4 IEEE. Open Systems (ICOS 2011) Langkawi, Malaysia IEEE Conference on September 2011 ISBN:

Size: px
Start display at page:

Download "4 IEEE. Open Systems (ICOS 2011) Langkawi, Malaysia IEEE Conference on September 2011 ISBN:"

Transcription

1 2011 IEEE Conference on Open Systems (ICOS 2011) Langkawi, Malaysia September IEEE IEEE Catalog Number: CFPl 11 OM-PRT ISBN:

2 Content pp. A31: Open Systems and Technology I Interactive Augmented Reality Environments for Engineering with Open Systems 1-5 M. 5. Sidhu Self Reorganizing Network in Bluetooth Scatternet T. Bakhsh, H. Hasbulloh, S. TahirondA. Sheikh Target Distance Estimation Using Monocular Vision System for Mobile Robot M. N. Ab Wahab, S. Nadarajah and K. Sundaraj Architectural Design of Fuzzy Inference Processor Using Triangular-Shaped Membership Function S. Loan and A. Murshid An Early Design Estimation Approach to Synthesize the Low-Power Pre-Computation Based Content Addressable Memory R. Shen, C. H. Peng and F. La! Improving Shape Feature Descriptor Complexity Via Wavelet Decomposition F. Mohd Anuar, M. F. Ahmad Fauzi and S. Mansor Image Retrieval System Based on Color Layout Descriptor and Gabor Filters H. Jalab A Threshold-based Similarity Measure for Duplicate Detection M. Ektefa, F. Sidi, H. Ibrahim, M. A. Jabar, S. Memar Kouchehbagh and A. Ramli A Conceptual Framework of Tacit Knowledge Transfer for Problem Based Learning Teaching Method in System Analysis and Design Course M. Ahmad, A, Zalnol, N. Muhd Darus, Z. Marzuki and F. Baharom Effect of Demographic Factors on Knowledge Creation Processes in Learning Management System Among Postgraduate Students M. Ahmad, J. A. Abu Bakar, N. I, Yahya, N. YusofandA. N. Zulkifli A Study on Implementation of Idle Network Memory Virtualization for Cloud C. Natarajan andr. Abdullah An Investigation of a Requirements Management Tool Elements A. Zalnol and S. Mansoor

3 B31: Security A Cryptanalytic Attack on Vigenere Cipher Using Genetic Algorithm Omran, A. Al-Kbalid and D. Al-Saady The Cryptanalysis and Extension of the Generalized Golden Cryptography M. Tahghighi, S. Turaev, ft. Mahmod, A. Jaafar and M. Md. Said Hash Functions-based Random Number Generator with Image Data Source Hedayatpour and S. Chuprat Behavioral Analysis on IPv4 Malware on Different Platforms in IPv6 Network Environment Muslim, S. A. Asmai, H. Nahar, Z. Ayop and S. Sahib Secure Electronic Voting System Based on Image Steganography L Rura, B. Issac and M. K. Haldar The Privacy Protection Framework for Biometric Information in Network Based CCTV Environment B. J. Han, H. Jeong and Y. J. Won Representing Software Changes At Component Level Using Call Graph N. Ismail, N. L, Hashim, A. Zainol, N. Nordin, Z. Che Ani and N. MohdZauki Towards a Mobile Security & Privacy Simulator Henne, C. Szongott and M. Smith Traceability in Digital Forensic Investigation Process S. ft. Selamat, R. Yusof, S. Sahib, N. H, Hassan, M. F. Abdollah andz. ZainalAbidin Semi-Fragile Watermarking for Gesture Authentication W. Chaw Seng, S. A. Hosseini and Leong Lai Fang Energy Cost Analyses of Key Management Techniques for Secure Patient Monitoring in WSN M. Majidl, R. Mobarhan, A. Hatami Hardoroudi, A. S. Ismail and A. Khodashenas Parchinaki Securing Routing Table Update in AODV Routing Protocol K. Abd Jalil, Z. Ahmad and J.I.Ab Manan A32: Open Systems Applications I Ontology of Moodle e-learning System for Social Network Analysis W. Yusof, F. Mansur and M, S. Othman CloudZone: Towards an Integrity Layer of Cloud Data Storage Based on Multi Agent System Architecture A. Mohamed Talib, R. Atan, ft. Abdullah andm, A. Azmi Murad

4 Introduction, Exam Timetabling Using Graph Colouring Approach S. Hussin, A. S. Hasan Basari and S. A. Asmai A RIA Based Virtual Instrument Platform for Test and Measurement Education He Lingsong and L. Wei The Motivational Design and Development of Interactive Multimedia Learning Courseware for Islamic Sex Education (ISE) -A Parental Guide N. Mohamed Noor, A. N. Zulkifliand F. Siraj The Use of Multimedia, Augmented Reality (AR) and Virtual Environment (VE) Enhancing Children's Understanding of Road Safety N. A. Abu Bakar in Simple Equation Guide for Multi-layer Earth Structure with Soil Electrical Properties S. M. T. Islam and Z. Chik Review of Hydrate Prevention Methods for Deepwater Pipelines M. A. Md Haniffa and F. Mohd Hashim Utilization of Mobile Technology for Mobile Robot Controller S. Kahar, I. R. Sulaiman, M. F. Mohamad Amran, S. Marjudi and A. S. Prabuwono A Study on CAD Systems for Food Packaging , Marjudi, I. R. Sulaiman, M. F. Mohamad Amran, 5. Kahar and K. A. Abdullah B32: Open Systems and Technology II Open Source Cloud Computing Management Platforms - Recommendations for Implementation 5. Wind Comparison, and IntelligentGrid: Rapid Deployment of Grid Compute Nodes for Immediate Execution of Batch and Parallel Applications A. Nazir, H. Ong, SSeM, R. Kand M. Sidek Dynamic Layout Algorithms for Wireless Field Hockey Strategy System R, Canda ands. Subramanlam A Novel Fuzzy Based Method for 3D Buildings Modelling in Urban Satellite Imagery Yousefi, s, M, Mirhassani, M.M.hossein! and M, J. Rastegar Fatemi An Investigation of Femtocell Network Synchronization M. Hasan, R, Saeed, A. H. Abdulla, S. Islam, O. Khalifa, A. F. Ismail and 0. Omer The Routing Performance of Logarithmic-Hop Structured P2P Overlay S. Khan, A. GaniandM. Sreekandath

5 MPI Communication Benchmarking on Intel Xeon Dual Quad-Core Processor Cluster R. Ismail and M. Azizi An Extended Method for Recognition of Broken Typewritten Characters Special Reference to Tamil Script N. F. Abubacker and ft. Indra Gandhi A Novel Fuzzy Inference Processor Using Trapezoidal-Shaped Membership Function S. Loan and A. Murshid A Code Generator for Component Oriented Programming Framework M. Aghajani Siroos Talab and D. Jawawi A41: Open Systems Applications II Traffic Signal Control Based on Adaptive Neural-Fuzzy Inference System Applied to Intersection A. Che Soh, Ft. Z. Abdul Rahman, L Ghuan Rhung and H. Sarkan Feature Extraction Method and Neural Network Pattern Recognition on Time-resolved Partial Discharge Signals N. 77)0, C. Chakrabarty, Y. Keem Siah anda. B. Ghani Comparison of Neural Network and Maximum Likelihood Classifiers for Land Cover Classification Using Landsat Multispectral Data K. C. Tan Mangrove Mapping in Penang Island by Using Artificial Neural Network Technique s. c. Beh Virtual Hajj (V-Hajj) - Adaptation of Persuasive Design in Virtual Environment (VE) and Multimedia Integrated Approach Learning Courseware Methodology M. F. Yusoff, A. N, Zulklfll and N. F. Faisal Mohamed Augmented Reality Based Indoor Positioning Navigation Tool C. H. Low, P. Sebastian and M. Drieberg Managing Students' Electronic Disciplinary Records Via E-Merit Web Content Management System M. I. MohdSalleh, M. R. Mohamad Rosman, R, A. Raja Yaacob andz. Yusoff Web Base Project Management System for Development of ICT Project Outsourced by Iranian Government M. Taghavi, A. Patel and H. Taghavi Application of Multi-Step Time Series Prediction for Industrial Equipment Prognostic S. A. Asmai, R. W. Abdullah, M. N. Che Soh, A. S. Hasan Basari and B. Hussin

6 an A New One Hop Localization Algorithm Based on Clustering for WSNs K. Khazoei and S. Mohammadi Implementation of Mobile Platform Using Qt and Open Cv for Image Processing Applications R. s. DeepthiR 5 and S. Sankaraiah A Compact Multiband Hybrid Meander-Koch Fractal Antenna for WLAN USB Dongle A. J. Shaikh, M. Z. Yusaff, N. Yahya and M. Zakariya B41: Software Engineering and Tools Modeling Graphic Subsystem for M5 Simulator W. J. Ong, K. Samsudin, A. Ft. Ramli and W. A. Wan Adnan Numerical Analysis of Heat Transfer on PCB Current Carrying Conductor Along with an Interface M. N. Che Soh, I. Bugis, I. W. Jqmaludin and R. Ranom Numerical Model to Simulate Wax Crystallization in Scraped Surface Heat Exchangers N. Mokhlifand H. Al-Kayiem Enhancing Generated Java GUI Models with Valid Test Data P. Aha, N. Menz and T. Raty Usability of Package and Label Designs Using Eye Tracking M. H, F. Mohamad Kamil Assisted Jawi-Writing (AJaW) Software for Children W. Mat Diah, M. Ismail, S. Ahmad and P. M. Abdul Hami Implementing Corrective and Preventive Actions in Risk Assessment Software A. Farhang Dareshuri, E. Farhang Darehshori, A. Hatami Hardoroudi and H. Sarkan Using Open Source Components in Software Product Lines - F. e. Amin Exploratory Study The Design of a Software Fault Prone Application Using Evolutionary Algorithm M. Mohd Rosli, N. H. Ibrahim Teo, N. S. Mohamad Yusop and N. S. Mohammad Solving Computational Algorithm Using CLONALNet Based on Artificial Clonal Selection J. Anthony, P. S. Krishnan and S. K. Tiong An Automated Model Based Approach to Test Web Application Using Ontology H. Hajiabad! A42: Open Systems Applications III Fresh Water Real-Time Monitoring System Based on Wireless Sensor Network and GSM M. A. Nasirudin, U. N, 1. Za'bah and O. Sidek

7 A Comparison and Analysis of Congestion Window for HS-TCP, Full-TCP, and TCP-Linux in Long Term Evolution System Model G. Abed, M. Ismail and K. J. Jumari A Node Marking Algorithm for Partitioning Wireless Mesh Networks S. Pande and V. Pande A Load Sharing and Partitioning System for Multihop Wireless Mesh Network with Multiple Gateways 5. Pande, G. Kadambl, S. Bates and V. Pande QoS Aware Energy Efficient Routing Protocol for Clustered Wireless Sensor Network B. NazirandH. Hasbullah Zigzag Routing Inside Cluster Z. Rahman, A. Rahim and M. Aslam The Effect of Mutation Rate to Artificial Immune System Algorithm Optimization Solving Engineering Gear Train Problem Y. MeiWyin, J. Koh and K. H. Chong in MATLAB and VHDL Modeled of Real Time Partial Discharge Detection Using FPGA Technology E. Emilliano, A. B. Ghani, A. K. Ramasamy and C. Chakrabarty Implementation of Vector-Space Online Document Retrieval System Using Open Source Technology N. Jamil, W. A. Jamaludin, N. Abd Rahman and N. Sabari Performances Evaluation and Comparison of Two Algorithms for Fuzzy Logic Rice Cooking System M. S. Mohd Aras, F. Abdul Azis, M. Farriz Basar, S. M. S, Syed Abul Hamid and F. A. AH B42: Open Systems in Public Sector Translation Between HL7 V2.5 and CCR Message Formats Sutanto and H Seldon Conceptual Model for Measuring E-government Services Quality M. Alanezi, A. Mahmood and S. Basri Open Source Software Adoption in Public Organizations of Kazakhstan A. Zhussupova and A. Abdul Rahman An Evaluation of UiTM Branch Campuses Websites Towards Acceptance Among Staff M. A. Abdullah Baharum, Z. 1. Rashld, Z. Husin, S. Sahat and Z. Abu

8 OpenStreetMap for the Disaster Management in Bangladesh S. Latif, K. M. R. Islam, M. M. I. Khan ands. Ahmed Widely Linear Based Filter for Visual Evoked Potential Estimation D. Yanti, M. Z. Yusoffand V. S, Asirvadam B43: Software Engineering and Tools Towards the Development of K-Map Model in Visualizing the Dengue Hotspot A. A. Abdul Aziz, R. Abdullah and H. Ibrahim Author Index

Gender Classification Technique Based on Facial Features using Neural Network

Gender Classification Technique Based on Facial Features using Neural Network Gender Classification Technique Based on Facial Features using Neural Network Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour Computer Science & Engineering, Rajiv Gandhi Proudyogiki Vishwavidyalaya,

More information

DIRECTORY OF EXPERTISE IN UiTM (PERAK)

DIRECTORY OF EXPERTISE IN UiTM (PERAK) DIRECTORY OF EXPERTISE IN UiTM (PERAK) NAME OF LECTURER AREA OF SPECIALIZATION FACULTY OF CIVIL ENGINEERING Prof. Ir. Dr. Hjh Zainab Mohamed Civil Engineering Geotechnical Engineering Rock Engineering

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

NEWS RELEASE FOR IMMEDIATE RELEASE. A Community Effort to Keep Our Women and Children #CyberSafe

NEWS RELEASE FOR IMMEDIATE RELEASE. A Community Effort to Keep Our Women and Children #CyberSafe NEWS RELEASE FOR IMMEDIATE RELEASE A Community Effort to Keep Our Women and Children #CyberSafe CyberSafe Seminar organized by NCWO & CyberSecurity Malaysia in an effort to raise awareness on the pressing

More information

DISTANCE EVALUATED SIMULATED KALMAN FILTER FOR COMBINATORIAL OPTIMIZATION PROBLEMS

DISTANCE EVALUATED SIMULATED KALMAN FILTER FOR COMBINATORIAL OPTIMIZATION PROBLEMS DISTANCE EVALUATED SIMULATED KALMAN FILTER FOR COMBINATORIAL OPTIMIZATION PROBLEMS Zulkifli Md Yusof 1, Zuwairie Ibrahim 1, Ismail Ibrahim 1, Kamil Zakwan Mohd Azmi 1, Nor Azlina Ab Aziz 2, Nor Hidayati

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

SENARAI PENTADBIR AKADEMIK BAGI MAJLIS PERJUMPAAN BULANAN BERSAMA Y. BHG. NAIB CANSELOR

SENARAI PENTADBIR AKADEMIK BAGI MAJLIS PERJUMPAAN BULANAN BERSAMA Y. BHG. NAIB CANSELOR SENARAI PENTADBIR AKADEMIK BAGI MAJLIS PERJUMPAAN BULANAN BERSAMA Y. BHG. NAIB CANSELOR UTM Institutional Repository (UTM-IR) Prof. Madya Dr. Azizi Yahya Fakulti Pendidikan Prof. Madya Dr. Ida Idayu Muhamad

More information

MASTER PROJECT SEMINAR (MASTER OF ENGINEERING MECHANICAL) SEMESTER II, SESSION 2013/2014

MASTER PROJECT SEMINAR (MASTER OF ENGINEERING MECHANICAL) SEMESTER II, SESSION 2013/2014 Session 1 8.00 am 10.00 am 1) Anas Basri Bin Musthafa (P1) 900809065049 Study On Droplet Size Of Diesel Fuel IN a Combustion System 2) Mohd Naqiuddin Bin Mohd Salleh(P1) 890925065269 Study On Performance

More information

Preface List of Acronyms

Preface List of Acronyms Contents Preface List of Acronyms xxi Chapter 1 Next Generation Wireless Technologies 1 1.1 Introduction 1 1.2 Wireless Networking Standardization Process 5 1.2.1 Wireless Personal Area Networks 5 1.2.2

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

Research Interests and/or Thesis Topics of Supervisors for CSE 400 (Project and Thesis) Semester: August, 2011

Research Interests and/or Thesis Topics of Supervisors for CSE 400 (Project and Thesis) Semester: August, 2011 Research Interests and/or Thesis Topics of Supervisors for CSE 400 (Project and Thesis) Semester: August, 2011 1. Supervisor s Name Dr. M Kaykobad, Professor Visit Personal Webpage: http://www.buet.ac.bd/cse/faculty/facdetail.php?id=kaykobad

More information

CompTIA Security+ Study Guide (SY0-501)

CompTIA Security+ Study Guide (SY0-501) CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

Embedded Systems Projects

Embedded Systems Projects Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro

More information

KEY BASED APPROACH FOR INTEGRATION OF HETEROGENEOUS DATA SOURCES

KEY BASED APPROACH FOR INTEGRATION OF HETEROGENEOUS DATA SOURCES KEY BASED APPROACH FOR INTEGRATION OF HETEROGENEOUS DATA SOURCES 1 KAMSURIAH AHMAD, 1 TENGKU SITI FATIMAH TENGKU WOOK, 2 REDUAN SAMAD 1 Strategic Management Research Group Faculty of Information Science

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Master Information Technology Specialization Information Technology Management

Master Information Technology Specialization Information Technology Management Master Information Technology Specialization Information Technology Management Faculty of Computing Universiti Teknologi Malaysia 81310 Skudai Johor Presented by : Dr Halina Mohamed Dahlan Program Coordinator

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL

Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL Y.L. CENG-541 Information Retrieval Systems MASTER Doç. Dr. Selma Ayşe ÖZEL Information retrieval strategies: vector space model, probabilistic retrieval, language models, inference networks, extended

More information

Journal of Asian Scientific Research AN APPLICATION OF STEREO MATCHING ALGORITHM FOR WASTE BIN LEVEL ESTIMATION

Journal of Asian Scientific Research AN APPLICATION OF STEREO MATCHING ALGORITHM FOR WASTE BIN LEVEL ESTIMATION Journal of Asian Scientific Research journal homepage: http://aessweb.com/journal-detail.php?id=5003 AN APPLICATION OF STEREO MATCHING ALGORITHM FOR WASTE BIN LEVEL ESTIMATION Md. Shafiqul Islam 1 M.A.

More information

Curriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.)

Curriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.) Curriculum (Structure) for M. Tech. Computer Science and Information Technology With Effect From Academic Year 2018-2019 (F. Y. M. Tech.) 2019-2020 (S. Y. M. Tech.) Teaching and Evaluation Scheme First

More information

Secure System Architecture for Wide Area Surveillance Using Security, Trust and Privacy (STP) Framework.

Secure System Architecture for Wide Area Surveillance Using Security, Trust and Privacy (STP) Framework. Available online at www.sciencedirect.com Procedia Engineering 41 (2012 ) 480 485 International Symposium on Robotics and Intelligent Sensors 2012 (IRIS 2012) Secure System Architecture for Wide Area Surveillance

More information

Instructor: Dr. Hanna A. Kirolous RFID Automated Library Management System

Instructor: Dr. Hanna A. Kirolous   RFID Automated Library Management System Instructor: Dr. Hanna A. Kirolous e-mail: kirolous@aucegypt.edu RFID Automated Library Management System Radio Frequency Identification (RFID) is a new generation of Auto Identification and Data collection

More information

Experimental Evaluation on the Performance of Zigbee Protocol

Experimental Evaluation on the Performance of Zigbee Protocol Experimental Evaluation on the Performance of Zigbee Protocol Mohd Izzuddin Jumali, Aizat Faiz Ramli, Muhyi Yaakob, Hafiz Basarudin, Mohamad Ismail Sulaiman Universiti Kuala Lumpur British Malaysian Institute

More information

PROBLEM FORMULATION AND RESEARCH METHODOLOGY

PROBLEM FORMULATION AND RESEARCH METHODOLOGY PROBLEM FORMULATION AND RESEARCH METHODOLOGY ON THE SOFT COMPUTING BASED APPROACHES FOR OBJECT DETECTION AND TRACKING IN VIDEOS CHAPTER 3 PROBLEM FORMULATION AND RESEARCH METHODOLOGY The foregoing chapter

More information

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.

More information

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4) Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT

More information

SECURING UNDERWATER WIRELESS COMMUNICATION NETWORK DEVELOPMENT OF A MOBILE EEG-BASED BIOMETRIC AUTHENTICATON SYSTEM

SECURING UNDERWATER WIRELESS COMMUNICATION NETWORK DEVELOPMENT OF A MOBILE EEG-BASED BIOMETRIC AUTHENTICATON SYSTEM List of Seminars SE 1 SE 2 SE 3 SE 4 SE 5 SE 6 SE 7 SE 8 SE 9 SE 10 SE 11 SE 12 SE 13 SE 14 SE 15 SE 16 SE 17 SE 18 SE 19 SE 20 SE 21 SE 22 SE 23 SE 24 SE 25 SMS ENCRYPTION Cloud Computing Learning A KEYLESS

More information

Self-learning Mobile Robot Navigation in Unknown Environment Using Evolutionary Learning

Self-learning Mobile Robot Navigation in Unknown Environment Using Evolutionary Learning Journal of Universal Computer Science, vol. 20, no. 10 (2014), 1459-1468 submitted: 30/10/13, accepted: 20/6/14, appeared: 1/10/14 J.UCS Self-learning Mobile Robot Navigation in Unknown Environment Using

More information

Tank Water Level Monitoring System using GSM Network

Tank Water Level Monitoring System using GSM Network Tank Water Level Monitoring System using GSM Network Ayob Johari, Mohd Helmy Abd Wahab, Nur Suryani Abdul Latif, M. Erdi Ayob, M. Izwan Ayob, M. Afif Ayob, Mohd Norzali Haji Mohd Faculty of Electrical

More information

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE CLOUD COMPUTING WEB-SERVICES BASED DATABASE: SQL, MY-SQL, ORACLE JAVA - PROJECT TOPICS IEEE 2015 BASED 1 A Hybrid Cloud Approach for Secure Authorized Deduplication JCC1501 2 A Secure and Dynamic Multi-keyword

More information

FACULTY OF ENGINEERING

FACULTY OF ENGINEERING FACULTY OF ENGINEERING The faculty of engineering is managed by a dean and two deputy deans together with a team of three head of departments, two assistant registrars and one science officer. The faculty

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

BraindumpsVCE.   Best vce braindumps-exam vce pdf free download BraindumpsVCE http://www.braindumpsvce.com Best vce braindumps-exam vce pdf free download Exam : SY0-501 Title : CompTIA Security+ Certification Exam Vendor : CompTIA Version : DEMO Get Latest & Valid

More information

Name: Prof. Dr. Iftikhar Hussain. Designation: Vice Chancellor. Department: Industrial Engineering. Specialization: Flexible Manufacturing Systems

Name: Prof. Dr. Iftikhar Hussain. Designation: Vice Chancellor. Department: Industrial Engineering. Specialization: Flexible Manufacturing Systems Name: Prof. Dr. Iftikhar Hussain Designation: Vice Chancellor Department: Industrial Engineering Specialization: Flexible Manufacturing Systems Email: iftikhar@uetpeshawar.edu.pk Area of Interest: Design,

More information

EDUCATIONAL QUALIFICATIONS HONORS AND AWARDS ASSOCIATION MEMBERSHIPS LIST OF PUBLICATIONS

EDUCATIONAL QUALIFICATIONS HONORS AND AWARDS ASSOCIATION MEMBERSHIPS LIST OF PUBLICATIONS NADIRAH BINTI MOHD NASIR FACULTY OF INDUSTRIAL SCIENCES & TECHNOLOGY UNIVERSITI MALAYSIA PAHANG LEBUHRAYA TUN RAZAK, 26300 GAMBANG PAHANG, MALAYSIA. OFFICE : +609-5492781 EMAIL : nadirah@ump.edu.my POSITION

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

Curriculum Vitae. :University of Essex, United Kingdom. :Universiti Teknologi Malaysia, Skudai,

Curriculum Vitae. :University of Essex, United Kingdom. :Universiti Teknologi Malaysia, Skudai, Curriculum Vitae Hazinah Kutty Mammi Mobile: 0197774672 Email: hazinah@utm.my Personal Data Name :Hazinah Binti Kutty Mammi Date of Birth :28 March 1972 Place of Birth :Kluang, Johor Nationality :Malaysian

More information

IOS SAFETY APPLICATION FOR UITM

IOS SAFETY APPLICATION FOR UITM Journal of Engineering Science and Technology Special Issue on ICE & ICIE 2015, April (2016) 97-105 School of Engineering, Taylor s University IOS SAFETY APPLICATION FOR UITM MOHAMAD FAHMI HUSSIN*, W AHMAD

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

Computer Communication and Networking 10TL Sections I-II

Computer Communication and Networking 10TL Sections I-II Computer Communication and Networking 10TL Sections I-II Dr. Faisal Karim Shaikh DEWSNet Group Dependable Embedded Wired/Wireless Networks DEWSNet Neeraj Suri Dependable Embedded Wired/Wireless Networks

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

CORPORATE STRUCTURE OF GROUP SIRIM BERHAD MAY 2015

CORPORATE STRUCTURE OF GROUP SIRIM BERHAD MAY 2015 CORPORATE STRUCTURE OF GROUP SIRIM BERHAD 2015 05 MAY 2015 APPROVED FOR CIRCULATION COMPANY SECRETARY PRESIDENT AND CHIEF EXECUTIVE YBHG. DATO DR. HJ. ZAINAL ABIDIN MOHD YUSOF AUDIT AND ACCOUNTS COMMITTEE

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

Course Outcome of M.E (ECE)

Course Outcome of M.E (ECE) Course Outcome of M.E (ECE) PEC108/109: EMBEDDED SYSTEMS DESIGN 1. Recognize the Embedded system and its programming, Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits. 2. Identify

More information

Ahli Jawatankuasa Etika Penyelidikan Manusia USM (Dikemaskini 8 Ogos 2018) USM Human Research Ethics Committee Members (Updated 8 th August 2018)

Ahli Jawatankuasa Etika Penyelidikan Manusia USM (Dikemaskini 8 Ogos 2018) USM Human Research Ethics Committee Members (Updated 8 th August 2018) Ahli Jawatankuasa Etika Penyelidikan Manusia USM (Dikemaskini 8 Ogos 2018) USM Human Research Ethics Committee Members (Updated 8 th August 2018) Main Committee Members (Panel A) Health Campus 1. Prof.

More information

( It will be applied from Fall)

( It will be applied from Fall) İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING MASTER OF SCIENCE PROGRAM IN COMPUTER ENGINEERING Core Courses ECTS *CENG 590 Seminar (0-2)

More information

Project Title ** Objective ** Innovative ** Deliverables ** Skills required ** No. Of studen ts. To let company benchmarking the implementation of BI

Project Title ** Objective ** Innovative ** Deliverables ** Skills required ** No. Of studen ts. To let company benchmarking the implementation of BI Ms.Chuah Min Hooi @254 chuahmh@utar.edu.my Design and develop a business intelligence assessment tool 3D virtual interior for SOHO housing area To study the existing business intelligence assessment tool

More information

ADAPTIVE TRAFFIC LIGHT IN IMAGE PROCESSING BASED- INTELLIGENT TRANSPORTATION SYSTEM: A REVIEW

ADAPTIVE TRAFFIC LIGHT IN IMAGE PROCESSING BASED- INTELLIGENT TRANSPORTATION SYSTEM: A REVIEW ADAPTIVE TRAFFIC LIGHT IN IMAGE PROCESSING BASED- INTELLIGENT TRANSPORTATION SYSTEM: A REVIEW 1 Mustafa Mohammed Hassan Mustafa* 2 Atika Malik * 3 Amir Mohammed Talib Faculty of Engineering, Future University,

More information

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION

More information

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework Department of Computer Science & Engineering University of Kalyani Syllabus for Ph.D. Coursework Paper 1: A) Literature Review: (Marks - 25) B) Research Methodology: (Marks - 25) Paper 2: Computer Applications:

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential

More information

Colloquium in Computer and Mathematical Sciences Education (CCMSE 2015)

Colloquium in Computer and Mathematical Sciences Education (CCMSE 2015) Colloquium in Computer and Mathematical Sciences Education (CCMSE 2015) Computer Sciences Computer Network & Data Communication Mathematical Sciences & Statistics System Sciences & Information Technology

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

Promise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS. in various Domains Latest Projects

Promise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS. in various Domains Latest Projects NCCT SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS in various Domains Latest Projects #109, 2 nd Floor, Bombay Flats, Nungambakkam High Road Nungambakkam High Road, Chennai 600034 Above IOB, Next

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

IMM PROTECTIVE COATINGS TECHNICIAN (BLASTING PAINTING) (CODE: PCT) PCT NO LEVEL SKILL NAME VALIDITY DATE

IMM PROTECTIVE COATINGS TECHNICIAN (BLASTING PAINTING) (CODE: PCT) PCT NO LEVEL SKILL NAME VALIDITY DATE 0001 LEVEL 2 MULTI-SKILL AZALI ABD. LATIF 05/08/2003 0002 LEVEL 2 MULTI-SKILL FOONG YARN FATT 05/08/2003 0003 LEVEL 2 MULTI-SKILL IDRIS TAHARIM 05/08/2003 0004 LEVEL 1 BLASTER JERFANDI SEMAN 05/08/2003

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

Computation of Fuzzy Analytic Hierarchy Process (FAHP) using MATLAB Programming in Sustainable Supply Chain

Computation of Fuzzy Analytic Hierarchy Process (FAHP) using MATLAB Programming in Sustainable Supply Chain Computation of Fuzzy Analytic Hierarchy Process (FAHP) using MATLAB Programming in Sustainable Supply Chain 1a Ahamad Zaki Mohamed Noor, 1b Muhammad Hafidz Fazli Md Fauadi, 1c Nur Zul Hafiq Zulkifli, 1d

More information

Image Processing (IP)

Image Processing (IP) Image Processing Pattern Recognition Computer Vision Xiaojun Qi Utah State University Image Processing (IP) Manipulate and analyze digital images (pictorial information) by computer. Applications: The

More information

CORPORATE STRUCTURE OF GROUP SIRIM BERHAD st July 2014

CORPORATE STRUCTURE OF GROUP SIRIM BERHAD st July 2014 CORPORATE STRUCTURE OF GROUP SIRIM BERHAD 2014 01 st July 2014 APPROVED FOR CIRCULATION COMPANY SECRETARY PRESIDENT AND CHIEF EXECUTIVE DR. HJ. ZAINAL ABIDIN MOHD YUSOF AUDIT AND ACCOUNTS COMMITTEE GROUP

More information

Fuzzy Logic approach to Recognition of Isolated Arabic Characters

Fuzzy Logic approach to Recognition of Isolated Arabic Characters Fuzzy Logic approach to Recognition of Isolated Arabic Characters Majida Ali Abed, Hamid Ali Abed AL-Asadi, Zainab sabah Baha Al-Deen, Ahmad Naser Ismail Abstract In In recent years, fuzzy logic has been

More information

POWER THEFT DETECTION USING PROBABILISTIC NEURAL NETWORK CLASSIFIER

POWER THEFT DETECTION USING PROBABILISTIC NEURAL NETWORK CLASSIFIER POWER THEFT DETECTION USING PROBABILISTIC NEURAL NETWORK CLASSIFIER Kirankumar T 1, Sri Madhu G N 2 1PG Student, Department of Electrical and Electronics Engineering, University of B.D.T. College of Engineering,

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

MOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03

MOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03 MOHAMMED I. AL-SALEH Jordan University of Science and Technology, Computer Science Department, Irbid, P.O. Box 3030, 22110 +962-788-052-892 misaleh@just.edu.jo, moealsaleh@gmail.com EDUCATION Ph.D., 2011

More information

An Evolution of Computer Science Research

An Evolution of Computer Science Research An Evolution of Computer Science Research Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as

More information

The Feature Analyst Extension for ERDAS IMAGINE

The Feature Analyst Extension for ERDAS IMAGINE The Feature Analyst Extension for ERDAS IMAGINE Automated Feature Extraction Software for GIS Database Maintenance We put the information in GIS SM A Visual Learning Systems, Inc. White Paper September

More information

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network ISBN 978-93-84422-8-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-217) Pattaya (Thailand) Dec. 28-29, 217 Relay Node Deployment for Assuring

More information

Intelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI) April 25.

Intelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI)  April 25. Intelligent Edge Computing and ML-based Traffic Classifier Kwihoon Kim, Minsuk Kim (ETRI) (kwihooi@etri.re.kr, mskim16@etri.re.kr) April 25. 2018 ITU Workshop on Impact of AI on ICT Infrastructures Cian,

More information

Rainfall prediction using fuzzy logic

Rainfall prediction using fuzzy logic Rainfall prediction using fuzzy logic Zhifka MUKA 1, Elda MARAJ, Shkelqim KUKA, 1 Abstract This paper presents occurrence of rainfall using principles of fuzzy logic applied in Matlab. The data are taken

More information

EMBEDDED MAJOR PROJECTS LIST

EMBEDDED MAJOR PROJECTS LIST CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse

More information

A New Method for Determining Transverse Crack Defects in Welding Radiography Images based on Fuzzy-Genetic Algorithm

A New Method for Determining Transverse Crack Defects in Welding Radiography Images based on Fuzzy-Genetic Algorithm International Journal of Engineering & Technology Sciences Volume 03, Issue 04, Pages 292-30, 205 ISSN: 2289-452 A New Method for Determining Transverse Crack Defects in Welding Radiography Images based

More information

13 Operational and Security Incident management. IT Governance CEN 667

13 Operational and Security Incident management. IT Governance CEN 667 13 Operational and Security Incident management IT Governance CEN 667 1 Project proposal (week 4) Goal of the projects are to find applicable measurement and metric methods to improve processes: For 27000

More information

INCREASING CLASSIFICATION QUALITY BY USING FUZZY LOGIC

INCREASING CLASSIFICATION QUALITY BY USING FUZZY LOGIC JOURNAL OF APPLIED ENGINEERING SCIENCES VOL. 1(14), issue 4_2011 ISSN 2247-3769 ISSN-L 2247-3769 (Print) / e-issn:2284-7197 INCREASING CLASSIFICATION QUALITY BY USING FUZZY LOGIC DROJ Gabriela, University

More information

( B Scheme Main, Re-appear & Improvement)

( B Scheme Main, Re-appear & Improvement) Theory Date Sheet of B. Tech. 2 nd Sem. (May 2018 Examinations) Time of Exam:. 09:30 AM to 12:30 PM for Morning Session (M) Time of Exam:. 02:00 PM to 05:00 PM for Evening Session (E) ( B Scheme Main,

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Siran Pavankumar(149344152) siranpavankumar@gmail.com Computer Science Department Seoul National

More information

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.

More information

APPLICATION OF FUZZY LOGIC REASONING MODEL FOR DETERMINING ADHESIVE STRENGTH OF THIN FLIM COATINGS

APPLICATION OF FUZZY LOGIC REASONING MODEL FOR DETERMINING ADHESIVE STRENGTH OF THIN FLIM COATINGS APPLICATION OF FUZZY LOGIC REASONING MODEL FOR DETERMINING ADHESIVE STRENGTH OF THIN FLIM COATINGS ABSTRACT Ashwani Kharola 1, Dr SB Singh 2 Govt. Of India, Ministry of Defence Institute of Technology

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

2 nd Year. Module Basket of Courses Duration Credit Offered Status. 12 Weeks 4 NPTEL Programming in Java

2 nd Year. Module Basket of Courses Duration Credit Offered Status. 12 Weeks 4 NPTEL Programming in Java MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WEST BENGAL List of Online Courses for 2nd Year, 3rd Year and 4th Year B.Tech Courses of IT and CSE for Additional Credit Earning 2 nd Year Module Basket

More information

Toward Energy Data Platform in Korea

Toward Energy Data Platform in Korea Toward Energy Data Platform in Korea 최준균 (Jun Kyun Choi) Korea Advanced Institute of Science and Technology (KAIST) Contents 1 ` Market Trends of Cloud Computing and IoT 2 ` Platform Revolution of Energy

More information

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY Md. Maklachur Rahman 1 1 Department of Computer Science and Engineering, Chittagong University of Engineering and Technology,

More information

VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK

VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK Puteri Azwa Ahmad 1, M. Mahmuddin 2, and Mohd Hasbullah Omar 3 1 Politeknik Tuanku Syed Sirajuddin,

More information

Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding

Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding Yashu, Smita 2 M.Tech student, CSE Dept., PDM College of Engineering for Women 2 Assistant Professor, PDM College of Engineering

More information

2017 International Conference on Communication Technologies (ComTech 2017)

2017 International Conference on Communication Technologies (ComTech 2017) 2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute

More information

THE description and representation of the shape of an object

THE description and representation of the shape of an object Enhancement of Shape Description and Representation by Slope Ali Salem Bin Samma and Rosalina Abdul Salam Abstract Representation and description of object shapes by the slopes of their contours or borders

More information

Job Shop Scheduling Problem (JSSP) Genetic Algorithms Critical Block and DG distance Neighbourhood Search

Job Shop Scheduling Problem (JSSP) Genetic Algorithms Critical Block and DG distance Neighbourhood Search A JOB-SHOP SCHEDULING PROBLEM (JSSP) USING GENETIC ALGORITHM (GA) Mahanim Omar, Adam Baharum, Yahya Abu Hasan School of Mathematical Sciences, Universiti Sains Malaysia 11800 Penang, Malaysia Tel: (+)

More information

Innovative M-Tech projects list IEEE papers

Innovative M-Tech projects list IEEE papers Innovative M-Tech projects list IEEE-2013-14 papers 1. Analysis and Practical Considerations in Implementing Multiple Transmitters for Wireless Power Transfer via Coupled Magnetic Resonance (IEEE 2014)

More information

The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor,

The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor, The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor, National Institute of Standards and Technology 1 Speaker

More information

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

Impacts of Brooks Iyengar Algorithm on PhD Dissertations

Impacts of Brooks Iyengar Algorithm on PhD Dissertations Impacts of Brooks Iyengar Algorithm on PhD Dissertations More than 28 dissertations from highly ranked universities (e.g. MIT, Carnegie Melon University, RICE University, University of Southern California,

More information

Vehicular Road Side Backbone Network with Multiprotocol Label Switching Kashif Naseer Qureshi *, Abdul Hanan Abdullah, Raja Waseem Anwar

Vehicular Road Side Backbone Network with Multiprotocol Label Switching Kashif Naseer Qureshi *, Abdul Hanan Abdullah, Raja Waseem Anwar 1 st International Conference of Recent Trends in Information and Communication Technologies Vehicular Road Side Backbone Network with Multiprotocol Label Switching Kashif Naseer Qureshi *, Abdul Hanan

More information

CEN 538 Wireless LAN & MAN Networks

CEN 538 Wireless LAN & MAN Networks King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book

More information