Volume 4, Number 1, January 2011
: Experience in Developing a Robot Control Software.
, Gang Lv
: Tracking Formant Trajectory of Tracheoesophageal Speech Using Hidden Dynamic Model.
: A Hopfield Neural Network for Channel Assignment Problem in Cellular Radio Networks.
: Research on Image Acquisition System Based on Binocular Stereo Vision.
, Ning Zhang
: One Improved Collaborative Filtering Method Based on Information Transformation.
: Studies of the HMIS Based on HL7 Criterions.
Volume 4, Number 2, March 2011
: Necessities and Tactics of Tool-Based Software Testing.
, Fang Wu
, Xuying Lu
: Study on the Optimization Design of the Subject Indexing Based on the Word-frequency Statistics.
: Improved RPPI Strategy for Software Reliability Analysis Basing on Multi-objective Optimizing Method.
Volume 4, Number 3, June 2011
, Zhenyan Wang
: A Genetic K-means Clustering Algorithm Based on the Optimized Initial Centers.
: Capturing Software Requirements of Business Processes in Multinational Firms: A Conceptual Framework for Practitioners.
, Zhong Xie
: WebGIS to Managing Natural Resource: Case of Flooded Pasture in Lake Débo and Walado Débo.
: Study on the Wireless Ad Hoc Network Secure Routing Based on the SAR Technology.
Volume 4, Number 4, July 2011
: A New Model for Automatic Sentence Segmentation.
Adnan H. Ali
: Simultaneous Measurements for Tunable Laser Source Linewidth with Homodyne Detection.
: Analysis on the Method and Importance of Practical Teaching in Vocational College.
Volume 4, Number 5, September 2011
: Medical Data Mining Based on Decision Tree Algorithm.
, Wei Qian
, Jian Liao
: Intelligent Control System of CNC Mill Machineing Based on the Feed-Driven Linear Motor.
: Design of Time Division MUX and DEMUX for Large Optical Transceiver.
Volume 4, Number 6, November 2011
Muna F. Al-sammaraie
: Medical Images Compression Using Modified SPIHT Algorithm and Multiwavelets Transformation.
, Ying Li
: Cascade-Correlation Algorithm with Trainable Activation Functions.
, Hao Zou
, Yujuan Li
: Research and Application of Contingency Plan Based on Hospital Network and Information System Security.