Journal of Computational Intelligence and Electronic Systems
Volume 2, Number 2 (December 2013) pp. 89-190

RESEARCH ARTICLES
Simulation Based Comparative Analysis of Reactive and Proactive Ad Hoc Routing Protocols Under
Cooperative Black Hole Attacks

Sunil Kumar, Kamlesh Dutta, and Diksha Kathuria
J. Comput. Intell. Electron. Syst. 2, 89-97 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Proposing a Method for Evaluating Text Summarization Systems
Raziyeh Tabatabaei, Saeid Masoumi, and Mohammad-Reza Feizi-Derakhshi
J. Comput. Intell. Electron. Syst. 2, 98-102 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Proposing an Extractive Mono-Document Summarization System for Persian Language
Saeid Masoumi, Raziyeh Tabatabaei, and Mohammad-Reza Feizi-Derakhshi
J. Comput. Intell. Electron. Syst. 2, 103-110 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Demosaicing and Sharpening of Color Filter Captured Images Using Adaptive Transformation
D. Anitha and S. Ramya
J. Comput. Intell. Electron. Syst. 2, 111-115 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Electronic, Structural and Magnetic Properties of Light Transition-Metal Doped Wurtzite Cadmium Sulfide
Azeem Nabi, Waqas Akram, Abdul Majid, and Ghulam Nabi
J. Comput. Intell. Electron. Syst. 2, 116-121 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

A New Operational Effectiveness Evaluation Methodology for Ship-to-Air Missile Weapon System
Dou Jihua, Yu Jiaxiang, and Wu Shuo
J. Comput. Intell. Electron. Syst. 2, 122-127 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Software Debugging by Developing and Comparing Very Close Successful Inputs with Failure Inducing
Unsuccessful Inputs

Saeed Parsa, Parvaneh Pour Mohammad, and Fatemeh Dashti
J. Comput. Intell. Electron. Syst. 2, 128-131 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Image Restoration Using Dynamic Wavelet Thresholding and Artificial Neural Network
Poonam Baruah and Kandarpa Kumar Sarma
J. Comput. Intell. Electron. Syst. 2, 132-140 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Adaptive Neuro-Fuzzy Inference System Based Fingerprint and Retina Recognition
Tripti Rani Borah, Kandarpa Kumar Sarma, and Pran Hari Talukdar
J. Comput. Intell. Electron. Syst. 2, 141-147 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Increasing of Compactness of p-i-n-Diodes by Using Inhomogeneity of a Multilayer Structure
E. L. Pankratov and E. A. Bulaeva
J. Comput. Intell. Electron. Syst. 2, 148-155 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Target Allocation Study for Formation Ship-To-Air Missile System Based on the Missile Fire Zone
Jihua Dou, Shouquan Dong, and Jiaxiang Yu
J. Comput. Intell. Electron. Syst. 2, 156-160 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

An Approach to Model Electrical Properties in a Diffusion-Junction and Implanted-Junction Rectifiers in
Heterostructure with Porous Layers

E. L. Pankratov and E. A. Bulaeva
J. Comput. Intell. Electron. Syst. 2, 161-183 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Table of Contents to Volume 2, Numbers 1-2, 2013
J. Comput. Intell. Electron. Syst. 2, 185-186 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Author Index to Volume 2, Numbers 1-2, 2013
J. Comput. Intell. Electron. Syst. 2, 187-188 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Subject Index to Volume 2, Numbers 1-2, 2013
J. Comput. Intell. Electron. Syst. 2, 189-190 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]


Volume 2, Number 1 (June 2013) pp. 1-87

RESEARCH ARTICLES
Congestion Detection, Prevention and Avoidance Strategies for an Intelligent, Energy and Spectrum Efficient
Green Mobile Network

Anwesha Mukherjee and Debashis De
J. Comput. Intell. Electron. Syst. 2, 1-19 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

An Integrated Method for Location Registration of Mobile Terminals Based on Time, Distance and Zone
Debashis De
J. Comput. Intell. Electron. Syst. 2, 20-28 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Role of Algorithm Engineering in Data Fusion Algorithms
S. A. Quadri and Othman Sidek
J. Comput. Intell. Electron. Syst. 2, 29-35 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

A New Visualization Approach to Better Understanding the World Wide Web
Zhiming Chen and András Faragó
J. Comput. Intell. Electron. Syst. 2, 36-44 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

MFZLP: Multihop Far Zone Leach Protocol for WSNs
Virender Ranga, Mayank Dave, and Anil Kumar Verma
J. Comput. Intell. Electron. Syst. 2, 45-49 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Ethanol Production from Pretreated Diluted Acid Recycled Paper Sludge Using SHF and SSF
N. Khunsuwan and J. Kongkiattikajorn
J. Comput. Intell. Electron. Syst. 2, 50-54 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

A New Parallel Algorithm for Frequent Pattern Mining
Saeid Masoumi, Raziyeh Tabatabaei, Mohammad-Reza Feizi-Derakhshi, and Khatereh Tabatabaei
J. Comput. Intell. Electron. Syst. 2, 55-59 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Effect of Changing Membership Functions in the Operation of Fuzzy Based Unified Power Flow Controller in a
Power System Network

P. Manju and V. Subbiah
J. Comput. Intell. Electron. Syst. 2, 60-65 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

Fire Transfer Opportunity Decision Study for Anti-Aircraft Missile System
Jihua Dou
J. Comput. Intell. Electron. Syst. 2, 66-70 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

A Preconditioner for the FETI-DP Method for Mortar-Type Bicubic Element Discretization of a Plate Problem
Chunmei Wang
J. Comput. Intell. Electron. Syst. 2, 71-79 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]

The Human-Inspired Algorithm: A Hybrid Nature-Inspired Approach to Optimizing Continuous Functions with
Constraints

Luna Mingyi Zhang and Yanqing Zhang
J. Comput. Intell. Electron. Syst. 2, 80-87 (2013)
[Abstract] [Full Text - PDF] [Purchase Article]



Terms and Conditions  Privacy Policy  Copyright © 2000- American Scientific Publishers. All Rights Reserved.