Software Architecture Viewpoint Models: A Short Survey

Author(s): Valiallah Omrani | Seyyed Ali Razavi Ebrahimi
Volume: 2
Issue: 5
Year: 2013





Design Context Aware Activity Recommender System for Iranian Customer Mind Activism in Online Shopping

Author(s): Saber Pahlavan | Morteza Hajizadeh | Adel Azadkhah | Ali Ansarifard
Volume: 2
Issue: 5
Year: 2013





Application of Pre-evolution Genetic Algorithm in Fast Path Planning for UCAV

Author(s): Lu Cao | An Zhang
Volume: 2
Issue: 5
Year: 2013





Designing Expert System for Detecting Faults in Cloud Environment

Author(s): Marzieh Shabdiz | Alireza Mohammadrezaei | Hossein Bobarshad
Volume: 2
Issue: 5
Year: 2013





An Ontology Design Pattern of the Multidisciplinary and Complex Field of Climate Change

Author(s): Ibrahima Diop | Moussa Lo
Volume: 2
Issue: 5
Year: 2013





Measuring Trust and Selecting Cloud Database Services

Author(s): W.P. Eureka Priyadarshani | Gihan N. Wikramanayake | E.M. Piyal Ekanayake
Volume: 2
Issue: 5
Year: 2013





Using Contourlet Transform and Discrete Cosine Transform and SVD for Digital Watermarking

Author(s): S. A. Hosseini | S. Ghofrani
Volume: 2
Issue: 5
Year: 2013





Novel Feature Selection by Differential Evolution Algorithm

Author(s): Ali Ghareaghaji | Abdolhamid Sohrabi | Azim Rezaei Motlagh | Majid Tavakoli
Volume: 2
Issue: 5
Year: 2013





An Efficient Protocol for Target Tracking in Wireless Sensor Networks (WSNs)

Author(s): Shabnam Shoaee | Abolfazl Toroghi Haghighat
Volume: 2
Issue: 5
Year: 2013





A Review of Data Mining Techniques for Result Prediction in Sports

Author(s): Maral Haghighat | Hamid Rastegari | Nasim Nourafza
Volume: 2
Issue: 5
Year: 2013





A Survey: variants of TCP in Ad-hoc networks

Author(s): Komal Zaman | Muddesar Iqbal | Muhammad Shafiq | Azeem Irshad | Saqib Rasool
Volume: 2
Issue: 5
Year: 2013





A New Image Steganography Method Based on Pixel Neighbors and 6 Most Significant Bit(MSB) Compare

Author(s): Mashallah Abbasi Dezfouli | Sajad Nikseresht | Seyed.Enayatallah Alavi
Volume: 2
Issue: 5
Year: 2013





Performance assessment among hybrid algorithms in tuning SVR parameters to predict pipe failure rates

Author(s): Moosa Kalanaki | Jaber Soltani
Volume: 2
Issue: 5
Year: 2013





Optimized Method for Real-Time Face Recognition System Based on PCA and Multiclass Support Vector Machine

Author(s): Reza Azad | Babak Azad | Iman tavakoli kazerooni
Volume: 2
Issue: 5
Year: 2013





A Novel Approach for Regenerating a Secure and Reliable Password using Iris and Fingerprint

Author(s): SOROUSH SHIEKHALHOKAMAII | MOHAMMAD AMIN PIRBONYEH
Volume: 2
Issue: 5
Year: 2013





The use of a Comprehensive Identification Infrastructure in Enhancing the lifetime of Sensor Networks

Author(s): Payam Salehi | Mohammad Ebrahim Shiri Ahmad Abadi
Volume: 2
Issue: 5
Year: 2013





Real-Time and Robust Method for Hand Gesture Recognition System Based on Cross-Correlation Coefficient

Author(s): Reza Azad | Babak Azad | Iman tavakoli kazerooni
Volume: 2
Issue: 5
Year: 2013





Automatic identification of corrosive factors categories according to the environmental factors

Author(s): Qing Xu | Dongmei Fu
Volume: 2
Issue: 5
Year: 2013





Economic growth models: symbolic and numerical computations

Author(s): P. B. Vasconcelos
Volume: 2
Issue: 5
Year: 2013





Text Mining and Image Anomaly Explanation with Machine Consciousness

Author(s): John Kontos | Polyxene Kasda
Volume: 2
Issue: 5
Year: 2013





High-Speed Optical Home Network Using Graded Index Plastic Optical Fibers for a Smart House

Author(s): Tetsuya Toma | Hideo Asada | Tetsuro Ogi | Yasuhiro Koike
Volume: 2
Issue: 5
Year: 2013





Prolonging sensor networks lifetime using convex clusters

Author(s): Payam Salehi | Mohammad Ebrahim Shiri Ahmad Abadi
Volume: 2
Issue: 5
Year: 2013





High Capacity Secure Image Steganography Based on Contourlet Transform

Author(s): Kolsoom Shahryari | Mehrdad Gholami
Volume: 2
Issue: 4
Year: 2013





Reverse Query Tree approach to cope with Id distribution problem in Tree-based tag anti-collision protocols of RFID

Author(s): Milad HajMirzaei
Volume: 2
Issue: 4
Year: 2013





Petro-physical characterization and 3D digital modeling for geometric reconstruction of the Neolithic

Author(s): Stefano Columbu | Giovanni Guccini | Giorgio Verdiani
Volume: 2
Issue: 4
Year: 2013





A Mathematical Model for the Rainbow Vertex-Connection Number

Author(s): Fidan Nuriyeva | Onur Ugurlu | Hakan Kutucu
Volume: 2
Issue: 4
Year: 2013





Performance and Analysis of the Automated Semantic Object and Spatial Relationships Extraction in Traffic Images

Author(s): Wang Hui Hui
Volume: 2
Issue: 4
Year: 2013





Image Content Based Retrieval System using Cosine Similarity for Skin Disease Images

Author(s): Sukhdeep Kaur | Deepak Aggarwal
Volume: 2
Issue: 4
Year: 2013





Comparative study of data fusion algorithms in P300 Based BCI

Author(s): Mohammed J. Alhaddad | Mahmoud Kamel | Noura Al-Otaibi
Volume: 2
Issue: 4
Year: 2013





Power and Energy Aware Design of an Autonomous Wireless Sensor Node

Author(s): Nicolas Ferry | Sylvain Ducloyer | Nathalie Julien | Dominique Jutel
Volume: 2
Issue: 4
Year: 2013





Adaptive Majority-based Re-routing for Differentiated Delay in Wireless Sensor Networks

Author(s): Akram Golmohammadi | Sayyed Majid Mazinani
Volume: 2
Issue: 4
Year: 2013





Blended Learning Resources in Constrained Bandwidth Environment: Considerations for Network and Multimedia Optimization

Author(s): Nazir Ahmad Suhail | Jude Lubega | Gilbert Maiga
Volume: 2
Issue: 4
Year: 2013





A Novel Feature Cloud Visualization for Depiction of Product Features Extracted from Customer Reviews

Author(s): Tanvir Ahmad
Volume: 2
Issue: 4
Year: 2013





A cluster-based topology control algorithm for wireless sensor networks

Author(s): Abolfazl Toroghi Haghighat | Maryam Rashidi
Volume: 2
Issue: 4
Year: 2013





Traffic-Aware Selection Strategy for Application-Specific 3D NoC

Author(s): Sanaz Azampanah | Azadeh Eskandari | Ahmad Khademzadeh | Fathollah Karimi
Volume: 2
Issue: 4
Year: 2013





Diffuse Objects Extraction in Coronal Holes Using Active Contour Means Model

Author(s): Hamid Reza Tajik | Javad Rahebi
Volume: 2
Issue: 4
Year: 2013





A novel and robust method for automatic license plate recognition system based on pattern recognition

Author(s): Reza Azad | Fatemeh Davami | Babak Azad
Volume: 2
Issue: 3
Year: 2013





Designing a Clustering and Prediction-based Protocol for Target Tracking in Wireless Sensor Networks (WSNs)

Author(s): Vahid Hosseini | Abolfazl Toroghi Haghighat | Farshad Eshghi Esfahani
Volume: 2
Issue: 3
Year: 2013





Efficient Area and Speed Optimized Multiplication Technique Using Vedic and Tree Addition Structure

Author(s): Namrata Mishra | Utsav Malviya
Volume: 2
Issue: 3
Year: 2013





Security Architecture for Advanced Metering Infrastructure

Author(s): Seongho Ju | Moonsuk Choi | Chunghyo Kim | Yonghun Lim
Volume: 2
Issue: 3
Year: 2013





Design of Tunable Multiple- Cavity Filter for Optical Fiber Communication

Author(s): Vahideh Khadem Hosseini Ghasemi | Mohammad Orvatinia | Asghar Ebrahimi
Volume: 2
Issue: 3
Year: 2013





A Mechanism to Mitigate Collision Rate in Wireless Local Networks

Author(s): Ahmad Habibi | Hassan Khotanlou | Mohammad Nassiri
Volume: 2
Issue: 3
Year: 2013





Solving the Scheduling Problem in Computational Grid using Artificial Bee Colony Algorithm

Author(s): Seyyed Mohsen Hashemi | Ali Hanani
Volume: 2
Issue: 3
Year: 2013





A New Approach for Labeling Images Using CAPTCHA in Image Semantic Search Engines

Author(s): Amir Golchini | Abolfazl Toroghi Haghighat | Hasan Rashidi
Volume: 2
Issue: 3
Year: 2013





A New Heuristic Algorithm for Constructing Steiner Trees inside Simple polygons in Presence of Obstacles

Author(s): Vahid Khosravinejad | Alireza Bagheri | Alireza Khosravinejad
Volume: 2
Issue: 3
Year: 2013





USE OF E-LEARNING TOOLS TO SOLVE GROUP WORK PROBLEMS IN HIGHER EDUCATION: A CASE STUDY OF GULF COUNTRY

Author(s): HABIB ULLAH KHAN
Volume: 2
Issue: 3
Year: 2013





Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks

Author(s): Mohammad Reza Rohbanian | Mohammad Rafi Kharazmi | Alireza Keshavarz-Haddad | Manije Keshtgary
Volume: 2
Issue: 3
Year: 2013





A New Heuristic Constructing Minimal Steiner Trees inside Simple Polygons

Author(s): Alireza Khosravinejad | Alireza Bagheri | Vahid Khosravinejad
Volume: 2
Issue: 3
Year: 2013





Critical Factors in the Effective of Service-Oriented Architecture

Author(s): Sima Emadi | Raziye Hatami Hanza
Volume: 2
Issue: 3
Year: 2013





The analysis of visual parallel programming languages

Author(s): Vladimir Averbukh | Mikhail Bakhterev
Volume: 2
Issue: 3
Year: 2013




