| 1 | A Modified Particle Swarm Optimization for Engineering Constrained Optimization Problems
Choosak Pornsing, Kawinthorn Saichareon, and Thanathorn Karot | 1 |
| 2 | Enhanced Reinforcement Learning Based Privacy Preserving Circuit Construction and Routing in an Onion Routing Network
S. Shakila, and Gopinath Ganapathy | 6 |
| 3 | Mobile Robot Voice Recognition in Control Movements
Zakariyya Hassan Abdullahi, Nuhu Alhaji Muhammad,Jazuli Sanusi Kazaure, and Amuda F.A. | 11 |
| 4 | The Criteria Establishment for the Dumping site Selection of Urban Metro Construction by the Application of the Analytical Hierarchy Process
Titiwat Triwong, and Warapoj Meetom | 17 |
| 5 | Integration of Electric Vehicles Charging in Unit Commitment
Letian Zhang, Qun Niu, Zhile Yang, and Kang Li | 22 |
| 6 | New Design of Low Power Consumption Mote in Wireless Sensor Network
Saidi Nabiha, Khaled Zaatouri, Walid Fajraoui, and Tahar Ezzeddine | 28 |
| 7 | Comparative Analysis of Implementation of 4-bit GCD Processor with Built in Self Test Feature using Xilinx 13.1 ISE & Xilinx 9.2 ISE
Sachin D.Kohale | 33 |
| 8 | The Impact of System Quality in E-learning System
Majed Mustafa Suliman Oun Alla, Dr.Qais Faryadi, and Dr.Norasikin Binti Fabil | 37 |
| 9 | A Non-Programming Secure Protocol for Cross-Domain JavaScript Data Communication
Chi-Che.Wu, and Jen-Wen. Ding | 43 |
| 10 | Estimation of Natural Frequency of Micro-Beams Using BPNN
Mohammad Heidari | 48 |
| 11 | An Adaptive Clustering and Incremental Learning Solution to Cold Start Problem in Recommendation Systems
Sriram G. Sanjeevi, Srikanth. Grandhe, Himanshu. Shrivastav, Ankit. Yadav, Tapas Kumar. Mahanta, and Ch. Naveen Kumar | 55 |
| 12 | Core Schema Mappings: Computing Core Solution with Target Dependencies in Data Exchange
S.Ravichandra, and D.V.L.N. Somayajulu | 61 |
| 13 | From Horizontal Slicing to Vertical Slicing � SCRUM Paybacks and Challenges
Sreekumar. Vobugari, and Somayajulu. DVLN | 66 |
| 14 | X-Band 200W GaN Power Amplifier Using 2-Way Branch-Line Combiner for Satellite Communication
Kwanggun Park, YoungSoo Choi, Myungkyu Park, and Youngoo Yang | 71 |
| 15 | Application of New Statistical Features for File Format Identification
Youngseok Lee, and Jongweon Kim | 75 |
| 16 | Protection of the People and Equipments in the Electric Installation
Ouazani Abdallah, and Idir Habi | 79 |
| 17 | Map-Reduce Algorithm for Mining Outliers in the Large Data Sets using Twister Programming Model
Subramanyam. RBV, and Sonam. Gupta | 81 |
| 18 | Numerical Solution of Fifth Order Boundary Value Problems by Petrov-Galerkin Method with Cubic B-splines as Basis Functions and Quintic B-splines as W
K.N.S.Kasi Viswanadham, and S.M.Reddy | 87 |
| 19 | A Novel Spectral Relaxation Method for Mixed Convection in the Boundary Layers on an Exponentially Stretching Surface with MHD and Cross-Diffusion Eff
Ch.RamReddy | 92 |
| 20 | On Some Properties of Tensor Hermite Polynomials
Parul Maheshwari, Gautam Mukhopadhyay, Siddhartha SenGupta | 97 |
| 21 | The fuzzy Ratio Prey-Predator Model
Almbrok Hussin Alsonosi. Omar, Iman Aissa Alghannay. Ahmed, and Yahya. Abu Hasan | 101 |