3 | -- | 13 | Vahid Garousi. Experience in Developing a Robot Control Software |
14 | -- | 27 | Thanongsak Aneksrup, Pipat Hiranvanichakorn. Efficient Group Key Agreement on Tree-based Braid Groups |
28 | -- | 41 | Waheed Yasin, Hamidah Ibrahim, Nor Asila Wati Abdul Hamid, Nur Izura Udzir. A Systematic Review of File Sharing in Mobile Devices Using Peer-To-Peer Systems |
42 | -- | 52 | S. Karpagachelvi, M. Arthanari, M. Sivakumar. Classification of ECG Signals Using Extreme Learning Machine |
53 | -- | 59 | Edem E. Williams, Essien Eyo. Building a Cost Effective Network for E-learning in Developing Countries |
60 | -- | 67 | Mazen Abu-Zaher. Modified Least Significant Bit (MLSB) |
68 | -- | 71 | Ling Zhang, Yucai Dong, Hongtao Shi, Ping Chen, Xuhui Li. The Extraction of the FAE Image Profilogram Based on the Grey Level Thresholding |
72 | -- | 78 | Abbas Toloie Eshlaghy, Alireza Pourebrahimi, Babak Zendehdel Nobari. Presenting a Model for Ranking Organizations Based on the Level of the Information Security Maturity |
79 | -- | 89 | Olusegun Folorunso, Gladys Adewale, Adewale Opeoluwa Ogunde, Julius Olatunji Okesola. Pinch Analysis as a Knowledge Management Tool for Optimization in Supply Chain |
90 | -- | 99 | Qiang Zhang, Jun Zhou, Xiaozhou Yu. A Kind of Low-cost Non-intrusive Autonomous Fault Emulation System |
110 | -- | 115 | Feng Xue, Gang Lv. Tracking Formant Trajectory of Tracheoesophageal Speech Using Hidden Dynamic Model |
130 | -- | 141 | Ali Keshavarzi, Fereydoon Sarmadian, Reza Labbafi, Abbas Ahmadi. Developing Pedotransfer Functions for Estimating Field Capacity and Permanent Wilting Point Using Fuzzy Table Look-up Scheme |
142 | -- | 150 | Shuhua Jiang. Research on Image Acquisition System Based on Binocular Stereo Vision |
151 | -- | 159 | Farzaneh Pakzad, Marjan Kuchaki Rafsanjani. Intrusion Detection Techniques for Detecting Misbehaving Nodes |
160 | -- | 162 | Dan Wang, Yufei Zhang. A Dynamic Secret Sharing Scheme Based on Factorization |
163 | -- | 171 | E. Vinod kumar, L. v. v. r. k. Sriharsha, Suresh Chandra Satapathy, P. V. G. D. Prasad Reddy. PSO Clustering with Preprocessing of Data Using Artificial Immune System |
172 | -- | 185 | Alireza Jolfaei, Abdolrasoul Mirghadri. Image Encryption Using Chaos and Block Cipher |
186 | -- | 190 | Zhaoxing Liu, Ning Zhang. One Improved Collaborative Filtering Method Based on Information Transformation |
191 | -- | 197 | Wan Malini Wan Isa, Jamaliah Abdul Hamid, Hamidah Ibrahim, Mohd Hasan Selamat, Rusli Abdullah, Nurul Amelina Nasharuddin. Testing the Accuracy of Text Deconstruction using PTree tool |
198 | -- | 204 | Juan Tian, Cheng Wang, Xixue Zhang. Design of the Storage Battery Online Monitoring System |
205 | -- | 216 | Roslina Ibrahim, Rasimah Che Mohd Yusoff, Hasiah Mohamed Omar, Azizah Jaafar. Students Perceptions of Using Educational Games to Learn Introductory Programming |
224 | -- | 0 | Lanhua Zhang. Studies of the HMIS Based on HL7 Criterions |