34. Application of optimal control theory to an SEIR model with immigration of infectives Elhia Mohamed
230-236 35. Profit-Aware DVFS Enabled Resource Management of IaaS Cloud
Shahzad Ali 237-247
36. Vision-Based Obstacle Avoidance Controller Design for Mobile Robot by Using Single Camera
Yi-Jen Mon 248-250
37. Post-processing of Engineering Analysis Results for Visualization in VR System Stoyan Maleshkov and Dimo Chotrov
258-263 38. Parallel and distributed closed regular pattern mining in large databases
M.Sreedevi and L S S Reddy 264-269
39. Dynamic Forensics Model based on Ontology and Context Information Baoxian Jia and Weiqiang Yang
270-272 40. Peripheral Contour Feature Based On-line Handwritten Uyghur Character Recognition
Zulpiya Kahar, Mayire Ibrayim and Askar Hamdulla 273-278
41. Modified TCP Protocol for Wireless Sensor Networks Hesham Abusaimeh and Mohammad Shkoukani
279-285 42. Differential Evolution with u+T-Selection Technique
Miao-Miao Liu, Pan Huo and Wen-Yin Gong 286-293
43. ANFIS Transient Control for Double Inverted Pendulum System Yi-Jen Mon
294-297 44. Dynamic Analysis for Video Based Smoke Detection
Chen Junzhou, You Yong and Peng Qiang 298-304
45. Design and Simulation of Gate Driver Circuit Using Pulse Transformer Daizhuang Wang, Haifeng Dai and Zechang Sun
305-310 46. Studied and Their Application of Vibration Control Technologies
Ying Sun, Yuesheng Gu and Hegen Xiong 311-318
47. An Ensemble Monte Carlo Model to Calculate Photocurrent of MSM Photodetector Mohammad Soroosh and Yasser Amiri
319-324 48. Evaluation of a Proposed Intelligent Transportation Framework using Computer
Network Concepts: A Case Study for Hajj-Pilgrim Traffic Monitoring and Control
Omar Tayan and Abdullah Al-Binali 325-330
49. A New Scheme Based Biometric to Protect Location Privacy in Wireless Body Area Networks
Mohammed Mana, Mohamed Feham and Boucif Amar Bensaber 331-337
50. Simulation of Efficient Real-time Scheduling and Power Optimization Rym Cheour, Urunuela Richard, Yvon Trinquet and Mohamed Abid
338-346 51. Web Usage Mining: Data Preprocessing and Multi Level analysis on Moodle
Nawal Sael, Abdelaziz Marzak and Hicham Behja 347-354
52. Performance Comparison of MIMO Systemsover AWGN and Rician Channels using OSTBC3 with Zero Forcing Receivers
Navjot Kaur and Lavish Kansal 355-364
53. A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks
Haixia Zhao, Yaowei Li, Jincheng Shen, Mingchuan Zhang, Ruijuan Zheng and Qingtao Wu 365-372
54. A Superlinearly feasible SQP algorithm for Constrained Optimization Zhijun Luo
373-379 55. Performance Analysis of ST,SF and STF IN MIMO-OFDM Technique
M.Vijaya Laxmi and S.Narayana Reddy 380-384
56. Deployment of Palm Recognition Approach using Image Processing Technique Jugal Kishore Patel and Sanjay Kumar Dubey
385-390 57. A Linear Active Disturbance Rejection Control applied for DFIG based Wind Energy
Conversion System
Ali Boukhriss, Tamou Nasser and Ahmed Essadki 391-399
58. The Gray images of linear codes over the ring F3+vF3+v2F3 Yazhou Xiong, Shujie Yun, Jingyuan Xing and Xiaofang Xu
400-405 59. Multi-Objective Particle Swarm Optimization for Facility Location Problem in Wireless
Mesh Networks
Tarik Mountassir, Bouchaib Nassereddine, Abdelkrim Haqiq and Samir Bennani 406-413
60. Failure Detection and Recovery in Hierarchical Network Using FTN Approach Bhagvan Krishna Gupta, Ankit Mundra and Nitin Rakesh
414-421 61. Handwritten Word Recognition Using MLP based Classifier: A Holistic Approach
Ankush Acharyya, Sandip Rakshit, Ram Sarkar, Subhadip Basu and Mita Nasipuri 422-427
62. Proposal to Enhance AntNet Routing Algorithm by Exploiting Association Rules as Analysis Tool