Improving of Authentication Mechanism in IMS Environment By Integration Hop By Hop And End To End Model
Author(s): maisam mohammadian 1 | nasser mozayanii 2
Volume: 2
Issue: 9
Year: 2012




Design of a High Speed XAUI Based on Dynamic Reconfigurable Transceiver IP Core
Author(s): Haipeng Zhang 1 | Lingjun Kong 2 | Xiuju Huang 3 | Mengmeng Cao 4
Volume: 2
Issue: 9
Year: 2012




Measuring Cost of Quality(CoQ)- on SDLC projects is indispensible for effective Software Quality Assurance
Author(s): Parvez Mahmood Khan 1 | M.M.Sufyan Beg 2
Volume: 2
Issue: 9
Year: 2012




Optimal Intelligent Control for Wind Turbulence Rejection in WECS Using ANNs and Genetic Fuzzy Approach
Author(s): hadi kasiri 1 | Hamid Reza Momeni 2 | Atieh Kasiri 3
Volume: 2
Issue: 9
Year: 2012




Analysis of a two echelon Queueing-service system by considering Speed-Quality tradeoff in service
Author(s): Ata G.zare 1 | Alireza Haji 2 | Farshid Jamali 3
Volume: 2
Issue: 8
Year: 2012




An Introduction to Distributed Cryptography Based on Quantum Cryptography
Author(s): Leila Pashaie Bonab 1 | Jaber Karimpour 2 | Mohamdali Jamali 3 | Ayaz Isazadeh 4
Volume: 2
Issue: 8
Year: 2012




Long Term Energy Demand Forecasting based on Hybrid, Optimization: Comparative Study
Author(s): Wahab Musa 1 | Ku Ruhana Ku-Mahamud 2 | Azman Yasin 3
Volume: 2
Issue: 8
Year: 2012




Fuzzy Logic Based Multi User Adaptive Test System
Author(s): Atif Ali Khan 1 | Oumair Naseer 2
Volume: 2
Issue: 8
Year: 2012




A Formal Framework for the Formalization of Informal Requirements
Author(s): Florent Peres 1 | Jing Yang 2 | Mohamed Ghazel 3
Volume: 2
Issue: 8
Year: 2012




Words ordering and corresponding verb-subject agreements in English-Arabic machine translation: Hybrid-based approach
Author(s): Mohammed Abu Shquier 1 | Omer Abu Shqeer 2
Volume: 2
Issue: 8
Year: 2012




Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design
Author(s): Yixin Liu 1 | Haipeng Zhang 2 | Tao Feng 3
Volume: 2
Issue: 7
Year: 2012




Research on the Algorithm of the Trustful Communication over the Metrized Small World Distributed Data Storage System
Author(s): Dmitry Gusev 1
Volume: 2
Issue: 7
Year: 2012




Lightweight Local Area Network Dynamic Routing Protocol for MANET
Author(s): Adam Macintosh 1 | Mohammad Ghavami 2 | Ming Fei Siyau 3
Volume: 2
Issue: 7
Year: 2012




A Prediction Model for System Testing Defects using Regression Analysis
Author(s): Muhammad Dhiauddin Mohamed Suffian 1 | Suhaimi Ibrahim 2
Volume: 2
Issue: 7
Year: 2012




Managing Software Development Risk with the OODA Loop
Author(s): Nathaniel D. Amsden 1 | Narasimha K. Shashidhar 2
Volume: 2
Issue: 7
Year: 2012




CLTChord: Improving lookup at the Chord protocol using cache location table
Author(s): Jaber Karimpour 1 | Majid Moghaddam 2 | Ali A. Noroozi 3
Volume: 2
Issue: 7
Year: 2012




CBM-Of-TRaCE: An Ontology-Driven Framework for the Improvement of Business Service Traceability, Consistency Management and Reusability
Author(s): Aida Erfanian 1 | Nima Karimpour Darav 2
Volume: 2
Issue: 7
Year: 2012




Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering
Author(s): Zahra Vali 1 | Massoud Reza Hashemi 2 | Neda Moghim 3
Volume: 2
Issue: 6
Year: 2012




A Propose for a Quadrature – Phase as Full Orthogonal Matrix Transform Compared with FFT Matrix Multiplication and Applied in OFDM System (Safe Transform the Fourier Twins)
Author(s): Saifuldeen Abdulameer Mohammed 1
Volume: 2
Issue: 6
Year: 2012




Least Entropy-Like Approach for Reconstructing L-Shaped Surfaces Using a Rotating Array of Ultrasonic Sensors
Author(s): Nicola Ivan Giannoccaro 1 | Giovanni Indiveri 2 | Luigi Spedicato 3
Volume: 2
Issue: 6
Year: 2012




ShAppliT: A Novel Broker-mediated Solution to Generic Application Sharing in a Cluster of Closed Operating Systems
Author(s): CHEN GUO 1 | Cenzhe Zhu 2 | Teng Tiow Tay 3
Volume: 2
Issue: 6
Year: 2012




Modeling of a Memory Interface Using Modeling Language
Author(s): Akitoshi Matsuda 1 | Shinichi Baba 2
Volume: 2
Issue: 6
Year: 2012




Research on Vision-based Autonomous Navigation Algorithm for RVD between Spacecrafts
Author(s): wei sun 1 | Long Chen 2 | Kai Liu 3
Volume: 2
Issue: 5
Year: 2012




Discrete Event Simulation and Petri net Modeling for Reliability Analysis
Author(s): Behrooz Safarinejadian 1
Volume: 2
Issue: 5
Year: 2012




A Simple Software Application for Simulating Commercially Available Solar Panels
Author(s): Nalika Ulapane 1 | Sunil Abeyratne 2 | Prabath Binduhewa 3 | Chamari Dhanapala 4 | Shyama Wickramasinghe 5 | Nimal Rathnayake 6
Volume: 2
Issue: 5
Year: 2012




Service Oriented Paradigm for Massive Multiplayer Online Games
Author(s): Farrukh Arslan 1
Volume: 2
Issue: 5
Year: 2012




An Ant Colony Clustering Algorithm Using Fuzzy Logic
Author(s): S.Nithya 1 | 2 R.Manavalan 2
Volume: 2
Issue: 5
Year: 2012




Estimation of Power Losses on Radial Feeder Using Minimum Electrical Measurements and Differential Evolution Method
Author(s): Marinko Barukcic 1 | Srete Nikolovski 2 | Zeljko Hederic 3
Volume: 2
Issue: 4
Year: 2012




Relative Pose Measurement Algorithm of Non-cooperative Target based on Stereo Vision and RANSAC
Author(s): Long Chen 1 | Baolong GUO 2 | Wei SUN 3
Volume: 2
Issue: 4
Year: 2012




Integration of Unicast and Multicast Scheduling in Input-Queued Packet Switches with High Scalability
Author(s): Yongbo Jiang 1 | Zhiliang Qiu 2 | Jian Zhang 3 | Jun Li 4
Volume: 2
Issue: 4
Year: 2012




Optimization of Routes in Mobile Ad hoc Networks using Artificial Neural Networks
Author(s): seyed saeed sadat noori 1 | seyed ali sadat noori 2 | seyed morteza lari baghal 3
Volume: 2
Issue: 4
Year: 2012




Mapping of QoS between UMTS and WiMAX in Tight Coupling Heterogeneous Wireless Network
Author(s): Charles Sarraf 1 | Firas Ousta 2 | Nidal Kamel 3 | Mohd Zuki 4
Volume: 2
Issue: 3
Year: 2012




Improved Camshift with adaptive searching window
Author(s): Aixia Wang 1 | Jingjiao Li 2 | Zhenlin Lu 3
Volume: 2
Issue: 3
Year: 2012




Web 2.0-Based Academician Profile Information System
Author(s): Lee Beng Yong 1 | Rosita Suhaimi 2 | Iris Syawe Seh Ling 3 | Robert John Jingut 4 | Hawa Nahar 5
Volume: 2
Issue: 3
Year: 2012




Empirical Study of the Inertia Weight Particle Swarm Optimization with Constraint Factor
Author(s): YAN Chun-man 1 | GUO Bao-long 2 | WU Xian-xiang 3
Volume: 2
Issue: 2
Year: 2012




An Objects Detecting and Tracking method based on MSPF and SVM
Author(s): Wei Sun 1 | Xu Zhang 2 | Yunyi Yan 3
Volume: 2
Issue: 2
Year: 2012




Computer simulation of manual assembly procedures verification of automotive components ABS using SW tool Plant Simulation.
Author(s): Peter Poor 1 | Peter Takáč 2
Volume: 2
Issue: 11
Year: 2012




A New Centralized Multicast Wavelength Allocation Algorithm in Optical Fiber Network
Author(s): Rafed Sabbar Abbas 1 | Hamed Saffa Al-Raweshidy 2
Volume: 2
Issue: 11
Year: 2012




Security Implications of Distributed Database Management System Models
Author(s): Charupalli Sunil Kumar 1 | J Seetha 2 | S.R. Vinotha 3
Volume: 2
Issue: 11
Year: 2012




Towards a Curriculum Design Maturity Model
Author(s): Thong Chee Ling 1 | Yusmadi Yah Jusoh 2 | Rusli Abdullah 3 | Nor Hayati Alwi 4
Volume: 2
Issue: 10
Year: 2012




An Energy Optimization Algorithm for Mobile Ad Hoc Network
Author(s): Mohamed Belkheir 1 | Zeyad Qacem 2 | Merahi Bouziani 3 | Abderrahmane Ghelamellah 4
Volume: 2
Issue: 10
Year: 2012




Key parameters generation of the navigation data of GPS Simulator
Author(s): Tao Feng 1 | qianqian wu 2 | Haipeng Zhang 3
Volume: 2
Issue: 10
Year: 2012




An overview to Software Architecture in Intrusion Detection System
Author(s): Mehdi Bahrami 1 | Mohammad Bahrami 2
Volume: 1
Issue: 1
Year: 2011




PCA- Based Feature Extraction and k-NN algorithm for Early Jaundice Detection
Author(s): Muhammad Naufal Mansor 1 | Sazali Yaacob 2 | Hariharan Muthusamy 3 | Shafriza Nisha Basah 4 | Shahrul Hi-fi Syam bin Ahmad Jamil 5 | Mohd Lutfi Mohd Khidir 6 | Muhammad Nazri Rejab 7 | Ku Mohd Yusri Ku Ibrahim 8 | Addzrull Hi-fi Syam bin Ahmad Jamil 9 | Jamaluddin Ahmad 10 | Ah 11
Volume: 1
Issue: 1
Year: 2011




Simulated Annealing algorithm for Data Aggregation Trees in Wireless Sensor Networks
Author(s): Ladan Darougaran 1 | Hossein Shahinzadeh 2 | Mohammadreza Salavati 3
Volume: 1
Issue: 1
Year: 2011




PCA- Based Feature Extraction and LDA algorithm for Preterm Birth Monitoring
Author(s): Muhammad Naufal Mansor 1 | Sazali Yaacob 2 | Hariharan Muthusamy 3 | Shafriza Nisha Basah 4 | Shahrul Hi-fi Syam bin Ahmad Jamil 5 | Mohd Lutfi Mohd Khidir 6 | Muhammad Nazri Rejab 7 | Ku Mohd Yusri Ku Ibrahim 8 | Addzrull Hi-fi Syam bin Ahmad Jamil 9 | Jamaluddin Ahmad 10 | Ahmad Kad 11
Volume: 1
Issue: 1
Year: 2011




A Data Mining Approach To Gen Dynamic Behavioral Process
Author(s): Mehdi Alimi Motlagh Fard 1 | Hamid Reza Ranjbar 2 | Abbas Davani 3 | Mehdi Sadegh Zadeh 4
Volume: 1
Issue: 1
Year: 2011




A novel classificatory filter for multiple types of erotic images based on Internet
Author(s): Xu Zhang 1 | Baolong Guo 2 | Yunyi Yan 3 | Chunman Yan 4
Volume: 1
Issue: 1
Year: 2011




Prediction of under pickling defects on steel strip surface
Author(s): Valentina Colla 1 | Nicola Matarese and Gianluca Nastasi 2
Volume: 1
Issue: 1
Year: 2011



