Volume 3 - Issue 1 (January 2014)
# | Article Title |
1 |
Development of a Web-Based Geographical Information System for Interactive Visualization and Analysis of Container Itineraries Authors : Tatyana Dimitrova, Aris Tsois, Elena Camossi |
2 |
Intrusion Detection Based on Information Entropy of Multiple Support Vector Machine Author : Li Wei |
3 |
Gender and Mobile Payment System Adoption among Students of Tertiary Institutions in Nigeria Authors : Aminu Hamza, Asadullah Shah |
4 |
Validity of Use of Various Concepts of Risk Management and Risk Engineering in Practice Author : Dana Prochazkova |
5 |
Synthesis of Moore FSM with Expanded Coding
Space Authors : Olena Hebda, Larysa Titarenko |
6 |
Dynamic Scaling of Pipeline Depth: Power Analysis of a Floating-point Fused Multiply-Add Unit Authors : Hunpil Kim, Yongsurk Lee, Sukhan Lee |
7 |
Multi-Objective Vehicle Routing Problems with Time Windows: A Vector Evaluated Artificial Bee Colony Approach Authors : Oren Efraim Nahum, Yuval Hadas, Uriel Spiegel |
8 |
Noise Signal Identification by Modified Self-Organizing Maps Authors : Thomas Bryant, Mohamed Zohdy |
9 |
A Collaboration Index for Research Institutions Authors : Tendani J. Lavhengwa, Eve M. Lavhengwa, Jacobus S. van der Walt |
10 |
On the Feasible Sets of Products of bi-hypergraphs Authors : Jihong Liu, Jingge Bai, Wenai Xu, Ping Zhao |
11 |
The Role of Information Technology Centers in Improving Education: Analytical Study of Taibah University Author : Qasem Nijem |
12 |
Adaptive Phase Matching in Grover's algorithm with
Weighted Targets Authors : Shuyun Yang, Panchi Li |
13 |
Mathematical Approximation of Delay in Voice over IP Author : Mohammed M. Alani |
14 |
Quantum-inspired Neural Networks with
Applications Authors : Maojun Cao, Panchi Li |
15 |
A Robust Method for Recognizing Accents in Vietnamese Handwriting Characters Authors : Trong-Nguyen Nguyen, Huu-Hung Huynh, Jean Meunier |
16 |
Remote Asynchronous Testing: A Cost-Effective
Alternative for Website Usability Evaluation Authors : Rob Martin, Majed Al Shamari, Mohamed E.Seliaman, Pam Mayhew |
17 |
MAC Protocols Security in Wireless Sensor Networks: A Survey Authors : Ehsan Sharifi, Mohammadreza Khandan, Mahboobeh Shamsi |
18 |
‘Exceptions’ in Queuing Theory Authors : Harpreet Singh, Muhammad Ghazie Ismail |
19 |
Design and Implementation of Result Processing System for Public Secondary Schools in Nigeria Authors : Ezenma A. Añulika, Emmanuel Bala, Choji D. Nyap |
20 |
A Comparative Study between AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks using Network Simulator NS2 Author : Marwan Aziz Mohammed |
21 |
Motivation for Trainee Teachers: Non-Computing Background Learn Action Script Author : Erni Marlina Saari |
22 |
Learning Time-based Rules for Prediction of Alarms from Telecom Alarm Data Using Ant Colony Optimization Authors : Imran Khan, Joshua Z. Huang, Nguyen Thanh Tung |
23 |
Video Indexing: A Survey Authors : Muhammad Nabeel Asghar, Fiaz Hussain, Rob Manton |
24 |
Integrity Modeling - A Study Among Malaysian Academic Management Officers Authors : Azman Ta’a, Kamarul Faizal Hashim, Muhammad Shahbani Abu Bakar, Luthfi Mohd Radzi |
25 |
Artificial Neural Networks Application to Predict Type of Pregnancy in Women Equal or Greater Than 35 Years of Age Authors : Sedigheh Nouhjah, Sharareh R. Niakan Kalhori |
26 |
Automated Quality Assurance System Authors : Kshirsagar Aniruddha P., Balekar Swapnaja S., Rasal Swati A. |