IJCSEE Vol 1 Issue 3 (2013) ISSN 2320-401X (Printed Version) ISSN 2320-4028 (Online Version)

    Sr. no.Title & author(s) namePage no.
    1Appreciative Inquiry In Eliciting Software Requirements

    Omar Isam Al Mrayat, Norita Md Norwawi and Nurlida Basir

    356
    2Effective VE Population Initialization Technique for Genetic Algorithm

    P. Victer Paul, R. Baskaran, V.S.K. Venkatachalapathy and P. Dhavachelvan

    362
    3Securing Data With Hard Disk Shredding

    Siti Hajar Nasaruddin, Johana Yusof and Nur Hasni Nasrudin

    366
    4Designing a new MANET Environment using Computer Simulation

    Prof. Dr. Saad Talib Hasso

    370
    5Finger Drift Compensation (FDC) Model for Braille Input

    Parinyarat. Tuchinda, Atiwong. Suchato, and Proadpran. Punyabukkana

    376
    6Design and Fabrication of Vehicle All-Wheel-Nuts Remover

    Mohd Azman. Abdullah, Nurfarahin. Sulaiman, Ikhwan Hakim. Mat Idera, Mohd Zakwan. Mohd Razi, and Mad Nasir. Ngadiman

    381
    7A Smart Automation of ZigBee through GPRS

    Dr. K Rameswaraiah, D Vara Prasad, and Mahendradatta

    385
    8Performance Analysis of Soft-Decision on Viterbi Decode for Cooperative Relay in LTE-Advanced

    Ekkaphot.Meesa-ard and Suwat. Pattaramalai

    391
    9A Fuzzy Texture Descriptor Using Combined Neigborhood Differences

    Khairul Muzzammil Saipullah, Nuraishah Sarimin, and Nurul Atiqah Ismail

    395
    10Performance Comparison of WCDMA Pico Repeater at Two Difference Positions in One-Bedroom Condominium

    Woraphon Lertchuwongsa, and Suwat Pattaramalai

    400
    11Intranet Performance Monitoring and Problem Solving Analysis with Network Parameters from SNMP and NetFlow

    Panisara Treesorn and Suwat Pattaramalai

    404
    12Breast Cancer Classification Using Hybrid Synthetic Minority Over-Sampling Technique and Artificial Immune Recognition System Algorithm

    Kung Jeng Wang, and Angelia Melani Adrian

    408
    13Evolutionary Algorithm for Constrained Reader Network Planning

    Shin-Yeu Lin and Hsing-Fang Tsai

    413
    14Methods of Analysing Images based on Kansei Engineering

    Nazlina. Shaari

    417
    15Evaluating the Performance of Common Background Subtraction Techniques

    Altahir Abdalla, Awab Samir, Hamza Abdulbagi, Zain Elabdeen Salah, Siddig Mohammed and Yasir Massad

    422
    16Image Retrieval Using Local Object Appearance and Spatial Color Layout

    I.Jeena Jacob and Dr.K.G. Srinivasagan

    425
    17Implementation of Cloud Computing in Hazardous Mechanical Industries

    Dipankar Mishra and Shyam Baboo Bambiwal

    430
    18Supply Chain Management of Technical Education

    Dipankar Mishra and Gurvinder Singh

    433
    19Integration of E-Commerce and Cloud Computing for Implementation of Business Based on ICT in Indonesia

    Iswarawati, Faradina Vidyani and Nurul Azizah

    436
    20Separable Least-squares Approach for Gaussian Process Model Identification Using Firefly Algorithm

    Tomohiro Hachino, Hitoshi Takata, Shigeru Nakayama, Seiji Fukushima, and Yasutaka Igarashi

    440
    21Application of Firefly Algorithm to Gaussian Process-based Prediction of Electric Power Damage Caused by Typhoons

    Tomohiro Hachino, Hitoshi Takata, Shigeru Nakayama, Seiji Fukushima, and Yasutaka Igarashi

    445
    22A Study on Efficiency of Dynamic Allocation using QOS metrics in High Performance Computing Machines

    Reshmi.R, and Dr .D. Shanthi

    450
    23An Analysis of LSB Image Steganography Techniques in Spatial Domain

    Mamta Juneja, and Parvinder S. Sandhu

    454
    24Two Components based LSB and Adaptive LSB Steganography based on Hybrid Feature Detection for Color Images with improved PSNR and Capacity

    Mamta Juneja, and Parvinder S. Sandhu

    460