SlideShare a Scribd company logo
1 of 51
Download to read offline
International Journal of Computer Science and Information
Technology (IJCSIT)
ISSN : 0975 - 3826 (Online) ; 0975 - 4660 (Print)
http://airccse.org/journal/ijcsit.html
SCOPE OF THE JOURNAL
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is
devoted to fields of Computer Science and Information Systems. The IJCSIT is a peer-reviewed
scientific journal published in electronic form as well as print form. The mission of this journal is to
publish original contributions in its field in order to propagate knowledge amongst its readers and to
be a reference publication.
IJCSIT publishes original research papers and review papers, as well as auxiliary material such as:
research papers, case studies, technical reports etc.
Topics of Interest
 Algorithms and Bioinformatics
 Computer Architecture and Real time Systems
 Database and Data Mining
 Dependable, reliable and autonomic computing
 Distributed and parallel systems & algorithms
 DSP/Image Processing/Pattern Recognition/Multimedia
 Embedded system and software
 Game and software engineering
 Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS)
 Grid and scalable computing
 Intelligent Information & Database Systems
 IT policy and business management
 Mobile and ubiquitous computing
 Modeling and Simulation
 Multimedia systems and services
 Networking and communications
 Parallel and Distributed Systems
 Security and Information Assurance
 Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)
 Software Engineering
 Web and internet computing
Contact Us
Here's where you can reach us : ijcsit@airccse.org
http://airccse.org/journal/ijcsit.html
Members of the Editorial Board
Editor In Chief:
 Jan Zizka, SoNet/DI, FBE, Mendel University in Brno, Czech Republic

Editorial Board
A. Meiappane, Manakula Vinayagar Institute of Technology, India
A.Kannan, K.L.N. College of Engineering, India
Abdul kadir Ozcan, The American University, Cyprus
Ahmed Nada, Al-Quds University, Palestine
Ali Asghar Rahmani Hosseinabadi, Islamic Azad University, Iran
Ali Mehrpour, Islamic Azad University, Iran
Amine Achouri, University of Tunis, Tunisia
Amirouchefatiha, University of Tizi-Ouzou, Algeria
Ammar M.Odeh, University of Bridgeport, USA
Anamika Ahirwar, Maharana Pratap College of Technogy, Gwalior, India
Atif Farid Mohammad, Uniersity of North Dakota, USA
Ayman AbuBaker, Applied Science Private University Amman, Jordan
Ayme Perdomo Alonso, University of Informatics Sciences, Cuba
Benedicto B. Balilo Jr, Bicol University, Philippines
Bobby Barua, Ahsanullah University of Science and Technology, Bangladesh
Boo-Hyung Lee, KongJu National University, South Korea
Buket Barkana, University of Bridgeport,USA
Chikh Mohammed Amine, University of Tlemcen, Algeria
Chin-Chih Chang, Chung Hua University, Taiwan
Daniyal Alghazzawi,King Abdulaziz University, Kingdom of Saudi Arabia
Dedi Iskandar Inan, State University of Papua, Indonesia
Dharminder kumar, Guru Jambheshwar University of Science and Technology, India
Dhinaharan Nagamalai, Wireilla Net Solutions PTY LTD, Australia
Dongchen Li, Peking University, P.R.China
Ermatita zuhairi, Sriwijaya University, Palembang, Indonesia
http://airccse.org/journal/ijcsit.html
Filip Popovski, St.Kliment Ohridski University - Bitola, Macedonia
G.P.Hegde, SDM Institute of Technology, India
 Editorial Board

Faudziah Ahmad, Universiti Utara Malaysia, Malaysia
Filip Popovski, St.Kliment Ohridski University - Bitola, Macedonia
G.P.Hegde, SDM Institute of Technology, India
Gaurang Panchal, Charotar University of Science and Technology, India
George Augusto Valenca Santos, Federal University of Pernambuco (UFPE), Brazil
Hao-En Chueh, Yuanpei University, Taiwan
Hazlina Haron, Universiti Utara Malaysia, Malaysia
Himavathi S, Pondicherry Engg College, India
Hwangjun Song, POSTECH, South Korea
Inderpal Singh, Punjab Technical University, India
Isa Maleki, Islamic Azad University, Iran
Jacques Demerjian, CS Communication & Systems, France
James Xue, University of Northampton, United Kingdom
Jeong-Hyun Park,Electronics & Telecommunications Research Institute,South Korea
Jeremy (Zheng) Li, University of Bridgeport, USA
J. Naren, SASTRA University, India
Jyoti Singhai, Electronics and Communication Deptt-MANIT,India
K.P.Srinivasan, C.B.M. College, India
Kanti Prasad, University of Massachusetts Lowell, USA
Kawahata Yasuko, Kyushu University, Japan
Kazuyuki Murase,University of Fukui, Japan
Keneilwe Zuva, University of Botswana, Botswana
Keshava Prasanna, Shridevi Institute of Technology, India
Khoa N. Le, Griffith School of Engineering, Queensland, Australia
Kirtikumar Patel, Chemic Engineers Inc, United States
Kwan Hee Han, Gyeongsang National University, Republic of Korea
Lian Liu, University of Kentucky, USA
M. P. Singh, National Institute of Technology Patna, India
Maicon A.Sartin, Universidade do Estado de Mato Grosso - UNEMAT, Brazil
Maragathavalli P, Pondicherry Engineering College, Puducherry, India
Marcelo Luiz Monteiro Marinho, Federal Rural University of Pernambuco, Brazil
Marina Marjanović Jakovljević, Singidunum University, Serbia
Md. Shahjahan Ali, Islamic University, Bangladesh
Mehmet Kara, TUBITAK BILGEM UEKAE, Turkey
http://airccse.org/journal/ijcsit.html
 Editorial Board

Mehregan Mahdavi, University of Guilan, Iran
Melih Kirlidog, Marmara University, Turkey
Ming Fan, Broadcom Corporation, USA
Ming-Chang Lee, National Kaohsiung University of Applied Sciences,Taiwan
Mohamed Farag, Maharishi University of Management, USA
Mohammad Al-Khedher, Al-Balqa' Applied University, Jordan
Mohammad M M Abu Omar, Al-Quds Open University-Plaestine, Malaysia
Mohammad Sadegh Mirzaei, Postgraduate and Newer Researchers Conference, Iran
Mohammad Shamsul Arefin,Hiroshima University, Japan
Mohammad Yamin, University of Canberra,Australia
Mohammad Zaidul Karim, Daffodil Int Uni, Bangladesh
Mohammed Alhanjouri, Islamic University of Gaza, Palestine
Mohammed Ali Hussain, KL University, India
Mohammed S. Al Logmani, Saudi Aramco, Saudi Arabia
Mostafa Elhachloufi, Elhachloufi Mostafa, Morocco
Moudam Zakaria, University Sidi Mohammed Ben Abdellah Fez, Morocco
Nargis Akter, IST, Bangladesh
Natarajan Meghanathan, Jackson State University, USA
Natasa Zivic, University of Siegen,Germany
Noureddine Rais, University Sidi Mohammed Ben Abdellah Fez, Morocco
Paul Sagayda, Donbass State Engineering Academy, Ukraine
R.Baskaran, Anna University - Chennai, India
R.L.K.Venkateswarlu, Sasi Institute of Technology and Engineering, India
Rafael Timoteo de Sousa, University of Brasilia, Brazil
Rajendra Akerkar, Technomathematics Research Foundation, India
Ramadoni Syahputra,Universitas Muhammadiyah Yogyakarta, Indonesia
Ramgopalkashyap,SISTec,India
Ricardo Francisco Martinez-Gonzalez, Veracruz Institute of Technology, Mexico
Roberts Masillamani, Hindustan University, India
Ruchi Nanda, IIS University, India
S. Asghar Gholamian, Babol University of Technology, Iran
S.Hariharan, B.S.Abdur Rahman University,India
Sachin Patil, RIT Rajaramnagar, India
Sadik ULKER ,Girne American University, Cyprus
Sadiq Hussain, Dibrugarh University, India
http://airccse.org/journal/ijcsit.html
Paper Submission & Manuscript preparation Guide
Authors are invited to Submit papers for this journal through ijcsit@airccse.org
Submissions must be original and should not have been published previously or be under
consideration for publication while being evaluated for this Journal. For paper format
download the template in this page
Manuscript Template.
Review Process
Submissions are accepted for review with the understanding that the same work has been
neither submitted to, nor published in, another publication. Simultaneous submission to other
publications will result in immediate rejection of the paper. Papers are not within the journal
scope will be rejected immediately after the pre review process.
All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing
procedure, and are considered on the basis of their significance, novelty and usefulness to the
Journals readership. The reviewing structure will always ensure the anonymity of the referees
& it will be reviewed by 3 experts in the field. The review output will be one of the following
decisions:
1. Accept
2. Accept with minor changes
3. weak Accept with major changes
4. Reject
The review process may take approximately two ~three months to be completed. The Editor
reserves the right to reject a paper if it does not meet the aims and scope of the journal, it is
not revised well.
Publication charges: 120 USD (Maximum 20 pages)
Publication Frequency- Bi-monthly
February, April, June, August, October, December
Copy right form
After submitting final manuscript, you can get copyright form from AIRCC secretary
Special Issue Proposal
IJCSIT invite proposals for special issues on topics that fall within the scope of this journal.
Please email your proposal to secretary@airccse.org.
http://airccse.org/journal/ijcsit.html
2009
1
Ensemble Design for Intrusion Detection Systems
T. Subbulakshmi1
, A.Ramamoorthi2
and S. Mercy Shalinie1
, 1
Thiagarajar College
of Engineering, India and 2
Sethu Institute of Technology, India 9
2
Design of a New Deterministic Algorithm for Finding Common DNA
Subsequence
Bigyan Bhar and Nabendu Chaki, University Calcutta, India 1
3
Automatic Evolution of Ideas Through Multilayer Evolutionary System to
Support Creative Thinking
Priti Srinivas Sajja1
, Rajendra Akerkar2
, David Camacho3
, 1
Sardar Patel University,
India, 2
Technomathematics Research Foundation, India and 3
Universidad
Autonoma de Madrid, Spain 0
4
Multi-Focus Fusion Method Based on LADWT
Shwu-Huey Yen Yi-Ray Lin, Tamkang University, Taipei, Taiwan, R.O.C. 0
5
Effect of Variation of Separation between the Ultrasonic Transmitter and
Receiver on the Accuracy of Distance Measurement
Ajay Kumar Shrivastava , Ashish Verma and S. P. Singh, Krishna Institute of
Engineering and Technology, Ghaziabad (U.P.), India 5
6
Text Independent Speaker Recognition and Speaker Independent Speech
Recognition Using Iterative Clustering Approach
A.Revathi, R.Ganapathy and Y.Venkataramani, Saranathan college of Engg.,
Trichy 29
7
Investigating the Performance of Various Vocoders for a Fair Scheduling
Algorithm in WIMAX
B. Kaarthick Member IEEE, N.Nagarajan, V. J.Yeshwenth, P.M.Sudarsan,
Network System Design Center, Sri Krishna College of Engineering &
Technology,Coimbatore, India. 0
8
A Low Indexed Content Based Neural Network Approach for Natural Objects
Recognition
G.Shyama Chandra Prasad and Dr. A.Govardhan, Dr. T.V.Rao ,Research Scholar,
JNTUH, Hyderabad, AP. India. 2
9
Identification of Telugu, Devanagari and English Scripts Using Discriminating
Features
M C Padma and P A Vijaya, PES College of Engineering, Mandya, India 19
10
Design and Implementation of 32-Bit Controller For Interfacing with
reconfigurable computing systems.
Dr.Kota solomon Raju and Ashutosh Gupta,E-105, Digital System Group,
CEERI,Pilani - 333031 13
11
Thesaurus And query Expansion
Hazra Imran and Aditi Sharan, Jamia Hamdard ,New Delhi ,India 52
12
Optimal Curve Fitting of Speech Signal for Disabled Children
Anandthirtha. B. GUDI, and H. C. Nagaraj, Sri Bhagawan Mahaveer Jain College
of Engineering, India 5
13
Analysis on Deployment Cost and Network Performance for Heterogeneous
Wireless Sensor Networks
Dilip Kumar1
, Trilok. C Aseri2
and R. B Patel3
, 1
Centre for Development of
Advanced Computing (C-DAC), India, 2
Punjab Engineering College (PEC), India
and 3
Markandeshwar University (MMU), India 16
14
A collaborative PCE-Based mechanism for E2E recovery within MPLS-
networks
EL KAMEL Ali, Youssef Habib,FSM, Monastir, Tunisia 0
15
Analysis of Telecommunication Management Technologies
Khalil ur rehman Laghari, Imen Grida ben Yahia, and Noel Crespi, France. 13
2010
16
A Model for Semantic Integration of Business Components
Larbi KZAZ1
, Hicham Elasri2
and Abderrahim.Sekkaki2
, 1
Groupe ISCAE,
Morocco and 2
University Hassan II Ain-chok, Morocco 7
17
Agent Based Trust Management in Distributed E-Business Environment
E.Sathiyamoorthy1
, N.Ch.Sriman Narayana Iyenger1
and V.Ramachandran2
, 1
VIT
University, India and 2
Anna University,India. 7
18
Multi Dimensional CTL and Stratified Datalog
Theodore Andronikos1
and Vassia Pavlaki2
, 1
Ionian University, Greece,2
and
National Technical University of Athens, Greece 0
19
An Efficient Gait Recognition System For Human Identification Using
Modified ICA
M.Pushpa Rani1
and G.Arumugam2
, 1
Mother Teresa Womens University, India
and2
Madurai Kamaraj University, India. 49
20
Cartographic Generalization (Selection) For 2D Map of Urban Area
Jagdish Lal Raheja, Umesh Kumar and K.C. Saravanan, Central Electronics
Engineering Research Institute (CEERI)/ Council of Scientific & Industrial
Research (CSIR), India. 2
21
A BPT Application: Semi-automatic Image Retrieval Tool
Shirin Ghanbari1
, John C. Woods1
, Simon M. Lucas1
and Hamid R.
Rabiee2
, 1
University of Essex, United Kingdom and 2
Sharif University of
Technology, Iran. 0
22
Analyzing the P2P Traffic Using Probability Schemes
M. Sadish Sendil1
and Dr. N. Nagarajan2
, 1
SNS College of Technology,India
and2
Coimbatore Institute of Information and Engineering Technology,India 3
23
Low Power VLSI Design with Resistive Feedback Logic
1
C.Ashok Kumar, 2
B.K.Madhavi and 3
K.Lal Kishore, 1
TRR Engineering College,
India,2
SNIST, Hyderabad,India and 3
JNTU college of Engineering,India. 0
24
Dynamic Probe Window Based Optimization for Surveillance in Home
Security System
Bhaskar Kapoor and Anamika Chhabra, MAIT,India. 1
25
Human Facial Expression Detection From Detected in Captured Image using
Back Propagation Neural Network
Jagdish Lal Raheja and Umesh Kumar Digital Systems Group, Central Electronics
Engineering Research Institute (CEERI)/ Council of Scientific & Industrial
Research (CSIR),India. 37
26
Performance Evaluation of Face Recognition Using Gabor Filter, Log Gabor
filter and Discrete Wavelet Transform
D Murugan1
, S Arumugam2
, K Rajalakshmi3
and Manish T I1
,1
Manonmaniam
Sundaranar University, India , 2
Nandha College of Engineering & Technology,
India and 3
Francis Xavier Engineering College, India. 27
27
A Mobility-Based CheckPointing Protocol for Mobile Computing System
Suparna Biswas1
and Sarmistha Neogy2
, 1
West Bengal University of Technology,
India and 2
Jadavpur University, India. 23
28
Performance Model for a Conservative Distributed Simulation Environment
Using Null Messages to Avoid Deadlock
Hemen Patel1
, Syed S. Rizvi1
, Laiali Almazaydeh1
and Aasia Riasat2
, 1
University
of Bridgeport, USA and 2
Institute of Business Management, Pakistan 2
29
High Performance and Energy Efficient Task Scheduling Algorithm for
Heterogeneous Mobile Computing System
E. Ilavarasan and R. Manoharan, Pondicherry Engineering College, India 4
30
Identification of connection in spacecraft images and classifying them for
Weather Monitoring
Ramya S Gowda, Sikkim Manipal University, India 0
31
Phenol Degradation: Numerical Simulation in a Stirred Tank Electrochemical
Reactor
Regalado-Mendez Alejandro1, Peralta-Reyes Ever1 and Velazquez-Manzanares
Miguel2, 1Universidad del Mar, Mexico and 2Universidad del Papaoloapan,
Mexico 5
32
An Efficient Statistical Multiplexing Method for H.264 VBR Video Sources
for Improved Traffic Smoothing
T.Raghuveera and K.S.Easwarakumar , Anna University, India 4
33
Performance Evaluation of Routing Protocols in Wireless Sensor Networks
Laiali Almazaydeh, Eman Abdelfattah, Manal Al-Bzoor, and Amer Al-Rahayfeh,
University Of Bridgeport, USA 60
34
Improved Lossless Embedding and Extraction - A Data Hiding Mechanism
T. Venkat Narayana Rao1
, A.Govardhan2
and Syed Jahangir Badashah3
, 1
Tirumala
Engineering College, 2
Jawaharlal Nehru Technological University
and 3
Sathyabama1
University, India 1
35
An Optimized Distributed Association Rule Mining Algorithm in Parallel and
Distributed Data Mining with XML Data for Improved Response Time
Sujni Paul, Karunya University, India 4
36
CRM System Using PA-AKD Approach of D3M
Ajay kumar1
, A.Tejaswi2
, Lakshmi Prasad Koyi3
, G.Narasinga Rao4
and
S.Srinivasa Rao Illapu5
, 1
Dronacharya College of Engg, India, 2
GITAM
University, India, 3
CMR Institute Of Technology, India, 4
GMR IT, India
and 5
Chaitanya Engineering College, India 0
37
Enhanced-DSR: A New Approach to Improve Performance of DSR
Algorithm
Sharmin Sultana, Salma Begum, Nazma Tara and Ahsan Raja Chowdhury,
University of Dhaka, Bangladesh 10
38
Wrapper Generator using Java Native Interface
V.S.Vairale1
and K.N.Honwadkar2
, 1
AISSMS College of Engineering - Pune
University, India and 2
D.Y.Patil College of Engineering - Pune University, India 3
39
Memory Management Technique for Paging on Distributed Shared Memory
Framework
Bal Gopal1
, Rizwan Beg1
and Pankaj Kumar2
, 1
Integral University, India
and 2
Sahara Arts & Management Academy, India 4
40
Ontology Based Model For The ITU-T Recommendation G.805: Towards The
Self-Management Of Transport Networks
Maxwell E. Monteiro, Anilton Salles Garcia, Pedro Paulo F. Barcelos, and
Giancarlo Guizzardi, Federal University of Espirito Santo, Brazil 8
41
Efficient Resource Matching in Heterogeneous Grid Using Resource Vector
Srirangam V Addepallil1
, Per Andersen1and George L Barnes2
, 1
Texas Tech
University - Texas, USA and 2
University of Oregon, USA 3
42
Low Power Shift and Add Multiplier Design
C. N.Marimuthu1
, P. Thangaraj2
and Aswathy Ramesan1
, 1
Maharaja Engineering
College,India and 2
Kongu Engineering College, India 26
43
Implementing and Evaluating A Wireless Body Sensor System For Automated
Physiological Data Acquisition At Home
Chao Chen and Carlos Pomalaza-Raez,Indiana University - Purdue University,
USA 14
44
A Parsing Scheme for Finding the Design Pattern and Reducing the
Development Cost of Reusable Object Oriented Software
K. M. Azharul Hasan and Mohammad Sabbir Hasan, Khulna University Of
Engineering and Technology(KUET), Bangladesh 1
45
Hybrid Scenario based Performance Analysis of DSDV and DSR
Koushik Majumder1
and Subir Kumar Sarkar2
, 1
West Bengal University of
Technology, India and 2
Jadavpur University, India 3
46
Interoperability, Trust Based Information Sharing Protocal and Security:
Digital Government Key Issues
Md.Headayetullah and G.K. Pradhan, SOAU - Bhubaneswar, India 10
47
An Algorithm To Self - Extract Secondary Keywords and Their Combinations
Based On Abstracts Collcted Using Primary Keywords From Online Digital
Libraries
Natarajan Meghanathan, Nataliya Kostyuk, Raphael Isokpehi and Hari Cohly,
Jackson State University, USA 0
48
A novel technique for image steganography based on Block-DCT and
Huffman Encoding
A.Nag1
, S. Biswas2
, D. Sarkar2
and P.P. Sarkar2
, 1
Academy of Technology -
Hoogly, India and 2
University of Kalyani, India 63
49
Biometric Authentication Using Nonparametric Methods
S V Sheela and K R Radhika, B M S College of Engineering - Bangalore, India 1
50
Game Information System
Spits Warnars, Manchester Metropolitan University, United Kingdom 2
51
Survey on the Event Orderings Semantics Used for Distributed System
Yaser Miaji Osman Gazali and Suhaidi Hassan, University Utara Malaysia,
Malaysia 2
52
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Ruchira Naskar and Indranil Sengupta, Indian Institute of Technology, India 0
53
Genbit Compress Tool(GBC): A Java-Based Tool To Compress DNA
Sequences and Compute Compression Ratio (BITS/BASE) of Genomes
P.RAJA RAJESWARI1
and ALLAM APPARAO2
, 1
Acharya Nagarjuna
University, India and 2
Jawaharlal Nehru Technological University, India 7
54
An Empirical Study on the Procedure to Derive Software Quality Estimation
Models
Jie Xu1
, Danny Ho2
and Luiz Fernando Capretz1
, 1
University of Western Ontario,
Canada and 2
NFA Estimation Inc, Canada 10
55
Diphone Speech Synthesis System for Arabic Using MARY TTS
M. Z. Rashad, Hazem M. El-Bakry and Islam R. Isma'il, Mansoura University,
Egypt 12
56
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori
Algorithm
Sandeep Singh Rawat1
and Lakshmi Rajamani2
, 1
Guru Nanak Institute of
Technology, India and 2
Osmania University, India 25
57
Improvement in Delay of Information flow in Energy Efficiency Organization
Elham Hasanzadeh and Reza Askari moghadam, Payam Noor University faculty of
engineering, Iran 0
58 An Applied Study on Educational Use of Facebook as a Web 2.0 Tool: The
Sample Lesson of Computer Networks and Communication
Murat Kayri1
and Ozlem cakır2
, 1
Yuzuncu Yil University, Turkey 48
59
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree
and Fuzzy
S.Veeramalai, N.Jaisankar and A.Kannan, Anna University - Chennai, India 22
60
M-Learning: A New Paradigm of Learning Mathematics in Malaysia
Saipunidzam Mahamad, Mohammad Noor Ibrahim and Shakirah Mohd Taib,
Universiti Teknologi Petronas, Malaysia 45
61
Utilizing Diagnosing Problems in a Probabilistic Domain to Build Student
Models
Nabila Khodeir1
, Nayer Wanas1,2
Nevin Darwish3
and Nadia Hegazy1
, 1
Electronics
Research Institute, Egypt, 2
Cairo Microsoft Innovation Lab, Egypt and 3
Cairo
University, Egypt 5
62
Clustering and Feature Specific Sentence Extraction Based Summarization of
Multiple Documents
A.Kogilavani and P.Balasubramani, Kongu Engineering College, India 28
63
Mining Target-Oriented Sequential Patterns With Time-Intervals
Hao-En Chueh, Yuanpei University, Taiwan 9
64
A Survey of QOS Routing Protocols For Mobile Ad Hoc Networks
G. Santhi and Alamelu Nachiappan, Pondicherry Engineering College, India 40
65
Spiking Neurons With ASNN Based-Methods for the Neural Block Cipher
Saleh Ali K. Al-Omari and Putra Sumari, University Sains Malaysia, Malaysia 4
66
A Modified Structure for Feed Forward Active Noise Control Systems
WithImproved Performa
P.Babu and A.Krishnan, K.S.Rangasamy College of Technology, India 0
67
Clustering High Dimensional Data Using Subspace and Projected Clustering
Algorithms
Rahmat Widia Sembiring, Jasni Mohamad Zain and Abdullah Embong, Universiti
Malaysia Pahang, Malaysia 19
68
A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based
on Particle Swarm Theory With Arithmetic Crossover
Md. Amjad Hossain, Md. Kowsar Hossain and M.M.A Hashem, Khulna University
of Engineering & Technology (KUET), Bangladesh 9
69
Performance Analysis of Multimedia Compression Algorithms
Eman Abdelfattah and Asif Mohiuddin, University of Bridgeport, USA 13
70
Ontology-Based Quality Attributes Prediction in Component-Based
Development
Chengpu Li1
, Rob Pooley2
and Xiaodong Liu1
, 1
Edinburgh Napier University, UK
and 2
Heriot-Watt University, UK 4
71
Performance Analysis of Contention Window Cheating Misbehaviors in
Mobile Adhoc Networks
R. Kalaiarasi, Getsy S. Sara, S. Neelavathy Pari and D. Sridharan, Anna university-
Chennai, India 8
72
A New Email Retrivel Ranking Approach
Samir AbdelRahman1
, Basma Hassan2
and Reem Bahgat1
, 1
Cairo University,
Egypt and 2
Fayoum University, Egypt 0
73
Design and Evaluation of XACML Conflict Policies Detection Mechanism
Kamalbir Singh and Sarbjeet Singh, Panjab University, India 5
74
Potential Security Attacks on Wireless Networks and their Countermeasure
Sreedhar. C1
, S. Madhusudhana Verma2
and N. Kasiviswanath1
, 1
G. Pulla Reddy
Engineering College, India and 2
Rayalaseema University, India 2
75
A New DCT-Based Watermarking Method for Copyright Protection of Digital
Audio
Pranab Kumar Dhar, Mohammad Ibrahim Khan and Saif Ahmad, Chittagong
University of Engineering and Technology, Bangladesh 26
76
A Multi -Perspective Evaluation of MA and GA for Collaborative Filtering
Recommender System
Hema Banati and Shikha Mehta, University of Delhi, India 15
77
Level Shifter Design for Low Power Applications
Manoj Kumar1
, Sandeep K. Arya1
and Sujata Pandey2
, 1
Guru Jambheshwar
University of Science & Technology, India and 2
Amity University, India 17
78
A Plant Documentation Information System Design
Bing Wang1
and Ma Feicheng2
, 1
University of Hull, UK and 2
Wuhan University,
China 3
79
Energy Efficient Data Processing in Visual Sensor Network
Harish. H. Kenchannavar1
, Sushma. S. Kudtarkar2
and U. P. Kulkarni2
, 1
Gogte
Institute of Technology, India and 2
SDMCET, India 6
80
Identifying Bank Frauds Using CRISP-DM and Decision Trees
Bruno Carneiro da Rocha1,2 and Rafael Timoteo de Sousa Junior2, 1Bank of
Brazil, Brazil and 2University of Brasilia (UnB), Brazil 14
81
A Clustering Heuristic for Multiprocessor Environments Using Computation
and Communication Loads of Modules
Pramod Kumar Mishra1
, Kamal Sheel Mishra2
, and Abhishek Mishra1
, 1
Banaras
Hindu University, India and 2
School of Management Sciences, India 6
82
Soil Classification Using GATREE
P.Bhargavi1
and S.Jyothi2
, 1
Madanapalli Institue of Tecnology and Science, India
and 2
Sri Padmavathi Mahila VisvaVidyalayam, India 9
83
A Performance Comparison Study of the Location Prediction Based Routing
Protocol with Position Based Routing Protocols for Mobile Ad Hoc Networks
Natarajan Meghanathan, Jackson State University, USA 0
84 Manipulating Multistage Interconnection Networks Using Fundamental
Arrangements
E. Gur1
and Z. Zalevsky2
, 1
Shenkar College of Eng. & Design, Israel and 2
Bar Ilan
University, Isreal 1
85
Inheritance Metrics for Object-Oriented Design
Kumar Rajnish, Arbind Kumar Choudhary and Anand Mohan Agrawal, BITIC -
Muscat, Sultanate of Oman 8
86
Comparison of Class Inheritance and Interface Usage in Object Oriented
Programming through Complexity Measures
V. Krishnapriya1
and K. Ramar2
, 1
Sri Ramakrishna College of Arts & Science for
Women, India and 2
Sri Vidya College of Engineering and Technology, India 1
87
Adaptive Block Pinning Based: Dynamic Cache Partitioning for Multi-core
Architectures
Nitin Chaturvedi, Jithin Thomas and S Gurunarayanan, Birla Institute of
Technology and Science, India 0
88
Use of Smart Antennas In Ad Hoc Networks
Mohammed Ali Hussain1
, P.Suresh Varma2
, K. Satya Rajesh3
, Hussain Basha
Pathan3
and Leela Madhav Sarraju4
, 1
Sri Sai Madhavi Institute of Science &
Technology, India, 2
Adikavi Nannaya University, 3
Rayalaseema University, India
and 4
Dravidian University, India 10
89
A Novel Embedded Statistical Scheduler for Realising High System-QoS
Suman Paul, A. K. Jana and M. K. Pandit, Haldia Institute of Technology (HIT),
India 0
90
Security Enhencement & Solution for Authentication Frame work in IEEE
802.16
A.K.M. Nazmus Sakib, Chittagong University of Engineering & Technology,
Bangladesh 2
91
Security In Wireless Sensor Networks Using Key Management Schemes
Soundarya.P and Varalakshmi .L.M, Sri Manakula Vinayagar Engineering College,
India 2
92
Pattern Recognition Using Neural Networks
Santaji Ghorpade, Jayshree Ghorpade and Shamla Mantri, Pune University, India 16
93
Dynamic Scheduling of Skippable Periodic Tasks With Energy Efficiency In
Weakly Hard Real-Time System
Santhi Baskaran and P. Thambidurai, Pondicherry Engineering College, India 2
94
Some Observations On Open Source Software Development On Software
Engineering Perspectives
Vinay Tiwari, R.D. University - Jabalpur, India 10
95
Data Mining Algorithms And Medical Sciences
Irshad Ullah, City university of Science and information Technology, Pakistan 13
96
Network Intrusion Detection System Based On Machine Learning Algorithms
Vipin Das, Vijaya Pathak, Sattvik Sharma, Sreevathsan, MVVNS.Srikanth,
Gireesh Kumar T, Amrita Vishwa Vidyapeetham, India 16
97
Segmentation And Object Recognition Using Edge Detection Techniques
Y.Ramadevi, T.Sridevi, B.Poornima and B.Kalyani, Chaitanya Bharathi Institute of
Technology, India 70
98
Automatic Induction of Rule Based Text Categorization
D.Maghesh Kumar, AVC Polytechnic College, India 3
2011
99
Affine Invariant Descriptors of 3D Object Using Multiple Regression Model
M. Elhachloufi1
, A. El Oirrak1
, D. Aboutajdine2
and M.N. Kaddioui1
, 1
Caddy
Ayyad University, Morocco and 2
LEESA-GSCM, Morocco 2
100
Use-Case, Runtime and Deployment Views for Developing Subsidies Mobile
Wallet
Dina Darwish, International Academy for Engineering and Media Science, Egypt 0
101
Diagonal Based Feature Extraction for Handwritten Alphabets Recognition
System Using Neural Network
J.Pradeep, E.Srinivasan and S.Himavathi, Pondicherry College Engineering, India 0
102
Electre Methods in Solving Group Decision Support System Bioinformatics on
Gene Mutation Detection Simulation
Ermatita1
, Sri Hartati2
, Retantyo Wardoyo2
and Agus Harjoko2
, 1
Sriwijaya
University, Indonesia and 2
Gadjah Mada University, Indonesia 14
103
A Novel Super Resolution Reconstruction of Low Reoslution Images
Progressively Using DCT and Zonal Filter Based Denoising
Liyakathunisa and C.N .Ravi Kumar, Sri Jayachamrajendra College of
Engineering, India 3
104
Mining Target-Oriented Fuzzy Correlation Rules to Optimize Telecom
Service Management
Hao-En Chueh, Yuanpei University, Taiwan 5
105
Improving the Character Recognition Efficiency of Feed Forward BP Neural
Network
Amit Choudhary1
and Rahul Rishi2
, 1
Maharaja Surajmal Institute, India and 2
TITS
- Bhiwani, India 22
106
Initial Classification Through Back Propagation In a Neural Network
Following Optimization Through GA to Evaluate the Fitness of an Algorithm
Amit Ganatra, Y P Kosta, Gaurang Panchal and Chintan Gajjar, Charotar
University of Science and Technology, India 23
107
Adaptive Fuzzy Filtering for Artifact Reduction in Compressed images and
videos
P.Ramakrishna Rao1
, B.Addai1
, G.Ramakrishna1
and T.PanduRanga
Vital2
, 1
Dr.B.R.Ambedkar University, India and 2
Gayathri College of Science and
Management, India 0
108
Channel Allocation for Direct Sequence Spread Spectrum Using Vertex
Merge Algorithm
Handrizal, A.Noraziah and Ahmed N Abd.Alla, University Malaysia Pahang,
Malaysia 0
109
Combining Speedup Techniques based on Landmarks and Containers with
parallelised preprocessing in Random and Planar Graphs
R. Kalpana1
and P. Thambidurai2
, 1
Pondicherry Engineering College, India
and 2
Perunthalaivar Kamarajar Institute of Engineering & Technology, India 0
110
Machine Learning Methods for Spam E-Mail Classification
W.A. Awad1
and S.M. ELseuofi2
, 1
Port Said University, Egypt and 2
Ras El Bar
High inst., Egypt 0
111
A Formal Classification of Internet Banking Attacks and Vulnerabilities
Laerte Peotta, Marcelo D. Holtz, Bernardo M. David, Flavio G. Deus and Rafael
Timoteo de Sousa Jr., University of Brasilia (UnB), Brazil 18
112
Characterization of Tumor Region Using SOM and Neuro Fuzzy Techniques
in Digital Mammography
Anamika Ahirwar and R.S. Jadon, Madhav Institute of Technology & Science,
India 6
113
Search-Based Software Test Data Generation Using Evolutionary
Computation
P. Maragathavalli, Pondicherry Engineering College, India 9
114
Clustering Posts in Online Discussion Forum Threads
Dina Said1
and Nayer Wanas2
, 1
University of Calgary, Canada and 2
Electronics
Research Institute - Giza, Egypt 6
115
The Development of Electronic Payment System for Universities in Indonesia:
On Resolving Key Success Factors
Veronica S. Moertini, Asdi A. Athuri, Hery M. Kemit and Nico Saputro,
Parahyangan Catholic University, Indonesia 5
116
Brightness Factor Matching for Gesture Recognition System Using Scaled
Normalization
Mokhtar M. Hasan and Pramoud K. Misra, Banaras Hindu University, India 39
117
Behavior Analysis in a learning Environment to Identify the Suitable
Learning Style
Abdelaziz. K. Hamada1
, Magdy. Z. Rashad1
and Mohamed.G.
Darwesh2
, 1
Mansoura University, Egypt and 2
Ahram Canadian University, Egypt 17
118
An Object-Oriented Modeling and Implementation of Spatio-Temporal
Knowledge Discovery System
K.Venkateswara Rao1
, A.Govardhan2
and K.V.Chalapati Rao1
, 1
CVR College of
Engineering, India and 2
JNTUH College of Engineering, India 8
119
An Effective CBVR System Based on Motion, Quantized Color and Edge
Density Features
Kalpana Thakre1
, Archana Rajurkar2
and Ramchandra Manthalkar3
, 1
Sinhgad
College of Engineering, India, 2
MGM College of Engineering, India
and 3
SGGSIE&T - Nanded, India 5
120
Model Based System Engineering Approach of a Lightweight Embedded
TCP/IP
M. Z. Rashed, Ahmed E. Hassan and Ahmed I. Sharaf, Mansoura University,
Egypt 1
121
Model-Based Factors to Extract Quality Indications in Software Lines of Code
Mohammed Abdullah H. Al-Hagery, Qassim University, KSA 3
122
Wavelet Based Spectrum Sensing Techniques for CogKarthik Divakaran,
Naveen Manikandan P and Shri Hari R R, Amrita Vishwa Vidyapeetham,
Indianitive Radio - A Survey
Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, Amrita Vishwa
Vidyapeetham, India 12
123
Ontology Alignment Using Machine Learning Techniques
Azadeh Haratian Nejhadi, Bita Shadgar and Alireza Osareh, Shahid Chamran
University, Iran 13
124
A Novel Parallel Algorithm for Clustering Documents Based on the
Hierarchical Agglomerative Approach
Amal Elsayed Aboutabl1
and Mohamed Nour Elsayed2
, 1
Helwan University, Cairo,
Egypt and 2
Princess Noura University, Kingdom of Saudi Arabia 6
125
Adaptive Team-Based Multi-Agent Organizational Model: A Case in Rescue
Systems
Afsaneh Fatemi, Kamran Zamanifar and Naser Nematbakhsh, University of
Isfahan, Iran 4
126
A Descriptive Model for Developing a Hydraulic Geodatabase by Using the
GIS Softwares
El khamlichi Ahmed Mortada1
, Kadiri Mohamed1
, El mahboul Abdellah2
and
Merzouki Abderrahmane3
, 1
University Abdelamlek Essaadi, Morocco, 2
Hydraulic
basin Agency of Oum Er Rabii, Morocco and 3
University of Granada, Spain 2
127
Application of PUF-Enabled RFID Tags in Electronic Banking
Saeed Mehmandoust and Reza Ebrahimi Atani, The University of Guilan, Iran 2
128
Energy Efficient Task Scheduling of Send-Receive Task Graphs on
Distributed Multi-Core Processors with Software Controlled Dynamic Voltage
Scalin
Abhishek Mishra and Anil Kumar Tripathi, Banaras Hindu University, India 1
129
A Design of a Computer-Aided Diagnostic Tool For Chest X-Ray Analysis
Kim Le, University of Canberra, Australia 7
130
Characterization and Validation of Requirements Management Measures
Using Correlation and Regression Model
S. Arun Kumar and T.Arun Kumar, VIT University, India 4
131
An Automated Size Recognition Technique for Acetabular Implant in Total
Hip Replacement
A. Shapi'i, R. Sulaiman, M.K. Hasan and A.Y.M. Kassim, Universiti Kebangsaan
Malaysia, Malaysia 5
132
PHP Framework for Database Management Based on MVC Pattern
Chanchai Supaartagorn, Ubon Ratchathani University, Thailand 19
133
Importance of Data Collection and Validation for Systematic Software
Development Process
Mala.V.Patil1
and A.M.Nageswara Yogi2
, 1
Anna University - Coimbatore, India
and 2
Defence Research and Development Organization - Bangalore, India 1
134
Information Security Plan for Flight Simulator Applications
Jason Slaughter1
and Syed (Shawon) M. Rahman1,2
, 1
Capella University, USA
and 2
University of Hawaii-Hilo, USA 15
135
Common Phases of Computer Forensics Investigation Models
Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, Universiti Tenaga Nasional,
Malaysia 74
136
Comparison and Analysis of Watermarking Algorithms in Color Images -
Image Security Paradigm
D. Biswas1
, S. Biswas2
, P.P. Sarkar2
, D. Sarkar2
, S. Banerjee1
and A.
Pal1
, 1
Academy of Technology - Hoogly, India and 2
University of Kalyani, India 5
137
Evolutionary Neural Networks algorithm for the Dynamic Frequency
Assignment Problem
Jamal Elhachmi and Zouhair Guennoun, Mohammadia School of Engineers (EMI),
Morocco 11
138
Optimal Self Correcting Fault Free Error Coding Technique in Memory
Operation
Harikishore .Kakarla1
, Madhavi Latha .M2
and Habibulla Khan1
, 1
KL University,
India and 2
JNTUH - Hyderabad, India 2
139
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE)
Abderrahim BOUROUIS1
,Mohamed FEHAM1
and Abdelhamid
BOUCHACHIA2
, 1
Abou-bekr BELKAID University, Algeria and 2
University of
Klagenfurt, Austria 54
140
A Review on Elliptic Curve Cryptography for Embedded Systems
Rahat Afreen1
and S.C. Mehrotra2
, 1
Tom Patrick Institute of Computer & I.T -
Rauza Bagh, India and 2
Dr. B.A.M. University, India 21
141
Statistical Analysis on Software Metrics Affecting Modularity in Open Source
Software
Andi Wahju Rahardjo Emanuel1
, Retantyo Wardoyo2
, Jazi Eko Istiyanto2
and
Khabib Mustofa2
, 1
Maranatha Christian University, Indonesia and 2
Gadjah Mada
University, Indonesia 4
142
Proposed Information Sharing Security Approach for Security Personnels,
Vertical Integration, Semantic Interoperability Architecture and Framework
for Digital Government
Md.Headayetullah, G.K. Pradhan, Sanjay Biswas and B. Puthal, SOAU -
Bhubaneswar, India 1
143
Hybrid of Particle Swarm Optimization with Evolutionary Operators to
Fragile Image Watermarking Based DCT
Sawsan Morkos Gharghory, Electronics Research Institute - Cairo, Egypt 14
144
Image Retrieval using Bit-plane Pixel Distribution
N S T Sai1
and R C Patil2
, 1
Tech Mahindra Limited - Mumbai, India and 2
NMIMS
University, India 6
145
Detection of Masses in Digital Mammogram Using Second Order Statistics
and Artificial Neural Network
Al Mutaz M. Abdalla1
, Safaai Dress1
and Nazar Zaki2
, 1
Universiti Teknologi -
Malaysia, India and 2
UAE University, UAE 32
146
Effective Independent Quality Assessment using IV&V
Pathanjali Sastri Akella1
and K. Nageswara Rao2
, 1
V. R. Siddhartha Engineering
College, India and 2
P. V. P. Siddhartha Institute of Technology, India 2
147
E-Learning personalization based on Dynamic learners' preference
Essaid El Bachari, El Hassan Abelwahed and Mohammed El Adnani, University
Cadi Ayyad, Morocco 44
148
An LMS Based Blind Source Separation Algorithm Using A Fast Nonlinear
Autocorrelation Method
Behzad Mozaffari Tazehkand, University of Tabriz, Iran 0
149
A Novel Technique for Back-Link Extraction and Relevance Evaluation
Pooja Gupta1
, A.K. Sharma2
and Divakar Yadav3
, 1
MAIT - New Delhi,
India, 2
YMCA University of Science and Technology, India and 3
JIITU - Noida,
India 2
150
Electronic Commerce in Web 3.0: The Evidence from Emerging Economics
Xi Zhang1
and Doug Vogel2
, 1
Chinese Academy of Sciences, China and 2
City
University of Hong Kong, China 5
151
A Comparative Experiment of Several Shape Methods in Recognizing Plants
A. Kadir, L.E. Nugroho, A. Susanto and P.I. Santosa, Gadjah Mada University,
Indonesia 36
152
RCause - A Root Cause Analysis Model to Identify the Root Causes of
Software Reengineering Problems
Er. Anand Rajavat1
and Vrinda Tokekar2
, 1
Shri Vaishnav Institute of Technology
and Science Indore, India and 2
Institute of Engineering and Technology (DAVV)
Indore, India 0
153
Unsupervised horizontal collaboration based in SOM
Nadia Mesghouni Khaled Ghedira and Moncef Temani, University of Tunis
Laboratory LI3 ISG Tunis, Tunisie 2
154
Automatic Application Level Set Approach In Detection Calcifications In
Mammographic Image
Atef Boujelben1
, Hedi Tmar2
, Jameleddine Mnif1
and Mohamed Abid2
, 1
National
School of Medicine of Sfax, Tunisia and 1
National School of Engineers of Sfax,
Tunisia 3
155
A Robust Steganography Model Using Wavelet-Based Block-Partition
Modification
Sherin Youssef, Ahmed Abu Elfarag and Reta Raouf, Arab Academy for Science
& Tech - Alx., Egypt 11
156
Cultural Influences on Explicit and Implicit Knowledge Sharing Behaviour in
Virtual Teams
Xi Zhang, Chinese Academy of Sciences, P. R. China 10
157
A Fuzzy Framework For Segmentation, Feature Matching And Retrieval Of
Brain MR Images
Archana.S and Sridhar.S, College of Engineering - Guindy, India 0
158
MDA-Based ATL Transformation To Generate MVC 2 Web Models
Mhamed Rahmouni and Samir Mbarki, Ibn Tofail University, Morocco 5
159
Comprehensive Measurement Framework for Enterprise Architectures
Mahesh R. Dube1
and Shantanu K. Dixit2
, 1
VIT - Pune, India and 2
WIT - Solapur,
India 8
160
Plants Images Classification Based on Textural Features using Combined
Classifier
M.Z. Rashad, B.S.el-Desouky and Manal S .Khawasik, Mansoura University,
Egypt 27
161
Design and FPGA Implementation of DDR3 SDRAM Controller for High
Performance
Shabana Aqueel and Kavita Khare, M.A.N.I.T - Bhopal, India 4
162
Self-Adaptation Mechanism to Control the Diversity of the Population in
Genetic Algorithm
Chaiwat Jassadapakorn and Prabhas Chongstitvatana, Chulalongkorn University -
Bangkok, Thailand 8
163
Packet Scheduling Of Two Classes Flow
Rabie Barhoun and Abdelwahed Namir, University Hassan II, Morocco 1
164
Reduction Of Blocking Probability In Shared Protected Optical Network
Nirmala L Devi1
and V M Pandharipande2
, 1
Osmania University, India and 2
Dr.
Babasaheb Ambedkar Marathwada University, India 2
165
DNA Lossless Differential Compression Alogorithm Based on Similarity of
Genomic Sequence Database
Heba Afify, Muhammad Islam and Manal Abdel Wahed, Cairo University, Egypt 11
166
Performance Analysis Of Various Data Mining Classification Techniques On
Healthcare Data
Shelly Gupta1
, Dharminder Kumar2
and Anand Sharma2
, 1
Banasthali University,
India and 2
GJUS&T - Hisar, India 27
167
Towards A Model Of Maturity For Is Risk Management
Mina Elmaallam and Abdelaziz Kriouile, ENSIAS - Rabat, MOROCCO 12
168
A Fuzzy Approach For Clustering Gene Expression Time Series Data
Sadiq Hussain and G.C. Hazarika, Dibrugarh University - Assam, India 1
169
Novel Apporach for Speech Recognition by Using Self - Organized Maps
R.L.K.Venkateswarlu1
, R. Vasantha Kumari2
and A.K.V.Nagayya1
, 1
Sasi Institute
of Technology and Engineering, India and 2
Perunthalaivar Kamarajar Arts College,
India 9
Special Issue on "ICCSEA - 2011"
170
A New Trusted Third-Party Billing For Mobile Networks
Supriya Chakraborty1
and Nabendu Chaki2
, 1
JIS College of engineering - West
Bengal, India and 2
University of Calcutta, India 0
171
Performance Evaluation And Impact Of Weighting Factors On An Energy
And Delay Aware Dynamic Source Routing Protocol
Jihen Drira Rekik, Leila Baccouche and Henda Ben Ghezala,Manouba
University,Manouba, Tunisia 5
172
Indian Languages IR using Latent Semantic Indexing
A.P.SivaKumar1
, P.Premchand2
and A.Govardhan1
, 1
JNTUACE, India
and 2
Osmania University - Hyderabad, India 6
173
Active Controller Design For Global Choas Anti-Synchronization Of Li and
Tigan Chaotic Systems
Sundarapandian Vaidyanathan1
and Karthikeyan Rajagopal2
, 1
Vel Tech Dr. RR &
Dr. SR Technical University, India and 2
Singhania University Rajasthan, India
11
174
It Security Issues Within the Video Game Industry
Stephen Mohr1
and Syed (Shawon) Rahman1,2
, 1
Capella University, USA
and 2
University of Hawaii-Hilo, USA 9
175
Adaptive Beamforming Algorithm for Interference Suppression in GNSS
Receivers
Zhao hongwei1
, Lian Baowang1
and Feng Juan1,2
, 1
Northwestern Polytechnical
University, China, 2
KIT- Karlsruhe Institute of Technology, Germany 58
176
Minimize the False Positive Rate in a Database Intrusion Detection System
A. Rezk, H. Ali, M. El-Mikkawy and S. Barakat, Mansoura University, Egypt 4
177
Design Pattern Management System: A Support Tool Based on Design
Patterns Applicability
Zakaria Moudam, Radouan Belhissi and Noureddine Chenfour, University Sidi
Mohammed Ben Abdellah Fez, Morocco 0
178
Genetic Algorithm (GA) In Feature Selection For CRF Based
ManipuriMultiword Expression (MWE) Identification
Kishorjit Nongmeikapam1
and Sivaji Bandyopadhyay2
, 1
Manipur University, India
and 2
Jadavpur University, India 4
179
IRIS Recognition Based On LBP and Combined LVQ Classifier
M. Z. Rashad, M. Y. Shams, O. Nomir and R. M. El-Awady, Mansoura University,
Egypt 20
180
An IR-based Pedestrian Detection System Implemented with Matlab-
Equipped Laptop and Low-Cost Microcontroller
Erwin Thomas Gilmore, Chukwunweike Ugbome and Charles Kim, Howard
University, USA 7
181
New Method for 3D Shape Retrieval
Abdelghni Lakehal and Omar El Beqqali, Sidi Mohamed Ben AbdEllah University,
Morocco 2
182
Research Review for Digital Image Segmentation Techniques
Ashraf A. Aly1
, Safaai Bin Deris1
and Nazar Zaki2
, 1
Universiti Teknologi Malaysia
and 2
UAE University, UAE 41
183
Stable Filtering for Artificial Pheromone Potential Field Constructed By
Mobile Robots and Passive RFID Tags
Piljae Kim and Daisuke Kurabayashi, Tokyo Institute of Technology, Japan 0
184
Evaluate the Performance of Optical Cross Connect Based on Fiber Bragg
Grating Under Different Bit Rate
Bobby Barua, Ahsanullah University of Science and Technology, Bangladesh 7
185
Optimized Fuzzy Logic Application for MRI Brain Images Segmentation
Indah Soesanti1
, Adhi Susanto1
, Thomas Sri Widodo1
, Maesadji
Tjokronagoro2
, 1
Gadjah Mada University, Indonesia and 1
Gadjah Mada University,
Indonesia 15
186
Robust seed selection algorithm for k-means type algorithms
K. Karteeka Pavan1
, Allam Appa Rao2
, A. V. Dattatreya Rao3
and G. R.
Sridhar4
, 1
Jagarlamudi Chadramouli College of Engineering, India, 2
Jawaharlal
Nehru Technological University, India, 3
Acharya Nagarjuna University, India
and 4
Endocrine and Diabetes Centre, India 15
187
Knowledge Based Methods for Video Data Retrieval
S.Thanga Ramya and P.Rangarajan, RMD Engineering College, India 3
188
Analysis and Design Complex and Large Data Base using MySQL
Workbench
Dedi Iskandar Inan and Ratna Juita, Papua State University, Indonesia 2
189
Direct Manipulation of Web Browsing History
Gholam H. Khaksari, Pennsylvania State University, USA 3
190
A Semantically Enriched Web Usage Based Recommendation Model
C.Ramesh1
, K. V. Chalapati Rao1
and A.Goverdhan2
, 1
CVR College of
Engineering,India and 2
JNTUH College of Engineering, India 12
191
Enhancing Confidentiality of Private Communication through Dual
Compression
Kristipati Sudharshana Reddy, Munwar Sk and Rajesh Bhakthavatsalam, SVEC -
JNTU, India 0
192
Optimum Partition Parameter of Divide-And-Conquer Algorithm for Solving
Closest-Pair Problem
Mohammad Zaidul Karim and Nargis Akter, Daffodil International University,
Bangladesh 10
193
Monitoring Software Reliability using Statistical Process Control: An MMLE
Approach
R Satya Prasad1
, Bandla Sreenivasa Rao2
and R.R. L Kantham1
, 1
Acharya
Nagarjuna University, India and 2
VRS & YRN College, India 3
194
From 3D Model Data to Semantics
My Abdellah Kassimi and Omar El beqqali, Sidi Mohamed Ben Abdellah
University, Morocco 3
195
Recycling of Bandwidth in Metropolitan Area Networks(MAN)
Bhargava Devana1
, Sudharshana Kristipati 1
, Raghava Nirati2
, 1
JNTU - India
and 2
JITS, India 0
196
Adaptation AC to Improve Wireless Access Network Dependability
Olfa Ben Ahmed and Zied Choukair, University of Carthage, Tunisia 1
197
A Comparative Study To Find A Suitable Method For Text Document
Clustering
S.C.Punitha1
and M.Punithavalli2
, 1
P.S.G.R. Krishnammal College for women,
India and 2
Sri Ramakrishna College of engineering, India 2
198
Recognizing Bangla Grammar Using Predictive Parser
K.M. Azharul Hasan, Al-Mahmud, Amit Mondal and Amit Saha, Khulna
University of Engineering and Technology, Bangladesh 15
199
Hybrid GPS-GSM Localization of Automobile Tracking System
Mohammad A. Al-Khedher, Balqa Applied University, Jordan 75
200
Network Intrusion Detection Using Data Mining and Network Behaviour
Analysis
Ahmed Youssef and Ahmed Emam, King Saud University, KSA 18
201
Technical Analysis of Remote 3D Visualization on Mobile Devices
U.S. Junghare1
, V.M. Thakare2
, R.V.Dharaskar3
and S.S. Sherekar2
, 1
Brijlal Biyani
Science College, India, 2
SGB Amravati University, India 3
M.P.G.I. Nanded, India 2
202
Integrated Environment for Developing E-Learning Lectures
Vladimir Bondarev1
, Alexander Ossyka2
and Afif Mghawish1
, 1
Kharkov National
University of Radio Electronics, Ukraine and 2
Al-Zaytoonah Private University,
Jordan 4
203
Analysis of Different Privacy Preserving Cloud Storage Frameworks
Rajeev Bedi1
, Mohit Marwaha1
, Tajinder Singh2
, Harwinder Singh3
and Amritpal
Singh1
, 1
Beant College of Engineering and Technology, India, 2
Global Institute of
Engineering and Technology, India and 3
SSCET, India 7
204
Investigating the Awareness of Applying the Important Web Application
Development and Measurement Practices
Faudziah Ahmad, Fauziah Baharom and Moath Husni, Universiti Utara Malaysia,
Malaysia 3
205
Flooding Attacks to Internet Threat Monitors(ITM): Modeling and Counter
Measures Using Botnet and Honeypots
K.Munivara Prasad1
, A.Rama Mohan Reddy2
and M.Ganesh
Karthik3
, 1
Rayalaseema University, India 2
SV University, India and 3
Sree
vidyanikethan Engg.College, India 9
206
Mobile Geographic Information Systems: A Case Study on Mansoura
University, Egypt
Asmaa Ahmed Hussein1
, Elkhedr Hassan Eibrahim2
and Aziza Asem1
, 1
Mansoura
University, Egypt and 2
King Saud University, KSA 12
207
An Improved Neural Image Compression Approach With Cluster Based Pre-
Processing
Mohamed.G. Darwesh1
, Magdy. Z. Rashad2
and Abdelaziz. K. Hamada2
, 1
Cairo
University, Egypt and 2
Mansoura University, Egypt 0
208
From Learning Style of Webpage Content to Learner's Learning Style
Mohamed.G. Darwesh1
, Magdy. Z. Rashad2
and Abdelaziz. K. Hamada2
, 1
Cairo
University, Egypt and 2
Mansoura University, Egypt 7
209
Image Labeling and Segmentation using Hierarchical Conditional Random
Field Model
Manoj K.Vairalkar and Sonali.Nimbhorkar, RTMN University - Nagpur, India 0
210
Multi-Resolution Analysis For Medical Image Compression
Mohammed Alhanjouri, Islamic University of Gaza, Palestine 3
211
Introduction Of Knowledge Management Architecture Using Multi Agent
Sheikh Amanur Rahman1
, Anamika Bhardwaj1
, Mukul Pathak1
and Shobhit Singh
Rathore2
, 1
Galgotias College of Engineering & Technology, India and 2
SDG
Software India Pvt. Ltd, India 8
212
Optimal Fuzzy Model Construction With Statistical Information Using
Genetic Algorithm
Md. Amjad Hossain1
, Pintu Chandra Shill2
, Bishnu Sarker1
and Kazuyuki
Murase2
, 1
KUET, Bangladesh and 2
University of Fukui, Japan 2
213
Edge Detection Techniques For Image Segmentation
Muthukrishnan.R and M.Radha, Bharathiar University, India 61
2012
214
Trust Model for Reliable File Exchange In Cloud Computing
Edna Dias Canedo, Rafael Timoteo de Sousa Junior and Robson de Oliveira
Albuquerque, University of Brasilia, Brazil 15
215
An Approach for Robots to Deal with Objects
Sidiq S. Hidayat1,3
, Bong Keung Kim2
and Kohtaro Ohba2
, 1
University of Tsukuba,
Japan, 2
The National Institute of Advanced Industrial Science & Technology
(AIST) Tsukuba, Japan and 3
Politeknik Negeri Semarang, Indonesia 7
216
Enhancement of Images Using Morphological Transformations
K.Sreedhar1
and B.Panlal2
, 1
VITS (N9) Karimnagar, India and 2
VCE (S4)
Karimnagar, India 48
217
A Cluster Allocation and Routing Algorithm based on Node Density for
Extending the Lifetime of Wireless Sensor Networks
Wernhuar Tarng, Hao-Wei Lin and Kuo-Liang Ou, National Hsinchu University of
Education, Taiwan 12
218
Reliability Analysis of Multi Path Multistage Interconnection Networks
Sudarson Jena, G.Sri Sowmya, P.Radhika and P.Venkat Reddy, GITAM
University, India 4
219
A Novel Password based Multi Party Key Agreement Protocol on Elliptic
Curve
Daniyal M. Alghazzawi, King Abdulaziz University, Saudi Arabia 2
220
An Effective Model for Improving the Quality of Recommender Systems in
Mobile E-Tourism
Masoumeh Mohammadnezhad1
and Mehregan Mahdavi2
, 1
Islamic Azad
University, Iran and 2
University of Guilan, Iran 8
221
Image Segmentation in Video Sequences Using Modified Background
Subtraction
D. W. Chinchkhede & N. J. Uke, Pune University, India 17
222
Achieving Consensus with Individual Centrality Approach
Vitri Tundjungsari, Jazi Eko Istiyanto, Edi Winarko and Retantyo Wardoyo,
Gadjah Mada University, Indonesia 4
223
Blind 3D Model Watermarking based on Multi-Resolution Representation
and Fuzzy Logic
Sharvari C. Tamane1
and Ratnadeep R. Deshmukh2
, 1
MGM's Jawaharlal Nehru
Engineering College, India and 2
Dr. Babasaheb Ambedkar Marathwada University,
India 8
224
Integrated Task Clustering, Mapping and Scheduling for Heterogeneous
Computing Systems
Yuet Ming Lam, Macau University of Science and Technology, Macau 5
225
Ranking Popular Items By Naive Bayes Algorithm
Shiramshetty Gouthami, Golamari.Jose Mary and Pulluri Srinivas Rao, Jayamukhi
Institute of Technological Sciences, India 1
226
Quality of Service Using PSO Algorithm
S.M. ELseuofi, Umm Al-Qura University, Saudi Arabia 5
227
Image Retrieval System Using Hybrid Feature Extraction Technique
Vadhri Suryanarayana1
, M.V.L.N. Raja Rao2
, P. Bhaskara Reddy3
and G. Ravindra
Babu4
, 1
NRI Institute of Technology, India, 2
Gudlavalleru Engineering College,
India, 3
MLR Institutions, India and 4
S.C.C.E.T - Hyderabad, India 1
228
SignsWorld; Deeping into the Silence World and Hearing Its Signs (StAte oF
the Art)
A.M. Riad, Hamdy K.Elmonier,Samaa.M.Shohieb and A.S. Asem, Misr academy
for Engineering and Technology, Egypt 10
229
A Qualitative Study of LP-ITS: Linear Programming Intelligent Tutoring
System
Samy S. Abu Naser, Al-Azhar University-Gaza, Palestine 21
230
Graph Based New Approach for Frequent Pattern Mining
Anurag Choubey1
, Ravindra Patel2
and J.L. Rana3
, 1
Technocrats Institute of
Technology, India, 2
UIT-RGPV, India and 3
MANIT, India 1
231
An Approach for Agile SOA Development using Agile Principals
Majlesi Shahrbanoo, Mehrpour Ali and Mohsenzadeh Mehran, Islamic Azad
University, Iran 14
232
Error Probability Analysis of Free-Space Optical Links with Different
Channel Model under Turbulent Condition
Bobby Barua, Tanzia Afrin Haque and Md. Rezwan Islam, Ahsanullah University
of Science and Technology, Bangladesh 6
234
Visual Analysis of Cost Based Database Optimizers Using Picasso Tool
Neeraj Sharma1
, Kavindra Raghuwanshi2
, Syed Imran Ali1
and Banshilal
Patidar1
, 1
Trinity Institute of Technology and Research, India and 2
All Saints
College of Technology, India 0
235
MppSoCGEN: A Framework for automatic generation of MppSoC
Architecture
Emna Kallel, Yassine Aoudni, Mouna Baklouti and Mohamed Abid, ENIS School
Sfax, Tunisia
0
236
Cost breakdown of Public Cloud Computing and Private Cloud Computing
and Security Issues
Swarnpreet Singh and Tarun Jangwal, CT Institute of Engineering and
Management Technology, India 25
237
Mass Lesion Detection Using Wavelet Decomposition Transform and Support
Vector Machine
Ayman AbuBaker, Applied Science Private University Amman, Jordan 7
238
Document Summarization Using Positive Pointwise Mutual Information
Aji S1
and Ramachandra Kaimal2
, 1
University of Kerala, India and 2
Amrita Vishwa
Vidyapeetham Amritapuri Campus, India 6
239
Fuzzy Multi-objective Approach for the Improvement of Distribution
Network Efficiency by Considering DG
Ramadoni Syahputra, Universitas Muhammadiyah Yogyakarta, Indonesia 57
240
A Semi-Blind Reference Watermarking Scheme Using DWT-DCT-SVD for
Copyright Protection
Satyanarayana Murty. P1
, M.Uday Bhaskar2
and P. Rajesh Kumar3
, 1
GIITS,
India, 2
Sri Sai Aditya Institute of Science & Technology, India and 3
AU college of
Engineering, India 20
241
Review on Common Criteria as a Secure Software Development Model
Mehmet Kara, TUBITAK BILGEM UEKAE, Turkey 13
242
Dynamic Domain Classification for Fractal Image Compression
K. Revathy and M. Jayamohan, University of Kerala, India 1
243
Signal Processing for MIMO Interference Networks
Thanat Chiamwichtkun1
, Stephanie Soon2
and Ian Lim2
, 1
Bangkok University,
Thailand and 2
National University of Singapore, Singapore 0
244
Embedded Controller for Vehicle In-Front Obstacle Detection and Cabin
Safety Alert System
V.Ramya, B. Palaniappan and K. Karthick, Annamalai University, India 36
UNDERSTANDING the Concept of Geographic Information System and
Modelling Formalisms
Wembe Sop Diake Hubert, University of Douala, Cameroon 0
245
Spectral Analysis of Projection Histogram for Enhancing Close matching
character Recognition in Malayalam
Sajilal Divakaran, University of Kerala, India 4
246
Prashnottar: A Hindi Question Answering System
Shriya Sahu, Nandkishor Vasnik and Devshri Roy, MANIT Bhopal, India 10
247
Dimension Reduction by Mutual Information Feature Extraction
Ali Shadvar, Islamic Azad University, Iran 2
248
New-Fangled Method Against Data Flooding Attacks in MANET
Kavuri Roshan1
, K.Reddi Prasad1
, Niraj Upadhayaya1
and A.Govardhan2
, 1
J.B.
Institute of Engineering & Technology, India and 2
JNTUH, India 2
249
Evaluation of Information Retrieval Systems
Keneilwe Zuva1
and Tranos Zuva2
, 1
University of Botswana, UK and 2
Tshwane
University Technology, SA 15
250
Improvement of Traffic Overhead and Reliability in Wireless Sensor
Network
G.M. Mashrur-E-Elahi, Din Mohammad Mobin and Md. Anwar Ul Islam Rajib,
Khulna University of Engineering and Technology, Bangladesh 0
251
A Hybrid Region Growing Algorithm for Medical Image Segmentation
D. Muhammad Noorul Mubarak1
, M. Mohamed Sathik2
, S.Zulaikha Beevi3
and
K.Revathy11
University of Kerala, India , 2
Sathakathullah Appa College, India
and 3
National College of Engineering,India 12
252
Full Data Controlled Web-Based Feed Aggregator
Haruna Isah, University of Bradford, UK 4
253
High Availability Solution: Resource Usage Management in Virtualized
Software Aging
Aye Myat Myat Paing and Ni Lar Thein, University of Computer Studies, Yangon 5
254
Critical Analysis of Ecm Applications in the Clouds: A Case Study
James Xue1
and Amjad Yahya2
, 1
University of Northampton, UK,
and 2
PricewaterhouseCoopers, Saudi Arabia 1
255
Crawler Architecture Using Grid Computing
M.E.ElAraby1
, M.M.Sakre1
, M.Z.Rashad2
and O.Nomir2
, 1
Al Shorouk Academy,
Egypt, and 2
Mansoura University, Egypt 1
256
Automatic Segmentation of Manipuri (Meiteilon) Word into Syllabic Units
Kishorjit Nongmeikapam1
, Vidya Raj RK1
, Oinam Imocha Singh1
and Sivaji
Bandyopadhyay2
, 1
Manipur University, India and 2
Jadavpur Univeristy,India 0
257
An Approach for Integration Testing in Online Retail Applications
Roopa Singh and Imran Akhtar Khan, JJT University, India 1
258
A Rule Based Approach for Root Word Identification in Malayalam
Language
Meera Subhash, Wilscy. M, S.A Shanavas, University of Kerala, India 3
259
Applying Data Envelopment Analysis to Evaluation of Taiwanese Solar Cell
Industry Operational Performance
Hao-En Chueh and Jie-Yi Jheng, Yuanpei University, Taiwan 0
260
PCA - Wavelet Coefficients for T2 chart to Detect Endpoint in CMP process
Sihem Ben Zakour1
and Hassen Taleb2
, 1
Higher institute of Management of Tunis,
Tunisia and 2
Higher institute of business administration of gafsa,Tunisia 1
261
PSO Algorithm for IPD Game
Xiaoyang Wang and Yibin Lin, Sun-Yat Sen University, China 1
262
Training a Feed-Forward Neural Network with Artificial Bee Colony based
Backpropagation Method
Sudarshan Nandy1
, Partha Pratim Sarkar1
and Achintya Das2
, 1
Kalyani University,
India and 2
Kalyani Goverment Engineering College,India 22
263
Multicore Dynamic Kernel Modules Attachment Technique for Kernel
Performance Enhancement
Mohamed Farag, Maharishi University of Management, USA 0
264
Redescription Mining With Three Primary Data Mining Functionalities
M. Kamala Kumari and Suresh Varma, Adikavi Nannaya University, India 0
265
Spatial Data Mining using Cluster Analysis
Ch.N.Santhosh Kumar1
, V. Sitha Ramulu1
, K.Sudheer Reddy2
, Suresh Kotha1
, Ch
and Mohan Kumar1
, 1
Swarna Bharathi Inst. of Sc. & Tech, India and 2
Acharya
Nagarjuna University,India 5
266
Applications of Wireless Sensor Networks in Fall Detection for Senior People
Wernhuar Tarng1
, Chia-Hwei Lin1
and Hsin-Hun Liou2
, 1
National Hsinchu
University of Education, Taiwan and 2
National Central University, Taiwan 4
267
Intelligent Mining Association Rules
Sarjon Defit, University Putra Indonesia "YPTK" Padang 1
268
Comparison Study for Clonal Selection Algorithm and Genetic Algorithm
Ezgi Deniz Ulker and Sadık Ulker, Girne American University, Turkey 7
269
A New Audio Watermarking Method Based on Discrete Cosine Transform
with a Gray Image
Mohammad Ibrahim Khan1
, Md. Iqbal Hasan Sarker1
, Kaushik Deb1
and
Md.Hasan Furhad2
, 1
Chittagong University of Engineering & Technology,
Bangladesh and 2
University of Ulsan, South Korea 1
270
C-PASS-PC: A Cloud-driven Prototype of Multi-Center Proactive
Surveillance System for Prostate Cancer
Haibin Wang, Samuel Oschin Comprehensive Cancer Institute, USA 2
271
An Energy Aware Geocast Algorithm Using 2-Hop Neighbour Knowledge in
Sensor Networks
Young-Chul Shim1
and Sehun Noh2
, 1
Hongik University, Korea and 2
GuardianNet,
Korea 0
272
Genetic Algorithm with SRM SVM Classifier for Face Verification
Safiya K.M 1
, S.Bhuvana1
, P.TamijeSelvy1
and R. Radhakrishnan2
, 1
Sri Krishna
College of Technology, India and 2
Sri Ramakrishna Engineering college, India 0
273
Biometric Authentication Through a Virtual Keyboard for Smartphones
Matthias Trojahn1
and Frank Ortmeier2
, 1
Volkswagen AG, Germany and 2
Otto-
von-Guericke University, Germany 28
274
Improving Computer-Mediated Synchronous Communication of Doctors in
Rural Communities Through Cloud Computing: A Case Study of Rural
Hospitals in South Africa
Alfred Coleman1
, Marlien E Herselman2
and Mary Coleman3
, 1
University of South
Africa, 2
CSIR South Africa and 3
Medical University of South Africa, South Africa 5
275
Alfred Coleman1
, Marlien E Herselman2
and Mary Coleman3
, 1
University of
South Africa, 2
CSIR South Africa and 3
Medical University of South Africa,
South Africa
Bilal Hawashin1
, Farshad Fotouhi2
and William Grosky3
, 1
Alzaytoonah University
of Jordan, 2
Wayne State University, USA and 31
University of Michigan-
Dearborn,USA 0
276
Building a Portable Computer Lab with Bootable USB Hard Drives Using
Virtualisation
Hao Shi, Victoria University, Australia 0
277
A P2P Botnet Virus Detection System Based on Data-Mining Algorithms
Wernhuar Tarng, Cheng-Kang Chou and Kuo-Liang Ou, National Hsinchu
University of Education, Taiwan 1
278
Skyline Sets Queries for Incomplete Data
Mohammad Shamsul Arefin and Yasuhiko Morimoto, Hiroshima University, Japan 4
279
An Analyzer-Based Security Measurement Model for Increasing Software
Security
Sen-Tarng Lai, Shih Chien University, Taiwan 2
280
Machine Learning Algorithms in Web Page Classification
W. A. AWAD, Port Said University, Egypt 2
1
281 Achieving the Benefits of Agility in Software Architecture-XP
Zafar Karimi, Sajjad Behzady, Ali Broumandnia, Islamic Azad University at
Qazvin, Iran
282
An Insight View of Kernel Visual Debugger in System Boot up
Mohamed Farag, Maharishi University of Management, USA 0
283
Evolutionary Tuning of Fuzzy Rule Base Systems for Nonlinear System
Modelling and Control
Pintu Chandra Shill1
, Bishnu Sarker1
and Kazuyuki Murase2
, 1
University of Fukui,
Japan and 2
KUET, Bangladesh 0
284
Computational Analysis of Code Collaboration Pattern and Semantic Role
Lei Wu1
, Sharon White1
, Yi Feng1
, James Helm1
, Nathanial Wiggins3
, 1
University
of Houston-Clear Lake, USA, 2
Algoma University, Canada and 3
San Jacinto
College, Houston, USA 0
285
A Neuro-Fuzzy Inference Model for Breast Cancer Recognition
Bekaddour Fatima and Chikh Mohammed Amine,Abou Bekr Belkaid University ,
Tlemcen, Algeria 15
286
Building a Legal Expert System for Legal Reasoning in Specific Domain-A
Survey
Venkateswarlu Naik.M and Sushant Lokhanday, Keshava Memorial Institute of
Technology, India 4
287
A Rough - Neuro Model for Classifying Opponent Behavior in Real Time
Strategy Games
M. Z. Rashad, Mansoura University, Egypt 5
288
Efficient Scheduling ff Real-Time Parallel Applications on Clusters
Abeer Hamdy1
, Reda Ammar2
and Ahmed E. Youssef3
, 1
British University in
Egypt, 2
University of Connecticut, USA and 3
Helwan University, Egypt 0
289
ASP-SSN: An Effective Approach for Linking Semantic Social Networks
Sanaa Kaddoura1
and Islam Elkabani2
, 1
Beirut Arab University, Lebanon
and 2
Alexandria University, Egypt 0
290
Design of an Efficient MAC Protocol for Opportunistic Cognitive Radio
Networks
Mahfuzulhoq Chowdhury1
, Asaduzzaman1
, Md. Fazlul Kader1,2
and Mohammad
Obaidur Rahman1
, 1
Chittagong University of Engineering & Technology,
Bangladesh, 2
University of Chittagong, Bangladesh 3
291
Fast Hue-Preserving Histogram Equalization Methods For Color Image
Contrast Enhancement
David Menotti1,2,4
, Laurent Najman2
, Jacques Facon3
and Arnaldo de A.
Albuquerque4
, 1
Federal University of Ouro Preto, Brazil, 2
Universite Paris-Est,
France, 3
Pontificia Universidade Catolica do Parana, Brazil and 4
Universidade
Federal de Minas Gerais, Brazil 6
292
Efficient Monitoring in Online Tests Using Esdv Method
Sri Anusha.N, Sai Soujanya.T and Vasavi.S, Jawaharlal Nehru Technological
University, India 0
293
Accessibility of Information Technologies in the Resting Home
Ozlem Cakır, Ankara University, Turkey 0
294
An Information System to Support and Monitor Clinical Trial Process 0
295
Rotation Invariant Color Retrieval
Swapna Borde1
and Udhav Bhosle2
, 1
Vidyavardhini's College of Engineering and
Technology,India and 2
Rajiv Gandhi Institute of Technology,India 1
296
Design of Physical Games for Learning the Lotus Effect
Wernhuar Tarng1
, Shih-Hsien Tsai1
, Chih Ming Lin1
, Chi-Young Lee2
and Hsin-
Hun Liou3
, 1
National Hsinchu University of Education, Taiwan, 2
National Tsing
Hua University, Taiwan and 3
National Central University, Taiwan 1
297
A Novel and Single Chip Tri-Band Low-Noise Amplifier for Wlan, Wifi and
Wimax Receivers
I. Akhchaf, S. Khoulji, M. Essaidi and M.L. Kerkeb, Abdelmalek Essaadi
University Morocco 1
298
An Efficient Passage Ranking Technique For a QA System
Pooja A1
, Vinodh Krishnan2
and Geetha Manjunath3
, 1
Amazon Development
Centre India, 2
Oracle India Private Ltd, India and 3
HP Labs, India 1
299
Multi-Homing Enabled Cognitive Radio Based Inter-Vehicle Communication
System
Faisal Riaz1
, Kaleem Ahmed1
, Iftikhar Ahmad1
, Muhammad Ibrahim1
, Samreen
Ayaz1
, Rabia Rauf1
, Muhammad Kabeer1
, Naheed Akhtar1
, Jameel Ahmed2
and
Sadat Dar2
, 1
Mirpur University of Science and Technology, Pakistan and 2
HITEC
University Taxila Cantt, Pakistan 0
300
Ear Recognition and Occlusion
B. S. El-Desouky1
, M. El-Kady2
, M. Z. Rashad1
,and Mahmoud M.
Eid1
, 1
Mansoura University, Egypt and 2
Helwan University, Egypt 0
301
Computing Installation Parameters Of CCTV Cameras for Traffic
Surveillance
Pratishtha Gupta and G. N. Purohit, Amrita Dadhich, Banasthali Vidyapith, India 3
302
An Experimental Survey Towards Engaging Trustable Hypervisor Log
Evidence Within a Cloud Forensic Environment
Sean Thorpe, University of Technology, Kingston, Jamaica 4
303
Adaptive Backstepping Controller and Synchronizer Design for Arneodo
Chaotic System With Unknown Parameters
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical
University,India 13
304
R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)
Dhananjoy Dey1
, Noopur Shrotriya1
and Indranath Sengupta2
, 1
SAG,India
and 2
Jadavpur University,India 2
305
Denoising of Medical Ultrasound Images Using Spatial Filtering and
Multiscale Transforms
V N Prudhvi Raj1
and T Venkateswarlu2
, 1
VR Siddhartha Engineering
College,India and 2
SV University,India 3
306
Shaping of Location Conscious Information
Palson Kennedy .R1
and Rajashekhara2
, 1
CMJ University,Chennai,India
and 2
Impact College of Engineering and Applied Sciences,India 1
307
Improved Spatial Gray Level Dependence Matrices for Texture Analysis
Olfa Ben Sassi, Lamia sellami, Mohamed Ben Slima, Khalil Chtourou, Ahmed Ben
Hamida, University of Sfax, Tunisia 10
2013
308
A Systematic Mapping Study on Business Process Variability
George Valenca1
, Carina Alves1
, Vander Alves2
, Nan Niu3
,1
Federal University of
Pernambuco (UFPE), Brazil,2
University of Brasilia,Brazil and 3
Mississippi State
University, USA. 27
309
A Neuro-Fuzzy Approach for the Fault Location Estimation of
Unsynchronized Two-Terminal Transmission Lines
Ramadoni Syahputra,Universitas Muhammadiyah Yogyakarta,Indonesia 45
310
Sobel Edge Detection Method to Identify and Quantify the Risk Factors for
Diabetic Foot Ulcers
Kunjam Nageswara Rao1
, P srinivasa Rao1
, Allam Appa Rao2
, G R
Sridhar3
,1
Andhra university, India, 2
University of Hydeabad, India and 3
Endocrine
& Diabetes centre,India. 2
311
Improving the Management of Cost and Scope in Software Projects Using
Agile Practices
Mariana de Azevedo Santos1
, Paulo Henrique de Souza Bermejo2
, Marcelo Silva
de Oliveira2
, Adriano Olimpio Tonelli2
, Enio Junior Seidel3
,1
Mitah Technologies,
Lavras, Brazil2
Universidade Federal de Lavras (UFLA), Brazil and 3
Universidade
Federal do Pampa (UNIPAMPA),Brazil. 7
312
An Evaluation Method of Research on Wearable Wireless Body Area
Network in Healthcare
Roberto Vito Rodrigues Filho1
, Renato Freitas Bulcao Neto1
, Bruno Oliveira
Silvestre1
, Leandro Luis Galdino de Oliveira1
, Rogerio Orlow de Oliveira2
and
Iwens Gervasio Sene Junior1
,1
Universidade Federal de Goias, Brazil
and 2
Pontificia Universidade Catolica de Goias,Brazil. 5
313
Pre-Segmentation for the Computer Aided Diagnosis System
Myat Mon Kyaw,University of Technology (Yatanarpon Cybercity), Myanmar 3
314
Extended Nymble: Method for Tracking Misbehaving Users Anonymosly
While Blocking
M.Durga Prasad1
, P.Chenna Reddy2
, Banoth Samya1
,1
Vijay Institute of Tech &
Sciences, India, 2
JNTUCE, Pulivendula, India and 13
Vijay college of Engineering
for women,India 0
315
Correlation Based VMS Placement Resource Provision
Zar Lwin Phyo and Thandar Thein,University of Computer Studies,Myanmar. 0
316
Classification Methods of Skin Burn Images
Malini Suvarna1
, Sivakumar2
and U C Niranjan3
,1
Atria Institute of Technology,
India, 2
Dr. Ambedkar Institute of Technology, India3
Director of Research, Manipal
Dot, India 2
317
Concept-Based Indexing in Text Information Retrieval
Fatiha Boubekeur1
and Wassila Azzoug2
,1
Mouloud Mammeri University of Tizi-
Ouzou, Algeria, 2
M'Hamed Bouguera, University of Boumerdes,Algeria 11
318
Performance Analysis of Kernel-Based Virtual Machine
Sudha M, Harish G M, Nandan A, Usha J, R V College of Engineering,India. 1
319
Analysis of Digital Images Using Morphlogical Operations
Amalorpavam.G1
, Harish Naik T2
, Jyoti Kumari3
, Suresha M4
,1
Sambhram
Academy Of Mgmt. Studies,India, 2
Presidency College,India, 3
Acharya Institutes
(Aigs),India and 4
Jnana Sahyadri,Kuvempu University,India 7
320
An Ontology based Text Mining framework for R&D Project Selection
N.Arunachalam, E.Sathya, S.Hismath Begum and M.Uma Makeswari, Sri
Manakula Vinayagar Engineering College, India 3
321
Mining Closed Regular Patterns in Data Streams
M.Sreedevi1
and L.S.S.Reddy2
,1
K L University, India and 2
LBR College of
Engineering, India 2
322
Teaching Automated Test Data Generation Tools for C, C++ , and Java
Programs
Hitesh Tahbildar and Plabita Borbora, G. P. Khataniar, Assam Engineering
Institute, India 0
323
Adaptive Design of Controller and Synchronizer for Lu-Xiao Chaotic System
with Unknown Parameters
Sundarapandian Vaidyanathan,Vel Tech Dr. RR & Dr. SR Technical
University,India. 10
324
Hybrid Optical and Electrical Network Flows Scheduling in Cloud Data
Centres
Ibrahim Kabiru Musa and Stuart Walker, University of Essex, UK 0
325
An Investigation of the Energy Consumption by Information Technology
Equipments
Baharak Makki1
and Bahador Makki2
, 1
University of Agder, Norway
and 2
University of Bremen, Germany 0
326
Structural Coupling in Web 2.0 Applications
Maya Samaha Rupert, Notre Dame University Louaize, Lebanon 0
327
APPBACS: An Application Behavior Analysis And Classification System
Himanshu Pareek, P R L Eswari and Sarat Chandra Babu, Center for Development
of Advanced Computing, India 0
328
An Effective Method for Information Security Awareness Raising Initiatives
AliMaqousi1
, TatianaBalikhina1
, Michael Mackay2
, 1
Petra University, Jordan
and 2
Liverpool John Moores University, UK 5
329
Adaboost Ensemble with Simple Genetic Algorithm for Student Prediction
Model
AhmedSharaf ElDen1
, Malaka A. Moustafa2
, Hany M. Harb3
and
AbdelH.Emara3
, 1
Helwan University, Egypt, 2
Al-Alson Higher Institute of
Tourism, Egypt and 3
Azhar University, Egypt 11
330
Pixel Size Reduction Loss-Less Image Compression Algorithm
>Pralhadrao V Shantagiri and Saravanan K N, Christ University, India 7
331
Social Media News: Motivation, Purpose and Usage
Samaneh Beheshti-Kashi and Baharak Makki, University of Agder, Norway 6
332
A Heuristic Approach for Web-Service Discovery and Selection
Achraf Karray1
, Rym Teyeb2
and Maher Ben Jemaa3
, 1
Najran University,
KSA, 2
Higher Institute of the Technological Studies of Tataouine, Tunisia
and 3
National School of Engineers of Sfax, Tunisia 7
333
Developing Mobile Agent for Intrusion Detection
Bambang Sugiantoro1
, Retantyo Wardoyo2
, Sri Hartati2
, Jazi Eko Istiyanto2
, 1
State
Islamic University Sunan Kalijaga, Indonesia and 2
Gadjah Mada University,
Indonesia 0
334
Requirements Engineering of a Web Portal Using Organizational Semiotics
Artifacts and Participatory Practices
Flavia Linhalis Arantes, State University of Campinas (UNICAMP), Brazil 2
335
Shadow Detection Using Tricolor Attenuation Model Enhanced with Adaptive
Histogram Equalization
Jyothisree V. and Smitha Dharan, College of Engineering Chengannur, India 4
336
Performance Analysis of Parallel Pollard's Rho Factoring Algorithm
Anjan K Koundinya, Harish G,Srinath N K, Raghavendra G E, Pramod Y V,
Sandeep R and Punith Kumar G, R V College of Engineering, India 1
337
Fuzzy Rule Base System for Software Classification
Adnan Shaout and Juan C. Garcia, The University of Michigan - Dearborn, United
States 0
338
Context-Based Barrier Notification Service Toward Outdoor Support for the
Elderly
Keisuke Umezu1
, Takahiro Kawamura2
and Akihiko Ohsuga2
, 1
NEC Corporation,
Japan and 2
University of Electro-Communications, Japan 5
339
Hyper-Mspace; Multidimensional Evolutionary-Agents Modeling and
Analysis
Mohamed Dbouk1
, Ihab Sbeity1
, Hamid Mcheick2
and Haytham
Douaihy3
, 1
Lebanese University, Beirut-Lebanon, 2
Universite du Quebec a
Chicoutimi, Canada and 3
Lebanese University-DSST, Beirut-Lebanon 2
340
A Novel Hybrid Method for the Segmentation of the Coronary Artery Tree in
2d Angiograms
>Daniel S.D. Lara1
, Alexandre W.C. Faria2
, Arnaldo de A. Araujo1
and D.
Menotti3
, 1
Univ. Fed. de Minas Gerais, Brazil, 2
UFMG, Brazil and 3
Universidade
Federal de Ouro Preto, Brazil 3
341
Modified Heuristic Time Deviation Technique for Job Sequencing and
Computation of Minimum Total Elapsed Time
N.Nagamalleswara Rao1
, O. Naga Raju2
and I. Ramesh Babu2
, 1
R.V.R & J. C.
College of Engineering, India and 2
Nagarjuna University, India 1
342
Security Threats on Cloud Computing Vulnerabilities
Te-Shun Chou, East Carolina University, U.S.A
58
343
Handover Management Scheme in LTE Femtocell Networks
Tijane Fatima Zohra Badri1,2
, Saadane Rachid1
, Mohammed Wahbi1
and
MbarkiSamir2
, 1
SIR2C2S/LASI-EHTP Casablanca, Morocco and 2
Ibn Tofail
University Kenitra, Morocco 8
344
Saasquality - A Method for Quality Evaluation of Software as a Service
(Saas)
Nemesio Freitas Duarte Filho1
, Clarindo Isaias Pereira da Silva e Padua1
, Paulo
Henrique de Souza Bermejo2
, Andre Luiz Zambalde2
, Urlan Salgado de
Barros3
, 1
Federal University of Minas Gerais, Brazil, 2
Federal University of
Lavras, Brazil and 3
Federal University of Parana, Brazil 2
345
An Efficient Approach to Wavelet Image Denoising
Alaa A. Hefnawy and Heba A. Elnemr, Electronics Research Institute, Egypt 0
346
Towards A Good ABS Design for More Reliable Vehicles on the Roads
Afifa Ghenai, Mohamed Youcef Badaoui and Mohamed Benmohammed,
University of Constantine, Algeria 2
347
Designing of an efficient algorithm for identifying Abbreviation definitions in
biomedical Text
Shashank Singh1
, Gaurav Sharma2
Abdul Nazeer K A3
and Shalini Singh2
, 1
IBM
India Private limited, India, 2
School of Biochemical Engineering IIT (BHU), India
and 3
NIT, India 0
348
Labeled Generalized Stochastic Petri Net Based Approach for Web Services
Composition
Sofiane Chemaa, Mouna Bouarioua and Allaoua chaoui, University of Constantine,
Algeria 0
349
Bounded Ant Colony Algorithm Fortask Allocation on Anetwork of
Homogeneous Processorsusing a Primary Site (Bts-Aco)
Buthayna Al-Sharaa and Tamara Al-Qublan, AL Balqa Applied University, Jordan 3
350
Biomedical Image Transmission Based on Modified Feistal Algorithm
Jinu Elizabeth John, Saintgits College of Engineering, India 2
351
Intelligent Access Control Policies for Social Network Site
Saung Hnin Pwint Oo, University of Technology (Yatanarpon Cyber City),
Myanmar 2
352
A Review of Temporal Aspects of Hand Gesture Analysis Applied to
Discourse Analysis and Natural Conversation
Renata C. B. Madeo, Priscilla K. Wagner and Sarajane M. Peres, Universidade de
Sao Paulo, Brazil 9
353
A Tabu Search Algorithm With Efficient Diversification Strategy for High
School Timetabling Problem
Salman Hooshmand1
, Mehdi Behshameh2
and OmidHamidi1
, 1
Hamedan University
of Technology, Iran and 2
Islamic Azad University, Iran 0
354
Analysis of Elementary Cellular Automata Boundary Conditions
K. Salman, Middle Tennessee State University, USA 5
355
Design and Implementation of Repair-aware Test Flow for Multi-Memory
Gang Wang and Huajun Chen, Loongson Technology Corporation Limited, China 0
356
Vedivision – A Fast Bcd Division Algorithm Facilitated by Vedic
Mathematics
Diganta Sengupta1
Mahamuda Sultana2
and Atal Chaudhuri3
, 1
Future Institute of
Engineering and Management, India, 2
Swami Vivekananda Institute of Science and
Technology, India and 3
Jadavpur University, India 1
357
Integrations of ICT in Education Sector for the Advancement of the
Developing Country: Some Challenges and Recommendations-Bangladesh
Perspective
Mst. Shahnaj Parvin, International Islamic University, Bangladesh 7
358
Comparative Study of Backpropagation Algorithms in Neural Network Based
Identification of Power System
Sheela Tiwari1
, Ram Naresh2
and Rameshwar Jha3
, 1
Dr. B R Ambedkar National
Institute of Technology, India, 2
National Institute of Technology, India and 3
IET
Bhaddal Technical Campus, India 9
359
Matching Structure and the Evolution of Cooperation in the Prisoner’s
Dilemma
Noureddine Bouhmala and Jon Reiersen, Vestfold University College, Norway 0
360
Survey of the Euro Currency Fluctuation by Using Data Mining
M. Baan, E. Saadati and M. Nasiri, Iran University of Science and Technology,
Iran 0
361
GPS Tracking System Coupled With Image Processing in Traffic Signals to
Enhance Life Security
Manoj Prabhakar K and Manoj Kumar S, Anna University, India 2
362
Following Car Algorithm With Multi Agent Randomized System
Mounir Gouiouez, Noureddine Rais and Mostafa Azzouzi Idrissi, University Sidi
Mohammed Ben Abdellah, Morocco 1
363
Periocular Recognition Using Reduced Features
Ambika D R, Radhika K R and D Sehsachalam, BMS College of Engineering,
India 2
364
Design and Development of Secure Navigation System for Visually Impaired
People
Prashant Bhardwaj and Jaspal Singh, Centre for Development of Advanced
Computing, Mohali 5
365
A Novel Perceptual Image Encryption Scheme Using Geometric Objects
Based Kernel
Prabhudev Jagadeesh1
, P. Nagabhushan1
and R. Pradeep Kumar2
, 1
University of
Mysore, India and 2
Amphisoft Technologies Private Limited, India 1
366
Performance Analysis of Round Trip Time in Narrowband RF Networks For
Remote Wireless Communications<
El miloud Ar reyouchi1
, Kamal Ghoumid2
, Koutaiba Ameziane1
and Otman El
Mrabet1
, 1
Abdelmalek Essaadi University, Morroco and 2
Informatics and
Telecommunications, ENSAO, Morocco 2
367
Automatic Detection of Microaneurysms and Hemorrhages in Color Eye
Fundus Images
Sérgio Bortolin Júnior and Daniel Welfer, Universidade Federal do Pampa,
Brazil 31
368
Project Monitoring and Control Measures In CMMI
Mahmoud Khraiwesh, Zarqa University, Jordan 0
369
A Preliminary Survey on Optimized Multiobjective Metaheuristic Methods
for Data Clustering Using Evolutionary
Ramachandra Rao Kurada1
, K Karteeka Pavan2
and AV Dattareya Rao1
, 1
Acharya
Nagarjuna University, India and 2
RVR & JC College of Engineering, India 12
370
Diagnosis of Some Diseases in Medicine via computerized Experts System
R.A. Soltan, M. Z. Rashad and B.El-Desouky, Mansoura University, Egypt 4
371
Improving the Effectiveness of Information Retrieval System Using Adaptive
Genetic Algorithm
Wafa Maitah1
, Mamoun Al-Rababaa1
and Ghasan Kannan2
, 1
Al al-Bayt University,
Jordan and 2
Amman Arab University, Jordan 10
372
The Comparison of the Text Classification Methods to be Used for the
Analysis of Motion Data in DLP Architect
Murat Topaloglu, Trakya University, Turkey 0
373
A Privacy - Learning Objects Identity System for Smartphones Based on a
Virtual Learning Environment Database
LeThanhHieu, JinHai, DeQingZou and WangDaiBin, HuaZhong University of
Science and Technology, China 0
374
Systems Variability Modeling: A Textual Model Mixing Class and Feature
Concepts
Ola Younis1
, Said Ghoul1
, and Mohammad H. Alomari2
, 1
Philadelphia University,
Jordan and 2
Applied Science University, Jordan 3
375
Compact, “Fuzzy― Information
S.Balaji Vivek, Easwari Engineering College, India 0
376
The Principles of Humanism for MANETs
Md. Amir Khusru Akhtar1
and G. Sahoo2
, 1
Cambridge Institute of Technology,
India and 2
Birla Institute of Technology, India 0
377
The Application Wavelet Transform Algorithm in Testing ADC Effective
Number of Bits
Emad A. Awada, Applied Science University, Jordan 0
378
Introducing a Novel Fault Tolerant Routing Protocol in Wireless Sensor
Networks Using Fuzzy Logic
Mostafa Vakili Fard1
, Sayyed Majid Mazinani2
and Sayyed Ahmad
Hoseini3
, 1
Science and Research IAU, Iran, 2
Imam Reza University, Iran
and 3
Payam Noor University, Iran 2
379
Data Mining Model for the Data Retrieval from Central Server
Configuration
Srivatsan Sridharan, Kausal Malladi and Yamini Muralitharan, International
Institute of Information Technology - Bangalore, India 0
380
The Impact of Frequent Use Email When Creating Account at the Websites
on the Users Privacy and Security
Salwa Al-Samirrai, Zahra Fadhil Mohsen and Aysh Alhroob, Isra University,
Jordan 0
381
Molecular Solutions for the Set-Partition Problem on Dna-Based Computing
Sientang Tsai and Wei-Yeh Chen, Southern Taiwan University of Science and
Technology, Taiwan 1
382
Brazilian License Plate Detection Using Histogram of Oriented Gradients and
Sliding Windows
R. F. Prates1
, G. Cámara-Chávez1
, William R. Schwartz2
and D.
Menotti1
, 1
University Federal of Ouro Preto, Brazil and 2
University Federal of
Minas Gerais, Brazil 5
383
Distributed Cloud Computing Environment Enhanced With Capabilities for
Wide-Area Migration and Replication of Virtual Machines
Young-Chul Shim, Hongik University, Korea 0
384
Study On Decision-Making for Cafe Management Alternatives
Cheng-I Hou, Chung Hua University, Taiwan 2
385
Multi-Topic Multi-Document Summarizer
Fatma El-Ghannam1
and Tarek El-Shishtawy2
, 1
Electronics Research Institute,
Egypt and 2
Benha University, Egypt 15
386
An Sna-Bi Based System for Evaluating Virtual Teams: A Software
Development Project Case
Lamia Ben Hiba and Mohammed Abdou Janati Idrissi, Mohammed V Souissi
University, Morocco 0
387
Gesture Recognition Based Mouse Events
Rachit Puri, Samsung Research India, India 5
388
A Prediction Model for Taiwan Tourism Industry Stock Index
Taiwan Han-Chen Huang and Fang-Wei Chang, Yu Da University of Science and
Technology, 0
2014
389
Cardinal Direction Relations in Qualitative Spatial Reasoning
Chaman L. Sabharwal and Jennifer L. Leopold, Missouri University of Science and
Technology, USA 3
390
Information Security Approach in Open Distributed Multi-Agent Virtual
Learning Environment
Zahi A.M. Abu Sarhan1
and As'ad Mahmoud As'ad Alnaser2
, 1
Applied Science
Private University, Jordan and 2
Al-Balqa' Applied University, Jordan 0
391
Information Security Risk Analysis Methods and Research Trends: AHP and
Fuzzy Comprehensive Method
Ming-Chang Lee, National Kaohsiung University of Applied Science, Taiwan 23
392
Evaluation of Image Segmentation and Filtering With Ann in the Papaya Leaf
Maicon A. Sartin11
and Alexandre C. R. da Silva2
, 1
UNEMAT, Brazil and 2
Ilha
Solteira, Brazil 2
393
Clustering Effects on Wireless Mobile Ad-Hoc Networks Performances
Gideon Naah and Edwin Boadu Okoampa, University of Electronic Science and
Technology of China, China 1
394
What Facilitates the Delivery of Citizen-Centric EGovernment Services in
Developing Countries: Model Development and Validation Through
Structural Equation Modeling
Yousef Elsheikh and Mohammad Azzeh, Applied Science University, Jordan 7
395
A Study on the Chain Restaurants Dynamic Negotiation Games of the
Optimization of Joint Procurement of Food Materials
Hung-Teng Chang, Yu Da University of Science and Technology, Taiwan 1
396
Shape-Based Plagiarism Detection for Flowchart Figures in Texts
Senosy Arrish, Fadhil Noer Afif, Ahmadu Maidorawa and Naomie Salim,
Universiti Teknologi Malaysia, Malaysia 8
397
A Study on the Dynamic Effect of Sports Promotion Strategy and
Effectiveness of NationalHealth Care in Taiwan
Tian-Syung Lan and Pin-Chang Chen, Yu Da University of Science and
Technology, Taiwan 0
398
Fulfillment Request Management (The approach)
Stylianos Gkoutzioupas, Univercity of the Aegean, Greece 0
399
Processing Obtained Email Data By Using Naïve Bayes Learning Algorithm
Valery V. Pelenko and Aleksandr V. Baranenko, St. Petersburg Research
University of Information Technologies, Russia 1
400
A Linear Algorithm for the Grundy Number of A Tree
Ali Mansouri and Mohamed Salim Bouhlel, Department of Electronic
Technologies of Information and Telecommunications Sfax, Tunisia 0
401
Research on Dynamic Effects of Employability of Vocational College Students
in Taiwan
Pin-Chang Chen, Yu Da University of Science and Technology, Taiwan 1
402 Performance Variations in Profiling Mysql Server on the Xen Platform: Is It
Xen or Mysql?
Ashish Tapdiya and Yuan Xue, Vanderbilt University, United States
0
403
Design of a Virtual Ecological Pond for Motion-Sensing Game-Based
Learning
Wernhuar Tarng1
, Nien-Yin Lu1
, Yi-Syuan Shih1
and Hsin-Hun Liou2
, 1
National
Hsinchu University of Education, Taiwan and 2
National Central University,
Taiwan 1
404
Cloud Web-Based Operating System (Cloud Web Os)
Hesham Abusaimeh, Applied Science University, Jordan 1
405
An Adaptive Framework for Enhancing Recommendation Using Hybrid
Techniques
Radhya Sahal, SaharSelim and Abeer ElKorany, Cairo University, Egypt 1
406
Estimation of Optimized Energy and Latency Constraint for Task Allocation
in 3d Network on Chip
Vaibhav Jha1
, Mohit Jha2
and G K Sharma1
, 1
ABV- Indian Institute of Information
Technology and Management, India and 2
Jabalpur Engineering College, India 1
407
Case-Based Reasoning for Explaining Probabilistic Machine Learning
Tomas Olsson1,2
, Daniel Gillblad2
, Peter Funk1
, and Ning Xiong1
, 1
Mälardalens
University, Sweden and 2
SICS Swedish ICT, Sweden 4
408
Business Bankruptcy Prediction Based on Survival Analysis Approach
Ming-Chang Lee, National Kaohsiung University of Applied Science, Taiwan 3
409
Recognition and Ranking Critical Success Factors of Business Intelligence in
Hospitals - Case Study: Hasheminejad Hospital
Marjan Naderinejad, Mohammad Jafar Tarokh and Alireza Poorebrahimi, Islamic
Azad University, Iran 3
410
Design and Implementation of a Personal Super Computer
Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi Arabia 0
411
Output Privacy Protection With Pattern-Based Heuristic Algorithm
P.Cynthia Selvi1
and A.R.Mohammed Shanavas2
, 1
KNGA College(W), India
and 2
Jamal Mohamed College, India 3
412
Change Management and Version Control of Scientific Applications
Bojana Koteska and Anastas Mishev, Ss. Cyril and Methodius University,
Macedonia 1
413
Advanced Authentication Scheme Using a Predefined Keystroke Structure
Abdulameer K. Hussain and Mohammad M. Alnabhan, Jerash University, Jordan 1
414
The Impact of Knowledge-Based Trust (Kbt) on The Adoption and
Acceptability of Cashless Economy in Nigeria
Galadima, Talatu O.1
, Akinyemi, Ibidapo O.2
, and Asani, Emmanuel O.3
, 1
Federal
Polytechnic, Nigeria, 2
Covenant University, Nigeria and 3
Landmark University,
Nigeria 1
415
Sharing of Cluster Resources among Multiple Workflow Applications
Uma Boregowda1
and Venugopal Chakravarthy2
, 1
Malnad College of Engineering,
India and 2
Sri Jayachamarajendra College of Engineering, India 0
416
Review of Closed Circuit Television (CCTV) Techniques for Vehicles Traffic
Management
Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi Arabia 8
417
State of The Art of Learning Styles-Based Adaptive Educational Hypermedia
Systems (Ls-Baehss)
Ahmed Al-Azawei and Atta Badii, School of Systems Engineering, UK 17
418
Massive Parallelism With Gpus for Centrality Ranking in Complex Networks
Frederico L. Cabral, Carla Osthoff, Rafael Nardes and Daniel Ramos, Laboratório
Nacional de Computação CientÃfica, Brazil 1
419
Performance Analysis of Wind Turbine as a Distributed Generation Unit In
Distribution System
Ramadoni Syahputra1,2
, Imam Robandi1
and Mochamad Ashari1
, 1
Institut
Teknologi Sepuluh Nopember, Indonesia and 2
Universitas Muhammadiyah
Yogyakarta, Indonesia 60
420
Cloud Computing Security through Symmetric Cipher Model
Subramanian Anbazhagan1
and K.Somasundaram2
, 1
Karpagam University, India
and 2
Jaya Engineering College, India 4
421
Enhancing the Matrix Transpose Operation Using Intel Avx Instruction Set
Extension
Ahmed Sherif Zekri1,2
, 1
Alexandria University, Egypt and 2
Beirut Arab University,
Lebanon 1
422
Review of Monitoring Tools for E-Learning Platforms
Ali Alowayr and Atta Badii, Reading University, UK 4
423
Intelligent Fatigue Detection and Automatic Vehicle Control System
Monali Gulhane and P.S.Mohod, RTMN University, India 0
424
Short Term Load Forecasting System Based on Support Vector Kernel
Methods
Lal Hussain, M. Sajjad Nadeem and Syed Ahsen Ali Shah, University of Azad
Jammu and Kashmir, Pakistan 0
425
Employee Performance Appraisal System Using Fuzzy Logic
Adnan Shaout1
and Mohamed Khalid Yousif2
, 1
The University of Michigan, USA
and 2
Sudan University of Science and Technology, Sudan 7
426
Research on the Effect of Applying Multimedia to the Instruction of Rational
Emotion Behavior Therapy for Middle School Students Emotional Control
Chen-Feng Wu, Pin-Chang Chen and Yu-Tzu Chen, Yu Da University of Science
and Technology, Taiwan 1
427
Software Architectural Patterns for Service Composition
Ghadeer Ghazal1
, Amjad. Hudaib1
and Waffa Maitah2
, 1
The University of Jordan,
Jordan and 2
Al al-Bayt University, Jordan 0
428
One-Dimensional Vector Based Pattern Matching
Y.M.Fouda, Mansoura University, Egypt 2
429
Dependable Online Appointment Booking System for Nhis Outpatient in
Nigerian Teaching Hospitals
Adebayo Peter Idowu1
, Olajide Olusegun Adeosun2
and Kehinde Oladipo
Williams3
, 1
Obafemi Awolowo University, Nigeria, 2
Ladoke Akintola University
of Technology, Nigeria and 3
McPherson University, Nigeria 4
430
Co-Emulation of Scan-Chain Based Designs Utilizing SCE-MI Infrastructure
Bill Jason Tomas1
, Yingtao Jiang2
and Mei Yang2
, 1
Cadence Design System, USA
and 2
University of Nevada, USA 0
431
An Improved Particle Filter Tracking System Based on Colour and Moving
Edge Information
Chao-Ju Chen1
, Wernhuar Tarng1
and Kuo-Hua Lo2
, 1
National Hsinchu University
of Education, Taiwan and 2
Industrial Technology Research Institute, Taiwan 1
432
Real Time Optimized Traffic Management Algorithm
Partha Sarathi Chakraborty, Prajeeth Nair, Pranshu Raj Sinha and Ishan Kumar
Behera, SRM University, India 3
433
A Generic Model for Disease Outbreak Notification Systems
Farag Azzedin, Jaweed Yazdani, Salahadin Adam and Mustafa Ghaleb, King Fahd
University of Petroleum and Minerals, Saudi Arabia 1
434
Square Grid Points Coveraged by Connected Sources With Coverage Radius
of One on a Two-Dimensional Grid
Pattama Longani, Chiang Mai University, Thailand 0
435
Structural and Hardware Complexities of Microprocessor Design According
to Moore’s Law
Haissam El-Aawar, Lebanese International University – LIU, Lebanon 4
436
Remote Real - Time Process and Production Monitoring Mechanism of
Lighting Parts for Outdoor Recreation
Cheng-I Hou1
, Han-Chen Huang2
, Tian-Syung Lan1
and Wei-Min Teng1
, 1
Yu Da
University of Science and Technology, Taiwan and 2
Chung Hua University,
Taiwan 0
437
Language Independent Document Retrieval Using Unicode Standard
Vidhya M and Aji S, University of Kerala, India 0
438
A Study of The Effects of Electronic Textbook-Aided Remedial Teaching on
Students’ Learning Outcomes at the Optics Unit
Chen-Feng Wu, Pin-Chang Chen and Shu-Fen Tzeng, Yu Da University of Science
and Technology, Taiwan 2
439
A Guide to Deal With Uncertainties in Software Project Management
Marcelo Marinho1,2
, Suzana Sampaio2
, Telma Lima2
and Hermano de
Moura1
, 1
Federal University of Pernambuco (UFPE), Brazil and 2
Federal Rural
University of Pernambuco (UFRPE), Brazil 6
440
Intelligent Algorithms for Cell Tracking and Image Segmentation
Ashraf A. Aly1
, Safaai Bin Deris2
and Nazar Zaki3
, 1
Al khawarizmi College,
UAE, 2
Universiti Teknologi Malaysia, Malaysia and 3
UAE University, UAE 2
441
Variability Modeling for Customizable Saas Applications
Ashraf A. Shahin, Institute of Statistical Studies & Research, Cairo University,
Egypt 3
442
Systematic Review on Project Actuality
Suzana Cândido de Barros Sampaio1,2
, Marcelo Marinho1,2
, Hermano
Moura1
, 1
Federal University of Pernambuco (UFPE), Brazil and 2
Federal Rural
University of Pernambuco (UFRPE), Brazil 3
443
Efficiency Lossless Data Techniques for Arabic Text Compression
Enas Abu Jrai, Al-Balqa Applied University, Jordan 1
444
Managing Collaboration Within Networks and Relationships in the Serious
Game of Agribusiness Management Using Sandpile Model
SaifulBukhori, Jember University, Indonesia 0
445
FLBRA: Fuzzy Logic Based Routing Algorithm for Indoor Wireless Sensor
Networks
Lucas Leão, David Bianchini and Omar Branquinho, Pontifical Catholic
University of Campinas, Brazil 2
446
A Robust Blind and Secure Watermarking Scheme Using Positive Semi
Definite Matrices
Noui Oussama and Noui Lemnouar, UHL University, Algeria 2
447
Educational Data Mining Using JMP
Sadiq Hussain and G.C.Hazarika, Dibrugarh University, India 0
448
State of the Art of Agile Governance: A Systematic Review
Alexandre J.H.de O.Luna1,2
, Philippe Kruchten2
, Marcello L.G. do E.Pedrosa1
,
Humberto R.de Almeida Neto1
and Hermano P.de Moura1
, 1
Federal University of
Pernambuco (UFPE), Brazil and 2
The University of British Columbia, Canada 13
449
Performance and Power Comparisons between NVIDIA and ATI GPUS
Ying Zhang1
, Lu Peng1
, Bin Li1
, Jih-Kwon Peir2
and Jianmin Chen2
, 1
Louisiana
State University, USA and 2
University of Florida, USA 0
450
ITCM: A Real Time Internet Traffic Classifier Monitor
Silas Santiago Lopes Pereira1
, Jose Everardo Bessa Maia2
and Jorge Luiz de Castro
e Silva2
,1
Federal Institute of Ceará, Brazil and 2
State University of Ceara, Brazil 3
451
A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced
Encryption Standard
Ghada F.Elkabbany, Heba K.Aslan and Mohamed N.Rasslan, Electronics Research
Institute, Egypt 1
452
Analysis of Lithography Based Approaches in Development of
Semiconductors
Jatin Chopra, BITS Pilani Dubai, United Arab Emirates 3
453
Requirement Analysis, Architectural Design and Formal Verification of a
Multi-Agent Based University Information Management System
Nadeem Akhtar1
, Aisha Shafique Ghori1
and Nadeem Salamat2
, 1
The Islamia
University of Bahawalpur, Pakistan and 2
Karakoram International University,
Pakistan 0
454
Arabic Text Categorization Algorithm Using Vector Evaluation Method
Ashraf Odeh1
, Aymen Abu-Errub2
, Qusai Shambour3
and Nidal Turab1
, 1
Isra
University, Jordan,2
University of Jordan, Jordan and 3
Al-Ahliyya Amman
University, Jordan 8
455
A Comparative Study of Clustering and Biclustering of Microarray Data
Haifa Ben Saber1,2
and Mourad Elloumi1,3
, 1
Tunis University, Tunisia, 2
Time
Université - Tunis University, Tunisia and 3
University of Tunis-El Manar,
Tunisia 2
456
Implementation of a Stream Cipher Based on Bernoulli's Map
Ricardo Francisco Martinez-Gonzalez1
and Jose Alejandro Diaz-
Mendez2
, 1
Veracruz Institute of Technology, Mexico and 2
National Institute of
Astophysics Optics and Electronics, Mexico 1
457
Generating 3D Model in Virtual Reality and Analyzing Its Performance
Filip Popovski, Igor Nedelkovski and Svetlana Mijakovska, St.Kliment Ohridski
University - Bitola, Macedonia 0
458
Towards an Intelligent Tutoring System to Down Syndrome
Amal F.A Mahmoud, Mohamed A.F.Belal and Yehia M.K. Helmy, Helwan
University, Egypt 2
459
A Comparative Study of Dimension Reduction Methods Combined with
Wavelet Transform Applied to the Classification of Mammographic Images
N.Hamdi, K.Auhmani and M.M.Hassani, Universite Cadi Ayyad, Maroc 1
460
Multi-Objective Predictive Control : A Solution Using Metaheuristics
Halim Merabti1,2
and Khaled Belarbi3
, 1
Welding and NDT Research Centre (CSC),
Algeria,2
University of Constantine1, Algeria and 3
Campus Université de
Constantine3, Alegria 0
461
Experimental Analysis of Matching Technique of Steganography for
Greyscale and Colour Image
Khurrum Rahim Rashid1
, Aqsa Rashid2
, Nadeem Salamat3
and Saad
Missen2
, 1
NUSES FAST, Pakistan, 2
Islamia University Bahawalpur, Pakistan
and 3
Karakoram International University Gilgit, Pakistan
2015
462
Iris Recognition for Personal Identification Using Lamstar Neural Network
Shideh Homayon, University of California, USA 5
463
An Employing a Multistage Fuzzy Architecture for Usability of Open Source
Software
Roba Al-Soub, Mutah University, Jordan 0
464
Analysis of Selection Indicators of Badminton Players by the Delphi Method
and Analytic Hierarchy Process
Han-Chen Huang1
, Chun-Ta Lin2
and Chia-Sen Hu3
, 1
Chung Hua University,
Taiwan, 2
Yu Da University of Science and Technology, Taiwan and 3
Guang Hua
Junior High School, Taiwan 2
465
Cross Platform App : A Comparative Study
Paulo R.M.de Andrade1
, Adriano B.Albuquerque1
, Otávio F. Frota2
, Robson V
Silveira2
and Fátima A. da Silva2
, 1
University of Fortaleza - UNIFOR Fortaleza -
CE, Brazil and 2
College Estacio FIC of Ceara Fortaleza - CE, Brazil 20
466
Performance Comparison of Hybrid Wavelet Transforms Formed Using Dct,
Walsh, Haar and DKT in Watermarking
H.B.Kekre1
, Tanuja Sarode2
and Shachi Natu1
, 1
NMIMS University, India
and 2
Mumbai University, India 1
467
Improving Initial Generations in PSO Algorithm for Transportation Network
Design Problem
Navid Afkar and Abbas Babazadeh, University of Tehran, Iran 0
468
New Approach in Symmetric Block Cipher Security Using a New Cubical
Technique
Ali M Alshahrani and Stuart Walker, University of Essex, United Kingdom 1
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)
IJCSIT Citation (2009 to 2016)

More Related Content

What's hot (19)

ICAIET 2017
ICAIET 2017ICAIET 2017
ICAIET 2017
 
ICSSCCET 2017
ICSSCCET 2017ICSSCCET 2017
ICSSCCET 2017
 
Muhanned CV
Muhanned CVMuhanned CV
Muhanned CV
 
StemConferences Batch A 2019
StemConferences Batch A 2019StemConferences Batch A 2019
StemConferences Batch A 2019
 
International Conference on Latest Trends in Engineering Science and Management
International Conference on Latest Trends in Engineering Science and ManagementInternational Conference on Latest Trends in Engineering Science and Management
International Conference on Latest Trends in Engineering Science and Management
 
Calendar 2018 2019
Calendar 2018 2019Calendar 2018 2019
Calendar 2018 2019
 
ICCELEM 2017
ICCELEM 2017ICCELEM 2017
ICCELEM 2017
 
Christo Ananth, Advisory Committee Member, “International Conference On Data ...
Christo Ananth, Advisory Committee Member, “International Conference On Data ...Christo Ananth, Advisory Committee Member, “International Conference On Data ...
Christo Ananth, Advisory Committee Member, “International Conference On Data ...
 
Profile of Dr. Brojo Kishore Mishra
Profile of Dr. Brojo Kishore MishraProfile of Dr. Brojo Kishore Mishra
Profile of Dr. Brojo Kishore Mishra
 
Dr. K. Karibasappa
Dr. K. KaribasappaDr. K. Karibasappa
Dr. K. Karibasappa
 
cv12
cv12cv12
cv12
 
Events e magazine
Events e magazineEvents e magazine
Events e magazine
 
Information e booklet
Information e bookletInformation e booklet
Information e booklet
 
Dr Tarek Qasim-CV
Dr Tarek Qasim-CVDr Tarek Qasim-CV
Dr Tarek Qasim-CV
 
Cv sanjeev updated-12-converted
Cv sanjeev updated-12-convertedCv sanjeev updated-12-converted
Cv sanjeev updated-12-converted
 
Engineer
EngineerEngineer
Engineer
 
Icetat2021 brochure
Icetat2021   brochureIcetat2021   brochure
Icetat2021 brochure
 
REPORT ON SUMMER TRAINING IN MEMS AT CSIR-CEERI
REPORT ON SUMMER TRAINING IN MEMS AT CSIR-CEERIREPORT ON SUMMER TRAINING IN MEMS AT CSIR-CEERI
REPORT ON SUMMER TRAINING IN MEMS AT CSIR-CEERI
 
Karan chanana-1
Karan chanana-1Karan chanana-1
Karan chanana-1
 

Similar to IJCSIT Citation (2009 to 2016)

International Journal of Computer Science and Information Technology ( IJCSIT...
International Journal of Computer Science and Information Technology ( IJCSIT...International Journal of Computer Science and Information Technology ( IJCSIT...
International Journal of Computer Science and Information Technology ( IJCSIT...AIRCC Publishing Corporation
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
 
International Journal on Soft Computing ( IJSC ), H index - Profile
International Journal on Soft Computing ( IJSC ), H index - ProfileInternational Journal on Soft Computing ( IJSC ), H index - Profile
International Journal on Soft Computing ( IJSC ), H index - Profileijsc
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)ijdpsjournal
 
Signal & Image Processing: An International Journal (SIPIJ) - WJCI, H index -...
Signal & Image Processing: An International Journal (SIPIJ) - WJCI, H index -...Signal & Image Processing: An International Journal (SIPIJ) - WJCI, H index -...
Signal & Image Processing: An International Journal (SIPIJ) - WJCI, H index -...sipij
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
Advances in Materials Science and Engineering: An International Journal (MSEJ)
Advances in Materials Science and Engineering: An International Journal (MSEJ)Advances in Materials Science and Engineering: An International Journal (MSEJ)
Advances in Materials Science and Engineering: An International Journal (MSEJ)msejjournal
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
 
International Journal of Computer Networks & Communications (IJCNC) - Scopus...
 International Journal of Computer Networks & Communications (IJCNC) - Scopus... International Journal of Computer Networks & Communications (IJCNC) - Scopus...
International Journal of Computer Networks & Communications (IJCNC) - Scopus...IJCNCJournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
The International Journal of Information Technology, Modeling and Computing (...
The International Journal of Information Technology, Modeling and Computing (...The International Journal of Information Technology, Modeling and Computing (...
The International Journal of Information Technology, Modeling and Computing (...Zac Darcy
 
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...ijdms
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...IJNSA Journal
 
IJNSA Citation Details (2009 - 2016)
IJNSA Citation Details (2009 - 2016)IJNSA Citation Details (2009 - 2016)
IJNSA Citation Details (2009 - 2016)IJNSA Journal
 
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...International Journal of Software Engineering & Applications (IJSEA) - ERA, H...
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...ijseajournal
 
IICET 2015 - i-manager's International Conference on Engineering and Technolo...
IICET 2015 - i-manager's International Conference on Engineering and Technolo...IICET 2015 - i-manager's International Conference on Engineering and Technolo...
IICET 2015 - i-manager's International Conference on Engineering and Technolo...imanconference
 
Stem Conferences 2018 Batch A
Stem Conferences 2018 Batch AStem Conferences 2018 Batch A
Stem Conferences 2018 Batch Astemconferences
 
International Journal of VLSI design & Communication Systems (VLSICS), H inde...
International Journal of VLSI design & Communication Systems (VLSICS), H inde...International Journal of VLSI design & Communication Systems (VLSICS), H inde...
International Journal of VLSI design & Communication Systems (VLSICS), H inde...VLSICS Design
 
International Journal of Computer-Aided technologies (IJCAx)
International Journal of Computer-Aided technologies (IJCAx)International Journal of Computer-Aided technologies (IJCAx)
International Journal of Computer-Aided technologies (IJCAx)ijcax
 

Similar to IJCSIT Citation (2009 to 2016) (20)

International Journal of Computer Science and Information Technology ( IJCSIT...
International Journal of Computer Science and Information Technology ( IJCSIT...International Journal of Computer Science and Information Technology ( IJCSIT...
International Journal of Computer Science and Information Technology ( IJCSIT...
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
 
International Journal on Soft Computing ( IJSC ), H index - Profile
International Journal on Soft Computing ( IJSC ), H index - ProfileInternational Journal on Soft Computing ( IJSC ), H index - Profile
International Journal on Soft Computing ( IJSC ), H index - Profile
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
 
Signal & Image Processing: An International Journal (SIPIJ) - WJCI, H index -...
Signal & Image Processing: An International Journal (SIPIJ) - WJCI, H index -...Signal & Image Processing: An International Journal (SIPIJ) - WJCI, H index -...
Signal & Image Processing: An International Journal (SIPIJ) - WJCI, H index -...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
Advances in Materials Science and Engineering: An International Journal (MSEJ)
Advances in Materials Science and Engineering: An International Journal (MSEJ)Advances in Materials Science and Engineering: An International Journal (MSEJ)
Advances in Materials Science and Engineering: An International Journal (MSEJ)
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
 
International Journal of Computer Networks & Communications (IJCNC) - Scopus...
 International Journal of Computer Networks & Communications (IJCNC) - Scopus... International Journal of Computer Networks & Communications (IJCNC) - Scopus...
International Journal of Computer Networks & Communications (IJCNC) - Scopus...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
The International Journal of Information Technology, Modeling and Computing (...
The International Journal of Information Technology, Modeling and Computing (...The International Journal of Information Technology, Modeling and Computing (...
The International Journal of Information Technology, Modeling and Computing (...
 
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...
 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
 
IJNSA Citation Details (2009 - 2016)
IJNSA Citation Details (2009 - 2016)IJNSA Citation Details (2009 - 2016)
IJNSA Citation Details (2009 - 2016)
 
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...International Journal of Software Engineering & Applications (IJSEA) - ERA, H...
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...
 
IICET 2015 - i-manager's International Conference on Engineering and Technolo...
IICET 2015 - i-manager's International Conference on Engineering and Technolo...IICET 2015 - i-manager's International Conference on Engineering and Technolo...
IICET 2015 - i-manager's International Conference on Engineering and Technolo...
 
Stem Conferences 2018 Batch A
Stem Conferences 2018 Batch AStem Conferences 2018 Batch A
Stem Conferences 2018 Batch A
 
International Journal of VLSI design & Communication Systems (VLSICS), H inde...
International Journal of VLSI design & Communication Systems (VLSICS), H inde...International Journal of VLSI design & Communication Systems (VLSICS), H inde...
International Journal of VLSI design & Communication Systems (VLSICS), H inde...
 
International Journal of Computer-Aided technologies (IJCAx)
International Journal of Computer-Aided technologies (IJCAx)International Journal of Computer-Aided technologies (IJCAx)
International Journal of Computer-Aided technologies (IJCAx)
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

IJCSIT Citation (2009 to 2016)

  • 1. International Journal of Computer Science and Information Technology (IJCSIT) ISSN : 0975 - 3826 (Online) ; 0975 - 4660 (Print) http://airccse.org/journal/ijcsit.html
  • 2. SCOPE OF THE JOURNAL The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc. Topics of Interest  Algorithms and Bioinformatics  Computer Architecture and Real time Systems  Database and Data Mining  Dependable, reliable and autonomic computing  Distributed and parallel systems & algorithms  DSP/Image Processing/Pattern Recognition/Multimedia  Embedded system and software  Game and software engineering  Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS)  Grid and scalable computing  Intelligent Information & Database Systems  IT policy and business management  Mobile and ubiquitous computing  Modeling and Simulation  Multimedia systems and services  Networking and communications  Parallel and Distributed Systems  Security and Information Assurance  Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)  Software Engineering  Web and internet computing Contact Us Here's where you can reach us : ijcsit@airccse.org http://airccse.org/journal/ijcsit.html
  • 3. Members of the Editorial Board Editor In Chief:  Jan Zizka, SoNet/DI, FBE, Mendel University in Brno, Czech Republic  Editorial Board A. Meiappane, Manakula Vinayagar Institute of Technology, India A.Kannan, K.L.N. College of Engineering, India Abdul kadir Ozcan, The American University, Cyprus Ahmed Nada, Al-Quds University, Palestine Ali Asghar Rahmani Hosseinabadi, Islamic Azad University, Iran Ali Mehrpour, Islamic Azad University, Iran Amine Achouri, University of Tunis, Tunisia Amirouchefatiha, University of Tizi-Ouzou, Algeria Ammar M.Odeh, University of Bridgeport, USA Anamika Ahirwar, Maharana Pratap College of Technogy, Gwalior, India Atif Farid Mohammad, Uniersity of North Dakota, USA Ayman AbuBaker, Applied Science Private University Amman, Jordan Ayme Perdomo Alonso, University of Informatics Sciences, Cuba Benedicto B. Balilo Jr, Bicol University, Philippines Bobby Barua, Ahsanullah University of Science and Technology, Bangladesh Boo-Hyung Lee, KongJu National University, South Korea Buket Barkana, University of Bridgeport,USA Chikh Mohammed Amine, University of Tlemcen, Algeria Chin-Chih Chang, Chung Hua University, Taiwan Daniyal Alghazzawi,King Abdulaziz University, Kingdom of Saudi Arabia Dedi Iskandar Inan, State University of Papua, Indonesia Dharminder kumar, Guru Jambheshwar University of Science and Technology, India Dhinaharan Nagamalai, Wireilla Net Solutions PTY LTD, Australia Dongchen Li, Peking University, P.R.China Ermatita zuhairi, Sriwijaya University, Palembang, Indonesia http://airccse.org/journal/ijcsit.html Filip Popovski, St.Kliment Ohridski University - Bitola, Macedonia G.P.Hegde, SDM Institute of Technology, India
  • 4.  Editorial Board  Faudziah Ahmad, Universiti Utara Malaysia, Malaysia Filip Popovski, St.Kliment Ohridski University - Bitola, Macedonia G.P.Hegde, SDM Institute of Technology, India Gaurang Panchal, Charotar University of Science and Technology, India George Augusto Valenca Santos, Federal University of Pernambuco (UFPE), Brazil Hao-En Chueh, Yuanpei University, Taiwan Hazlina Haron, Universiti Utara Malaysia, Malaysia Himavathi S, Pondicherry Engg College, India Hwangjun Song, POSTECH, South Korea Inderpal Singh, Punjab Technical University, India Isa Maleki, Islamic Azad University, Iran Jacques Demerjian, CS Communication & Systems, France James Xue, University of Northampton, United Kingdom Jeong-Hyun Park,Electronics & Telecommunications Research Institute,South Korea Jeremy (Zheng) Li, University of Bridgeport, USA J. Naren, SASTRA University, India Jyoti Singhai, Electronics and Communication Deptt-MANIT,India K.P.Srinivasan, C.B.M. College, India Kanti Prasad, University of Massachusetts Lowell, USA Kawahata Yasuko, Kyushu University, Japan Kazuyuki Murase,University of Fukui, Japan Keneilwe Zuva, University of Botswana, Botswana Keshava Prasanna, Shridevi Institute of Technology, India Khoa N. Le, Griffith School of Engineering, Queensland, Australia Kirtikumar Patel, Chemic Engineers Inc, United States Kwan Hee Han, Gyeongsang National University, Republic of Korea Lian Liu, University of Kentucky, USA M. P. Singh, National Institute of Technology Patna, India Maicon A.Sartin, Universidade do Estado de Mato Grosso - UNEMAT, Brazil Maragathavalli P, Pondicherry Engineering College, Puducherry, India Marcelo Luiz Monteiro Marinho, Federal Rural University of Pernambuco, Brazil Marina Marjanović Jakovljević, Singidunum University, Serbia Md. Shahjahan Ali, Islamic University, Bangladesh Mehmet Kara, TUBITAK BILGEM UEKAE, Turkey http://airccse.org/journal/ijcsit.html
  • 5.  Editorial Board  Mehregan Mahdavi, University of Guilan, Iran Melih Kirlidog, Marmara University, Turkey Ming Fan, Broadcom Corporation, USA Ming-Chang Lee, National Kaohsiung University of Applied Sciences,Taiwan Mohamed Farag, Maharishi University of Management, USA Mohammad Al-Khedher, Al-Balqa' Applied University, Jordan Mohammad M M Abu Omar, Al-Quds Open University-Plaestine, Malaysia Mohammad Sadegh Mirzaei, Postgraduate and Newer Researchers Conference, Iran Mohammad Shamsul Arefin,Hiroshima University, Japan Mohammad Yamin, University of Canberra,Australia Mohammad Zaidul Karim, Daffodil Int Uni, Bangladesh Mohammed Alhanjouri, Islamic University of Gaza, Palestine Mohammed Ali Hussain, KL University, India Mohammed S. Al Logmani, Saudi Aramco, Saudi Arabia Mostafa Elhachloufi, Elhachloufi Mostafa, Morocco Moudam Zakaria, University Sidi Mohammed Ben Abdellah Fez, Morocco Nargis Akter, IST, Bangladesh Natarajan Meghanathan, Jackson State University, USA Natasa Zivic, University of Siegen,Germany Noureddine Rais, University Sidi Mohammed Ben Abdellah Fez, Morocco Paul Sagayda, Donbass State Engineering Academy, Ukraine R.Baskaran, Anna University - Chennai, India R.L.K.Venkateswarlu, Sasi Institute of Technology and Engineering, India Rafael Timoteo de Sousa, University of Brasilia, Brazil Rajendra Akerkar, Technomathematics Research Foundation, India Ramadoni Syahputra,Universitas Muhammadiyah Yogyakarta, Indonesia Ramgopalkashyap,SISTec,India Ricardo Francisco Martinez-Gonzalez, Veracruz Institute of Technology, Mexico Roberts Masillamani, Hindustan University, India Ruchi Nanda, IIS University, India S. Asghar Gholamian, Babol University of Technology, Iran S.Hariharan, B.S.Abdur Rahman University,India Sachin Patil, RIT Rajaramnagar, India Sadik ULKER ,Girne American University, Cyprus Sadiq Hussain, Dibrugarh University, India http://airccse.org/journal/ijcsit.html
  • 6. Paper Submission & Manuscript preparation Guide Authors are invited to Submit papers for this journal through ijcsit@airccse.org Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. For paper format download the template in this page Manuscript Template. Review Process Submissions are accepted for review with the understanding that the same work has been neither submitted to, nor published in, another publication. Simultaneous submission to other publications will result in immediate rejection of the paper. Papers are not within the journal scope will be rejected immediately after the pre review process. All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing procedure, and are considered on the basis of their significance, novelty and usefulness to the Journals readership. The reviewing structure will always ensure the anonymity of the referees & it will be reviewed by 3 experts in the field. The review output will be one of the following decisions: 1. Accept 2. Accept with minor changes 3. weak Accept with major changes 4. Reject The review process may take approximately two ~three months to be completed. The Editor reserves the right to reject a paper if it does not meet the aims and scope of the journal, it is not revised well. Publication charges: 120 USD (Maximum 20 pages) Publication Frequency- Bi-monthly February, April, June, August, October, December Copy right form After submitting final manuscript, you can get copyright form from AIRCC secretary Special Issue Proposal IJCSIT invite proposals for special issues on topics that fall within the scope of this journal. Please email your proposal to secretary@airccse.org. http://airccse.org/journal/ijcsit.html
  • 7. 2009 1 Ensemble Design for Intrusion Detection Systems T. Subbulakshmi1 , A.Ramamoorthi2 and S. Mercy Shalinie1 , 1 Thiagarajar College of Engineering, India and 2 Sethu Institute of Technology, India 9 2 Design of a New Deterministic Algorithm for Finding Common DNA Subsequence Bigyan Bhar and Nabendu Chaki, University Calcutta, India 1 3 Automatic Evolution of Ideas Through Multilayer Evolutionary System to Support Creative Thinking Priti Srinivas Sajja1 , Rajendra Akerkar2 , David Camacho3 , 1 Sardar Patel University, India, 2 Technomathematics Research Foundation, India and 3 Universidad Autonoma de Madrid, Spain 0 4 Multi-Focus Fusion Method Based on LADWT Shwu-Huey Yen Yi-Ray Lin, Tamkang University, Taipei, Taiwan, R.O.C. 0 5 Effect of Variation of Separation between the Ultrasonic Transmitter and Receiver on the Accuracy of Distance Measurement Ajay Kumar Shrivastava , Ashish Verma and S. P. Singh, Krishna Institute of Engineering and Technology, Ghaziabad (U.P.), India 5 6 Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach A.Revathi, R.Ganapathy and Y.Venkataramani, Saranathan college of Engg., Trichy 29 7 Investigating the Performance of Various Vocoders for a Fair Scheduling Algorithm in WIMAX B. Kaarthick Member IEEE, N.Nagarajan, V. J.Yeshwenth, P.M.Sudarsan, Network System Design Center, Sri Krishna College of Engineering & Technology,Coimbatore, India. 0 8 A Low Indexed Content Based Neural Network Approach for Natural Objects Recognition G.Shyama Chandra Prasad and Dr. A.Govardhan, Dr. T.V.Rao ,Research Scholar, JNTUH, Hyderabad, AP. India. 2 9 Identification of Telugu, Devanagari and English Scripts Using Discriminating Features M C Padma and P A Vijaya, PES College of Engineering, Mandya, India 19 10 Design and Implementation of 32-Bit Controller For Interfacing with reconfigurable computing systems. Dr.Kota solomon Raju and Ashutosh Gupta,E-105, Digital System Group, CEERI,Pilani - 333031 13 11 Thesaurus And query Expansion Hazra Imran and Aditi Sharan, Jamia Hamdard ,New Delhi ,India 52 12 Optimal Curve Fitting of Speech Signal for Disabled Children Anandthirtha. B. GUDI, and H. C. Nagaraj, Sri Bhagawan Mahaveer Jain College of Engineering, India 5 13 Analysis on Deployment Cost and Network Performance for Heterogeneous Wireless Sensor Networks Dilip Kumar1 , Trilok. C Aseri2 and R. B Patel3 , 1 Centre for Development of Advanced Computing (C-DAC), India, 2 Punjab Engineering College (PEC), India and 3 Markandeshwar University (MMU), India 16 14 A collaborative PCE-Based mechanism for E2E recovery within MPLS- networks EL KAMEL Ali, Youssef Habib,FSM, Monastir, Tunisia 0
  • 8. 15 Analysis of Telecommunication Management Technologies Khalil ur rehman Laghari, Imen Grida ben Yahia, and Noel Crespi, France. 13 2010 16 A Model for Semantic Integration of Business Components Larbi KZAZ1 , Hicham Elasri2 and Abderrahim.Sekkaki2 , 1 Groupe ISCAE, Morocco and 2 University Hassan II Ain-chok, Morocco 7 17 Agent Based Trust Management in Distributed E-Business Environment E.Sathiyamoorthy1 , N.Ch.Sriman Narayana Iyenger1 and V.Ramachandran2 , 1 VIT University, India and 2 Anna University,India. 7 18 Multi Dimensional CTL and Stratified Datalog Theodore Andronikos1 and Vassia Pavlaki2 , 1 Ionian University, Greece,2 and National Technical University of Athens, Greece 0 19 An Efficient Gait Recognition System For Human Identification Using Modified ICA M.Pushpa Rani1 and G.Arumugam2 , 1 Mother Teresa Womens University, India and2 Madurai Kamaraj University, India. 49 20 Cartographic Generalization (Selection) For 2D Map of Urban Area Jagdish Lal Raheja, Umesh Kumar and K.C. Saravanan, Central Electronics Engineering Research Institute (CEERI)/ Council of Scientific & Industrial Research (CSIR), India. 2 21 A BPT Application: Semi-automatic Image Retrieval Tool Shirin Ghanbari1 , John C. Woods1 , Simon M. Lucas1 and Hamid R. Rabiee2 , 1 University of Essex, United Kingdom and 2 Sharif University of Technology, Iran. 0 22 Analyzing the P2P Traffic Using Probability Schemes M. Sadish Sendil1 and Dr. N. Nagarajan2 , 1 SNS College of Technology,India and2 Coimbatore Institute of Information and Engineering Technology,India 3 23 Low Power VLSI Design with Resistive Feedback Logic 1 C.Ashok Kumar, 2 B.K.Madhavi and 3 K.Lal Kishore, 1 TRR Engineering College, India,2 SNIST, Hyderabad,India and 3 JNTU college of Engineering,India. 0 24 Dynamic Probe Window Based Optimization for Surveillance in Home Security System Bhaskar Kapoor and Anamika Chhabra, MAIT,India. 1 25 Human Facial Expression Detection From Detected in Captured Image using Back Propagation Neural Network Jagdish Lal Raheja and Umesh Kumar Digital Systems Group, Central Electronics Engineering Research Institute (CEERI)/ Council of Scientific & Industrial Research (CSIR),India. 37 26 Performance Evaluation of Face Recognition Using Gabor Filter, Log Gabor filter and Discrete Wavelet Transform D Murugan1 , S Arumugam2 , K Rajalakshmi3 and Manish T I1 ,1 Manonmaniam Sundaranar University, India , 2 Nandha College of Engineering & Technology, India and 3 Francis Xavier Engineering College, India. 27 27 A Mobility-Based CheckPointing Protocol for Mobile Computing System Suparna Biswas1 and Sarmistha Neogy2 , 1 West Bengal University of Technology, India and 2 Jadavpur University, India. 23
  • 9. 28 Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock Hemen Patel1 , Syed S. Rizvi1 , Laiali Almazaydeh1 and Aasia Riasat2 , 1 University of Bridgeport, USA and 2 Institute of Business Management, Pakistan 2 29 High Performance and Energy Efficient Task Scheduling Algorithm for Heterogeneous Mobile Computing System E. Ilavarasan and R. Manoharan, Pondicherry Engineering College, India 4 30 Identification of connection in spacecraft images and classifying them for Weather Monitoring Ramya S Gowda, Sikkim Manipal University, India 0 31 Phenol Degradation: Numerical Simulation in a Stirred Tank Electrochemical Reactor Regalado-Mendez Alejandro1, Peralta-Reyes Ever1 and Velazquez-Manzanares Miguel2, 1Universidad del Mar, Mexico and 2Universidad del Papaoloapan, Mexico 5 32 An Efficient Statistical Multiplexing Method for H.264 VBR Video Sources for Improved Traffic Smoothing T.Raghuveera and K.S.Easwarakumar , Anna University, India 4 33 Performance Evaluation of Routing Protocols in Wireless Sensor Networks Laiali Almazaydeh, Eman Abdelfattah, Manal Al-Bzoor, and Amer Al-Rahayfeh, University Of Bridgeport, USA 60 34 Improved Lossless Embedding and Extraction - A Data Hiding Mechanism T. Venkat Narayana Rao1 , A.Govardhan2 and Syed Jahangir Badashah3 , 1 Tirumala Engineering College, 2 Jawaharlal Nehru Technological University and 3 Sathyabama1 University, India 1 35 An Optimized Distributed Association Rule Mining Algorithm in Parallel and Distributed Data Mining with XML Data for Improved Response Time Sujni Paul, Karunya University, India 4 36 CRM System Using PA-AKD Approach of D3M Ajay kumar1 , A.Tejaswi2 , Lakshmi Prasad Koyi3 , G.Narasinga Rao4 and S.Srinivasa Rao Illapu5 , 1 Dronacharya College of Engg, India, 2 GITAM University, India, 3 CMR Institute Of Technology, India, 4 GMR IT, India and 5 Chaitanya Engineering College, India 0 37 Enhanced-DSR: A New Approach to Improve Performance of DSR Algorithm Sharmin Sultana, Salma Begum, Nazma Tara and Ahsan Raja Chowdhury, University of Dhaka, Bangladesh 10 38 Wrapper Generator using Java Native Interface V.S.Vairale1 and K.N.Honwadkar2 , 1 AISSMS College of Engineering - Pune University, India and 2 D.Y.Patil College of Engineering - Pune University, India 3 39 Memory Management Technique for Paging on Distributed Shared Memory Framework Bal Gopal1 , Rizwan Beg1 and Pankaj Kumar2 , 1 Integral University, India and 2 Sahara Arts & Management Academy, India 4 40 Ontology Based Model For The ITU-T Recommendation G.805: Towards The Self-Management Of Transport Networks Maxwell E. Monteiro, Anilton Salles Garcia, Pedro Paulo F. Barcelos, and Giancarlo Guizzardi, Federal University of Espirito Santo, Brazil 8
  • 10. 41 Efficient Resource Matching in Heterogeneous Grid Using Resource Vector Srirangam V Addepallil1 , Per Andersen1and George L Barnes2 , 1 Texas Tech University - Texas, USA and 2 University of Oregon, USA 3 42 Low Power Shift and Add Multiplier Design C. N.Marimuthu1 , P. Thangaraj2 and Aswathy Ramesan1 , 1 Maharaja Engineering College,India and 2 Kongu Engineering College, India 26 43 Implementing and Evaluating A Wireless Body Sensor System For Automated Physiological Data Acquisition At Home Chao Chen and Carlos Pomalaza-Raez,Indiana University - Purdue University, USA 14 44 A Parsing Scheme for Finding the Design Pattern and Reducing the Development Cost of Reusable Object Oriented Software K. M. Azharul Hasan and Mohammad Sabbir Hasan, Khulna University Of Engineering and Technology(KUET), Bangladesh 1 45 Hybrid Scenario based Performance Analysis of DSDV and DSR Koushik Majumder1 and Subir Kumar Sarkar2 , 1 West Bengal University of Technology, India and 2 Jadavpur University, India 3 46 Interoperability, Trust Based Information Sharing Protocal and Security: Digital Government Key Issues Md.Headayetullah and G.K. Pradhan, SOAU - Bhubaneswar, India 10 47 An Algorithm To Self - Extract Secondary Keywords and Their Combinations Based On Abstracts Collcted Using Primary Keywords From Online Digital Libraries Natarajan Meghanathan, Nataliya Kostyuk, Raphael Isokpehi and Hari Cohly, Jackson State University, USA 0 48 A novel technique for image steganography based on Block-DCT and Huffman Encoding A.Nag1 , S. Biswas2 , D. Sarkar2 and P.P. Sarkar2 , 1 Academy of Technology - Hoogly, India and 2 University of Kalyani, India 63 49 Biometric Authentication Using Nonparametric Methods S V Sheela and K R Radhika, B M S College of Engineering - Bangalore, India 1 50 Game Information System Spits Warnars, Manchester Metropolitan University, United Kingdom 2 51 Survey on the Event Orderings Semantics Used for Distributed System Yaser Miaji Osman Gazali and Suhaidi Hassan, University Utara Malaysia, Malaysia 2 52 Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups Ruchira Naskar and Indranil Sengupta, Indian Institute of Technology, India 0 53 Genbit Compress Tool(GBC): A Java-Based Tool To Compress DNA Sequences and Compute Compression Ratio (BITS/BASE) of Genomes P.RAJA RAJESWARI1 and ALLAM APPARAO2 , 1 Acharya Nagarjuna University, India and 2 Jawaharlal Nehru Technological University, India 7 54 An Empirical Study on the Procedure to Derive Software Quality Estimation Models Jie Xu1 , Danny Ho2 and Luiz Fernando Capretz1 , 1 University of Western Ontario, Canada and 2 NFA Estimation Inc, Canada 10
  • 11. 55 Diphone Speech Synthesis System for Arabic Using MARY TTS M. Z. Rashad, Hazem M. El-Bakry and Islam R. Isma'il, Mansoura University, Egypt 12 56 Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm Sandeep Singh Rawat1 and Lakshmi Rajamani2 , 1 Guru Nanak Institute of Technology, India and 2 Osmania University, India 25 57 Improvement in Delay of Information flow in Energy Efficiency Organization Elham Hasanzadeh and Reza Askari moghadam, Payam Noor University faculty of engineering, Iran 0 58 An Applied Study on Educational Use of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication Murat Kayri1 and Ozlem cakır2 , 1 Yuzuncu Yil University, Turkey 48 59 Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy S.Veeramalai, N.Jaisankar and A.Kannan, Anna University - Chennai, India 22 60 M-Learning: A New Paradigm of Learning Mathematics in Malaysia Saipunidzam Mahamad, Mohammad Noor Ibrahim and Shakirah Mohd Taib, Universiti Teknologi Petronas, Malaysia 45 61 Utilizing Diagnosing Problems in a Probabilistic Domain to Build Student Models Nabila Khodeir1 , Nayer Wanas1,2 Nevin Darwish3 and Nadia Hegazy1 , 1 Electronics Research Institute, Egypt, 2 Cairo Microsoft Innovation Lab, Egypt and 3 Cairo University, Egypt 5 62 Clustering and Feature Specific Sentence Extraction Based Summarization of Multiple Documents A.Kogilavani and P.Balasubramani, Kongu Engineering College, India 28 63 Mining Target-Oriented Sequential Patterns With Time-Intervals Hao-En Chueh, Yuanpei University, Taiwan 9 64 A Survey of QOS Routing Protocols For Mobile Ad Hoc Networks G. Santhi and Alamelu Nachiappan, Pondicherry Engineering College, India 40 65 Spiking Neurons With ASNN Based-Methods for the Neural Block Cipher Saleh Ali K. Al-Omari and Putra Sumari, University Sains Malaysia, Malaysia 4 66 A Modified Structure for Feed Forward Active Noise Control Systems WithImproved Performa P.Babu and A.Krishnan, K.S.Rangasamy College of Technology, India 0 67 Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms Rahmat Widia Sembiring, Jasni Mohamad Zain and Abdullah Embong, Universiti Malaysia Pahang, Malaysia 19 68 A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on Particle Swarm Theory With Arithmetic Crossover Md. Amjad Hossain, Md. Kowsar Hossain and M.M.A Hashem, Khulna University of Engineering & Technology (KUET), Bangladesh 9 69 Performance Analysis of Multimedia Compression Algorithms Eman Abdelfattah and Asif Mohiuddin, University of Bridgeport, USA 13
  • 12. 70 Ontology-Based Quality Attributes Prediction in Component-Based Development Chengpu Li1 , Rob Pooley2 and Xiaodong Liu1 , 1 Edinburgh Napier University, UK and 2 Heriot-Watt University, UK 4 71 Performance Analysis of Contention Window Cheating Misbehaviors in Mobile Adhoc Networks R. Kalaiarasi, Getsy S. Sara, S. Neelavathy Pari and D. Sridharan, Anna university- Chennai, India 8 72 A New Email Retrivel Ranking Approach Samir AbdelRahman1 , Basma Hassan2 and Reem Bahgat1 , 1 Cairo University, Egypt and 2 Fayoum University, Egypt 0 73 Design and Evaluation of XACML Conflict Policies Detection Mechanism Kamalbir Singh and Sarbjeet Singh, Panjab University, India 5 74 Potential Security Attacks on Wireless Networks and their Countermeasure Sreedhar. C1 , S. Madhusudhana Verma2 and N. Kasiviswanath1 , 1 G. Pulla Reddy Engineering College, India and 2 Rayalaseema University, India 2 75 A New DCT-Based Watermarking Method for Copyright Protection of Digital Audio Pranab Kumar Dhar, Mohammad Ibrahim Khan and Saif Ahmad, Chittagong University of Engineering and Technology, Bangladesh 26 76 A Multi -Perspective Evaluation of MA and GA for Collaborative Filtering Recommender System Hema Banati and Shikha Mehta, University of Delhi, India 15 77 Level Shifter Design for Low Power Applications Manoj Kumar1 , Sandeep K. Arya1 and Sujata Pandey2 , 1 Guru Jambheshwar University of Science & Technology, India and 2 Amity University, India 17 78 A Plant Documentation Information System Design Bing Wang1 and Ma Feicheng2 , 1 University of Hull, UK and 2 Wuhan University, China 3 79 Energy Efficient Data Processing in Visual Sensor Network Harish. H. Kenchannavar1 , Sushma. S. Kudtarkar2 and U. P. Kulkarni2 , 1 Gogte Institute of Technology, India and 2 SDMCET, India 6 80 Identifying Bank Frauds Using CRISP-DM and Decision Trees Bruno Carneiro da Rocha1,2 and Rafael Timoteo de Sousa Junior2, 1Bank of Brazil, Brazil and 2University of Brasilia (UnB), Brazil 14 81 A Clustering Heuristic for Multiprocessor Environments Using Computation and Communication Loads of Modules Pramod Kumar Mishra1 , Kamal Sheel Mishra2 , and Abhishek Mishra1 , 1 Banaras Hindu University, India and 2 School of Management Sciences, India 6 82 Soil Classification Using GATREE P.Bhargavi1 and S.Jyothi2 , 1 Madanapalli Institue of Tecnology and Science, India and 2 Sri Padmavathi Mahila VisvaVidyalayam, India 9 83 A Performance Comparison Study of the Location Prediction Based Routing Protocol with Position Based Routing Protocols for Mobile Ad Hoc Networks Natarajan Meghanathan, Jackson State University, USA 0
  • 13. 84 Manipulating Multistage Interconnection Networks Using Fundamental Arrangements E. Gur1 and Z. Zalevsky2 , 1 Shenkar College of Eng. & Design, Israel and 2 Bar Ilan University, Isreal 1 85 Inheritance Metrics for Object-Oriented Design Kumar Rajnish, Arbind Kumar Choudhary and Anand Mohan Agrawal, BITIC - Muscat, Sultanate of Oman 8 86 Comparison of Class Inheritance and Interface Usage in Object Oriented Programming through Complexity Measures V. Krishnapriya1 and K. Ramar2 , 1 Sri Ramakrishna College of Arts & Science for Women, India and 2 Sri Vidya College of Engineering and Technology, India 1 87 Adaptive Block Pinning Based: Dynamic Cache Partitioning for Multi-core Architectures Nitin Chaturvedi, Jithin Thomas and S Gurunarayanan, Birla Institute of Technology and Science, India 0 88 Use of Smart Antennas In Ad Hoc Networks Mohammed Ali Hussain1 , P.Suresh Varma2 , K. Satya Rajesh3 , Hussain Basha Pathan3 and Leela Madhav Sarraju4 , 1 Sri Sai Madhavi Institute of Science & Technology, India, 2 Adikavi Nannaya University, 3 Rayalaseema University, India and 4 Dravidian University, India 10 89 A Novel Embedded Statistical Scheduler for Realising High System-QoS Suman Paul, A. K. Jana and M. K. Pandit, Haldia Institute of Technology (HIT), India 0 90 Security Enhencement & Solution for Authentication Frame work in IEEE 802.16 A.K.M. Nazmus Sakib, Chittagong University of Engineering & Technology, Bangladesh 2 91 Security In Wireless Sensor Networks Using Key Management Schemes Soundarya.P and Varalakshmi .L.M, Sri Manakula Vinayagar Engineering College, India 2 92 Pattern Recognition Using Neural Networks Santaji Ghorpade, Jayshree Ghorpade and Shamla Mantri, Pune University, India 16 93 Dynamic Scheduling of Skippable Periodic Tasks With Energy Efficiency In Weakly Hard Real-Time System Santhi Baskaran and P. Thambidurai, Pondicherry Engineering College, India 2 94 Some Observations On Open Source Software Development On Software Engineering Perspectives Vinay Tiwari, R.D. University - Jabalpur, India 10 95 Data Mining Algorithms And Medical Sciences Irshad Ullah, City university of Science and information Technology, Pakistan 13 96 Network Intrusion Detection System Based On Machine Learning Algorithms Vipin Das, Vijaya Pathak, Sattvik Sharma, Sreevathsan, MVVNS.Srikanth, Gireesh Kumar T, Amrita Vishwa Vidyapeetham, India 16
  • 14. 97 Segmentation And Object Recognition Using Edge Detection Techniques Y.Ramadevi, T.Sridevi, B.Poornima and B.Kalyani, Chaitanya Bharathi Institute of Technology, India 70 98 Automatic Induction of Rule Based Text Categorization D.Maghesh Kumar, AVC Polytechnic College, India 3 2011 99 Affine Invariant Descriptors of 3D Object Using Multiple Regression Model M. Elhachloufi1 , A. El Oirrak1 , D. Aboutajdine2 and M.N. Kaddioui1 , 1 Caddy Ayyad University, Morocco and 2 LEESA-GSCM, Morocco 2 100 Use-Case, Runtime and Deployment Views for Developing Subsidies Mobile Wallet Dina Darwish, International Academy for Engineering and Media Science, Egypt 0 101 Diagonal Based Feature Extraction for Handwritten Alphabets Recognition System Using Neural Network J.Pradeep, E.Srinivasan and S.Himavathi, Pondicherry College Engineering, India 0 102 Electre Methods in Solving Group Decision Support System Bioinformatics on Gene Mutation Detection Simulation Ermatita1 , Sri Hartati2 , Retantyo Wardoyo2 and Agus Harjoko2 , 1 Sriwijaya University, Indonesia and 2 Gadjah Mada University, Indonesia 14 103 A Novel Super Resolution Reconstruction of Low Reoslution Images Progressively Using DCT and Zonal Filter Based Denoising Liyakathunisa and C.N .Ravi Kumar, Sri Jayachamrajendra College of Engineering, India 3 104 Mining Target-Oriented Fuzzy Correlation Rules to Optimize Telecom Service Management Hao-En Chueh, Yuanpei University, Taiwan 5 105 Improving the Character Recognition Efficiency of Feed Forward BP Neural Network Amit Choudhary1 and Rahul Rishi2 , 1 Maharaja Surajmal Institute, India and 2 TITS - Bhiwani, India 22 106 Initial Classification Through Back Propagation In a Neural Network Following Optimization Through GA to Evaluate the Fitness of an Algorithm Amit Ganatra, Y P Kosta, Gaurang Panchal and Chintan Gajjar, Charotar University of Science and Technology, India 23 107 Adaptive Fuzzy Filtering for Artifact Reduction in Compressed images and videos P.Ramakrishna Rao1 , B.Addai1 , G.Ramakrishna1 and T.PanduRanga Vital2 , 1 Dr.B.R.Ambedkar University, India and 2 Gayathri College of Science and Management, India 0 108 Channel Allocation for Direct Sequence Spread Spectrum Using Vertex Merge Algorithm Handrizal, A.Noraziah and Ahmed N Abd.Alla, University Malaysia Pahang, Malaysia 0 109 Combining Speedup Techniques based on Landmarks and Containers with parallelised preprocessing in Random and Planar Graphs R. Kalpana1 and P. Thambidurai2 , 1 Pondicherry Engineering College, India and 2 Perunthalaivar Kamarajar Institute of Engineering & Technology, India 0
  • 15. 110 Machine Learning Methods for Spam E-Mail Classification W.A. Awad1 and S.M. ELseuofi2 , 1 Port Said University, Egypt and 2 Ras El Bar High inst., Egypt 0 111 A Formal Classification of Internet Banking Attacks and Vulnerabilities Laerte Peotta, Marcelo D. Holtz, Bernardo M. David, Flavio G. Deus and Rafael Timoteo de Sousa Jr., University of Brasilia (UnB), Brazil 18 112 Characterization of Tumor Region Using SOM and Neuro Fuzzy Techniques in Digital Mammography Anamika Ahirwar and R.S. Jadon, Madhav Institute of Technology & Science, India 6 113 Search-Based Software Test Data Generation Using Evolutionary Computation P. Maragathavalli, Pondicherry Engineering College, India 9 114 Clustering Posts in Online Discussion Forum Threads Dina Said1 and Nayer Wanas2 , 1 University of Calgary, Canada and 2 Electronics Research Institute - Giza, Egypt 6 115 The Development of Electronic Payment System for Universities in Indonesia: On Resolving Key Success Factors Veronica S. Moertini, Asdi A. Athuri, Hery M. Kemit and Nico Saputro, Parahyangan Catholic University, Indonesia 5 116 Brightness Factor Matching for Gesture Recognition System Using Scaled Normalization Mokhtar M. Hasan and Pramoud K. Misra, Banaras Hindu University, India 39 117 Behavior Analysis in a learning Environment to Identify the Suitable Learning Style Abdelaziz. K. Hamada1 , Magdy. Z. Rashad1 and Mohamed.G. Darwesh2 , 1 Mansoura University, Egypt and 2 Ahram Canadian University, Egypt 17 118 An Object-Oriented Modeling and Implementation of Spatio-Temporal Knowledge Discovery System K.Venkateswara Rao1 , A.Govardhan2 and K.V.Chalapati Rao1 , 1 CVR College of Engineering, India and 2 JNTUH College of Engineering, India 8 119 An Effective CBVR System Based on Motion, Quantized Color and Edge Density Features Kalpana Thakre1 , Archana Rajurkar2 and Ramchandra Manthalkar3 , 1 Sinhgad College of Engineering, India, 2 MGM College of Engineering, India and 3 SGGSIE&T - Nanded, India 5 120 Model Based System Engineering Approach of a Lightweight Embedded TCP/IP M. Z. Rashed, Ahmed E. Hassan and Ahmed I. Sharaf, Mansoura University, Egypt 1 121 Model-Based Factors to Extract Quality Indications in Software Lines of Code Mohammed Abdullah H. Al-Hagery, Qassim University, KSA 3 122 Wavelet Based Spectrum Sensing Techniques for CogKarthik Divakaran, Naveen Manikandan P and Shri Hari R R, Amrita Vishwa Vidyapeetham, Indianitive Radio - A Survey Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, Amrita Vishwa Vidyapeetham, India 12 123 Ontology Alignment Using Machine Learning Techniques Azadeh Haratian Nejhadi, Bita Shadgar and Alireza Osareh, Shahid Chamran University, Iran 13
  • 16. 124 A Novel Parallel Algorithm for Clustering Documents Based on the Hierarchical Agglomerative Approach Amal Elsayed Aboutabl1 and Mohamed Nour Elsayed2 , 1 Helwan University, Cairo, Egypt and 2 Princess Noura University, Kingdom of Saudi Arabia 6 125 Adaptive Team-Based Multi-Agent Organizational Model: A Case in Rescue Systems Afsaneh Fatemi, Kamran Zamanifar and Naser Nematbakhsh, University of Isfahan, Iran 4 126 A Descriptive Model for Developing a Hydraulic Geodatabase by Using the GIS Softwares El khamlichi Ahmed Mortada1 , Kadiri Mohamed1 , El mahboul Abdellah2 and Merzouki Abderrahmane3 , 1 University Abdelamlek Essaadi, Morocco, 2 Hydraulic basin Agency of Oum Er Rabii, Morocco and 3 University of Granada, Spain 2 127 Application of PUF-Enabled RFID Tags in Electronic Banking Saeed Mehmandoust and Reza Ebrahimi Atani, The University of Guilan, Iran 2 128 Energy Efficient Task Scheduling of Send-Receive Task Graphs on Distributed Multi-Core Processors with Software Controlled Dynamic Voltage Scalin Abhishek Mishra and Anil Kumar Tripathi, Banaras Hindu University, India 1 129 A Design of a Computer-Aided Diagnostic Tool For Chest X-Ray Analysis Kim Le, University of Canberra, Australia 7 130 Characterization and Validation of Requirements Management Measures Using Correlation and Regression Model S. Arun Kumar and T.Arun Kumar, VIT University, India 4 131 An Automated Size Recognition Technique for Acetabular Implant in Total Hip Replacement A. Shapi'i, R. Sulaiman, M.K. Hasan and A.Y.M. Kassim, Universiti Kebangsaan Malaysia, Malaysia 5 132 PHP Framework for Database Management Based on MVC Pattern Chanchai Supaartagorn, Ubon Ratchathani University, Thailand 19 133 Importance of Data Collection and Validation for Systematic Software Development Process Mala.V.Patil1 and A.M.Nageswara Yogi2 , 1 Anna University - Coimbatore, India and 2 Defence Research and Development Organization - Bangalore, India 1 134 Information Security Plan for Flight Simulator Applications Jason Slaughter1 and Syed (Shawon) M. Rahman1,2 , 1 Capella University, USA and 2 University of Hawaii-Hilo, USA 15 135 Common Phases of Computer Forensics Investigation Models Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, Universiti Tenaga Nasional, Malaysia 74 136 Comparison and Analysis of Watermarking Algorithms in Color Images - Image Security Paradigm D. Biswas1 , S. Biswas2 , P.P. Sarkar2 , D. Sarkar2 , S. Banerjee1 and A. Pal1 , 1 Academy of Technology - Hoogly, India and 2 University of Kalyani, India 5
  • 17. 137 Evolutionary Neural Networks algorithm for the Dynamic Frequency Assignment Problem Jamal Elhachmi and Zouhair Guennoun, Mohammadia School of Engineers (EMI), Morocco 11 138 Optimal Self Correcting Fault Free Error Coding Technique in Memory Operation Harikishore .Kakarla1 , Madhavi Latha .M2 and Habibulla Khan1 , 1 KL University, India and 2 JNTUH - Hyderabad, India 2 139 Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE) Abderrahim BOUROUIS1 ,Mohamed FEHAM1 and Abdelhamid BOUCHACHIA2 , 1 Abou-bekr BELKAID University, Algeria and 2 University of Klagenfurt, Austria 54 140 A Review on Elliptic Curve Cryptography for Embedded Systems Rahat Afreen1 and S.C. Mehrotra2 , 1 Tom Patrick Institute of Computer & I.T - Rauza Bagh, India and 2 Dr. B.A.M. University, India 21 141 Statistical Analysis on Software Metrics Affecting Modularity in Open Source Software Andi Wahju Rahardjo Emanuel1 , Retantyo Wardoyo2 , Jazi Eko Istiyanto2 and Khabib Mustofa2 , 1 Maranatha Christian University, Indonesia and 2 Gadjah Mada University, Indonesia 4 142 Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government Md.Headayetullah, G.K. Pradhan, Sanjay Biswas and B. Puthal, SOAU - Bhubaneswar, India 1 143 Hybrid of Particle Swarm Optimization with Evolutionary Operators to Fragile Image Watermarking Based DCT Sawsan Morkos Gharghory, Electronics Research Institute - Cairo, Egypt 14 144 Image Retrieval using Bit-plane Pixel Distribution N S T Sai1 and R C Patil2 , 1 Tech Mahindra Limited - Mumbai, India and 2 NMIMS University, India 6 145 Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network Al Mutaz M. Abdalla1 , Safaai Dress1 and Nazar Zaki2 , 1 Universiti Teknologi - Malaysia, India and 2 UAE University, UAE 32 146 Effective Independent Quality Assessment using IV&V Pathanjali Sastri Akella1 and K. Nageswara Rao2 , 1 V. R. Siddhartha Engineering College, India and 2 P. V. P. Siddhartha Institute of Technology, India 2 147 E-Learning personalization based on Dynamic learners' preference Essaid El Bachari, El Hassan Abelwahed and Mohammed El Adnani, University Cadi Ayyad, Morocco 44 148 An LMS Based Blind Source Separation Algorithm Using A Fast Nonlinear Autocorrelation Method Behzad Mozaffari Tazehkand, University of Tabriz, Iran 0 149 A Novel Technique for Back-Link Extraction and Relevance Evaluation Pooja Gupta1 , A.K. Sharma2 and Divakar Yadav3 , 1 MAIT - New Delhi, India, 2 YMCA University of Science and Technology, India and 3 JIITU - Noida, India 2
  • 18. 150 Electronic Commerce in Web 3.0: The Evidence from Emerging Economics Xi Zhang1 and Doug Vogel2 , 1 Chinese Academy of Sciences, China and 2 City University of Hong Kong, China 5 151 A Comparative Experiment of Several Shape Methods in Recognizing Plants A. Kadir, L.E. Nugroho, A. Susanto and P.I. Santosa, Gadjah Mada University, Indonesia 36 152 RCause - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems Er. Anand Rajavat1 and Vrinda Tokekar2 , 1 Shri Vaishnav Institute of Technology and Science Indore, India and 2 Institute of Engineering and Technology (DAVV) Indore, India 0 153 Unsupervised horizontal collaboration based in SOM Nadia Mesghouni Khaled Ghedira and Moncef Temani, University of Tunis Laboratory LI3 ISG Tunis, Tunisie 2 154 Automatic Application Level Set Approach In Detection Calcifications In Mammographic Image Atef Boujelben1 , Hedi Tmar2 , Jameleddine Mnif1 and Mohamed Abid2 , 1 National School of Medicine of Sfax, Tunisia and 1 National School of Engineers of Sfax, Tunisia 3 155 A Robust Steganography Model Using Wavelet-Based Block-Partition Modification Sherin Youssef, Ahmed Abu Elfarag and Reta Raouf, Arab Academy for Science & Tech - Alx., Egypt 11 156 Cultural Influences on Explicit and Implicit Knowledge Sharing Behaviour in Virtual Teams Xi Zhang, Chinese Academy of Sciences, P. R. China 10 157 A Fuzzy Framework For Segmentation, Feature Matching And Retrieval Of Brain MR Images Archana.S and Sridhar.S, College of Engineering - Guindy, India 0 158 MDA-Based ATL Transformation To Generate MVC 2 Web Models Mhamed Rahmouni and Samir Mbarki, Ibn Tofail University, Morocco 5 159 Comprehensive Measurement Framework for Enterprise Architectures Mahesh R. Dube1 and Shantanu K. Dixit2 , 1 VIT - Pune, India and 2 WIT - Solapur, India 8 160 Plants Images Classification Based on Textural Features using Combined Classifier M.Z. Rashad, B.S.el-Desouky and Manal S .Khawasik, Mansoura University, Egypt 27 161 Design and FPGA Implementation of DDR3 SDRAM Controller for High Performance Shabana Aqueel and Kavita Khare, M.A.N.I.T - Bhopal, India 4 162 Self-Adaptation Mechanism to Control the Diversity of the Population in Genetic Algorithm Chaiwat Jassadapakorn and Prabhas Chongstitvatana, Chulalongkorn University - Bangkok, Thailand 8 163 Packet Scheduling Of Two Classes Flow Rabie Barhoun and Abdelwahed Namir, University Hassan II, Morocco 1 164 Reduction Of Blocking Probability In Shared Protected Optical Network Nirmala L Devi1 and V M Pandharipande2 , 1 Osmania University, India and 2 Dr. Babasaheb Ambedkar Marathwada University, India 2
  • 19. 165 DNA Lossless Differential Compression Alogorithm Based on Similarity of Genomic Sequence Database Heba Afify, Muhammad Islam and Manal Abdel Wahed, Cairo University, Egypt 11 166 Performance Analysis Of Various Data Mining Classification Techniques On Healthcare Data Shelly Gupta1 , Dharminder Kumar2 and Anand Sharma2 , 1 Banasthali University, India and 2 GJUS&T - Hisar, India 27 167 Towards A Model Of Maturity For Is Risk Management Mina Elmaallam and Abdelaziz Kriouile, ENSIAS - Rabat, MOROCCO 12 168 A Fuzzy Approach For Clustering Gene Expression Time Series Data Sadiq Hussain and G.C. Hazarika, Dibrugarh University - Assam, India 1 169 Novel Apporach for Speech Recognition by Using Self - Organized Maps R.L.K.Venkateswarlu1 , R. Vasantha Kumari2 and A.K.V.Nagayya1 , 1 Sasi Institute of Technology and Engineering, India and 2 Perunthalaivar Kamarajar Arts College, India 9 Special Issue on "ICCSEA - 2011" 170 A New Trusted Third-Party Billing For Mobile Networks Supriya Chakraborty1 and Nabendu Chaki2 , 1 JIS College of engineering - West Bengal, India and 2 University of Calcutta, India 0 171 Performance Evaluation And Impact Of Weighting Factors On An Energy And Delay Aware Dynamic Source Routing Protocol Jihen Drira Rekik, Leila Baccouche and Henda Ben Ghezala,Manouba University,Manouba, Tunisia 5 172 Indian Languages IR using Latent Semantic Indexing A.P.SivaKumar1 , P.Premchand2 and A.Govardhan1 , 1 JNTUACE, India and 2 Osmania University - Hyderabad, India 6 173 Active Controller Design For Global Choas Anti-Synchronization Of Li and Tigan Chaotic Systems Sundarapandian Vaidyanathan1 and Karthikeyan Rajagopal2 , 1 Vel Tech Dr. RR & Dr. SR Technical University, India and 2 Singhania University Rajasthan, India 11 174 It Security Issues Within the Video Game Industry Stephen Mohr1 and Syed (Shawon) Rahman1,2 , 1 Capella University, USA and 2 University of Hawaii-Hilo, USA 9 175 Adaptive Beamforming Algorithm for Interference Suppression in GNSS Receivers Zhao hongwei1 , Lian Baowang1 and Feng Juan1,2 , 1 Northwestern Polytechnical University, China, 2 KIT- Karlsruhe Institute of Technology, Germany 58 176 Minimize the False Positive Rate in a Database Intrusion Detection System A. Rezk, H. Ali, M. El-Mikkawy and S. Barakat, Mansoura University, Egypt 4 177 Design Pattern Management System: A Support Tool Based on Design Patterns Applicability Zakaria Moudam, Radouan Belhissi and Noureddine Chenfour, University Sidi Mohammed Ben Abdellah Fez, Morocco 0
  • 20. 178 Genetic Algorithm (GA) In Feature Selection For CRF Based ManipuriMultiword Expression (MWE) Identification Kishorjit Nongmeikapam1 and Sivaji Bandyopadhyay2 , 1 Manipur University, India and 2 Jadavpur University, India 4 179 IRIS Recognition Based On LBP and Combined LVQ Classifier M. Z. Rashad, M. Y. Shams, O. Nomir and R. M. El-Awady, Mansoura University, Egypt 20 180 An IR-based Pedestrian Detection System Implemented with Matlab- Equipped Laptop and Low-Cost Microcontroller Erwin Thomas Gilmore, Chukwunweike Ugbome and Charles Kim, Howard University, USA 7 181 New Method for 3D Shape Retrieval Abdelghni Lakehal and Omar El Beqqali, Sidi Mohamed Ben AbdEllah University, Morocco 2 182 Research Review for Digital Image Segmentation Techniques Ashraf A. Aly1 , Safaai Bin Deris1 and Nazar Zaki2 , 1 Universiti Teknologi Malaysia and 2 UAE University, UAE 41 183 Stable Filtering for Artificial Pheromone Potential Field Constructed By Mobile Robots and Passive RFID Tags Piljae Kim and Daisuke Kurabayashi, Tokyo Institute of Technology, Japan 0 184 Evaluate the Performance of Optical Cross Connect Based on Fiber Bragg Grating Under Different Bit Rate Bobby Barua, Ahsanullah University of Science and Technology, Bangladesh 7 185 Optimized Fuzzy Logic Application for MRI Brain Images Segmentation Indah Soesanti1 , Adhi Susanto1 , Thomas Sri Widodo1 , Maesadji Tjokronagoro2 , 1 Gadjah Mada University, Indonesia and 1 Gadjah Mada University, Indonesia 15 186 Robust seed selection algorithm for k-means type algorithms K. Karteeka Pavan1 , Allam Appa Rao2 , A. V. Dattatreya Rao3 and G. R. Sridhar4 , 1 Jagarlamudi Chadramouli College of Engineering, India, 2 Jawaharlal Nehru Technological University, India, 3 Acharya Nagarjuna University, India and 4 Endocrine and Diabetes Centre, India 15 187 Knowledge Based Methods for Video Data Retrieval S.Thanga Ramya and P.Rangarajan, RMD Engineering College, India 3 188 Analysis and Design Complex and Large Data Base using MySQL Workbench Dedi Iskandar Inan and Ratna Juita, Papua State University, Indonesia 2 189 Direct Manipulation of Web Browsing History Gholam H. Khaksari, Pennsylvania State University, USA 3 190 A Semantically Enriched Web Usage Based Recommendation Model C.Ramesh1 , K. V. Chalapati Rao1 and A.Goverdhan2 , 1 CVR College of Engineering,India and 2 JNTUH College of Engineering, India 12 191 Enhancing Confidentiality of Private Communication through Dual Compression Kristipati Sudharshana Reddy, Munwar Sk and Rajesh Bhakthavatsalam, SVEC - JNTU, India 0 192 Optimum Partition Parameter of Divide-And-Conquer Algorithm for Solving Closest-Pair Problem Mohammad Zaidul Karim and Nargis Akter, Daffodil International University, Bangladesh 10
  • 21. 193 Monitoring Software Reliability using Statistical Process Control: An MMLE Approach R Satya Prasad1 , Bandla Sreenivasa Rao2 and R.R. L Kantham1 , 1 Acharya Nagarjuna University, India and 2 VRS & YRN College, India 3 194 From 3D Model Data to Semantics My Abdellah Kassimi and Omar El beqqali, Sidi Mohamed Ben Abdellah University, Morocco 3 195 Recycling of Bandwidth in Metropolitan Area Networks(MAN) Bhargava Devana1 , Sudharshana Kristipati 1 , Raghava Nirati2 , 1 JNTU - India and 2 JITS, India 0 196 Adaptation AC to Improve Wireless Access Network Dependability Olfa Ben Ahmed and Zied Choukair, University of Carthage, Tunisia 1 197 A Comparative Study To Find A Suitable Method For Text Document Clustering S.C.Punitha1 and M.Punithavalli2 , 1 P.S.G.R. Krishnammal College for women, India and 2 Sri Ramakrishna College of engineering, India 2 198 Recognizing Bangla Grammar Using Predictive Parser K.M. Azharul Hasan, Al-Mahmud, Amit Mondal and Amit Saha, Khulna University of Engineering and Technology, Bangladesh 15 199 Hybrid GPS-GSM Localization of Automobile Tracking System Mohammad A. Al-Khedher, Balqa Applied University, Jordan 75 200 Network Intrusion Detection Using Data Mining and Network Behaviour Analysis Ahmed Youssef and Ahmed Emam, King Saud University, KSA 18 201 Technical Analysis of Remote 3D Visualization on Mobile Devices U.S. Junghare1 , V.M. Thakare2 , R.V.Dharaskar3 and S.S. Sherekar2 , 1 Brijlal Biyani Science College, India, 2 SGB Amravati University, India 3 M.P.G.I. Nanded, India 2 202 Integrated Environment for Developing E-Learning Lectures Vladimir Bondarev1 , Alexander Ossyka2 and Afif Mghawish1 , 1 Kharkov National University of Radio Electronics, Ukraine and 2 Al-Zaytoonah Private University, Jordan 4 203 Analysis of Different Privacy Preserving Cloud Storage Frameworks Rajeev Bedi1 , Mohit Marwaha1 , Tajinder Singh2 , Harwinder Singh3 and Amritpal Singh1 , 1 Beant College of Engineering and Technology, India, 2 Global Institute of Engineering and Technology, India and 3 SSCET, India 7 204 Investigating the Awareness of Applying the Important Web Application Development and Measurement Practices Faudziah Ahmad, Fauziah Baharom and Moath Husni, Universiti Utara Malaysia, Malaysia 3 205 Flooding Attacks to Internet Threat Monitors(ITM): Modeling and Counter Measures Using Botnet and Honeypots K.Munivara Prasad1 , A.Rama Mohan Reddy2 and M.Ganesh Karthik3 , 1 Rayalaseema University, India 2 SV University, India and 3 Sree vidyanikethan Engg.College, India 9 206 Mobile Geographic Information Systems: A Case Study on Mansoura University, Egypt Asmaa Ahmed Hussein1 , Elkhedr Hassan Eibrahim2 and Aziza Asem1 , 1 Mansoura University, Egypt and 2 King Saud University, KSA 12
  • 22. 207 An Improved Neural Image Compression Approach With Cluster Based Pre- Processing Mohamed.G. Darwesh1 , Magdy. Z. Rashad2 and Abdelaziz. K. Hamada2 , 1 Cairo University, Egypt and 2 Mansoura University, Egypt 0 208 From Learning Style of Webpage Content to Learner's Learning Style Mohamed.G. Darwesh1 , Magdy. Z. Rashad2 and Abdelaziz. K. Hamada2 , 1 Cairo University, Egypt and 2 Mansoura University, Egypt 7 209 Image Labeling and Segmentation using Hierarchical Conditional Random Field Model Manoj K.Vairalkar and Sonali.Nimbhorkar, RTMN University - Nagpur, India 0 210 Multi-Resolution Analysis For Medical Image Compression Mohammed Alhanjouri, Islamic University of Gaza, Palestine 3 211 Introduction Of Knowledge Management Architecture Using Multi Agent Sheikh Amanur Rahman1 , Anamika Bhardwaj1 , Mukul Pathak1 and Shobhit Singh Rathore2 , 1 Galgotias College of Engineering & Technology, India and 2 SDG Software India Pvt. Ltd, India 8 212 Optimal Fuzzy Model Construction With Statistical Information Using Genetic Algorithm Md. Amjad Hossain1 , Pintu Chandra Shill2 , Bishnu Sarker1 and Kazuyuki Murase2 , 1 KUET, Bangladesh and 2 University of Fukui, Japan 2 213 Edge Detection Techniques For Image Segmentation Muthukrishnan.R and M.Radha, Bharathiar University, India 61 2012 214 Trust Model for Reliable File Exchange In Cloud Computing Edna Dias Canedo, Rafael Timoteo de Sousa Junior and Robson de Oliveira Albuquerque, University of Brasilia, Brazil 15 215 An Approach for Robots to Deal with Objects Sidiq S. Hidayat1,3 , Bong Keung Kim2 and Kohtaro Ohba2 , 1 University of Tsukuba, Japan, 2 The National Institute of Advanced Industrial Science & Technology (AIST) Tsukuba, Japan and 3 Politeknik Negeri Semarang, Indonesia 7 216 Enhancement of Images Using Morphological Transformations K.Sreedhar1 and B.Panlal2 , 1 VITS (N9) Karimnagar, India and 2 VCE (S4) Karimnagar, India 48 217 A Cluster Allocation and Routing Algorithm based on Node Density for Extending the Lifetime of Wireless Sensor Networks Wernhuar Tarng, Hao-Wei Lin and Kuo-Liang Ou, National Hsinchu University of Education, Taiwan 12 218 Reliability Analysis of Multi Path Multistage Interconnection Networks Sudarson Jena, G.Sri Sowmya, P.Radhika and P.Venkat Reddy, GITAM University, India 4 219 A Novel Password based Multi Party Key Agreement Protocol on Elliptic Curve Daniyal M. Alghazzawi, King Abdulaziz University, Saudi Arabia 2 220 An Effective Model for Improving the Quality of Recommender Systems in Mobile E-Tourism Masoumeh Mohammadnezhad1 and Mehregan Mahdavi2 , 1 Islamic Azad University, Iran and 2 University of Guilan, Iran 8
  • 23. 221 Image Segmentation in Video Sequences Using Modified Background Subtraction D. W. Chinchkhede & N. J. Uke, Pune University, India 17 222 Achieving Consensus with Individual Centrality Approach Vitri Tundjungsari, Jazi Eko Istiyanto, Edi Winarko and Retantyo Wardoyo, Gadjah Mada University, Indonesia 4 223 Blind 3D Model Watermarking based on Multi-Resolution Representation and Fuzzy Logic Sharvari C. Tamane1 and Ratnadeep R. Deshmukh2 , 1 MGM's Jawaharlal Nehru Engineering College, India and 2 Dr. Babasaheb Ambedkar Marathwada University, India 8 224 Integrated Task Clustering, Mapping and Scheduling for Heterogeneous Computing Systems Yuet Ming Lam, Macau University of Science and Technology, Macau 5 225 Ranking Popular Items By Naive Bayes Algorithm Shiramshetty Gouthami, Golamari.Jose Mary and Pulluri Srinivas Rao, Jayamukhi Institute of Technological Sciences, India 1 226 Quality of Service Using PSO Algorithm S.M. ELseuofi, Umm Al-Qura University, Saudi Arabia 5 227 Image Retrieval System Using Hybrid Feature Extraction Technique Vadhri Suryanarayana1 , M.V.L.N. Raja Rao2 , P. Bhaskara Reddy3 and G. Ravindra Babu4 , 1 NRI Institute of Technology, India, 2 Gudlavalleru Engineering College, India, 3 MLR Institutions, India and 4 S.C.C.E.T - Hyderabad, India 1 228 SignsWorld; Deeping into the Silence World and Hearing Its Signs (StAte oF the Art) A.M. Riad, Hamdy K.Elmonier,Samaa.M.Shohieb and A.S. Asem, Misr academy for Engineering and Technology, Egypt 10 229 A Qualitative Study of LP-ITS: Linear Programming Intelligent Tutoring System Samy S. Abu Naser, Al-Azhar University-Gaza, Palestine 21 230 Graph Based New Approach for Frequent Pattern Mining Anurag Choubey1 , Ravindra Patel2 and J.L. Rana3 , 1 Technocrats Institute of Technology, India, 2 UIT-RGPV, India and 3 MANIT, India 1 231 An Approach for Agile SOA Development using Agile Principals Majlesi Shahrbanoo, Mehrpour Ali and Mohsenzadeh Mehran, Islamic Azad University, Iran 14 232 Error Probability Analysis of Free-Space Optical Links with Different Channel Model under Turbulent Condition Bobby Barua, Tanzia Afrin Haque and Md. Rezwan Islam, Ahsanullah University of Science and Technology, Bangladesh 6 234 Visual Analysis of Cost Based Database Optimizers Using Picasso Tool Neeraj Sharma1 , Kavindra Raghuwanshi2 , Syed Imran Ali1 and Banshilal Patidar1 , 1 Trinity Institute of Technology and Research, India and 2 All Saints College of Technology, India 0 235 MppSoCGEN: A Framework for automatic generation of MppSoC Architecture Emna Kallel, Yassine Aoudni, Mouna Baklouti and Mohamed Abid, ENIS School Sfax, Tunisia 0
  • 24. 236 Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues Swarnpreet Singh and Tarun Jangwal, CT Institute of Engineering and Management Technology, India 25 237 Mass Lesion Detection Using Wavelet Decomposition Transform and Support Vector Machine Ayman AbuBaker, Applied Science Private University Amman, Jordan 7 238 Document Summarization Using Positive Pointwise Mutual Information Aji S1 and Ramachandra Kaimal2 , 1 University of Kerala, India and 2 Amrita Vishwa Vidyapeetham Amritapuri Campus, India 6 239 Fuzzy Multi-objective Approach for the Improvement of Distribution Network Efficiency by Considering DG Ramadoni Syahputra, Universitas Muhammadiyah Yogyakarta, Indonesia 57 240 A Semi-Blind Reference Watermarking Scheme Using DWT-DCT-SVD for Copyright Protection Satyanarayana Murty. P1 , M.Uday Bhaskar2 and P. Rajesh Kumar3 , 1 GIITS, India, 2 Sri Sai Aditya Institute of Science & Technology, India and 3 AU college of Engineering, India 20 241 Review on Common Criteria as a Secure Software Development Model Mehmet Kara, TUBITAK BILGEM UEKAE, Turkey 13 242 Dynamic Domain Classification for Fractal Image Compression K. Revathy and M. Jayamohan, University of Kerala, India 1 243 Signal Processing for MIMO Interference Networks Thanat Chiamwichtkun1 , Stephanie Soon2 and Ian Lim2 , 1 Bangkok University, Thailand and 2 National University of Singapore, Singapore 0 244 Embedded Controller for Vehicle In-Front Obstacle Detection and Cabin Safety Alert System V.Ramya, B. Palaniappan and K. Karthick, Annamalai University, India 36 UNDERSTANDING the Concept of Geographic Information System and Modelling Formalisms Wembe Sop Diake Hubert, University of Douala, Cameroon 0 245 Spectral Analysis of Projection Histogram for Enhancing Close matching character Recognition in Malayalam Sajilal Divakaran, University of Kerala, India 4 246 Prashnottar: A Hindi Question Answering System Shriya Sahu, Nandkishor Vasnik and Devshri Roy, MANIT Bhopal, India 10 247 Dimension Reduction by Mutual Information Feature Extraction Ali Shadvar, Islamic Azad University, Iran 2 248 New-Fangled Method Against Data Flooding Attacks in MANET Kavuri Roshan1 , K.Reddi Prasad1 , Niraj Upadhayaya1 and A.Govardhan2 , 1 J.B. Institute of Engineering & Technology, India and 2 JNTUH, India 2 249 Evaluation of Information Retrieval Systems Keneilwe Zuva1 and Tranos Zuva2 , 1 University of Botswana, UK and 2 Tshwane University Technology, SA 15
  • 25. 250 Improvement of Traffic Overhead and Reliability in Wireless Sensor Network G.M. Mashrur-E-Elahi, Din Mohammad Mobin and Md. Anwar Ul Islam Rajib, Khulna University of Engineering and Technology, Bangladesh 0 251 A Hybrid Region Growing Algorithm for Medical Image Segmentation D. Muhammad Noorul Mubarak1 , M. Mohamed Sathik2 , S.Zulaikha Beevi3 and K.Revathy11 University of Kerala, India , 2 Sathakathullah Appa College, India and 3 National College of Engineering,India 12 252 Full Data Controlled Web-Based Feed Aggregator Haruna Isah, University of Bradford, UK 4 253 High Availability Solution: Resource Usage Management in Virtualized Software Aging Aye Myat Myat Paing and Ni Lar Thein, University of Computer Studies, Yangon 5 254 Critical Analysis of Ecm Applications in the Clouds: A Case Study James Xue1 and Amjad Yahya2 , 1 University of Northampton, UK, and 2 PricewaterhouseCoopers, Saudi Arabia 1 255 Crawler Architecture Using Grid Computing M.E.ElAraby1 , M.M.Sakre1 , M.Z.Rashad2 and O.Nomir2 , 1 Al Shorouk Academy, Egypt, and 2 Mansoura University, Egypt 1 256 Automatic Segmentation of Manipuri (Meiteilon) Word into Syllabic Units Kishorjit Nongmeikapam1 , Vidya Raj RK1 , Oinam Imocha Singh1 and Sivaji Bandyopadhyay2 , 1 Manipur University, India and 2 Jadavpur Univeristy,India 0 257 An Approach for Integration Testing in Online Retail Applications Roopa Singh and Imran Akhtar Khan, JJT University, India 1 258 A Rule Based Approach for Root Word Identification in Malayalam Language Meera Subhash, Wilscy. M, S.A Shanavas, University of Kerala, India 3 259 Applying Data Envelopment Analysis to Evaluation of Taiwanese Solar Cell Industry Operational Performance Hao-En Chueh and Jie-Yi Jheng, Yuanpei University, Taiwan 0 260 PCA - Wavelet Coefficients for T2 chart to Detect Endpoint in CMP process Sihem Ben Zakour1 and Hassen Taleb2 , 1 Higher institute of Management of Tunis, Tunisia and 2 Higher institute of business administration of gafsa,Tunisia 1 261 PSO Algorithm for IPD Game Xiaoyang Wang and Yibin Lin, Sun-Yat Sen University, China 1 262 Training a Feed-Forward Neural Network with Artificial Bee Colony based Backpropagation Method Sudarshan Nandy1 , Partha Pratim Sarkar1 and Achintya Das2 , 1 Kalyani University, India and 2 Kalyani Goverment Engineering College,India 22 263 Multicore Dynamic Kernel Modules Attachment Technique for Kernel Performance Enhancement Mohamed Farag, Maharishi University of Management, USA 0 264 Redescription Mining With Three Primary Data Mining Functionalities M. Kamala Kumari and Suresh Varma, Adikavi Nannaya University, India 0
  • 26. 265 Spatial Data Mining using Cluster Analysis Ch.N.Santhosh Kumar1 , V. Sitha Ramulu1 , K.Sudheer Reddy2 , Suresh Kotha1 , Ch and Mohan Kumar1 , 1 Swarna Bharathi Inst. of Sc. & Tech, India and 2 Acharya Nagarjuna University,India 5 266 Applications of Wireless Sensor Networks in Fall Detection for Senior People Wernhuar Tarng1 , Chia-Hwei Lin1 and Hsin-Hun Liou2 , 1 National Hsinchu University of Education, Taiwan and 2 National Central University, Taiwan 4 267 Intelligent Mining Association Rules Sarjon Defit, University Putra Indonesia "YPTK" Padang 1 268 Comparison Study for Clonal Selection Algorithm and Genetic Algorithm Ezgi Deniz Ulker and Sadık Ulker, Girne American University, Turkey 7 269 A New Audio Watermarking Method Based on Discrete Cosine Transform with a Gray Image Mohammad Ibrahim Khan1 , Md. Iqbal Hasan Sarker1 , Kaushik Deb1 and Md.Hasan Furhad2 , 1 Chittagong University of Engineering & Technology, Bangladesh and 2 University of Ulsan, South Korea 1 270 C-PASS-PC: A Cloud-driven Prototype of Multi-Center Proactive Surveillance System for Prostate Cancer Haibin Wang, Samuel Oschin Comprehensive Cancer Institute, USA 2 271 An Energy Aware Geocast Algorithm Using 2-Hop Neighbour Knowledge in Sensor Networks Young-Chul Shim1 and Sehun Noh2 , 1 Hongik University, Korea and 2 GuardianNet, Korea 0 272 Genetic Algorithm with SRM SVM Classifier for Face Verification Safiya K.M 1 , S.Bhuvana1 , P.TamijeSelvy1 and R. Radhakrishnan2 , 1 Sri Krishna College of Technology, India and 2 Sri Ramakrishna Engineering college, India 0 273 Biometric Authentication Through a Virtual Keyboard for Smartphones Matthias Trojahn1 and Frank Ortmeier2 , 1 Volkswagen AG, Germany and 2 Otto- von-Guericke University, Germany 28 274 Improving Computer-Mediated Synchronous Communication of Doctors in Rural Communities Through Cloud Computing: A Case Study of Rural Hospitals in South Africa Alfred Coleman1 , Marlien E Herselman2 and Mary Coleman3 , 1 University of South Africa, 2 CSIR South Africa and 3 Medical University of South Africa, South Africa 5 275 Alfred Coleman1 , Marlien E Herselman2 and Mary Coleman3 , 1 University of South Africa, 2 CSIR South Africa and 3 Medical University of South Africa, South Africa Bilal Hawashin1 , Farshad Fotouhi2 and William Grosky3 , 1 Alzaytoonah University of Jordan, 2 Wayne State University, USA and 31 University of Michigan- Dearborn,USA 0 276 Building a Portable Computer Lab with Bootable USB Hard Drives Using Virtualisation Hao Shi, Victoria University, Australia 0 277 A P2P Botnet Virus Detection System Based on Data-Mining Algorithms Wernhuar Tarng, Cheng-Kang Chou and Kuo-Liang Ou, National Hsinchu University of Education, Taiwan 1
  • 27. 278 Skyline Sets Queries for Incomplete Data Mohammad Shamsul Arefin and Yasuhiko Morimoto, Hiroshima University, Japan 4 279 An Analyzer-Based Security Measurement Model for Increasing Software Security Sen-Tarng Lai, Shih Chien University, Taiwan 2 280 Machine Learning Algorithms in Web Page Classification W. A. AWAD, Port Said University, Egypt 2 1 281 Achieving the Benefits of Agility in Software Architecture-XP Zafar Karimi, Sajjad Behzady, Ali Broumandnia, Islamic Azad University at Qazvin, Iran 282 An Insight View of Kernel Visual Debugger in System Boot up Mohamed Farag, Maharishi University of Management, USA 0 283 Evolutionary Tuning of Fuzzy Rule Base Systems for Nonlinear System Modelling and Control Pintu Chandra Shill1 , Bishnu Sarker1 and Kazuyuki Murase2 , 1 University of Fukui, Japan and 2 KUET, Bangladesh 0 284 Computational Analysis of Code Collaboration Pattern and Semantic Role Lei Wu1 , Sharon White1 , Yi Feng1 , James Helm1 , Nathanial Wiggins3 , 1 University of Houston-Clear Lake, USA, 2 Algoma University, Canada and 3 San Jacinto College, Houston, USA 0 285 A Neuro-Fuzzy Inference Model for Breast Cancer Recognition Bekaddour Fatima and Chikh Mohammed Amine,Abou Bekr Belkaid University , Tlemcen, Algeria 15 286 Building a Legal Expert System for Legal Reasoning in Specific Domain-A Survey Venkateswarlu Naik.M and Sushant Lokhanday, Keshava Memorial Institute of Technology, India 4 287 A Rough - Neuro Model for Classifying Opponent Behavior in Real Time Strategy Games M. Z. Rashad, Mansoura University, Egypt 5 288 Efficient Scheduling ff Real-Time Parallel Applications on Clusters Abeer Hamdy1 , Reda Ammar2 and Ahmed E. Youssef3 , 1 British University in Egypt, 2 University of Connecticut, USA and 3 Helwan University, Egypt 0 289 ASP-SSN: An Effective Approach for Linking Semantic Social Networks Sanaa Kaddoura1 and Islam Elkabani2 , 1 Beirut Arab University, Lebanon and 2 Alexandria University, Egypt 0 290 Design of an Efficient MAC Protocol for Opportunistic Cognitive Radio Networks Mahfuzulhoq Chowdhury1 , Asaduzzaman1 , Md. Fazlul Kader1,2 and Mohammad Obaidur Rahman1 , 1 Chittagong University of Engineering & Technology, Bangladesh, 2 University of Chittagong, Bangladesh 3 291 Fast Hue-Preserving Histogram Equalization Methods For Color Image Contrast Enhancement David Menotti1,2,4 , Laurent Najman2 , Jacques Facon3 and Arnaldo de A. Albuquerque4 , 1 Federal University of Ouro Preto, Brazil, 2 Universite Paris-Est, France, 3 Pontificia Universidade Catolica do Parana, Brazil and 4 Universidade Federal de Minas Gerais, Brazil 6
  • 28. 292 Efficient Monitoring in Online Tests Using Esdv Method Sri Anusha.N, Sai Soujanya.T and Vasavi.S, Jawaharlal Nehru Technological University, India 0 293 Accessibility of Information Technologies in the Resting Home Ozlem Cakır, Ankara University, Turkey 0 294 An Information System to Support and Monitor Clinical Trial Process 0 295 Rotation Invariant Color Retrieval Swapna Borde1 and Udhav Bhosle2 , 1 Vidyavardhini's College of Engineering and Technology,India and 2 Rajiv Gandhi Institute of Technology,India 1 296 Design of Physical Games for Learning the Lotus Effect Wernhuar Tarng1 , Shih-Hsien Tsai1 , Chih Ming Lin1 , Chi-Young Lee2 and Hsin- Hun Liou3 , 1 National Hsinchu University of Education, Taiwan, 2 National Tsing Hua University, Taiwan and 3 National Central University, Taiwan 1 297 A Novel and Single Chip Tri-Band Low-Noise Amplifier for Wlan, Wifi and Wimax Receivers I. Akhchaf, S. Khoulji, M. Essaidi and M.L. Kerkeb, Abdelmalek Essaadi University Morocco 1 298 An Efficient Passage Ranking Technique For a QA System Pooja A1 , Vinodh Krishnan2 and Geetha Manjunath3 , 1 Amazon Development Centre India, 2 Oracle India Private Ltd, India and 3 HP Labs, India 1 299 Multi-Homing Enabled Cognitive Radio Based Inter-Vehicle Communication System Faisal Riaz1 , Kaleem Ahmed1 , Iftikhar Ahmad1 , Muhammad Ibrahim1 , Samreen Ayaz1 , Rabia Rauf1 , Muhammad Kabeer1 , Naheed Akhtar1 , Jameel Ahmed2 and Sadat Dar2 , 1 Mirpur University of Science and Technology, Pakistan and 2 HITEC University Taxila Cantt, Pakistan 0 300 Ear Recognition and Occlusion B. S. El-Desouky1 , M. El-Kady2 , M. Z. Rashad1 ,and Mahmoud M. Eid1 , 1 Mansoura University, Egypt and 2 Helwan University, Egypt 0 301 Computing Installation Parameters Of CCTV Cameras for Traffic Surveillance Pratishtha Gupta and G. N. Purohit, Amrita Dadhich, Banasthali Vidyapith, India 3 302 An Experimental Survey Towards Engaging Trustable Hypervisor Log Evidence Within a Cloud Forensic Environment Sean Thorpe, University of Technology, Kingston, Jamaica 4 303 Adaptive Backstepping Controller and Synchronizer Design for Arneodo Chaotic System With Unknown Parameters Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University,India 13 304 R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2) Dhananjoy Dey1 , Noopur Shrotriya1 and Indranath Sengupta2 , 1 SAG,India and 2 Jadavpur University,India 2 305 Denoising of Medical Ultrasound Images Using Spatial Filtering and Multiscale Transforms V N Prudhvi Raj1 and T Venkateswarlu2 , 1 VR Siddhartha Engineering College,India and 2 SV University,India 3
  • 29. 306 Shaping of Location Conscious Information Palson Kennedy .R1 and Rajashekhara2 , 1 CMJ University,Chennai,India and 2 Impact College of Engineering and Applied Sciences,India 1 307 Improved Spatial Gray Level Dependence Matrices for Texture Analysis Olfa Ben Sassi, Lamia sellami, Mohamed Ben Slima, Khalil Chtourou, Ahmed Ben Hamida, University of Sfax, Tunisia 10 2013 308 A Systematic Mapping Study on Business Process Variability George Valenca1 , Carina Alves1 , Vander Alves2 , Nan Niu3 ,1 Federal University of Pernambuco (UFPE), Brazil,2 University of Brasilia,Brazil and 3 Mississippi State University, USA. 27 309 A Neuro-Fuzzy Approach for the Fault Location Estimation of Unsynchronized Two-Terminal Transmission Lines Ramadoni Syahputra,Universitas Muhammadiyah Yogyakarta,Indonesia 45 310 Sobel Edge Detection Method to Identify and Quantify the Risk Factors for Diabetic Foot Ulcers Kunjam Nageswara Rao1 , P srinivasa Rao1 , Allam Appa Rao2 , G R Sridhar3 ,1 Andhra university, India, 2 University of Hydeabad, India and 3 Endocrine & Diabetes centre,India. 2 311 Improving the Management of Cost and Scope in Software Projects Using Agile Practices Mariana de Azevedo Santos1 , Paulo Henrique de Souza Bermejo2 , Marcelo Silva de Oliveira2 , Adriano Olimpio Tonelli2 , Enio Junior Seidel3 ,1 Mitah Technologies, Lavras, Brazil2 Universidade Federal de Lavras (UFLA), Brazil and 3 Universidade Federal do Pampa (UNIPAMPA),Brazil. 7 312 An Evaluation Method of Research on Wearable Wireless Body Area Network in Healthcare Roberto Vito Rodrigues Filho1 , Renato Freitas Bulcao Neto1 , Bruno Oliveira Silvestre1 , Leandro Luis Galdino de Oliveira1 , Rogerio Orlow de Oliveira2 and Iwens Gervasio Sene Junior1 ,1 Universidade Federal de Goias, Brazil and 2 Pontificia Universidade Catolica de Goias,Brazil. 5 313 Pre-Segmentation for the Computer Aided Diagnosis System Myat Mon Kyaw,University of Technology (Yatanarpon Cybercity), Myanmar 3 314 Extended Nymble: Method for Tracking Misbehaving Users Anonymosly While Blocking M.Durga Prasad1 , P.Chenna Reddy2 , Banoth Samya1 ,1 Vijay Institute of Tech & Sciences, India, 2 JNTUCE, Pulivendula, India and 13 Vijay college of Engineering for women,India 0 315 Correlation Based VMS Placement Resource Provision Zar Lwin Phyo and Thandar Thein,University of Computer Studies,Myanmar. 0 316 Classification Methods of Skin Burn Images Malini Suvarna1 , Sivakumar2 and U C Niranjan3 ,1 Atria Institute of Technology, India, 2 Dr. Ambedkar Institute of Technology, India3 Director of Research, Manipal Dot, India 2 317 Concept-Based Indexing in Text Information Retrieval Fatiha Boubekeur1 and Wassila Azzoug2 ,1 Mouloud Mammeri University of Tizi- Ouzou, Algeria, 2 M'Hamed Bouguera, University of Boumerdes,Algeria 11
  • 30. 318 Performance Analysis of Kernel-Based Virtual Machine Sudha M, Harish G M, Nandan A, Usha J, R V College of Engineering,India. 1 319 Analysis of Digital Images Using Morphlogical Operations Amalorpavam.G1 , Harish Naik T2 , Jyoti Kumari3 , Suresha M4 ,1 Sambhram Academy Of Mgmt. Studies,India, 2 Presidency College,India, 3 Acharya Institutes (Aigs),India and 4 Jnana Sahyadri,Kuvempu University,India 7 320 An Ontology based Text Mining framework for R&D Project Selection N.Arunachalam, E.Sathya, S.Hismath Begum and M.Uma Makeswari, Sri Manakula Vinayagar Engineering College, India 3 321 Mining Closed Regular Patterns in Data Streams M.Sreedevi1 and L.S.S.Reddy2 ,1 K L University, India and 2 LBR College of Engineering, India 2 322 Teaching Automated Test Data Generation Tools for C, C++ , and Java Programs Hitesh Tahbildar and Plabita Borbora, G. P. Khataniar, Assam Engineering Institute, India 0 323 Adaptive Design of Controller and Synchronizer for Lu-Xiao Chaotic System with Unknown Parameters Sundarapandian Vaidyanathan,Vel Tech Dr. RR & Dr. SR Technical University,India. 10 324 Hybrid Optical and Electrical Network Flows Scheduling in Cloud Data Centres Ibrahim Kabiru Musa and Stuart Walker, University of Essex, UK 0 325 An Investigation of the Energy Consumption by Information Technology Equipments Baharak Makki1 and Bahador Makki2 , 1 University of Agder, Norway and 2 University of Bremen, Germany 0 326 Structural Coupling in Web 2.0 Applications Maya Samaha Rupert, Notre Dame University Louaize, Lebanon 0 327 APPBACS: An Application Behavior Analysis And Classification System Himanshu Pareek, P R L Eswari and Sarat Chandra Babu, Center for Development of Advanced Computing, India 0 328 An Effective Method for Information Security Awareness Raising Initiatives AliMaqousi1 , TatianaBalikhina1 , Michael Mackay2 , 1 Petra University, Jordan and 2 Liverpool John Moores University, UK 5 329 Adaboost Ensemble with Simple Genetic Algorithm for Student Prediction Model AhmedSharaf ElDen1 , Malaka A. Moustafa2 , Hany M. Harb3 and AbdelH.Emara3 , 1 Helwan University, Egypt, 2 Al-Alson Higher Institute of Tourism, Egypt and 3 Azhar University, Egypt 11 330 Pixel Size Reduction Loss-Less Image Compression Algorithm >Pralhadrao V Shantagiri and Saravanan K N, Christ University, India 7 331 Social Media News: Motivation, Purpose and Usage Samaneh Beheshti-Kashi and Baharak Makki, University of Agder, Norway 6 332 A Heuristic Approach for Web-Service Discovery and Selection Achraf Karray1 , Rym Teyeb2 and Maher Ben Jemaa3 , 1 Najran University, KSA, 2 Higher Institute of the Technological Studies of Tataouine, Tunisia and 3 National School of Engineers of Sfax, Tunisia 7
  • 31. 333 Developing Mobile Agent for Intrusion Detection Bambang Sugiantoro1 , Retantyo Wardoyo2 , Sri Hartati2 , Jazi Eko Istiyanto2 , 1 State Islamic University Sunan Kalijaga, Indonesia and 2 Gadjah Mada University, Indonesia 0 334 Requirements Engineering of a Web Portal Using Organizational Semiotics Artifacts and Participatory Practices Flavia Linhalis Arantes, State University of Campinas (UNICAMP), Brazil 2 335 Shadow Detection Using Tricolor Attenuation Model Enhanced with Adaptive Histogram Equalization Jyothisree V. and Smitha Dharan, College of Engineering Chengannur, India 4 336 Performance Analysis of Parallel Pollard's Rho Factoring Algorithm Anjan K Koundinya, Harish G,Srinath N K, Raghavendra G E, Pramod Y V, Sandeep R and Punith Kumar G, R V College of Engineering, India 1 337 Fuzzy Rule Base System for Software Classification Adnan Shaout and Juan C. Garcia, The University of Michigan - Dearborn, United States 0 338 Context-Based Barrier Notification Service Toward Outdoor Support for the Elderly Keisuke Umezu1 , Takahiro Kawamura2 and Akihiko Ohsuga2 , 1 NEC Corporation, Japan and 2 University of Electro-Communications, Japan 5 339 Hyper-Mspace; Multidimensional Evolutionary-Agents Modeling and Analysis Mohamed Dbouk1 , Ihab Sbeity1 , Hamid Mcheick2 and Haytham Douaihy3 , 1 Lebanese University, Beirut-Lebanon, 2 Universite du Quebec a Chicoutimi, Canada and 3 Lebanese University-DSST, Beirut-Lebanon 2 340 A Novel Hybrid Method for the Segmentation of the Coronary Artery Tree in 2d Angiograms >Daniel S.D. Lara1 , Alexandre W.C. Faria2 , Arnaldo de A. Araujo1 and D. Menotti3 , 1 Univ. Fed. de Minas Gerais, Brazil, 2 UFMG, Brazil and 3 Universidade Federal de Ouro Preto, Brazil 3 341 Modified Heuristic Time Deviation Technique for Job Sequencing and Computation of Minimum Total Elapsed Time N.Nagamalleswara Rao1 , O. Naga Raju2 and I. Ramesh Babu2 , 1 R.V.R & J. C. College of Engineering, India and 2 Nagarjuna University, India 1 342 Security Threats on Cloud Computing Vulnerabilities Te-Shun Chou, East Carolina University, U.S.A 58 343 Handover Management Scheme in LTE Femtocell Networks Tijane Fatima Zohra Badri1,2 , Saadane Rachid1 , Mohammed Wahbi1 and MbarkiSamir2 , 1 SIR2C2S/LASI-EHTP Casablanca, Morocco and 2 Ibn Tofail University Kenitra, Morocco 8 344 Saasquality - A Method for Quality Evaluation of Software as a Service (Saas) Nemesio Freitas Duarte Filho1 , Clarindo Isaias Pereira da Silva e Padua1 , Paulo Henrique de Souza Bermejo2 , Andre Luiz Zambalde2 , Urlan Salgado de Barros3 , 1 Federal University of Minas Gerais, Brazil, 2 Federal University of Lavras, Brazil and 3 Federal University of Parana, Brazil 2
  • 32. 345 An Efficient Approach to Wavelet Image Denoising Alaa A. Hefnawy and Heba A. Elnemr, Electronics Research Institute, Egypt 0 346 Towards A Good ABS Design for More Reliable Vehicles on the Roads Afifa Ghenai, Mohamed Youcef Badaoui and Mohamed Benmohammed, University of Constantine, Algeria 2 347 Designing of an efficient algorithm for identifying Abbreviation definitions in biomedical Text Shashank Singh1 , Gaurav Sharma2 Abdul Nazeer K A3 and Shalini Singh2 , 1 IBM India Private limited, India, 2 School of Biochemical Engineering IIT (BHU), India and 3 NIT, India 0 348 Labeled Generalized Stochastic Petri Net Based Approach for Web Services Composition Sofiane Chemaa, Mouna Bouarioua and Allaoua chaoui, University of Constantine, Algeria 0 349 Bounded Ant Colony Algorithm Fortask Allocation on Anetwork of Homogeneous Processorsusing a Primary Site (Bts-Aco) Buthayna Al-Sharaa and Tamara Al-Qublan, AL Balqa Applied University, Jordan 3 350 Biomedical Image Transmission Based on Modified Feistal Algorithm Jinu Elizabeth John, Saintgits College of Engineering, India 2 351 Intelligent Access Control Policies for Social Network Site Saung Hnin Pwint Oo, University of Technology (Yatanarpon Cyber City), Myanmar 2 352 A Review of Temporal Aspects of Hand Gesture Analysis Applied to Discourse Analysis and Natural Conversation Renata C. B. Madeo, Priscilla K. Wagner and Sarajane M. Peres, Universidade de Sao Paulo, Brazil 9 353 A Tabu Search Algorithm With Efficient Diversification Strategy for High School Timetabling Problem Salman Hooshmand1 , Mehdi Behshameh2 and OmidHamidi1 , 1 Hamedan University of Technology, Iran and 2 Islamic Azad University, Iran 0 354 Analysis of Elementary Cellular Automata Boundary Conditions K. Salman, Middle Tennessee State University, USA 5 355 Design and Implementation of Repair-aware Test Flow for Multi-Memory Gang Wang and Huajun Chen, Loongson Technology Corporation Limited, China 0 356 Vedivision – A Fast Bcd Division Algorithm Facilitated by Vedic Mathematics Diganta Sengupta1 Mahamuda Sultana2 and Atal Chaudhuri3 , 1 Future Institute of Engineering and Management, India, 2 Swami Vivekananda Institute of Science and Technology, India and 3 Jadavpur University, India 1 357 Integrations of ICT in Education Sector for the Advancement of the Developing Country: Some Challenges and Recommendations-Bangladesh Perspective Mst. Shahnaj Parvin, International Islamic University, Bangladesh 7 358 Comparative Study of Backpropagation Algorithms in Neural Network Based Identification of Power System Sheela Tiwari1 , Ram Naresh2 and Rameshwar Jha3 , 1 Dr. B R Ambedkar National Institute of Technology, India, 2 National Institute of Technology, India and 3 IET Bhaddal Technical Campus, India 9
  • 33. 359 Matching Structure and the Evolution of Cooperation in the Prisoner’s Dilemma Noureddine Bouhmala and Jon Reiersen, Vestfold University College, Norway 0 360 Survey of the Euro Currency Fluctuation by Using Data Mining M. Baan, E. Saadati and M. Nasiri, Iran University of Science and Technology, Iran 0 361 GPS Tracking System Coupled With Image Processing in Traffic Signals to Enhance Life Security Manoj Prabhakar K and Manoj Kumar S, Anna University, India 2 362 Following Car Algorithm With Multi Agent Randomized System Mounir Gouiouez, Noureddine Rais and Mostafa Azzouzi Idrissi, University Sidi Mohammed Ben Abdellah, Morocco 1 363 Periocular Recognition Using Reduced Features Ambika D R, Radhika K R and D Sehsachalam, BMS College of Engineering, India 2 364 Design and Development of Secure Navigation System for Visually Impaired People Prashant Bhardwaj and Jaspal Singh, Centre for Development of Advanced Computing, Mohali 5 365 A Novel Perceptual Image Encryption Scheme Using Geometric Objects Based Kernel Prabhudev Jagadeesh1 , P. Nagabhushan1 and R. Pradeep Kumar2 , 1 University of Mysore, India and 2 Amphisoft Technologies Private Limited, India 1 366 Performance Analysis of Round Trip Time in Narrowband RF Networks For Remote Wireless Communications< El miloud Ar reyouchi1 , Kamal Ghoumid2 , Koutaiba Ameziane1 and Otman El Mrabet1 , 1 Abdelmalek Essaadi University, Morroco and 2 Informatics and Telecommunications, ENSAO, Morocco 2 367 Automatic Detection of Microaneurysms and Hemorrhages in Color Eye Fundus Images Sérgio Bortolin Júnior and Daniel Welfer, Universidade Federal do Pampa, Brazil 31 368 Project Monitoring and Control Measures In CMMI Mahmoud Khraiwesh, Zarqa University, Jordan 0 369 A Preliminary Survey on Optimized Multiobjective Metaheuristic Methods for Data Clustering Using Evolutionary Ramachandra Rao Kurada1 , K Karteeka Pavan2 and AV Dattareya Rao1 , 1 Acharya Nagarjuna University, India and 2 RVR & JC College of Engineering, India 12 370 Diagnosis of Some Diseases in Medicine via computerized Experts System R.A. Soltan, M. Z. Rashad and B.El-Desouky, Mansoura University, Egypt 4 371 Improving the Effectiveness of Information Retrieval System Using Adaptive Genetic Algorithm Wafa Maitah1 , Mamoun Al-Rababaa1 and Ghasan Kannan2 , 1 Al al-Bayt University, Jordan and 2 Amman Arab University, Jordan 10 372 The Comparison of the Text Classification Methods to be Used for the Analysis of Motion Data in DLP Architect Murat Topaloglu, Trakya University, Turkey 0
  • 34. 373 A Privacy - Learning Objects Identity System for Smartphones Based on a Virtual Learning Environment Database LeThanhHieu, JinHai, DeQingZou and WangDaiBin, HuaZhong University of Science and Technology, China 0 374 Systems Variability Modeling: A Textual Model Mixing Class and Feature Concepts Ola Younis1 , Said Ghoul1 , and Mohammad H. Alomari2 , 1 Philadelphia University, Jordan and 2 Applied Science University, Jordan 3 375 Compact, “Fuzzy― Information S.Balaji Vivek, Easwari Engineering College, India 0 376 The Principles of Humanism for MANETs Md. Amir Khusru Akhtar1 and G. Sahoo2 , 1 Cambridge Institute of Technology, India and 2 Birla Institute of Technology, India 0 377 The Application Wavelet Transform Algorithm in Testing ADC Effective Number of Bits Emad A. Awada, Applied Science University, Jordan 0 378 Introducing a Novel Fault Tolerant Routing Protocol in Wireless Sensor Networks Using Fuzzy Logic Mostafa Vakili Fard1 , Sayyed Majid Mazinani2 and Sayyed Ahmad Hoseini3 , 1 Science and Research IAU, Iran, 2 Imam Reza University, Iran and 3 Payam Noor University, Iran 2 379 Data Mining Model for the Data Retrieval from Central Server Configuration Srivatsan Sridharan, Kausal Malladi and Yamini Muralitharan, International Institute of Information Technology - Bangalore, India 0 380 The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and Security Salwa Al-Samirrai, Zahra Fadhil Mohsen and Aysh Alhroob, Isra University, Jordan 0 381 Molecular Solutions for the Set-Partition Problem on Dna-Based Computing Sientang Tsai and Wei-Yeh Chen, Southern Taiwan University of Science and Technology, Taiwan 1 382 Brazilian License Plate Detection Using Histogram of Oriented Gradients and Sliding Windows R. F. Prates1 , G. Cámara-Chávez1 , William R. Schwartz2 and D. Menotti1 , 1 University Federal of Ouro Preto, Brazil and 2 University Federal of Minas Gerais, Brazil 5 383 Distributed Cloud Computing Environment Enhanced With Capabilities for Wide-Area Migration and Replication of Virtual Machines Young-Chul Shim, Hongik University, Korea 0 384 Study On Decision-Making for Cafe Management Alternatives Cheng-I Hou, Chung Hua University, Taiwan 2 385 Multi-Topic Multi-Document Summarizer Fatma El-Ghannam1 and Tarek El-Shishtawy2 , 1 Electronics Research Institute, Egypt and 2 Benha University, Egypt 15 386 An Sna-Bi Based System for Evaluating Virtual Teams: A Software Development Project Case Lamia Ben Hiba and Mohammed Abdou Janati Idrissi, Mohammed V Souissi University, Morocco 0 387 Gesture Recognition Based Mouse Events Rachit Puri, Samsung Research India, India 5
  • 35. 388 A Prediction Model for Taiwan Tourism Industry Stock Index Taiwan Han-Chen Huang and Fang-Wei Chang, Yu Da University of Science and Technology, 0 2014 389 Cardinal Direction Relations in Qualitative Spatial Reasoning Chaman L. Sabharwal and Jennifer L. Leopold, Missouri University of Science and Technology, USA 3 390 Information Security Approach in Open Distributed Multi-Agent Virtual Learning Environment Zahi A.M. Abu Sarhan1 and As'ad Mahmoud As'ad Alnaser2 , 1 Applied Science Private University, Jordan and 2 Al-Balqa' Applied University, Jordan 0 391 Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method Ming-Chang Lee, National Kaohsiung University of Applied Science, Taiwan 23 392 Evaluation of Image Segmentation and Filtering With Ann in the Papaya Leaf Maicon A. Sartin11 and Alexandre C. R. da Silva2 , 1 UNEMAT, Brazil and 2 Ilha Solteira, Brazil 2 393 Clustering Effects on Wireless Mobile Ad-Hoc Networks Performances Gideon Naah and Edwin Boadu Okoampa, University of Electronic Science and Technology of China, China 1 394 What Facilitates the Delivery of Citizen-Centric EGovernment Services in Developing Countries: Model Development and Validation Through Structural Equation Modeling Yousef Elsheikh and Mohammad Azzeh, Applied Science University, Jordan 7 395 A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials Hung-Teng Chang, Yu Da University of Science and Technology, Taiwan 1 396 Shape-Based Plagiarism Detection for Flowchart Figures in Texts Senosy Arrish, Fadhil Noer Afif, Ahmadu Maidorawa and Naomie Salim, Universiti Teknologi Malaysia, Malaysia 8 397 A Study on the Dynamic Effect of Sports Promotion Strategy and Effectiveness of NationalHealth Care in Taiwan Tian-Syung Lan and Pin-Chang Chen, Yu Da University of Science and Technology, Taiwan 0 398 Fulfillment Request Management (The approach) Stylianos Gkoutzioupas, Univercity of the Aegean, Greece 0 399 Processing Obtained Email Data By Using Naïve Bayes Learning Algorithm Valery V. Pelenko and Aleksandr V. Baranenko, St. Petersburg Research University of Information Technologies, Russia 1 400 A Linear Algorithm for the Grundy Number of A Tree Ali Mansouri and Mohamed Salim Bouhlel, Department of Electronic Technologies of Information and Telecommunications Sfax, Tunisia 0 401 Research on Dynamic Effects of Employability of Vocational College Students in Taiwan Pin-Chang Chen, Yu Da University of Science and Technology, Taiwan 1
  • 36. 402 Performance Variations in Profiling Mysql Server on the Xen Platform: Is It Xen or Mysql? Ashish Tapdiya and Yuan Xue, Vanderbilt University, United States 0 403 Design of a Virtual Ecological Pond for Motion-Sensing Game-Based Learning Wernhuar Tarng1 , Nien-Yin Lu1 , Yi-Syuan Shih1 and Hsin-Hun Liou2 , 1 National Hsinchu University of Education, Taiwan and 2 National Central University, Taiwan 1 404 Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh, Applied Science University, Jordan 1 405 An Adaptive Framework for Enhancing Recommendation Using Hybrid Techniques Radhya Sahal, SaharSelim and Abeer ElKorany, Cairo University, Egypt 1 406 Estimation of Optimized Energy and Latency Constraint for Task Allocation in 3d Network on Chip Vaibhav Jha1 , Mohit Jha2 and G K Sharma1 , 1 ABV- Indian Institute of Information Technology and Management, India and 2 Jabalpur Engineering College, India 1 407 Case-Based Reasoning for Explaining Probabilistic Machine Learning Tomas Olsson1,2 , Daniel Gillblad2 , Peter Funk1 , and Ning Xiong1 , 1 Mälardalens University, Sweden and 2 SICS Swedish ICT, Sweden 4 408 Business Bankruptcy Prediction Based on Survival Analysis Approach Ming-Chang Lee, National Kaohsiung University of Applied Science, Taiwan 3 409 Recognition and Ranking Critical Success Factors of Business Intelligence in Hospitals - Case Study: Hasheminejad Hospital Marjan Naderinejad, Mohammad Jafar Tarokh and Alireza Poorebrahimi, Islamic Azad University, Iran 3 410 Design and Implementation of a Personal Super Computer Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi Arabia 0 411 Output Privacy Protection With Pattern-Based Heuristic Algorithm P.Cynthia Selvi1 and A.R.Mohammed Shanavas2 , 1 KNGA College(W), India and 2 Jamal Mohamed College, India 3 412 Change Management and Version Control of Scientific Applications Bojana Koteska and Anastas Mishev, Ss. Cyril and Methodius University, Macedonia 1 413 Advanced Authentication Scheme Using a Predefined Keystroke Structure Abdulameer K. Hussain and Mohammad M. Alnabhan, Jerash University, Jordan 1 414 The Impact of Knowledge-Based Trust (Kbt) on The Adoption and Acceptability of Cashless Economy in Nigeria Galadima, Talatu O.1 , Akinyemi, Ibidapo O.2 , and Asani, Emmanuel O.3 , 1 Federal Polytechnic, Nigeria, 2 Covenant University, Nigeria and 3 Landmark University, Nigeria 1
  • 37. 415 Sharing of Cluster Resources among Multiple Workflow Applications Uma Boregowda1 and Venugopal Chakravarthy2 , 1 Malnad College of Engineering, India and 2 Sri Jayachamarajendra College of Engineering, India 0 416 Review of Closed Circuit Television (CCTV) Techniques for Vehicles Traffic Management Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi Arabia 8 417 State of The Art of Learning Styles-Based Adaptive Educational Hypermedia Systems (Ls-Baehss) Ahmed Al-Azawei and Atta Badii, School of Systems Engineering, UK 17 418 Massive Parallelism With Gpus for Centrality Ranking in Complex Networks Frederico L. Cabral, Carla Osthoff, Rafael Nardes and Daniel Ramos, Laboratório Nacional de Computação CientÃfica, Brazil 1 419 Performance Analysis of Wind Turbine as a Distributed Generation Unit In Distribution System Ramadoni Syahputra1,2 , Imam Robandi1 and Mochamad Ashari1 , 1 Institut Teknologi Sepuluh Nopember, Indonesia and 2 Universitas Muhammadiyah Yogyakarta, Indonesia 60 420 Cloud Computing Security through Symmetric Cipher Model Subramanian Anbazhagan1 and K.Somasundaram2 , 1 Karpagam University, India and 2 Jaya Engineering College, India 4 421 Enhancing the Matrix Transpose Operation Using Intel Avx Instruction Set Extension Ahmed Sherif Zekri1,2 , 1 Alexandria University, Egypt and 2 Beirut Arab University, Lebanon 1 422 Review of Monitoring Tools for E-Learning Platforms Ali Alowayr and Atta Badii, Reading University, UK 4 423 Intelligent Fatigue Detection and Automatic Vehicle Control System Monali Gulhane and P.S.Mohod, RTMN University, India 0 424 Short Term Load Forecasting System Based on Support Vector Kernel Methods Lal Hussain, M. Sajjad Nadeem and Syed Ahsen Ali Shah, University of Azad Jammu and Kashmir, Pakistan 0 425 Employee Performance Appraisal System Using Fuzzy Logic Adnan Shaout1 and Mohamed Khalid Yousif2 , 1 The University of Michigan, USA and 2 Sudan University of Science and Technology, Sudan 7 426 Research on the Effect of Applying Multimedia to the Instruction of Rational Emotion Behavior Therapy for Middle School Students Emotional Control Chen-Feng Wu, Pin-Chang Chen and Yu-Tzu Chen, Yu Da University of Science and Technology, Taiwan 1 427 Software Architectural Patterns for Service Composition Ghadeer Ghazal1 , Amjad. Hudaib1 and Waffa Maitah2 , 1 The University of Jordan, Jordan and 2 Al al-Bayt University, Jordan 0 428 One-Dimensional Vector Based Pattern Matching Y.M.Fouda, Mansoura University, Egypt 2
  • 38. 429 Dependable Online Appointment Booking System for Nhis Outpatient in Nigerian Teaching Hospitals Adebayo Peter Idowu1 , Olajide Olusegun Adeosun2 and Kehinde Oladipo Williams3 , 1 Obafemi Awolowo University, Nigeria, 2 Ladoke Akintola University of Technology, Nigeria and 3 McPherson University, Nigeria 4 430 Co-Emulation of Scan-Chain Based Designs Utilizing SCE-MI Infrastructure Bill Jason Tomas1 , Yingtao Jiang2 and Mei Yang2 , 1 Cadence Design System, USA and 2 University of Nevada, USA 0 431 An Improved Particle Filter Tracking System Based on Colour and Moving Edge Information Chao-Ju Chen1 , Wernhuar Tarng1 and Kuo-Hua Lo2 , 1 National Hsinchu University of Education, Taiwan and 2 Industrial Technology Research Institute, Taiwan 1 432 Real Time Optimized Traffic Management Algorithm Partha Sarathi Chakraborty, Prajeeth Nair, Pranshu Raj Sinha and Ishan Kumar Behera, SRM University, India 3 433 A Generic Model for Disease Outbreak Notification Systems Farag Azzedin, Jaweed Yazdani, Salahadin Adam and Mustafa Ghaleb, King Fahd University of Petroleum and Minerals, Saudi Arabia 1 434 Square Grid Points Coveraged by Connected Sources With Coverage Radius of One on a Two-Dimensional Grid Pattama Longani, Chiang Mai University, Thailand 0 435 Structural and Hardware Complexities of Microprocessor Design According to Moore’s Law Haissam El-Aawar, Lebanese International University – LIU, Lebanon 4 436 Remote Real - Time Process and Production Monitoring Mechanism of Lighting Parts for Outdoor Recreation Cheng-I Hou1 , Han-Chen Huang2 , Tian-Syung Lan1 and Wei-Min Teng1 , 1 Yu Da University of Science and Technology, Taiwan and 2 Chung Hua University, Taiwan 0 437 Language Independent Document Retrieval Using Unicode Standard Vidhya M and Aji S, University of Kerala, India 0 438 A Study of The Effects of Electronic Textbook-Aided Remedial Teaching on Students’ Learning Outcomes at the Optics Unit Chen-Feng Wu, Pin-Chang Chen and Shu-Fen Tzeng, Yu Da University of Science and Technology, Taiwan 2 439 A Guide to Deal With Uncertainties in Software Project Management Marcelo Marinho1,2 , Suzana Sampaio2 , Telma Lima2 and Hermano de Moura1 , 1 Federal University of Pernambuco (UFPE), Brazil and 2 Federal Rural University of Pernambuco (UFRPE), Brazil 6 440 Intelligent Algorithms for Cell Tracking and Image Segmentation Ashraf A. Aly1 , Safaai Bin Deris2 and Nazar Zaki3 , 1 Al khawarizmi College, UAE, 2 Universiti Teknologi Malaysia, Malaysia and 3 UAE University, UAE 2 441 Variability Modeling for Customizable Saas Applications Ashraf A. Shahin, Institute of Statistical Studies & Research, Cairo University, Egypt 3 442 Systematic Review on Project Actuality Suzana Cândido de Barros Sampaio1,2 , Marcelo Marinho1,2 , Hermano Moura1 , 1 Federal University of Pernambuco (UFPE), Brazil and 2 Federal Rural University of Pernambuco (UFRPE), Brazil 3
  • 39. 443 Efficiency Lossless Data Techniques for Arabic Text Compression Enas Abu Jrai, Al-Balqa Applied University, Jordan 1 444 Managing Collaboration Within Networks and Relationships in the Serious Game of Agribusiness Management Using Sandpile Model SaifulBukhori, Jember University, Indonesia 0 445 FLBRA: Fuzzy Logic Based Routing Algorithm for Indoor Wireless Sensor Networks Lucas Leão, David Bianchini and Omar Branquinho, Pontifical Catholic University of Campinas, Brazil 2 446 A Robust Blind and Secure Watermarking Scheme Using Positive Semi Definite Matrices Noui Oussama and Noui Lemnouar, UHL University, Algeria 2 447 Educational Data Mining Using JMP Sadiq Hussain and G.C.Hazarika, Dibrugarh University, India 0 448 State of the Art of Agile Governance: A Systematic Review Alexandre J.H.de O.Luna1,2 , Philippe Kruchten2 , Marcello L.G. do E.Pedrosa1 , Humberto R.de Almeida Neto1 and Hermano P.de Moura1 , 1 Federal University of Pernambuco (UFPE), Brazil and 2 The University of British Columbia, Canada 13 449 Performance and Power Comparisons between NVIDIA and ATI GPUS Ying Zhang1 , Lu Peng1 , Bin Li1 , Jih-Kwon Peir2 and Jianmin Chen2 , 1 Louisiana State University, USA and 2 University of Florida, USA 0 450 ITCM: A Real Time Internet Traffic Classifier Monitor Silas Santiago Lopes Pereira1 , Jose Everardo Bessa Maia2 and Jorge Luiz de Castro e Silva2 ,1 Federal Institute of Ceará, Brazil and 2 State University of Ceara, Brazil 3 451 A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced Encryption Standard Ghada F.Elkabbany, Heba K.Aslan and Mohamed N.Rasslan, Electronics Research Institute, Egypt 1 452 Analysis of Lithography Based Approaches in Development of Semiconductors Jatin Chopra, BITS Pilani Dubai, United Arab Emirates 3 453 Requirement Analysis, Architectural Design and Formal Verification of a Multi-Agent Based University Information Management System Nadeem Akhtar1 , Aisha Shafique Ghori1 and Nadeem Salamat2 , 1 The Islamia University of Bahawalpur, Pakistan and 2 Karakoram International University, Pakistan 0 454 Arabic Text Categorization Algorithm Using Vector Evaluation Method Ashraf Odeh1 , Aymen Abu-Errub2 , Qusai Shambour3 and Nidal Turab1 , 1 Isra University, Jordan,2 University of Jordan, Jordan and 3 Al-Ahliyya Amman University, Jordan 8 455 A Comparative Study of Clustering and Biclustering of Microarray Data Haifa Ben Saber1,2 and Mourad Elloumi1,3 , 1 Tunis University, Tunisia, 2 Time Université - Tunis University, Tunisia and 3 University of Tunis-El Manar, Tunisia 2
  • 40. 456 Implementation of a Stream Cipher Based on Bernoulli's Map Ricardo Francisco Martinez-Gonzalez1 and Jose Alejandro Diaz- Mendez2 , 1 Veracruz Institute of Technology, Mexico and 2 National Institute of Astophysics Optics and Electronics, Mexico 1 457 Generating 3D Model in Virtual Reality and Analyzing Its Performance Filip Popovski, Igor Nedelkovski and Svetlana Mijakovska, St.Kliment Ohridski University - Bitola, Macedonia 0 458 Towards an Intelligent Tutoring System to Down Syndrome Amal F.A Mahmoud, Mohamed A.F.Belal and Yehia M.K. Helmy, Helwan University, Egypt 2 459 A Comparative Study of Dimension Reduction Methods Combined with Wavelet Transform Applied to the Classification of Mammographic Images N.Hamdi, K.Auhmani and M.M.Hassani, Universite Cadi Ayyad, Maroc 1 460 Multi-Objective Predictive Control : A Solution Using Metaheuristics Halim Merabti1,2 and Khaled Belarbi3 , 1 Welding and NDT Research Centre (CSC), Algeria,2 University of Constantine1, Algeria and 3 Campus Université de Constantine3, Alegria 0 461 Experimental Analysis of Matching Technique of Steganography for Greyscale and Colour Image Khurrum Rahim Rashid1 , Aqsa Rashid2 , Nadeem Salamat3 and Saad Missen2 , 1 NUSES FAST, Pakistan, 2 Islamia University Bahawalpur, Pakistan and 3 Karakoram International University Gilgit, Pakistan 2015 462 Iris Recognition for Personal Identification Using Lamstar Neural Network Shideh Homayon, University of California, USA 5 463 An Employing a Multistage Fuzzy Architecture for Usability of Open Source Software Roba Al-Soub, Mutah University, Jordan 0 464 Analysis of Selection Indicators of Badminton Players by the Delphi Method and Analytic Hierarchy Process Han-Chen Huang1 , Chun-Ta Lin2 and Chia-Sen Hu3 , 1 Chung Hua University, Taiwan, 2 Yu Da University of Science and Technology, Taiwan and 3 Guang Hua Junior High School, Taiwan 2 465 Cross Platform App : A Comparative Study Paulo R.M.de Andrade1 , Adriano B.Albuquerque1 , Otávio F. Frota2 , Robson V Silveira2 and Fátima A. da Silva2 , 1 University of Fortaleza - UNIFOR Fortaleza - CE, Brazil and 2 College Estacio FIC of Ceara Fortaleza - CE, Brazil 20 466 Performance Comparison of Hybrid Wavelet Transforms Formed Using Dct, Walsh, Haar and DKT in Watermarking H.B.Kekre1 , Tanuja Sarode2 and Shachi Natu1 , 1 NMIMS University, India and 2 Mumbai University, India 1 467 Improving Initial Generations in PSO Algorithm for Transportation Network Design Problem Navid Afkar and Abbas Babazadeh, University of Tehran, Iran 0 468 New Approach in Symmetric Block Cipher Security Using a New Cubical Technique Ali M Alshahrani and Stuart Walker, University of Essex, United Kingdom 1