secure Session Key Generation Technique for Group Communication
Anurag Singh Tomar, Jaidhar C. D., and S. Tapaswi (Author)
831-834
PDF
The Best Performance Practices in Project Management of SAP ERP Accomplishment
Durga Prasad Sharma, Arvind Kumar Sharma, and Narpat Singh Shekhawat (Author)
835-839
PDF
Secure Multilevel Cryptography Using Graceful Codes
Usha Devi G. and R. S. D. Wahida Banu (Author)
840-843
PDF
Latest publications
Information
For Readers
For Authors
For Librarians
Make a Submission
Make a Submission
Sidebar
What's New
Jun 01, 2020 News!
Papers published in Vol.10, No.2 have all received dois from Crossref.
May 15, 2020 News!
Papers published in Vol.9, No.1-Vol.10, No.1 have all received dois from Crossref.
May 15, 2020 News!
IJIEE Vol. 10, No. 2 issue has been published online!
[Click]