1 | Appreciative Inquiry In Eliciting Software Requirements
Omar Isam Al Mrayat, Norita Md Norwawi and Nurlida Basir | 356 |
2 | Effective VE Population Initialization Technique for Genetic Algorithm
P. Victer Paul, R. Baskaran, V.S.K. Venkatachalapathy and P. Dhavachelvan | 362 |
3 | Securing Data With Hard Disk Shredding
Siti Hajar Nasaruddin, Johana Yusof and Nur Hasni Nasrudin | 366 |
4 | Designing a new MANET Environment using Computer Simulation
Prof. Dr. Saad Talib Hasso | 370 |
5 | Finger Drift Compensation (FDC) Model for Braille Input
Parinyarat. Tuchinda, Atiwong. Suchato, and Proadpran. Punyabukkana | 376 |
6 | Design and Fabrication of Vehicle All-Wheel-Nuts Remover
Mohd Azman. Abdullah, Nurfarahin. Sulaiman, Ikhwan Hakim. Mat Idera, Mohd Zakwan. Mohd Razi, and Mad Nasir. Ngadiman | 381 |
7 | A Smart Automation of ZigBee through GPRS
Dr. K Rameswaraiah, D Vara Prasad, and Mahendradatta | 385 |
8 | Performance Analysis of Soft-Decision on Viterbi Decode for Cooperative Relay in LTE-Advanced
Ekkaphot.Meesa-ard and Suwat. Pattaramalai | 391 |
9 | A Fuzzy Texture Descriptor Using Combined Neigborhood Differences
Khairul Muzzammil Saipullah, Nuraishah Sarimin, and Nurul Atiqah Ismail | 395 |
10 | Performance Comparison of WCDMA Pico Repeater at Two Difference Positions in One-Bedroom Condominium
Woraphon Lertchuwongsa, and Suwat Pattaramalai | 400 |
11 | Intranet Performance Monitoring and Problem Solving Analysis with Network Parameters from SNMP and NetFlow
Panisara Treesorn and Suwat Pattaramalai | 404 |
12 | Breast Cancer Classification Using Hybrid Synthetic Minority Over-Sampling Technique and Artificial Immune Recognition System Algorithm
Kung Jeng Wang, and Angelia Melani Adrian | 408 |
13 | Evolutionary Algorithm for Constrained Reader Network Planning
Shin-Yeu Lin and Hsing-Fang Tsai | 413 |
14 | Methods of Analysing Images based on Kansei Engineering
Nazlina. Shaari | 417 |
15 | Evaluating the Performance of Common Background Subtraction Techniques
Altahir Abdalla, Awab Samir, Hamza Abdulbagi, Zain Elabdeen Salah, Siddig Mohammed and Yasir Massad | 422 |
16 | Image Retrieval Using Local Object Appearance and Spatial Color Layout
I.Jeena Jacob and Dr.K.G. Srinivasagan | 425 |
17 | Implementation of Cloud Computing in Hazardous Mechanical Industries
Dipankar Mishra and Shyam Baboo Bambiwal | 430 |
18 | Supply Chain Management of Technical Education
Dipankar Mishra and Gurvinder Singh | 433 |
19 | Integration of E-Commerce and Cloud Computing for Implementation of Business Based on ICT in Indonesia
Iswarawati, Faradina Vidyani and Nurul Azizah | 436 |
20 | Separable Least-squares Approach for Gaussian Process Model Identification Using Firefly Algorithm
Tomohiro Hachino, Hitoshi Takata, Shigeru Nakayama, Seiji Fukushima, and Yasutaka Igarashi | 440 |
21 | Application of Firefly Algorithm to Gaussian Process-based Prediction of Electric Power Damage Caused by Typhoons
Tomohiro Hachino, Hitoshi Takata, Shigeru Nakayama, Seiji Fukushima, and Yasutaka Igarashi | 445 |
22 | A Study on Efficiency of Dynamic Allocation using QOS metrics in High Performance Computing Machines
Reshmi.R, and Dr .D. Shanthi | 450 |
23 | An Analysis of LSB Image Steganography Techniques in Spatial Domain
Mamta Juneja, and Parvinder S. Sandhu | 454 |
24 | Two Components based LSB and Adaptive LSB Steganography based on Hybrid Feature Detection for Color Images with improved PSNR and Capacity
Mamta Juneja, and Parvinder S. Sandhu | 460 |