| 1 | Appreciative Inquiry In Eliciting Software Requirements
Omar Isam Al Mrayat, Norita Md Norwawi and Nurlida Basir | 356 |
| 2 | Effective VE Population Initialization Technique for Genetic Algorithm
P. Victer Paul, R. Baskaran, V.S.K. Venkatachalapathy and P. Dhavachelvan | 362 |
| 3 | Securing Data With Hard Disk Shredding
Siti Hajar Nasaruddin, Johana Yusof and Nur Hasni Nasrudin | 366 |
| 4 | Designing a new MANET Environment using Computer Simulation
Prof. Dr. Saad Talib Hasso | 370 |
| 5 | Finger Drift Compensation (FDC) Model for Braille Input
Parinyarat. Tuchinda, Atiwong. Suchato, and Proadpran. Punyabukkana | 376 |
| 6 | Design and Fabrication of Vehicle All-Wheel-Nuts Remover
Mohd Azman. Abdullah, Nurfarahin. Sulaiman, Ikhwan Hakim. Mat Idera, Mohd Zakwan. Mohd Razi, and Mad Nasir. Ngadiman | 381 |
| 7 | A Smart Automation of ZigBee through GPRS
Dr. K Rameswaraiah, D Vara Prasad, and Mahendradatta | 385 |
| 8 | Performance Analysis of Soft-Decision on Viterbi Decode for Cooperative Relay in LTE-Advanced
Ekkaphot.Meesa-ard and Suwat. Pattaramalai | 391 |
| 9 | A Fuzzy Texture Descriptor Using Combined Neigborhood Differences
Khairul Muzzammil Saipullah, Nuraishah Sarimin, and Nurul Atiqah Ismail | 395 |
| 10 | Performance Comparison of WCDMA Pico Repeater at Two Difference Positions in One-Bedroom Condominium
Woraphon Lertchuwongsa, and Suwat Pattaramalai | 400 |
| 11 | Intranet Performance Monitoring and Problem Solving Analysis with Network Parameters from SNMP and NetFlow
Panisara Treesorn and Suwat Pattaramalai | 404 |
| 12 | Breast Cancer Classification Using Hybrid Synthetic Minority Over-Sampling Technique and Artificial Immune Recognition System Algorithm
Kung Jeng Wang, and Angelia Melani Adrian | 408 |
| 13 | Evolutionary Algorithm for Constrained Reader Network Planning
Shin-Yeu Lin and Hsing-Fang Tsai | 413 |
| 14 | Methods of Analysing Images based on Kansei Engineering
Nazlina. Shaari | 417 |
| 15 | Evaluating the Performance of Common Background Subtraction Techniques
Altahir Abdalla, Awab Samir, Hamza Abdulbagi, Zain Elabdeen Salah, Siddig Mohammed and Yasir Massad | 422 |
| 16 | Image Retrieval Using Local Object Appearance and Spatial Color Layout
I.Jeena Jacob and Dr.K.G. Srinivasagan | 425 |
| 17 | Implementation of Cloud Computing in Hazardous Mechanical Industries
Dipankar Mishra and Shyam Baboo Bambiwal | 430 |
| 18 | Supply Chain Management of Technical Education
Dipankar Mishra and Gurvinder Singh | 433 |
| 19 | Integration of E-Commerce and Cloud Computing for Implementation of Business Based on ICT in Indonesia
Iswarawati, Faradina Vidyani and Nurul Azizah | 436 |
| 20 | Separable Least-squares Approach for Gaussian Process Model Identification Using Firefly Algorithm
Tomohiro Hachino, Hitoshi Takata, Shigeru Nakayama, Seiji Fukushima, and Yasutaka Igarashi | 440 |
| 21 | Application of Firefly Algorithm to Gaussian Process-based Prediction of Electric Power Damage Caused by Typhoons
Tomohiro Hachino, Hitoshi Takata, Shigeru Nakayama, Seiji Fukushima, and Yasutaka Igarashi | 445 |
| 22 | A Study on Efficiency of Dynamic Allocation using QOS metrics in High Performance Computing Machines
Reshmi.R, and Dr .D. Shanthi | 450 |
| 23 | An Analysis of LSB Image Steganography Techniques in Spatial Domain
Mamta Juneja, and Parvinder S. Sandhu | 454 |
| 24 | Two Components based LSB and Adaptive LSB Steganography based on Hybrid Feature Detection for Color Images with improved PSNR and Capacity
Mamta Juneja, and Parvinder S. Sandhu | 460 |