Abstract is missing.
- Welcome MessageMehdi Bahrami. 1-3 [doi]
- A Big Data Dashboard for Urban MobilityBalaji Prabhakar. 7-8 [doi]
- Combinatorial Methods in Software TestingRick Kuhn. 9-10 [doi]
- An Introduction to Multi-trapdoor Hash Functions and It's ApplicationsMukesh Singhal. 11-12 [doi]
- Soft Computing Methodology for Software EvaluationJozo Dujmovic. 13-14 [doi]
- Using Essence Reflection Meetings in Team-based Project CoursesTodd Sedano, Cécile Péraire. 15-16 [doi]
- An Evaluation of Security and Privacy Threats for Cloud-based ApplicationsMehdi Bahrami. 17-18 [doi]
- CLOURA: CLOUD Risk Assessor (with Stochastic & Non-Stochastic Simulations)Mehmet Sahinoglu. 19-20 [doi]
- A Suigeneris Automated Software Testing MethodologyShivanand M. Handigund. 21-22 [doi]
- ANN Based Robotic Arm Visual Servoing Nonlinear SystemHessa Al-Junaid. 23-30 [doi]
- Analysis of a Monte Carlo Tree Search in Knight-AmazonsHikari Kato, Mayumi Takaya, Akihiro Yamamura. 31-38 [doi]
- Analysis of Demographic Characteristics Creating Coronary Artery Disease Susceptibility Using Random Forests ClassifierKemal Akyol, Elif Çalik, Safak Bayir, Baha Sen, Abdullah Çavusoglu. 39-46 [doi]
- Real-Time Languages, Timed Alternating Automata, and Timed Temporal Logics: Relationships and SpecificationsAbdelaziz Fellah. 47-54 [doi]
- Towards Generating Essence Kernels Using Genetic AlgorithmsTodd Sedano, Cécile Péraire, Jason Lohn. 55-64 [doi]
- The Impact of Search Algorithms in Automated Program RepairFatmah Yousef Assiri, James M. Bieman. 65-72 [doi]
- High Speed Database Sequence ComparisonTalal Bonny, Bassel Soudan. 73-80 [doi]
- Requirement Management in Agile Software EnvironmentNomi Baruah. 81-83 [doi]
- Ranking of Fuzzy Similar Faces Using Relevance Matrix and Aggregation OperatorsAbdul-Rahman, Tanvir Ahmad, M. M. Sufyan Beg. 84-91 [doi]
- An Analysis of Software Reliability Assessment with Neuro-Fuzzy based Expert SystemsBonthu Kotaiah, M. V. S. Prasad, R. A. Khan. 92-98 [doi]
- Fuzzified Expert System for Employability AssessmentRajani Kumari, Sandeep Kumar, Vivek Kumar Sharma. 99-106 [doi]
- Fuzzy Measures in Multi-Criteria Decision MakingRonald R. Yager, Naif Alajlan. 107-115 [doi]
- Evaluation of Visualization of a Fuzzy-Based Recommender System for Political Community-BuildingLuis Terán. 116-125 [doi]
- OWA based Book Recommendation TechniqueShahab Saquib Sohail, Jamshed Siddiqui, Rashid Ali. 126-133 [doi]
- A Web based System for Cricket Talent Identification, Enhancement and Selection (C-TIES)Gulfam Ahamad, S. Kazim Naqvi, M. M. Sufyan Beg, Tanvir Ahmed. 134-142 [doi]
- Implementation of Fuzzy Decision Based Mobile Robot Navigation Using Stereo VisionKhalid Al Mutib, Ebrahim Mattar, Mansour Alsulaiman. 143-150 [doi]
- ASIC Implementation for Improved Character Recognition and Classification using SNN ModelMrs. S. Chaturvedi, A. A. Kurshid. 151-158 [doi]
- Modeling Firewalls for Behavior AnalysisPatrick G. Clark, Arvin Agah. 159-166 [doi]
- Tagged-Sub Optimal Code (TSC) Compression for Improving Performance of Web ServicesIehab Al Rassan, Haifa Alyahya. 167-169 [doi]
- Using First-Order Logic to Query Heterogeneous Internet Data SourcesDonald Cohen, K. Narayanaswamy. 170-177 [doi]
- Integration of Object Oriented Host Program with Network DBMSShivanand M. Handigund, Siddappa G. Makanur, M. Sreenivasa Rao. 178-185 [doi]
- Jitter Buffer Modelling and Analysis for TDM over PSNUsha Rani Seshasayee, Rathinam Manivasakan. 186-195 [doi]
- Impulsive Noise Cancellation of ECG signal based on SSRLSAlina Mirza, S. Mehak Kabir, Sara Ayub, Shahzad Amin Sheikh. 196-202 [doi]
- A Secure Healthcare System: From Design to ImplementationEbru Celikel Cankaya, Than Kywe. 203-212 [doi]
- Developing a Novel Holistic Taxonomy of Security RequirementsNeila Rjaibi, Latifa Ben Arfa Rabai. 213-220 [doi]
- A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-Driven Based Intrusion Detection SystemsAdamu I. Abubakar, Haruna Chiroma, Sanah Abdullahi Muaz, Libabatu Baballe Ila. 221-227 [doi]
- Impact on SDN Powered Network Services Under Adversarial AttacksQuamar Niyaz, Weiqing Sun, Mansoor Alam. 228-235 [doi]
- Towards a Knowledge Based Approach to Style Driven Architecture DesignShahrouz Moaven, Jafar Habibi, Razie Alidoosti, Alireza Parvizi-Mosaed. 236-244 [doi]
- Knowledge Representation through GraphsEdy Portmann, Patrick Kaltenrieder, Witold Pedrycz. 245-248 [doi]
- A Review of Evaluation Methods and Techniques for Simulation PackagesYasmeen Alomair, Iftikhar Ahmad, Abdullah Sharaf Alghamdi. 249-256 [doi]
- Quality Assurance through Rigorous Software Specification and Testing: A Case StudyLan Lin, Jia He, Yong Zhang, Fengguang Song. 257-265 [doi]
- ABCE: A Novel Framework for Improved Branch Coverage AnalysisSangharatna Godboley, Arun Sahani, Durga Prasad Mohapatra. 266-273 [doi]
- An Ameliorated Methodology for the Abstraction of Object Oriented Features from Software Requirements SpecificationA. M. Shivaram, Shivanand M. Handigund. 274-281 [doi]
- New Theory for Code-translation; Punctuator and Qualifier as Two Token Categories and Supplementary Concepts of ProgrammingBernaridho I. Hutabarat. 282-286 [doi]
- A Programming Environment for Visual Block-Based Domain-Specific LanguagesAzusa Kurihara, Akira Sasaki, Ken Wakita, Hiroshi Hosobe. 287-296 [doi]
- Second-Order Spline-Wavelet Robust Code under Non-Uniform Codeword DistributionAlla Levina, Sergey Taranov. 297-302 [doi]
- Predicting Number of Faults in Software System using Genetic ProgrammingSantosh S. Rathore, Sandeep Kumar. 303-311 [doi]
- Automated Business Rules Transformation into a Persistence LayerKarel Cemus, Tomás Cerný, Michael J. Donahoo. 312-318 [doi]
- CLOUD Computing: Cost-effective Risk Management with Additional Product DeploymentMehmet Sahinoglu, Sharmila Ashokan, Preethi Vasudev. 319-325 [doi]
- Big Data- Is a Turnkey SolutionEr. Ramandeep Kaur. 326-331 [doi]
- Global Collaboration Requirement Analysis System in Cloud ComputingIvan Prakasa, Osamu Shigo. 332-334 [doi]
- Cost-Efficient Risk Management with Reserve Repair Crew Planning in CLOUD ComputingMehmet Sahinoglu, Sharmila Ashokan, Preethi Vasudev. 335-342 [doi]
- A Cloud to Mobile Application for Consumer Behavior ModificationDustin Wright, Xing Yan, Pooja Srinivas, Atieh Kashani, Yusuf Öztürk. 343-351 [doi]
- E-learning Systems Based on Cloud Computing: A ReviewGhazal Riahi. 352-359 [doi]
- A Parametric Empirical Bayes Model to Predict Software Reliability GrowthNéstor R. Barraza. 360-369 [doi]
- Gaussian Mixture Distribution Analysis as Estimation of Probability Density Function and it's the PeripheryKiyoshi Tsukakoshi, Kenichi Ida. 370-377 [doi]
- A Hierarchical Method for Solving Soft Nonlinear ConstraintsHiroshi Hosobe. 378-384 [doi]
- Impact of Developer Choices on Energy Consumption of Software on ServersJasmeet Singh, Kshirasagar Naik, Veluppillai Mahinthan. 385-394 [doi]
- Towards Search Engine Optimization: Feedback CollationEiman Tamah Al-Shammari. 395-402 [doi]
- Unequal Clustering by Improved Particle Swarm Optimization in Wireless Sensor NetworkSolmaz Salehian, Shamala. K. Subraminiam. 403-409 [doi]
- An Optimized Genetic Stowed Biometric Approach to Potent QOS in MANETSherin Zafar, M. K. Soni, M. M. S. Beg. 410-418 [doi]
- MRAI Optimization for BGP Convergence Time Reduction without Increasing the Number of Advertisement MessagesEatedal Alabdulkreem, Hamed S. Al-Raweshidy, Maysam F. Abbod. 419-426 [doi]
- A Distinctive Genetic Approach for Test-Suite OptimizationSrividhya Jeyaprakash, K. Alagarsamy. 427-434 [doi]
- A Review of the Applications of Bio-inspired Flower Pollination AlgorithmHaruna Chiroma, Nor Liyana Mohd Shuib, Sanah Abdullahi Muaz, Adamu I. Abubakar, Lubabatu Baballe Ila, Jaafar Zubairu Maitama. 435-441 [doi]
- Fitness Based Position Update in Spider Monkey Optimization AlgorithmSandeep Kumar, Rajani Kumari, Vivek Kumar Sharma. 442-449 [doi]
- A New Competitive Intelligence-based Strategy for Web Page SearchIman Rasekh. 450-456 [doi]
- 2: A New Approach for the Transformation of the DTD to OWLMokhtaria Hacherouf, Safia Nait Bahloul. 457-466 [doi]
- An Ameliorated Methodology to Abstract Object Oriented Features from Programming SystemShivanand M. Handigund, B. N. Arunakumari. 470-477 [doi]
- High-Level Representation of Time in Diagrammatic SpecificationSabah Al-Fedaghi. 478-486 [doi]
- Validation of Usability Driven Web based Software Process Model using SimulationHina Gull, Saleh Alrashed, Sardar Zafar Iqbal. 487-494 [doi]
- A Generic Model of Execution for Synthesizing Interpreted Domain-Specific ModelsMark Allison, Peter J. Clarke, Xudong He. 495-504 [doi]
- A Theoretical Framework for the Maintainability Model of Aspect Oriented SystemsAnanthi Sheshasaayee, Roby Jose. 505-512 [doi]
- Arabic Ontology Model for Financial AccountingA. Hegazy, M. Sakre, Eman Khater. 513-520 [doi]
- Morphological Analysis in the Environment "TELA"Khaireddine Bacha, Mounir Zrigui. 521-528 [doi]
- Predicting Unit Testing Effort Levels of Classes: An Exploratory Study based on Multinomial Logistic Regression ModelingMourad Badri, Fadel Touré, Luc Lamontagne. 529-538 [doi]
- Domain Model Validation of Context-aware Mobile Patient Monitoring SystemsMahmood Ghaleb Al-Bashayreh. 539-546 [doi]
- Exploring a Context-based Network Access Control for Mobile DevicesYaser Mowafi, Dhiah el Diehn I. Abou-Tair, Ahmad Zmily, Tareq Al-Aqarbeh, Marat Abilov, Viktor Dmitriyevr. 547-554 [doi]
- Mobile Platform Detect and Alerts System for Driver FatigueMaysoon Abulkhair, Arwa H. Alsahli, Kawther M. Taleb, Atheer M. Bahran, Fatimah M. Alzahrani, Hend A. Alzahrani, Lamiaa Fattouh Ibrahim. 555-564 [doi]
- Precepts and Evolvability of Complex SystemsUrjaswala Vora. 565-574 [doi]
- Strategic Accumulation and Organization of the Polish Contexts in Research Document CreationRyo Onuma, Hiroki Nakayama, Shuhei Abe, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 575-577 [doi]
- Evolution of Modern Management through Taylorism: An Adjustment of Scientific Management Comprising Behavioral ScienceNasir Uddin, Fariha Hossain. 578-584 [doi]
- Multi-View Human Action Recognition Using Wavelet Data Reduction and Multi-Class ClassificationAlihossein Aryanfar, Razali Yaakob, Alfian Abdul Halin, Md Nasir Sulaiman, Khairul Azhar Kasmiran, Leila Mohammadpour. 585-592 [doi]
- Simulation Studies for Analysis of Inherent Resilience Properties of an Amine Regeneration Column used in a Gas Sweetening UnitSirshendu Guha. 593-602 [doi]
- A Study on the Limitations of Evolutionary Computation and other Bio-inspired Approaches for Integer FactorizationMohit Mishra, Vaibhav Gupta, Utkarsh Chaturvedi, K. K. Shukla, Roman V. Yampolskiy. 603-610 [doi]
- Optimal Design of A Standing Wave Thermoacoustic Refrigerator Using GAMSL. K. Tartibu, B. Sun, M. A. E. Kaunda. 611-618 [doi]
- Revealing of Earth Quake Magnitude Using Seismic Signals and Wavelet TransformsG. V. S. Raju, Kishor Kumar Reddy, L. V. Narasimha Prasad. 619-627 [doi]
- Hybrid Analysis of Audience Gaze and Slide Construction to Obtain the Clues for Improving PresentationsTomohiro Funayama, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 628-630 [doi]
- Usability Evaluation of Tadarus: Student PerceptionsMona Alkhattabi. 631-636 [doi]
- Satellite Derived pH Estimation for Acidity in Precipitation Using Water Vapor and Nitrogen Dioxide ImageryL. V. Narasimha Prasad, Kishor Kumar Reddy, Shobha Rani Depuru. 637-648 [doi]
- 2-Bit Branch Predictor Modeling Using Markov ModelReem Elkhouly, Ahmed El-Mahdy, Amr Elmasry. 650-653 [doi]