| Information Security Plan for Flight Simulator Applications |
| Jason Slaughter1 and Syed (Shawon) M. Rahman1,2, 1Capella University, USA and 2University of Hawaii-Hilo, USA |
| Volume : 3 volume number : 3 pdf |
| Common Phases of Computer Forensics Investigation Models |
| Yunus Yusoff, Roslan Ismail and Zainuddin Hassan, Universiti Tenaga Nasional, Malaysia |
| Volume : 3 volume number : 3 pdf |
| Comparison and Analysis of Watermarking Algorithms in Color Images - Image Security Paradigm |
| D. Biswas1, S. Biswas2, P.P. Sarkar2, D. Sarkar2, S. Banerjee1 and A. Pal1, 1Academy of Technology - Hoogly, India and 2University of Kalyani, India |
| Volume : 3 volume number : 3 pdf |
| Evolutionary Neural Networks algorithm for the Dynamic Frequency Assignment Problem |
| Jamal Elhachmi and Zouhair Guennoun, Mohammadia School of Engineers (EMI), Morocco |
| Volume : 3 volume number : 3 pdf |
| Optimal Self Correcting Fault Free Error Coding Technique in Memory Operation |
| Harikishore .Kakarla1, Madhavi Latha .M2 and Habibulla Khan1, 1KL University, India and 2JNTUH - Hyderabad, India |
| Volume : 3 volume number : 3 pdf |
| Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE) |
| Abderrahim BOUROUIS1,Mohamed FEHAM1 and Abdelhamid BOUCHACHIA2, 1Abou-bekr BELKAID University, Algeria and 2University of Klagenfurt, Austria |
| Volume : 3 volume number : 3 pdf |
| A Review on Elliptic Curve Cryptography for Embedded Systems |
| Rahat Afreen1 and S.C. Mehrotra2, 1Tom Patrick Institute of Computer & I.T - Rauza Bagh, India and 2Dr. B.A.M. University, India |
| Volume : 3 volume number : 3 pdf |
| Statistical Analysis on Software Metrics Affecting Modularity in Open Source Software |
| Andi Wahju Rahardjo Emanuel1, Retantyo Wardoyo2, Jazi Eko Istiyanto2 and Khabib Mustofa2, 1Maranatha Christian University, Indonesia and 2Gadjah Mada University, Indonesia |
| Volume : 3 volume number : 3 pdf |
| Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government |
| Md.Headayetullah, G.K. Pradhan, Sanjay Biswas and B. Puthal, SOAU - Bhubaneswar, India |
| Volume : 3 volume number : 3 pdf |
| Hybrid of Particle Swarm Optimization with Evolutionary Operators to Fragile Image Watermarking Based DCT |
| Sawsan Morkos Gharghory, Electronics Research Institute - Cairo, Egypt |
| Volume : 3 volume number : 3 pdf |
| Image Retrieval using Bit-plane Pixel Distribution |
| N S T Sai1 and R C Patil2, 1Tech Mahindra Limited - Mumbai, India and 2NMIMS University, India |
| Volume : 3 volume number : 3 pdf |
| Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network |
| Al Mutaz M. Abdalla1, Safaai Dress1 and Nazar Zaki2, 1Universiti Teknologi - Malaysia, India and 2UAE University, UAE |
| Volume : 3 volume number : 3 pdf |
| Effective Independent Quality Assessment using IV&V |
| Pathanjali Sastri Akella1 and K. Nageswara Rao2, 1V.R.Siddhartha Engineering College, India and 2P.V.P.Siddhartha Institute of Technology, India |
| Volume : 3 volume number : 3 pdf |
| E-Learning personalization based on Dynamic learners' preference |
| Essaid El Bachari, El Hassan Abelwahed and Mohammed El Adnani, University Cadi Ayyad, Morocco |
| Volume : 3 volume number : 3 pdf |
| An LMS Based Blind Source Separation Algorithm Using A Fast Nonlinear Autocorrelation Method |
| Behzad Mozaffari Tazehkand, University of Tabriz, Iran |
| Volume : 3 volume number : 3 pdf |
| A Novel Technique for Back-Link Extraction and Relevance Evaluation |
| Pooja Gupta1, A.K. Sharma2 and Divakar Yadav3, 1MAIT - New Delhi, India, 2YMCA University of Science and Technology, India and 3JIITU - Noida, India |
| Volume : 3 volume number : 3 pdf |
| Electronic Commerce in Web 3.0: The Evidence from Emerging Economics |
| Xi Zhang1 and Doug Vogel2, 1Chinese Academy of Sciences, China and 2City University of Hong Kong, China |
| Volume : 3 volume number : 3 pdf |
| A Comparative Experiment of Several Shape Methods in Recognizing Plants |
| A. Kadir, L.E. Nugroho, A. Susanto and P.I. Santosa, Gadjah Mada University, Indonesia |
| Volume : 3 volume number : 3 pdf |
| RCause - A Root Cause Analysis Model to Identify the Root Causes of Software Reengineering Problems |
| Er. Anand Rajavat1 and Vrinda Tokekar2, 1Shri Vaishnav Institute of Technology and Science Indore, India and 2Institute of Engineering and Technology (DAVV) Indore, India |
| Volume : 3 volume number : 3 pdf |
| Unsupervised horizontal collaboration based in SOM |
| Nadia Mesghouni Khaled Ghedira and Moncef Temani, University of Tunis Laboratory LI3 ISG Tunis, Tunisie |
| Volume : 3 volume number : 3 pdf |