Sciweavers

JCIT
2008
127views more  JCIT 2008»
13 years 11 months ago
Image Segmentation Method Using Hybrid Region Flow
This paper suggests an efficient image segmentation algorithm in 3 steps for grayscale images. First step is the segmentation as homogenous region on image. And, second step is me...
Jae Hyup Kim, Kyung Hyun Jang, Young Shik Moon
JCIT
2008
104views more  JCIT 2008»
13 years 11 months ago
Research and Design on Personalized Learning System Based on Mobile Agent
In view of students' individual difference in the learning process, in this paper we propose a personalized learning system, to which intelligent Agent technique and case-bas...
Yang He-biao, Chen Yu-kun, Wang Jue, Liu Zhi-hong
JCIT
2008
124views more  JCIT 2008»
13 years 11 months ago
A Knowledge based Approach Using Fuzzy Inference Rules for Vowel Recognition
Automatic speech recognition by machine is one of the most efficient methods for man-machine communications. Because speech waveform is nonlinear and variant. Speech recognition r...
Hrudaya K. Tripathy, B. K. Tripathy, Pradip K. Das
JCIT
2008
154views more  JCIT 2008»
13 years 11 months ago
A Multi-Agent Framework for Testing 3-Tier Distributed Systems Architecture
Lack of time and capital for software testing is an oft encountered problem in most organizations. The plethora of possible test cases for each software component makes software t...
Sunitha Ramanujam, Hany F. El Yamany, Miriam A. M....
JCIT
2008
100views more  JCIT 2008»
13 years 11 months ago
Basic Portal System with the Function of Communication Control for Each User
The Personal Portal is generally used as a communication mean and serves as an entrance to users where they can acquire interested information on the network. We have several prob...
Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi...
JCIT
2008
138views more  JCIT 2008»
13 years 11 months ago
Enhancing the Routing Performance of Wireless Sensor Networks using Connected Dominating Sets
Many prominent applications in wireless sensor networks require collected information has to be routed to end nodes in an efficient manner. In general, Connected Dominating Set (C...
B. Paramasivan, Mohaideen Pitchai, Radha Krishnan
JCIT
2008
103views more  JCIT 2008»
13 years 11 months ago
Implementation of Filter Reverse Search System based on Spatial Relationships of Filters
Firewall is a useful technique that ensures network security. Firewall examines network packets and determines whether to accept or deny them based on an ordered set of filters. I...
Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa T...
JCIT
2008
150views more  JCIT 2008»
13 years 11 months ago
Affective Space Calibration in Action-rich Media Affective Systems
Affective computing systems are software systems that take in account the emotional state of the user during their operation. Recently it is increasingly accepted that combining e...
Anestis A. Toptsis, Alexander Dubitski
JCIT
2008
102views more  JCIT 2008»
13 years 11 months ago
Architectural Patterns for Finding your
The paper discusses the innovative patterns such as subtraction, multiplication, division, task unification and attribute dependency change for evaluating the software architectur...
N. Sankar Ram, Paul Rodrigues
JCIT
2008
129views more  JCIT 2008»
13 years 11 months ago
An Enhanced tree based MAODV Protocol for MANETs using Genetic Algorithm
Multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and m...
E. Baburaj, V. Vasudevan