Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
IJCSIT Citation (2009 to 2016)
1. International Journal of Computer Science and Information
Technology (IJCSIT)
ISSN : 0975 - 3826 (Online) ; 0975 - 4660 (Print)
http://airccse.org/journal/ijcsit.html
2. SCOPE OF THE JOURNAL
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is
devoted to fields of Computer Science and Information Systems. The IJCSIT is a peer-reviewed
scientific journal published in electronic form as well as print form. The mission of this journal is to
publish original contributions in its field in order to propagate knowledge amongst its readers and to
be a reference publication.
IJCSIT publishes original research papers and review papers, as well as auxiliary material such as:
research papers, case studies, technical reports etc.
Topics of Interest
Algorithms and Bioinformatics
Computer Architecture and Real time Systems
Database and Data Mining
Dependable, reliable and autonomic computing
Distributed and parallel systems & algorithms
DSP/Image Processing/Pattern Recognition/Multimedia
Embedded system and software
Game and software engineering
Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS)
Grid and scalable computing
Intelligent Information & Database Systems
IT policy and business management
Mobile and ubiquitous computing
Modeling and Simulation
Multimedia systems and services
Networking and communications
Parallel and Distributed Systems
Security and Information Assurance
Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)
Software Engineering
Web and internet computing
Contact Us
Here's where you can reach us : ijcsit@airccse.org
http://airccse.org/journal/ijcsit.html
3. Members of the Editorial Board
Editor In Chief:
Jan Zizka, SoNet/DI, FBE, Mendel University in Brno, Czech Republic
Editorial Board
A. Meiappane, Manakula Vinayagar Institute of Technology, India
A.Kannan, K.L.N. College of Engineering, India
Abdul kadir Ozcan, The American University, Cyprus
Ahmed Nada, Al-Quds University, Palestine
Ali Asghar Rahmani Hosseinabadi, Islamic Azad University, Iran
Ali Mehrpour, Islamic Azad University, Iran
Amine Achouri, University of Tunis, Tunisia
Amirouchefatiha, University of Tizi-Ouzou, Algeria
Ammar M.Odeh, University of Bridgeport, USA
Anamika Ahirwar, Maharana Pratap College of Technogy, Gwalior, India
Atif Farid Mohammad, Uniersity of North Dakota, USA
Ayman AbuBaker, Applied Science Private University Amman, Jordan
Ayme Perdomo Alonso, University of Informatics Sciences, Cuba
Benedicto B. Balilo Jr, Bicol University, Philippines
Bobby Barua, Ahsanullah University of Science and Technology, Bangladesh
Boo-Hyung Lee, KongJu National University, South Korea
Buket Barkana, University of Bridgeport,USA
Chikh Mohammed Amine, University of Tlemcen, Algeria
Chin-Chih Chang, Chung Hua University, Taiwan
Daniyal Alghazzawi,King Abdulaziz University, Kingdom of Saudi Arabia
Dedi Iskandar Inan, State University of Papua, Indonesia
Dharminder kumar, Guru Jambheshwar University of Science and Technology, India
Dhinaharan Nagamalai, Wireilla Net Solutions PTY LTD, Australia
Dongchen Li, Peking University, P.R.China
Ermatita zuhairi, Sriwijaya University, Palembang, Indonesia
http://airccse.org/journal/ijcsit.html
Filip Popovski, St.Kliment Ohridski University - Bitola, Macedonia
G.P.Hegde, SDM Institute of Technology, India
4. Editorial Board
Faudziah Ahmad, Universiti Utara Malaysia, Malaysia
Filip Popovski, St.Kliment Ohridski University - Bitola, Macedonia
G.P.Hegde, SDM Institute of Technology, India
Gaurang Panchal, Charotar University of Science and Technology, India
George Augusto Valenca Santos, Federal University of Pernambuco (UFPE), Brazil
Hao-En Chueh, Yuanpei University, Taiwan
Hazlina Haron, Universiti Utara Malaysia, Malaysia
Himavathi S, Pondicherry Engg College, India
Hwangjun Song, POSTECH, South Korea
Inderpal Singh, Punjab Technical University, India
Isa Maleki, Islamic Azad University, Iran
Jacques Demerjian, CS Communication & Systems, France
James Xue, University of Northampton, United Kingdom
Jeong-Hyun Park,Electronics & Telecommunications Research Institute,South Korea
Jeremy (Zheng) Li, University of Bridgeport, USA
J. Naren, SASTRA University, India
Jyoti Singhai, Electronics and Communication Deptt-MANIT,India
K.P.Srinivasan, C.B.M. College, India
Kanti Prasad, University of Massachusetts Lowell, USA
Kawahata Yasuko, Kyushu University, Japan
Kazuyuki Murase,University of Fukui, Japan
Keneilwe Zuva, University of Botswana, Botswana
Keshava Prasanna, Shridevi Institute of Technology, India
Khoa N. Le, Griffith School of Engineering, Queensland, Australia
Kirtikumar Patel, Chemic Engineers Inc, United States
Kwan Hee Han, Gyeongsang National University, Republic of Korea
Lian Liu, University of Kentucky, USA
M. P. Singh, National Institute of Technology Patna, India
Maicon A.Sartin, Universidade do Estado de Mato Grosso - UNEMAT, Brazil
Maragathavalli P, Pondicherry Engineering College, Puducherry, India
Marcelo Luiz Monteiro Marinho, Federal Rural University of Pernambuco, Brazil
Marina Marjanović Jakovljević, Singidunum University, Serbia
Md. Shahjahan Ali, Islamic University, Bangladesh
Mehmet Kara, TUBITAK BILGEM UEKAE, Turkey
http://airccse.org/journal/ijcsit.html
5. Editorial Board
Mehregan Mahdavi, University of Guilan, Iran
Melih Kirlidog, Marmara University, Turkey
Ming Fan, Broadcom Corporation, USA
Ming-Chang Lee, National Kaohsiung University of Applied Sciences,Taiwan
Mohamed Farag, Maharishi University of Management, USA
Mohammad Al-Khedher, Al-Balqa' Applied University, Jordan
Mohammad M M Abu Omar, Al-Quds Open University-Plaestine, Malaysia
Mohammad Sadegh Mirzaei, Postgraduate and Newer Researchers Conference, Iran
Mohammad Shamsul Arefin,Hiroshima University, Japan
Mohammad Yamin, University of Canberra,Australia
Mohammad Zaidul Karim, Daffodil Int Uni, Bangladesh
Mohammed Alhanjouri, Islamic University of Gaza, Palestine
Mohammed Ali Hussain, KL University, India
Mohammed S. Al Logmani, Saudi Aramco, Saudi Arabia
Mostafa Elhachloufi, Elhachloufi Mostafa, Morocco
Moudam Zakaria, University Sidi Mohammed Ben Abdellah Fez, Morocco
Nargis Akter, IST, Bangladesh
Natarajan Meghanathan, Jackson State University, USA
Natasa Zivic, University of Siegen,Germany
Noureddine Rais, University Sidi Mohammed Ben Abdellah Fez, Morocco
Paul Sagayda, Donbass State Engineering Academy, Ukraine
R.Baskaran, Anna University - Chennai, India
R.L.K.Venkateswarlu, Sasi Institute of Technology and Engineering, India
Rafael Timoteo de Sousa, University of Brasilia, Brazil
Rajendra Akerkar, Technomathematics Research Foundation, India
Ramadoni Syahputra,Universitas Muhammadiyah Yogyakarta, Indonesia
Ramgopalkashyap,SISTec,India
Ricardo Francisco Martinez-Gonzalez, Veracruz Institute of Technology, Mexico
Roberts Masillamani, Hindustan University, India
Ruchi Nanda, IIS University, India
S. Asghar Gholamian, Babol University of Technology, Iran
S.Hariharan, B.S.Abdur Rahman University,India
Sachin Patil, RIT Rajaramnagar, India
Sadik ULKER ,Girne American University, Cyprus
Sadiq Hussain, Dibrugarh University, India
http://airccse.org/journal/ijcsit.html
6. Paper Submission & Manuscript preparation Guide
Authors are invited to Submit papers for this journal through ijcsit@airccse.org
Submissions must be original and should not have been published previously or be under
consideration for publication while being evaluated for this Journal. For paper format
download the template in this page
Manuscript Template.
Review Process
Submissions are accepted for review with the understanding that the same work has been
neither submitted to, nor published in, another publication. Simultaneous submission to other
publications will result in immediate rejection of the paper. Papers are not within the journal
scope will be rejected immediately after the pre review process.
All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing
procedure, and are considered on the basis of their significance, novelty and usefulness to the
Journals readership. The reviewing structure will always ensure the anonymity of the referees
& it will be reviewed by 3 experts in the field. The review output will be one of the following
decisions:
1. Accept
2. Accept with minor changes
3. weak Accept with major changes
4. Reject
The review process may take approximately two ~three months to be completed. The Editor
reserves the right to reject a paper if it does not meet the aims and scope of the journal, it is
not revised well.
Publication charges: 120 USD (Maximum 20 pages)
Publication Frequency- Bi-monthly
February, April, June, August, October, December
Copy right form
After submitting final manuscript, you can get copyright form from AIRCC secretary
Special Issue Proposal
IJCSIT invite proposals for special issues on topics that fall within the scope of this journal.
Please email your proposal to secretary@airccse.org.
http://airccse.org/journal/ijcsit.html
7. 2009
1
Ensemble Design for Intrusion Detection Systems
T. Subbulakshmi1
, A.Ramamoorthi2
and S. Mercy Shalinie1
, 1
Thiagarajar College
of Engineering, India and 2
Sethu Institute of Technology, India 9
2
Design of a New Deterministic Algorithm for Finding Common DNA
Subsequence
Bigyan Bhar and Nabendu Chaki, University Calcutta, India 1
3
Automatic Evolution of Ideas Through Multilayer Evolutionary System to
Support Creative Thinking
Priti Srinivas Sajja1
, Rajendra Akerkar2
, David Camacho3
, 1
Sardar Patel University,
India, 2
Technomathematics Research Foundation, India and 3
Universidad
Autonoma de Madrid, Spain 0
4
Multi-Focus Fusion Method Based on LADWT
Shwu-Huey Yen Yi-Ray Lin, Tamkang University, Taipei, Taiwan, R.O.C. 0
5
Effect of Variation of Separation between the Ultrasonic Transmitter and
Receiver on the Accuracy of Distance Measurement
Ajay Kumar Shrivastava , Ashish Verma and S. P. Singh, Krishna Institute of
Engineering and Technology, Ghaziabad (U.P.), India 5
6
Text Independent Speaker Recognition and Speaker Independent Speech
Recognition Using Iterative Clustering Approach
A.Revathi, R.Ganapathy and Y.Venkataramani, Saranathan college of Engg.,
Trichy 29
7
Investigating the Performance of Various Vocoders for a Fair Scheduling
Algorithm in WIMAX
B. Kaarthick Member IEEE, N.Nagarajan, V. J.Yeshwenth, P.M.Sudarsan,
Network System Design Center, Sri Krishna College of Engineering &
Technology,Coimbatore, India. 0
8
A Low Indexed Content Based Neural Network Approach for Natural Objects
Recognition
G.Shyama Chandra Prasad and Dr. A.Govardhan, Dr. T.V.Rao ,Research Scholar,
JNTUH, Hyderabad, AP. India. 2
9
Identification of Telugu, Devanagari and English Scripts Using Discriminating
Features
M C Padma and P A Vijaya, PES College of Engineering, Mandya, India 19
10
Design and Implementation of 32-Bit Controller For Interfacing with
reconfigurable computing systems.
Dr.Kota solomon Raju and Ashutosh Gupta,E-105, Digital System Group,
CEERI,Pilani - 333031 13
11
Thesaurus And query Expansion
Hazra Imran and Aditi Sharan, Jamia Hamdard ,New Delhi ,India 52
12
Optimal Curve Fitting of Speech Signal for Disabled Children
Anandthirtha. B. GUDI, and H. C. Nagaraj, Sri Bhagawan Mahaveer Jain College
of Engineering, India 5
13
Analysis on Deployment Cost and Network Performance for Heterogeneous
Wireless Sensor Networks
Dilip Kumar1
, Trilok. C Aseri2
and R. B Patel3
, 1
Centre for Development of
Advanced Computing (C-DAC), India, 2
Punjab Engineering College (PEC), India
and 3
Markandeshwar University (MMU), India 16
14
A collaborative PCE-Based mechanism for E2E recovery within MPLS-
networks
EL KAMEL Ali, Youssef Habib,FSM, Monastir, Tunisia 0
8. 15
Analysis of Telecommunication Management Technologies
Khalil ur rehman Laghari, Imen Grida ben Yahia, and Noel Crespi, France. 13
2010
16
A Model for Semantic Integration of Business Components
Larbi KZAZ1
, Hicham Elasri2
and Abderrahim.Sekkaki2
, 1
Groupe ISCAE,
Morocco and 2
University Hassan II Ain-chok, Morocco 7
17
Agent Based Trust Management in Distributed E-Business Environment
E.Sathiyamoorthy1
, N.Ch.Sriman Narayana Iyenger1
and V.Ramachandran2
, 1
VIT
University, India and 2
Anna University,India. 7
18
Multi Dimensional CTL and Stratified Datalog
Theodore Andronikos1
and Vassia Pavlaki2
, 1
Ionian University, Greece,2
and
National Technical University of Athens, Greece 0
19
An Efficient Gait Recognition System For Human Identification Using
Modified ICA
M.Pushpa Rani1
and G.Arumugam2
, 1
Mother Teresa Womens University, India
and2
Madurai Kamaraj University, India. 49
20
Cartographic Generalization (Selection) For 2D Map of Urban Area
Jagdish Lal Raheja, Umesh Kumar and K.C. Saravanan, Central Electronics
Engineering Research Institute (CEERI)/ Council of Scientific & Industrial
Research (CSIR), India. 2
21
A BPT Application: Semi-automatic Image Retrieval Tool
Shirin Ghanbari1
, John C. Woods1
, Simon M. Lucas1
and Hamid R.
Rabiee2
, 1
University of Essex, United Kingdom and 2
Sharif University of
Technology, Iran. 0
22
Analyzing the P2P Traffic Using Probability Schemes
M. Sadish Sendil1
and Dr. N. Nagarajan2
, 1
SNS College of Technology,India
and2
Coimbatore Institute of Information and Engineering Technology,India 3
23
Low Power VLSI Design with Resistive Feedback Logic
1
C.Ashok Kumar, 2
B.K.Madhavi and 3
K.Lal Kishore, 1
TRR Engineering College,
India,2
SNIST, Hyderabad,India and 3
JNTU college of Engineering,India. 0
24
Dynamic Probe Window Based Optimization for Surveillance in Home
Security System
Bhaskar Kapoor and Anamika Chhabra, MAIT,India. 1
25
Human Facial Expression Detection From Detected in Captured Image using
Back Propagation Neural Network
Jagdish Lal Raheja and Umesh Kumar Digital Systems Group, Central Electronics
Engineering Research Institute (CEERI)/ Council of Scientific & Industrial
Research (CSIR),India. 37
26
Performance Evaluation of Face Recognition Using Gabor Filter, Log Gabor
filter and Discrete Wavelet Transform
D Murugan1
, S Arumugam2
, K Rajalakshmi3
and Manish T I1
,1
Manonmaniam
Sundaranar University, India , 2
Nandha College of Engineering & Technology,
India and 3
Francis Xavier Engineering College, India. 27
27
A Mobility-Based CheckPointing Protocol for Mobile Computing System
Suparna Biswas1
and Sarmistha Neogy2
, 1
West Bengal University of Technology,
India and 2
Jadavpur University, India. 23
9. 28
Performance Model for a Conservative Distributed Simulation Environment
Using Null Messages to Avoid Deadlock
Hemen Patel1
, Syed S. Rizvi1
, Laiali Almazaydeh1
and Aasia Riasat2
, 1
University
of Bridgeport, USA and 2
Institute of Business Management, Pakistan 2
29
High Performance and Energy Efficient Task Scheduling Algorithm for
Heterogeneous Mobile Computing System
E. Ilavarasan and R. Manoharan, Pondicherry Engineering College, India 4
30
Identification of connection in spacecraft images and classifying them for
Weather Monitoring
Ramya S Gowda, Sikkim Manipal University, India 0
31
Phenol Degradation: Numerical Simulation in a Stirred Tank Electrochemical
Reactor
Regalado-Mendez Alejandro1, Peralta-Reyes Ever1 and Velazquez-Manzanares
Miguel2, 1Universidad del Mar, Mexico and 2Universidad del Papaoloapan,
Mexico 5
32
An Efficient Statistical Multiplexing Method for H.264 VBR Video Sources
for Improved Traffic Smoothing
T.Raghuveera and K.S.Easwarakumar , Anna University, India 4
33
Performance Evaluation of Routing Protocols in Wireless Sensor Networks
Laiali Almazaydeh, Eman Abdelfattah, Manal Al-Bzoor, and Amer Al-Rahayfeh,
University Of Bridgeport, USA 60
34
Improved Lossless Embedding and Extraction - A Data Hiding Mechanism
T. Venkat Narayana Rao1
, A.Govardhan2
and Syed Jahangir Badashah3
, 1
Tirumala
Engineering College, 2
Jawaharlal Nehru Technological University
and 3
Sathyabama1
University, India 1
35
An Optimized Distributed Association Rule Mining Algorithm in Parallel and
Distributed Data Mining with XML Data for Improved Response Time
Sujni Paul, Karunya University, India 4
36
CRM System Using PA-AKD Approach of D3M
Ajay kumar1
, A.Tejaswi2
, Lakshmi Prasad Koyi3
, G.Narasinga Rao4
and
S.Srinivasa Rao Illapu5
, 1
Dronacharya College of Engg, India, 2
GITAM
University, India, 3
CMR Institute Of Technology, India, 4
GMR IT, India
and 5
Chaitanya Engineering College, India 0
37
Enhanced-DSR: A New Approach to Improve Performance of DSR
Algorithm
Sharmin Sultana, Salma Begum, Nazma Tara and Ahsan Raja Chowdhury,
University of Dhaka, Bangladesh 10
38
Wrapper Generator using Java Native Interface
V.S.Vairale1
and K.N.Honwadkar2
, 1
AISSMS College of Engineering - Pune
University, India and 2
D.Y.Patil College of Engineering - Pune University, India 3
39
Memory Management Technique for Paging on Distributed Shared Memory
Framework
Bal Gopal1
, Rizwan Beg1
and Pankaj Kumar2
, 1
Integral University, India
and 2
Sahara Arts & Management Academy, India 4
40
Ontology Based Model For The ITU-T Recommendation G.805: Towards The
Self-Management Of Transport Networks
Maxwell E. Monteiro, Anilton Salles Garcia, Pedro Paulo F. Barcelos, and
Giancarlo Guizzardi, Federal University of Espirito Santo, Brazil 8
10. 41
Efficient Resource Matching in Heterogeneous Grid Using Resource Vector
Srirangam V Addepallil1
, Per Andersen1and George L Barnes2
, 1
Texas Tech
University - Texas, USA and 2
University of Oregon, USA 3
42
Low Power Shift and Add Multiplier Design
C. N.Marimuthu1
, P. Thangaraj2
and Aswathy Ramesan1
, 1
Maharaja Engineering
College,India and 2
Kongu Engineering College, India 26
43
Implementing and Evaluating A Wireless Body Sensor System For Automated
Physiological Data Acquisition At Home
Chao Chen and Carlos Pomalaza-Raez,Indiana University - Purdue University,
USA 14
44
A Parsing Scheme for Finding the Design Pattern and Reducing the
Development Cost of Reusable Object Oriented Software
K. M. Azharul Hasan and Mohammad Sabbir Hasan, Khulna University Of
Engineering and Technology(KUET), Bangladesh 1
45
Hybrid Scenario based Performance Analysis of DSDV and DSR
Koushik Majumder1
and Subir Kumar Sarkar2
, 1
West Bengal University of
Technology, India and 2
Jadavpur University, India 3
46
Interoperability, Trust Based Information Sharing Protocal and Security:
Digital Government Key Issues
Md.Headayetullah and G.K. Pradhan, SOAU - Bhubaneswar, India 10
47
An Algorithm To Self - Extract Secondary Keywords and Their Combinations
Based On Abstracts Collcted Using Primary Keywords From Online Digital
Libraries
Natarajan Meghanathan, Nataliya Kostyuk, Raphael Isokpehi and Hari Cohly,
Jackson State University, USA 0
48
A novel technique for image steganography based on Block-DCT and
Huffman Encoding
A.Nag1
, S. Biswas2
, D. Sarkar2
and P.P. Sarkar2
, 1
Academy of Technology -
Hoogly, India and 2
University of Kalyani, India 63
49
Biometric Authentication Using Nonparametric Methods
S V Sheela and K R Radhika, B M S College of Engineering - Bangalore, India 1
50
Game Information System
Spits Warnars, Manchester Metropolitan University, United Kingdom 2
51
Survey on the Event Orderings Semantics Used for Distributed System
Yaser Miaji Osman Gazali and Suhaidi Hassan, University Utara Malaysia,
Malaysia 2
52
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Ruchira Naskar and Indranil Sengupta, Indian Institute of Technology, India 0
53
Genbit Compress Tool(GBC): A Java-Based Tool To Compress DNA
Sequences and Compute Compression Ratio (BITS/BASE) of Genomes
P.RAJA RAJESWARI1
and ALLAM APPARAO2
, 1
Acharya Nagarjuna
University, India and 2
Jawaharlal Nehru Technological University, India 7
54
An Empirical Study on the Procedure to Derive Software Quality Estimation
Models
Jie Xu1
, Danny Ho2
and Luiz Fernando Capretz1
, 1
University of Western Ontario,
Canada and 2
NFA Estimation Inc, Canada 10
11. 55
Diphone Speech Synthesis System for Arabic Using MARY TTS
M. Z. Rashad, Hazem M. El-Bakry and Islam R. Isma'il, Mansoura University,
Egypt 12
56
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori
Algorithm
Sandeep Singh Rawat1
and Lakshmi Rajamani2
, 1
Guru Nanak Institute of
Technology, India and 2
Osmania University, India 25
57
Improvement in Delay of Information flow in Energy Efficiency Organization
Elham Hasanzadeh and Reza Askari moghadam, Payam Noor University faculty of
engineering, Iran 0
58 An Applied Study on Educational Use of Facebook as a Web 2.0 Tool: The
Sample Lesson of Computer Networks and Communication
Murat Kayri1
and Ozlem cakır2
, 1
Yuzuncu Yil University, Turkey 48
59
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree
and Fuzzy
S.Veeramalai, N.Jaisankar and A.Kannan, Anna University - Chennai, India 22
60
M-Learning: A New Paradigm of Learning Mathematics in Malaysia
Saipunidzam Mahamad, Mohammad Noor Ibrahim and Shakirah Mohd Taib,
Universiti Teknologi Petronas, Malaysia 45
61
Utilizing Diagnosing Problems in a Probabilistic Domain to Build Student
Models
Nabila Khodeir1
, Nayer Wanas1,2
Nevin Darwish3
and Nadia Hegazy1
, 1
Electronics
Research Institute, Egypt, 2
Cairo Microsoft Innovation Lab, Egypt and 3
Cairo
University, Egypt 5
62
Clustering and Feature Specific Sentence Extraction Based Summarization of
Multiple Documents
A.Kogilavani and P.Balasubramani, Kongu Engineering College, India 28
63
Mining Target-Oriented Sequential Patterns With Time-Intervals
Hao-En Chueh, Yuanpei University, Taiwan 9
64
A Survey of QOS Routing Protocols For Mobile Ad Hoc Networks
G. Santhi and Alamelu Nachiappan, Pondicherry Engineering College, India 40
65
Spiking Neurons With ASNN Based-Methods for the Neural Block Cipher
Saleh Ali K. Al-Omari and Putra Sumari, University Sains Malaysia, Malaysia 4
66
A Modified Structure for Feed Forward Active Noise Control Systems
WithImproved Performa
P.Babu and A.Krishnan, K.S.Rangasamy College of Technology, India 0
67
Clustering High Dimensional Data Using Subspace and Projected Clustering
Algorithms
Rahmat Widia Sembiring, Jasni Mohamad Zain and Abdullah Embong, Universiti
Malaysia Pahang, Malaysia 19
68
A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based
on Particle Swarm Theory With Arithmetic Crossover
Md. Amjad Hossain, Md. Kowsar Hossain and M.M.A Hashem, Khulna University
of Engineering & Technology (KUET), Bangladesh 9
69
Performance Analysis of Multimedia Compression Algorithms
Eman Abdelfattah and Asif Mohiuddin, University of Bridgeport, USA 13
12. 70
Ontology-Based Quality Attributes Prediction in Component-Based
Development
Chengpu Li1
, Rob Pooley2
and Xiaodong Liu1
, 1
Edinburgh Napier University, UK
and 2
Heriot-Watt University, UK 4
71
Performance Analysis of Contention Window Cheating Misbehaviors in
Mobile Adhoc Networks
R. Kalaiarasi, Getsy S. Sara, S. Neelavathy Pari and D. Sridharan, Anna university-
Chennai, India 8
72
A New Email Retrivel Ranking Approach
Samir AbdelRahman1
, Basma Hassan2
and Reem Bahgat1
, 1
Cairo University,
Egypt and 2
Fayoum University, Egypt 0
73
Design and Evaluation of XACML Conflict Policies Detection Mechanism
Kamalbir Singh and Sarbjeet Singh, Panjab University, India 5
74
Potential Security Attacks on Wireless Networks and their Countermeasure
Sreedhar. C1
, S. Madhusudhana Verma2
and N. Kasiviswanath1
, 1
G. Pulla Reddy
Engineering College, India and 2
Rayalaseema University, India 2
75
A New DCT-Based Watermarking Method for Copyright Protection of Digital
Audio
Pranab Kumar Dhar, Mohammad Ibrahim Khan and Saif Ahmad, Chittagong
University of Engineering and Technology, Bangladesh 26
76
A Multi -Perspective Evaluation of MA and GA for Collaborative Filtering
Recommender System
Hema Banati and Shikha Mehta, University of Delhi, India 15
77
Level Shifter Design for Low Power Applications
Manoj Kumar1
, Sandeep K. Arya1
and Sujata Pandey2
, 1
Guru Jambheshwar
University of Science & Technology, India and 2
Amity University, India 17
78
A Plant Documentation Information System Design
Bing Wang1
and Ma Feicheng2
, 1
University of Hull, UK and 2
Wuhan University,
China 3
79
Energy Efficient Data Processing in Visual Sensor Network
Harish. H. Kenchannavar1
, Sushma. S. Kudtarkar2
and U. P. Kulkarni2
, 1
Gogte
Institute of Technology, India and 2
SDMCET, India 6
80
Identifying Bank Frauds Using CRISP-DM and Decision Trees
Bruno Carneiro da Rocha1,2 and Rafael Timoteo de Sousa Junior2, 1Bank of
Brazil, Brazil and 2University of Brasilia (UnB), Brazil 14
81
A Clustering Heuristic for Multiprocessor Environments Using Computation
and Communication Loads of Modules
Pramod Kumar Mishra1
, Kamal Sheel Mishra2
, and Abhishek Mishra1
, 1
Banaras
Hindu University, India and 2
School of Management Sciences, India 6
82
Soil Classification Using GATREE
P.Bhargavi1
and S.Jyothi2
, 1
Madanapalli Institue of Tecnology and Science, India
and 2
Sri Padmavathi Mahila VisvaVidyalayam, India 9
83
A Performance Comparison Study of the Location Prediction Based Routing
Protocol with Position Based Routing Protocols for Mobile Ad Hoc Networks
Natarajan Meghanathan, Jackson State University, USA 0
13. 84 Manipulating Multistage Interconnection Networks Using Fundamental
Arrangements
E. Gur1
and Z. Zalevsky2
, 1
Shenkar College of Eng. & Design, Israel and 2
Bar Ilan
University, Isreal 1
85
Inheritance Metrics for Object-Oriented Design
Kumar Rajnish, Arbind Kumar Choudhary and Anand Mohan Agrawal, BITIC -
Muscat, Sultanate of Oman 8
86
Comparison of Class Inheritance and Interface Usage in Object Oriented
Programming through Complexity Measures
V. Krishnapriya1
and K. Ramar2
, 1
Sri Ramakrishna College of Arts & Science for
Women, India and 2
Sri Vidya College of Engineering and Technology, India 1
87
Adaptive Block Pinning Based: Dynamic Cache Partitioning for Multi-core
Architectures
Nitin Chaturvedi, Jithin Thomas and S Gurunarayanan, Birla Institute of
Technology and Science, India 0
88
Use of Smart Antennas In Ad Hoc Networks
Mohammed Ali Hussain1
, P.Suresh Varma2
, K. Satya Rajesh3
, Hussain Basha
Pathan3
and Leela Madhav Sarraju4
, 1
Sri Sai Madhavi Institute of Science &
Technology, India, 2
Adikavi Nannaya University, 3
Rayalaseema University, India
and 4
Dravidian University, India 10
89
A Novel Embedded Statistical Scheduler for Realising High System-QoS
Suman Paul, A. K. Jana and M. K. Pandit, Haldia Institute of Technology (HIT),
India 0
90
Security Enhencement & Solution for Authentication Frame work in IEEE
802.16
A.K.M. Nazmus Sakib, Chittagong University of Engineering & Technology,
Bangladesh 2
91
Security In Wireless Sensor Networks Using Key Management Schemes
Soundarya.P and Varalakshmi .L.M, Sri Manakula Vinayagar Engineering College,
India 2
92
Pattern Recognition Using Neural Networks
Santaji Ghorpade, Jayshree Ghorpade and Shamla Mantri, Pune University, India 16
93
Dynamic Scheduling of Skippable Periodic Tasks With Energy Efficiency In
Weakly Hard Real-Time System
Santhi Baskaran and P. Thambidurai, Pondicherry Engineering College, India 2
94
Some Observations On Open Source Software Development On Software
Engineering Perspectives
Vinay Tiwari, R.D. University - Jabalpur, India 10
95
Data Mining Algorithms And Medical Sciences
Irshad Ullah, City university of Science and information Technology, Pakistan 13
96
Network Intrusion Detection System Based On Machine Learning Algorithms
Vipin Das, Vijaya Pathak, Sattvik Sharma, Sreevathsan, MVVNS.Srikanth,
Gireesh Kumar T, Amrita Vishwa Vidyapeetham, India 16
14. 97
Segmentation And Object Recognition Using Edge Detection Techniques
Y.Ramadevi, T.Sridevi, B.Poornima and B.Kalyani, Chaitanya Bharathi Institute of
Technology, India 70
98
Automatic Induction of Rule Based Text Categorization
D.Maghesh Kumar, AVC Polytechnic College, India 3
2011
99
Affine Invariant Descriptors of 3D Object Using Multiple Regression Model
M. Elhachloufi1
, A. El Oirrak1
, D. Aboutajdine2
and M.N. Kaddioui1
, 1
Caddy
Ayyad University, Morocco and 2
LEESA-GSCM, Morocco 2
100
Use-Case, Runtime and Deployment Views for Developing Subsidies Mobile
Wallet
Dina Darwish, International Academy for Engineering and Media Science, Egypt 0
101
Diagonal Based Feature Extraction for Handwritten Alphabets Recognition
System Using Neural Network
J.Pradeep, E.Srinivasan and S.Himavathi, Pondicherry College Engineering, India 0
102
Electre Methods in Solving Group Decision Support System Bioinformatics on
Gene Mutation Detection Simulation
Ermatita1
, Sri Hartati2
, Retantyo Wardoyo2
and Agus Harjoko2
, 1
Sriwijaya
University, Indonesia and 2
Gadjah Mada University, Indonesia 14
103
A Novel Super Resolution Reconstruction of Low Reoslution Images
Progressively Using DCT and Zonal Filter Based Denoising
Liyakathunisa and C.N .Ravi Kumar, Sri Jayachamrajendra College of
Engineering, India 3
104
Mining Target-Oriented Fuzzy Correlation Rules to Optimize Telecom
Service Management
Hao-En Chueh, Yuanpei University, Taiwan 5
105
Improving the Character Recognition Efficiency of Feed Forward BP Neural
Network
Amit Choudhary1
and Rahul Rishi2
, 1
Maharaja Surajmal Institute, India and 2
TITS
- Bhiwani, India 22
106
Initial Classification Through Back Propagation In a Neural Network
Following Optimization Through GA to Evaluate the Fitness of an Algorithm
Amit Ganatra, Y P Kosta, Gaurang Panchal and Chintan Gajjar, Charotar
University of Science and Technology, India 23
107
Adaptive Fuzzy Filtering for Artifact Reduction in Compressed images and
videos
P.Ramakrishna Rao1
, B.Addai1
, G.Ramakrishna1
and T.PanduRanga
Vital2
, 1
Dr.B.R.Ambedkar University, India and 2
Gayathri College of Science and
Management, India 0
108
Channel Allocation for Direct Sequence Spread Spectrum Using Vertex
Merge Algorithm
Handrizal, A.Noraziah and Ahmed N Abd.Alla, University Malaysia Pahang,
Malaysia 0
109
Combining Speedup Techniques based on Landmarks and Containers with
parallelised preprocessing in Random and Planar Graphs
R. Kalpana1
and P. Thambidurai2
, 1
Pondicherry Engineering College, India
and 2
Perunthalaivar Kamarajar Institute of Engineering & Technology, India 0
15. 110
Machine Learning Methods for Spam E-Mail Classification
W.A. Awad1
and S.M. ELseuofi2
, 1
Port Said University, Egypt and 2
Ras El Bar
High inst., Egypt 0
111
A Formal Classification of Internet Banking Attacks and Vulnerabilities
Laerte Peotta, Marcelo D. Holtz, Bernardo M. David, Flavio G. Deus and Rafael
Timoteo de Sousa Jr., University of Brasilia (UnB), Brazil 18
112
Characterization of Tumor Region Using SOM and Neuro Fuzzy Techniques
in Digital Mammography
Anamika Ahirwar and R.S. Jadon, Madhav Institute of Technology & Science,
India 6
113
Search-Based Software Test Data Generation Using Evolutionary
Computation
P. Maragathavalli, Pondicherry Engineering College, India 9
114
Clustering Posts in Online Discussion Forum Threads
Dina Said1
and Nayer Wanas2
, 1
University of Calgary, Canada and 2
Electronics
Research Institute - Giza, Egypt 6
115
The Development of Electronic Payment System for Universities in Indonesia:
On Resolving Key Success Factors
Veronica S. Moertini, Asdi A. Athuri, Hery M. Kemit and Nico Saputro,
Parahyangan Catholic University, Indonesia 5
116
Brightness Factor Matching for Gesture Recognition System Using Scaled
Normalization
Mokhtar M. Hasan and Pramoud K. Misra, Banaras Hindu University, India 39
117
Behavior Analysis in a learning Environment to Identify the Suitable
Learning Style
Abdelaziz. K. Hamada1
, Magdy. Z. Rashad1
and Mohamed.G.
Darwesh2
, 1
Mansoura University, Egypt and 2
Ahram Canadian University, Egypt 17
118
An Object-Oriented Modeling and Implementation of Spatio-Temporal
Knowledge Discovery System
K.Venkateswara Rao1
, A.Govardhan2
and K.V.Chalapati Rao1
, 1
CVR College of
Engineering, India and 2
JNTUH College of Engineering, India 8
119
An Effective CBVR System Based on Motion, Quantized Color and Edge
Density Features
Kalpana Thakre1
, Archana Rajurkar2
and Ramchandra Manthalkar3
, 1
Sinhgad
College of Engineering, India, 2
MGM College of Engineering, India
and 3
SGGSIE&T - Nanded, India 5
120
Model Based System Engineering Approach of a Lightweight Embedded
TCP/IP
M. Z. Rashed, Ahmed E. Hassan and Ahmed I. Sharaf, Mansoura University,
Egypt 1
121
Model-Based Factors to Extract Quality Indications in Software Lines of Code
Mohammed Abdullah H. Al-Hagery, Qassim University, KSA 3
122
Wavelet Based Spectrum Sensing Techniques for CogKarthik Divakaran,
Naveen Manikandan P and Shri Hari R R, Amrita Vishwa Vidyapeetham,
Indianitive Radio - A Survey
Karthik Divakaran, Naveen Manikandan P and Shri Hari R R, Amrita Vishwa
Vidyapeetham, India 12
123
Ontology Alignment Using Machine Learning Techniques
Azadeh Haratian Nejhadi, Bita Shadgar and Alireza Osareh, Shahid Chamran
University, Iran 13
16. 124
A Novel Parallel Algorithm for Clustering Documents Based on the
Hierarchical Agglomerative Approach
Amal Elsayed Aboutabl1
and Mohamed Nour Elsayed2
, 1
Helwan University, Cairo,
Egypt and 2
Princess Noura University, Kingdom of Saudi Arabia 6
125
Adaptive Team-Based Multi-Agent Organizational Model: A Case in Rescue
Systems
Afsaneh Fatemi, Kamran Zamanifar and Naser Nematbakhsh, University of
Isfahan, Iran 4
126
A Descriptive Model for Developing a Hydraulic Geodatabase by Using the
GIS Softwares
El khamlichi Ahmed Mortada1
, Kadiri Mohamed1
, El mahboul Abdellah2
and
Merzouki Abderrahmane3
, 1
University Abdelamlek Essaadi, Morocco, 2
Hydraulic
basin Agency of Oum Er Rabii, Morocco and 3
University of Granada, Spain 2
127
Application of PUF-Enabled RFID Tags in Electronic Banking
Saeed Mehmandoust and Reza Ebrahimi Atani, The University of Guilan, Iran 2
128
Energy Efficient Task Scheduling of Send-Receive Task Graphs on
Distributed Multi-Core Processors with Software Controlled Dynamic Voltage
Scalin
Abhishek Mishra and Anil Kumar Tripathi, Banaras Hindu University, India 1
129
A Design of a Computer-Aided Diagnostic Tool For Chest X-Ray Analysis
Kim Le, University of Canberra, Australia 7
130
Characterization and Validation of Requirements Management Measures
Using Correlation and Regression Model
S. Arun Kumar and T.Arun Kumar, VIT University, India 4
131
An Automated Size Recognition Technique for Acetabular Implant in Total
Hip Replacement
A. Shapi'i, R. Sulaiman, M.K. Hasan and A.Y.M. Kassim, Universiti Kebangsaan
Malaysia, Malaysia 5
132
PHP Framework for Database Management Based on MVC Pattern
Chanchai Supaartagorn, Ubon Ratchathani University, Thailand 19
133
Importance of Data Collection and Validation for Systematic Software
Development Process
Mala.V.Patil1
and A.M.Nageswara Yogi2
, 1
Anna University - Coimbatore, India
and 2
Defence Research and Development Organization - Bangalore, India 1
134
Information Security Plan for Flight Simulator Applications
Jason Slaughter1
and Syed (Shawon) M. Rahman1,2
, 1
Capella University, USA
and 2
University of Hawaii-Hilo, USA 15
135
Common Phases of Computer Forensics Investigation Models
Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, Universiti Tenaga Nasional,
Malaysia 74
136
Comparison and Analysis of Watermarking Algorithms in Color Images -
Image Security Paradigm
D. Biswas1
, S. Biswas2
, P.P. Sarkar2
, D. Sarkar2
, S. Banerjee1
and A.
Pal1
, 1
Academy of Technology - Hoogly, India and 2
University of Kalyani, India 5
17. 137
Evolutionary Neural Networks algorithm for the Dynamic Frequency
Assignment Problem
Jamal Elhachmi and Zouhair Guennoun, Mohammadia School of Engineers (EMI),
Morocco 11
138
Optimal Self Correcting Fault Free Error Coding Technique in Memory
Operation
Harikishore .Kakarla1
, Madhavi Latha .M2
and Habibulla Khan1
, 1
KL University,
India and 2
JNTUH - Hyderabad, India 2
139
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE)
Abderrahim BOUROUIS1
,Mohamed FEHAM1
and Abdelhamid
BOUCHACHIA2
, 1
Abou-bekr BELKAID University, Algeria and 2
University of
Klagenfurt, Austria 54
140
A Review on Elliptic Curve Cryptography for Embedded Systems
Rahat Afreen1
and S.C. Mehrotra2
, 1
Tom Patrick Institute of Computer & I.T -
Rauza Bagh, India and 2
Dr. B.A.M. University, India 21
141
Statistical Analysis on Software Metrics Affecting Modularity in Open Source
Software
Andi Wahju Rahardjo Emanuel1
, Retantyo Wardoyo2
, Jazi Eko Istiyanto2
and
Khabib Mustofa2
, 1
Maranatha Christian University, Indonesia and 2
Gadjah Mada
University, Indonesia 4
142
Proposed Information Sharing Security Approach for Security Personnels,
Vertical Integration, Semantic Interoperability Architecture and Framework
for Digital Government
Md.Headayetullah, G.K. Pradhan, Sanjay Biswas and B. Puthal, SOAU -
Bhubaneswar, India 1
143
Hybrid of Particle Swarm Optimization with Evolutionary Operators to
Fragile Image Watermarking Based DCT
Sawsan Morkos Gharghory, Electronics Research Institute - Cairo, Egypt 14
144
Image Retrieval using Bit-plane Pixel Distribution
N S T Sai1
and R C Patil2
, 1
Tech Mahindra Limited - Mumbai, India and 2
NMIMS
University, India 6
145
Detection of Masses in Digital Mammogram Using Second Order Statistics
and Artificial Neural Network
Al Mutaz M. Abdalla1
, Safaai Dress1
and Nazar Zaki2
, 1
Universiti Teknologi -
Malaysia, India and 2
UAE University, UAE 32
146
Effective Independent Quality Assessment using IV&V
Pathanjali Sastri Akella1
and K. Nageswara Rao2
, 1
V. R. Siddhartha Engineering
College, India and 2
P. V. P. Siddhartha Institute of Technology, India 2
147
E-Learning personalization based on Dynamic learners' preference
Essaid El Bachari, El Hassan Abelwahed and Mohammed El Adnani, University
Cadi Ayyad, Morocco 44
148
An LMS Based Blind Source Separation Algorithm Using A Fast Nonlinear
Autocorrelation Method
Behzad Mozaffari Tazehkand, University of Tabriz, Iran 0
149
A Novel Technique for Back-Link Extraction and Relevance Evaluation
Pooja Gupta1
, A.K. Sharma2
and Divakar Yadav3
, 1
MAIT - New Delhi,
India, 2
YMCA University of Science and Technology, India and 3
JIITU - Noida,
India 2
18. 150
Electronic Commerce in Web 3.0: The Evidence from Emerging Economics
Xi Zhang1
and Doug Vogel2
, 1
Chinese Academy of Sciences, China and 2
City
University of Hong Kong, China 5
151
A Comparative Experiment of Several Shape Methods in Recognizing Plants
A. Kadir, L.E. Nugroho, A. Susanto and P.I. Santosa, Gadjah Mada University,
Indonesia 36
152
RCause - A Root Cause Analysis Model to Identify the Root Causes of
Software Reengineering Problems
Er. Anand Rajavat1
and Vrinda Tokekar2
, 1
Shri Vaishnav Institute of Technology
and Science Indore, India and 2
Institute of Engineering and Technology (DAVV)
Indore, India 0
153
Unsupervised horizontal collaboration based in SOM
Nadia Mesghouni Khaled Ghedira and Moncef Temani, University of Tunis
Laboratory LI3 ISG Tunis, Tunisie 2
154
Automatic Application Level Set Approach In Detection Calcifications In
Mammographic Image
Atef Boujelben1
, Hedi Tmar2
, Jameleddine Mnif1
and Mohamed Abid2
, 1
National
School of Medicine of Sfax, Tunisia and 1
National School of Engineers of Sfax,
Tunisia 3
155
A Robust Steganography Model Using Wavelet-Based Block-Partition
Modification
Sherin Youssef, Ahmed Abu Elfarag and Reta Raouf, Arab Academy for Science
& Tech - Alx., Egypt 11
156
Cultural Influences on Explicit and Implicit Knowledge Sharing Behaviour in
Virtual Teams
Xi Zhang, Chinese Academy of Sciences, P. R. China 10
157
A Fuzzy Framework For Segmentation, Feature Matching And Retrieval Of
Brain MR Images
Archana.S and Sridhar.S, College of Engineering - Guindy, India 0
158
MDA-Based ATL Transformation To Generate MVC 2 Web Models
Mhamed Rahmouni and Samir Mbarki, Ibn Tofail University, Morocco 5
159
Comprehensive Measurement Framework for Enterprise Architectures
Mahesh R. Dube1
and Shantanu K. Dixit2
, 1
VIT - Pune, India and 2
WIT - Solapur,
India 8
160
Plants Images Classification Based on Textural Features using Combined
Classifier
M.Z. Rashad, B.S.el-Desouky and Manal S .Khawasik, Mansoura University,
Egypt 27
161
Design and FPGA Implementation of DDR3 SDRAM Controller for High
Performance
Shabana Aqueel and Kavita Khare, M.A.N.I.T - Bhopal, India 4
162
Self-Adaptation Mechanism to Control the Diversity of the Population in
Genetic Algorithm
Chaiwat Jassadapakorn and Prabhas Chongstitvatana, Chulalongkorn University -
Bangkok, Thailand 8
163
Packet Scheduling Of Two Classes Flow
Rabie Barhoun and Abdelwahed Namir, University Hassan II, Morocco 1
164
Reduction Of Blocking Probability In Shared Protected Optical Network
Nirmala L Devi1
and V M Pandharipande2
, 1
Osmania University, India and 2
Dr.
Babasaheb Ambedkar Marathwada University, India 2
19. 165
DNA Lossless Differential Compression Alogorithm Based on Similarity of
Genomic Sequence Database
Heba Afify, Muhammad Islam and Manal Abdel Wahed, Cairo University, Egypt 11
166
Performance Analysis Of Various Data Mining Classification Techniques On
Healthcare Data
Shelly Gupta1
, Dharminder Kumar2
and Anand Sharma2
, 1
Banasthali University,
India and 2
GJUS&T - Hisar, India 27
167
Towards A Model Of Maturity For Is Risk Management
Mina Elmaallam and Abdelaziz Kriouile, ENSIAS - Rabat, MOROCCO 12
168
A Fuzzy Approach For Clustering Gene Expression Time Series Data
Sadiq Hussain and G.C. Hazarika, Dibrugarh University - Assam, India 1
169
Novel Apporach for Speech Recognition by Using Self - Organized Maps
R.L.K.Venkateswarlu1
, R. Vasantha Kumari2
and A.K.V.Nagayya1
, 1
Sasi Institute
of Technology and Engineering, India and 2
Perunthalaivar Kamarajar Arts College,
India 9
Special Issue on "ICCSEA - 2011"
170
A New Trusted Third-Party Billing For Mobile Networks
Supriya Chakraborty1
and Nabendu Chaki2
, 1
JIS College of engineering - West
Bengal, India and 2
University of Calcutta, India 0
171
Performance Evaluation And Impact Of Weighting Factors On An Energy
And Delay Aware Dynamic Source Routing Protocol
Jihen Drira Rekik, Leila Baccouche and Henda Ben Ghezala,Manouba
University,Manouba, Tunisia 5
172
Indian Languages IR using Latent Semantic Indexing
A.P.SivaKumar1
, P.Premchand2
and A.Govardhan1
, 1
JNTUACE, India
and 2
Osmania University - Hyderabad, India 6
173
Active Controller Design For Global Choas Anti-Synchronization Of Li and
Tigan Chaotic Systems
Sundarapandian Vaidyanathan1
and Karthikeyan Rajagopal2
, 1
Vel Tech Dr. RR &
Dr. SR Technical University, India and 2
Singhania University Rajasthan, India
11
174
It Security Issues Within the Video Game Industry
Stephen Mohr1
and Syed (Shawon) Rahman1,2
, 1
Capella University, USA
and 2
University of Hawaii-Hilo, USA 9
175
Adaptive Beamforming Algorithm for Interference Suppression in GNSS
Receivers
Zhao hongwei1
, Lian Baowang1
and Feng Juan1,2
, 1
Northwestern Polytechnical
University, China, 2
KIT- Karlsruhe Institute of Technology, Germany 58
176
Minimize the False Positive Rate in a Database Intrusion Detection System
A. Rezk, H. Ali, M. El-Mikkawy and S. Barakat, Mansoura University, Egypt 4
177
Design Pattern Management System: A Support Tool Based on Design
Patterns Applicability
Zakaria Moudam, Radouan Belhissi and Noureddine Chenfour, University Sidi
Mohammed Ben Abdellah Fez, Morocco 0
20. 178
Genetic Algorithm (GA) In Feature Selection For CRF Based
ManipuriMultiword Expression (MWE) Identification
Kishorjit Nongmeikapam1
and Sivaji Bandyopadhyay2
, 1
Manipur University, India
and 2
Jadavpur University, India 4
179
IRIS Recognition Based On LBP and Combined LVQ Classifier
M. Z. Rashad, M. Y. Shams, O. Nomir and R. M. El-Awady, Mansoura University,
Egypt 20
180
An IR-based Pedestrian Detection System Implemented with Matlab-
Equipped Laptop and Low-Cost Microcontroller
Erwin Thomas Gilmore, Chukwunweike Ugbome and Charles Kim, Howard
University, USA 7
181
New Method for 3D Shape Retrieval
Abdelghni Lakehal and Omar El Beqqali, Sidi Mohamed Ben AbdEllah University,
Morocco 2
182
Research Review for Digital Image Segmentation Techniques
Ashraf A. Aly1
, Safaai Bin Deris1
and Nazar Zaki2
, 1
Universiti Teknologi Malaysia
and 2
UAE University, UAE 41
183
Stable Filtering for Artificial Pheromone Potential Field Constructed By
Mobile Robots and Passive RFID Tags
Piljae Kim and Daisuke Kurabayashi, Tokyo Institute of Technology, Japan 0
184
Evaluate the Performance of Optical Cross Connect Based on Fiber Bragg
Grating Under Different Bit Rate
Bobby Barua, Ahsanullah University of Science and Technology, Bangladesh 7
185
Optimized Fuzzy Logic Application for MRI Brain Images Segmentation
Indah Soesanti1
, Adhi Susanto1
, Thomas Sri Widodo1
, Maesadji
Tjokronagoro2
, 1
Gadjah Mada University, Indonesia and 1
Gadjah Mada University,
Indonesia 15
186
Robust seed selection algorithm for k-means type algorithms
K. Karteeka Pavan1
, Allam Appa Rao2
, A. V. Dattatreya Rao3
and G. R.
Sridhar4
, 1
Jagarlamudi Chadramouli College of Engineering, India, 2
Jawaharlal
Nehru Technological University, India, 3
Acharya Nagarjuna University, India
and 4
Endocrine and Diabetes Centre, India 15
187
Knowledge Based Methods for Video Data Retrieval
S.Thanga Ramya and P.Rangarajan, RMD Engineering College, India 3
188
Analysis and Design Complex and Large Data Base using MySQL
Workbench
Dedi Iskandar Inan and Ratna Juita, Papua State University, Indonesia 2
189
Direct Manipulation of Web Browsing History
Gholam H. Khaksari, Pennsylvania State University, USA 3
190
A Semantically Enriched Web Usage Based Recommendation Model
C.Ramesh1
, K. V. Chalapati Rao1
and A.Goverdhan2
, 1
CVR College of
Engineering,India and 2
JNTUH College of Engineering, India 12
191
Enhancing Confidentiality of Private Communication through Dual
Compression
Kristipati Sudharshana Reddy, Munwar Sk and Rajesh Bhakthavatsalam, SVEC -
JNTU, India 0
192
Optimum Partition Parameter of Divide-And-Conquer Algorithm for Solving
Closest-Pair Problem
Mohammad Zaidul Karim and Nargis Akter, Daffodil International University,
Bangladesh 10
21. 193
Monitoring Software Reliability using Statistical Process Control: An MMLE
Approach
R Satya Prasad1
, Bandla Sreenivasa Rao2
and R.R. L Kantham1
, 1
Acharya
Nagarjuna University, India and 2
VRS & YRN College, India 3
194
From 3D Model Data to Semantics
My Abdellah Kassimi and Omar El beqqali, Sidi Mohamed Ben Abdellah
University, Morocco 3
195
Recycling of Bandwidth in Metropolitan Area Networks(MAN)
Bhargava Devana1
, Sudharshana Kristipati 1
, Raghava Nirati2
, 1
JNTU - India
and 2
JITS, India 0
196
Adaptation AC to Improve Wireless Access Network Dependability
Olfa Ben Ahmed and Zied Choukair, University of Carthage, Tunisia 1
197
A Comparative Study To Find A Suitable Method For Text Document
Clustering
S.C.Punitha1
and M.Punithavalli2
, 1
P.S.G.R. Krishnammal College for women,
India and 2
Sri Ramakrishna College of engineering, India 2
198
Recognizing Bangla Grammar Using Predictive Parser
K.M. Azharul Hasan, Al-Mahmud, Amit Mondal and Amit Saha, Khulna
University of Engineering and Technology, Bangladesh 15
199
Hybrid GPS-GSM Localization of Automobile Tracking System
Mohammad A. Al-Khedher, Balqa Applied University, Jordan 75
200
Network Intrusion Detection Using Data Mining and Network Behaviour
Analysis
Ahmed Youssef and Ahmed Emam, King Saud University, KSA 18
201
Technical Analysis of Remote 3D Visualization on Mobile Devices
U.S. Junghare1
, V.M. Thakare2
, R.V.Dharaskar3
and S.S. Sherekar2
, 1
Brijlal Biyani
Science College, India, 2
SGB Amravati University, India 3
M.P.G.I. Nanded, India 2
202
Integrated Environment for Developing E-Learning Lectures
Vladimir Bondarev1
, Alexander Ossyka2
and Afif Mghawish1
, 1
Kharkov National
University of Radio Electronics, Ukraine and 2
Al-Zaytoonah Private University,
Jordan 4
203
Analysis of Different Privacy Preserving Cloud Storage Frameworks
Rajeev Bedi1
, Mohit Marwaha1
, Tajinder Singh2
, Harwinder Singh3
and Amritpal
Singh1
, 1
Beant College of Engineering and Technology, India, 2
Global Institute of
Engineering and Technology, India and 3
SSCET, India 7
204
Investigating the Awareness of Applying the Important Web Application
Development and Measurement Practices
Faudziah Ahmad, Fauziah Baharom and Moath Husni, Universiti Utara Malaysia,
Malaysia 3
205
Flooding Attacks to Internet Threat Monitors(ITM): Modeling and Counter
Measures Using Botnet and Honeypots
K.Munivara Prasad1
, A.Rama Mohan Reddy2
and M.Ganesh
Karthik3
, 1
Rayalaseema University, India 2
SV University, India and 3
Sree
vidyanikethan Engg.College, India 9
206
Mobile Geographic Information Systems: A Case Study on Mansoura
University, Egypt
Asmaa Ahmed Hussein1
, Elkhedr Hassan Eibrahim2
and Aziza Asem1
, 1
Mansoura
University, Egypt and 2
King Saud University, KSA 12
22. 207
An Improved Neural Image Compression Approach With Cluster Based Pre-
Processing
Mohamed.G. Darwesh1
, Magdy. Z. Rashad2
and Abdelaziz. K. Hamada2
, 1
Cairo
University, Egypt and 2
Mansoura University, Egypt 0
208
From Learning Style of Webpage Content to Learner's Learning Style
Mohamed.G. Darwesh1
, Magdy. Z. Rashad2
and Abdelaziz. K. Hamada2
, 1
Cairo
University, Egypt and 2
Mansoura University, Egypt 7
209
Image Labeling and Segmentation using Hierarchical Conditional Random
Field Model
Manoj K.Vairalkar and Sonali.Nimbhorkar, RTMN University - Nagpur, India 0
210
Multi-Resolution Analysis For Medical Image Compression
Mohammed Alhanjouri, Islamic University of Gaza, Palestine 3
211
Introduction Of Knowledge Management Architecture Using Multi Agent
Sheikh Amanur Rahman1
, Anamika Bhardwaj1
, Mukul Pathak1
and Shobhit Singh
Rathore2
, 1
Galgotias College of Engineering & Technology, India and 2
SDG
Software India Pvt. Ltd, India 8
212
Optimal Fuzzy Model Construction With Statistical Information Using
Genetic Algorithm
Md. Amjad Hossain1
, Pintu Chandra Shill2
, Bishnu Sarker1
and Kazuyuki
Murase2
, 1
KUET, Bangladesh and 2
University of Fukui, Japan 2
213
Edge Detection Techniques For Image Segmentation
Muthukrishnan.R and M.Radha, Bharathiar University, India 61
2012
214
Trust Model for Reliable File Exchange In Cloud Computing
Edna Dias Canedo, Rafael Timoteo de Sousa Junior and Robson de Oliveira
Albuquerque, University of Brasilia, Brazil 15
215
An Approach for Robots to Deal with Objects
Sidiq S. Hidayat1,3
, Bong Keung Kim2
and Kohtaro Ohba2
, 1
University of Tsukuba,
Japan, 2
The National Institute of Advanced Industrial Science & Technology
(AIST) Tsukuba, Japan and 3
Politeknik Negeri Semarang, Indonesia 7
216
Enhancement of Images Using Morphological Transformations
K.Sreedhar1
and B.Panlal2
, 1
VITS (N9) Karimnagar, India and 2
VCE (S4)
Karimnagar, India 48
217
A Cluster Allocation and Routing Algorithm based on Node Density for
Extending the Lifetime of Wireless Sensor Networks
Wernhuar Tarng, Hao-Wei Lin and Kuo-Liang Ou, National Hsinchu University of
Education, Taiwan 12
218
Reliability Analysis of Multi Path Multistage Interconnection Networks
Sudarson Jena, G.Sri Sowmya, P.Radhika and P.Venkat Reddy, GITAM
University, India 4
219
A Novel Password based Multi Party Key Agreement Protocol on Elliptic
Curve
Daniyal M. Alghazzawi, King Abdulaziz University, Saudi Arabia 2
220
An Effective Model for Improving the Quality of Recommender Systems in
Mobile E-Tourism
Masoumeh Mohammadnezhad1
and Mehregan Mahdavi2
, 1
Islamic Azad
University, Iran and 2
University of Guilan, Iran 8
23. 221
Image Segmentation in Video Sequences Using Modified Background
Subtraction
D. W. Chinchkhede & N. J. Uke, Pune University, India 17
222
Achieving Consensus with Individual Centrality Approach
Vitri Tundjungsari, Jazi Eko Istiyanto, Edi Winarko and Retantyo Wardoyo,
Gadjah Mada University, Indonesia 4
223
Blind 3D Model Watermarking based on Multi-Resolution Representation
and Fuzzy Logic
Sharvari C. Tamane1
and Ratnadeep R. Deshmukh2
, 1
MGM's Jawaharlal Nehru
Engineering College, India and 2
Dr. Babasaheb Ambedkar Marathwada University,
India 8
224
Integrated Task Clustering, Mapping and Scheduling for Heterogeneous
Computing Systems
Yuet Ming Lam, Macau University of Science and Technology, Macau 5
225
Ranking Popular Items By Naive Bayes Algorithm
Shiramshetty Gouthami, Golamari.Jose Mary and Pulluri Srinivas Rao, Jayamukhi
Institute of Technological Sciences, India 1
226
Quality of Service Using PSO Algorithm
S.M. ELseuofi, Umm Al-Qura University, Saudi Arabia 5
227
Image Retrieval System Using Hybrid Feature Extraction Technique
Vadhri Suryanarayana1
, M.V.L.N. Raja Rao2
, P. Bhaskara Reddy3
and G. Ravindra
Babu4
, 1
NRI Institute of Technology, India, 2
Gudlavalleru Engineering College,
India, 3
MLR Institutions, India and 4
S.C.C.E.T - Hyderabad, India 1
228
SignsWorld; Deeping into the Silence World and Hearing Its Signs (StAte oF
the Art)
A.M. Riad, Hamdy K.Elmonier,Samaa.M.Shohieb and A.S. Asem, Misr academy
for Engineering and Technology, Egypt 10
229
A Qualitative Study of LP-ITS: Linear Programming Intelligent Tutoring
System
Samy S. Abu Naser, Al-Azhar University-Gaza, Palestine 21
230
Graph Based New Approach for Frequent Pattern Mining
Anurag Choubey1
, Ravindra Patel2
and J.L. Rana3
, 1
Technocrats Institute of
Technology, India, 2
UIT-RGPV, India and 3
MANIT, India 1
231
An Approach for Agile SOA Development using Agile Principals
Majlesi Shahrbanoo, Mehrpour Ali and Mohsenzadeh Mehran, Islamic Azad
University, Iran 14
232
Error Probability Analysis of Free-Space Optical Links with Different
Channel Model under Turbulent Condition
Bobby Barua, Tanzia Afrin Haque and Md. Rezwan Islam, Ahsanullah University
of Science and Technology, Bangladesh 6
234
Visual Analysis of Cost Based Database Optimizers Using Picasso Tool
Neeraj Sharma1
, Kavindra Raghuwanshi2
, Syed Imran Ali1
and Banshilal
Patidar1
, 1
Trinity Institute of Technology and Research, India and 2
All Saints
College of Technology, India 0
235
MppSoCGEN: A Framework for automatic generation of MppSoC
Architecture
Emna Kallel, Yassine Aoudni, Mouna Baklouti and Mohamed Abid, ENIS School
Sfax, Tunisia
0
24. 236
Cost breakdown of Public Cloud Computing and Private Cloud Computing
and Security Issues
Swarnpreet Singh and Tarun Jangwal, CT Institute of Engineering and
Management Technology, India 25
237
Mass Lesion Detection Using Wavelet Decomposition Transform and Support
Vector Machine
Ayman AbuBaker, Applied Science Private University Amman, Jordan 7
238
Document Summarization Using Positive Pointwise Mutual Information
Aji S1
and Ramachandra Kaimal2
, 1
University of Kerala, India and 2
Amrita Vishwa
Vidyapeetham Amritapuri Campus, India 6
239
Fuzzy Multi-objective Approach for the Improvement of Distribution
Network Efficiency by Considering DG
Ramadoni Syahputra, Universitas Muhammadiyah Yogyakarta, Indonesia 57
240
A Semi-Blind Reference Watermarking Scheme Using DWT-DCT-SVD for
Copyright Protection
Satyanarayana Murty. P1
, M.Uday Bhaskar2
and P. Rajesh Kumar3
, 1
GIITS,
India, 2
Sri Sai Aditya Institute of Science & Technology, India and 3
AU college of
Engineering, India 20
241
Review on Common Criteria as a Secure Software Development Model
Mehmet Kara, TUBITAK BILGEM UEKAE, Turkey 13
242
Dynamic Domain Classification for Fractal Image Compression
K. Revathy and M. Jayamohan, University of Kerala, India 1
243
Signal Processing for MIMO Interference Networks
Thanat Chiamwichtkun1
, Stephanie Soon2
and Ian Lim2
, 1
Bangkok University,
Thailand and 2
National University of Singapore, Singapore 0
244
Embedded Controller for Vehicle In-Front Obstacle Detection and Cabin
Safety Alert System
V.Ramya, B. Palaniappan and K. Karthick, Annamalai University, India 36
UNDERSTANDING the Concept of Geographic Information System and
Modelling Formalisms
Wembe Sop Diake Hubert, University of Douala, Cameroon 0
245
Spectral Analysis of Projection Histogram for Enhancing Close matching
character Recognition in Malayalam
Sajilal Divakaran, University of Kerala, India 4
246
Prashnottar: A Hindi Question Answering System
Shriya Sahu, Nandkishor Vasnik and Devshri Roy, MANIT Bhopal, India 10
247
Dimension Reduction by Mutual Information Feature Extraction
Ali Shadvar, Islamic Azad University, Iran 2
248
New-Fangled Method Against Data Flooding Attacks in MANET
Kavuri Roshan1
, K.Reddi Prasad1
, Niraj Upadhayaya1
and A.Govardhan2
, 1
J.B.
Institute of Engineering & Technology, India and 2
JNTUH, India 2
249
Evaluation of Information Retrieval Systems
Keneilwe Zuva1
and Tranos Zuva2
, 1
University of Botswana, UK and 2
Tshwane
University Technology, SA 15
25. 250
Improvement of Traffic Overhead and Reliability in Wireless Sensor
Network
G.M. Mashrur-E-Elahi, Din Mohammad Mobin and Md. Anwar Ul Islam Rajib,
Khulna University of Engineering and Technology, Bangladesh 0
251
A Hybrid Region Growing Algorithm for Medical Image Segmentation
D. Muhammad Noorul Mubarak1
, M. Mohamed Sathik2
, S.Zulaikha Beevi3
and
K.Revathy11
University of Kerala, India , 2
Sathakathullah Appa College, India
and 3
National College of Engineering,India 12
252
Full Data Controlled Web-Based Feed Aggregator
Haruna Isah, University of Bradford, UK 4
253
High Availability Solution: Resource Usage Management in Virtualized
Software Aging
Aye Myat Myat Paing and Ni Lar Thein, University of Computer Studies, Yangon 5
254
Critical Analysis of Ecm Applications in the Clouds: A Case Study
James Xue1
and Amjad Yahya2
, 1
University of Northampton, UK,
and 2
PricewaterhouseCoopers, Saudi Arabia 1
255
Crawler Architecture Using Grid Computing
M.E.ElAraby1
, M.M.Sakre1
, M.Z.Rashad2
and O.Nomir2
, 1
Al Shorouk Academy,
Egypt, and 2
Mansoura University, Egypt 1
256
Automatic Segmentation of Manipuri (Meiteilon) Word into Syllabic Units
Kishorjit Nongmeikapam1
, Vidya Raj RK1
, Oinam Imocha Singh1
and Sivaji
Bandyopadhyay2
, 1
Manipur University, India and 2
Jadavpur Univeristy,India 0
257
An Approach for Integration Testing in Online Retail Applications
Roopa Singh and Imran Akhtar Khan, JJT University, India 1
258
A Rule Based Approach for Root Word Identification in Malayalam
Language
Meera Subhash, Wilscy. M, S.A Shanavas, University of Kerala, India 3
259
Applying Data Envelopment Analysis to Evaluation of Taiwanese Solar Cell
Industry Operational Performance
Hao-En Chueh and Jie-Yi Jheng, Yuanpei University, Taiwan 0
260
PCA - Wavelet Coefficients for T2 chart to Detect Endpoint in CMP process
Sihem Ben Zakour1
and Hassen Taleb2
, 1
Higher institute of Management of Tunis,
Tunisia and 2
Higher institute of business administration of gafsa,Tunisia 1
261
PSO Algorithm for IPD Game
Xiaoyang Wang and Yibin Lin, Sun-Yat Sen University, China 1
262
Training a Feed-Forward Neural Network with Artificial Bee Colony based
Backpropagation Method
Sudarshan Nandy1
, Partha Pratim Sarkar1
and Achintya Das2
, 1
Kalyani University,
India and 2
Kalyani Goverment Engineering College,India 22
263
Multicore Dynamic Kernel Modules Attachment Technique for Kernel
Performance Enhancement
Mohamed Farag, Maharishi University of Management, USA 0
264
Redescription Mining With Three Primary Data Mining Functionalities
M. Kamala Kumari and Suresh Varma, Adikavi Nannaya University, India 0
26. 265
Spatial Data Mining using Cluster Analysis
Ch.N.Santhosh Kumar1
, V. Sitha Ramulu1
, K.Sudheer Reddy2
, Suresh Kotha1
, Ch
and Mohan Kumar1
, 1
Swarna Bharathi Inst. of Sc. & Tech, India and 2
Acharya
Nagarjuna University,India 5
266
Applications of Wireless Sensor Networks in Fall Detection for Senior People
Wernhuar Tarng1
, Chia-Hwei Lin1
and Hsin-Hun Liou2
, 1
National Hsinchu
University of Education, Taiwan and 2
National Central University, Taiwan 4
267
Intelligent Mining Association Rules
Sarjon Defit, University Putra Indonesia "YPTK" Padang 1
268
Comparison Study for Clonal Selection Algorithm and Genetic Algorithm
Ezgi Deniz Ulker and Sadık Ulker, Girne American University, Turkey 7
269
A New Audio Watermarking Method Based on Discrete Cosine Transform
with a Gray Image
Mohammad Ibrahim Khan1
, Md. Iqbal Hasan Sarker1
, Kaushik Deb1
and
Md.Hasan Furhad2
, 1
Chittagong University of Engineering & Technology,
Bangladesh and 2
University of Ulsan, South Korea 1
270
C-PASS-PC: A Cloud-driven Prototype of Multi-Center Proactive
Surveillance System for Prostate Cancer
Haibin Wang, Samuel Oschin Comprehensive Cancer Institute, USA 2
271
An Energy Aware Geocast Algorithm Using 2-Hop Neighbour Knowledge in
Sensor Networks
Young-Chul Shim1
and Sehun Noh2
, 1
Hongik University, Korea and 2
GuardianNet,
Korea 0
272
Genetic Algorithm with SRM SVM Classifier for Face Verification
Safiya K.M 1
, S.Bhuvana1
, P.TamijeSelvy1
and R. Radhakrishnan2
, 1
Sri Krishna
College of Technology, India and 2
Sri Ramakrishna Engineering college, India 0
273
Biometric Authentication Through a Virtual Keyboard for Smartphones
Matthias Trojahn1
and Frank Ortmeier2
, 1
Volkswagen AG, Germany and 2
Otto-
von-Guericke University, Germany 28
274
Improving Computer-Mediated Synchronous Communication of Doctors in
Rural Communities Through Cloud Computing: A Case Study of Rural
Hospitals in South Africa
Alfred Coleman1
, Marlien E Herselman2
and Mary Coleman3
, 1
University of South
Africa, 2
CSIR South Africa and 3
Medical University of South Africa, South Africa 5
275
Alfred Coleman1
, Marlien E Herselman2
and Mary Coleman3
, 1
University of
South Africa, 2
CSIR South Africa and 3
Medical University of South Africa,
South Africa
Bilal Hawashin1
, Farshad Fotouhi2
and William Grosky3
, 1
Alzaytoonah University
of Jordan, 2
Wayne State University, USA and 31
University of Michigan-
Dearborn,USA 0
276
Building a Portable Computer Lab with Bootable USB Hard Drives Using
Virtualisation
Hao Shi, Victoria University, Australia 0
277
A P2P Botnet Virus Detection System Based on Data-Mining Algorithms
Wernhuar Tarng, Cheng-Kang Chou and Kuo-Liang Ou, National Hsinchu
University of Education, Taiwan 1
27. 278
Skyline Sets Queries for Incomplete Data
Mohammad Shamsul Arefin and Yasuhiko Morimoto, Hiroshima University, Japan 4
279
An Analyzer-Based Security Measurement Model for Increasing Software
Security
Sen-Tarng Lai, Shih Chien University, Taiwan 2
280
Machine Learning Algorithms in Web Page Classification
W. A. AWAD, Port Said University, Egypt 2
1
281 Achieving the Benefits of Agility in Software Architecture-XP
Zafar Karimi, Sajjad Behzady, Ali Broumandnia, Islamic Azad University at
Qazvin, Iran
282
An Insight View of Kernel Visual Debugger in System Boot up
Mohamed Farag, Maharishi University of Management, USA 0
283
Evolutionary Tuning of Fuzzy Rule Base Systems for Nonlinear System
Modelling and Control
Pintu Chandra Shill1
, Bishnu Sarker1
and Kazuyuki Murase2
, 1
University of Fukui,
Japan and 2
KUET, Bangladesh 0
284
Computational Analysis of Code Collaboration Pattern and Semantic Role
Lei Wu1
, Sharon White1
, Yi Feng1
, James Helm1
, Nathanial Wiggins3
, 1
University
of Houston-Clear Lake, USA, 2
Algoma University, Canada and 3
San Jacinto
College, Houston, USA 0
285
A Neuro-Fuzzy Inference Model for Breast Cancer Recognition
Bekaddour Fatima and Chikh Mohammed Amine,Abou Bekr Belkaid University ,
Tlemcen, Algeria 15
286
Building a Legal Expert System for Legal Reasoning in Specific Domain-A
Survey
Venkateswarlu Naik.M and Sushant Lokhanday, Keshava Memorial Institute of
Technology, India 4
287
A Rough - Neuro Model for Classifying Opponent Behavior in Real Time
Strategy Games
M. Z. Rashad, Mansoura University, Egypt 5
288
Efficient Scheduling ff Real-Time Parallel Applications on Clusters
Abeer Hamdy1
, Reda Ammar2
and Ahmed E. Youssef3
, 1
British University in
Egypt, 2
University of Connecticut, USA and 3
Helwan University, Egypt 0
289
ASP-SSN: An Effective Approach for Linking Semantic Social Networks
Sanaa Kaddoura1
and Islam Elkabani2
, 1
Beirut Arab University, Lebanon
and 2
Alexandria University, Egypt 0
290
Design of an Efficient MAC Protocol for Opportunistic Cognitive Radio
Networks
Mahfuzulhoq Chowdhury1
, Asaduzzaman1
, Md. Fazlul Kader1,2
and Mohammad
Obaidur Rahman1
, 1
Chittagong University of Engineering & Technology,
Bangladesh, 2
University of Chittagong, Bangladesh 3
291
Fast Hue-Preserving Histogram Equalization Methods For Color Image
Contrast Enhancement
David Menotti1,2,4
, Laurent Najman2
, Jacques Facon3
and Arnaldo de A.
Albuquerque4
, 1
Federal University of Ouro Preto, Brazil, 2
Universite Paris-Est,
France, 3
Pontificia Universidade Catolica do Parana, Brazil and 4
Universidade
Federal de Minas Gerais, Brazil 6
28. 292
Efficient Monitoring in Online Tests Using Esdv Method
Sri Anusha.N, Sai Soujanya.T and Vasavi.S, Jawaharlal Nehru Technological
University, India 0
293
Accessibility of Information Technologies in the Resting Home
Ozlem Cakır, Ankara University, Turkey 0
294
An Information System to Support and Monitor Clinical Trial Process 0
295
Rotation Invariant Color Retrieval
Swapna Borde1
and Udhav Bhosle2
, 1
Vidyavardhini's College of Engineering and
Technology,India and 2
Rajiv Gandhi Institute of Technology,India 1
296
Design of Physical Games for Learning the Lotus Effect
Wernhuar Tarng1
, Shih-Hsien Tsai1
, Chih Ming Lin1
, Chi-Young Lee2
and Hsin-
Hun Liou3
, 1
National Hsinchu University of Education, Taiwan, 2
National Tsing
Hua University, Taiwan and 3
National Central University, Taiwan 1
297
A Novel and Single Chip Tri-Band Low-Noise Amplifier for Wlan, Wifi and
Wimax Receivers
I. Akhchaf, S. Khoulji, M. Essaidi and M.L. Kerkeb, Abdelmalek Essaadi
University Morocco 1
298
An Efficient Passage Ranking Technique For a QA System
Pooja A1
, Vinodh Krishnan2
and Geetha Manjunath3
, 1
Amazon Development
Centre India, 2
Oracle India Private Ltd, India and 3
HP Labs, India 1
299
Multi-Homing Enabled Cognitive Radio Based Inter-Vehicle Communication
System
Faisal Riaz1
, Kaleem Ahmed1
, Iftikhar Ahmad1
, Muhammad Ibrahim1
, Samreen
Ayaz1
, Rabia Rauf1
, Muhammad Kabeer1
, Naheed Akhtar1
, Jameel Ahmed2
and
Sadat Dar2
, 1
Mirpur University of Science and Technology, Pakistan and 2
HITEC
University Taxila Cantt, Pakistan 0
300
Ear Recognition and Occlusion
B. S. El-Desouky1
, M. El-Kady2
, M. Z. Rashad1
,and Mahmoud M.
Eid1
, 1
Mansoura University, Egypt and 2
Helwan University, Egypt 0
301
Computing Installation Parameters Of CCTV Cameras for Traffic
Surveillance
Pratishtha Gupta and G. N. Purohit, Amrita Dadhich, Banasthali Vidyapith, India 3
302
An Experimental Survey Towards Engaging Trustable Hypervisor Log
Evidence Within a Cloud Forensic Environment
Sean Thorpe, University of Technology, Kingston, Jamaica 4
303
Adaptive Backstepping Controller and Synchronizer Design for Arneodo
Chaotic System With Unknown Parameters
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical
University,India 13
304
R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)
Dhananjoy Dey1
, Noopur Shrotriya1
and Indranath Sengupta2
, 1
SAG,India
and 2
Jadavpur University,India 2
305
Denoising of Medical Ultrasound Images Using Spatial Filtering and
Multiscale Transforms
V N Prudhvi Raj1
and T Venkateswarlu2
, 1
VR Siddhartha Engineering
College,India and 2
SV University,India 3
29. 306
Shaping of Location Conscious Information
Palson Kennedy .R1
and Rajashekhara2
, 1
CMJ University,Chennai,India
and 2
Impact College of Engineering and Applied Sciences,India 1
307
Improved Spatial Gray Level Dependence Matrices for Texture Analysis
Olfa Ben Sassi, Lamia sellami, Mohamed Ben Slima, Khalil Chtourou, Ahmed Ben
Hamida, University of Sfax, Tunisia 10
2013
308
A Systematic Mapping Study on Business Process Variability
George Valenca1
, Carina Alves1
, Vander Alves2
, Nan Niu3
,1
Federal University of
Pernambuco (UFPE), Brazil,2
University of Brasilia,Brazil and 3
Mississippi State
University, USA. 27
309
A Neuro-Fuzzy Approach for the Fault Location Estimation of
Unsynchronized Two-Terminal Transmission Lines
Ramadoni Syahputra,Universitas Muhammadiyah Yogyakarta,Indonesia 45
310
Sobel Edge Detection Method to Identify and Quantify the Risk Factors for
Diabetic Foot Ulcers
Kunjam Nageswara Rao1
, P srinivasa Rao1
, Allam Appa Rao2
, G R
Sridhar3
,1
Andhra university, India, 2
University of Hydeabad, India and 3
Endocrine
& Diabetes centre,India. 2
311
Improving the Management of Cost and Scope in Software Projects Using
Agile Practices
Mariana de Azevedo Santos1
, Paulo Henrique de Souza Bermejo2
, Marcelo Silva
de Oliveira2
, Adriano Olimpio Tonelli2
, Enio Junior Seidel3
,1
Mitah Technologies,
Lavras, Brazil2
Universidade Federal de Lavras (UFLA), Brazil and 3
Universidade
Federal do Pampa (UNIPAMPA),Brazil. 7
312
An Evaluation Method of Research on Wearable Wireless Body Area
Network in Healthcare
Roberto Vito Rodrigues Filho1
, Renato Freitas Bulcao Neto1
, Bruno Oliveira
Silvestre1
, Leandro Luis Galdino de Oliveira1
, Rogerio Orlow de Oliveira2
and
Iwens Gervasio Sene Junior1
,1
Universidade Federal de Goias, Brazil
and 2
Pontificia Universidade Catolica de Goias,Brazil. 5
313
Pre-Segmentation for the Computer Aided Diagnosis System
Myat Mon Kyaw,University of Technology (Yatanarpon Cybercity), Myanmar 3
314
Extended Nymble: Method for Tracking Misbehaving Users Anonymosly
While Blocking
M.Durga Prasad1
, P.Chenna Reddy2
, Banoth Samya1
,1
Vijay Institute of Tech &
Sciences, India, 2
JNTUCE, Pulivendula, India and 13
Vijay college of Engineering
for women,India 0
315
Correlation Based VMS Placement Resource Provision
Zar Lwin Phyo and Thandar Thein,University of Computer Studies,Myanmar. 0
316
Classification Methods of Skin Burn Images
Malini Suvarna1
, Sivakumar2
and U C Niranjan3
,1
Atria Institute of Technology,
India, 2
Dr. Ambedkar Institute of Technology, India3
Director of Research, Manipal
Dot, India 2
317
Concept-Based Indexing in Text Information Retrieval
Fatiha Boubekeur1
and Wassila Azzoug2
,1
Mouloud Mammeri University of Tizi-
Ouzou, Algeria, 2
M'Hamed Bouguera, University of Boumerdes,Algeria 11
30. 318
Performance Analysis of Kernel-Based Virtual Machine
Sudha M, Harish G M, Nandan A, Usha J, R V College of Engineering,India. 1
319
Analysis of Digital Images Using Morphlogical Operations
Amalorpavam.G1
, Harish Naik T2
, Jyoti Kumari3
, Suresha M4
,1
Sambhram
Academy Of Mgmt. Studies,India, 2
Presidency College,India, 3
Acharya Institutes
(Aigs),India and 4
Jnana Sahyadri,Kuvempu University,India 7
320
An Ontology based Text Mining framework for R&D Project Selection
N.Arunachalam, E.Sathya, S.Hismath Begum and M.Uma Makeswari, Sri
Manakula Vinayagar Engineering College, India 3
321
Mining Closed Regular Patterns in Data Streams
M.Sreedevi1
and L.S.S.Reddy2
,1
K L University, India and 2
LBR College of
Engineering, India 2
322
Teaching Automated Test Data Generation Tools for C, C++ , and Java
Programs
Hitesh Tahbildar and Plabita Borbora, G. P. Khataniar, Assam Engineering
Institute, India 0
323
Adaptive Design of Controller and Synchronizer for Lu-Xiao Chaotic System
with Unknown Parameters
Sundarapandian Vaidyanathan,Vel Tech Dr. RR & Dr. SR Technical
University,India. 10
324
Hybrid Optical and Electrical Network Flows Scheduling in Cloud Data
Centres
Ibrahim Kabiru Musa and Stuart Walker, University of Essex, UK 0
325
An Investigation of the Energy Consumption by Information Technology
Equipments
Baharak Makki1
and Bahador Makki2
, 1
University of Agder, Norway
and 2
University of Bremen, Germany 0
326
Structural Coupling in Web 2.0 Applications
Maya Samaha Rupert, Notre Dame University Louaize, Lebanon 0
327
APPBACS: An Application Behavior Analysis And Classification System
Himanshu Pareek, P R L Eswari and Sarat Chandra Babu, Center for Development
of Advanced Computing, India 0
328
An Effective Method for Information Security Awareness Raising Initiatives
AliMaqousi1
, TatianaBalikhina1
, Michael Mackay2
, 1
Petra University, Jordan
and 2
Liverpool John Moores University, UK 5
329
Adaboost Ensemble with Simple Genetic Algorithm for Student Prediction
Model
AhmedSharaf ElDen1
, Malaka A. Moustafa2
, Hany M. Harb3
and
AbdelH.Emara3
, 1
Helwan University, Egypt, 2
Al-Alson Higher Institute of
Tourism, Egypt and 3
Azhar University, Egypt 11
330
Pixel Size Reduction Loss-Less Image Compression Algorithm
>Pralhadrao V Shantagiri and Saravanan K N, Christ University, India 7
331
Social Media News: Motivation, Purpose and Usage
Samaneh Beheshti-Kashi and Baharak Makki, University of Agder, Norway 6
332
A Heuristic Approach for Web-Service Discovery and Selection
Achraf Karray1
, Rym Teyeb2
and Maher Ben Jemaa3
, 1
Najran University,
KSA, 2
Higher Institute of the Technological Studies of Tataouine, Tunisia
and 3
National School of Engineers of Sfax, Tunisia 7
31. 333
Developing Mobile Agent for Intrusion Detection
Bambang Sugiantoro1
, Retantyo Wardoyo2
, Sri Hartati2
, Jazi Eko Istiyanto2
, 1
State
Islamic University Sunan Kalijaga, Indonesia and 2
Gadjah Mada University,
Indonesia 0
334
Requirements Engineering of a Web Portal Using Organizational Semiotics
Artifacts and Participatory Practices
Flavia Linhalis Arantes, State University of Campinas (UNICAMP), Brazil 2
335
Shadow Detection Using Tricolor Attenuation Model Enhanced with Adaptive
Histogram Equalization
Jyothisree V. and Smitha Dharan, College of Engineering Chengannur, India 4
336
Performance Analysis of Parallel Pollard's Rho Factoring Algorithm
Anjan K Koundinya, Harish G,Srinath N K, Raghavendra G E, Pramod Y V,
Sandeep R and Punith Kumar G, R V College of Engineering, India 1
337
Fuzzy Rule Base System for Software Classification
Adnan Shaout and Juan C. Garcia, The University of Michigan - Dearborn, United
States 0
338
Context-Based Barrier Notification Service Toward Outdoor Support for the
Elderly
Keisuke Umezu1
, Takahiro Kawamura2
and Akihiko Ohsuga2
, 1
NEC Corporation,
Japan and 2
University of Electro-Communications, Japan 5
339
Hyper-Mspace; Multidimensional Evolutionary-Agents Modeling and
Analysis
Mohamed Dbouk1
, Ihab Sbeity1
, Hamid Mcheick2
and Haytham
Douaihy3
, 1
Lebanese University, Beirut-Lebanon, 2
Universite du Quebec a
Chicoutimi, Canada and 3
Lebanese University-DSST, Beirut-Lebanon 2
340
A Novel Hybrid Method for the Segmentation of the Coronary Artery Tree in
2d Angiograms
>Daniel S.D. Lara1
, Alexandre W.C. Faria2
, Arnaldo de A. Araujo1
and D.
Menotti3
, 1
Univ. Fed. de Minas Gerais, Brazil, 2
UFMG, Brazil and 3
Universidade
Federal de Ouro Preto, Brazil 3
341
Modified Heuristic Time Deviation Technique for Job Sequencing and
Computation of Minimum Total Elapsed Time
N.Nagamalleswara Rao1
, O. Naga Raju2
and I. Ramesh Babu2
, 1
R.V.R & J. C.
College of Engineering, India and 2
Nagarjuna University, India 1
342
Security Threats on Cloud Computing Vulnerabilities
Te-Shun Chou, East Carolina University, U.S.A
58
343
Handover Management Scheme in LTE Femtocell Networks
Tijane Fatima Zohra Badri1,2
, Saadane Rachid1
, Mohammed Wahbi1
and
MbarkiSamir2
, 1
SIR2C2S/LASI-EHTP Casablanca, Morocco and 2
Ibn Tofail
University Kenitra, Morocco 8
344
Saasquality - A Method for Quality Evaluation of Software as a Service
(Saas)
Nemesio Freitas Duarte Filho1
, Clarindo Isaias Pereira da Silva e Padua1
, Paulo
Henrique de Souza Bermejo2
, Andre Luiz Zambalde2
, Urlan Salgado de
Barros3
, 1
Federal University of Minas Gerais, Brazil, 2
Federal University of
Lavras, Brazil and 3
Federal University of Parana, Brazil 2
32. 345
An Efficient Approach to Wavelet Image Denoising
Alaa A. Hefnawy and Heba A. Elnemr, Electronics Research Institute, Egypt 0
346
Towards A Good ABS Design for More Reliable Vehicles on the Roads
Afifa Ghenai, Mohamed Youcef Badaoui and Mohamed Benmohammed,
University of Constantine, Algeria 2
347
Designing of an efficient algorithm for identifying Abbreviation definitions in
biomedical Text
Shashank Singh1
, Gaurav Sharma2
Abdul Nazeer K A3
and Shalini Singh2
, 1
IBM
India Private limited, India, 2
School of Biochemical Engineering IIT (BHU), India
and 3
NIT, India 0
348
Labeled Generalized Stochastic Petri Net Based Approach for Web Services
Composition
Sofiane Chemaa, Mouna Bouarioua and Allaoua chaoui, University of Constantine,
Algeria 0
349
Bounded Ant Colony Algorithm Fortask Allocation on Anetwork of
Homogeneous Processorsusing a Primary Site (Bts-Aco)
Buthayna Al-Sharaa and Tamara Al-Qublan, AL Balqa Applied University, Jordan 3
350
Biomedical Image Transmission Based on Modified Feistal Algorithm
Jinu Elizabeth John, Saintgits College of Engineering, India 2
351
Intelligent Access Control Policies for Social Network Site
Saung Hnin Pwint Oo, University of Technology (Yatanarpon Cyber City),
Myanmar 2
352
A Review of Temporal Aspects of Hand Gesture Analysis Applied to
Discourse Analysis and Natural Conversation
Renata C. B. Madeo, Priscilla K. Wagner and Sarajane M. Peres, Universidade de
Sao Paulo, Brazil 9
353
A Tabu Search Algorithm With Efficient Diversification Strategy for High
School Timetabling Problem
Salman Hooshmand1
, Mehdi Behshameh2
and OmidHamidi1
, 1
Hamedan University
of Technology, Iran and 2
Islamic Azad University, Iran 0
354
Analysis of Elementary Cellular Automata Boundary Conditions
K. Salman, Middle Tennessee State University, USA 5
355
Design and Implementation of Repair-aware Test Flow for Multi-Memory
Gang Wang and Huajun Chen, Loongson Technology Corporation Limited, China 0
356
Vedivision – A Fast Bcd Division Algorithm Facilitated by Vedic
Mathematics
Diganta Sengupta1
Mahamuda Sultana2
and Atal Chaudhuri3
, 1
Future Institute of
Engineering and Management, India, 2
Swami Vivekananda Institute of Science and
Technology, India and 3
Jadavpur University, India 1
357
Integrations of ICT in Education Sector for the Advancement of the
Developing Country: Some Challenges and Recommendations-Bangladesh
Perspective
Mst. Shahnaj Parvin, International Islamic University, Bangladesh 7
358
Comparative Study of Backpropagation Algorithms in Neural Network Based
Identification of Power System
Sheela Tiwari1
, Ram Naresh2
and Rameshwar Jha3
, 1
Dr. B R Ambedkar National
Institute of Technology, India, 2
National Institute of Technology, India and 3
IET
Bhaddal Technical Campus, India 9
34. 373
A Privacy - Learning Objects Identity System for Smartphones Based on a
Virtual Learning Environment Database
LeThanhHieu, JinHai, DeQingZou and WangDaiBin, HuaZhong University of
Science and Technology, China 0
374
Systems Variability Modeling: A Textual Model Mixing Class and Feature
Concepts
Ola Younis1
, Said Ghoul1
, and Mohammad H. Alomari2
, 1
Philadelphia University,
Jordan and 2
Applied Science University, Jordan 3
375
Compact, “Fuzzy― Information
S.Balaji Vivek, Easwari Engineering College, India 0
376
The Principles of Humanism for MANETs
Md. Amir Khusru Akhtar1
and G. Sahoo2
, 1
Cambridge Institute of Technology,
India and 2
Birla Institute of Technology, India 0
377
The Application Wavelet Transform Algorithm in Testing ADC Effective
Number of Bits
Emad A. Awada, Applied Science University, Jordan 0
378
Introducing a Novel Fault Tolerant Routing Protocol in Wireless Sensor
Networks Using Fuzzy Logic
Mostafa Vakili Fard1
, Sayyed Majid Mazinani2
and Sayyed Ahmad
Hoseini3
, 1
Science and Research IAU, Iran, 2
Imam Reza University, Iran
and 3
Payam Noor University, Iran 2
379
Data Mining Model for the Data Retrieval from Central Server
Configuration
Srivatsan Sridharan, Kausal Malladi and Yamini Muralitharan, International
Institute of Information Technology - Bangalore, India 0
380
The Impact of Frequent Use Email When Creating Account at the Websites
on the Users Privacy and Security
Salwa Al-Samirrai, Zahra Fadhil Mohsen and Aysh Alhroob, Isra University,
Jordan 0
381
Molecular Solutions for the Set-Partition Problem on Dna-Based Computing
Sientang Tsai and Wei-Yeh Chen, Southern Taiwan University of Science and
Technology, Taiwan 1
382
Brazilian License Plate Detection Using Histogram of Oriented Gradients and
Sliding Windows
R. F. Prates1
, G. Cámara-Chávez1
, William R. Schwartz2
and D.
Menotti1
, 1
University Federal of Ouro Preto, Brazil and 2
University Federal of
Minas Gerais, Brazil 5
383
Distributed Cloud Computing Environment Enhanced With Capabilities for
Wide-Area Migration and Replication of Virtual Machines
Young-Chul Shim, Hongik University, Korea 0
384
Study On Decision-Making for Cafe Management Alternatives
Cheng-I Hou, Chung Hua University, Taiwan 2
385
Multi-Topic Multi-Document Summarizer
Fatma El-Ghannam1
and Tarek El-Shishtawy2
, 1
Electronics Research Institute,
Egypt and 2
Benha University, Egypt 15
386
An Sna-Bi Based System for Evaluating Virtual Teams: A Software
Development Project Case
Lamia Ben Hiba and Mohammed Abdou Janati Idrissi, Mohammed V Souissi
University, Morocco 0
387
Gesture Recognition Based Mouse Events
Rachit Puri, Samsung Research India, India 5
35. 388
A Prediction Model for Taiwan Tourism Industry Stock Index
Taiwan Han-Chen Huang and Fang-Wei Chang, Yu Da University of Science and
Technology, 0
2014
389
Cardinal Direction Relations in Qualitative Spatial Reasoning
Chaman L. Sabharwal and Jennifer L. Leopold, Missouri University of Science and
Technology, USA 3
390
Information Security Approach in Open Distributed Multi-Agent Virtual
Learning Environment
Zahi A.M. Abu Sarhan1
and As'ad Mahmoud As'ad Alnaser2
, 1
Applied Science
Private University, Jordan and 2
Al-Balqa' Applied University, Jordan 0
391
Information Security Risk Analysis Methods and Research Trends: AHP and
Fuzzy Comprehensive Method
Ming-Chang Lee, National Kaohsiung University of Applied Science, Taiwan 23
392
Evaluation of Image Segmentation and Filtering With Ann in the Papaya Leaf
Maicon A. Sartin11
and Alexandre C. R. da Silva2
, 1
UNEMAT, Brazil and 2
Ilha
Solteira, Brazil 2
393
Clustering Effects on Wireless Mobile Ad-Hoc Networks Performances
Gideon Naah and Edwin Boadu Okoampa, University of Electronic Science and
Technology of China, China 1
394
What Facilitates the Delivery of Citizen-Centric EGovernment Services in
Developing Countries: Model Development and Validation Through
Structural Equation Modeling
Yousef Elsheikh and Mohammad Azzeh, Applied Science University, Jordan 7
395
A Study on the Chain Restaurants Dynamic Negotiation Games of the
Optimization of Joint Procurement of Food Materials
Hung-Teng Chang, Yu Da University of Science and Technology, Taiwan 1
396
Shape-Based Plagiarism Detection for Flowchart Figures in Texts
Senosy Arrish, Fadhil Noer Afif, Ahmadu Maidorawa and Naomie Salim,
Universiti Teknologi Malaysia, Malaysia 8
397
A Study on the Dynamic Effect of Sports Promotion Strategy and
Effectiveness of NationalHealth Care in Taiwan
Tian-Syung Lan and Pin-Chang Chen, Yu Da University of Science and
Technology, Taiwan 0
398
Fulfillment Request Management (The approach)
Stylianos Gkoutzioupas, Univercity of the Aegean, Greece 0
399
Processing Obtained Email Data By Using Naïve Bayes Learning Algorithm
Valery V. Pelenko and Aleksandr V. Baranenko, St. Petersburg Research
University of Information Technologies, Russia 1
400
A Linear Algorithm for the Grundy Number of A Tree
Ali Mansouri and Mohamed Salim Bouhlel, Department of Electronic
Technologies of Information and Telecommunications Sfax, Tunisia 0
401
Research on Dynamic Effects of Employability of Vocational College Students
in Taiwan
Pin-Chang Chen, Yu Da University of Science and Technology, Taiwan 1
36. 402 Performance Variations in Profiling Mysql Server on the Xen Platform: Is It
Xen or Mysql?
Ashish Tapdiya and Yuan Xue, Vanderbilt University, United States
0
403
Design of a Virtual Ecological Pond for Motion-Sensing Game-Based
Learning
Wernhuar Tarng1
, Nien-Yin Lu1
, Yi-Syuan Shih1
and Hsin-Hun Liou2
, 1
National
Hsinchu University of Education, Taiwan and 2
National Central University,
Taiwan 1
404
Cloud Web-Based Operating System (Cloud Web Os)
Hesham Abusaimeh, Applied Science University, Jordan 1
405
An Adaptive Framework for Enhancing Recommendation Using Hybrid
Techniques
Radhya Sahal, SaharSelim and Abeer ElKorany, Cairo University, Egypt 1
406
Estimation of Optimized Energy and Latency Constraint for Task Allocation
in 3d Network on Chip
Vaibhav Jha1
, Mohit Jha2
and G K Sharma1
, 1
ABV- Indian Institute of Information
Technology and Management, India and 2
Jabalpur Engineering College, India 1
407
Case-Based Reasoning for Explaining Probabilistic Machine Learning
Tomas Olsson1,2
, Daniel Gillblad2
, Peter Funk1
, and Ning Xiong1
, 1
Mälardalens
University, Sweden and 2
SICS Swedish ICT, Sweden 4
408
Business Bankruptcy Prediction Based on Survival Analysis Approach
Ming-Chang Lee, National Kaohsiung University of Applied Science, Taiwan 3
409
Recognition and Ranking Critical Success Factors of Business Intelligence in
Hospitals - Case Study: Hasheminejad Hospital
Marjan Naderinejad, Mohammad Jafar Tarokh and Alireza Poorebrahimi, Islamic
Azad University, Iran 3
410
Design and Implementation of a Personal Super Computer
Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi Arabia 0
411
Output Privacy Protection With Pattern-Based Heuristic Algorithm
P.Cynthia Selvi1
and A.R.Mohammed Shanavas2
, 1
KNGA College(W), India
and 2
Jamal Mohamed College, India 3
412
Change Management and Version Control of Scientific Applications
Bojana Koteska and Anastas Mishev, Ss. Cyril and Methodius University,
Macedonia 1
413
Advanced Authentication Scheme Using a Predefined Keystroke Structure
Abdulameer K. Hussain and Mohammad M. Alnabhan, Jerash University, Jordan 1
414
The Impact of Knowledge-Based Trust (Kbt) on The Adoption and
Acceptability of Cashless Economy in Nigeria
Galadima, Talatu O.1
, Akinyemi, Ibidapo O.2
, and Asani, Emmanuel O.3
, 1
Federal
Polytechnic, Nigeria, 2
Covenant University, Nigeria and 3
Landmark University,
Nigeria 1
37. 415
Sharing of Cluster Resources among Multiple Workflow Applications
Uma Boregowda1
and Venugopal Chakravarthy2
, 1
Malnad College of Engineering,
India and 2
Sri Jayachamarajendra College of Engineering, India 0
416
Review of Closed Circuit Television (CCTV) Techniques for Vehicles Traffic
Management
Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi Arabia 8
417
State of The Art of Learning Styles-Based Adaptive Educational Hypermedia
Systems (Ls-Baehss)
Ahmed Al-Azawei and Atta Badii, School of Systems Engineering, UK 17
418
Massive Parallelism With Gpus for Centrality Ranking in Complex Networks
Frederico L. Cabral, Carla Osthoff, Rafael Nardes and Daniel Ramos, Laboratório
Nacional de Computação CientÃfica, Brazil 1
419
Performance Analysis of Wind Turbine as a Distributed Generation Unit In
Distribution System
Ramadoni Syahputra1,2
, Imam Robandi1
and Mochamad Ashari1
, 1
Institut
Teknologi Sepuluh Nopember, Indonesia and 2
Universitas Muhammadiyah
Yogyakarta, Indonesia 60
420
Cloud Computing Security through Symmetric Cipher Model
Subramanian Anbazhagan1
and K.Somasundaram2
, 1
Karpagam University, India
and 2
Jaya Engineering College, India 4
421
Enhancing the Matrix Transpose Operation Using Intel Avx Instruction Set
Extension
Ahmed Sherif Zekri1,2
, 1
Alexandria University, Egypt and 2
Beirut Arab University,
Lebanon 1
422
Review of Monitoring Tools for E-Learning Platforms
Ali Alowayr and Atta Badii, Reading University, UK 4
423
Intelligent Fatigue Detection and Automatic Vehicle Control System
Monali Gulhane and P.S.Mohod, RTMN University, India 0
424
Short Term Load Forecasting System Based on Support Vector Kernel
Methods
Lal Hussain, M. Sajjad Nadeem and Syed Ahsen Ali Shah, University of Azad
Jammu and Kashmir, Pakistan 0
425
Employee Performance Appraisal System Using Fuzzy Logic
Adnan Shaout1
and Mohamed Khalid Yousif2
, 1
The University of Michigan, USA
and 2
Sudan University of Science and Technology, Sudan 7
426
Research on the Effect of Applying Multimedia to the Instruction of Rational
Emotion Behavior Therapy for Middle School Students Emotional Control
Chen-Feng Wu, Pin-Chang Chen and Yu-Tzu Chen, Yu Da University of Science
and Technology, Taiwan 1
427
Software Architectural Patterns for Service Composition
Ghadeer Ghazal1
, Amjad. Hudaib1
and Waffa Maitah2
, 1
The University of Jordan,
Jordan and 2
Al al-Bayt University, Jordan 0
428
One-Dimensional Vector Based Pattern Matching
Y.M.Fouda, Mansoura University, Egypt 2
38. 429
Dependable Online Appointment Booking System for Nhis Outpatient in
Nigerian Teaching Hospitals
Adebayo Peter Idowu1
, Olajide Olusegun Adeosun2
and Kehinde Oladipo
Williams3
, 1
Obafemi Awolowo University, Nigeria, 2
Ladoke Akintola University
of Technology, Nigeria and 3
McPherson University, Nigeria 4
430
Co-Emulation of Scan-Chain Based Designs Utilizing SCE-MI Infrastructure
Bill Jason Tomas1
, Yingtao Jiang2
and Mei Yang2
, 1
Cadence Design System, USA
and 2
University of Nevada, USA 0
431
An Improved Particle Filter Tracking System Based on Colour and Moving
Edge Information
Chao-Ju Chen1
, Wernhuar Tarng1
and Kuo-Hua Lo2
, 1
National Hsinchu University
of Education, Taiwan and 2
Industrial Technology Research Institute, Taiwan 1
432
Real Time Optimized Traffic Management Algorithm
Partha Sarathi Chakraborty, Prajeeth Nair, Pranshu Raj Sinha and Ishan Kumar
Behera, SRM University, India 3
433
A Generic Model for Disease Outbreak Notification Systems
Farag Azzedin, Jaweed Yazdani, Salahadin Adam and Mustafa Ghaleb, King Fahd
University of Petroleum and Minerals, Saudi Arabia 1
434
Square Grid Points Coveraged by Connected Sources With Coverage Radius
of One on a Two-Dimensional Grid
Pattama Longani, Chiang Mai University, Thailand 0
435
Structural and Hardware Complexities of Microprocessor Design According
to Moore’s Law
Haissam El-Aawar, Lebanese International University – LIU, Lebanon 4
436
Remote Real - Time Process and Production Monitoring Mechanism of
Lighting Parts for Outdoor Recreation
Cheng-I Hou1
, Han-Chen Huang2
, Tian-Syung Lan1
and Wei-Min Teng1
, 1
Yu Da
University of Science and Technology, Taiwan and 2
Chung Hua University,
Taiwan 0
437
Language Independent Document Retrieval Using Unicode Standard
Vidhya M and Aji S, University of Kerala, India 0
438
A Study of The Effects of Electronic Textbook-Aided Remedial Teaching on
Students’ Learning Outcomes at the Optics Unit
Chen-Feng Wu, Pin-Chang Chen and Shu-Fen Tzeng, Yu Da University of Science
and Technology, Taiwan 2
439
A Guide to Deal With Uncertainties in Software Project Management
Marcelo Marinho1,2
, Suzana Sampaio2
, Telma Lima2
and Hermano de
Moura1
, 1
Federal University of Pernambuco (UFPE), Brazil and 2
Federal Rural
University of Pernambuco (UFRPE), Brazil 6
440
Intelligent Algorithms for Cell Tracking and Image Segmentation
Ashraf A. Aly1
, Safaai Bin Deris2
and Nazar Zaki3
, 1
Al khawarizmi College,
UAE, 2
Universiti Teknologi Malaysia, Malaysia and 3
UAE University, UAE 2
441
Variability Modeling for Customizable Saas Applications
Ashraf A. Shahin, Institute of Statistical Studies & Research, Cairo University,
Egypt 3
442
Systematic Review on Project Actuality
Suzana Cândido de Barros Sampaio1,2
, Marcelo Marinho1,2
, Hermano
Moura1
, 1
Federal University of Pernambuco (UFPE), Brazil and 2
Federal Rural
University of Pernambuco (UFRPE), Brazil 3