A Preprocessing Model for Hand-Written Arabic Texts Based on Voronoi Diagrams[Pdf]
Atallah M.Al-Shatnawi, Al al-Bayt University, Jordan |
An Entropic Optimization Technique in Heterogeneous Grid Computing Using Bionic Algorithms[Pdf]
Saad M.Darwish, Adel A.El-zoghabi and Moustafa F.Ashry, Institute of Graduate Studies and Research, Egypt |
New Symmetric Encryption System Based on Evolutionary Algorithm[Pdf]
A.Mouloudi, Ibn Tofail University, Morocco |
UML Modeling and System Architecture for Agent Based Information Retrieval[Pdf]
D.Muhammad Noorul Mubarak and Philomina Simon, University of Kerala, India |
The Effect of Implementing of Nonlinear Filters for Enhancing Medical Images Using MATLAB[Pdf]
Mohamed Y.Adam1, Mozamel M.Saeed2 and Al Samani A.Ahmed3, 1King Saud University, KSA, 2Prince Sattam Bin Abdul-Aziz University, KSA and 3Al Neelain University College of Computer Science & Information Technology, Sudan |
Two-Layer Secure Prevention Mechanism for Reducing E-Commerce Security Risks[Pdf]
Sen-Tarng Lai, Shih Chien University, Taiwan |
Congestion Aware Spray and Wait Protocol: A Congestion Control Mechanism for the Vehicular Delay Tolerant Network[Pdf]
Chuka Oham and Milena Radenkovic, University of Nottingham, United Kingdom |
Automated Management of Pothole Related Disasters Using Image Processing and Geotagging[Pdf]
Manisha Mandal, Madhura Katageri, Mansi Gandhi, Navin Koregaonkar and Sharmila Sengupta, Vivekanand Education Society's Institute of Technology, India |
A Routing Mechanism Based on Social Networks and Betweenness Centrality in Delay-Tolerant Networks[Pdf]
Zhang Huijuan and Liu Kai, Tongji University, China |
Comparative Analysis of Single-Core and Multi-Core Systems[Pdf]
Ogundairo Johnson1 and Omosehinmi Dinyo2, 1National Open University of Nigeria (NOUN), Nigeria and 2Federal University of Technology, Nigeria |
Reducing Security Concerns when Using Cloud Computing in Online Exams Case Study: General Associate Degree Examination (Shamel) in Jordan[Pdf]
Mohamad M. Al-Laham, Al-Balqa Applied University, Jordan |
A Software Tool for Experimental Study Leap Motion[Pdf]
Georgi Krastev and Magdalena Andreeva, Ruse University, Bulgaria |
Service Oriented Quality Requirement Framework for Cloud Computing[Pdf]
Madhushi Rathnaayke and Janaka I Wijayanayake, University of Kelaniya, Sri Lanka |
A Database System Security Framework[Pdf]
Habiba Muhammad Sani1 and Muhammad Mika'ilu Yabo2, 1Usmanu Danfodiyo University, Nigeria and 2Shehu Shagari College of Education, Nigeria |
Hadoop Mapreduce Performance Enhancement Using In-Node Combiners[Pdf]
Woo-Hyun Lee, Hee-Gook Jun and Hyoung-Joo Kim, Seoul National University, South Korea |
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One[Pdf]
Mohammad Ehab Ragab1 and Kin Hong Wong2, 1The Electronics Research Institute, Egypt and 2Computer Science and Engineering Department, Shatin, Hong Kong |
Integrated Project Management Measures in CMMI[Pdf]
Mahmoud Khraiwesh, Zarqa University, Jordan |
Formal Verification of Distributed Checkpointing Using Event-B[Pdf]
Girish Chandra1, Raghuraj Suryavanshi2 and Divakar Yadav1, 1Institute of Engineering & Technology, India and 2Pranveer Singh Institute of Technology, India |
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classification[Pdf]
Nezha Hamdi1, Khalid Auhmani2, Moha M'rabet Hassani1, 1Cadi Ayyad University, Morocco and 2National School of Applied Sciences, Morocco |
Formal Specification and Verification of Total Order Broadcast through Destination Agreement Using Event-B[Pdf]
Arun Kumar Singh and Divakar Yadav, Institution of Engineering and Technology, India |
Automatic Extraction of Spatio-Temporal Information from Arabic Text Documents[Pdf]
Abdelkoui Feriel1 and Kholladi Mohamed Khireddine2, 1MENTOURI 2 University, Algeria and 2El oued University, Algeria |
Encryption-Decryption RGB Color Image Using Matrix Multiplication[Pdf]
Mohamad M.AL-Laham, Zarqa University, Jordan |
A New Approach to Parts of Speech Tagging in Malayalam[Pdf]
D.Muhammad Noorul Mubarak, Sareesh Madhu and S A Shanavas, University of Kerala, India |
Predictive and Statistical Analyses for Academic Advisory Support[Pdf]
Mohammed AL-Sarem, Taibah University, Kingdom of Saudi Arabia |
An Overview on the Use of Data Mining and Linguistics Techniques for Building Microblog-Based Early Detection Systems in the Healthcare Sector[Pdf]
Haider M. Habeeb1 and Nabeel Al-A'araji2, 1University of Babylon, Iraq and 2Ministry of Higher Education and Scientific Research, Iraq |
Clustering of Deep WebPages: A Comparative Study[Pdf]
Muhunthaadithya C, Rohit J.V, Sadhana Kesavan1 andE.Sivasankar, National Institute of Technology Trichy, India |
Applying an Arabic Conversational Agent in the Jordanian E-Government[Pdf]
Mohammad Hijjawi and Hesham Abusaimeh, Applied Science University, Jordan |
Collaborative Bibliographic System for Review/Survey Articles[Pdf]
Mutaz Beraka, Abdullah Al-Dhelaan and Mznah Al-Rodhaan, King Saud University, Saudi Arabia |
Unique Fundamentals of Software Measurement and Software Metrics in Software Engineering[Pdf]
K.P.Srinivasan, C.B.M.College, India |
Sensitivity Analysis of Information Retrieval Metrics[Pdf]
Marina Marjanovic-Jakovljevic, Singidunum University, Serbia |
Consideration of Human Computer Interaction in Robotic Field[Pdf]
Tarek Toumi and Abdelmadjid Zidani, University of Batna, Algeria |
Review of Lane Detection and Tracking Algorithms in Advanced Driver Assistance System[Pdf]
Ammu M Kumar and Philomina Simon, University of Kerala, India |
On the Image Quality and Encoding Times of LSB, MSB and Combined LSB-MSB Steganography Algorithms Using Digital Images[Pdf]
Solomon O.Akinola and Adebanke A.Olatidoye, University of Ibadan, Nigeria |
Symmetrical Weighted Subspace Holistic Approach for Expression Recognition[Pdf]
G.P.Hegde1, M.Seetha2 and Nagaratna Hegde3, 1Shree Dharmasthala Manjunatheshwara Institute of Technology, India and 2G.Narayanamma Institute of Technology and Science, India and 3Vasavi College of Engineering, India |
Applying the Technology Acceptance Model to Understand Social Networking Sites (SNS) Usage: Impact of Perceived Social Capital[Pdf]
Waleed Al-Ghaith, Shaqra University, Saudi Arabia |
Map-Reduce Implementations: Survey and Performance Comparison[Pdf]
Zeba Khanam and Shafali Agarwal, JSS Academy of Technical Education, India |
A Hybrid Copy-Move Forgery Detection Technique Using Regional Similarity Indices[Pdf]
Rani Susan Oommen1 and Jayamohan M2, 1Sree Buddha College of Engineering for Women, India and 2College of Applied Science, India |
An Effective and Efficient Feature Selection Method for Lung Cancer Detection[Pdf]
R.Kishore, K.L.N College of Engineering, India |
Arabic Language Challenges in Text Based Conversational Agents Compared to The English Language[Pdf]
Mohammad Hijjawi and Yousef Elsheikh, Applied Science University, Jordan |
Fuzzy Image Segmentation Using Validity Indexes Correlation[Pdf]
Daniel Fernando Tello Gamarra, Universidade Federal de Santa Maria (UFSM), Brazil |
Instructor Perspectives of Mobile Learning Platform: An Empirical Study[Pdf]
Muasaad Alrasheedi, Luiz Fernando Capretz and Arif Raza, Western University, Canada |
A Study on Weed Discrimination Through Wavelet Transform, Texture Feature Extraction and Classification[Pdf]
D.Ashok Kumar1 and P.Prema2, 1Government Arts College, India and 2Agricultural College and Research Institute, India |
Corrosion Control Approach Using Data Mining[Pdf]
StephenDapiap, Gregory Wajiga, Michael Egwurube, Musa Kadzai, Nathaniel Oye and ThankGodAnazodo, Federal University of Technology Yola, Nigeria |
A Clustering Technique for Email Content Mining[Pdf]
Deepa Patil and Yashwant Dongre, Vishwakarma Institute of Information Technology, India |
Comparison of Wavelet Network and Logistic Regression in Predicting Enterprise Financial Distress[Pdf]
Ming-Chang Lee1 and Li-Er Su2, 1National Kaohsiung University of Applied Sciences, Taiwan and 2Shih Chien University, Taiwan |
Increasing the Transistor Count by Constructing A Two-Layer Crystal Square on A Single Chip[Pdf]
Haissam El-Aawar, Lebanese International University - LIU, Lebanon |
Comparison of Different Transmitters Using 1550nm and 10000nm in FSO Communication Systems[Pdf]
Poonam Singal, Saloni Rai, Rahul Punia and Dhrove Kashyap, Deenbandhu Chhotu Ram University of Science & Technology, India |
Multi-Parameter Based Performance Evaluation of Classification Algorithms[Pdf]
Saurabh Kr.Srivastava and Sandeep Kr.Singh, JIIT University, India |
Evaluation of Two-Level Global Load Balancing Framework in Cloud Environment[Pdf]
Po-Huei Liang and Jiann-Min Yang, National Cheng Chi University, Taiwan |
An Extension of Protege for an Automatic Fuzzy-Ontology Building Using Clustering and FCA[Pdf]
Aloui Amira and Grissa Touzi Amel, Universite Tunis El Manar, Tunisia |
Towards a System Dynamics Modeling Method Based on Dematel[Pdf]
Fadwa Chaker, Abdellah El Manouar and Mohammed Abdou Janati Idrissi, Mohammed V University, Morocco |
Preprocessing for PPM: Compressing Utf-8 Encoded Natural Language Text[Pdf]
William J.Teahan1 and Khaled M.Alhawiti2, 1University of Wales, Bangor, UK and 2University of Tabuk, KSA |
Thermal Control in 3D Liquid Cooled Processors Via Hotspot Separation And Thermoelectric Cooling[Pdf]
Yue Hu, Shaoming Chen, Lu Peng, Edward Song and Jin-Woo Choi, Louisiana State University, USA |
SFAMSS:A Secure Framework for ATM Machines Via Secret Sharing[Pdf]
Zeinab Ghafari, Taha Arian and Morteza Analoui, University of Science and Technology, Iran |
Performance Measurements of Feature Tracking and Histogram Based Traffic Congestion Algorithms[Pdf]
Ozgur Altun and Kenan Aksoy, Proline Bilisim Sistemleri, Turkey |
Research on Decision Making Regarding High-Business-Strategy Café Menu Selection[Pdf]
Cheng-I Hou1, Han-Chen Huang2, Yao-Hsu Tsai2 and Chih-Yao Lo1, 1Yu Da University of Science and Technology, Taiwan and 2Chung Hua University, Taiwan |
Prefix-Based Labeling Annotation for Effective Xml Fragmentation[Pdf]
Kok-Leong Koong, Su-Cheng Haw, Lay-Ki Soon and Samini Subramaniam, Multimedia University, Malaysia |
PROP - Patronage of PHP Web Applications[Pdf]
Sireesha C, Jyostna G, Raghu Varan P and P R L Eswari, Centre for Development of Advanced Computing, India |
Quantum Clustering-Based Feature Subset Selection for Mammographic Image Classification[Pdf]
N.Hamdi, K.Auhmani and M.M.Hassani, Cadi Ayyad University, Morocco |
Taxonomy of Optimization Approaches of Resource Brokers in Data Grids[Pdf]
Rafah M.Almuttairi, University of Babylon, Iraq |
A Survivability Model for Saudi ICT Startups[Pdf]
Sara Almakenzi, Arif Bramantoro and Waleed Rashideh, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia |
Emotion Interaction with Virtual Reality Using Hybrid Emotion Classification Technique toward Brain Signals[Pdf]
Faris A.Abuhashish1, Jamal Zraqou2, Wesam Alkhodour2, Mohd S.Sunar1 and Hoshang Kolivand1, 1Universiti Teknologi Malaysia, Malaysia and 2Isra University, Jordan |
Prediction for Short-Term Traffic Flow Based on Optimized Wavelet Neural Network Model[Pdf]
Tao Li and Liu Sheng, Shanghai University of Engineering Science, China |
Iris Recognition for Personal Identification Using Lamstar Neural Network[ Pdf ]Â
Shideh Homayon, University of California, USA |
An Employing a Multistage Fuzzy Architecture for Usability of Open Source Software[ Pdf ]Â
Roba Al-Soub, Mutah University, Jordan |
Analysis of Selection Indicators of Badminton Players by the Delphi Method and Analytic Hierarchy Process[ Pdf ]Â
Han-Chen Huang1, Chun-Ta Lin2 and Chia-Sen Hu3, 1Chung Hua University, Taiwan, 2Yu Da University of Science and Technology, Taiwan and 3Guang Hua Junior High School, Taiwan |
Cross Platform App : A Comparative Study[ Pdf ]Â
Paulo R.M.de Andrade1, Adriano B.Albuquerque1, Otávio F. Frota2, Robson V Silveira2 and Fatima A. da Silva2, 1University of Fortaleza - UNIFOR Fortaleza - CE, Brazil and 2College Estacio FIC of Ceara Fortaleza - CE, Brazil |
Performance Comparison Of Hybrid Wavelet Transforms Formed Using Dct, Walsh, Haar and DKT in Watermarking[ Pdf ]Â
H.B.Kekre1, Tanuja Sarode2 and Shachi Natu1, 1NMIMS University, India and 2Mumbai University, India |
Improving Initial Generations in PSO Algorithm for Transportation Network Design Problem[ Pdf ]Â
Navid Afkar and Abbas Babazadeh, University of Tehran, Iran |
New Approach in Symmetric Block Cipher Security Using a New Cubical Technique[ Pdf ]Â
Ali M Alshahrani and Stuart Walker, University of Essex, United Kingdom |
The Analysis of the Time Table Structure Within a Student Information System (Sis)[ Pdf ]Â
Issa S.I.Ottoum, Alzaytoonah University of Jordan, Jordan |
A Rule Based Approach towards Detecting Human Temperament[ Pdf ]Â
Shomoye Abiodun R1 and ShomoyeAdekunle I2, 1Oduduwa University, Nigeria and 2Federal Polytechnic, Nigeria |
An Iterative Morphological Decomposition Algorithm for Reduction Of Skeleton Points[ Pdf ]Â
A.Sri Krishna1 and G.L.K.Vasista2, N.Neelima1, 1R.V.R& J.C College of Eng. India and 2AMRITA School of Eng., India |
Analysis of Key Considerations of the Public When Choosing Recreational Activities[ Pdf ]Â
Han-Chen Huan11, Chun-Ta Lin2 and Chi-Han Chuang3, 1Chung Hua University, Taiwan, 2Yu Da University of Science and Technology, Taiwan and 3Da-Tung Elementary School, Taiwan |
Efficient Data Protection for Enterprise Data Centers[ Pdf ]Â
Khaled Aldossari, EXPEC Computer Center, Saudi Arabia |
Authoring System of Drill & Practice Elearning Modules for Hearing Impaired Students[ Pdf ]Â
Karim Q Hussein, Mustansiriyah University, Iraq |
A Novel Methodology for Constructing Rule-Based Naïve Bayesian Classifiers[ Pdf ]Â
Abdallah Alashqur, Applied Science University, Jordan |
Testability Measurement Model for Object Oriented Design (Tmmood)[ Pdf ]Â
Abdullah1, M.H.Khan2, Reena Srivastava3, 1BBD University, India, 2I.E.T, India and 3BBD University, India |
|