1 | Modeling and Simulation of Reluctance motor using digital computer
Mostafa. A. Fellani and Daw .E. Abaid | 148 |
2 | The Importance of Ordering the Number of Lattice Points Inside a Rational Polyhedron Using Generating Functions
Halil Snopce | 153 |
3 | Signal and Image recovery from random linear measurements in compressive sampling
Sarah Mazari and Kamel Belloulata | 158 |
4 | The Ability of Dual-baseline Interferometer to Resolve Angular Ambiguities
Fei.Cao, Qingyun.Liu and Fan.Wu | 163 |
5 | Design and implementation of model predictive control for a three-tank hybrid system
Cyril Joseph, Dr. V. I. George, and Dr. P. R. Venkateswaran | 167 |
6 | Image based Wireless Networked Lighting Control for Daylight−Artificial light Integrated scheme−A Literature Review
Susan G Varghese, Dr.Ciji Pearl Kurian , and Dr.V I George | 172 |
7 | Nonreciprocal Propagation in Ferrite Medium and Their Applications− Microwave Circulator
Ghoutia. Naima. Sabri | 182 |
8 | A Novel Approach for Classifying Medical Images Using Data Mining Techniques
J. Alamelu Mangai, Jagadish Nayak and V. Santhosh Kumar | 188 |
9 | The Novel Decision Tree Classifier with Distance-based Concept Hierarchy Labels
Hsiao-Wei Hu, and Tien Chao | 193 |
10 | Study on Influence Diffusion in Social Network
Hsiao-Wei Hu and Shao-Yu Lee | 198 |
11 | Data Mining Techniques for Logical Analysis of Data in Content Based Image Retrieval System
A Nanda Gopal Reddy and Dr. Roheet Bhatnagar | 204 |
12 | A Fast Association Rule Algorithm Based On Bitmap Computing with Multiple Minimum Supports Using Maximum Constraints
Jyothi Patil and Dr. V.D.Mytri | 210 |
13 | Work Flow Scheduling Modeling in Grid Computing Using Linear Switching State Space (LS3)
H. Tabatabaee | 217 |
14 | Information Fusion Framework (IFF)- A Deploy for the Electricity Market Domain
Paulo Trigo and Paulo Marques | 223 |
15 | Multi-agent Simulation of Electricity Markets economically-motivated decision-making
Paulo Trigo, Jorge de Sousa and Paulo Marques | 228 |
16 | Designing and Developing Performance Measurement Software Solution
Bekim Fetaji and Majlinda Fetaji | 234 |
17 | Development and Analyses of Mobile E-Commerce Software Application
Majlinda Fetaji and Bekim Fetaji | 239 |
18 | Ant Colony Optimization based Feature Selection in Rough Set Theory
Majdi Mafarja and Derar Eleyan | 244 |
19 | Stochastic Rendezvous Analysis on Multi Server Markovian Queueing Network
SivaselvanKasilingam and C. VijayalakshmiSeshadhri | 248 |
20 | Towards an Early Warning System to Combat Dengue
Aloka Munasinghe, H.L.Premaratne and M.G.N.A.S. Fernando | 252 |
21 | Computational Analysis of Bangla Retroflex and Dental Consonants
Hossain. Syed Akhter, Rahman. M Lutfar, and Ahmed. Farruk | 257 |
22 | Software Architecture of Online Personal Finance Management System
Hossain. Syed Akhter, Akter. Nasrin, and Akhter. Maria | 262 |
23 | Effect of Trust Model in Supply Chain Management
Hossain. Syed Akhter and Ouzrout. Yacine | 266 |
24 | Review of the Levitation Mass Method (LMM)
Yusaku Fujii | 271 |
25 | Adaptive Design Model On Heterogeneous Learning Management System (LMS) By Utilizing Multi-Agent System (MAS)
Amir Kombo Mwinyi, S.A.R Al-Haddad, Rusli bin Hj Abdullah, and Shaiful Jahari bin Hashim | 274 |
26 | Technology Acceptance Model of Consumer Satisfaction with the Physical and Spiritual Health with Stress-Relief and Health Industry as an Example
Chang-Yueh Hou, Michel Plaisent, Chiang James Ming-Hsun, and Prosper Bernard | 278 |
27 | Detecting and Correcting Transcription Discrepancies between Thai Parliament Meeting Speech Utterances and their Official Meeting Reports
Natnarong. Puangsri, Atiwong. Suchato, Proadpran. Punyabukkana, and Chai. Wutiwiwatchai | 283 |
28 | To Study the Internet Access and Usage Behavior in the Kingdom Of Bhutan
Kencho Tshering | 288 |
29 | Efficient Mechanism for Selecting and Forwarding Data for Energy Saving Using Wireless Sensor Networks
Nandini Prasad K S, SurekhaK B, Puttamadappa C and T G Basavaraju | 298 |
30 | Energy Efficient Genetic Algorithm Model for Wireless Sensor Networks
N. Thangadurai, Dr. R. Dhanasekaran and R. Pradeep | 302 |
31 | Application of Supercapacitors to Automotive Applications
Abdeladim A Gazwi | 307 |
32 | Visibility improvement in foggy images using POSHE algorithm
G Srikanth and G Manoj Kumar | 312 |
33 | Role of Multiple Encryption in Secure Voice Communication
Himanshu Gupta and Dr. Vinod Kumar Sharma | 316 |
34 | Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Abdalla Gheryani and Mladen Veinović | 320 |
35 | Speech Cryptographic Key Generation
Keerati Inthavisas and Naratorn Sungprasert | 326 |
36 | Secured Serverless RFID With Object Oriented Approach
Monika Sharma and Dr. P. C. Agrawal | 330 |
37 | Network Selection Scheme for LTE Systems using Multiple Parameters
Ramarajan. A, and Thangadurai. N | 334 |
38 | An Analysis of LSB Image Steganography Techniques in Spatial Domain
Mamta. Juneja, and Parvinder S. Sandhu | 339 |
39 | Two Components based LSB and Adaptive LSB Steganography based on Hybrid Feature Detection for Color Images with improved PSNR and Capacity
Mamta. Juneja, and Parvinder S. Sandhu | 345 |
40 | Trends in Survivability Techniques of Optical Networks
Neeraj Mohan, Amit Wason and Parvinder S. Sandhu | 352 |