Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network

Author(s): Himadri Nath Saha | Dr. Debika Bhattacharyya | Dr. P. K.Banerjee
Volume: Special Issue
Issue: Wireless
Year: 2011





Performance Comparison of different hybrid amplifiers for different numbers of channels

Author(s): Sameksha Bhaskar | Ramandeep Kaur | M.L.Sharma
Volume: Special Issue
Issue: Wireless
Year: 2011





Scalable TCP: Better Throughput in TCP Congestion Control Algorithms on MANETs

Author(s): M.Jehan | Dr. G.Radhamani
Volume: Special Issue
Issue: Wireless
Year: 2011





Video Transmission over Cognitive Radio TDMA Networks under Collision Errors

Author(s): Abdelaali CHAOUB | Elhassane IBN ELHAJ | Jamal EL ABBADI
Volume: Special Issue
Issue: Wireless
Year: 2011





SIMULATION AND EVALUATION OF A SIMPLE ADAPTIVE ANTENNA ARRAY FOR A WCDMA MOBILE COMMUNICATION

Author(s): Idigo V.E | Ifeagwu E.N | Azubogu A.C.O | Akpado K.A | Oguejiofor O.S
Volume: Special Issue
Issue: Wireless
Year: 2011





32 x 10 and 64 × 10 Gb/s transmission using hybrid Raman-Erbium doped optical amplifiers

Author(s): Shveta Singh | Ramandeep Kaur | M.L.Sharma
Volume: Special Issue
Issue: Wireless
Year: 2011





Agent based Congestion Control Performance in Mobile ad-hoc Network:A Survey paper

Author(s): Vishnu Kumar Sharma | Dr. Sarita Singh Bhadauria
Volume: Special Issue
Issue: Wireless
Year: 2011





A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network

Author(s): Atul Patel | Ruchi Kansara | Dr. Paresh Virparia
Volume: Special Issue
Issue: Wireless
Year: 2011





RSS based Vertical Handoff algorithms for Heterogeneous wireless networks - A Review

Author(s): Abhijit Bijwe | Dr. C.G.Dethe
Volume: Special Issue
Issue: Wireless
Year: 2011





NIDS For Unsupervised Authentication Records of KDD Dataset in MATLAB

Author(s): Mis. Bhawana Pillai | Mr. Uday Pratap Singh
Volume: Special Issue
Issue: Wireless
Year: 2011





Big Brother: A Road Map for Building Ubiquitous Surveillance System in Nigeria

Author(s): Simon Enoch Yusuf | Oluwakayode Osagbemi
Volume: Special Issue
Issue: Wireless
Year: 2011





Efficient Traducer Tracing System Using Traffic Volume Information

Author(s): K.V.Ramana | Raghu.B.Korrapati | N. Praveen Kumar | D. Prakash
Volume: Special Issue
Issue: Wireless
Year: 2011





CONTROLLING HOME APPLIANCES REMOTELY THROUGH VOICE COMMAND

Author(s): Marriam Butt | Aihab Khan | Malik Sikandar Hayat Khiyal
Volume: Special Issue
Issue: Wireless
Year: 2011





Performance Comparison of SVM and K-NN for Oriya Character Recognition
Author(s): Sanghamitra Mohanty | Himadri Nandini Das Bebartta
Volume: Special
Issue: Image Proc.
Year: 2011




Automatic License Plate Localization Using Intrinsic Rules Saliency
Author(s): Chirag N. Paunwala | Dr. Suprava Patnaik
Volume: Special
Issue: Image Proc.
Year: 2011




SUCCESeR Simple and Useful Multi Color Concepts for Effective Search and Retrieval
Author(s): Satishkumar L. Varma | Sanjay N. Talbar
Volume: Special
Issue: Image Proc.
Year: 2011




Ear Recognition using Dual Tree Complex Wavelet Transform
Author(s): Rajesh M Bodade | Sanjay N Talbar
Volume: Special
Issue: Image Proc.
Year: 2011




Human Face Detection under Complex Lighting Conditions
Author(s): Md. Golam Moazzam | Ms. Rubayat Parveen | Md. Al-Amin Bhuiyan
Volume: Special
Issue: Image Proc.
Year: 2011




Automatic Image Registration Using Mexican Hat Wavelet, Invariant Moment, and Radon Transform
Author(s): Jignesh N Sarvaiya | Dr. Suprava Patnaik
Volume: Special
Issue: Image Proc.
Year: 2011




Component Localization in Face Alignment
Author(s): Yanyun Qu | Tianzhu Fang | Yanyun Cheng | Han Liu
Volume: Special
Issue: Image Proc.
Year: 2011




Recombinant Skeleton Using Junction Points in Skeleton Based Images
Author(s): Mrs. Komala Lakshmi | Dr.M.Punithavalli
Volume: Special
Issue: Image Proc.
Year: 2011




Clustering and Bayesian network for image of faces classification
Author(s): Khlifia Jayech | Mohamed Ali Mahjoub
Volume: Special
Issue: Image Proc.
Year: 2011




Modeling of neural image compression using GA and BP a comparative approach
Author(s): G.G Rajput | Vrinda Shivashetty | Manoj Kumar singh
Volume: Special
Issue: Image Proc.
Year: 2011




Image segmentation by adaptive distance based on EM algorithm
Author(s): Mohamed Ali Mahjoub | Karim Kalti
Volume: Special
Issue: Image Proc.
Year: 2011




A new optimization based image segmentation method by particle swarm optimization
Author(s): Fahd M. A. Mohsen | Mohiy M. Hadhoud | Khalid Amin
Volume: Special
Issue: Image Proc.
Year: 2011




Sketch Recognition using Domain Classification
Author(s): Vasudha Vashisht | Tanupriya Choudhury | Dr. T. V. Prasad
Volume: Special
Issue: Image Proc.
Year: 2011




ID Numbers Recognition by Local Similarity Voting
Author(s): Shen Lu | Yanyun Qu | Yanyun Cheng | Yi Xie
Volume: Special
Issue: Image Proc.
Year: 2011




Fine Facet Digital Wateramrk (FFDW) Mining From The Color Image Using Neural Networks
Author(s): N. Chenthalir Indra | Dr. E. Ramaraj
Volume: Special
Issue: Image Proc.
Year: 2011




Skew correction for Chinese character using Hough transform
Author(s): Tian Jipeng | G.Hemantha Kumar | H.K. Chethan
Volume: Special
Issue: Image Proc.
Year: 2011




Parts of Speech Tagging for Afaan Oromo

Author(s): Getachew Mamo Wegari | Million Meshesha
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Comparative Analysis of Various Approaches Used in Frequent Pattern Mining

Author(s): Deepak Garg | Hemant Sharma
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Clustering Student Data to Characterize Performance Patterns

Author(s): Bindiya M Varghese | Jose Tomy J | Unnikrishnan A | Poulose Jacob K
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Clustering Student Data to Characterize Performance Patterns

Author(s): Bindiya M Varghese | Jose Tomy J | Unnikrishnan A | Poulose Jacob K
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Efficient Cancer Classification using Fast Adaptive Neuro-Fuzzy Inference System (FANFIS) based on Statistical Techniques

Author(s): K.Ananda Kumar | Dr.M.Punithavalli
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Method for Extracting Product Information from TV Commercial

Author(s): Kohei Arai | Herman Tolle
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Mining Volunteered Geographic Information datasets with heterogeneous spatial reference

Author(s): Sadiq Hussain | Prof. G.C. Hazarika
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Instant Human Face Attributes Recognition System

Author(s): N.Bellustin | Y. Kalafati
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Face Recognition Using Bacteria Foraging Optimization-Based Selected Features

Author(s): Rasleen Jakhar | Navdeep Kaur | Ramandeep Singh
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





A Prototype Student Advising Expert System Supported with an Object-Oriented Database

Author(s): M. Ayman Al Ahmar
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





An Extended Performance Comparison of Colour to Grey and Back using the Haar, Walsh, and Kekre Wavelet Transforms

Author(s): Dr. H. B. Kekre | Dr. Sudeep D. Thepade | Adib Parkar
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





A Fuzzy Decision Tree to Estimate Development Effort for Web Applications

Author(s): Ali Idri | Sanaa Elyassami
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Multimodal Biometric Person Authentication using Speech, Signature and Handwriting Features

Author(s): Eshwarappa M.N. | Dr. Mrityunjaya V. Latte
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





A new vehicle detection method

Author(s): Zebbara Khalid | Mohamed El Ansari | Abdenbi Mazoul
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Robust Face Detection Using Circular Multi Block Local Binary Pattern and Integral Haar Features

Author(s): Dr.P.K.Suri | Er.Amit Verma
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Extraction of Line Features from Multifidus Muscle of CT Scanned Images with Morphologic Filter Together with Wavelet Multi Resolution Analysis

Author(s): Kohei Arai | Yuichiro Eguchi | Yoichiro Kitajima
Volume: Special
Issue: Artificial Intelligence
Year: 2011





Motion Blobs as a Feature for Detection on Smoke

Author(s): Khalid Nazim S. A. | Dr. M.B. Sanjay Pande
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Tifinagh Character Recognition Using Geodesic Distances, Decision Trees & Neural Networks

Author(s): O.BENCHAREF | M.FAKIR | B. MINAOUI | B.BOUIKHALENE
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Unsupervised Method of Object Retrieval Using Similar Region Merging and Flood Fill

Author(s): Kanak Saxena | Sanjeev Jain | Uday Pratap Singh
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number

Author(s): Kohei Arai | Yuji Yamada
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





SOM Based Visualization Technique For Detection Of Cancerous Masses In Mammogram

Author(s): S.Pitchumani Angayarkanni | Dr.V.Saravanan 2
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





A Comparison Study between Data Mining Tools over some Classification Methods

Author(s): Abdullah H. Wahbeh | Qasem A. Al-Radaideh | Mohammed N. Al-Kabi | Emad M. Al-Shawakfa
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Forecasting the Tehran Stock Market by Artificial Neural Network

Author(s): Reza Aghababaeyan | Tamanna Siddiqui | Najeeb Ahmad Khan
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Speaker Identification using Row Mean of Haar and Kekre’s Transform on Spectrograms of Different Frame Sizes

Author(s): Dr. H B Kekre | Vaishali Kulkarni
Volume: Special Issue
Issue: Artificial Intelligence
Year: 2011





Optimized Pessimistic Fibonacci Back-off Algorithm (PFB)

Author(s): Muneer Bani Yassein | Mohammed Ahmed Alomari | Constandinos X. Mavromoustakis
Volume: 3
Issue: 9
Year: 2012





Comparison Study of Commit Protocols for Mobile Environment

Author(s): Bharati Harsoor | Dr.S.Ramachandram
Volume: 3
Issue: 9
Year: 2012





Developing Backward Chaining Algorithm of Inference Engine in Ternary Grid Expert System

Author(s): Yuliadi Erdani
Volume: 3
Issue: 9
Year: 2012





An integrated modular approach for Visual Analytic Systems in Electronic Health Records

Author(s): Muhammad Sheraz Arshad Malik | Dr.Suziah Sulaiman
Volume: 3
Issue: 9
Year: 2012





A Performance Evaluation of Multiple Input Queued (MIQ) Switch with Iterative Weighted Slip Algorithm

Author(s): S N Kore | Sayali Kore | Ajinkya Biradar | Dr. P J Kulkarni
Volume: 3
Issue: 9
Year: 2012





Billing System Design Based on Internet Environment

Author(s): Muzhir Shaban Al-Ani | Rabah Noory | Dua'a Yaseen Al-Ani
Volume: 3
Issue: 9
Year: 2012





An Emergency System for Succoring Children using Mobile GIS

Author(s): Ayad Ghany Ismaeel
Volume: 3
Issue: 9
Year: 2012





A New Automatic Method to Adjust Parameters for Object Recognition

Author(s): Issam Qaffou | Mohamed Sadgal | Aziz Elfazziki
Volume: 3
Issue: 9
Year: 2012





The Impact on Effectiveness and User Satisfaction of Menu Positioning on Web Pages

Author(s): Dr Pietro Murano | Kennedy K. Oenga
Volume: 3
Issue: 9
Year: 2012





Improved Accuracy of PSO and DE using Normalization: an Application to Stock Price Prediction

Author(s): Savinderjit Kaur | Veenu Mangat
Volume: 3
Issue: 9
Year: 2012





Image Denoising using Adaptive Thresholding in Framelet Transform Domain

Author(s): S. Sulochana | R.Vidhya
Volume: 3
Issue: 9
Year: 2012





A study on Security within public transit vehicles

Author(s): A. N. Seshukumar | Dr.S.Vasavi | Dr.V.Srinivasa Rao
Volume: 3
Issue: 9
Year: 2012





Ethernet Based Remote Monitoring And Control Of Temperature By Using Rabbit Processor

Author(s): U. SUNEETHA | K.TANVEER ALAM | N.ANJU LATHA | B.V.S.GOUD
Volume: 3
Issue: 9
Year: 2012





A Novel Image Encryption Supported by Compression Using Multilevel Wavelet Transform

Author(s): Ch. Samson | V. U. K. Sastry
Volume: 3
Issue: 9
Year: 2012





Mutual Exclusion Principle for Multithreaded Web Crawlers

Author(s): Kartik Kumar Perisetla
Volume: 3
Issue: 9
Year: 2012





Time-Domain Large Signal Investigation on Dynamic Responses of the GDCC Quarterly Wavelength Shifted Distributed Feedback Semiconductor Laser

Author(s): Abdelkarim Moumen | Abdelkarim Zatni | Abdenabi Elyamani | Hamza Bousseta
Volume: 3
Issue: 9
Year: 2012





A Multi-Stage Optimization Model With Minimum Energy Consumption-Wireless Mesh Networks

Author(s): S. Krishnakumar | Dr.R.Srinivasan
Volume: 3
Issue: 9
Year: 2012





Security Analysis of Image Cryptosystem Using Stream Cipher Algorithm with Nonlinear Filtering Function

Author(s): Belmeguenaï Aïssa | Derouiche Nadir | Mansouri Khaled
Volume: 3
Issue: 9
Year: 2012





The Impacts of ICTs on Banks

Author(s): Matthew K Luka | Ibikunle A. Frank
Volume: 3
Issue: 9
Year: 2012





Students’ Perceptions of the Effectiveness of Discussion Boards: What can we get from our students for a freebie point

Author(s): Abdel-Hameed A. Badawy
Volume: 3
Issue: 9
Year: 2012





SAS: Implementation of scaled association rules on spatial multidimensional quantitative dataset

Author(s): M. N. Doja | Sapna Jain | M Afshar Alam
Volume: 3
Issue: 9
Year: 2012





Probabilistic: A Fuzzy Logic-Based Distance Broadcasting Scheme For Mobile Ad Hoc Networks

Author(s): Tasneem Bano | Jyoti Singhai
Volume: 3
Issue: 9
Year: 2012





Particle Swarm Optimization for Calibrating and Optimizing Xinanjiang Model Parameters

Author(s): Kuok King Kuok | Chiu Po Chan
Volume: 3
Issue: 9
Year: 2012





Localisation of Numerical Date Field in an Indian Handwritten Document

Author(s): S Arunkumar | Pallab Kumar Sahu | Sudeep Gorai | Kalyan Ghosh
Volume: 3
Issue: 9
Year: 2012





Knowledge Sharing Protocol for Smart Spaces

Author(s): Jussi Kiljander | Francesco Morandi | Juha-Pekka Soininen
Volume: 3
Issue: 9
Year: 2012





Free Open Source Software: FOSS Based GIS for Spatial Retrievals of Appropriate Locations for Ocean Energy Utilizing Electric Power Generation Plants

Author(s): Kohei Arai
Volume: 3
Issue: 9
Year: 2012





Fast DC Mode Prediction Scheme For Intra 4x4 Block In H.264/AVC Video Coding Standard

Author(s): Tajdid UI Alam | Jafor Ikbal | Touhid Ul Alam
Volume: 3
Issue: 9
Year: 2012





Error Analysis of Air Temperature Profile Retrievals with Microwave Sounder Data Based on Minimization of Covariance Matrix of Estimation Error

Author(s): Kohei Arai
Volume: 3
Issue: 9
Year: 2012





E-learning System Which Allows Students’ Confidence Level Evaluation with Their Voice When They Answer to the Questions During Achievement Tests

Author(s): Kohei Arai
Volume: 3
Issue: 9
Year: 2012





Effect of Driver Strength on Crosstalk in Global Interconnects

Author(s): Kalpana. A. B | P.V.Hunagund
Volume: 3
Issue: 9
Year: 2012





A computational linguistic approach to natural language processing with applications to garden path sentences analysis

Author(s): DU Jia-li | YU Ping-fang
Volume: 3
Issue: 9
Year: 2012





Convenience and Medical Patient Database Benefits and Elasticity for Accessibility Therapy in Different Locations

Author(s): Bambang Eka Purnama | Sri Hartati
Volume: 3
Issue: 9
Year: 2012





Application of Relevance Vector Machines in Real Time Intrusion Detection

Author(s): Naveen N. C | Dr Natarajan.S | Dr Srinivasan.R
Volume: 3
Issue: 9
Year: 2012





Feature Subsumption for Sentiment Classification of Dynamic Data in Social Networks using SCDDF

Author(s): Jayanag. B | Vineela. K | Dr. Vasavi. S
Volume: 3
Issue: 9
Year: 2012





An RGB Image Encryption Supported by Wavelet-based Lossless Compression

Author(s): Ch. Samson | V. U. K. Sastry
Volume: 3
Issue: 9
Year: 2012





A Survey on Models and Query Languages for Temporally Annotated RDF

Author(s): Anastasia Analyti | Ioannis Pachoulakis
Volume: 3
Issue: 9
Year: 2012





The Risk Management Strategy of Applying Cloud Computing

Author(s): Chiang Ku Fan | Tien-Chun Chen
Volume: 3
Issue: 9
Year: 2012





A Multi-Objective Optimization Approach Using Genetic Algorithms for Quick Response to Effects of Variability in Flow Manufacturing

Author(s): Riham Khalil | David Stockton | Parminder Singh Kang | Lawrence Manyonge Mukhongo
Volume: 3
Issue: 9
Year: 2012





3D Face Compression and Recognition using Spherical Wavelet Parametrization

Author(s): Rabab M. Ramadan | Rehab F. Abdel-Kader
Volume: 3
Issue: 9
Year: 2012





E-learning as a Research Area: An Analytical Approach

Author(s): Sangeeta Kakoty | Monohar Lal | Shikhar Kr. Sarma
Volume: 2
Issue: 9
Year: 2011





Room Impulse Response Modeling in the Sub-2kHz Band using 3-D Rectangular Digital Waveguide Mesh

Author(s): Zhixin Chen
Volume: 2
Issue: 9
Year: 2011





An Ontology Based Reuse Algorithm towards Process Planning in Software Development

Author(s): Shilpa Sharma | Maya Ingle
Volume: 2
Issue: 9
Year: 2011





The Performance between XEN-HVM, XEN-PV and Open-VZ during live-migration

Author(s): Igli Tafa | Elinda Kajo | Ariana Bejleri | Olimpjon Shurdi | Aleksandër Xhuvani
Volume: 2
Issue: 9
Year: 2011





Development of a Computer Aided Transport Monitoring System (CATRAMS) for Manufacturing Organizations

Author(s): DIPO THEOPHILUS AKOMOLAFE
Volume: 2
Issue: 9
Year: 2011





Audio Watermarking with Error Correction

Author(s): Aman Chadha | Sandeep Gangundi | Rishabh Goel | Hiren Dave | M. Mani Roja
Volume: 2
Issue: 9
Year: 2011





mSCTP Based Decentralized Mobility Framework

Author(s): Waqas A. Imtiaz | M. Afaq | Mohammad A.U. Babar
Volume: 2
Issue: 9
Year: 2011





PSO Based Short-Term Hydrothermal Scheduling with Prohibited Discharge Zones

Author(s): G.Sreenivasan | Dr. C.H.Saibabu | Dr.S.Sivanagaraju
Volume: 2
Issue: 9
Year: 2011





Analysis of k-Coverage in Wireless Sensor Networks

Author(s): Rasmi Ranjan Patra | Prashanta Kumar Patra
Volume: 2
Issue: 9
Year: 2011





EGovernment Stage Model: Evaluating the Rate of Web Development Progress of Government Websites in Saudi Arabia

Author(s): Osama Alfarraj | Steve Drew | Rayed Abdullah AlGhamdi
Volume: 2
Issue: 9
Year: 2011





Prediction of Users Behavior through Correlation Rules

Author(s): Navin Kumar Tyagi | A. K. Solanki
Volume: 2
Issue: 9
Year: 2011





Semantic Retrieval Approach for Web Documents

Author(s): Hany M. Harb | Khaled M. Fouad | Nagdy M. Nagdy
Volume: 2
Issue: 9
Year: 2011





Hybrid Query by Humming and Metadata Search System (HQMS) Analysis over Diverse Features

Author(s): Nauman Ali Khan | Mubashar Mushtaq
Volume: 2
Issue: 9
Year: 2011





Hierarchical Cellular Structures in High-Capacity Cellular Communication Systems

Author(s): Prof. R. K. Jain | Sumit Katiyar | Prof. N. K. Agrawal
Volume: 2
Issue: 9
Year: 2011





Some New Results about The Period of Recurring Decimal

Author(s): Bo Zhang
Volume: 2
Issue: 9
Year: 2011





A New Reliability Model for Evaluating Trustworthiness of Intelligent Agents in Vertical Handover

Author(s): Kailash Chander | Dimple Juneja
Volume: 2
Issue: 9
Year: 2011





Polarimetric SAR Image Classification with High Frequency Component Derived from Wavelet Multi Resolution Analysis: MRA

Author(s): Kohei Arai
Volume: 2
Issue: 9
Year: 2011





An improved Approach for Document Retrieval Using Suffix Trees

Author(s): N. Sandhya | Y. Sri Lalitha | Dr. A. Govardhan | Dr. K. Anuradha
Volume: 2
Issue: 9
Year: 2011





Embedded Object Detection with Radar Echo Data by Means of Wavelet Analysis of MRA: Multi-Resolution Analysis

Author(s): Kohei Arai
Volume: 2
Issue: 9
Year: 2011





Backup Communication Routing Through Internet Satellite, WINDS for Transmitting of Disaster Relief Data

Author(s): Kohei Arai
Volume: 2
Issue: 9
Year: 2011





An Efficient Scheme for MANET Domain Formation (ESMDF)

Author(s): Adwan AbdelFattah
Volume: 2
Issue: 9
Year: 2011





Towards an Adaptive Learning System Based on a New Learning Object Granularity Approach

Author(s): Amal Battou | Ali El Mezouary | Driss Mammass
Volume: 2
Issue: 9
Year: 2011





Evaluation of the Segmentation by Multispectral Fusion Approach with Adaptive Operators : Application to Medical Images

Author(s): Lamiche Chaabane | Moussaoui Abdelouahab
Volume: 2
Issue: 9
Year: 2011





Mining Opinion in Online Messages

Author(s): Norlela Samsudin | Abdul Razak Hamda | Mazidah Puteh | Mohd Zakree Ahmad Nazri
Volume: 4
Issue: 8
Year: 2013





Design and Development of AlgoWBIs

Author(s): Kavita | Dr. Abdul Wahid | Dr. G N Purohit
Volume: 4
Issue: 8
Year: 2013





Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX

Author(s): Siddu P. Algur | Niharika Kumar
Volume: 4
Issue: 8
Year: 2013





A Study on the Conception of Generic Fuzzy Expert System for Surveillance

Author(s): Najar Yousra | Ketata Raouf | Ksouri Mekki
Volume: 4
Issue: 8
Year: 2013





Representation Modeling Persona by using Ontologies: Vocabulary Persona

Author(s): GAOU Salma | EL KADIRI Kamal Eddine | CORNELIU BURAGA Sabin
Volume: 4
Issue: 8
Year: 2013





Semantic, Automatic Image Annotation Based on Multi-Layered Active Contours and Decision Trees

Author(s): Joanna Isabelle OLSZEWSKA
Volume: 4
Issue: 8
Year: 2013





Generating an Educational Domain Checklist through an Adaptive Framework for Evaluating Educational Systems

Author(s): Roobaea S. AlRoobaea | Ali H. Al-Badi | Pam J. Mayhew
Volume: 4
Issue: 8
Year: 2013





Protein PocketViewer: A Web-Service Based Interface for Protein Pocket Extraction and Visualization

Author(s): Xiaoyu Zhang | Martin Gordon
Volume: 4
Issue: 8
Year: 2013





An Analysis of Brand Selection

Author(s): Kazuhiro Takeyasu† | Yuki Higuchi
Volume: 4
Issue: 8
Year: 2013





A Proposed NFC Payment Application

Author(s): Pardis Pourghomi | Muhammad Qasim Saeed | Gheorghita Ghinea
Volume: 4
Issue: 8
Year: 2013





Workshop Session Recordings on Green Volunteering Activities of Students in a Disadvantaged Area According to the Good-Hearted Vocation Teacher to Support Itinerant Junk Buyers

Author(s): Kuntida Thamwipat | Thanakarn Kumphai
Volume: 4
Issue: 8
Year: 2013





Directed and Almost-Directed Flow Loops in Real Networks

Author(s): M. Todinov
Volume: 4
Issue: 8
Year: 2013





Investigate the Performance of Document Clustering Approach Based on Association Rules Mining

Author(s): Noha Negm | Mohamed Amin | Passent Elkafrawy | Abdel Badeeh M. Salem
Volume: 4
Issue: 8
Year: 2013





Intelligent Ambulance Traffic Assistance System

Author(s): RONOJOY GHOSH | VIVEK SHAH | HITESH AGARWAL | ASHUTOSH BHUSHAN | PRASUN KANTI GHOSH
Volume: 4
Issue: 8
Year: 2013





Actions for data warehouse success

Author(s): Aziza CHAKIR | Hicham MEDROMI | Adil SAYOUTI
Volume: 4
Issue: 8
Year: 2013





Cross Language Information Retrieval Model for Discovering WSDL Documents Using Arabic Language Query

Author(s): Prof. Dr. Torkey I.Sultan | Dr. Ayman E. Khedr | Fahad Kamal Alsheref
Volume: 4
Issue: 8
Year: 2013





Debranding in Fantasy Realms: Perceived Marketing Opportunities within the Virtual World

Author(s): Kear Andrew | Bown Gerald Robin | Christidi Sofia
Volume: 4
Issue: 8
Year: 2013





Virtual Calibration of Cosmic Ray Sensor: Using Supervised Ensemble Machine Learning

Author(s): Ritaban Dutta | Claire D’Este
Volume: 4
Issue: 8
Year: 2013





Dynamic Evaluation and Visualisation of the Quality and Reliability of Sensor Data Sources

Author(s): Ritaban Dutta | Claire D’Este | Ahsan Morshed | Daniel Smith | Aruneema Das | Jagannath Aryal
Volume: 4
Issue: 8
Year: 2013





Bootstrapping Domain Knowledge Exploration using Conceptual Mapping of Wikipedia

Author(s): Mai Eldefrawi | Ahmed Sharaf eldin Ahmed | Adel Elsayed
Volume: 4
Issue: 8
Year: 2013





Evaluation of Human Emotion from Eye Motions

Author(s): Vidas Raudonis | Gintaras Dervinis | Andrius Vilkauskas | Agne Paulauskaite - Taraseviciene | Gintare Kersulyte - Raudone
Volume: 4
Issue: 8
Year: 2013





On The Performance of the Gravitational Search Algorithm

Author(s): Taisir Eldos | Rose Al Qasim
Volume: 4
Issue: 8
Year: 2013





Development of Social Media GIS for Information Exchange between Regions

Author(s): Syuji YAMADA | Kayoko YAMAMOTO
Volume: 4
Issue: 8
Year: 2013





On Integrating Mobile Applications into the Digital Forensic Investigative Process

Author(s): April Tanner | Soniael Duncan
Volume: 4
Issue: 8
Year: 2013





A Novel Expert System for Building House Cost Estimation: Design, Implementation, and Evaluation

Author(s): Yasser A. Nada
Volume: 4
Issue: 8
Year: 2013





User-Based Interaction for Content-Based Image Retrieval by Mining User Navigation Patterns.

Author(s): A. Srinagesh | Lavanya Thota | G.P.Saradhi Varma | A.Govardhan
Volume: 4
Issue: 8
Year: 2013





A Hybrid Method to Improve Forecasting Accuracy Utilizing Genetic Algorithm –An Application to the Data of Operating equipment and supplies

Author(s): Daisuke Takeyasu | Kazuhiro Takeyasu†
Volume: 4
Issue: 8
Year: 2013





English to Creole and Creole to English Rule Based Machine Translation System

Author(s): Sameerchand Pudaruth | Lallesh Sookun | Arvind Kumar Ruchpaul
Volume: 4
Issue: 8
Year: 2013





A Novel Steganography Method for Hiding BW Images into Gray Bitmap Images via k-Modulus Method

Author(s): Firas A. Jassim
Volume: 4
Issue: 8
Year: 2013





Pilot Study of Industry Perspective on Requirement Engineering Education: Measurement of Rasch Analysis

Author(s): NOR AZLIANA AKMAL JAMALUDIN | SHAMSUL SAHIBUDDIN
Volume: 4
Issue: 8
Year: 2013





Improved QO-STBC OFDM System Using Null Interference Elimination

Author(s): K. O. O. Anoh | R. A. Abd-Alhameed | Y. A. S. Dama | S. M. R. Jones | T. S. Ghazaany | J. Rodrigues | K. N. Voudouris
Volume: 4
Issue: 8
Year: 2013





Software Ecosystem: Features, Benefits and Challenges

Author(s): J. V. Joshua | D.O. Alao | S.O. Okolie | O. Awodele
Volume: 4
Issue: 8
Year: 2013





Performance Analysis of Keccak f-[1600]

Author(s): Ananya Chowdhury | Utpal Kumar Ray
Volume: 4
Issue: 8
Year: 2013





The Determination of Affirmative and Negative Intentions for Indirect Speech Acts by a Recommendation Tree

Author(s): Takuki Ogawa | Kazuhiro Morita | Masao Fuketa | Jun-ichi Aoe
Volume: 4
Issue: 8
Year: 2013





Review of Remote Terminal Unit (RTU) and Gateways for Digital Oilfield delpoyments

Author(s): Francis Enejo Idachaba | Ayobami Ogunrinde
Volume: 3
Issue: 8
Year: 2012





Prevention and Detection of Financial Statement Fraud – An Implementation of Data Mining Framework

Author(s): Rajan Gupta | Nasib Singh Gill
Volume: 3
Issue: 8
Year: 2012





An Approach of Improving Student’s Academic Performance by using K-means clustering algorithm and Decision tree

Author(s): Hedayetul Islam Shovon | Mahfuza Haque
Volume: 3
Issue: 8
Year: 2012





On the Projection Matrices Influence in the Classification of Compressed Sensed ECG Signals

Author(s): Monica Fira | Liviu Goras | Nicolae Cleju | Constantin Barabasa
Volume: 3
Issue: 8
Year: 2012





Clone Detection Using DIFF Algorithm For Aspect Mining

Author(s): Rowyda Mohammed Abd El-Aziz | Amal Elsayed Aboutabl | Mostafa-Sami Mostafa
Volume: 3
Issue: 8
Year: 2012





Techniques to improve the GPS precision

Author(s): Nelson Acosta | Juan Toloza
Volume: 3
Issue: 8
Year: 2012





A Review On Cognitive Mismatch Between Computer and Information Technology And Physicians

Author(s): Fozia Anwar | Dr. Suziah Sulaiman | Dr. P.D.D.Dominic
Volume: 3
Issue: 8
Year: 2012





Brainstorming 2.0: Toward collaborative tool based on social networks

Author(s): MohamedChrayah | Kamal Eddine El Kadiri | Boubker Sbihi | Noura Aknin
Volume: 3
Issue: 8
Year: 2012





An Effective Identification of Species from DNA Sequence: A Classification Technique by Integrating DM and ANN

Author(s): Sathish Kumar S | Dr.N.Duraipandian
Volume: 3
Issue: 8
Year: 2012





Automatic Aircraft Target Recognition by ISAR Image Processing based on Neural Classifier

Author(s): F Benedetto | F. Riganti Fulginei | A. Laudani | G. Albanese
Volume: 3
Issue: 8
Year: 2012





A hybrid Evolutionary Functional Link Artificial Neural Network for Data mining and Classification

Author(s): Faissal MILI | Manel HAMDI
Volume: 3
Issue: 8
Year: 2012





Software Architecture- Evolution and Evaluation

Author(s): S Roselin Mary | Dr.Paul Rodrigues
Volume: 3
Issue: 8
Year: 2012





Managing Changes in Citizen-Centric Healthcare Service Platform using High Level Petri Net

Author(s): Sabri MTIBAA | Moncef TAGINA
Volume: 3
Issue: 8
Year: 2012





Integration of data mining within a Strategic Knowledge Management framework

Author(s): Sanaz Moayer | Scott Gardner
Volume: 3
Issue: 8
Year: 2012





SW-SDF Based Personal Privacy with QIDB-Anonymization Method

Author(s): Kiran P | Dr Kavya N P
Volume: 3
Issue: 8
Year: 2012





E-commerce Smartphone Application

Author(s): Abdullah Saleh Alqahtani | Robert Goodwin
Volume: 3
Issue: 8
Year: 2012





Enhancing eHealth Information Systems for chronic diseases remote monitoring systems

Author(s): Amir HAJJAM
Volume: 3
Issue: 8
Year: 2012





Spontaneous-braking and lane-changing effect on traffic congestion using cellular automata model applied to the two-lane traffic

Author(s): Kohei Arai | Steven Ray Sentinuwo
Volume: 3
Issue: 8
Year: 2012





Performance model to predict overall defect density

Author(s): J Venkatesh | Mr. Priyesh Cherurveettil | Mrs. Thenmozhi. S | Dr. Balasubramanie. P
Volume: 3
Issue: 8
Year: 2012





Automatic Association of Strahler’s Order and Attributes with the Drainage System

Author(s): Mohan P Pradhan | M. K. Ghose | Yash R. Kharka
Volume: 3
Issue: 8
Year: 2012





A Modified Feistel Cipher Involving Substitution, Shifting of rows, Mixing of columns, XOR operation with a Key and Shuffling

Author(s): V U.K Sastry | K. Anup Kumar
Volume: 3
Issue: 8
Year: 2012





Monte Carlo Based Non-Linear Mixture Model of Earth Observation Satellite Imagery Pixel Data

Author(s): Kohei Arai
Volume: 3
Issue: 8
Year: 2012





A New Algorithm for Data Compression Optimization

Author(s): I Made Agus Dwi Suarjaya
Volume: 3
Issue: 8
Year: 2012





An Enhanced MPLS-TE For Transferring Multimedia packets

Author(s): Abdellah Jamali | Najib Naja | Driss El Ouadghiri
Volume: 3
Issue: 8
Year: 2012





Instruction Design Model for Self-Paced ICT System E-Learning in an Organization

Author(s): Ridi Ferdiana | Obert Hoseanto
Volume: 3
Issue: 8
Year: 2012





Simulation of Spectral Subtraction Based Noise Reduction Method

Author(s): Zhixin Chen
Volume: 2
Issue: 8
Year: 2011





Some Modification in ID-Based Public key Cryptosystem using IFP and DDLP

Author(s): Chandrashekhar Meshram | S.A. Meshram
Volume: 2
Issue: 8
Year: 2011





Performance Analysis of Corporate Feed Rectangular Patch Element and Circular Patch Element 4x2 Microstrip Array Antennas

Author(s): Md. Tanvir Ishtaique-ul Huque | Md. Al-Amin Chowdhury | Md. Kamal Hosain | Md. Shah Alam
Volume: 2
Issue: 8
Year: 2011





Security Provisions in Stream Ciphers Through Self Shrinking and Alternating Step Generator

Author(s): Hafsa Rafiq | Malik Sikandar Hayat Kiyal | Aihab Khan
Volume: 2
Issue: 8
Year: 2011





MCMC Particle Filter Using New Data Association Technique with Viterbi Filtered Gate Method for Multi-Target Tracking in Heavy Clutter

Author(s): E. M.Saad | El. Bardawiny | H.I.ALI | N.M.Shawky
Volume: 2
Issue: 8
Year: 2011





Neutrosophic Relational Database Decomposition

Author(s): Meena Arora | Ranjit Biswas | Dr. U.S.Pandey
Volume: 2
Issue: 8
Year: 2011





Multimodal Optimization using Self-Adaptive Real Coded Genetic Algorithm with K-means & Fuzzy C-means Clustering

Author(s): Vrushali K. Bongirwar | Rahila Patel
Volume: 2
Issue: 8
Year: 2011





Control Systems application in Java based Enterprise and Cloud Environments – A Survey

Author(s): Ravi Kumar Gullapalli | Dr. Chelliah Muthusamy | Dr.A.Vinaya Babu
Volume: 2
Issue: 8
Year: 2011





AODV Robust (AODVR): An Analytic Approach to Shield Ad-hoc Networks from Black Holes

Author(s): Mohammad Abu Obaida | Shahnewaz Ahmed Faisal | Md. Abu Horaira | Tanay Kumar Roy
Volume: 2
Issue: 8
Year: 2011





Bidirectional WDM-Radio over Fiber System with Sub Carrier Multiplexing Using a Reflective SOA and Cyclic AWGs

Author(s): Fady I. El-Nahal
Volume: 2
Issue: 8
Year: 2011





CO2 Concentration Change Detection in Time and Space Domains by Means of Wavelet Analysis of MRA: Multi-Resolution Analysis

Author(s): Kohei Arai
Volume: 2
Issue: 8
Year: 2011





e-Government Ethics : a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics

Author(s): Arief Ramadhan | Dana Indra Sensuse | Aniati Murni Arymurthy
Volume: 2
Issue: 8
Year: 2011





Identification Problem of Source Term of A Reaction Diffusion Equation

Author(s): Bo Zhang
Volume: 2
Issue: 8
Year: 2011





Analysis of Guess and Determined Attack on Non Linear Modified SNOW 2.0 Using One LFSR

Author(s): Madiha Waris | Malik Sikandar Hayat Khiyal | Aihab Khan
Volume: 2
Issue: 8
Year: 2011





Design of an Intelligent Combat Robot for war fields

Author(s): Dr.S.Bhargavi | S.Manjunath
Volume: 2
Issue: 8
Year: 2011





DETECTION OF RELIABLE SOFTWARE USING SPRT

Author(s): Dr. R.Satya Prasad | N. Supriya | G.Krishna Mohan
Volume: 2
Issue: 8
Year: 2011





Enhanced Architecture of a Web Warehouse based on Quality Evaluation Framework to Incorporate Quality Aspects in Web Warehouse Creation

Author(s): Umm-e-Mariya Shah | Azra Shamim | Madiha Kazmi
Volume: 2
Issue: 8
Year: 2011





Transforming Higher educational institution administration through ICT

Author(s): J. Meenakumari | Dr. R. Krishnaveni
Volume: 2
Issue: 8
Year: 2011





Implementation of Locally Weighted Projection Regression Network for Concurrency Control In Computer Aided Design

Author(s): A.Muthukumaravel | Dr.S.Purushothaman | Dr.A.Jothi
Volume: 2
Issue: 8
Year: 2011





Barriers in Adoption of Health Information Technology in Developing Societies

Author(s): Fozia Anwar | Azra Shamim
Volume: 2
Issue: 8
Year: 2011





IMPLEMENTATION OF NODE ENERGY BASED ON ENCRYPTION KEYING

Author(s): Dr.S.Bhargavi | Ranjitha B.T
Volume: 2
Issue: 8
Year: 2011





LED to LED communication with WDM concept for flash light of Mobile phones

Author(s): Devendra J Varanva | Kantipudi MVV Prasad
Volume: 4
Issue: 7
Year: 2013





Visual Exploration of Complex Network Data Using Affective Brain-Computer Interface

Author(s): Sergey V. Kovalchuk | Denis M. Terekhov | Aleksey A. Bezgodov | Alexander V. Boukhanovsky
Volume: 4
Issue: 7
Year: 2013





Applying Genetic Algorithms to Test JUH DBs Exceptions

Author(s): Mohammad Alshraideh | Ezdehar Jawabreh | Basel A. Mahafzah | Heba M. AL Harahsheh
Volume: 4
Issue: 7
Year: 2013





Relation Inclusive Search for Hindi Documents

Author(s): Pooja Arora | Om Vikas
Volume: 4
Issue: 7
Year: 2013





POSIX.1 conformance For Android Applications

Author(s): Tayyaba Nafees | Prof. Dr. Shoab Ahmad Khan
Volume: 4
Issue: 7
Year: 2013





An Intelligent Diagnostic System for Congenital Heart Defects

Author(s): Amir Mohammad Amiri | Giuliano Armano
Volume: 4
Issue: 7
Year: 2013





Effective Performance of Information Retrieval by using Domain Based Crawler

Author(s): Sk. Abdul Nabi | Dr. P. Premchand
Volume: 4
Issue: 7
Year: 2013





A Novel Permutation Based Approach for Effective and Efficient Representation of Face Images under Varying Illuminations

Author(s): Shylaja S S | K N Balasubramanya Murthy | S Natarajan
Volume: 4
Issue: 7
Year: 2013





Contribution of the Computer Technologies in the Teaching of Physics: Critical Review and Conception of an Interactive Simulation Software

Author(s): Abdeljalil Métioui | Louis Trudel
Volume: 4
Issue: 7
Year: 2013





On an internal multimodel control for nonlinear multivariable systems - A comparative study

Author(s): Nahla Touati Karmani | Dhaou Soudani | Mongi Naceur | Mohamed Benrejeb
Volume: 4
Issue: 7
Year: 2013





Collaborative Spectrum Sensing under Suburban Environments

Author(s): Aamir Zeb Shaikh | Dr. Talat Altaf
Volume: 4
Issue: 7
Year: 2013





Communication in Veil: Enhanced Paradigm for ASCII Text Files

Author(s): Khan Farhan Rafat | Muhammad Sher
Volume: 4
Issue: 7
Year: 2013





The Use of Software Project Management Tools in Saudi Arabia: An Exploratory Survey

Author(s): Nouf AlMobarak | Rawan AlAbdulrahman | Shahad AlHarbi | Wea’am AlRashed
Volume: 4
Issue: 7
Year: 2013





The SNCD as a Metrics for Image Quality Assessment

Author(s): Avid Roman-Gonzalez
Volume: 4
Issue: 7
Year: 2013





Rule Based System for Recognizing Emotions Using Multimodal Approach

Author(s): Preeti Khanna | Sasikumar M.
Volume: 4
Issue: 7
Year: 2013





Analysis of Child Computer Interaction in Edutainment and Simulation Games Application on Android Platform in Indonesia

Author(s): Setia Wirawan | Dewi Agushinta R. | Faris Fajar Muhammad | Lutfi Dwi Saifudin | Mustafa Ibrahim
Volume: 4
Issue: 7
Year: 2013





Interaction Protocols in Multi-Agent Systems based on Agent Petri Nets Model

Author(s): Borhen Marzougui | Kamel Barkaoui
Volume: 4
Issue: 7
Year: 2013





An Adaptive Multimodal Biometrics System using PSO

Author(s): Ola M. Aly | Tarek A. Mahmoud | Gouda I. Salama | Hoda M. Onsi
Volume: 4
Issue: 7
Year: 2013





A Hybrid Approach for Co-Channel Speech Segregation based on CASA, HMM Multipitch Tracking, and Medium Frame Harmonic Model

Author(s): Ashraf M. Mohy Eldin | Aliaa A. A. Youssif
Volume: 4
Issue: 7
Year: 2013





Segmentation on the Dental Periapical X-Ray Images for Osteoporosis Screening

Author(s): Enny Itje Sela | Sri Hartati | Agus Harjoko | Retantyo Wardoyo | Munakhir MS
Volume: 4
Issue: 7
Year: 2013





Performance Evaluation of Two-Hop Wireless Link under Nakagami-m Fading

Author(s): Afsana Nadia | Arifur Rahim Chowdhury | Md. Shoayeb Hossain | Md. Imdadul Islam | M. R. Amin
Volume: 4
Issue: 7
Year: 2013





SVM Classification of Urban High-Resolution Imagery Using Composite Kernels and Contour Information

Author(s): Aissam Bekkari | Mostafa El yassa | Soufiane Idbraim | Driss Mammass | Azeddine Elhassouny | Danielle Ducrot
Volume: 4
Issue: 7
Year: 2013





Mining Frequent Itemsets from Online Data Streams: Comparative Study

Author(s): HebaTallah Mohamed Nabil | Ahmed Sharaf Eldin | Mohamed Abd El-Fattah Belal
Volume: 4
Issue: 7
Year: 2013





Classification of Image Database Using Independent Principal Component Analysis

Author(s): H. B. Kekre | Tanuja K. Sarode | Jagruti K. Save
Volume: 4
Issue: 7
Year: 2013





Exact Output Rate of Generalized Peres Algorithm for Generating Random Bits from Loaded Dice

Author(s): Sung-il Pae
Volume: 4
Issue: 7
Year: 2013





Physical Activity Identification using Supervised Machine Learning and based on Pulse Rate

Author(s): Mobyen Uddin Ahmed | Amy Loutfi
Volume: 4
Issue: 7
Year: 2013





A Hybrid Model for Secure Data Transfer in Audio Signals using HCNN and DD DWT

Author(s): B. Geetha vani | Prof. E. V. Prasad
Volume: 4
Issue: 7
Year: 2013





Analysis of MIMO Systems used in planning a 4G-WiMAX Network in Ghana

Author(s): E. T. Tchao | K. Diawuo | W.K. Ofosu | E. Affum
Volume: 4
Issue: 7
Year: 2013





Multimodal Biometric Technology System Framework and E-Commerce in Emerging Markets

Author(s): Chike Obed-Emeribe
Volume: 4
Issue: 7
Year: 2013





Identification–Oriented Control Designs with Application to a Wind Turbine Benchmark

Author(s): Silvio Simani | Paolo Castaldi
Volume: 4
Issue: 7
Year: 2013





Security Concerns in E-payment and the Law in Jordan

Author(s): Mohammad Atwah Al-ma'aitah
Volume: 4
Issue: 7
Year: 2013





BPM, Agile, and Virtualization Combine to Create Effective Solutions

Author(s): Steve Kruba | Steven Baynes | Robert Hyer
Volume: 3
Issue: 7
Year: 2012





Throughput Analysis of Ieee802.11b Wireless Lan With One Access Point Using Opnet Simulator

Author(s): Isizoh A N | Nwokoye A. O.C | Okide S. O | Ogu C. D
Volume: 3
Issue: 7
Year: 2012





Improving the Rate of Convergence of Blind Adaptive Equalization for Fast Varying Digital Communication Systems

Author(s): Iorkyase E.Tersoo | Michael O. Kolawole
Volume: 3
Issue: 7
Year: 2012





Comparative Study between the Proposed GA Based ISODAT Clustering and the Conventional Clustering Methods

Author(s): Kohei Arai
Volume: 3
Issue: 7
Year: 2012





GUI Database for the Equipment Store of the Department of Geomatic Engineering, KNUST

Author(s): J. A. Quaye-Ballard | R. An | A. B. Agyemang | N. Y. Oppong-Quayson | J. E. N. Ablade
Volume: 3
Issue: 7
Year: 2012





A Hybrid Technique Based on Combining Fuzzy K-means Clustering and Region Growing for Improving Gray Matter and White Matter Segmentation

Author(s): Ashraf Afifi
Volume: 3
Issue: 7
Year: 2012





Improving the Solution of Traveling Salesman Problem Using Genetic, Memetic Algorithm and Edge assembly Crossover

Author(s): Mohd. Junedul Haque | Khalid. W. Magld
Volume: 3
Issue: 7
Year: 2012





Image Clustering Method Based on Density Maps Derived from Self-Organizing Mapping: SOM

Author(s): Kohei Arai
Volume: 3
Issue: 7
Year: 2012





Task Allocation Model for Rescue Disabled Persons in Disaster Area with Help of Volunteers

Author(s): Kohei Arai | Tran Xuan Sang | Nguyen Thi Uyen
Volume: 3
Issue: 7
Year: 2012





Simultaneous Estimation of Geophysical Parameters with Microwave Radiometer Data based on Accelerated Simulated Annealing: SA

Author(s): Kohei Arai
Volume: 3
Issue: 7
Year: 2012





FHC-NCTSR: Node Centric Trust Based secure Hybrid Routing Protocol for Ad Hoc Networks

Author(s): Prasuna V G | Dr. S Madhusudahan Verma
Volume: 3
Issue: 7
Year: 2012





LOQES: Model for Evaluation of Learning Object

Author(s): Sonal Chawla | Niti Gupta | Prof. R.K. Singla
Volume: 3
Issue: 7
Year: 2012





An Online Character Recognition System to Convert Grantha Script to Malayalam

Author(s): Sreeraj M | Sumam Mary Idicula
Volume: 3
Issue: 7
Year: 2012





Smart Grids: A New Framework for Efficient Power Management in Datacenter Networks

Author(s): Okafor Kennedy C | Udeze Chidiebele. C | E. C. N. Okafor | C. C. Okezie
Volume: 3
Issue: 7
Year: 2012





Evaluating the Role of Information and Communication Technology (ICT) Support towards Processes of Management in Institutions of Higher Learning

Author(s): Michael Okumu Ujunju | G. Wanyembi | Franklin Wabwoba
Volume: 3
Issue: 7
Year: 2012





The Japanese Smart Grid Initiatives, Investments, and Collaborations

Author(s): Amy Poh Ai Ling | Sugihara Kokichi | Mukaidono Masao
Volume: 3
Issue: 7
Year: 2012





A Modified Feistel Cipher Involving Modular Arithmetic Addition and Modular Arithmetic Inverse of a Key Matrix

Author(s): Dr. V. U. K Sastry | K. Anup Kumar
Volume: 3
Issue: 7
Year: 2012





A Modified Feistel Cipher Involving XOR Operation and Modular Arithmetic Inverse of a Key Matrix

Author(s): Dr. V. U. K Sastry | K. Anup Kumar
Volume: 3
Issue: 7
Year: 2012





SVD Based Image Processing Applications: State of The Art, Contributions and Research Challenges

Author(s): Rowayda A. Sadek
Volume: 3
Issue: 7
Year: 2012





Core Backbone Convergence Mechanisms and Microloops Analysis

Author(s): Abdelali Ala | Driss El Ouadghiri | Mohamed Essaaidi
Volume: 3
Issue: 7
Year: 2012





Bond Portfolio Analysis with Parallel Collections in Scala

Author(s): Ron Coleman | Udaya Ghattamanei | Mark Logan
Volume: 3
Issue: 7
Year: 2012





Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET’s

Author(s): M. Nagaratna | V. Kamakshi Prasad | Raghavendra Rao
Volume: 2
Issue: 7
Year: 2011





A Parallel and Concurrent Implementation of Lin-Kernighan Heuristic (LKH-2) for Solving Traveling Salesman Problem for Multi-Core Processors using SPC3 Programming Model

Author(s): Muhammad Ali Ismail | Dr. Shahid H. Mirza | Dr. Talat Altaf
Volume: 2
Issue: 7
Year: 2011





Image Compression of MRI Image using Planar Coding

Author(s): Lalitha Y. S | Mrityunjaya V. Latte
Volume: 2
Issue: 7
Year: 2011





Developing Digital Control System Centrifugal Pumping Unit

Author(s): Safarini Osama
Volume: 2
Issue: 7
Year: 2011





Error Detection and Correction over Two-Dimensional and Two-Diagonal Model and Five-Dimensional Model

Author(s): :Danial Aflakian | Dr.Tamanna Siddiqui | Najeeb Ahmad Khan, | Davoud Aflakian
Volume: 2
Issue: 7
Year: 2011





Automatic Queuing Model for Banking Applications

Author(s): Dr. Ahmed S. A. AL-Jumaily | Dr. Huda K. T. AL-Jobori
Volume: 2
Issue: 7
Year: 2011





An Approach for Teaching of National Languages and Cultures through ICT in Cameroon
Author(s): Marcellin Nkenlifack | Bethin Demsong | A. Teko Domche | Raoul Nangue
Volume: 2
Issue: 7
Year: 2011




The threshold EM algorithm for parameter learning in bayesian network with incomplete data

Author(s): Fradj Ben Lamine | Karim Kalti | Mohamed Ali Mahjoub
Volume: 2
Issue: 7
Year: 2011





A Comparative Study of various Secure Routing Protocols based on AODV

Author(s): Dalip Kamboj | Pankaj Kumar Sehgal
Volume: 2
Issue: 7
Year: 2011





Performance Analysis of Corporate Feed Rectangular Patch Element and Circular Patch Element 4x2 Microstrip Array Antennas

Author(s): Md. Tanvir Ishtaique-ul Huque | Md. Al-Amin Chowdhury | Md. Kamal Hosain | Md. Shah Alam
Volume: 2
Issue: 7
Year: 2011





Investigation on Simulation and Measurement of Reverberation for Small Rooms

Author(s): Zhixin Chen
Volume: 2
Issue: 7
Year: 2011





Triple SV: A Bit Level Symmetric Block-Cipher Having High Avalanche Effect

Author(s): Rajdeep Chakraborty | Sonam Agarwal | Sridipta Misra | Vineet Khemka | Sunit Kr Agarwal | J. K. Mandal
Volume: 2
Issue: 7
Year: 2011





Characterization of Dynamic Bayesian Network-The Dynamic Bayesian Network as temporal network

Author(s): Nabil Ghanmi | Mohamed Ali Mahjoub | Najoua Essoukri Ben Amara
Volume: 2
Issue: 7
Year: 2011





On Algebraic Spectrum of Ontology Evaluation

Author(s): Adekoya Adebayo Felix | kinwale Adio Taofiki | Sofoluwe Adetokunbo
Volume: 2
Issue: 7
Year: 2011





Image Compression Techniques Using Modified high quality Multi wavelets

Author(s): M.Ashok | Dr.T.BhaskaraReddy
Volume: 2
Issue: 7
Year: 2011





A Comparative Study Of Wireless Technologies Used For Designing Home Automations System

Author(s): Ashish J. Ingle | Bharti W. Gawali
Volume: 2
Issue: 7
Year: 2011





Status of Wireless Technologies Used For Designing Home Automation System - A Review

Author(s): Ashish J. Ingle | Bharti W. Gawali
Volume: 2
Issue: 7
Year: 2011





Survey of Contrast Enhancement Techniques based on Histogram Equalization

Author(s): Manpreet Kaur, | Jasdeep Kaur | Jappreet Kaur
Volume: 2
Issue: 7
Year: 2011





Reconfigurable Efficient Design of Viterbi Decoder for Wireless Communication Systems

Author(s): Swati Gupta | Rajesh Mehra
Volume: 2
Issue: 7
Year: 2011





Solving the Vehicle Routing Problem using Genetic Algorithm

Author(s): Abdul Kadar Muhammad Masum | Mohammad Shahjalal | Md. Faisal Faruque | Md. Iqbal Hasan Sarker
Volume: 2
Issue: 7
Year: 2011





The Development Process of the Semantic Web and Web Ontology

Author(s): K.Vanitha | K.Yasudha | M.Sri Venkatesh | K.Ravindra | S.Venkata Lakshmi
Volume: 2
Issue: 7
Year: 2011





Software Security Requirements Gathering Instrument

Author(s): Smriti Jain | Maya Ingle
Volume: 2
Issue: 7
Year: 2011





Hybrid Approaches to Image Coding: A Review

Author(s): Rehna. V. J | Jeya Kumar. M. K
Volume: 2
Issue: 7
Year: 2011





Workshare Process of Thread Programming and MPI Model on Multicore Architecture

Author(s): R. Refianti | A.B. Mutiara | D.T Hasta
Volume: 2
Issue: 7
Year: 2011





Emotion Classification Using Facial Expression

Author(s): Devi Arumugam | Dr. S. Purushothaman
Volume: 2
Issue: 7
Year: 2011





Evaluation of SIGMA and SCTPmx for High Handover Rate Vehicle

Author(s): Hala Eldaw Idris Jubara | Sharifah Hafizah Syed Ariffin
Volume: 2
Issue: 7
Year: 2011





A multi-scale method for automatically extracting the dominant features of cervical vertebrae in CT images

Author(s): Tung-Ying Wu | Sheng-Fuu Lin
Volume: 4
Issue: 6
Year: 2013





Generating a Domain Specific Inspection Evaluation Method through an Adaptive Framework

Author(s): Roobaea AlRoobaea | Ali H. Al-Badi | Pam J. Mayhew
Volume: 4
Issue: 6
Year: 2013





Face Recognition as an Authentication Technique in Electronic Voting

Author(s): Noha E. El-Sayad | Rabab Farouk Abdel-Kader | Mahmoud Ibraheem Marie
Volume: 4
Issue: 6
Year: 2013





Study of the capacity of Optical Network On Chip based on MIMO (Multiple Input Multiple Output) system

Author(s): S. Mhatli | B.Nsiri | R.Attia
Volume: 4
Issue: 6
Year: 2013





A Strategy for Training Set Selection in Text Classification Problems

Author(s): Maria Luiza C. Passini | Katiusca B. Estébanez | Grazziela P. Figueredo | Nelson F. F. Ebecken
Volume: 4
Issue: 6
Year: 2013





Image Blocks Model for Improving Accuracy in Identification Systems of Wood Type

Author(s): Gasim | Kudang Boro Seminar | Agus Harjoko | Sri Hartati
Volume: 4
Issue: 6
Year: 2013





Face Recognition System Based on Different Artificial Neural Networks Models and Training Algorithms

Author(s): Omaima N. A. AL-Allaf | Abdelfatah Aref Tamimi | Mohammad A. Alia
Volume: 4
Issue: 6
Year: 2013





The quest towards a winning Enterprise 2.0 collaboration technology adoption strategy

Author(s): Robert Louw | Jabu Mtsweni
Volume: 4
Issue: 6
Year: 2013





Modeling the Cut-off Frequency of Acoustic Signal with an Adaptative Neuro-Fuzzy Inference System (ANFIS)

Author(s): Y. NAHRAOUI | E.H. AASSIF | G.Maze | R.LATIF
Volume: 4
Issue: 6
Year: 2013





Expected Reliability of Everyday- and Ambient Assisted Living Technologies

Author(s): Frederick Steinke | Tobias Fritsch | Andreas Hertzer | Helmut Tautz | Simon Zickwolf
Volume: 4
Issue: 6
Year: 2013





Evolutionary approach to optimisation of the operation of electric power distribution networks

Author(s): Jan Stepien | Sylwester Filipiak
Volume: 4
Issue: 6
Year: 2013





Improving Assessment Management Using Tools

Author(s): Shang Gao | Jo Coldwell-Neilson | Andrzej Goscinski
Volume: 4
Issue: 6
Year: 2013





Exploiting the Role of Hardware Prefetchers in Multicore Processors

Author(s): Hasina Khatoon | Shahid Hafeez Mirza | Talat Altaf
Volume: 4
Issue: 6
Year: 2013





A Comprehensive Evaluation of Weight Growth and Weight Elimination Methods Using the Tangent Plane Algorithm

Author(s): P May | E Zhou | C. W. Lee
Volume: 4
Issue: 6
Year: 2013





Format SPARQL Query Results into HTML Report

Author(s): Dr Sunitha Abburu | G.Suresh Babu
Volume: 4
Issue: 6
Year: 2013





A Comparative Study of Three TDMA Digital Cellular Mobile Systems (GSM, IS-136 NA-TDMA and PDC) Based On Radio Aspect

Author(s): Laishram Prabhakar
Volume: 4
Issue: 6
Year: 2013





An Efficient Approach for Image Filtering by Using Neighbors pixels

Author(s): Smrity Prasad | N.Ganesan
Volume: 4
Issue: 6
Year: 2013





Integrating Social Network Services with Vehicle Tracking Technologies

Author(s): Ahmed ElShafee | Mahmoud ElMenshawi | Mena Saeed
Volume: 4
Issue: 6
Year: 2013





A Framework for Creating a Distributed Rendering Environment on the Compute Clusters

Author(s): Ali Sheharyar | Othmane Bouhali
Volume: 4
Issue: 6
Year: 2013





Image and Video based double watermark extraction spread spectrum watermarking in low variance region

Author(s): Mriganka Gogoi | Koushik Mahanta | H.M.Khalid Raihan Bhuyan | Dibya Jyoti Das | Ankita Dutta
Volume: 4
Issue: 6
Year: 2013





A New Algorithm to Represent Texture Images

Author(s): Silvia María Ojeda | Grisel Maribel Britos
Volume: 4
Issue: 6
Year: 2013





Micro Sourcing Strategic Framework for Low Income Group

Author(s): Noor Habibah Arshad | Siti Salwa Salleh | Syaripah Ruzaini Syed Aris | Norjansalika Janom | Norazam Mastuki
Volume: 4
Issue: 6
Year: 2013





Proposed Multi-Modal Palm Veins-Face Biometric Authentication

Author(s): S.F. Bahgat | S. Ghoniemy | M. Alotaibi
Volume: 4
Issue: 6
Year: 2013




