1 | Reliability Assessment on Member of Supply Chain Based on SCOR Performance and Fault Tree Analysis
Kittichai Athikulrat, Vichai Rungreanganun, and Sompoap Talabgaew | 107 |
2 | Dynamic resource pricing in economic grid computing with learning automata
Ali Sarhadi | 112 |
3 | Performance Analysis of a Photovltaic System Koya - Kurdistan of Iraq
Ari Afir Abdulrahman, and Dr. Saman Mirza Abdullah | 116 |
4 | Novel Mining of Cancer via Mutation in Tumor Protein P53 using Quick Propagation Network
Ayad. Ghany Ismaeel, and Raghad. Zuhair Yousif | 121 |
5 | Cohesive Approach To Integrate Goals Of Information Security Management Function With Corporate Goals of Enterprise
Ashish Ukidve | 126 |
6 | On Analysis and Evaluation of Non-Properly Prepared Teachers Based On Character Optical Recognition Considering Neural Networks Modeling
Hassan M. H. Mustafa | 130 |
7 | A Security Coalition Method based on Game Theory
Qingfeng Liu, Kaizhi Huang, Wei Dong, Ying Hong | 137 |
8 | Performance Analysis of Physical Layer Security under the Cooperation of Multiple Malicious Jammer Relays
Shengbin Lin, Qingfeng Liu, Kaizhi Huang, and Wen Wang | 142 |
9 | An Augmented Reality Mobile Navigation System Supporting Indoor Positioning and Group Communication Functions
Ching-Sheng Wang, Meng-Lung Lin, Ding-Jung Chiang, and Yen-Kui Yin | 148 |
10 | Design and Comparative Study of Genetic Algorithm Optimised SVM (Support Vector Machines) Configurations to Classify Crop /Weed Using Shape /Color Fea
WK Wong, Muralindran Mariappan, and Ali Chekima | 154 |
11 | EEG-Based Brain-Machine Interface (BMI) for Controlling Mobile Robots: The Trend of Prior Studies
Murali Krishnan, and Muralindran Mariappan | 159 |
12 | A Framework for Quality Improvement in Healthcare Information Systems
Asma Aloqail, and Ajantha Dahanayake | 166 |