全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Rachit Mohan Garg , Shipra Kapoor , Kapil Kumar ...
来源:[J].Universal Journal of Computer Science and Engineering Technology, 2010, Vol.1 (1), pp.1DOAJ
摘要:Now-a-days internet has become a vast source of entertainment & new services are available in quick succession which provides entertainment to the users. One of this service i.e. Video-on-Demand is most hyped service in this context. Transferring the video over the network with l...
作者:H.B.Kekre , Dhirendra Mishra
来源:[J].Universal Journal of Computer Science and Engineering Technology, 2010, Vol.1 (1), pp.6DOAJ
摘要:We have introduced a novel idea of sectorization of DST transformed components. In this paper we have proposed two different approaches along with augmentation of mean of zero and highest row components of row transformed values in row wise DST transformed image and mean of zero-...
作者:R.Amirtharajan , Sandeep Kumar Behera , Motamarri Abhilash Swarup ...
来源:[J].Universal Journal of Computer Science and Engineering Technology, 2010, Vol.1 (1), pp.16DOAJ
摘要:Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and are quite difficult to achieve in a single algorithm. This paper proposes a novel steganography tec...
作者:Waiel F. Abd El-Wahed , Elsayed M. Zaki , Adel M. El-Refaey
来源:[J].Universal Journal of Computer Science and Engineering Technology, 2010, Vol.1 (1), pp.24DOAJ
摘要:During the last decade, the field of Artificial Immune System (AIS) is progressing slowly and steadily as a branch of Computational Intelligence (CI).There has been increasing interest in the development of computational models inspired by several immunological principles. Althou...
作者:Hassen Hamdi , Maher Khemakhem
来源:[J].Universal Journal of Computer Science and Engineering Technology, 2010, Vol.1 (1), pp.31DOAJ
摘要:Character recognition is one of the oldest fields of research. It is the art of automating both the process of reading and keyboard input of text in documents. A major part of information in documents is in the form of alphanumeric text. Significant movement has been made in...
作者:Ahmad O. Algohary , Ahmed M. El-Bialy , Ahmed H. Kandil ...
来源:[J].Universal Journal of Computer Science and Engineering Technology, 2010, Vol.1 (1), pp.36DOAJ
摘要:Composite Strain Encoding (C-SENC) is an Magnetic Resonance Imaging (MRI) technique for acquiring simultaneous viability and functional and images of the heart. It combines two imaging techniques, Delayed Enhancement (DE) and Strain Encoding (SENC). In this work, a novel mul...
作者:Izzat Alsmadi , Samer Samarah , ,Ahmad Saifan ...
来源:[J].Universal Journal of Computer Science and Engineering Technology, 2010, Vol.1 (1), pp.41DOAJ
摘要:Software testing covers a large percent of the software development expenses. However, formal methods are applied, usually, to improve or ensure the correctness of the requirements, design, code, or testing. In order to utilize formal methods particularized to different cases, th...
作者:Atif Aftab Ahmed Jilani , Muhammad Usman , Zahid Halim
来源:[J].Universal Journal of Computer Science and Engineering Technology, 2010, Vol.1 (1), pp.50DOAJ
摘要:Transformation is one of the prominent features and the rising research area of Model Driven Architecture since last few years. There are many techniques which have been proposed as a Request for Proposal (RFP) in Query, View and Transformation (QVT). In this paper we have conduc...
作者:Hesham A. Hefny , Ahmed S. Ghiduk , Ashraf Abdel Wahab ...
来源:[J].Universal Journal of Computer Science and Engineering Technology, 2010, Vol.1 (1), pp.55DOAJ
摘要:Crisp Decision trees (CDT) algorithms have been the most widely employed methodologies for symbolic knowledge acquisition. There are many methodologies have been presented to address the problems of the continuous data, multi-valued data, missing data, uncertainty data and noisy ...
作者:Ahmed S. Ghiduk
来源:[J].Universal Journal of Computer Science and Engineering Technology, 2010, Vol.1 (1), pp.62DOAJ
摘要:Search-based optimization techniques (e.g., hill climbing, simulated annealing, and genetic algorithms) have been applied to a wide variety of software engineering activities including cost estimation, next release problem, and test generation. Several search based test generatio...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×