Open access peer-reviewed Edited Volume
The chapters of this book are collected mainly from the best selected papers that have been published in the 4th International conference on Information Technology ICIT 2009, that has been held in Al-Zaytoonah University, Jordan in the period 3-5/6/2009. The other chapters have been collected as related works to the topics of the book.
Order hardcopy42583 Total Chapter Downloads
49 Crossref Citations
27 Web of Science Citations
58 Dimensions Citations
chapters | Downloads | |
---|---|---|
Open access peer-reviewed 1. Services Net Modeling for Dependability AnalysisBy Wojciech Zamojski and Tomasz Walkowiak | 1699 | |
Open access peer-reviewed 2. Service Based Information Systems Analysis Using Task-Level SimulatorBy Tomasz Walkowiak | 1513 | |
Open access peer-reviewed 3. Modelling Equipment Deterioration vs. Maintenance Policy in Dependability AnalysisBy Jaroslaw Sugier and George J. Anders | 2377 | |
Open access peer-reviewed 4. Computational Experience in Methods for Finding Tight Lower Bounds for the Sparse Travelling Salesman ProblemBy Fredrick Mtenzi | 1842 | |
Open access peer-reviewed 5. Modelling Access Control with Dynamic Role BindingBy Al-Dahoud Ali and K.Chitra | 1609 | |
Open access peer-reviewed 6. On the Accuracy of a Stewart Platform: Modelling and Experimental ValidationBy Mircea Neagoe, Dorin Diaconescu, Codruta Jaliu, Sergiu-Dan Stan, Nadia Cretescu and Radu Saulescu | 1797 | |
Open access peer-reviewed 7. Effective Knowledge Acquisition by Means of Teaching StrategiesBy Marek Woda | 2067 | |
Open access peer-reviewed 8. Measuring Customer Service Satisfactions Using Fuzzy Artificial Neural Network with Two-phase Genetic AlgorithmBy M. Reza Mashinchi and Ali Selamat | 2388 | |
Open access peer-reviewed 9. A Variation of Particle Swarm Optimization for Training of Artificial Neural NetworksBy Masood Zamani and Alireza Sadeghian | 1924 | |
Open access peer-reviewed 10. Resilient Back Propagation Algorithm for Breast Biopsy Classification Based on Artificial Neural NetworksBy Fawzi M. Al-Naima and Ali H. Al-Timemy | 3014 | |
Open access peer-reviewed 11. SIMD Architecture Approach to Artificial Neural Networks RealisationBy Jacek Mazurkiewicz | 1548 | |
Open access peer-reviewed 12. Smart RFID Security, Privacy and AuthenticationBy Mouza A. Bani Shemaili, Chan Yeob Yeun and Mohamed Jamal Zemerly | 2883 | |
Open access peer-reviewed 13. Security and Privacy of Intelligent VANETsBy Mahmoud Al-Qutayri, Chan Yeun and Faisal Al-Hawi | 4072 | |
Open access peer-reviewed 14. New Classification of Existing Stream CiphersBy Khaled Suwais and Azman Samsudin | 2525 | |
Open access peer-reviewed 15. Smart Web Based Programming Contests Management ToolBy Ahmed Bentiba, Mohamed J. Zemerly and Mohamed Al Mansoori | 2480 | |
Open access peer-reviewed 16. Intelligent Exploitation of Cooperative Client-Proxy Caches in a Web Caching Hybrid ArchitectureBy Maha Saleh El Oneis, Mohamed Jamal Zemerly and Hassan Barada | 1800 | |
Open access peer-reviewed 17. Heuristics of Social Process DesignBy Gilbert Ahamer | 1781 | |
Open access peer-reviewed 18. Heuristics and Pattern Recognition in Complex Geo-Referenced SystemsBy Gilbert Ahamer, Adrijana Car, Robert Marschallinger, Gudrun Wallentin and Fritz Zobl | 1976 | |
Open access peer-reviewed 19. Complexity of Instances for Combinatorial Optimization ProblemsBy Jorge A. Ruiz-Vanoye, Ocotlan Diaz-Parra, Joaquin Perez-Ortega, Rodolfo A. Pazos R., Gerardo Reyes Salgado and Juan Javier Gonzalez-Barbosa | 1877 | |
Open access peer-reviewed 20. Dependability Evaluation Based on System MonitoringBy Janusz Sosnowski and Marcin Krol | 1430 |
All IntechOpen contributors are offered special discounts starting at 40% OFF available through your personal dashboard
Login and purchase