EPS2WAY: AN EFFICIENT PAIRWISE TEST DATA GENERATION STRATEGY

Author(s): K.F. Rabbi | Sabira Khatun | Che Yahaya Yaakub | M. F. J. Klaib
Volume: 1
Issue: 4
Year: 2011





A DATA MINING APPROACH TO CONSTRUCT GRADUATES EMPLOYABILITY MODEL IN MALAYSIA

Author(s): Myzatul Akmam Sapaat | Aida Mustapha | Johanna Ahmad | Khadijah Chamili | Rahamirzam Muhamad
Volume: 1
Issue: 4
Year: 2011





MINING FEATURE-OPINION IN EDUCATIONAL DATA FOR COURSE IMPROVEMENT

Author(s): Alaa El-Halees
Volume: 1
Issue: 4
Year: 2011





PERFORMANCE ANALYSIS OF TWO-DIMENSIONAL SYSTOLIC ARRAY MATRIX MULTIPLICATION WITH ORTHOGONAL INTERCONNECTIONS

Author(s): A.H.M. Shapri | N.A.Z. Rahman
Volume: 1
Issue: 4
Year: 2011





EVALUATION OF STUDENT'S NOTES IN A BLENDED LEARNING COURSE

Author(s): Minoru Nakayama | Kouichi Mutsuura | Hiroh Yamamoto
Volume: 1
Issue: 4
Year: 2011





ONLINE INSTRUCTIONAL CONSULTATION FOR HIGHER EDUCATION INSTITUTIONS IN MALAYSIA: THE SYSTEM ARCHITECTURE

Author(s): Ang Ling Weay | Abd Hadi Bin Abd Razak
Volume: 1
Issue: 4
Year: 2011





WEB CONTENT ADAPTATION FOR MOBILE DEVICES: A GREEDY APPROACH

Author(s): Rajibul Anam | Chin Kuan Ho and Tek Yong Lim
Volume: 1
Issue: 4
Year: 2011





DIMENSION REDUCTION OF HEALTH DATA CLUSTERING

Author(s): Rahmat Widia Sembiring | Jasni Mohamad Zain | Abdullah Embong
Volume: 1
Issue: 4
Year: 2011





REMOVING DUPLICATIONS IN EMAIL ADDRESSES IN LINEAR TIME

Author(s): Eyas El-Qawasmeh
Volume: 1
Issue: 4
Year: 2011





STRUCTURING THE INFORMATION SYSTEM ARCHITECTURE USING PATTERNS

Author(s): Shokoofeh Ketabchi | Navid Karimi Sani | Kecheng Liu
Volume: 1
Issue: 4
Year: 2011





CYBER FORENSICS COMPETENCY-BASED FRAMEWORK - AREVIEW

Author(s): Elfadil Sabeil | Azizah Bt Abdul Manaf | Zuraini Ismail | Mohamed Abas
Volume: 1
Issue: 4
Year: 2011





AUGMENTING INTUITIVENESS WITH WHEELCHAIR INTERFACE USING NINTENDO WIIMOTE

Author(s): Mahmood Ashraf | Masitah Ghazali
Volume: 1
Issue: 4
Year: 2011





A PROPOSED FRAMEWORK FOR USE CASE BASED EFFORT ESTIMATION USING FUZZY LOGIC: BUILDING UPON THE OUTCOMES OF A SYSTEMATIC LITERATURE REVIEW

Author(s): Mohammed Wajahat Kamal | Moataz A. Ahmed
Volume: 1
Issue: 4
Year: 2011





REVIEW ON TRADITIONAL AND AGILE COST ESTIMATION SUCCESS FACTOR IN SOFTWARE DEVELOPMENT PROJECT

Author(s): Zulkefli Mansor | Saadiah Yahya | Noor Habibah Hj Arshad
Volume: 1
Issue: 4
Year: 2011





A STUDY ON THE EVALUATION OF UNIT TESTING FOR ANDROID SYSTEMS

Author(s): Ben Sadeh | Sundar Gopalakrishnan
Volume: 1
Issue: 4
Year: 2011





BUILDING FUZZY GOAL PROGRAMMING WITH FUZZY RANDOM LINEAR PROGRAMMING FOR MULTI-LEVEL MULTI-OBJECTIVE PROBLEM

Author(s): Nureize Arbaiy | Junzo Watada
Volume: 1
Issue: 4
Year: 2011





A COMPARATIVE PERFORMANCE ANALYSIS OF GAUSSIAN DISTRIBUTION FUNCTIONS IN ANT SWARM OPTIMIZED ROUGH REDUCTS

Author(s): Lustiana Pratiwi | Yun-Huoy Choo | Azah Kamilah Muda
Volume: 1
Issue: 4
Year: 2011





ANALYSIS OF COMPOUND ENHANCEMENT ALGORITHMS (CEA) BASED ON ADAPTIVE HISTOGRAM EQUALIZATION (AHE) ON INTRA-ORAL DENTAL RADIOGRAPHS IMAGES

Author(s): Siti Arpah Ahmad | Mohd Nasir Taib | NoorElaiza Abd Khalid | Rohana Ahmad
Volume: 1
Issue: 4
Year: 2011





IMPROVEMENTS OF BACK PROPAGATION ALGORITHM PERFORMANCE BY ADAPTIVELY CHANGING GAIN, MOMENTUM AND LEARNING RATE

Author(s): Norhamreeza Abdul Hamid | Nazri Mohd Nawi | Rozaida Ghazali | Mohd Najib Mohd Salleh.
Volume: 1
Issue: 4
Year: 2011





SEMANTIC TECHNOLOGY AND SUPER-PEER ARCHITECTURE FOR INTERNET BASED DISTRIBUTED SYSTEM RESOURCE DISCOVERY

Author(s): Mahamat Issa Haasn
Volume: 1
Issue: 4
Year: 2011





IMPROVING THE ACCURACY OF GRADIENT DESCENT BACK PROPAGATION ALGORITHM (GDAM) ON CLASSIFICATION PROBLEMS

Author(s): M. Z. Rehman | N. M. Nawi
Volume: 1
Issue: 4
Year: 2011





MODEL-BASED WEB COMPONENTS TESTING: PRIORITIZATION USING MIDS AND CENTRALITY MEASURES

Author(s): Ahmed Al-Herz | Moataz Ahmed
Volume: 1
Issue: 4
Year: 2011





SOLVING SMALL SAMPLE RECIPE GENERATION PROBLEM WITH HYBRID WKRCF-PSO

Author(s): Mohd Ibrahim Shapiai | Zuwairie Ibrahim | Marzuki Khalid | Lee Wen Jau | Soon-Chuan Ong | Vladimir Pavlovich
Volume: 1
Issue: 4
Year: 2011





PROTECTION OF PERSONAL INFORMATION BASED ON USER PREFERENCE

Author(s): Kenichi Takahashi | Takanori Matsuzaki | Tsunenori Mine | Takao Kawamura | Kazunori Sugahara
Volume: 1
Issue: 4
Year: 2011





INTEGRATING WORKFLOW-BASED MOBILE AGENTS WITH CLOUD BUSINESS PROCESS MANAGEMENT SYSTEMS

Author(s): Antons Mislevics | Janis Grundspenkis
Volume: 2
Issue: 4
Year: 2012





CONVERSION STRATEGY OF A SYSTEM OF COLLABORATING DESIGN PATTERNS INTO UML DIAGRAM FOR DESIGN PATTERN

Author(s): Muhazam Mustapha | Nik Ghazali Nik Daud | Indika Udawatta | Manjula Atapattu
Volume: 1
Issue: 4
Year: 2011





AGENTS BASED ADAPTIVE HYPERMEDIA SYSTEM WITH THE COMPETENCY APPROACH

Author(s): Jose Sergio Magdaleno-Palencia | Mario Garcia-Valdez | Manuel Castanon-Puga | Bogart Yail Marquez
Volume: 1
Issue: 4
Year: 2011





NEW WINDOWING TECHNIQUE DETECTION OF SAGS AND SWELLS BASED ON CONTINUOUS S-TRANSFORM (CST)

Author(s): K. Daud | A. F. Abidin | N. Hamzah | H. S. Nagindar Singh
Volume: 2
Issue: 4
Year: 2012





REALIZATION OF IP CORE FOR ROBOT CONTROLLED TRENCHING SYSTEM

Author(s): C. S. Mala | S. Ramachandran
Volume: 2
Issue: 4
Year: 2012





PERFORMANCE ANALYSIS AND GRID COMPUTING ON WIDE AREA

Author(s): Gianni Fenu | Marco Nitti | Pier Luigi Pau
Volume: 2
Issue: 4
Year: 2012





Mining Positive and Negative Association Rules: An Approach for Binary Trees

Author(s): John Tsiligaridis
Volume: 3
Issue: 3
Year: 2013





Management of Temporal System – Column Level

Author(s): Michal Kvet | Karol Matiaško
Volume: 3
Issue: 3
Year: 2013





Task Scheduling in Multiprocessor System using Fork-Join Method (TSFJ)

Author(s): Ranjit Rajak | C.P.Katti
Volume: 3
Issue: 3
Year: 2013





EVALUATING COMPLEXITY OF TASK KNOWLEDGE PATTERNS THROUGH REUSABILITY ASSESSMENT

Author(s): Cheah WaiShiang | Cheah WaiShiang | Edwin Mit | Azman Bujang Masli
Volume: 1
Issue: 3
Year: 2011





TOWARDS A DYNAMIC FILE INTEGRITY MONITOR THROUGH A SECURITY CLASSIFICATION

Author(s): Zul Hilmi Abdullah | Nur Izura Udzir | Ramlan Mahmod | and Khairulmizam Samsudin
Volume: 1
Issue: 3
Year: 2011





DYNAMIC LOAD BALANCING POLICY WITH COMMUNICATION AND COMPUTATION ELEMENTS IN GRID COMPUTING WITH MULTI-AGENT SYSTEM INTEGRATION

Author(s): Bakri Yahaya | Rohaya Latip | Mohamed Othman | Azizol Abdullah
Volume: 1
Issue: 3
Year: 2011





INTEGRATED KMS@EWS OF CONCEPTUAL IMPLEMENTATION MODEL FOR CLINICAL DENGUE FEVER ENVIRONMENT

Author(s): Norzaliha Mohamad Noor | Rusli Abdullah | Mohd Hasan Selamat
Volume: 1
Issue: 3
Year: 2011





DERIVATION OF STOCHASTIC REWARD NET (SRN) FROM UML SPECIFICATION CONSIDERING COST EFFICIENT DEPLOYMENT MANAGEMENT OF COLLABORATIVE SERVICE COMPONENTS

Author(s): Razib Hayat Khan | Poul E. Heegaard
Volume: 1
Issue: 3
Year: 2011





AN EXTENDED SIMULATION OF COMPLEX TASK PARTITIONING METHOD IN ASELF-ORGANIZED ROBOTICS SWARM

Author(s): Mehrdad Jangjou | Alireza Bagheri | Mohammad Mansour Riahi Kashani | Koosha Sadeghi Oskooyee
Volume: 1
Issue: 3
Year: 2011





OPTIMIZING DECISION TREE IN MALWARE CLASSIFICATION SYSTEM BY USING GENETIC ALGORITHM

Author(s): Mohd Najwadi Yusoff | Aman Jantan
Volume: 1
Issue: 3
Year: 2011





APPLYING ROUGH SET THEORY IN MULTIMEDIA DATA CLASSIFICATION

Author(s): M Nordin A Rahman | Yuzarimi M Lazim | Farham Mohamed
Volume: 1
Issue: 3
Year: 2011





BLOG QUALITY MEASUREMENT: ANALYSIS OF CRITERIA USING THE RASCH MODEL

Author(s): Zuhaira Muhammad Zain | Abdul Azim Abd Ghani | Rusli Abdullah | Rodziah Atan | Razali Yaakob
Volume: 1
Issue: 3
Year: 2011





CLASSIFICATION AND MEASUREMENT ON C OVERFLOW VULNERABILITIES ATTACK

Author(s): Nurul Haszeli Ahmad | Syed Ahmad Aljunid | Jamalul-lail Ab Manan
Volume: 1
Issue: 3
Year: 2011





SEMANTIC WEB SERVICE COMPOSITION APPROACHES: OVERVIEW AND LIMITATIONS

Author(s): Furkh Zeshan | Radziah Mohamad
Volume: 1
Issue: 3
Year: 2011





ONE-TIME KEY AND DIAMETER MESSAGE AUTHENTICATION PROTOCOL FOR PROXY MOBILE IPV6

Author(s): Md. Mahedi Hassan | Poo Kuan Hoong
Volume: 1
Issue: 3
Year: 2011





FACTORS FOR KMS POST ADOPTION: THE EXPLORATORY STUDY IN OIL AND GAS INDUSTRY IN MALAYSIA

Author(s): Sureena Matayong | Ahmad Kamil Bin Mahmood
Volume: 1
Issue: 3
Year: 2011





AN EMPIRICAL FRAMEWORK DESIGN TO EXAMINE THE IMPROVEMENT IN SOFTWARE REQUIREMENTS THROUGH NEGOTIATION

Author(s): Sabrina Ahmad | Noor Azilah Muda
Volume: 1
Issue: 3
Year: 2011





COMPUTATIONALLY INEXPENSIVE SEQUENTIAL FORWARD FLOATING SELECTION FOR ACQUIRING SIGNIFICANT FEATURES FOR AUTHORSHIP INVARIANCENESS IN WRITER IDENTIFICATION

Author(s): Satrya Fajri Pratama | Azah Kamilah Muda | Yun-Huoy Choo | and Noor Azilah Muda
Volume: 1
Issue: 3
Year: 2011





MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL

Author(s): Muhammad Qaiser Saleem | Jafreezal Jaafar | Mohd Fadzil Hassan
Volume: 1
Issue: 3
Year: 2011





EXPLORATION ON SCALABILITY OF DATABASE BULK INSERTION WITH MULTITHREADING

Author(s): Boon-Wee Low | Boon-Yaik Ooi | and Chee-Siang Wong
Volume: 1
Issue: 3
Year: 2011





QOS MEASUREMENT OF SINGLE-HOP PERIODIC COMMUNICATION IN VEHICULAR ENVIRONMENT

Author(s): Bilal Munir Mughal | Asif Ali Wagan | Halabi Hasbullah
Volume: 1
Issue: 3
Year: 2011





DETECTING SLEEP DEPRIVATION ATTACK OVER MANET USING A DANGER THEORY-BASED ALGORITHM

Author(s): Maha Abdelhaq | Rosilah Hassan | Mahamod Ismail | Raed Alsaqour | Daud Israf
Volume: 1
Issue: 3
Year: 2011





REUSABILITY ASSESSMENT OF OPEN SOURCE COMPONENTS FOR SOFTWARE PRODUCT LINES

Author(s): Fazal-e- Amin | Ahmad Kamil Mahmood | Alan Oxley
Volume: 1
Issue: 3
Year: 2011





IEEE802.11A STANDARD PERFORMANCE IN MOBILE ENVIRONMENT

Author(s): Janis Jansons | Arturs Barancevs | Ernests Petersons | Nikolajs Bogdanovs
Volume: 2
Issue: 3
Year: 2012





ANALYSIS OF FIXED PRIORITY SWAP SCHEDULING POLICY FOR REAL-TIME AND NON REAL-TIME JOBS

Author(s): Michael Okopa | Tonny Bulega
Volume: 2
Issue: 3
Year: 2012





FACE EXPRESSION RECOGNITION USING AUTOREGRESSIVE MODELS TO TRAIN NEURAL NETWORK CLASSIFIERS

Author(s): M. Saaidia | A. Gattal | M. Maamri | M. Ramdani
Volume: 2
Issue: 3
Year: 2012





URBAN GROWTH SIMULATION: UTILIZING A MULTIDIMENSIONAL METHODOLOGY

Author(s): Bogart Yail Marquez | Alejandro Brugues-Rodriguez
Volume: 2
Issue: 3
Year: 2012





ANALYZING THE BASIC PERFORMANCE OF IEEE802.11G/N

Author(s): Janis Jansons | Toms Dorins | Nikolajs Bogdanovs
Volume: 2
Issue: 3
Year: 2012





SERVICE AVAILABILITY AND ACCESSIBILITY OF REQUIREMENTS USINGCLUSTERING IN CLOUD ENVIRONMENT

Author(s): Thamilvaani Arvaree Alvar | Rodziah Atan
Volume: 2
Issue: 3
Year: 2012





CONTEDI - APPLICATION DEVELOPMENT FOR TVDI

Author(s): Adriana X. Reyes G | Gustavo A. Moreno | Jovani Jimenez B.
Volume: 2
Issue: 3
Year: 2012





TIMELINESS MEASUREMENT MODEL: A MATHEMATICAL APPROACH FOR MEASURING THE TIMELINESS OF HANDHELD APPLICATION USAGE

Author(s): Amalina Farhi Ahmad Fadzlah
Volume: 2
Issue: 3
Year: 2012





AUTOMATED REASONING TECHNIQUES FOR SYSTEM CORRECTNESS VERIFICATION

Author(s): Hasan Krad
Volume: 2
Issue: 3
Year: 2012





EVOLUTIONARY TECHNIQUES IN SYNTHESIS OF MULTIPLE-VALUED LOGIC FUNCTIONS

Author(s): Mostafa Abd-El-Barr
Volume: 2
Issue: 3
Year: 2012





TRANSFORMING OBJECT ORIENTED DATA MODEL TO RELATIONAL DATA MODEL

Author(s): Mohd Khalid Awang | Nur Lian Labadu
Volume: 2
Issue: 3
Year: 2012





Adaptive VLSI Architecture of Beam Former for Active Phased Array Radar

Author(s): D. Govind Rao | N. S. Murthy | A. Vengadarajan
Volume: 3
Issue: 2
Year: 2013





Large Sending Offload: Design and Implementation for High-Speed Communications Rate up to 100 Gbps

Author(s): Mohamed Elbeshti | Mike Dixon | Terry Koziniec
Volume: 3
Issue: 2
Year: 2013





T-WAY STRATEGIES AND ITS APPLICATIONS FOR COMBINATORIAL TESTING

Author(s): Rozmie R. Othman | Kamal Z. Zamli
Volume: 1
Issue: 2
Year: 2011





GUIDELINES FOR COLLECTING AND CENTRALIZING NETWORK DIGITAL EVIDENCES

Author(s): Mohammed Abbas | Azizah Abdul Manaf | Elfadil Sabeil
Volume: 1
Issue: 2
Year: 2011





QUANTIFYING TEXT-BASED PUBLIC€'S EMOTION AND DISCUSSION ISSUES IN ONLINE FORUM

Author(s): Siti Z. Z. Abidin | Nasiroh Omar | Muhammad H.M. Radzi and Mohammad B.C. Haron
Volume: 1
Issue: 2
Year: 2011





AGENT-BASED MOM INTEROPERABILITY FRAMEWORK FOR INTEGRATION AND COMMUNICATION OF DIFFERENT SOA APPLICATIONS

Author(s): Najhan M.Ibrahim | Mohd Fadzil Hassan | Zain Balfagih
Volume: 1
Issue: 2
Year: 2011





AUTOMATIC DOCUMENT STRUCTURE ANALYSIS OF STRUCTURED PDF FILES

Author(s): Rosmayati Mohemad | Abdul Razak Hamdan | Zulaiha Ali Othman | Noor MaizuraMohamad Noor
Volume: 1
Issue: 2
Year: 2011





THE CONSTRUCTION OF BALANCED BOUNDING-VOLUME HIERARCHIES USING SPATIAL OBJECT MEDIAN SPLITTING METHOD FOR COLLISION DETECTION

Author(s): Hamzah Asyrani Sulaiman | Abdullah Bade
Volume: 1
Issue: 2
Year: 2012





AN ENHANCED REMOTE AUTHENTICATION SCHEME USING SECURE KEY EXCHANGE PROTOCOL WITH PLATFORM INTEGRITY ATTESTATION

Author(s): Fazli Bin Mat Nor | Kamarularifin Abd Jalil | Jamalul-lail Ab Manan
Volume: 1
Issue: 2
Year: 2011





REQUIREMENT ELICITATION: IDENTIFYING THE COMMUNICATION CHALLENGES BETWEEN DEVELOPER AND CUSTOMER

Author(s): Noraini Che Pa | Abdullah Mohd Zin
Volume: 1
Issue: 2
Year: 2011





HUMAN IDENTIFICATION BASED ON EXTRACTED GAIT FEATURES

Author(s): Hu Ng | Hau-Lee Ton | Wooi-Haw Tan | Timothy Tzen-Vun Yap | Pei-Fen Chong | Junaidi Abdullah
Volume: 1
Issue: 2
Year: 2011





EVALUATION AND SELECTION COTS SOFTWARE PROCESS: THE STATE OF THE ART

Author(s): Feras Tarawneh | Fauziah Baharom | Jamaiah Hj. Yahaya | Faudziah Ahmad
Volume: 1
Issue: 2
Year: 2011





MITIGATION OF BLACK HOLE ATTACKS FOR AODV ROUTING PROTOCOL

Author(s): Kamarularifin Abd. Jali | Zaid Ahmad | Jamalul-Lail Ab Manan
Volume: 1
Issue: 2
Year: 2011





A STUDY ON RISK ASSESSMENT FOR SMALL AND MEDIUM SOFTWARE DEVELOPMENT PROJECTS

Author(s): Abdullahi Mohamud Sharif | Shuib Basri
Volume: 1
Issue: 2
Year: 2011





A SCALABLE BLOCK COMPENSATION WITH INDEX SELECTION MECHANISM TO ACHIEVE HIGH VIDEO QUALITY RETRIEVAL

Author(s): Ta- Te Lu | Tsung-Hsuan Tsai | Jia-Yuan Wu
Volume: 1
Issue: 2
Year: 2011





A BIO-INSPIRED MUSIC GENRE CLASSIFICATION FRAMEWORK USING MODIFIED AIS-BASED CLASSIFIER

Author(s): Noor Azilah Draman | Sabrina Ahmad | Azah Kamilah Muda
Volume: 1
Issue: 2
Year: 2011





FUZZY MODELS APPLIED TO COMPLEX SOCIAL SYSTEMS: MODELING POVERTY USING DISTRIBUTED AGENCIES

Author(s): Bogart Yail Márquez | Manuel Castañon-Puga | Juan R. Castro | Eugenio D. Suarez | José Sergio Magdaleno-Palencia
Volume: 1
Issue: 2
Year: 2011





THE USE OF SOFT COMPUTING FOR MEASURING THE QUALITY OF EDUCATION:

Author(s): Sergio Valdés-Pasarón | Bogart Yail Márquez | Juan Manuel Ocegueda-Hernández
Volume: 1
Issue: 2
Year: 2011





SHADOW MAPPING OR SHADOW VOLUME?

Author(s): Hoshang Kolivand | Mohd Shahrizal Sunar
Volume: 1
Issue: 2
Year: 2011





NEURAL NETWORK APPLICATION IN RESERVOIR WATER LEVEL FORECASTING AND RELEASE DECISION

Author(s): Wan Hussain Wan Ishak | Ku Ruhana Ku-Mahamud | Norita Md Norwawi
Volume: 1
Issue: 2
Year: 2011





AN AGENT TOOL FOR INTEGRATING COMPONENT BASED APPLICATIONS

Author(s): Ebtehal Alsaggaf | Prof.Dr. Fathy albouraey
Volume: 1
Issue: 2
Year: 2011





COLLABORATION, WEALTH AND VALUE CREATION, SMES€' HALAL PRODUCTS COMMUNITIES, AND INFORMATION SYSTEMS

Author(s): Alfi Khairiansyah Machfud | Abdul Rahman Ahmad Dahlan | Jawdat Khatib | Ahmed Abdulaziz Haji-Ahmed
Volume: 1
Issue: 2
Year: 2011





COLLABORATIVE LEARNING THROUGH FACIAL EXPRESSION FOR SPECIAL CHILDREN

Author(s): Nia Valeria | Lau Bee Theng
Volume: 1
Issue: 2
Year: 2011





ANALYSIS OF DELAY PERFORMANCE IN EFFICIENT DBA WITH GLOBAL PRIORITY FOR EPON

Author(s): Nurul Asyikin Mohamed Radzi | Norashidah Md. Din | Mohammed Hayder AlMansoori | Mohd. Shahmi Abdul Majid
Volume: 1
Issue: 2
Year: 2011





USING SUBTHRESHOLD SRAM TO DESIGN LOW-POWER CRYPTO HARDWARE

Author(s): Adnan Abdul-Aziz Gutub | Esam Ali Khan
Volume: 1
Issue: 2
Year: 2011





IA-TCP: IMPROVING ACKNOWLEDGEMENT MECHANISM OF TCP FOR BETTER PERFORMANCE IN MANET

Author(s): Sofiane Hamrioui | Mustapha Lalam | Pascal Lorenz
Volume: 2
Issue: 2
Year: 2012





TURBO CODES FOR PULSE POSITION MODULATION: APPLYING BCJR ALGORITHM ON PPM SIGNALS

Author(s): Serj Haddad | Chadi Abou-Rjeily
Volume: 2
Issue: 2
Year: 2012





Automatic Control of Configuration of Web Anonymization

Author(s): Tomas Sochor
Volume: 3
Issue: 2
Year: 2013





A MODIFIED COMPLEX PERMITTIVITY MEASUREMENT TECHNIQUE AT MICROWAVE FREQUENCY

Author(s): Salah I. Yahya Al-Mously
Volume: 2
Issue: 2
Year: 2012





A SURVEY ON COST ESTIMATION PROCESS IN MALAYSIA SOFTWARE INDUSTRY

Author(s): Zulkefli Mansor | Zarinah Mohd Kasirun | Saadiah Yahya | Noor Habibah Hj Arshad
Volume: 2
Issue: 2
Year: 2012





CONTINUOUS FUNCTIONING OF SOFT SYSTEM BUS BASED CENTRALIZED PERSISTENT COMPUTING SYSTEM

Author(s): Quazi Mahera Jabeen | Muhammad Anwarul Azim | Yuichi Goto | Jingde Cheng
Volume: 2
Issue: 2
Year: 2012





STUDY OF THE EFFECTED GENETIC WATERMARKING ROBUSTNESS UNDER DCT AND DWT DOMAINS

Author(s): Abduljabbar Shaamala | Azizah A. Manaf
Volume: 2
Issue: 2
Year: 2012





DYNAMIC WEIGHT PARAMETER FOR THE RANDOM EARLY DETECTION (RED) IN TCP NETWORKS

Author(s): Nabhan Hamadneh | David Murray | Michael Dixon | Peter Cole
Volume: 2
Issue: 2
Year: 2012





REALITY OF ALIGNING IT WITH BUSINESS IN CZECH ORGANIZATIONS

Author(s): Renata Kunstova
Volume: 2
Issue: 1
Year: 2012





PERFORMANCE INVESTIGATIONS OF SOME ACTIVE QUEUE MANAGEMENT TECHNIQUES USING SIMULATION

Author(s): Hussein Abdel-jaber | Fadi Thabtah | Amjad M Daoud,Jafar Ababneh | Mahmoud Baklizi
Volume: 2
Issue: 1
Year: 2012





A STUDY OF THE TREND OF SMARTPHONE AND ITS USAGE BEHAVIOR IN MALAYSIA

Author(s): Mohd Azam Osman | Abdullah Zawawi Talib | Zainal Abidin Sanusi | Tan Shiang-Yen | Abdullah Sani Alwi
Volume: 2
Issue: 1
Year: 2012





SUPPLIER SELECTION BASED ON MULTIPLE CRITERIA

Author(s): Reza Allahyari Soeini | Laleh Tashakor | Javad Tashakori Bafghi | Mohammad Mokhtari | Amin Vakili
Volume: 2
Issue: 1
Year: 2012





EFFICIENT INFORMATION DISSEMINATION AND COLLECTION STRATEGIES FOR WIRELESS SENSOR NETWORKS

Author(s): S. K. Makki | B. Sun1 | L. Osborne | A. Husain | James Carnley
Volume: 2
Issue: 1
Year: 2012





A META-MODELING AND GRAPH GRAMMAR APPROACH FOR MODELING AND ANALYSIS OF E-ENTREPRENEURSHIP SYSTEMS

Author(s): Mouna Bouarioua | Allaoua Chaoui | Raida Elmansouri
Volume: 2
Issue: 1
Year: 2012





PUBLICATIONS' CLASSIFICATION ANALYSIS USING CONCEPT LATTICES

Author(s): Saleh Alwahaishi | Jan Martinovic | Vaclav Snasel
Volume: 2
Issue: 1
Year: 2012





INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USING DNA STEGANOGRAPHY

Author(s): Mohammad Reza Najaf Torkaman | Nazanin Sadat Kazazi | Azizallah Rouddini
Volume: 2
Issue: 1
Year: 2012





METHOD FOR GENERATING DC-DC CONVERTERS WITH REQUIRED CHARACTERISTICS

Author(s): Murad Ahmed Ali Taher
Volume: 2
Issue: 1
Year: 2012





EMPLOYING SEMANTIC WEB TECHNOLOGIES IN FINANCIAL INSTRUMENTS TRADING

Author(s): Dejan Lavbic | Marko Bajec
Volume: 2
Issue: 1
Year: 2012





DNA BASE DATA HIDING ALGORITHM

Author(s): Mohammad Reza Abbasy | Pourya Nikfard | Ali Ordi | Mohammad Reza Najaf Torkaman
Volume: 2
Issue: 1
Year: 2012





WEB INTERACTIVE MULTIMEDIA TECHNOLOGY: IMPLEMENTATION FROM TWO PERSPECTIVES

Author(s): Asma Md Ali | Joan Richardson
Volume: 2
Issue: 1
Year: 2012





INTELLIGENT SYSTEM FOR PERSONALIZING STUDENTS' ACADEMIC BEHAVIORS- A CONCEPTUAL FRAMEWORK

Author(s): Azwa Abdul Aziz | Wan Mohd Rizhan Wan Idris | Hasni Hassan | Julaily Aida Jusoh
Volume: 2
Issue: 1
Year: 2012





CYBER FORENSICS: COMPUTER SECURITY AND INCIDENTRESPONSE

Author(s): Virginiah Sekgwathe | Mohammad Talib
Volume: 2
Issue: 1
Year: 2012





PUBLISHING WEB SERVICES WHICH ENABLE SYSTEMATIC SEARCH

Author(s): Vitezslav Nezval
Volume: 2
Issue: 1
Year: 2012





THE INTEGRATION OF ACTUAL AND VIRTUAL LEARNING SPACES IN RURALSCHOOLS

Author(s): Ken Stevens
Volume: 2
Issue: 1
Year: 2012





ONLINE SURVEYS SYSTEM WITH ENHANCED AUTHENTICATION INTELLIGENCE: A CASE OF ONLINE COURSE EVALUATION SYSTEM

Author(s): Kosmas Kapis | Sijali Petro Korojelo
Volume: 2
Issue: 1
Year: 2012





SECURE COMMUNICATION BASED ON QI HYPER-CHAOS

Author(s): Dennis Luke Owuor | Guoyuan Qi
Volume: 2
Issue: 1
Year: 2012





A REDUCED RANK STAP AND STAGGERED PRF FOR MULTIPLE TARGETSITUATIONS

Author(s): Samira Dib | Mourad Barkat | IEEE Fellow | Jean-Marie Nicolas | Morad Grimes
Volume: 2
Issue: 1
Year: 2012





SESSION TIMEOUT THRESHOLDS IMPACT ON QUALITY AND QUANTITY OF EXTRACTED SEQUENCE RULES

Author(s): Martin Drlik | Michal Munk
Volume: 2
Issue: 1
Year: 2012





MULTI-PEOPLE TRACKING ACROSS MULTIPLE CAMERAS

Author(s): Faouzi Alaya Cheikh | Sajib Kumar Saha | Victoria Rudakova | Peng Wang
Volume: 2
Issue: 1
Year: 2012





TRACING ONE NEURON ACTIVITY FROM THE INSIDE OF ITS STRUCTURE

Author(s): Luciana Morogan
Volume: 2
Issue: 1
Year: 2012





AN ALGORITHM FOR DETECTING CYCLES IN UNDIRECTED GRAPHS USING CUDA TECHNOLOGY

Author(s): Maytham Safar | Fahad Mahdi | Khaled Mahdi
Volume: 2
Issue: 1
Year: 2012





SINGULAR POINT DETECTION FOR EFFICIENT FINGERPRINT CLASSIFICATION

Author(s): Ali Ismail Awad | Kensuke Baba
Volume: 2
Issue: 1
Year: 2012





INFRASTRUCTURE SHARING: A COST EFFECTIVE ALTERNATIVE FOR RESILIENCY IN 4G-LTE MOBILE NETWORKS

Author(s): Venmani Daniel Philip | Yvon GOURHANT | Djamal ZEGHLACHE
Volume: 2
Issue: 1
Year: 2012





COOPERATIVE MECHANISMS TO CARRY AND FORWARD PACKETS IN A DTN VANET

Author(s): Gianni Fenu | Marco Nitti
Volume: 1
Issue: 1
Year: 2011





A REGION-BASED MODEL AND BINARY LEVEL SET FUNCTION APPLIED TO WELD DEFECTS DETECTION IN RADIOGRAPHIC IMAGES

Author(s): Yamina Boutiche
Volume: 1
Issue: 1
Year: 2011





SIMPLE DESIGN METHOD OF MIMO MULTIUSER DOWNLINK SYSTEM BASED ON BLOCK-DIAGONALIZATION

Author(s): T. taniguchi | Y. Karasawa | N. Natajima
Volume: 1
Issue: 1
Year: 2011





MAXIMUM LIKELIHOOD CURVES FOR MULTIPLE OBJECTS EXTRACTION: APPLICATION TO RADIOGRAPHIC INSPECTION FOR WELD DEFECTS DETECTION

Author(s): Aicha Baya Goumeidane | Mohammed Khamadja | Nafaa Nacereddine
Volume: 1
Issue: 1
Year: 2011





COMBINING STEGANOGRAPHY AND CRYPTOGRAPHY: NEW DIRECTIONS

Author(s): Khalil Challita | Hikmat Farhat
Volume: 1
Issue: 1
Year: 2011





DIFFERENCES BETWEEN THE ANSWERS OF QUESTIONNAIRE INVESTIGATION AND REAL BEHAVIOR OF THE STUDENTS IN THE E-COURSE FOR HEALTHCARE

Author(s): Martin Cápay | Zoltán Balogh | Michal Munk | Miroslava Mesárošová
Volume: 1
Issue: 1
Year: 2011





ENHANCEMENT OF LEARNING AND TEACHING IN COMPUTER GRAPHICS THROUGH MARKER AUGMENTED REALITY TECHNOLOGY

Author(s): Malinka Ivanova | Georgi Ivanov
Volume: 1
Issue: 1
Year: 2011





JOINT CHANNEL-DIVERSITY CODING FOR THE THREE-WAY FREE-SPACE OPTICAL SYSTEMS THROUGH ATMOSPHERIC-TURBULENCE CHANNELS

Author(s): Chadi Abou-Rjeily
Volume: 1
Issue: 1
Year: 2011





IMPROVING TRANSPORT PROTOCOL PERFORMANCE IN MANET BY EXPLOITING THE BACKOFF ALGORITHM OF MAC PROTOCOL

Author(s): Sofiane Hamrioui | Mustapha Lalam
Volume: 1
Issue: 1
Year: 2011





EMPIRICAL INVESTIGATION ON COGNITIVE USER INTERFACE DIMENSIONS

Author(s): Natrah Abdullah | Wan Adilah Wan Adnan | Nor Laila Md Noor
Volume: 1
Issue: 1
Year: 2011





APPLICATION OF HYBRID WAVELET-FRACTAL COMPRESSION ALGORITHM FOR RADIOGRAPHIC IMAGES OF WELD DEFECTS

Author(s): Faiza Mekhalfa | Daoud Berkani
Volume: 1
Issue: 1
Year: 2011





AN EFFICIENT TEMPORAL PARTITIONING ALGORITHM TO MINIMIZE COMMUNICATION COST FOR RECONFIGURABLE COMPUTING SYSTEMS

Author(s): Ramzi. Ayadi | Bouaoui. Ouni | Abdellatif. Mtibaa
Volume: 1
Issue: 1
Year: 2011





METADATA-DERIVED KEYWORDS FOR EFFECTIVE NAVIGATION AND ACCESS IN PERSONAL FILE HIERARCHIES

Author(s): Gontlafetse Mosweunyane | Leslie Carr | Nicholas Gibbins
Volume: 1
Issue: 1
Year: 2011





A TRAINING BASED TRANSMISSION PERIOD SETTING PROTOCOL

Author(s): Guangri Jin | Li Gong | Hiroshi Furukawa
Volume: 1
Issue: 1
Year: 2011





EVALUATING SOFTWARE MAINTENANCE TESTING APPROACHES TO SUPPORT TEST CASE EVOLUTION

Author(s): Othman Mohd Yusop | Suhaimi Ibrahim
Volume: 1
Issue: 1
Year: 2011





DATABASE PREPROCESSING AND COMPARISON BETWEEN DATA MINING METHODS

Author(s): Yas A. Alsultanny
Volume: 1
Issue: 1
Year: 2011





REVERSIBLE DATA HIDING BASED ON STATISTICAL CORRELATION OF BLOCKED SUB-SAMPLED IMAGE

Author(s): Mona Nafari | Mansour Nejati Jahromi | Gholam HoseinSheisi
Volume: 1
Issue: 1
Year: 2011





DNA SECURITY USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY

Author(s): Radu Terec | Mircea-Florin Vaida | Lenuta Alboaie | Ligia Chiorean
Volume: 1
Issue: 1
Year: 2011





A MUTLI-AGENT SYSTEM FOR FIREWALL FORENSICS ANALYSIS

Author(s): Hassina Bensefia | Nacira Ghoualmi
Volume: 1
Issue: 1
Year: 2011





HEP: CONTEXT-AWARE COMMUNICATION SYSTEM

Author(s): Bachir Chihani | Emmanuel Bertin | Fabrice Jeanne | Noel Crespi
Volume: 1
Issue: 1
Year: 2011





ASSESSMENT PROCEDURE OF THE EM INTERACTION BETWEEN MOBILE PHONE ANTENNAE AND HUMAN BODY

Author(s): Salah I. Al-Mously
Volume: 1
Issue: 1
Year: 2011





ULTRA-LOW COMPLEXITY CONTROL MECHANISMS FOR SENSOR NETWORKS AND ROBOTIC SWARMS

Author(s): Matthias Scheutz | Peter Bauer
Volume: 3
Issue: 1
Year: 2013





PROCESSING XML WITH JAVA – A PERFORMANCE BENCHMARK

Author(s): Bruno Oliveira | Vasco Santos | Orlando Belo
Volume: 3
Issue: 1
Year: 2013





SCHEDULING TECHNIQUES TO CLASSIFY WEAR PARTICLES ON MULTI-COMPUTERS

Author(s): Mohammad Shakeel Laghari | Gulzar Ali Khuwaja
Volume: 3
Issue: 1
Year: 2013





STUDY OF THE DYNAMIC RESPONSE AND STATUS OF THE VEHICLE SUSPENSION ELEMENTS

Author(s): Emil Iontchev | Rosen Miletiev | Vladimir Bashev | Ivaylo Simeonov
Volume: 3
Issue: 1
Year: 2013





MEDICAL IMAGE SEGMENTATION ON A CLUSTER OF PCS USING MARKOV RANDOM FIELDS

Author(s): El-Hachemi Guerrout | Ramdane Mahiou | Samy Ait-Aoudia
Volume: 3
Issue: 1
Year: 2013





TOOTH-BASED IDENTIFICATION OF INDIVIDUALS

Author(s): Charbel Fares | Mireille Feghali
Volume: 3
Issue: 1
Year: 2013





REAL TIME INJURY AND RELATED ACTIVITIES MONITORING WITH SINGLE ROTATABLE INFRARED SENSOR

Author(s): Ong Chin Ann | Lau Bee Theng | Hamid Bagha
Volume: 3
Issue: 1
Year: 2013





TOWARD AN ASPECT-ORIENTED SIMULATION

Author(s): Meriem Chibani | Brahim Belattar | Abdelhabib Bourouis
Volume: 3
Issue: 1
Year: 2013




