Volume 2

Volume 2, Number 3, August 2014

A Key Management Approach For Wireless Sensor Networks
Ali Bagherinia, Akbar Bemana, Sohrab Hojjatkhah, Ali Jouharpour, Islamic Azad University, Iran

Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
May Cho Aye and Aye Moe Aung, University of Technology, Myanmar

Volume 2, Number 2, May 2014

Protein Sequence Classification In Data Mining - A Study
S.Vijayarani and Ms. S.Deepa, Bharathiar University,India

Impact of Black Hole Attack on AODV Routing Protocol
Ei Ei Khin1 and Thandar Phyu2, 1University of Technology (Yatanarpon Cyber City), Myanmar and 2Ministry of Science and
Technology, Myanmar

Facial Image Classification And Searching - A Survey
S.Vijayarani and Mrs.M.Vinupriya, Bharathiar University,India

Conceptual Similarity Measurement Algorithm For Domain Specific Ontology
Zin Thu Thu Myint and Kay Khaing Win, University of Technology, India

Application of a merit function based interior point method to linear model predictive control
Prashant Bansode, D. N. Sonawane and Prashant Basargi, College of Engineering,India

Integration of security and authentication agent in ns-2 and leach protocol for wireless sensor network
Tin Win Maw, University of Technology (Yantanarpon Cyber City), Myanmar

Volume 2, Number 1, February 2014

Consolidated Model of Procedures for Workflow Management
Stanka Hadzhikoleva and Emil Hadzhikolev, University of Plovdiv, Bulgaria

Fragmentation of Handwritten Touching Characters in Devanagari Script
Shuchi Kapoor and Vivek Verma, Rajasthan College of Engineering for Women, India

Remote Sensing Image Fusion Using Contourlet Transform With Sharp Frequency Localization
Yoonsuk Choi, Ershad Sharifahmadian and Shahram Latifi, University of Nevada, USA

Towards to an Agent-Oriented Modeling and Evaluating Approach for Vehicular Systems Security
Mohamed Garoui1, Belhassen Mazigh1, Béchir El Ayeb1 And Abderrafiaa Koukam2, 1prince Research Unit, Tunisia and
2Universite De Technologie De Belfort-Montbeliard, France

A Novel Secure Combination Technique of Steganography and Cryptography
Pye Pye Aung1 and Tun Min Naing2, 1University of Technology (Yatanarpon Cyber City), Pyin Oo Lwin, Myanmar, 2Computer
University (Pathein), Myanmar

Predict Facebook Impressions Adopting a Mathematical Model of the Hit Phenomenon
Kawahata Yasuko1, Genda Etuso2 and Ishii Akira2, 1Kyushu University, Japan and 2Physics Tottori University, Japan

Control of New 3D Chaotic System
Masoud Taleb Ziabari1 and Ali Reza Sahab 2, 1Ahrar University, Iran and 2Islamic Azad University, Iran