Message

Welcome to the official site of IIE. Our goal is to to bring together Researchers, Scientists, Engineers, Scholars and Students in the areas of Engineering & Technology, and provides a forum for dissemination of results, new ideas, Research & development and practical experiments, which concentrate on both theory and practices, for the benefit of common man.
IIE-Chair
Read More

Oct. 17-18, 2014 Dubai (UAE) Back

ISBN No. 978-81-929653-8-3

http://dx.doi.org/10.15242/IIE.E1014

 

Sr.No.Paper Title & Author(s)Page No.
1Towards a Conceptual Models to Assess the Factors impacting the Non-Financial Value of Business Intelligence
Adheesh Budree, Prof. Louis C.H. Fourie, and Dr. Olaf Jacob
1
2Data Preprocessing and Transformation Technique to Generate Pattern from the Web Log
Abdul rahaman wahab sait, and Dr.T.Meyappan
6
3An Estimation of Missing Values by Modified Mixed Kernels
Hemalatha.S, and M.Hemalatha
10
4Decision Support System for Urban Service Failures
Hasan Ali Akyürek, and Ihsan Ömür Bucak
16
5An Imperative Analysis of diverse State of Art Solutions for Internet and Web Application Security
Dr. Salu George
21
6Quantum Key Distribution Approach for Cloud Authentication: Enhance Tight Finite Key
Zuriati Ahmad Zukarnain, and Roszelinda Khalid
28
7Can we use Daily Internet Search Query Data to Improve Predicting Power of EGARCH Models for Financial Time Series Volatility?
Dimche Risteski, and Danco Davcev
34
8A Method for Estimating Maintenance Cost of Package Software
Woo Je Kim, and Soo Jin Jung
39
9Id-Based Mutual Authentication With Signcryption Scheme For Mobile Devices
Bushra Al-Jaafreh, Mohammad Alhammouri, and Qusai Abuein
44
10A Fuzzy AHP Approach for Assessing Value Proposition in eCommerce Websites in SMEs in Abu Dhabi
Ahmad Ghandour
54
11Fixed-point Simulink Designs for Automatic HDL Generation of Binary Dilation & Erosion
Gurpreet Kaur, Nancy Gupta, and Mandeep Singh
61
12Behavior Based Anomaly Detection for Smartphones using Machine Learning Algorithm
Khurram Majeed, Dr Yanguo Jing, Dr Dusica Novakovic, and Prof Karim Ouazzane
67
13Parallelized Multi-Key Multi-Stage Cryptography
Ahmed Alsheikhy, and Badar Almarri
74
14Improving the Intelligence System for Arrhythmia Heart Classification by Extract the Parallel Time Feature
Aliasghar Zaresani, Reza Mazlooman, Iman Zabbah, and Mandana Abdollahzadeh
79
15Modified Skin Tone Image Hiding Algorithm For Steganographic Applications
Geetha C. R., and Dr. Puttamadappa C.
83
16Employing Chaotic Encryption for IEEE 802.15.4-based LR-WPANs
Cuneyt Bayilmis, Unal Cavusoglu, Akif Akgul, Abdullah Sevin, and Sezgin Kacar
89
17Steganalysis On Audio Data Through Probabilistic Neural Network Using An Ideal Bias
Ali DURDU, and Ahmet Turan OZCERIT
93
18Towards a Best Practice Based e-Government Portals Maturity Model
Abdoullah Fath-Allah, Laila Cheikhi, Rafa E. Al-Qutaish, and Ali Idri
101
19A Searchtask and Sub-searchtask Oriented Recommender
Hebein Gunther Cyrill
108
20Fuzzy AHP and Fuzzy DEMATEL methods for supplier selection criteria
Davood Gharakhani, Sona Taromian, Keivan Dadras, and Alireza Fakhar
112
21An Enhanced Weight Based Clustering Algorithm for Mobile Adhoc Networks
Danish Shehzad, Waqar Ishaq, Zakir Khan, and Junaid Iqbal
116
22A Novel Mechanism for Detection of Sybil Attack in MANETs
Danish Shehzad, Dr. Arif Iqbal Umar, Noor Ul Amin, and Waqar Ishaq
119
23Iris Localization and Recognition Using Second Gradient Norm Features
Iman A. Saad, and Loay E. George
123
24Cache Coherence Protocols in Multi-Processor
Azilah Saparon, and Fatin Najihah Bt Razlan
129
25Power System Mode Tracking Using Recursive Subpace System Identification
Aliakbar Mohammadi
135
26A Contribution to Study of a GPV System MPPT With (P&O) and (FLC) Algorithms
Dib Djalel, Mordjaoui Mourad, and Abdulhabeb Abdulhabeb
140
27Some Investigations of Stretching operation of EDD Steel at elevated Temperatures using FEM
Eswar Prasad.K, Raman Goud Rachala, Swadesh Kumar Singh, and Amit Kumar Gupta
147

Conference Gallery

Indexing / Supported by