ISSN 2220-9085 (online)
ISSN 2412-3587 (print)

Previous Issue (Vol. 2, No. 1), 2012

PDF Icon

SINGULAR POINT DETECTION FOR EFFICIENT FINGERPRINT CLASSIFICATION

Author/s:  Ali Ismail Awad, Kensuke Baba
Pages:  1-7
PDF Icon
PDF Icon

MULTI-PEOPLE TRACKING ACROSS MULTIPLE CAMERAS

Author/s:  Faouzi Alaya Cheikh, Sajib Kumar Saha, Victoria Rudakova, Peng Wang
Pages:  23-33
PDF Icon
PDF Icon

A REDUCED RANK STAP AND STAGGERED PRF FOR MULTIPLE TARGETSITUATIONS

Author/s:  Samira Dib, Mourad Barkat, IEEE Fellow, Jean-Marie Nicolas, Morad Grimes
Pages:  52-69
PDF Icon

SECURE COMMUNICATION BASED ON QI HYPER-CHAOS

Author/s:  Dennis Luke Owuor, Guoyuan Qi
Pages:  70-80
PDF Icon
PDF Icon
PDF Icon

PUBLISHING WEB SERVICES WHICH ENABLE SYSTEMATIC SEARCH

Author/s:  Vitezslav Nezval
Pages:  103-112
PDF Icon

INFRASTRUCTURE SHARING: A COST EFFECTIVE ALTERNATIVE FOR RESILIENCY IN 4G-LTE MOBILE NETWORKS

Author/s:  Venmani Daniel Philip, Yvon GOURHANT, Djamal ZEGHLACHE
Pages:  113-126
PDF Icon

CYBER FORENSICS: COMPUTER SECURITY AND INCIDENTRESPONSE

Author/s:  Virginiah Sekgwathe, Mohammad Talib
Pages:  127-137
PDF Icon

INTELLIGENT SYSTEM FOR PERSONALIZING STUDENTS' ACADEMIC BEHAVIORS- A CONCEPTUAL FRAMEWORK

Author/s:  Azwa Abdul Aziz, Wan Mohd Rizhan Wan Idris, Hasni Hassan, Julaily Aida Jusoh
Pages:  138-153
PDF Icon

WEB INTERACTIVE MULTIMEDIA TECHNOLOGY: IMPLEMENTATION FROM TWO PERSPECTIVES

Author/s:  Asma Md Ali, Joan Richardson
Pages:  154-166
PDF Icon

EMPLOYING SEMANTIC WEB TECHNOLOGIES IN FINANCIAL INSTRUMENTS TRADING

Author/s:  Dejan Lavbic, Marko Bajec
Pages:  167-182
PDF Icon

DNA BASE DATA HIDING ALGORITHM

Author/s:  Mohammad Reza Abbasy, Pourya Nikfard, Ali Ordi, Mohammad Reza Najaf Torkaman
Pages:  183-192
PDF Icon

AN ALGORITHM FOR DETECTING CYCLES IN UNDIRECTED GRAPHS USING CUDA TECHNOLOGY

Author/s:  Maytham Safar, Fahad Mahdi, Khaled Mahdi
Pages:  193-212
PDF Icon

METHOD FOR GENERATING DC-DC CONVERTERS WITH REQUIRED CHARACTERISTICS

Author/s:  Murad Ahmed Ali Taher
Pages:  213-223
PDF Icon

INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USING DNA STEGANOGRAPHY

Author/s:  Mohammad Reza Najaf Torkaman, Nazanin Sadat Kazazi, Azizallah Rouddini
Pages:  224-235
PDF Icon

A META-MODELING AND GRAPH GRAMMAR APPROACH FOR MODELING AND ANALYSIS OF E-ENTREPRENEURSHIP SYSTEMS

Author/s:  Mouna Bouarioua, Allaoua Chaoui, Raida Elmansouri
Pages:  236-245
PDF Icon

EFFICIENT INFORMATION DISSEMINATION AND COLLECTION STRATEGIES FOR WIRELESS SENSOR NETWORKS

Author/s:  S. K. Makki, B. Sun1, L. Osborne, A. Husain, James Carnley
Pages:  246-257
PDF Icon

SUPPLIER SELECTION BASED ON MULTIPLE CRITERIA

Author/s:  Reza Allahyari Soeini, Laleh Tashakor, Javad Tashakori Bafghi, Mohammad Mokhtari, Amin Vakili
Pages:  258-273
PDF Icon

A STUDY OF THE TREND OF SMARTPHONE AND ITS USAGE BEHAVIOR IN MALAYSIA

Author/s:  Mohd Azam Osman, Abdullah Zawawi Talib, Zainal Abidin Sanusi, Tan Shiang-Yen, Abdullah Sani Alwi
Pages:  274-285
PDF Icon

PERFORMANCE INVESTIGATIONS OF SOME ACTIVE QUEUE MANAGEMENT TECHNIQUES USING SIMULATION

Author/s:  Hussein Abdel-jaber, Fadi Thabtah, Amjad M Daoud,Jafar Ababneh, Mahmoud Baklizi
Pages:  286-301
PDF Icon

REALITY OF ALIGNING IT WITH BUSINESS IN CZECH ORGANIZATIONS

Author/s:  Renata Kunstova
Pages:  302-311
PDF Icon

PUBLICATIONS' CLASSIFICATION ANALYSIS USING CONCEPT LATTICES

Author/s:  Saleh Alwahaishi, Jan Martinovic, Vaclav Snasel
Pages:  312-323