<?xml version="1.0" encoding="utf-8"?>
<!--  RSS generated by phpcms.cn RSS Builder [2026-04-29 11:31:31]  --> 
<rss version="2.0" xmlns:im="http://purl.org/rss/1.0/item-images/" xmlns:dc="http://purl.org/dc/elements/1.1/" >
<channel>
<pubDate>Wed, 29 Apr 2026 11:31:31 +0800</pubDate>
<lastBuildDate>Wed, 29 Apr 2026 11:31:31 +0800</lastBuildDate>
<docs>http://www.lnit.org</docs>
<link>http://www.lnit.org</link>
<title>Volume 2, No. 2, June 2014</title>
<image>
<title>Volume 2, No. 2, June 2014</title>
<url><![CDATA[http://www.lnit.org/uploadfile/2014/0902/20140902110029426.pdf]]></url>
<link>http://www.lnit.org</link>
</image>
<webMaster>http://www.lnit.org</webMaster>
<generator>http://www.lnit.org</generator>
<ttl>60</ttl>
<dc:creator>http://www.lnit.org</dc:creator>
<dc:date>Wed, 29 Apr 2026 11:31:31 +0800</dc:date>
<item>
<title><![CDATA[Hierarchy Construction of Mathematical Knowledge]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=90]]></link>
<description><![CDATA[Abstract&mdash;Visualization with a hierarchy of mathematical knowledge structure, assist learners in understanding mathema   ]]></description>
<pubDate>2014-09-02 13:15:03</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=90]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Challenging of Path Planning Algorithms for Autonomous Robot in Unknown Environment]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=89]]></link>
<description><![CDATA[Abstract&mdash;When we do not have information of the environment, we called it unknown path planning  This paper show   ]]></description>
<pubDate>2014-09-02 13:09:43</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=89]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Enhanced Bilingual Evaluation Understudy]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=88]]></link>
<description><![CDATA[Abstract&mdash;Our research extends the Bilingual Evaluation Understudy (BLEU) evaluation technique for statistical machine   ]]></description>
<pubDate>2014-09-02 13:02:28</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=88]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Prediction of Accident by Using Decision Tree and Display Accident Information]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=87]]></link>
<description><![CDATA[Abstract&mdash;Recently, product accidents have been occurring frequently  We developed a system that predicts injury tha   ]]></description>
<pubDate>2014-09-02 12:00:57</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=87]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Enriching Vague Queries by Type-2 Fuzzy Orderings]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=86]]></link>
<description><![CDATA[Abstract&mdash;Structural Query Language (SQL) is very restrictive and very dominant tool that handles data that is cri   ]]></description>
<pubDate>2014-09-02 11:57:18</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=86]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Fibonacci Based Text Hiding Using Image Cryptography]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=85]]></link>
<description><![CDATA[Abstract&mdash;In digital word security is a most important issue and data hiding with image cryptography is one of t   ]]></description>
<pubDate>2014-09-02 11:54:23</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=85]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Approach of Message Communication Using Fibonacci Series: In Cryptology]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=84]]></link>
<description><![CDATA[Abstract&mdash;The objective of cryptography is to make it feasible for more than one person to do secure communicatio   ]]></description>
<pubDate>2014-09-02 11:49:24</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=84]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Aircraft Component Detection Based on 3D Object Recognition and Relative Position Estimation]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=83]]></link>
<description><![CDATA[Abstract&mdash;An aircraft component detection method based on 3D recognition and relative position estimation is propose   ]]></description>
<pubDate>2014-09-02 11:45:56</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=83]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Estimating Resource Distribution Using Satellite Images to Utilize Woody Biomass]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=82]]></link>
<description><![CDATA[Abstract&mdash;This study proposes estimating resource distribution using coarse and comprehensive satellite images in ord   ]]></description>
<pubDate>2014-09-02 11:42:14</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=82]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=81]]></link>
<description><![CDATA[Abstract&mdash;High security system suitable to hide sensitive text-data on personal computer is proposed and implemented   ]]></description>
<pubDate>2014-09-02 11:35:24</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=81]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Distribution Network Fault Location Based on Electromagnetism-Like Mechanism Combined with Genetic Algorithm]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=80]]></link>
<description><![CDATA[Abstract&mdash;This paper dealt with fault location for distribution networks based on Electromagnetism-like Mechanism Alg   ]]></description>
<pubDate>2014-09-02 11:31:27</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=80]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[System Performance of Adaptive Bandwidth Traffic Shaping Mechanism for Residential Safety System]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=79]]></link>
<description><![CDATA[Abstract&mdash;A study on system performance of an adaptive traffic shaping mechanism for residential safety system is    ]]></description>
<pubDate>2014-09-02 11:28:17</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=79]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Optimization of Location Aware Routing Protocol for Wireless Adhoc Tactical Networks]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=78]]></link>
<description><![CDATA[Abstract&mdash;Mobile Adhoc Network (MANET) is a wireless technique which does not require any pre-existing infrastructur   ]]></description>
<pubDate>2014-09-02 11:11:35</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=78]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Reduced Search Iterative Detection and Decoding: Issues and Solutions]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=77]]></link>
<description><![CDATA[Abstract&mdash;In this paper, we evaluate a number of reduced search detection methods for iterative detection and deco   ]]></description>
<pubDate>2014-09-02 11:07:09</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=77]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[An Efficient Handover Prediction & Initiation Algorithm for Vehicular Communication in 4G Wireless Networks]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=76]]></link>
<description><![CDATA[Abstract&mdash;The main motto behind the 4G wireless epoch is to provide a mobile ultra-broadband internet access with   ]]></description>
<pubDate>2014-09-02 11:00:08</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=36&id=76]]></guid>
<author>http://www.lnit.org</author>
</item>
</channel>
</rss>
