2 | -- | 9 | David Salb, Hershey H. Friedman, Linda Weiser Friedman. The Role of Information Technology in Fulfilling the Promise of Corporate Social Responsibility |
10 | -- | 28 | Shafinah Kamarudin, Mohd Ikram Mohammad. File Security based on Pretty Good Privacy (PGP) Concept |
29 | -- | 45 | Pedro Ivan Tello Flores, Luis Enrique Colmenares Guillén, Omar Ariosto Niño Prieto. Approach of RSOR Algorithm Using HSV Color Model for Nude Detection in Digital Images |
46 | -- | 57 | Marwa Salah Farhan, Mohamed E. Marie, Laila Mohamed El Fangary, Yehia K. Helmy. An Integrated Conceptual Model for Temporal Data Warehouse Security |
72 | -- | 82 | Ali Bazghandi, Ali A. Pouyan. An Agent-Based Simulation Model for Urban Traffic System |
83 | -- | 89 | Liang Chen, Yingqing Guo. Design of the Distributed Control System Based on CAN Bus |
90 | -- | 99 | Ahmad Jawdat, Qasem Obeidat, Alaa Aljanaby. On The Design of User Experience Based Persuasive Systems |
100 | -- | 108 | Mojgan Taheri, Mohammad Ali Afshar Kazemi, Abbas Toloui Ashlaghi. Improvement of Mobility Management in Heterogeneous Wireless Networks by Using Multiple Attribute Decision Making |
109 | -- | 119 | Lim Kah Seng, Norafida Ithnin, Hazinah Kutty Mammi. Identifying the Re-usability of Triangle Scheme and Intersection Scheme on Mobile Device |
120 | -- | 122 | Feng Bao, Fengzhi Zhao. Study on the E-government Call Center System Based on SOA |
123 | -- | 133 | Shaimaa Ezzat Salama, Mohamed I. Marie, Laila Mohamed El Fangary, Yehia K. Helmy. Web Server Logs Preprocessing for Web Intrusion Detection |
145 | -- | 148 | Ruicheng Li. Analysis on the Method and Importance of Practical Teaching in Vocational College |
149 | -- | 0 | Kavita Saini, Abdul Wahid, G. N. Purohit. Designing And Implementing WBIs for Algorithms |