Abstract is missing.
- Syntax Analyzer & Selectivity Estimation Technique Applied on Wikipedia XML Data SetMuath Alrammal, Gaétan Hains. 3-8 [doi]
- PSO Based Indoor RFID Network PlanningFawzi M. Al-Naima, Raoof T. Hussein. 9-14 [doi]
- A New eRobotics Approach to Simulation-Based Analysis and OptimizationLinus Atorf, Eric Guiffo Kaigom, Jürgen Roßmann. 15-20 [doi]
- Optimum Localization of Wind Turbine Sites Using Opposition Based Ant Colony OptimizationFarhad Pouladi, Amir Mohammad Gilani, Bahareh Nikpour, Hojjat Salehinejad. 21-26 [doi]
- Remote Sensing Image-Based Analysis for Effects of Urbanization on Climate QuantifyingM. Zoran, R. Savastru, D. Savastru. 27-32 [doi]
- Analysis of Environmental Impacts in Urban Areas by Geospatial DataM. Zoran, R. Savastru, D. Savastru. 33-38 [doi]
- Innovative RFID Solution for Tracking and ControlSami Miniaoui, Faouzi Kamoun. 41-45 [doi]
- M2M Rendezvous Redundancy for the Internet of ThingsAndrew Attwood, Omar Abuelma'atti, Paul Fergus. 46-50 [doi]
- Analysis of Probabilistic Forwarding in Opportunistic Networks Using the Percolation TheoryD. G. Reina, Radu-Ioan Ciobanu, Sergio L. Toral Marín, Ciprian Dobre, Federico Barrero. 51-56 [doi]
- Performance Evaluation of Structured Peer-to-Peer Overlays for Use on Mobile NetworksFarida Chowdhury, Mario Kolberg. 57-62 [doi]
- Simultaneous Perturbation Stochastic Approximation-Based Localization Algorithms for Mobile DevicesMohammad Abdul Azim, Zeyar Aung. 63-68 [doi]
- Iterative Hybrid Decision-Feedback Equalization (HDFE) Based Single-Carrier IDMA SchemesSalah Awad Al-Iesawi. 69-72 [doi]
- Outlier Preprocessing in Wireless Sensor Networks: A Two-Layered Ellipse ApproachIbrahim Khamis, Zeyar Aung. 73-78 [doi]
- Reusing Dormant Distributed Legacy Data for Evidence Based MedicineJan Sliwa, Emmanuel Benoist. 81-86 [doi]
- Automatic Extraction of an Effective Rule Set for Fall Detection for a Real-Time Mobile Monitoring SystemGiovanna Sannino, Ivanoe De Falco, Giuseppe De Pietro. 87-92 [doi]
- Wavelet-Neural Classification of Sleep EEG under Stressful ConditionPrabhat Kumar Upadhyay, Rakesh Kumar Sinha. 93-98 [doi]
- A Bayesian Approach for the Classification of Mammographic MassesTarek Elguebaly, Nizar Bouguila. 99-104 [doi]
- Classification of Pervasive Healthcare SystemsMohamed Al-Hemairy, Mohamed Adel Serhani, Yacine Atif, Saad Amin. 105-110 [doi]
- EEG-based Driver Fatigue DetectionHamzah S. AlZu'bi, Waleed Al-Nuaimy, Nayel S. Al-Zubi. 111-114 [doi]
- A Human-Robot Sub-dialogues Structure Using XML Document Object ModelMajid A. Al-Taee, Suhail N. Abood, Nada Y. Philip. 115-120 [doi]
- A Technology Acceptance Model for a User-Centred Culturally-Aware E-Health DesignAbdul Hakim H. M. Mohamed, Hissam Tawfik, Lin Norton, Dhiya Al-Jumeily. 121-125 [doi]
- Medical Evaluative Research and Privacy ProtectionJan Sliwa, Emmanuel Benoist. 126-131 [doi]
- CG&A with Eye Tracking for Cognitive Behavior Analysis and PsychoanalysisSharmila Subrahmaniam. 132-137 [doi]
- Fast and Robust Online Calibration of a Multi-laser Tracking SystemTran Trung Nguyen, Heiko Weiss, Arvid Amthor, Christoph Ament. 141-144 [doi]
- Intrinsic Plagiarism Detection Using Latent Semantic Indexing and StylometryMuna Alsallal, Rahat Iqbal, Saad Amin, Anne E. James. 145-150 [doi]
- Advanced 3D Simulation Technology for eRobotics: Techniques, Trends, and ChancesMichael Schluse, Christian Schlette, Ralf Waspe, Jürgen Roßmann. 151-156 [doi]
- Design Pattern Evaluation of Mobile and Web Based Application FrameworksAlexander Katzmaier, Martin Hanneghan. 157-162 [doi]
- It's the Ecosystem, Stupid: Lessons from an Anti-Copernican Revolution of User-Centric Service Quality in TelecommunicationsPeter Karl Reichl. 163-168 [doi]
- Perception and Adoption of Mobile Internet Service Quality in IraqMartin Knahl, Rawand Sulayman Mahmood. 169-173 [doi]
- Integrated E-System for Pollution and Climate Change Monitoring in the Framework of the Romanian Atmospheric Research 3D Observatory - RADOL. Belegante, Florica Toanca, Jeni Vasilescu, Doina Nicolae, Anca Nemuc. 174-177 [doi]
- Advances in eRobotics: An Overview of Principles and Applications for Space, Industry, and Environmental MonitoringJürgen Roßmann. 178-183 [doi]
- Solving 8-Queens Problem by Using Genetic Algorithms, Simulated Annealing, and Randomization MethodBelal Al-Khateeb, Wadhah Z. Tareq. 187-191 [doi]
- Agents' Monitoring Approach for Big DataMartin Randles, David J. Lamb, Andrew Attwood. 192-197 [doi]
- Energy Efficient Cloud Computing Environment via Autonomic Meta-director FrameworkThar Baker, Yanik Ngoko, Rafael Tolosana-Calasanz, Omer F. Rana, Martin Randles. 198-203 [doi]
- Novel Approach for Blind Source SeparationMd. Shiblee, B. Chandra. 204-208 [doi]
- A Critical Evaluation of the Rational Need for an IT Management System for Flash Flood Events in Jeddah, Saudi ArabiaMohammad Hijji, Saad Amin, Rahat Iqbal, Wayne Harrop. 209-214 [doi]
- Data Analysis through Information Visualisation for eGovernments & eBusinessesWajid Khan, Fiaz Hussain. 215-220 [doi]
- Using Virtual World Environments in Conservation-RestorationLaurentiu-Marian Angheluta. 221-224 [doi]
- CASPER: Computer Assisted Search Prioritisation and Environmental Response ApplicationDenis J. Reilly, Chris Wren, Susan Giles, Lisa Cunningham, Paul Hargreaves. 225-230 [doi]
- Time Series Analysis for Cyberthreat Detection and PreventionAlecsandru Chirosca, Gianina Chirosca. 231-235 [doi]
- An Enhanced Cryptographic Technique for Messages Traveling between ComputersOmar Kassem Khalil, Aissa Boudjella. 239-242 [doi]
- Solution Space Optimization for RSA AttackNizar Naji Albassam, Mahdi Nasereddin.. 243-246 [doi]
- Efficient Symmetric and Heterogeneous Mobile Group-Based Key Management ProtocolFoad Salem Mubarek, Sufyan T. Faraj Al-Janabi. 247-252 [doi]
- Robust and Fragile Watermarking Scheme Based on DCT and Hash Function for Color Satellite ImagesSultan Al-Shehhi, Mohammed Al-Muhairi, Dalia Abuoeida, Hussain Al-Ahmed, Naoufel Werghi, Alavi Kunhu. 253-258 [doi]
- Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining AlgorithmSamaher Hussein Ali. 259-269 [doi]
- Ensure Security of Compressed Data TransmissionAli Makki Sagheer, Muzhir Shaban Al-Ani, Omar Adil Mahdi. 270-275 [doi]
- User-Specific Fusion Using One-Class Classification for Multimodal Biometric Systems: Boundary MethodsQuang Duc Tran, Panos Liatsis. 276-280 [doi]
- SMS Security for SmartphoneAli Makki Sagheer, Ayoob Abdulmunem Abdulhameed, Mohammed Adeeb AbdulJabbar. 281-285 [doi]
- A Modified Equal Error Rate Based User-Specific Normalization for Multimodal BiometricsQuang Duc Tran, Panos Liatsis. 286-290 [doi]
- Securing Customer Email Communication in E-CommerceAndres Ojamaa, Uku-Rasmus Lind. 291-296 [doi]
- Using of Cement Kiln Dust as a Mineral Admixture to Produce Sustainable Self-Compacting ConcreteKhalid Battal Najim, Zaher Shakir Mahmood. 299-302 [doi]
- Development of Normal Strength Concrete from Crushed Al-Ma'mora StonesYaseen T. Khaleel, Omar H. Jasim. 303-307 [doi]
- Novel Multivariate Time Series Clustering Approach for E-Governance of Crime DataB. Chandra, Manish Gupta 0005. 311-316 [doi]
- Proposed Design for an E-Government Web Portal Application Using Cloud ComputingRabea Kurdi, Martin Randles. 317-322 [doi]
- An Investigation into Saudi Online Shoppers' Behaviour AbroadHaya Alshehri, Farid Meziane. 323-327 [doi]
- RFID Speed Monitoring SystemAhmed Al-Gindy, Ayman Tawfik, Laila Sakhi, Hibaq Mohamad, Manahil Mustafa. 328-331 [doi]
- A Framework to Support E-Commerce Development for People with Visual ImpairmentHulya Francis, Dhiya Al-Jumeily, Tom Oliver Lund. 335-341 [doi]
- Active Learning System in the Context of the Social Semantic WebIoan Szilagyi, Ana Roxin, Ioan Roxin. 342-347 [doi]
- Assessing the Impact of Web-Based Technology on Learning Styles in EducationMohammed AlGhamdi, David J. Lamb, Dhiya Al-Jumeily, Abir Jaafar Hussain. 348-353 [doi]
- Towards Lifestyle-Oriented and Personalised E-Services for Elderly CareHissam Tawfik, Obinna Anya. 357-360 [doi]
- ContextMorph: A Model of Context-Aware Cross-Boundary Decision Support in E-HealthObinna Anya, Hissam Tawfik, Atulya Nagara. 361-366 [doi]
- A Mobile Multimedia Application Inspired by a Spaced Repetition Algorithm for Assistance with Speech and Language TherapyDavid Folksman, Paul Fergus, Dhiya Al-Jumeily, Chris Carter. 367-375 [doi]
- Medical Diagnosis: Are Artificial Intelligence Systems Able to Diagnose the Underlying Causes of Specific Headaches?Anthony Farrugia, Dhiya Al-Jumeily, Mohammed Al-Jumaily, Abir Hussain, David J. Lamb. 376-382 [doi]