4 IEEE. Open Systems (ICOS 2011) Langkawi, Malaysia IEEE Conference on September 2011 ISBN:
|
|
- Shawn Roberts
- 6 years ago
- Views:
Transcription
1 2011 IEEE Conference on Open Systems (ICOS 2011) Langkawi, Malaysia September IEEE IEEE Catalog Number: CFPl 11 OM-PRT ISBN:
2 Content pp. A31: Open Systems and Technology I Interactive Augmented Reality Environments for Engineering with Open Systems 1-5 M. 5. Sidhu Self Reorganizing Network in Bluetooth Scatternet T. Bakhsh, H. Hasbulloh, S. TahirondA. Sheikh Target Distance Estimation Using Monocular Vision System for Mobile Robot M. N. Ab Wahab, S. Nadarajah and K. Sundaraj Architectural Design of Fuzzy Inference Processor Using Triangular-Shaped Membership Function S. Loan and A. Murshid An Early Design Estimation Approach to Synthesize the Low-Power Pre-Computation Based Content Addressable Memory R. Shen, C. H. Peng and F. La! Improving Shape Feature Descriptor Complexity Via Wavelet Decomposition F. Mohd Anuar, M. F. Ahmad Fauzi and S. Mansor Image Retrieval System Based on Color Layout Descriptor and Gabor Filters H. Jalab A Threshold-based Similarity Measure for Duplicate Detection M. Ektefa, F. Sidi, H. Ibrahim, M. A. Jabar, S. Memar Kouchehbagh and A. Ramli A Conceptual Framework of Tacit Knowledge Transfer for Problem Based Learning Teaching Method in System Analysis and Design Course M. Ahmad, A, Zalnol, N. Muhd Darus, Z. Marzuki and F. Baharom Effect of Demographic Factors on Knowledge Creation Processes in Learning Management System Among Postgraduate Students M. Ahmad, J. A. Abu Bakar, N. I, Yahya, N. YusofandA. N. Zulkifli A Study on Implementation of Idle Network Memory Virtualization for Cloud C. Natarajan andr. Abdullah An Investigation of a Requirements Management Tool Elements A. Zalnol and S. Mansoor
3 B31: Security A Cryptanalytic Attack on Vigenere Cipher Using Genetic Algorithm Omran, A. Al-Kbalid and D. Al-Saady The Cryptanalysis and Extension of the Generalized Golden Cryptography M. Tahghighi, S. Turaev, ft. Mahmod, A. Jaafar and M. Md. Said Hash Functions-based Random Number Generator with Image Data Source Hedayatpour and S. Chuprat Behavioral Analysis on IPv4 Malware on Different Platforms in IPv6 Network Environment Muslim, S. A. Asmai, H. Nahar, Z. Ayop and S. Sahib Secure Electronic Voting System Based on Image Steganography L Rura, B. Issac and M. K. Haldar The Privacy Protection Framework for Biometric Information in Network Based CCTV Environment B. J. Han, H. Jeong and Y. J. Won Representing Software Changes At Component Level Using Call Graph N. Ismail, N. L, Hashim, A. Zainol, N. Nordin, Z. Che Ani and N. MohdZauki Towards a Mobile Security & Privacy Simulator Henne, C. Szongott and M. Smith Traceability in Digital Forensic Investigation Process S. ft. Selamat, R. Yusof, S. Sahib, N. H, Hassan, M. F. Abdollah andz. ZainalAbidin Semi-Fragile Watermarking for Gesture Authentication W. Chaw Seng, S. A. Hosseini and Leong Lai Fang Energy Cost Analyses of Key Management Techniques for Secure Patient Monitoring in WSN M. Majidl, R. Mobarhan, A. Hatami Hardoroudi, A. S. Ismail and A. Khodashenas Parchinaki Securing Routing Table Update in AODV Routing Protocol K. Abd Jalil, Z. Ahmad and J.I.Ab Manan A32: Open Systems Applications I Ontology of Moodle e-learning System for Social Network Analysis W. Yusof, F. Mansur and M, S. Othman CloudZone: Towards an Integrity Layer of Cloud Data Storage Based on Multi Agent System Architecture A. Mohamed Talib, R. Atan, ft. Abdullah andm, A. Azmi Murad
4 Introduction, Exam Timetabling Using Graph Colouring Approach S. Hussin, A. S. Hasan Basari and S. A. Asmai A RIA Based Virtual Instrument Platform for Test and Measurement Education He Lingsong and L. Wei The Motivational Design and Development of Interactive Multimedia Learning Courseware for Islamic Sex Education (ISE) -A Parental Guide N. Mohamed Noor, A. N. Zulkifliand F. Siraj The Use of Multimedia, Augmented Reality (AR) and Virtual Environment (VE) Enhancing Children's Understanding of Road Safety N. A. Abu Bakar in Simple Equation Guide for Multi-layer Earth Structure with Soil Electrical Properties S. M. T. Islam and Z. Chik Review of Hydrate Prevention Methods for Deepwater Pipelines M. A. Md Haniffa and F. Mohd Hashim Utilization of Mobile Technology for Mobile Robot Controller S. Kahar, I. R. Sulaiman, M. F. Mohamad Amran, S. Marjudi and A. S. Prabuwono A Study on CAD Systems for Food Packaging , Marjudi, I. R. Sulaiman, M. F. Mohamad Amran, 5. Kahar and K. A. Abdullah B32: Open Systems and Technology II Open Source Cloud Computing Management Platforms - Recommendations for Implementation 5. Wind Comparison, and IntelligentGrid: Rapid Deployment of Grid Compute Nodes for Immediate Execution of Batch and Parallel Applications A. Nazir, H. Ong, SSeM, R. Kand M. Sidek Dynamic Layout Algorithms for Wireless Field Hockey Strategy System R, Canda ands. Subramanlam A Novel Fuzzy Based Method for 3D Buildings Modelling in Urban Satellite Imagery Yousefi, s, M, Mirhassani, M.M.hossein! and M, J. Rastegar Fatemi An Investigation of Femtocell Network Synchronization M. Hasan, R, Saeed, A. H. Abdulla, S. Islam, O. Khalifa, A. F. Ismail and 0. Omer The Routing Performance of Logarithmic-Hop Structured P2P Overlay S. Khan, A. GaniandM. Sreekandath
5 MPI Communication Benchmarking on Intel Xeon Dual Quad-Core Processor Cluster R. Ismail and M. Azizi An Extended Method for Recognition of Broken Typewritten Characters Special Reference to Tamil Script N. F. Abubacker and ft. Indra Gandhi A Novel Fuzzy Inference Processor Using Trapezoidal-Shaped Membership Function S. Loan and A. Murshid A Code Generator for Component Oriented Programming Framework M. Aghajani Siroos Talab and D. Jawawi A41: Open Systems Applications II Traffic Signal Control Based on Adaptive Neural-Fuzzy Inference System Applied to Intersection A. Che Soh, Ft. Z. Abdul Rahman, L Ghuan Rhung and H. Sarkan Feature Extraction Method and Neural Network Pattern Recognition on Time-resolved Partial Discharge Signals N. 77)0, C. Chakrabarty, Y. Keem Siah anda. B. Ghani Comparison of Neural Network and Maximum Likelihood Classifiers for Land Cover Classification Using Landsat Multispectral Data K. C. Tan Mangrove Mapping in Penang Island by Using Artificial Neural Network Technique s. c. Beh Virtual Hajj (V-Hajj) - Adaptation of Persuasive Design in Virtual Environment (VE) and Multimedia Integrated Approach Learning Courseware Methodology M. F. Yusoff, A. N, Zulklfll and N. F. Faisal Mohamed Augmented Reality Based Indoor Positioning Navigation Tool C. H. Low, P. Sebastian and M. Drieberg Managing Students' Electronic Disciplinary Records Via E-Merit Web Content Management System M. I. MohdSalleh, M. R. Mohamad Rosman, R, A. Raja Yaacob andz. Yusoff Web Base Project Management System for Development of ICT Project Outsourced by Iranian Government M. Taghavi, A. Patel and H. Taghavi Application of Multi-Step Time Series Prediction for Industrial Equipment Prognostic S. A. Asmai, R. W. Abdullah, M. N. Che Soh, A. S. Hasan Basari and B. Hussin
6 an A New One Hop Localization Algorithm Based on Clustering for WSNs K. Khazoei and S. Mohammadi Implementation of Mobile Platform Using Qt and Open Cv for Image Processing Applications R. s. DeepthiR 5 and S. Sankaraiah A Compact Multiband Hybrid Meander-Koch Fractal Antenna for WLAN USB Dongle A. J. Shaikh, M. Z. Yusaff, N. Yahya and M. Zakariya B41: Software Engineering and Tools Modeling Graphic Subsystem for M5 Simulator W. J. Ong, K. Samsudin, A. Ft. Ramli and W. A. Wan Adnan Numerical Analysis of Heat Transfer on PCB Current Carrying Conductor Along with an Interface M. N. Che Soh, I. Bugis, I. W. Jqmaludin and R. Ranom Numerical Model to Simulate Wax Crystallization in Scraped Surface Heat Exchangers N. Mokhlifand H. Al-Kayiem Enhancing Generated Java GUI Models with Valid Test Data P. Aha, N. Menz and T. Raty Usability of Package and Label Designs Using Eye Tracking M. H, F. Mohamad Kamil Assisted Jawi-Writing (AJaW) Software for Children W. Mat Diah, M. Ismail, S. Ahmad and P. M. Abdul Hami Implementing Corrective and Preventive Actions in Risk Assessment Software A. Farhang Dareshuri, E. Farhang Darehshori, A. Hatami Hardoroudi and H. Sarkan Using Open Source Components in Software Product Lines - F. e. Amin Exploratory Study The Design of a Software Fault Prone Application Using Evolutionary Algorithm M. Mohd Rosli, N. H. Ibrahim Teo, N. S. Mohamad Yusop and N. S. Mohammad Solving Computational Algorithm Using CLONALNet Based on Artificial Clonal Selection J. Anthony, P. S. Krishnan and S. K. Tiong An Automated Model Based Approach to Test Web Application Using Ontology H. Hajiabad! A42: Open Systems Applications III Fresh Water Real-Time Monitoring System Based on Wireless Sensor Network and GSM M. A. Nasirudin, U. N, 1. Za'bah and O. Sidek
7 A Comparison and Analysis of Congestion Window for HS-TCP, Full-TCP, and TCP-Linux in Long Term Evolution System Model G. Abed, M. Ismail and K. J. Jumari A Node Marking Algorithm for Partitioning Wireless Mesh Networks S. Pande and V. Pande A Load Sharing and Partitioning System for Multihop Wireless Mesh Network with Multiple Gateways 5. Pande, G. Kadambl, S. Bates and V. Pande QoS Aware Energy Efficient Routing Protocol for Clustered Wireless Sensor Network B. NazirandH. Hasbullah Zigzag Routing Inside Cluster Z. Rahman, A. Rahim and M. Aslam The Effect of Mutation Rate to Artificial Immune System Algorithm Optimization Solving Engineering Gear Train Problem Y. MeiWyin, J. Koh and K. H. Chong in MATLAB and VHDL Modeled of Real Time Partial Discharge Detection Using FPGA Technology E. Emilliano, A. B. Ghani, A. K. Ramasamy and C. Chakrabarty Implementation of Vector-Space Online Document Retrieval System Using Open Source Technology N. Jamil, W. A. Jamaludin, N. Abd Rahman and N. Sabari Performances Evaluation and Comparison of Two Algorithms for Fuzzy Logic Rice Cooking System M. S. Mohd Aras, F. Abdul Azis, M. Farriz Basar, S. M. S, Syed Abul Hamid and F. A. AH B42: Open Systems in Public Sector Translation Between HL7 V2.5 and CCR Message Formats Sutanto and H Seldon Conceptual Model for Measuring E-government Services Quality M. Alanezi, A. Mahmood and S. Basri Open Source Software Adoption in Public Organizations of Kazakhstan A. Zhussupova and A. Abdul Rahman An Evaluation of UiTM Branch Campuses Websites Towards Acceptance Among Staff M. A. Abdullah Baharum, Z. 1. Rashld, Z. Husin, S. Sahat and Z. Abu
8 OpenStreetMap for the Disaster Management in Bangladesh S. Latif, K. M. R. Islam, M. M. I. Khan ands. Ahmed Widely Linear Based Filter for Visual Evoked Potential Estimation D. Yanti, M. Z. Yusoffand V. S, Asirvadam B43: Software Engineering and Tools Towards the Development of K-Map Model in Visualizing the Dengue Hotspot A. A. Abdul Aziz, R. Abdullah and H. Ibrahim Author Index
Gender Classification Technique Based on Facial Features using Neural Network
Gender Classification Technique Based on Facial Features using Neural Network Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour Computer Science & Engineering, Rajiv Gandhi Proudyogiki Vishwavidyalaya,
More informationDIRECTORY OF EXPERTISE IN UiTM (PERAK)
DIRECTORY OF EXPERTISE IN UiTM (PERAK) NAME OF LECTURER AREA OF SPECIALIZATION FACULTY OF CIVIL ENGINEERING Prof. Ir. Dr. Hjh Zainab Mohamed Civil Engineering Geotechnical Engineering Rock Engineering
More informationIEEE PROJECTS ON EMBEDDED SYSTEMS
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of
More informationNEWS RELEASE FOR IMMEDIATE RELEASE. A Community Effort to Keep Our Women and Children #CyberSafe
NEWS RELEASE FOR IMMEDIATE RELEASE A Community Effort to Keep Our Women and Children #CyberSafe CyberSafe Seminar organized by NCWO & CyberSecurity Malaysia in an effort to raise awareness on the pressing
More informationDISTANCE EVALUATED SIMULATED KALMAN FILTER FOR COMBINATORIAL OPTIMIZATION PROBLEMS
DISTANCE EVALUATED SIMULATED KALMAN FILTER FOR COMBINATORIAL OPTIMIZATION PROBLEMS Zulkifli Md Yusof 1, Zuwairie Ibrahim 1, Ismail Ibrahim 1, Kamil Zakwan Mohd Azmi 1, Nor Azlina Ab Aziz 2, Nor Hidayati
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More informationSENARAI PENTADBIR AKADEMIK BAGI MAJLIS PERJUMPAAN BULANAN BERSAMA Y. BHG. NAIB CANSELOR
SENARAI PENTADBIR AKADEMIK BAGI MAJLIS PERJUMPAAN BULANAN BERSAMA Y. BHG. NAIB CANSELOR UTM Institutional Repository (UTM-IR) Prof. Madya Dr. Azizi Yahya Fakulti Pendidikan Prof. Madya Dr. Ida Idayu Muhamad
More informationMASTER PROJECT SEMINAR (MASTER OF ENGINEERING MECHANICAL) SEMESTER II, SESSION 2013/2014
Session 1 8.00 am 10.00 am 1) Anas Basri Bin Musthafa (P1) 900809065049 Study On Droplet Size Of Diesel Fuel IN a Combustion System 2) Mohd Naqiuddin Bin Mohd Salleh(P1) 890925065269 Study On Performance
More informationPreface List of Acronyms
Contents Preface List of Acronyms xxi Chapter 1 Next Generation Wireless Technologies 1 1.1 Introduction 1 1.2 Wireless Networking Standardization Process 5 1.2.1 Wireless Personal Area Networks 5 1.2.2
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology
ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More informationResearch Interests and/or Thesis Topics of Supervisors for CSE 400 (Project and Thesis) Semester: August, 2011
Research Interests and/or Thesis Topics of Supervisors for CSE 400 (Project and Thesis) Semester: August, 2011 1. Supervisor s Name Dr. M Kaykobad, Professor Visit Personal Webpage: http://www.buet.ac.bd/cse/faculty/facdetail.php?id=kaykobad
More informationCompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes
More informationROUTING PROJECT LIST
ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital
More informationEmbedded Systems Projects
Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro
More informationKEY BASED APPROACH FOR INTEGRATION OF HETEROGENEOUS DATA SOURCES
KEY BASED APPROACH FOR INTEGRATION OF HETEROGENEOUS DATA SOURCES 1 KAMSURIAH AHMAD, 1 TENGKU SITI FATIMAH TENGKU WOOK, 2 REDUAN SAMAD 1 Strategic Management Research Group Faculty of Information Science
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationMaster Information Technology Specialization Information Technology Management
Master Information Technology Specialization Information Technology Management Faculty of Computing Universiti Teknologi Malaysia 81310 Skudai Johor Presented by : Dr Halina Mohamed Dahlan Program Coordinator
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationName of the lecturer Doç. Dr. Selma Ayşe ÖZEL
Y.L. CENG-541 Information Retrieval Systems MASTER Doç. Dr. Selma Ayşe ÖZEL Information retrieval strategies: vector space model, probabilistic retrieval, language models, inference networks, extended
More informationJournal of Asian Scientific Research AN APPLICATION OF STEREO MATCHING ALGORITHM FOR WASTE BIN LEVEL ESTIMATION
Journal of Asian Scientific Research journal homepage: http://aessweb.com/journal-detail.php?id=5003 AN APPLICATION OF STEREO MATCHING ALGORITHM FOR WASTE BIN LEVEL ESTIMATION Md. Shafiqul Islam 1 M.A.
More informationCurriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.)
Curriculum (Structure) for M. Tech. Computer Science and Information Technology With Effect From Academic Year 2018-2019 (F. Y. M. Tech.) 2019-2020 (S. Y. M. Tech.) Teaching and Evaluation Scheme First
More informationSecure System Architecture for Wide Area Surveillance Using Security, Trust and Privacy (STP) Framework.
Available online at www.sciencedirect.com Procedia Engineering 41 (2012 ) 480 485 International Symposium on Robotics and Intelligent Sensors 2012 (IRIS 2012) Secure System Architecture for Wide Area Surveillance
More informationInstructor: Dr. Hanna A. Kirolous RFID Automated Library Management System
Instructor: Dr. Hanna A. Kirolous e-mail: kirolous@aucegypt.edu RFID Automated Library Management System Radio Frequency Identification (RFID) is a new generation of Auto Identification and Data collection
More informationExperimental Evaluation on the Performance of Zigbee Protocol
Experimental Evaluation on the Performance of Zigbee Protocol Mohd Izzuddin Jumali, Aizat Faiz Ramli, Muhyi Yaakob, Hafiz Basarudin, Mohamad Ismail Sulaiman Universiti Kuala Lumpur British Malaysian Institute
More informationPROBLEM FORMULATION AND RESEARCH METHODOLOGY
PROBLEM FORMULATION AND RESEARCH METHODOLOGY ON THE SOFT COMPUTING BASED APPROACHES FOR OBJECT DETECTION AND TRACKING IN VIDEOS CHAPTER 3 PROBLEM FORMULATION AND RESEARCH METHODOLOGY The foregoing chapter
More informationFaculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)
Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.
More information3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)
Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT
More informationSECURING UNDERWATER WIRELESS COMMUNICATION NETWORK DEVELOPMENT OF A MOBILE EEG-BASED BIOMETRIC AUTHENTICATON SYSTEM
List of Seminars SE 1 SE 2 SE 3 SE 4 SE 5 SE 6 SE 7 SE 8 SE 9 SE 10 SE 11 SE 12 SE 13 SE 14 SE 15 SE 16 SE 17 SE 18 SE 19 SE 20 SE 21 SE 22 SE 23 SE 24 SE 25 SMS ENCRYPTION Cloud Computing Learning A KEYLESS
More informationSelf-learning Mobile Robot Navigation in Unknown Environment Using Evolutionary Learning
Journal of Universal Computer Science, vol. 20, no. 10 (2014), 1459-1468 submitted: 30/10/13, accepted: 20/6/14, appeared: 1/10/14 J.UCS Self-learning Mobile Robot Navigation in Unknown Environment Using
More informationTank Water Level Monitoring System using GSM Network
Tank Water Level Monitoring System using GSM Network Ayob Johari, Mohd Helmy Abd Wahab, Nur Suryani Abdul Latif, M. Erdi Ayob, M. Izwan Ayob, M. Afif Ayob, Mohd Norzali Haji Mohd Faculty of Electrical
More informationJAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE
CLOUD COMPUTING WEB-SERVICES BASED DATABASE: SQL, MY-SQL, ORACLE JAVA - PROJECT TOPICS IEEE 2015 BASED 1 A Hybrid Cloud Approach for Secure Authorized Deduplication JCC1501 2 A Secure and Dynamic Multi-keyword
More informationFACULTY OF ENGINEERING
FACULTY OF ENGINEERING The faculty of engineering is managed by a dean and two deputy deans together with a team of three head of departments, two assistant registrars and one science officer. The faculty
More informationE-guide Getting your CISSP Certification
Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International
More informationBraindumpsVCE. Best vce braindumps-exam vce pdf free download
BraindumpsVCE http://www.braindumpsvce.com Best vce braindumps-exam vce pdf free download Exam : SY0-501 Title : CompTIA Security+ Certification Exam Vendor : CompTIA Version : DEMO Get Latest & Valid
More informationName: Prof. Dr. Iftikhar Hussain. Designation: Vice Chancellor. Department: Industrial Engineering. Specialization: Flexible Manufacturing Systems
Name: Prof. Dr. Iftikhar Hussain Designation: Vice Chancellor Department: Industrial Engineering Specialization: Flexible Manufacturing Systems Email: iftikhar@uetpeshawar.edu.pk Area of Interest: Design,
More informationEDUCATIONAL QUALIFICATIONS HONORS AND AWARDS ASSOCIATION MEMBERSHIPS LIST OF PUBLICATIONS
NADIRAH BINTI MOHD NASIR FACULTY OF INDUSTRIAL SCIENCES & TECHNOLOGY UNIVERSITI MALAYSIA PAHANG LEBUHRAYA TUN RAZAK, 26300 GAMBANG PAHANG, MALAYSIA. OFFICE : +609-5492781 EMAIL : nadirah@ump.edu.my POSITION
More informationDOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE
DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled
More informationCurriculum Vitae. :University of Essex, United Kingdom. :Universiti Teknologi Malaysia, Skudai,
Curriculum Vitae Hazinah Kutty Mammi Mobile: 0197774672 Email: hazinah@utm.my Personal Data Name :Hazinah Binti Kutty Mammi Date of Birth :28 March 1972 Place of Birth :Kluang, Johor Nationality :Malaysian
More informationIOS SAFETY APPLICATION FOR UITM
Journal of Engineering Science and Technology Special Issue on ICE & ICIE 2015, April (2016) 97-105 School of Engineering, Taylor s University IOS SAFETY APPLICATION FOR UITM MOHAMAD FAHMI HUSSIN*, W AHMAD
More informationA Data Classification Algorithm of Internet of Things Based on Neural Network
A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To
More informationComputer Communication and Networking 10TL Sections I-II
Computer Communication and Networking 10TL Sections I-II Dr. Faisal Karim Shaikh DEWSNet Group Dependable Embedded Wired/Wireless Networks DEWSNet Neeraj Suri Dependable Embedded Wired/Wireless Networks
More informationChongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.
2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data
More informationCORPORATE STRUCTURE OF GROUP SIRIM BERHAD MAY 2015
CORPORATE STRUCTURE OF GROUP SIRIM BERHAD 2015 05 MAY 2015 APPROVED FOR CIRCULATION COMPANY SECRETARY PRESIDENT AND CHIEF EXECUTIVE YBHG. DATO DR. HJ. ZAINAL ABIDIN MOHD YUSOF AUDIT AND ACCOUNTS COMMITTEE
More informationBachelor of Information Technology (Network Security)
Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year
More informationCourse Outcome of M.E (ECE)
Course Outcome of M.E (ECE) PEC108/109: EMBEDDED SYSTEMS DESIGN 1. Recognize the Embedded system and its programming, Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits. 2. Identify
More informationAhli Jawatankuasa Etika Penyelidikan Manusia USM (Dikemaskini 8 Ogos 2018) USM Human Research Ethics Committee Members (Updated 8 th August 2018)
Ahli Jawatankuasa Etika Penyelidikan Manusia USM (Dikemaskini 8 Ogos 2018) USM Human Research Ethics Committee Members (Updated 8 th August 2018) Main Committee Members (Panel A) Health Campus 1. Prof.
More information( It will be applied from Fall)
İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING MASTER OF SCIENCE PROGRAM IN COMPUTER ENGINEERING Core Courses ECTS *CENG 590 Seminar (0-2)
More informationProject Title ** Objective ** Innovative ** Deliverables ** Skills required ** No. Of studen ts. To let company benchmarking the implementation of BI
Ms.Chuah Min Hooi @254 chuahmh@utar.edu.my Design and develop a business intelligence assessment tool 3D virtual interior for SOHO housing area To study the existing business intelligence assessment tool
More informationADAPTIVE TRAFFIC LIGHT IN IMAGE PROCESSING BASED- INTELLIGENT TRANSPORTATION SYSTEM: A REVIEW
ADAPTIVE TRAFFIC LIGHT IN IMAGE PROCESSING BASED- INTELLIGENT TRANSPORTATION SYSTEM: A REVIEW 1 Mustafa Mohammed Hassan Mustafa* 2 Atika Malik * 3 Amir Mohammed Talib Faculty of Engineering, Future University,
More informationA QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES
A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION
More informationDepartment of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework
Department of Computer Science & Engineering University of Kalyani Syllabus for Ph.D. Coursework Paper 1: A) Literature Review: (Marks - 25) B) Research Methodology: (Marks - 25) Paper 2: Computer Applications:
More informationMcAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential
More informationColloquium in Computer and Mathematical Sciences Education (CCMSE 2015)
Colloquium in Computer and Mathematical Sciences Education (CCMSE 2015) Computer Sciences Computer Network & Data Communication Mathematical Sciences & Statistics System Sciences & Information Technology
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationDOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING
DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the
More informationPromise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS. in various Domains Latest Projects
NCCT SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS in various Domains Latest Projects #109, 2 nd Floor, Bombay Flats, Nungambakkam High Road Nungambakkam High Road, Chennai 600034 Above IOB, Next
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationIMM PROTECTIVE COATINGS TECHNICIAN (BLASTING PAINTING) (CODE: PCT) PCT NO LEVEL SKILL NAME VALIDITY DATE
0001 LEVEL 2 MULTI-SKILL AZALI ABD. LATIF 05/08/2003 0002 LEVEL 2 MULTI-SKILL FOONG YARN FATT 05/08/2003 0003 LEVEL 2 MULTI-SKILL IDRIS TAHARIM 05/08/2003 0004 LEVEL 1 BLASTER JERFANDI SEMAN 05/08/2003
More informationThe University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree
Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3
More informationComputation of Fuzzy Analytic Hierarchy Process (FAHP) using MATLAB Programming in Sustainable Supply Chain
Computation of Fuzzy Analytic Hierarchy Process (FAHP) using MATLAB Programming in Sustainable Supply Chain 1a Ahamad Zaki Mohamed Noor, 1b Muhammad Hafidz Fazli Md Fauadi, 1c Nur Zul Hafiq Zulkifli, 1d
More informationImage Processing (IP)
Image Processing Pattern Recognition Computer Vision Xiaojun Qi Utah State University Image Processing (IP) Manipulate and analyze digital images (pictorial information) by computer. Applications: The
More informationCORPORATE STRUCTURE OF GROUP SIRIM BERHAD st July 2014
CORPORATE STRUCTURE OF GROUP SIRIM BERHAD 2014 01 st July 2014 APPROVED FOR CIRCULATION COMPANY SECRETARY PRESIDENT AND CHIEF EXECUTIVE DR. HJ. ZAINAL ABIDIN MOHD YUSOF AUDIT AND ACCOUNTS COMMITTEE GROUP
More informationFuzzy Logic approach to Recognition of Isolated Arabic Characters
Fuzzy Logic approach to Recognition of Isolated Arabic Characters Majida Ali Abed, Hamid Ali Abed AL-Asadi, Zainab sabah Baha Al-Deen, Ahmad Naser Ismail Abstract In In recent years, fuzzy logic has been
More informationPOWER THEFT DETECTION USING PROBABILISTIC NEURAL NETWORK CLASSIFIER
POWER THEFT DETECTION USING PROBABILISTIC NEURAL NETWORK CLASSIFIER Kirankumar T 1, Sri Madhu G N 2 1PG Student, Department of Electrical and Electronics Engineering, University of B.D.T. College of Engineering,
More informationPerformance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela
Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationMOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03
MOHAMMED I. AL-SALEH Jordan University of Science and Technology, Computer Science Department, Irbid, P.O. Box 3030, 22110 +962-788-052-892 misaleh@just.edu.jo, moealsaleh@gmail.com EDUCATION Ph.D., 2011
More informationAn Evolution of Computer Science Research
An Evolution of Computer Science Research Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as
More informationThe Feature Analyst Extension for ERDAS IMAGINE
The Feature Analyst Extension for ERDAS IMAGINE Automated Feature Extraction Software for GIS Database Maintenance We put the information in GIS SM A Visual Learning Systems, Inc. White Paper September
More informationHex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network
ISBN 978-93-84422-8-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-217) Pattaya (Thailand) Dec. 28-29, 217 Relay Node Deployment for Assuring
More informationIntelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI) April 25.
Intelligent Edge Computing and ML-based Traffic Classifier Kwihoon Kim, Minsuk Kim (ETRI) (kwihooi@etri.re.kr, mskim16@etri.re.kr) April 25. 2018 ITU Workshop on Impact of AI on ICT Infrastructures Cian,
More informationRainfall prediction using fuzzy logic
Rainfall prediction using fuzzy logic Zhifka MUKA 1, Elda MARAJ, Shkelqim KUKA, 1 Abstract This paper presents occurrence of rainfall using principles of fuzzy logic applied in Matlab. The data are taken
More informationEMBEDDED MAJOR PROJECTS LIST
CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse
More informationA New Method for Determining Transverse Crack Defects in Welding Radiography Images based on Fuzzy-Genetic Algorithm
International Journal of Engineering & Technology Sciences Volume 03, Issue 04, Pages 292-30, 205 ISSN: 2289-452 A New Method for Determining Transverse Crack Defects in Welding Radiography Images based
More information13 Operational and Security Incident management. IT Governance CEN 667
13 Operational and Security Incident management IT Governance CEN 667 1 Project proposal (week 4) Goal of the projects are to find applicable measurement and metric methods to improve processes: For 27000
More informationINCREASING CLASSIFICATION QUALITY BY USING FUZZY LOGIC
JOURNAL OF APPLIED ENGINEERING SCIENCES VOL. 1(14), issue 4_2011 ISSN 2247-3769 ISSN-L 2247-3769 (Print) / e-issn:2284-7197 INCREASING CLASSIFICATION QUALITY BY USING FUZZY LOGIC DROJ Gabriela, University
More information( B Scheme Main, Re-appear & Improvement)
Theory Date Sheet of B. Tech. 2 nd Sem. (May 2018 Examinations) Time of Exam:. 09:30 AM to 12:30 PM for Morning Session (M) Time of Exam:. 02:00 PM to 05:00 PM for Evening Session (E) ( B Scheme Main,
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationContext-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions
Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Siran Pavankumar(149344152) siranpavankumar@gmail.com Computer Science Department Seoul National
More informationCOMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai
COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.
More informationAPPLICATION OF FUZZY LOGIC REASONING MODEL FOR DETERMINING ADHESIVE STRENGTH OF THIN FLIM COATINGS
APPLICATION OF FUZZY LOGIC REASONING MODEL FOR DETERMINING ADHESIVE STRENGTH OF THIN FLIM COATINGS ABSTRACT Ashwani Kharola 1, Dr SB Singh 2 Govt. Of India, Ministry of Defence Institute of Technology
More informationPseudonym Based Security Architecture for Wireless Mesh Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network
More informationReview on Data Mining Techniques for Intrusion Detection System
Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,
More information2 nd Year. Module Basket of Courses Duration Credit Offered Status. 12 Weeks 4 NPTEL Programming in Java
MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WEST BENGAL List of Online Courses for 2nd Year, 3rd Year and 4th Year B.Tech Courses of IT and CSE for Additional Credit Earning 2 nd Year Module Basket
More informationToward Energy Data Platform in Korea
Toward Energy Data Platform in Korea 최준균 (Jun Kyun Choi) Korea Advanced Institute of Science and Technology (KAIST) Contents 1 ` Market Trends of Cloud Computing and IoT 2 ` Platform Revolution of Energy
More informationA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY Md. Maklachur Rahman 1 1 Department of Computer Science and Engineering, Chittagong University of Engineering and Technology,
More informationVIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK
VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK Puteri Azwa Ahmad 1, M. Mahmuddin 2, and Mohd Hasbullah Omar 3 1 Politeknik Tuanku Syed Sirajuddin,
More informationImproved QoS Optimization Approach in Sensor Network using Convolutional Encoding
Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding Yashu, Smita 2 M.Tech student, CSE Dept., PDM College of Engineering for Women 2 Assistant Professor, PDM College of Engineering
More information2017 International Conference on Communication Technologies (ComTech 2017)
2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute
More informationTHE description and representation of the shape of an object
Enhancement of Shape Description and Representation by Slope Ali Salem Bin Samma and Rosalina Abdul Salam Abstract Representation and description of object shapes by the slopes of their contours or borders
More informationJob Shop Scheduling Problem (JSSP) Genetic Algorithms Critical Block and DG distance Neighbourhood Search
A JOB-SHOP SCHEDULING PROBLEM (JSSP) USING GENETIC ALGORITHM (GA) Mahanim Omar, Adam Baharum, Yahya Abu Hasan School of Mathematical Sciences, Universiti Sains Malaysia 11800 Penang, Malaysia Tel: (+)
More informationInnovative M-Tech projects list IEEE papers
Innovative M-Tech projects list IEEE-2013-14 papers 1. Analysis and Practical Considerations in Implementing Multiple Transmitters for Wireless Power Transfer via Coupled Magnetic Resonance (IEEE 2014)
More informationThe Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor,
The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor, National Institute of Standards and Technology 1 Speaker
More informationPart I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis
Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationImpacts of Brooks Iyengar Algorithm on PhD Dissertations
Impacts of Brooks Iyengar Algorithm on PhD Dissertations More than 28 dissertations from highly ranked universities (e.g. MIT, Carnegie Melon University, RICE University, University of Southern California,
More informationVehicular Road Side Backbone Network with Multiprotocol Label Switching Kashif Naseer Qureshi *, Abdul Hanan Abdullah, Raja Waseem Anwar
1 st International Conference of Recent Trends in Information and Communication Technologies Vehicular Road Side Backbone Network with Multiprotocol Label Switching Kashif Naseer Qureshi *, Abdul Hanan
More informationCEN 538 Wireless LAN & MAN Networks
King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book
More information