Volume 2

November 2011, Volume 2, Number 6

Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Ava Clare Marie O. Robles, Mindanao State University, Philippines

A New Algorithm For Cell Tracking Technique
Ashraf A. Aly1, Safaai Bin Deris1 and Nazar Zaki2, 1Universiti Teknologi, Malaysia and 2UAE University, UAE

Improving Text Categorization By Using A Topic Model
Wongkot Sriurai, Ubon Ratchathani University, Thailand

Cyclic Combination Method For Digital Image Steganography With Uniform Distribution Of Message
Rajkumar Yadav, Ravi Saini and Kamaldeep, Maharshi Dayanand University, India

Design, Implementation And Characterization Of Xor Phase Detector For Dpll In 45 Nm Cmos Technology
Delvadiya Harikrushna I, Mukesh Tiwari, Jay Karan Singh and Anubhuti Khare, Sri Satya Sai Institute of Science &
Technology, India

Controlling The Problem Of Bloating Using Stepwise Crossover And Double Mutation Technique
Arpit Bhardwaj, Aditi Sakalle, Harshita Chouhan and Harshit Bhardwaj, RGPV India

The Expert System Designed To Improve Customer Satisfaction
P.Isakki alias Devi1 and S.P.Rajagopalan2, 1Vels University, India and 2GKM College of Engineering & Technology, India

Optimized Performance With Process Chains
M. Victoria Hebseeba1 and T. Bhaskara Reddy2, 1 Rayalaseema University, India and 2 S.K. University, India

Computation Of Transformer Losses Under The Effects Of Non-Sinusoidal Currents
Amit Gupta and Ranjana Singh, Jabalpur Engineering College, India

Prospective benefits and criticalities of applying Semantic Web techniques in Software Engineering
Harvinder, Galgotias College of Engineering and Technology, India

Multi-Touch Screen Interfaces And Gesture Analysis: A Study
Mrudula Nimbarte, B. D. C. O. E. Sevagram, India

A Novel Approach For Pass Word Authentication Using Bidirectional Associative Memory
A S N Chakravarthy1 , Penmetsa V Krishna Raja 2 , and P S Avadhani3, 1 Sri Aditya Engineering College, India ,
2 JNTUK, India and 1 Andhra University, India

Using Triangular Function to Improve Size of Population in Quantum Evolution Algorithm for Fractal Image
Compression

Amin Qorbani1, Ali Nodehi1 and Saeed Nodehi2, 1 Islamic Azad University, Iran and 2 Mirdamad University, Iran

Overview Of Streaming-Data Algorithms
T. Soni Madhulatha, Alluri Institute of Management Sciences, India

Empirical Studies On Machine Learning Based Text Classification Algorithms
Shweta C. Dharmadhikari1, Maya Ingle2 and Parag Kulkarni1, 1 EkLat Solutions Pune,India and 2 IIST,India

Fingerprint Image Enhancement By Develop Mehtre Technique
Mustafa Salah Khalefa1, Zaid Amin Abduljabar1 and Huda Ameer Zeki2, 1Basra University, Iraq and 2 Shatt Al-arab
University College, Iraq

Neural networks approach v/s Algorithmic approach : A study through pattern recognition
Namrata Aneja, Dyal Singh College, India

September 2011, Volume 2, Number 5

Adaptive Data Stream Management System Using Learning Automata
Shirin Mohammadi1, Ali A. Safaei1, Fatemeh Abdi2 and Mostafa S. Haghjoo4, 1Iran University of Science and Technology,
Tehran, Iran and 2Islamic Azad University, Babol, Iran

Pre-Processing Of Medical Documents And Reducing Dimensionality
S.Sagar Imambi1 and T.Sudha2, 1TJPS college , India and 2Vikram Simhapuri University , India

Analysis Of Spiht Algorithm For Satellite Image Compression
K Nagamani and AG Ananth, R V College of Engineering, India

Cross Lingual Information Retrieval With SMT And Query Mining
Suneet Kumar Gupta , Amit Sinha and Mradul Jain, ABES Engineering College, India

Enterprise Integration Using Service Oriented Architecture
Oldooz karimi and Nasser modiri, Azad University,Branch Sofiyian sofiyian, Iran

July 2011, Volume 2, Number 4

The Effects on Cells Mobility Due to Exposure to EMF Radiation
Ashraf A. Aly1, Safaai Bin Deris1 and Nazar Zaki2, 1Universiti Teknologi Malaysia, Malaysia and 2UAE University, UAE

Transport Layer Protocols Taxonomy From Voice Over Ip Perspective
Mosleh M. Abu-Alhaj, Ahmed Manasrah, Mahmoud Baklizi and Nibras, Universiti Sains Malaysia, Malaysia

Time complexity analysis of genetic- fuzzy system for disease diagnosis.
Ephzibah.E.P, VIT University, India.

A Novel Approach For Authenticating Textual Or Graphical Passwords Using Hopfield Neural Network
ASN Chakravarthy, P S Avadhani, P. E. S. N Krishna Prasad, N.Rajeev and D.Rajasekhar reddy, Sri Sai Aditya Institute
of Science and Technology, Surampalem, India

Security Model For Service-Oriented Architecture
Oldooz Karimi, sofiyan Azad University, Iran,

May 2011, Volume 2, Number 3

A Novel Image Segmentation Enhancement Technique Based on Active Contour and Topological Alignments
Ashraf A. Aly1, Safaai Bin Deris1 and Nazar Zaki2, 1Universiti Teknologi, Malaysia and 2UAE University, UAE

Power Management During Scan Based Sequential Circuit Testing
Reshma.P and M.Geetha Priya, Amrita Vishwa Vidyapeetham University, India

Development of Mechanism for Enhancing Data Security in Quantum Cryptography
Ajit Singh and Nidhi Sharma, BPS Mahila Vishwavidyalaya, India

March 2011, Volume 2, Number 2

Insider Threat Analysis of Case Based System Dynamics
Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China

New Results on the Output Regulation of the Modified Arneodo Chaotic System by State Feedback Control
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India

Spam Detection By Stackelberg Game
Alireza Naeimi Sadigh, Sattar Hashemi and Ali Hamzeh, Shiraz University, Iran

Energy Efficient Coverage Problems in Wireless Ad Hoc Sensor Networks
D. G. Anand1, H. G. Chandrakanth1 and M. N. Giriprasad2, 1Sri Krishna Institute of Technology, India and
2Jawaharlal Nehru Technological University College of Engineering, India

Medical Image Denoising Using Adaptive Threshold Based on Contourlet Transform
S. Satheesh1 and KVSVR Prasad2, 1G. Narayanamma Institute of Technology and Science, India and 2D.M.S.S.V.H.
College of Engineering, India

Application of Threshold Techniques for Readability Improvement of Jawi Historical Manuscript Images
Hafizan Mat Som1, Jasni Mohamad Zain2 and Amzari Jihadi Ghazali3, 1IKIP International College Taman Gelora,
Malaysia, 2University Malaysia Pahang, Malaysia and 3Kolej Profesional Mara Indera Mahkota, Malaysia

Computerized Shape Analysis of Erythrocytes and Their Formed Aggregates in Patients Infected With P.Vivax Malaria
R.Renuka Devi1, V.Rajagopal2, M.Senthil kumar1 and G.Magesh1, 1VIT University, India and 2Zonal Entomological
Team - Vellore, India

Employing Reverse Polish Notation in Encryption
S.S. Dhenakaran, Alagappa University, India

January 2011, Volume 2, Number 1

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms
Xu-Ren Luo1, Chen-Hui Jerry Lin1 and Te-Lung Yi2, 1National Defense University, Republic of China and
2China University of Technology, Republic of China

QoS Based User Driven Scheduler for Grid Environment
Sanjay Patel1 and Madhuri Bhavsar2, 1SVBIT - Gandhinagar, India and 2Nirma University, India