ISBN No. 978-81-929653-8-3
Sr.No. | Paper Title & Author(s) | Page No. |
1 | Towards a Conceptual Models to Assess the Factors impacting the Non-Financial Value of Business Intelligence Adheesh Budree, Prof. Louis C.H. Fourie, and Dr. Olaf Jacob | 1 |
2 | Data Preprocessing and Transformation Technique to Generate Pattern from the Web Log Abdul rahaman wahab sait, and Dr.T.Meyappan | 6 |
3 | An Estimation of Missing Values by Modified Mixed Kernels Hemalatha.S, and M.Hemalatha | 10 |
4 | Decision Support System for Urban Service Failures Hasan Ali Akyürek, and Ihsan Ömür Bucak | 16 |
5 | An Imperative Analysis of diverse State of Art Solutions for Internet and Web Application Security Dr. Salu George | 21 |
6 | Quantum Key Distribution Approach for Cloud Authentication: Enhance Tight Finite Key Zuriati Ahmad Zukarnain, and Roszelinda Khalid | 28 |
7 | Can we use Daily Internet Search Query Data to Improve Predicting Power of EGARCH Models for Financial Time Series Volatility? Dimche Risteski, and Danco Davcev | 34 |
8 | A Method for Estimating Maintenance Cost of Package Software Woo Je Kim, and Soo Jin Jung | 39 |
9 | Id-Based Mutual Authentication With Signcryption Scheme For Mobile Devices Bushra Al-Jaafreh, Mohammad Alhammouri, and Qusai Abuein | 44 |
10 | A Fuzzy AHP Approach for Assessing Value Proposition in eCommerce Websites in SMEs in Abu Dhabi Ahmad Ghandour | 54 |
11 | Fixed-point Simulink Designs for Automatic HDL Generation of Binary Dilation & Erosion Gurpreet Kaur, Nancy Gupta, and Mandeep Singh | 61 |
12 | Behavior Based Anomaly Detection for Smartphones using Machine Learning Algorithm Khurram Majeed, Dr Yanguo Jing, Dr Dusica Novakovic, and Prof Karim Ouazzane | 67 |
13 | Parallelized Multi-Key Multi-Stage Cryptography Ahmed Alsheikhy, and Badar Almarri | 74 |
14 | Improving the Intelligence System for Arrhythmia Heart Classification by Extract the Parallel Time Feature Aliasghar Zaresani, Reza Mazlooman, Iman Zabbah, and Mandana Abdollahzadeh | 79 |
15 | Modified Skin Tone Image Hiding Algorithm For Steganographic Applications Geetha C. R., and Dr. Puttamadappa C. | 83 |
16 | Employing Chaotic Encryption for IEEE 802.15.4-based LR-WPANs Cuneyt Bayilmis, Unal Cavusoglu, Akif Akgul, Abdullah Sevin, and Sezgin Kacar | 89 |
17 | Steganalysis On Audio Data Through Probabilistic Neural Network Using An Ideal Bias Ali DURDU, and Ahmet Turan OZCERIT | 93 |
18 | Towards a Best Practice Based e-Government Portals Maturity Model Abdoullah Fath-Allah, Laila Cheikhi, Rafa E. Al-Qutaish, and Ali Idri | 101 |
19 | A Searchtask and Sub-searchtask Oriented Recommender Hebein Gunther Cyrill | 108 |
20 | Fuzzy AHP and Fuzzy DEMATEL methods for supplier selection criteria Davood Gharakhani, Sona Taromian, Keivan Dadras, and Alireza Fakhar | 112 |
21 | An Enhanced Weight Based Clustering Algorithm for Mobile Adhoc Networks Danish Shehzad, Waqar Ishaq, Zakir Khan, and Junaid Iqbal | 116 |
22 | A Novel Mechanism for Detection of Sybil Attack in MANETs Danish Shehzad, Dr. Arif Iqbal Umar, Noor Ul Amin, and Waqar Ishaq | 119 |
23 | Iris Localization and Recognition Using Second Gradient Norm Features Iman A. Saad, and Loay E. George | 123 |
24 | Cache Coherence Protocols in Multi-Processor Azilah Saparon, and Fatin Najihah Bt Razlan | 129 |
25 | Power System Mode Tracking Using Recursive Subpace System Identification Aliakbar Mohammadi | 135 |
26 | A Contribution to Study of a GPV System MPPT With (P&O) and (FLC) Algorithms Dib Djalel, Mordjaoui Mourad, and Abdulhabeb Abdulhabeb | 140 |
27 | Some Investigations of Stretching operation of EDD Steel at elevated Temperatures using FEM Eswar Prasad.K, Raman Goud Rachala, Swadesh Kumar Singh, and Amit Kumar Gupta | 147 |