Volume 4

December 2012, Volume 4, Number 6

Accessibility of Information Technologies in the Resting Home
Ozlem Cakır, Ankara University, Turkey

An Information System to Support and Monitor Clinical Trial Process
Daniela Luzi and Fabrizio Pecoraro, National Research Council. Institute for Research on Population and Social Policies, Italy

Rotation Invariant Color Retrieval
Swapna Borde1 and Udhav Bhosle2, 1Vidyavardhini's College of Engineering and Technology,India and 2Rajiv Gandhi Institute
of Technology,India

Design of Physical Games for Learning the Lotus Effect
Wernhuar Tarng1, Shih-Hsien Tsai1, Chih Ming Lin1, Chi-Young Lee2 and Hsin-Hun Liou3, 1National Hsinchu University
of Education, Taiwan, 2National Tsing Hua University, Taiwan and 3National Central University, Taiwan

A Novel and Single Chip Tri-Band Low-Noise Amplifier for Wlan, Wifi and Wimax Receivers
I. Akhchaf, S. Khoulji, M. Essaidi and M.L. Kerkeb, Abdelmalek Essaadi University Morocco

An Efficient Passage Ranking Technique For a QA System
Pooja A1, Vinodh Krishnan2 and Geetha Manjunath3, 1Amazon Development Centre India, 2Oracle India Private Ltd, India
and 3HP Labs, India

Multi-Homing Enabled Cognitive Radio Based Inter-Vehicle Communication System
Faisal Riaz1, Kaleem Ahmed1, Iftikhar Ahmad1, Muhammad Ibrahim1, Samreen Ayaz1, Rabia Rauf1, Muhammad Kabeer1,
Naheed Akhtar1, Jameel Ahmed2 and Sadat Dar2, 1Mirpur University of Science and Technology, Pakistan and 2HITEC
University Taxila Cantt, Pakistan

Ear Recognition and Occlusion
B. S. El-Desouky1, M. El-Kady2, M. Z. Rashad1,and Mahmoud M. Eid1, 1 Mansoura University, Egypt and 2Helwan University,

Computing Installation Parameters Of CCTV Cameras for Traffic Surveillance
Pratishtha Gupta and G. N. Purohit, Amrita Dadhich, Banasthali Vidyapith, India

An Experimental Survey Towards Engaging Trustable Hypervisor Log Evidence Within a Cloud Forensic Environment
Sean Thorpe, University of Technology, Kingston, Jamaica

Adaptive Backstepping Controller and Synchronizer Design for Arneodo Chaotic System With Unknown Parameters
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University,India

R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)
Dhananjoy Dey1, Noopur Shrotriya1 and Indranath Sengupta2, 1SAG,India and 2Jadavpur University,India

Denoising of Medical Ultrasound Images Using Spatial Filtering and Multiscale Transforms
V N Prudhvi Raj1 and T Venkateswarlu2, 1VR Siddhartha Engineering College,India and 2SV University,India

Shaping of Location Conscious Information
Palson Kennedy .R1 and Rajashekhara2, 1CMJ University,Chennai,India and 2Impact College of Engineering and Applied

Improved Spatial Gray Level Dependence Matrices for Texture Analysis
Olfa Ben Sassi, Lamia sellami, Mohamed Ben Slima, Khalil Chtourou, Ahmed Ben Hamida, University of Sfax, Tunisia

October 2012, Volume 4, Number 5

Biometric Authentication Through a Virtual Keyboard for Smartphones
Matthias Trojahn1 and Frank Ortmeier2, 1Volkswagen AG, Germany and 2Otto-von-Guericke University, Germany

Improving Computer-Mediated Synchronous Communication of Doctors in Rural Communities Through Cloud Computing:
A Case Study of Rural Hospitals in South Africa

Alfred Coleman1, Marlien E Herselman2 and Mary Coleman3, 1University of South Africa, 2CSIR South Africa and
3Medical University of South Africa, South Africa

Efficient Similarity Join Method Using Unsupervised Learning
Bilal Hawashin1, Farshad Fotouhi2 and William Grosky3, 1Alzaytoonah University of Jordan, 2Wayne State University, USA
and 31University of Michigan-Dearborn,USA

Building a Portable Computer Lab with Bootable USB Hard Drives Using Virtualisation
Hao Shi, Victoria University, Australia

A P2P Botnet Virus Detection System Based on Data-Mining Algorithms
Wernhuar Tarng, Cheng-Kang Chou and Kuo-Liang Ou, National Hsinchu University of Education, Taiwan

Skyline Sets Queries for Incomplete Data
Mohammad Shamsul Arefin and Yasuhiko Morimoto, Hiroshima University, Japan

An Analyzer-Based Security Measurement Model for Increasing Software Security
Sen-Tarng Lai, Shih Chien University, Taiwan

Machine Learning Algorithms in Web Page Classification
W. A. AWAD, Port Said University, Egypt
Erratum:Due to a serious case of plagiarism this paper has been retracted.

Achieving the Benefits of Agility in Software Architecture-XP
Zafar Karimi, Sajjad Behzady, Ali Broumandnia, Islamic Azad University at Qazvin, Iran

An Insight View of Kernel Visual Debugger in System Boot up
Mohamed Farag, Maharishi University of Management, USA

Evolutionary Tuning of Fuzzy Rule Base Systems for Nonlinear System Modelling and Control
Pintu Chandra Shill1, Bishnu Sarker1 and Kazuyuki Murase2, 1University of Fukui, Japan and 2KUET, Bangladesh

Computational Analysis of Code Collaboration Pattern and Semantic Role
Lei Wu1, Sharon White1, Yi Feng1, James Helm1, Nathanial Wiggins3, 1University of Houston-Clear Lake, USA, 2Algoma
University, Canada and 3San Jacinto College, Houston, USA

A Neuro-Fuzzy Inference Model for Breast Cancer Recognition
Bekaddour Fatima and Chikh Mohammed Amine,Abou Bekr Belkaid University , Tlemcen, Algeria

Building a Legal Expert System for Legal Reasoning in Specific Domain-A Survey
Venkateswarlu Naik.M and Sushant Lokhanday, Keshava Memorial Institute of Technology, India

A Rough - Neuro Model for Classifying Opponent Behavior in Real Time Strategy Games
M. Z. Rashad, Mansoura University, Egypt

Efficient Scheduling ff Real-Time Parallel Applications on Clusters
Abeer Hamdy1, Reda Ammar2 and Ahmed E. Youssef3, 1British University in Egypt, 2University of Connecticut, USA and
3Helwan University, Egypt

ASP-SSN: An Effective Approach for Linking Semantic Social Networks
Sanaa Kaddoura1 and Islam Elkabani2, 1Beirut Arab University, Lebanon and 2Alexandria University, Egypt

Design of an Efficient MAC Protocol for Opportunistic Cognitive Radio Networks
Mahfuzulhoq Chowdhury1, Asaduzzaman1, Md. Fazlul Kader1,2 and Mohammad Obaidur Rahman1, 1Chittagong University
of Engineering & Technology, Bangladesh, 2University of Chittagong, Bangladesh

Fast Hue-Preserving Histogram Equalization Methods For Color Image Contrast Enhancement
David Menotti1,2,4, Laurent Najman2, Jacques Facon3 and Arnaldo de A. Albuquerque4, 1Federal University of Ouro Preto,
Brazil, 2Universite Paris-Est, France, 3Pontificia Universidade Catolica do Parana, Brazil and 4Universidade Federal de
Minas Gerais, Brazil

Efficient Monitoring in Online Tests Using Esdv Method
Sri Anusha.N, Sai Soujanya.T and Vasavi.S, Jawaharlal Nehru Technological University, India

August 2012, Volume 4, Number 4

Applying Data Envelopment Analysis to Evaluation of Taiwanese Solar Cell Industry Operational Performance
Hao-En Chueh and Jie-Yi Jheng, Yuanpei University, Taiwan

PCA - Wavelet Coefficients for T2 chart to Detect Endpoint in CMP process
Sihem Ben Zakour1 and Hassen Taleb2, 1Higher institute of Management of Tunis, Tunisia and 2Higher institute of business administration of gafsa,Tunisia

PSO Algorithm for IPD Game
Xiaoyang Wang and Yibin Lin, Sun-Yat Sen University, China

Training a Feed-Forward Neural Network with Artificial Bee Colony based Backpropagation Method
Sudarshan Nandy1, Partha Pratim Sarkar1 and Achintya Das2, 1Kalyani University, India and 2Kalyani Goverment Engineering College,India

Multicore Dynamic Kernel Modules Attachment Technique for Kernel Performance Enhancement
Mohamed Farag, Maharishi University of Management, USA

Redescription Mining With Three Primary Data Mining Functionalities
M. Kamala Kumari and Suresh Varma, Adikavi Nannaya University, India

Spatial Data Mining using Cluster Analysis
Ch.N.Santhosh Kumar1, V. Sitha Ramulu1, K.Sudheer Reddy2, Suresh Kotha1, Ch and Mohan Kumar1, 1Swarna Bharathi
Inst. of Sc. & Tech, India and 2Acharya Nagarjuna University,India

Applications of Wireless Sensor Networks in Fall Detection for Senior People
Wernhuar Tarng1, Chia-Hwei Lin1 and Hsin-Hun Liou2, 1National Hsinchu University of Education, Taiwan and
2National Central University, Taiwan

Intelligent Mining Association Rules
Sarjon Defit, University Putra Indonesia "YPTK" Padang

Comparison Study for Clonal Selection Algorithm and Genetic Algorithm
Ezgi Deniz Ulker and Sadık Ulker, Girne American University, Turkey

A New Audio Watermarking Method Based on Discrete Cosine Transform with a Gray Image
Mohammad Ibrahim Khan1, Md. Iqbal Hasan Sarker1, Kaushik Deb1 and Md.Hasan Furhad2, 1Chittagong University of
Engineering & Technology, Bangladesh and 2University of Ulsan, South Korea

C-PASS-PC: A Cloud-driven Prototype of Multi-Center Proactive Surveillance System for Prostate Cancer
Haibin Wang, Samuel Oschin Comprehensive Cancer Institute, USA

An Energy Aware Geocast Algorithm Using 2-Hop Neighbour Knowledge in Sensor Networks
Young-Chul Shim1 and Sehun Noh2, 1Hongik University, Korea and 2GuardianNet, Korea

Genetic Algorithm with SRM SVM Classifier for Face Verification
Safiya K.M 1, S.Bhuvana1, P.TamijeSelvy1 and R. Radhakrishnan2, 1Sri Krishna College of Technology, India and
2Sri Ramakrishna Engineering college, India

June 2012, Volume 4, Number 3

Steganography in Arabic Text Using Zero Width and Kashidha Letters
Ammar Odeh and Khaled Elleithy, University of Bridgeport Bridgeport, USA

Dimension Reduction by Mutual Information Feature Extraction
Ali Shadvar, Islamic Azad University, Iran

New-Fangled Method Against Data Flooding Attacks in MANET
Kavuri Roshan1, K.Reddi Prasad1, Niraj Upadhayaya1 and A.Govardhan2, 1J.B. Institute of Engineering & Technology, India
and 2JNTUH, India

Evaluation of Information Retrieval Systems
Keneilwe Zuva1 and Tranos Zuva2, 1University of Botswana, UK and 2Tshwane University Technology, SA

Improvement of Traffic Overhead and Reliability in Wireless Sensor Network
G.M. Mashrur-E-Elahi, Din Mohammad Mobin and Md. Anwar Ul Islam Rajib, Khulna University of Engineering and
Technology, Bangladesh

A Hybrid Region Growing Algorithm for Medical Image Segmentation
D. Muhammad Noorul Mubarak1, M. Mohamed Sathik2, S.Zulaikha Beevi3 and K.Revathy1 1University of Kerala, India ,
2Sathakathullah Appa College, India and 3National College of Engineering,India

Full Data Controlled Web-Based Feed Aggregator
Haruna Isah, University of Bradford, UK

High Availability Solution: Resource Usage Management in Virtualized Software Aging
Aye Myat Myat Paing and Ni Lar Thein, University of Computer Studies, Yangon

Critical Analysis of Ecm Applications in the Clouds: A Case Study
James Xue1 and Amjad Yahya2, 1University of Northampton, UK, and 2PricewaterhouseCoopers, Saudi Arabia

Crawler Architecture Using Grid Computing
M.E.ElAraby1, M.M.Sakre1, M.Z.Rashad2 and O.Nomir2, 1Al Shorouk Academy, Egypt, and 2Mansoura University, Egypt

Automatic Segmentation of Manipuri (Meiteilon) Word into Syllabic Units
Kishorjit Nongmeikapam1, Vidya Raj RK1, Oinam Imocha Singh1 and Sivaji Bandyopadhyay2, 1Manipur University, India and
2Jadavpur Univeristy,India

An Approach for Integration Testing in Online Retail Applications
Roopa Singh and Imran Akhtar Khan, JJT University, India

A Rule Based Approach for Root Word Identification in Malayalam Language
Meera Subhash, Wilscy. M, S.A Shanavas, University of Kerala, India

April 2012, Volume 4, Number 2

MppSoCGEN: A Framework for automatic generation of MppSoC Architecture
Emna Kallel, Yassine Aoudni, Mouna Baklouti and Mohamed Abid, ENIS School Sfax, Tunisia

Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues
Swarnpreet Singh and Tarun Jangwal, CT Institute of Engineering and Management Technology, India

Mass Lesion Detection Using Wavelet Decomposition Transform and Support Vector Machine
Ayman AbuBaker, Applied Science Private University Amman, Jordan

Document Summarization Using Positive Pointwise Mutual Information
Aji S1 and Ramachandra Kaimal2, 1University of Kerala, India and 2Amrita Vishwa Vidyapeetham Amritapuri Campus, India

Fuzzy Multi-objective Approach for the Improvement of Distribution Network Efficiency by Considering DG
Ramadoni Syahputra, Universitas Muhammadiyah Yogyakarta, Indonesia

A Semi-Blind Reference Watermarking Scheme Using DWT-DCT-SVD for Copyright Protection
Satyanarayana Murty. P1, M.Uday Bhaskar2 and P. Rajesh Kumar3, 1GIITS, India, 2Sri Sai Aditya Institute of Science &
Technology, India and 3AU college of Engineering, India

Review on Common Criteria as a Secure Software Development Model

Dynamic Domain Classification for Fractal Image Compression
K. Revathy and M. Jayamohan, University of Kerala, India

Signal Processing for MIMO Interference Networks
Thanat Chiamwichtkun1, Stephanie Soon2 and Ian Lim2, 1Bangkok University, Thailand and 2National University of Singapore, Singapore

Embedded Controller for Vehicle In-Front Obstacle Detection and Cabin Safety Alert System
V.Ramya, B. Palaniappan and K. Karthick, Annamalai University, India

UNDERSTANDING the Concept of Geographic Information System and Modelling Formalisms
Wembe Sop Diake Hubert, University of Douala, Cameroon

Spectral Analysis of Projection Histogram for Enhancing Close matching character Recognition in Malayalam
Sajilal Divakaran, University of Kerala, India

Prashnottar: A Hindi Question Answering System
Shriya Sahu, Nandkishor Vasnik and Devshri Roy, MANIT Bhopal, India

February 2012, Volume 4, Number 1

Trust Model for Reliable File Exchange In Cloud Computing
Edna Dias Canedo, Rafael Timoteo de Sousa Junior and Robson de Oliveira Albuquerque, University of Brasilia, Brazil

An Approach for Robots to Deal with Objects
Sidiq S. Hidayat1,3, Bong Keung Kim2 and Kohtaro Ohba2, 1University of Tsukuba, Japan, 2The National Institute of Advanced
Industrial Science & Technology (AIST) Tsukuba, Japan and 3Politeknik Negeri Semarang, Indonesia

Enhancement of Images Using Morphological Transformations
K.Sreedhar1 and B.Panlal2, 1VITS (N9) Karimnagar, India and 2VCE (S4) Karimnagar, India

A Cluster Allocation and Routing Algorithm based on Node Density for Extending the Lifetime of Wireless Sensor Networks
Wernhuar Tarng, Hao-Wei Lin and Kuo-Liang Ou, National Hsinchu University of Education, Taiwan

Reliability Analysis of Multi Path Multistage Interconnection Networks
Sudarson Jena, G.Sri Sowmya, P.Radhika and P.Venkat Reddy, GITAM University, India

A Novel Password based Multi Party Key Agreement Protocol on Elliptic Curve
Daniyal M. Alghazzawi, King Abdulaziz University, Saudi Arabia

An Effective Model for Improving the Quality of Recommender Systems in Mobile E-Tourism
Masoumeh Mohammadnezhad1 and Mehregan Mahdavi2, 1Islamic Azad University, Iran and 2University of Guilan, Iran

Image Segmentation in Video Sequences Using Modified Background Subtraction
D. W. Chinchkhede & N. J. Uke, Pune University, India

Achieving Consensus with Individual Centrality Approach
Vitri Tundjungsari, Jazi Eko Istiyanto, Edi Winarko and Retantyo Wardoyo, Gadjah Mada University, Indonesia

Blind 3D Model Watermarking based on Multi-Resolution Representation and Fuzzy Logic
Sharvari C. Tamane1 and Ratnadeep R. Deshmukh2, 1MGM's Jawaharlal Nehru Engineering College, India and 2Dr. Babasaheb Ambedkar Marathwada University, India

Integrated Task Clustering, Mapping and Scheduling for Heterogeneous Computing Systems
Yuet Ming Lam, Macau University of Science and Technology, Macau

Ranking Popular Items By Naive Bayes Algorithm
Shiramshetty Gouthami, Golamari.Jose Mary and Pulluri Srinivas Rao, Jayamukhi Institute of Technological Sciences, India

Quality of Service Using PSO Algorithm
S.M. ELseuofi, Umm Al-Qura University, Saudi Arabia

Image Retrieval System Using Hybrid Feature Extraction Technique
Vadhri Suryanarayana1, M.V.L.N. Raja Rao2, P. Bhaskara Reddy3 and G. Ravindra Babu4, 1NRI Institute of Technology, India, 2Gudlavalleru Engineering College, India, 3MLR Institutions, India and 4S.C.C.E.T - Hyderabad, India

SignsWorld; Deeping into the Silence World and Hearing Its Signs (StAte oF the Art)
A.M. Riad, Hamdy K.Elmonier,Samaa.M.Shohieb and A.S. Asem, Misr academy for Engineering and Technology, Egypt

A Qualitative Study of LP-ITS: Linear Programming Intelligent Tutoring System
Samy S. Abu Naser, Al-Azhar University-Gaza, Palestine

Graph Based New Approach for Frequent Pattern Mining
Anurag Choubey1, Ravindra Patel2 and J.L. Rana3, 1Technocrats Institute of Technology, India, 2UIT-RGPV, India and
3MANIT, India

An Approach for Agile SOA Development using Agile Principals
Majlesi Shahrbanoo, Mehrpour Ali and Mohsenzadeh Mehran, Islamic Azad University, Iran

Error Probability Analysis of Free-Space Optical Links with Different Channel Model under Turbulent Condition
Bobby Barua, Tanzia Afrin Haque and Md. Rezwan Islam, Ahsanullah University of Science and Technology, Bangladesh

Visual Analysis of Cost Based Database Optimizers Using Picasso Tool
Neeraj Sharma1, Kavindra Raghuwanshi2, Syed Imran Ali1 and Banshilal Patidar1, 1Trinity Institute of Technology
and Research, India and 2All Saints College of Technology, India