Volume 5

December 2013, Volume 5, Number 6

The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and Security
Salwa Al-Samirrai, Zahra Fadhil Mohsen and Aysh Alhroob, Isra University, Jordan

Molecular Solutions for the Set-Partition Problem on Dna-Based Computing
Sientang Tsai and Wei-Yeh Chen, Southern Taiwan University of Science and Technology, Taiwan

Brazilian License Plate Detection Using Histogram of Oriented Gradients and Sliding Windows
R. F. Prates1, G. Cámara-Chávez1, William R. Schwartz2 and D. Menotti1, 1University Federal of Ouro Preto, Brazil and
2University Federal of Minas Gerais, Brazil

Distributed Cloud Computing Environment Enhanced With Capabilities for Wide-Area Migration and Replication of Virtual
Machines

Young-Chul Shim, Hongik University, Korea

Study On Decision-Making for Cafe Management Alternatives
Cheng-I Hou, Chung Hua University, Taiwan

Multi-Topic Multi-Document Summarizer
Fatma El-Ghannam1 and Tarek El-Shishtawy2, 1Electronics Research Institute, Egypt and 2Benha University, Egypt

An Sna-Bi Based System for Evaluating Virtual Teams: A Software Development Project Case
Lamia Ben Hiba and Mohammed Abdou Janati Idrissi, Mohammed V Souissi University, Morocco

Gesture Recognition Based Mouse Events
Rachit Puri, Samsung Research India, India

A Prediction Model for Taiwan Tourism Industry Stock Index
Han-Chen Huang and Fang-Wei Chang, Yu Da University of Science and Technology, Taiwan

October 2013, Volume 5, Number 5

Performance Analysis of Round Trip Time in Narrowband RF Networks For Remote Wireless Communications
El miloud Ar reyouchi1, Kamal Ghoumid2, Koutaiba Ameziane1 and Otman El Mrabet1, 1Abdelmalek Essaadi University,
Morroco and 2Informatics and Telecommunications, ENSAO, Morocco

Automatic Detection of Microaneurysms and Hemorrhages in Color Eye Fundus Images
Sérgio Bortolin Júnior and Daniel Welfer, Universidade Federal do Pampa, Brazil

Project Monitoring and Control Measures In CMMI
Mahmoud Khraiwesh, Zarqa University, Jordan

A Preliminary Survey on Optimized Multiobjective Metaheuristic Methods for Data Clustering Using Evolutionary
Approaches

Ramachandra Rao Kurada1, K Karteeka Pavan2 and AV Dattareya Rao1, 1Acharya Nagarjuna University, India
and 2RVR & JC College of Engineering, India

Diagnosis of Some Diseases in Medicine via computerized Experts System
R.A. Soltan, M. Z. Rashad and B.El-Desouky, Mansoura University, Egypt

Improving the Effectiveness of Information Retrieval System Using Adaptive Genetic Algorithm
Wafa Maitah1, Mamoun Al-Rababaa1 and Ghasan Kannan2, 1Al al-Bayt University, Jordan and 2Amman Arab University,
Jordan

The Comparison of the Text Classification Methods to be Used for the Analysis of Motion Data in DLP Architect
Murat Topaloglu, Trakya University, Turkey

A Privacy - Learning Objects Identity System for Smartphones Based on a Virtual Learning Environment Database
LeThanhHieu, JinHai, DeQingZou and WangDaiBin, HuaZhong University of Science and Technology, China

Systems Variability Modeling: A Textual Model Mixing Class and Feature Concepts
Ola Younis1, Said Ghoul1, and Mohammad H. Alomari2, 1Philadelphia University, Jordan and 2Applied Science University,
Jordan

Compact, “Fuzzy” Information
S.Balaji Vivek, Easwari Engineering College, India

The Principles of Humanism for MANETs
Md. Amir Khusru Akhtar1 and G. Sahoo2, 1Cambridge Institute of Technology, India and 2Birla Institute of Technology, India

The Application Wavelet Transform Algorithm in Testing ADC Effective Number of Bits
Emad A. Awada, Applied Science University, Jordan

Introducing a Novel Fault Tolerant Routing Protocol in Wireless Sensor Networks Using Fuzzy Logic
Mostafa Vakili Fard1, Sayyed Majid Mazinani2 and Sayyed Ahmad Hoseini3, 1Science and Research IAU, Iran, 2Imam Reza
University, Iran and 3Payam Noor University, Iran

Data Mining Model for the Data Retrieval from Central Server Configuration
Srivatsan Sridharan, Kausal Malladi and Yamini Muralitharan, International Institute of Information Technology - Bangalore,
India

August 2013, Volume 5, Number 4

A Review of Temporal Aspects of Hand Gesture Analysis Applied to Discourse Analysis and Natural Conversation
Renata C. B. Madeo, Priscilla K. Wagner and Sarajane M. Peres, Universidade de Sao Paulo, Brazil

A Tabu Search Algorithm With Efficient Diversification Strategy for High School Timetabling Problem
Salman Hooshmand1, Mehdi Behshameh2 and OmidHamidi1, 1Hamedan University of Technology, Iran and 2Islamic Azad
University, Iran

Analysis of Elementary Cellular Automata Boundary Conditions
K. Salman, Middle Tennessee State University, USA

Design and Implementation of Repair-aware Test Flow for Multi-Memory
Gang Wang and Huajun Chen, Loongson Technology Corporation Limited, China

Vedivision – A Fast Bcd Division Algorithm Facilitated by Vedic Mathematics
Diganta Sengupta1 Mahamuda Sultana2 and Atal Chaudhuri3, 1Future Institute of Engineering and Management, India,
2Swami Vivekananda Institute of Science and Technology, India and 3Jadavpur University, India

Integrations of ICT in Education Sector for the Advancement of the Developing Country: Some Challenges and
Recommendations-Bangladesh Perspective

Mst. Shahnaj Parvin, International Islamic University, Bangladesh

Comparative Study of Backpropagation Algorithms in Neural Network Based Identification of Power System
Sheela Tiwari1, Ram Naresh2 and Rameshwar Jha3, 1Dr. B R Ambedkar National Institute of Technology, India,
2National Institute of Technology, India and 3IET Bhaddal Technical Campus, India

Matching Structure and the Evolution of Cooperation in the Prisoner’s Dilemma
Noureddine Bouhmala and Jon Reiersen, Vestfold University College, Norway

Survey of the Euro Currency Fluctuation by Using Data Mining
M. Baan, E. Saadati and M. Nasiri, Iran University of Science and Technology, Iran

GPS Tracking System Coupled With Image Processing in Traffic Signals to Enhance Life Security
Manoj Prabhakar K and Manoj Kumar S, Anna University, India

Following Car Algorithm With Multi Agent Randomized System
Mounir Gouiouez, Noureddine Rais and Mostafa Azzouzi Idrissi, University Sidi Mohammed Ben Abdellah, Morocco

Periocular Recognition Using Reduced Features
Ambika D R, Radhika K R and D Sehsachalam, BMS College of Engineering, India

Design and Development of Secure Navigation System for Visually Impaired People
Prashant Bhardwaj and Jaspal Singh, Centre for Development of Advanced Computing, Mohali

A Novel Perceptual Image Encryption Scheme Using Geometric Objects Based Kernel
Prabhudev Jagadeesh1, P. Nagabhushan1 and R. Pradeep Kumar2, 1University of Mysore, India and 2Amphisoft Technologies
Private Limited, India

June 2013, Volume 5, Number 3

Fuzzy Rule Base System for Software Classification
Adnan Shaout and Juan C. Garcia, The University of Michigan - Dearborn, United States

Context-Based Barrier Notification Service Toward Outdoor Support for the Elderly
Keisuke Umezu1, Takahiro Kawamura2 and Akihiko Ohsuga2, 1NEC Corporation, Japan and 2University of Electro-
Communications, Japan

Hyper-Mspace; Multidimensional Evolutionary-Agents Modeling and Analysis
Mohamed Dbouk1, Ihab Sbeity1, Hamid Mcheick2 and Haytham Douaihy3, 1Lebanese University, Beirut-Lebanon,
2Universite du Quebec a Chicoutimi, Canada and 3Lebanese University-DSST, Beirut-Lebanon

A Novel Hybrid Method for the Segmentation of the Coronary Artery Tree in 2d Angiograms
Daniel S.D. Lara1, Alexandre W.C. Faria2, Arnaldo de A. Araujo1 and D. Menotti3, 1Univ. Fed. de Minas Gerais, Brazil,
2UFMG, Brazil and 3Universidade Federal de Ouro Preto, Brazil

Modified Heuristic Time Deviation Technique for Job Sequencing and Computation of Minimum Total Elapsed Time
N.Nagamalleswara Rao1, O. Naga Raju2 and I. Ramesh Babu2, 1R.V.R & J. C. College of Engineering, India and
2Nagarjuna University, India

Security Threats on Cloud Computing Vulnerabilities
Te-Shun Chou, East Carolina University, U.S.A

Handover Management Scheme in LTE Femtocell Networks
Tijane Fatima Zohra Badri1,2, Saadane Rachid1, Mohammed Wahbi1 and MbarkiSamir2, 1SIR2C2S/LASI-EHTP Casablanca,
Morocco and 2Ibn Tofail University Kenitra, Morocco

Saasquality - A Method for Quality Evaluation of Software as a Service (Saas)
Nemesio Freitas Duarte Filho1, Clarindo Isaias Pereira da Silva e Padua1, Paulo Henrique de Souza Bermejo2, Andre Luiz
Zambalde2, Urlan Salgado de Barros3, 1Federal University of Minas Gerais, Brazil, 2Federal University of Lavras, Brazil
and 3Federal University of Parana, Brazil

An Efficient Approach to Wavelet Image Denoising
Alaa A. Hefnawy and Heba A. Elnemr, Electronics Research Institute, Egypt

Towards A Good ABS Design for More Reliable Vehicles on the Roads
Afifa Ghenai, Mohamed Youcef Badaoui and Mohamed Benmohammed, University of Constantine, Algeria

Designing of an efficient algorithm for identifying Abbreviation definitions in biomedical Text
Shashank Singh1, Gaurav Sharma2 Abdul Nazeer K A3 and Shalini Singh2, 1IBM India Private limited, India, 2School of
Biochemical Engineering IIT (BHU), India and 3NIT, India

Labeled Generalized Stochastic Petri Net Based Approach for Web Services Composition
Sofiane Chemaa, Mouna Bouarioua and Allaoua chaoui, University of Constantine, Algeria

Bounded Ant Colony Algorithm Fortask Allocation on Anetwork of Homogeneous Processorsusing a Primary Site (Bts-Aco)
Buthayna Al-Sharaa and Tamara Al-Qublan, AL Balqa Applied University, Jordan

Biomedical Image Transmission Based on Modified Feistal Algorithm
Jinu Elizabeth John, Saintgits College of Engineering, India

Intelligent Access Control Policies for Social Network Site
Saung Hnin Pwint Oo, University of Technology (Yatanarpon Cyber City), Myanmar

April 2013, Volume 5, Number 2

Hybrid Optical and Electrical Network Flows Scheduling in Cloud Data Centres
Ibrahim Kabiru Musa and Stuart Walker, University of Essex, UK

An Investigation of the Energy Consumption by Information Technology Equipments
Baharak Makki1 and Bahador Makki2, 1University of Agder, Norway and 2University of Bremen, Germany

Structural Coupling in Web 2.0 Applications
Maya Samaha Rupert, Notre Dame University Louaize, Lebanon

APPBACS: An Application Behavior Analysis And Classification System
Himanshu Pareek, P R L Eswari and Sarat Chandra Babu, Center for Development of Advanced Computing, India

An Effective Method for Information Security Awareness Raising Initiatives
AliMaqousi1, TatianaBalikhina1, Michael Mackay2, 1Petra University, Jordan and 2Liverpool John Moores University, UK

Adaboost Ensemble with Simple Genetic Algorithm for Student Prediction Model
AhmedSharaf ElDen1, Malaka A. Moustafa2, Hany M. Harb3 and AbdelH.Emara3, 1Helwan University, Egypt, 2Al-Alson
Higher Institute of Tourism, Egypt and 3Azhar University, Egypt

Pixel Size Reduction Loss-Less Image Compression Algorithm
Pralhadrao V Shantagiri and Saravanan K N, Christ University, India

Social Media News: Motivation, Purpose and Usage
Samaneh Beheshti-Kashi and Baharak Makki, University of Agder, Norway

A Heuristic Approach for Web-Service Discovery and Selection
Achraf Karray1, Rym Teyeb2 and Maher Ben Jemaa3, 1Najran University, KSA, 2Higher Institute of the Technological Studies
of Tataouine, Tunisia and 3National School of Engineers of Sfax, Tunisia

Developing Mobile Agent for Intrusion Detection
Bambang Sugiantoro1, Retantyo Wardoyo2, Sri Hartati2, Jazi Eko Istiyanto2, 1State Islamic University Sunan Kalijaga,
Indonesia and 2Gadjah Mada University, Indonesia

Requirements Engineering of a Web Portal Using Organizational Semiotics Artifacts and Participatory Practices
Flavia Linhalis Arantes, State University of Campinas (UNICAMP), Brazil

Shadow Detection Using Tricolor Attenuation Model Enhanced with Adaptive Histogram Equalization
Jyothisree V. and Smitha Dharan, College of Engineering Chengannur, India

Performance Analysis of Parallel Pollard's Rho Factoring Algorithm
Anjan K Koundinya, Harish G,Srinath N K, Raghavendra G E, Pramod Y V, Sandeep R and Punith Kumar G,
R V College of Engineering, India

February 2013, Volume 5, Number 1

A Systematic Mapping Study on Business Process Variability
George Valenca1, Carina Alves1, Vander Alves2, Nan Niu3,1Federal University of Pernambuco (UFPE), Brazil,2University of
Brasilia,Brazil and 3Mississippi State University, USA.

A Neuro-Fuzzy Approach for the Fault Location Estimation of Unsynchronized Two-Terminal Transmission Lines
Ramadoni Syahputra,Universitas Muhammadiyah Yogyakarta,Indonesia

Sobel Edge Detection Method to Identify and Quantify the Risk Factors for Diabetic Foot Ulcers
Kunjam Nageswara Rao1, P srinivasa Rao1, Allam Appa Rao2, G R Sridhar3,1Andhra university, India, 2University of Hydeabad,
India and 3Endocrine & Diabetes centre,India.

Improving the Management of Cost and Scope in Software Projects Using Agile Practices
Mariana de Azevedo Santos1, Paulo Henrique de Souza Bermejo2, Marcelo Silva de Oliveira2, Adriano Olimpio Tonelli2, Enio
Junior Seidel3,1Mitah Technologies, Lavras, Brazil2Universidade Federal de Lavras (UFLA), Brazil and 3Universidade Federal
do Pampa (UNIPAMPA),Brazil.

An Evaluation Method of Research on Wearable Wireless Body Area Network in Healthcare
Roberto Vito Rodrigues Filho1, Renato Freitas Bulcao Neto1, Bruno Oliveira Silvestre1, Leandro Luis Galdino de Oliveira1,
Rogerio Orlow de Oliveira2 and Iwens Gervasio Sene Junior1,1Universidade Federal de Goias, Brazil and 2Pontificia
Universidade Catolica de Goias,Brazil.

Pre-Segmentation for the Computer Aided Diagnosis System
Myat Mon Kyaw,University of Technology (Yatanarpon Cybercity), Myanmar

Extended Nymble: Method for Tracking Misbehaving Users Anonymosly While Blocking
M.Durga Prasad1, P.Chenna Reddy2, Banoth Samya1,1Vijay Institute of Tech & Sciences, India, 2JNTUCE, Pulivendula, India
and 13Vijay college of Engineering for women,India

Correlation Based VMS Placement Resource Provision
Zar Lwin Phyo and Thandar Thein,University of Computer Studies,Myanmar.

Classification Methods of Skin Burn Images
Malini Suvarna1, Sivakumar2 and U C Niranjan3,1Atria Institute of Technology, India, 2Dr. Ambedkar Institute of
Technology, India3Director of Research, Manipal Dot, India

Concept-Based Indexing in Text Information Retrieval
Fatiha Boubekeur1 and Wassila Azzoug2,1Mouloud Mammeri University of Tizi-Ouzou, Algeria, 2M'Hamed Bouguera,
University of Boumerdes,Algeria

Performance Analysis of Kernel-Based Virtual Machine
Sudha M, Harish G M, Nandan A, Usha J, R V College of Engineering,India.

Analysis of Digital Images Using Morphlogical Operations
Amalorpavam.G1, Harish Naik T2, Jyoti Kumari3, Suresha M4,1Sambhram Academy Of Mgmt. Studies,India, 2Presidency
College,India, 3Acharya Institutes (Aigs),India and 4Jnana Sahyadri,Kuvempu University,India

An Ontology based Text Mining framework for R&D Project Selection
N.Arunachalam, E.Sathya, S.Hismath Begum and M.Uma Makeswari, Sri Manakula Vinayagar Engineering College, India

Mining Closed Regular Patterns in Data Streams
M.Sreedevi1 and L.S.S.Reddy2,1K L University, India and 2LBR College of Engineering, India

Teaching Automated Test Data Generation Tools for C, C++ , and Java Programs
Hitesh Tahbildar and Plabita Borbora, G. P. Khataniar, Assam Engineering Institute, India

Adaptive Design of Controller and Synchronizer for Lu-Xiao Chaotic System with Unknown Parameters
Sundarapandian Vaidyanathan,Vel Tech Dr. RR & Dr. SR Technical University,India.