| A Preprocessing Model for Hand-Written Arabic Texts Based on Voronoi Diagrams[ |
| Atallah M.Al-Shatnawi, Al al-Bayt University, Jordan |
| Volume : 7 volume number : 6 pdf |
| An Entropic Optimization Technique in Heterogeneous Grid Computing Using Bionic Algorithms |
| Saad M.Darwish, Adel A.El-zoghabi and Moustafa F.Ashry, Institute of Graduate Studies and Research, Egypt |
| Volume : 7 volume number : 6 pdf |
| New Symmetric Encryption System Based on Evolutionary Algorithm |
| A.Mouloudi, Ibn Tofail University, Morocco |
| Volume : 7 volume number : 6 pdf |
| UML Modeling and System Architecture for Agent Based Information Retrieval |
| D.Muhammad Noorul Mubarak and Philomina Simon, University of Kerala, India |
| Volume : 7 volume number : 6 pdf |
| The Effect of Implementing of Nonlinear Filters for Enhancing Medical Images Using MATLAB |
| Mohamed Y.Adam1, Mozamel M.Saeed2 and Al Samani A.Ahmed3, 1King Saud University, KSA, 2Prince Sattam Bin Abdul-Aziz University, KSA and 3Al Neelain University College of Computer Science & Information Technology, Sudan |
| Volume : 7 volume number : 6 pdf |
| Two-Layer Secure Prevention Mechanism for Reducing E-Commerce Security Risks |
| Sen-Tarng Lai, Shih Chien University, Taiwan |
| Volume : 7 volume number : 6 pdf |
| Congestion Aware Spray and Wait Protocol: A Congestion Control Mechanism for the Vehicular Delay Tolerant Network |
| Chuka Oham and Milena Radenkovic, University of Nottingham, United Kingdom |
| Volume : 7 volume number : 6 pdf |
| Automated Management of Pothole Related Disasters Using Image Processing and Geotagging |
| Manisha Mandal, Madhura Katageri, Mansi Gandhi, Navin Koregaonkar and Sharmila Sengupta, Vivekanand Education Society's Institute of Technology, India |
| Volume : 7 volume number : 6 pdf |
| A Routing Mechanism Based on Social Networks and Betweenness Centrality in Delay-Tolerant Networks |
| Zhang Huijuan and Liu Kai, Tongji University, China |
| Volume : 7 volume number : 6 pdf |
| Comparative Analysis of Single-Core and Multi-Core Systems |
| Ogundairo Johnson1 and Omosehinmi Dinyo2, 1National Open University of Nigeria (NOUN), Nigeria and 2Federal University of Technology, Nigeria |
| Volume : 7 volume number : 6 pdf |
| Reducing Security Concerns when Using Cloud Computing in Online Exams Case Study: General Associate Degree Examination (Shamel) in Jordan |
| Mohamad M. Al-Laham, Al-Balqa Applied University, Jordan |
| Volume : 7 volume number : 6 pdf |
| A Software Tool for Experimental Study Leap Motion |
| Georgi Krastev and Magdalena Andreeva, Ruse University, Bulgaria |
| Volume : 7 volume number : 6 pdf |
| Service Oriented Quality Requirement Framework for Cloud Computing |
| Madhushi Rathnaayke and Janaka I Wijayanayake, University of Kelaniya, Sri Lanka |
| Volume : 7 volume number : 6 pdf |
| A Database System Security Framework |
| Habiba Muhammad Sani1 and Muhammad Mika'ilu Yabo2, 1Usmanu Danfodiyo University, Nigeria and 2Shehu Shagari College of Education, Nigeria |
| Volume : 7 volume number : 6 pdf |