Eliminating Vulnerable Attacks Using One-Time Password and PassText – Analytical Study of Blended Schema

Author(s): M. Viju Prakash | P. Alwin Infant | S. Jeya Shobana
Volume: 1
Issue: 2
Year: 2010





EM/Circuit Co-Simulation: A Highly Accurate Method for Microwave Amplifier Design

Author(s): Syuhaimi Kassim | Fareq Malek
Volume: 1
Issue: 2
Year: 2010





A Novel Business Intelligence System Framework

Author(s): Hanumat G. Sastry | Venkatadri. M | Manjunath. G
Volume: 1
Issue: 2
Year: 2010





A New Strategy for Gene Expression Programming and Its Applications in Function Mining

Author(s): Yongqiang ZHANG | Jing XIAO
Volume: 1
Issue: 2
Year: 2010





An Invisible Communication for Secret Sharing against Transmission Error

Author(s): Rengarajan Amirtharajan | Vivek Ganesan | R Jithamanyu | John Bosco Balaguru Rayappan.
Volume: 1
Issue: 2
Year: 2010





An Energy Aware WSN Geographic Routing Protocol

Author(s): Adel Gaafar A.Elrahim | Hussein A.Elsayed | Salwa El Ramly | Magdy M. Ibrahim
Volume: 1
Issue: 2
Year: 2010





Adaptive System Simulation and Noise Analysis Toolbox (ASSNAT) : The Open-Source Toolbox Developed with Newer Features for Adaptive System Simulation

Author(s): Ajoy Kumar Dey | Susmita Saha | Avijit Saha | Shibani Ghosh
Volume: 1
Issue: 2
Year: 2010





A Dedicated Web-Based Learning System

Author(s): Said Ghoniemy | Ashraf Fahmy | Sultan Aljahdali
Volume: 1
Issue: 2
Year: 2010





Geometric Transformation Technique for Total Hip Implant in Digital Medical Images

Author(s): Azrulhizam Shapi’i | Riza Sulaiman | Abdul Yazid Mohd Kassim
Volume: 1
Issue: 2
Year: 2010





Cancer Diagnosis Using Modified Fuzzy Network

Author(s): Essam Al-Daoud
Volume: 1
Issue: 2
Year: 2010





A New Software Data-Flow Testing Approach via Ant Colony Algorithms

Author(s): Ahmed S. Ghiduk
Volume: 1
Issue: 1
Year: 2010





Effective Method for Extracting Rules from Fuzzy Decision Trees based on Ambiguity and Classifiability

Author(s): Hesham A. Hefny | Ahmed S. Ghiduk | Ashraf Abdel Wahab | Mohammed Elashiry
Volume: 1
Issue: 1
Year: 2010





Model Transformations in Model Driven Architecture

Author(s): Atif Aftab Ahmed Jilani | Muhammad Usman | Zahid Halim
Volume: 1
Issue: 1
Year: 2010





Automatic Model Based Methods to Improve Test Effectiveness

Author(s): Izzat Alsmadi | Samer Samarah | ,Ahmad Saifan | Mohammed G. AL Zamil
Volume: 1
Issue: 1
Year: 2010





Detection of Cardiac Infarction in MRI C-SENC Images

Author(s): Ahmad O. Algohary | Ahmed M. El-Bialy | Ahmed H. Kandil | Nael F. Osman
Volume: 1
Issue: 1
Year: 2010





Distributing Arabic Handwriting Recognition System Based on the Combination of Grid Meta-Scheduling and P2P Technologies (Omnivore)

Author(s): Hassen Hamdi | Maher Khemakhem
Volume: 1
Issue: 1
Year: 2010





Reference Point Based Multi-Objective Optimization Using Hybrid Artificial Immune System

Author(s): Waiel F. Abd El-Wahed | Elsayed M. Zaki | Adel M. El-Refaey
Volume: 1
Issue: 1
Year: 2010





Colour Guided Colour Image Steganography

Author(s): R.Amirtharajan | Sandeep Kumar Behera | Motamarri Abhilash Swarup | Mohamed Ashfaaq K | John Bosco Balaguru Rayappan
Volume: 1
Issue: 1
Year: 2010





Discrete Sine Transform Sectorization for Feature Vector Generation in CBIR

Author(s): H.B.Kekre | Dhirendra Mishra
Volume: 1
Issue: 1
Year: 2010





Transmitting Video-on-Demand Effectively

Author(s): Rachit Mohan Garg | Shipra Kapoor | Kapil Kumar | Mohd. Dilshad Ansari
Volume: 1
Issue: 1
Year: 2010




