Abstract is missing.
- A Peer-to-Peer multiway tree network with efficient range query search using multidimensional indexingShivangi Surati, Devesh C. Jinwala, Sanjay Garg. 1-6 [doi]
- Design patterns for integration between enterprise application with any business process management systemsWittakarn Keeratichayakorn, Saranya Maneeroj. 7-12 [doi]
- Hardware acceleration with pipelined adder for Support Vector Machine classifierChang Liu, Fei Qiao, Xinghua Yang, Huazhong Yang. 13-16 [doi]
- A Review Perceptual Information FusionIsarin Promyarut, Anant Choksuriwong. 17-22 [doi]
- Boosting with feature selection technique for screening and predicting adolescents depressionPutthiporn Thanathamathee. 23-27 [doi]
- Combining nodes in multiple neural network on large datasetsTa Kiatkaiwansiri, Sukree Sinthupinyo. 28-30 [doi]
- License plate localization using MSERs and vehicle frontal mask localization using visual saliency for vehicle recognitionThitiphat Anakavej, Aram Kawewong, Karn Patanukhom. 31-36 [doi]
- Revisiting the distribution index in simulated binary crossover operator for evolutionary multiobjective optimisation algorithmsMohammad Hamdan. 37-41 [doi]
- Square Wave Artificial Neuron (SWAN)David Ellis, Kosuke Imamura. 42-45 [doi]
- Word sense disambiguation in Nepali languageUdaya Raj Dhungana, Subarna Shakya. 46-50 [doi]
- Towards robust, scalable and secure network storage in Cloud ComputingFawaz S. Al-Anzi, Ayed A. Salman, Noby K. Jacob, Jyoti Soni. 51-55 [doi]
- Deterministic network coding over Long Term Evaluation Advance communication systemHani Attar, Lina Stankovic, Mohamed Alhihi, Ahmed Ameen. 56-61 [doi]
- Experimental threshold determination for secondary users using USRP and Gnu radioAmith Khandakar, Amr Mohammed, Amr El-Sherif. 62-68 [doi]
- Neuronal signaling optimization for intrabody nanonetworksJunichi Suzuki, Pruet Boonma, Dung H. Phan. 69-74 [doi]
- On mathematical modeling of hierarchical mobility management protocolsMyungseok Song, Jun Dong Cho, Jongpil Jeong. 75-80 [doi]
- Throughput performance analysis of the wormhole and sybil attack in AODVZolidah Kasiran, Juliza Mohamad. 81-84 [doi]
- Product development of the glasses design - Color imagery in eyeglass frames and skin toneKuen-Meau Chen, Yu-Min Fang, Ying-Sin Lin. 85-89 [doi]
- An evaluation of data mining classification models for network intrusion detectionChakchai So-In, Nutakarn Mongkonchai, Phet Aimtongkham, Kasidit Wijitsopon, Kanokmon Rujirakul. 90-94 [doi]
- A novel discretization technique using Class Attribute Interval AverageAbdulloh Baka, Wiphada Wettayaprasit, Sirirut Vanichayobon. 95-100 [doi]
- An integrated system architecture in managing fishery data in IndonesiaDevi Fitrianah, Nursidik H. Praptono, Remmy A. M. Zen, Achmad Nizar Hidayanto, Aniati Murni Arymurthy. 101-108 [doi]
- e-Book use by Malaysian primary school childrenNor Zairah Ab Rahim, Noor Haniza Abu Bakar. 109-113 [doi]
- Fuzzy Object Relational Database Management System (FORDBMS) is appropriate approach for Real-Estate (GIS) businessAbdulrahman Al-Kandari, Mishari Alhouli. 114-117 [doi]
- Gesture recognition using Kinect in a virtual classroom environmentBalaji Hariharan, S. Padmini, Uma Gopalakrishnan. 118-124 [doi]
- G2G interaction among local agencies in developing countries based on diffusion of innovations theoryNassir Jabir Al-khafaji, Abdul Jaleel Kehinde Shittu, Wan Ro-zaini Sheik Osman. 125-131 [doi]
- Mobile school: Face-to-face learning interface for Iraqi students in MalaysiaWisam Abduladheem Kamil, Zaid Abass Fadahl, Ban Salman Shukur, Nassir Jabir Al-khafaji, Naofal Mohamad Hassin Azeez. 132-137 [doi]
- Mobile technology and Gamification: The future is now!Sylvia Chin. 138-143 [doi]
- Volunteer hive computing and virtualization in Botswana's web based edification techniquesSuresh Shanmugasundaram, Divyapreya Chidambaram. 144-148 [doi]
- An improved technique for hiding data in audioHuynh Ba Dieu, Nguyen Xuan Huy. 149-153 [doi]
- The scheme of 3-level authentication mechanism for preventing internal information leakageSang-Pil Cheon, Jung-Min Kang, Min Woo Park, Jung-Ho Eom. 154-157 [doi]
- A music similarity measure based on chord progression and song segmentation analysisChaisup Wongsaroj, Nakornthip Prompoon, Athasit Surarerks. 158-163 [doi]
- A comparative study of CBIR descriptors on innovative application of fashion imageKomaek Kawinakrathiti, Suphakant Phimoltares. 164-168 [doi]
- A lexiconizing framework of feature-based opinion mining in tourism industryAnanchai Muangon, Sotarat Thammaboosadee, Choochart Haruechaiyasak. 169-173 [doi]
- A new methodology to streamline ontology integration processesNelson K. Y. Leung, Sim Kim Lau, Nicole Tsang. 174-179 [doi]
- A survey on ontology-driven geographic information systemsWaralak V. Siricharoen, Udsanee Pakdeetrakulwong. 180-185 [doi]
- Design of cloud-based university data structureNitiwat Thongkao, Somchai Limsiroratana. 186-191 [doi]
- Framework for Modification Request Management based on Taxonomy and Knowledge Asset for software maintenanceAkrapol Samart, Nakornthip Prompoon. 192-198 [doi]
- Integrating and mining virtual communities across multiple Online Social Networks: Concepts, approaches and challengesWu-Chen Su. 199-204 [doi]
- Maximal anti-exponent of gapped palindromesGolnaz Badkobeh, Maxime Crochemore, Chalita Toopsuwan. 205-210 [doi]
- An approach to construct formal model of business process model from BPMN workflow patternsSaran Yamasathien, Wiwat Vatanawood. 211-215 [doi]
- An enhanced differential evolution optimization algorithmM. Arafa, Elsayed A. Sallam, M. M. Fahmy. 216-225 [doi]
- An optimized genetic routing approach for constrained shortest path selectionsChatchai Poonriboon, Chakchai So-In, Somjit Arch-int, Kanokmon Rujirakul. 226-230 [doi]
- Conjugate of knowledge items between abstract and organization knowledge modelsBoonprasert Surakratanasakul, Kazuhiko Hamamoto. 231-236 [doi]
- CUDA-based real-time face recognition systemRen Meng, Shengbing Zhang, Lei Yi, Zhang Meng. 237-241 [doi]
- Cuckoo PID-P controller for non-linear processSwapnil Nema, Prabin Kumar Padhy. 242-246 [doi]
- Early CU size determination in HEVC intra prediction using Average Pixel CostK. Saurty, P. C. Catherine, K. M. S. Soyjaudah. 247-252 [doi]
- Tabu based Search for discovering Regular Plans in mobile clientsJohn Tsiligaridis. 253-257 [doi]
- User data management by tabs during a browsing sessionKapil Kumar, Joy Bose. 258-263 [doi]
- Distributed file sharing using web servicesChin-Chih Chang, Wen-Xiang Wu. 264-268 [doi]
- A proposal of personal information trading platform (PIT): A fair trading between personal information and incentivesAke Osothongs, Noboru Sonehara. 269-274 [doi]
- Design of authenticity evaluation metric for Android applicationsWon Shin, Jin-Lee Lee, Doo-Ho Park, Chun-Hyon Chang. 275-278 [doi]
- Efficient pairing-free, certificateless two-party authenticated key agreement protocol for grid computingAmr Farouk, Ali Miri, Mohamed M. Fouad, Ahmed A. Abdelhafez. 279-284 [doi]
- KPI signal analysis of the custom behavior in Kenting Spring Scream festival hot zoneYi-Hua Chen, Chang-Lueng Chu, Wei Jhe Lyu. 285-290 [doi]
- Privacy-aware policy establishment and enforcement for information center repository: A case study of Government Meteorological Information Center RepositoryYotsapon Lertladechanon, Nakornthip Prompoon. 291-296 [doi]
- Reverse of e-mail spam filtering algorithms to maintain e-mail deliverabilityHussah AlRashid, Rasheed AlZahrani, Eyas ElQawasmeh. 297-300 [doi]
- A real-time embedded video monitoring systemDeng Huaqiu. 301-303 [doi]
- Elderly care notification system using hand posture recognitionSutang Sawasdee, Suree Pumrin. 304-309 [doi]
- Low cost internet based wireless sensor network for air pollution monitoring using Zigbee moduleH. Abdul Hadi Nograles, Christopher Paolo D. Agbay, Ian Steven L. Flores, A. Linsangan Manuel, John Bethany C. Salonga. 310-314 [doi]
- Measurement and analysis system of the knee joint motion in gait evaluation for rehabilitation medicineNeramitr Chirakanphaisarn. 315-320 [doi]
- Applying image processing techniques on a ball collecting robotSamer Al-Shaer, Mohammad Al-Shabi, Mohammed Bani Younis. 321-326 [doi]
- Localization and building identification in outdoor environment for smartphone using integrated GPS and cameraChhaily Moun, Chayakorn Netramai. 327-332 [doi]
- Relief Mapping on facade of Sino Portuguese Architecture in Virtual RealityKosin Kalarat. 333-336 [doi]
- TTS-SA (A text-to-speech system based on Standard Arabic)Tebbi Hanane, Hamadouche Maamar, Azzoune Hamid. 337-341 [doi]
- Virtual objects on limit view surface using transparent parallax specular mapping: Case study of Tubkased Vihara, Wat Phra Mahathat Woramahawihan Nokhon Si ThammaratChaowanan Khundam. 342-346 [doi]
- State telecommunication surveillance: A comparative study of the US and Thai telecommunication privacy lawsKanathip Thongraweewong. 347-352 [doi]
- Analysis on Radar Cross Section of different target specifications for Forward Scatter Radar (FSR)Nurul Asyikin Mohd Daud, N. E. Abd Rashid, Kama Azura Othman, Norhayati Ahmad. 353-356 [doi]
- Miniature stub-loaded monopole antenna at 800 MHz for FSR sensorMuhammad Norhisham Majid, N. E. A. Rashid, Suhaila Subahir, M. T. Ali. 357-362 [doi]
- An improved method for tree-based clone detection in Web ApplicationsChaoqun Li, Jianhua Sun, Hao Chen. 363-367 [doi]
- GSM wireless technology implementation in haze monitoringKama Azura Othman, Eda Hilyati Abdullah, Norfazilah Li, Nur Emileen Abd Rashid. 368-371 [doi]
- Performance evaluation of compound TCP+ congestion control parameters in wireless networksHiroyuki Hisamatsu, Hiroki Oda. 372-377 [doi]
- Project Based Learning in wireless communications utilizing deployed wireless networksYazan A. Alqudah, Michelle Mace. 378-382 [doi]
- Simple iterative method for designing prototype filter for cosine modulated nearly perfect reconstructed transmultiplexerA. Vishwakarma, A. Kumar, G. K. Singh. 383-388 [doi]
- WiMAX vs. LTE: An analytic comparisonAbdulrahman Al-Kandari, Meshal Al-Nasheet, Abdullah R. Abdulgafer. 389-393 [doi]
- A cost efficient software defined radio receiver for demonstrating concepts in communication and signal processing using Python and RTL-SDRBoonyarit Uengtrakul, Dahmmaet Bunnjaweht. 394-399 [doi]
- A hybrid technique for overlapped chromosome segmentation of G-band mataspread images automaticSaiyan Saiyod, Pichet Wayalun. 400-404 [doi]
- Cluster-based tangible programmingAndrew Cyrus Smith. 405-410 [doi]
- Enhancement of jobshop scheduling problem using search optimizationVinay P. Viradia, Chintan M. Bhatt. 411-414 [doi]
- FDCCII-based P, PI, PD and PID controllersMontree Kumngern, Usa Torteanchai. 415-418 [doi]
- Finger-spelling recognition system using fuzzy finger shape and hand appearance featuresKittasil Silanon, Nikom Suvonvorn. 419-424 [doi]
- Road detection based on superpixels and anisotropic heat diffusionDegui Xiao, Xiaoli Hu. 425-429 [doi]
- Rock Garden programming: Programming in the physical worldAndrew Cyrus Smith. 430-434 [doi]
- The study on the correlation between emotional design and emotion - Taking the conditioning process of lemonade for exampleYu-Min Fang, Kuen-Meau Chen, Chao-Wei Hsu. 435-439 [doi]
- Using augment reality to increase capacity in QR codeDarunee Bunma, Sartid Vongpradhip. 440-443 [doi]