include "upside5.php";
?>
Volume Number : Vol.1, No.2
![]() |
Published Publication Date : 2012/11 Volume Number : Vol.1, No.2 Issues : Information Science, Internet Technology, Information Management, and Communication Security ISSN 2304-2516 Key title:International Journal of computer, consumer, and control (Print) Abbreviated key title: Int. j. comput. consum. control (Print) ISSN 2304-2524 Key title:International Journal of computer, consumer, and control (Online) Abbreviated key title: Int. j. comput. consum. control (Online) |

Facile Photoelectrode Architecture of Porous Anodic Alumina for Dye-sensitized Solar Cells | ||
Chia-Tien Wu, Chia-ChihHo, and Fu-Hsiang Ko | ||
![]() |
Image FusionUsing Improved Threshold Logic Method | ||
Mei Wang, Guo-Qing Meng, and Xiao-Wei Wu | ||
![]() |
A PSO-based Algorithm with Subswarm Using Entropy and Uniformity for Image Segmentation | ||
Jzau-Sheng Lin and Shou-Hung Wu | ||
![]() |
Data Deduplication Scheme for Cloud Storage | ||
Iuon-Chang Lin and Po-Ching Chien | ||
![]() |
Lightweight RFID Authentication Protocol without Asynchronous Flaw | ||
Shyh-Chang Tsaur, Hui-Yu Chen and Ju-Pei Pai | ||
![]() |
An Object Color Transformation Scheme using Regression Analysis | ||
Pei-Chung Chung, Kai-Wen Chuang, Chen-Chung Liu, Chun-Yuan Yu and Cheng-Chih Huang | ||
![]() |
Shadow Removal Scheme of the Traffic Scenes Using Illumination Analysis and Outer-Region Deleted Strategy | ||
Wen-Yuan Chen | ||
![]() |
Image Tamper Detection Scheme Using QR Code and DCT Transform Techniques | ||
Ji-Hong Chen and Chin-Hsing Chen | ||
![]() |