A Trusted Bootstrapping Scheme Using USB Key Based on UEFI

Author(s): Abhishek Singh Kushwaha
Volume: 2
Issue: 5
Year: 2013





Data Reduction for Finding Silhouette Edges on 3D-Animated Model

Author(s): Nucharee Thongthungwong | Rajalida Lipikorn
Volume: 2
Issue: 5
Year: 2013





Study of SQL Injection Attacks and Countermeasures

Author(s): Sayyed Mohammad Sadegh Sajjadi | Bahare Tajalli Pour
Volume: 2
Issue: 5
Year: 2013





A Time Synchronized Wireless Sensor Tree Network using SimpliciTI

Author(s): Vaibhav Pratap Singh | Nitin Chandrachoodan | Anil Prabhakar
Volume: 2
Issue: 5
Year: 2013





Design of High Speed -Low Power-High Accurate (HS-LP-HA) Adder

Author(s): Muddapu Parvathi | N. Vasantha | K. Satya Prasad
Volume: 2
Issue: 5
Year: 2013





Migration towards NGN: Common Applied Strategies

Author(s): Sven Pärand
Volume: 2
Issue: 5
Year: 2013





A Survey on Energy Efficiency for the Future Internet

Author(s): Tiago Silva | Artur Arsenio
Volume: 2
Issue: 5
Year: 2013





Enhanced Channel Assignment Algorithm for Relaying Nodes in W-CDMA Multihop Cellular Network

Author(s): Kishana R. Kashwan | S. G. Balakrishnan
Volume: 2
Issue: 5
Year: 2013





IEEE802.11n Time Synchronization for MIMO OFDM WLAN

Author(s): A. Ali | W. Mahmood | I. Javed | I. Ur Rehman
Volume: 2
Issue: 5
Year: 2013





Proposal for Wireless Controlled Threat Monitoring and Targeting Vehicles

Author(s): Muhammad Sulleman Memon | Asif Ali Laghari
Volume: 2
Issue: 5
Year: 2013





Performance Analysis of WAVE Control Channels for Public Safety Services in VANETs

Author(s): Jae-Min Lee | Min-Soo Woo | Sung-Gi Min
Volume: 2
Issue: 5
Year: 2013





Microstrip Triangular Loop Resonator Duplexer

Author(s): A. Chinig | J. Zbitou | A. Errkik | A.Tribak | H. Bennis | M. Latrach
Volume: 2
Issue: 4
Year: 2013





Document Management System Mobility – Main Trend in Future Document Management

Author(s): T. Leikums
Volume: 2
Issue: 4
Year: 2013





Cloud Computing Regulation: An Attempt to Protect Personal Data Transmission to Cross-Border Cloud Computing Storage Services

Author(s): Abdallah AbuOliem
Volume: 2
Issue: 4
Year: 2013





A New Mathematical Model of High Speed Satellite Channel

Author(s): Zheng Xiaotian | Li Jilin | Lin Mo | Wang Jian | Li Xinhua
Volume: 2
Issue: 4
Year: 2013





Rain Fade Estimations for the X-Band Satellite Communication Link in the Tropics

Author(s): A. C. M. Nuroddin | A. F. Ismail | K. Abdullah | K. Badron | M. Ismail | W. Hashim
Volume: 2
Issue: 4
Year: 2013





Predicting Radio Frequency Radiation from Mobile Communication Base Stations

Author(s): A. F. Ismail | N. I. Sidek | K. Abdullah | W. Hashim
Volume: 2
Issue: 4
Year: 2013





Strongest AES with S-Boxes Bank and Dynamic Key MDS Matrix (SDK-AES)

Author(s): Fatma Ahmed | Dalia Elkamchouchi
Volume: 2
Issue: 4
Year: 2013





Broadband Wireless Access (BWA): Spectrum Refarming in Thailand

Author(s): Settapong Malisuwan | Jesada Sivaraks | Navneet Madan
Volume: 2
Issue: 4
Year: 2013





BER and PAPR Analysis of DFT Precoded OFDM Multilayer IDMA (P-OFDM ML IDMA) Signals

Author(s): Mohamed A. Aboul-Dahab | Esam A. A. A. Hagras | Ahmad A. Elhaseeb
Volume: 2
Issue: 4
Year: 2013





The Effects of Relative Advantage, Compatibility and Complexity in the Adoption of EC in the Hotel Industry

Author(s): Nomsa Mndzebele
Volume: 2
Issue: 4
Year: 2013





Web Based Application for Supporting Knowledge Sharing at Cipadu Village

Author(s): Dian Anubhakti | Basuki Hari Prasetyo | Nazir Harjanto
Volume: 2
Issue: 4
Year: 2013





Research on Feature Extraction for Flaw Ultrasonic Echo Based on Wavelet Pack Analysis

Author(s): Wang Hai-Tao | Zhang Ze
Volume: 2
Issue: 4
Year: 2013





Medical Diagnosis Expert System as Service in Cloud

Author(s): A. B. Rajesh Kumar | G. V. Ramesh Babu | C. Phani Ramesh | P. Madhura | M. Padmavathamma
Volume: 2
Issue: 4
Year: 2013





Associative Informatics: An Approach Shift to Address Growing Technological Demand

Author(s): Kamal Kumar Ghanshala | Durgesh Pant
Volume: 2
Issue: 4
Year: 2013





Estimation of Mobility Models Based on Mobility Metrics and Their Impact on Routing Protocols in MANET

Author(s): S. C. Sharma | Santosh Kumar
Volume: 2
Issue: 4
Year: 2013





An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy

Author(s): Teeranan Nandhakwang | Settapong Malisuwan | Jesada Sivaraks | Navneet Madan
Volume: 2
Issue: 4
Year: 2013





Assisted-Leach (A-Leach) Energy Efficient Routing Protocol for Wireless Sensor

Author(s): Sunkara Vinodh Kumar | Ajit Pal
Volume: 2
Issue: 4
Year: 2013





Protecting Personal Medical Information: Asian Perspectives

Author(s): Suhaila Samsuri | Zuraini Ismail | Rabiah Ahmad
Volume: 2
Issue: 4
Year: 2013





Mobile-to-Mobile Multimedia Service Provisioning in the IMS Using REST-Based Mobile Services

Author(s): Muzzamil Aziz Chaudhary | Matthias Jarke
Volume: 2
Issue: 4
Year: 2013





An Improved LSB Based Steganography Technique for RGB Color Images

Author(s): Mamta Juneja | Parvinder S. Sandhu
Volume: 2
Issue: 4
Year: 2013





Detecting Period and Burst Durations in Video Streaming by Means of Active Probing

Author(s): Bjørn J. Villa | Poul E. Heegaard
Volume: 2
Issue: 4
Year: 2013





Adaptive Backstepping Control and Tracking Control for New Chaotic Dynamical System

Author(s): Qian Zhang | Junyi Zhao
Volume: 2
Issue: 4
Year: 2013





Design of F8 Encryption Algorithm Based on Customized Kasumi Block Cipher

Author(s): Nabil H. Shaker | Hanady H. Issa | Khaled A. Shehata | Somaia N. Hashem
Volume: 2
Issue: 4
Year: 2013





Cognitive Selection Mechanism Performance in IEEE 802.11 WLAN

Author(s): W. Hashim | A. F. Ismail | N. A. Abd Ghafar | S. Dzulkifly
Volume: 2
Issue: 4
Year: 2013





A Secure Parking Reservation System Using GSM Technology

Author(s): Yusnita Rahayu | Fariza N. Mustapa
Volume: 2
Issue: 4
Year: 2013





A New Efficient Protocol for Authenticated Key Agreement

Author(s): Fatma Ahmed | Dalia Elkamchouchi
Volume: 2
Issue: 4
Year: 2013





Domain-Specific Front-End For Virtual System Performance Exploration

Author(s): Janne Vatjus-Anttila
Volume: 2
Issue: 4
Year: 2013





The on-Line Shopping Consumption Patterns of Saudi Shoppers

Author(s): Faisal Fahhad Alsharif | François Siewe | Chris Fidler | Giampaolo Bella
Volume: 2
Issue: 4
Year: 2013





A New Path Loss Model for LTE Network to Address Propagation Delay

Author(s): J. Ramkumar | R. Gunasekaran
Volume: 2
Issue: 4
Year: 2013





A Low Cost Broadband Planar Antenna

Author(s): R. Dakir | J. Zbitou | A. Mouhsen | A.Tribak | Angel Mediavilla Sanchez | M. Latrach
Volume: 2
Issue: 4
Year: 2013





Replication of Data in Database Systems for Backup and Failover – An Overview

Author(s): Tarandeep Singh | Parvinder S. Sandhu | Harbax Singh Bhatti
Volume: 2
Issue: 4
Year: 2013





Comparison of Radar Derived Rain Attenuation with the RazakSAT’s X-Band Link Signal Measurement

Author(s): K. Badron | A. F. Ismail | A. Z. Jusoh | N. H. M. Sobli | M. Ismail | W. Hashim
Volume: 2
Issue: 4
Year: 2013





Cognitive Selection Mechanism for Indoor Propagation

Author(s): W. Hashim | A. F. Ismail | S. Dzulkifly | N. A. Abd Ghafar
Volume: 2
Issue: 4
Year: 2013





Localization in Wireless Sensor Network Using a Mobile Anchor in Obstacle Environment

Author(s): Sayyed Majid Mazinani | Fatemeh Farnia
Volume: 2
Issue: 4
Year: 2013





Segmentation of 3D Stereoscopic Images Using LoG Operator for the Detection of Excessive Disparities
Author(s): Sang Hyun Kim | eong Yeop Kim | Gil Ja So
Volume: 2
Issue: 3
Year: 2013




A Very Fast Algorithm for Detecting Partially Plagiarized Documents Using FM-Index
Author(s): Chang SeokOck | JongKyuSeo | Sung-Hwan Kim | Hwan-Gue Cho
Volume: 2
Issue: 3
Year: 2013




The Effects of an Information-Technology Gifted Program on Friendship Using Scratch Programming Language and Clutter
Author(s): Seungki Shin | Phanwoo Park | Youngkwon Bae
Volume: 2
Issue: 3
Year: 2013



