A New Scheme Based Biometric to Protect Location Privacy in Wireless Body Area Networks A Superlinearly feasible SQP algorithm for Constrained Optimization Zhijun Luo

34. Application of optimal control theory to an SEIR model with immigration of infectives Elhia Mohamed 230-236 35. Profit-Aware DVFS Enabled Resource Management of IaaS Cloud Shahzad Ali 237-247

36. Vision-Based Obstacle Avoidance Controller Design for Mobile Robot by Using Single Camera

Yi-Jen Mon 248-250 37. Post-processing of Engineering Analysis Results for Visualization in VR System Stoyan Maleshkov and Dimo Chotrov 258-263 38. Parallel and distributed closed regular pattern mining in large databases M.Sreedevi and L S S Reddy 264-269

39. Dynamic Forensics Model based on Ontology and Context Information Baoxian Jia and Weiqiang Yang

270-272 40. Peripheral Contour Feature Based On-line Handwritten Uyghur Character Recognition Zulpiya Kahar, Mayire Ibrayim and Askar Hamdulla 273-278

41. Modified TCP Protocol for Wireless Sensor Networks Hesham Abusaimeh and Mohammad Shkoukani

279-285 42. Differential Evolution with u+T-Selection Technique Miao-Miao Liu, Pan Huo and Wen-Yin Gong 286-293

43. ANFIS Transient Control for Double Inverted Pendulum System Yi-Jen Mon

294-297 44. Dynamic Analysis for Video Based Smoke Detection Chen Junzhou, You Yong and Peng Qiang 298-304 45. Design and Simulation of Gate Driver Circuit Using Pulse Transformer Daizhuang Wang, Haifeng Dai and Zechang Sun 305-310 46. Studied and Their Application of Vibration Control Technologies Ying Sun, Yuesheng Gu and Hegen Xiong 311-318 47. An Ensemble Monte Carlo Model to Calculate Photocurrent of MSM Photodetector Mohammad Soroosh and Yasser Amiri 319-324 48. Evaluation of a Proposed Intelligent Transportation Framework using Computer Network Concepts: A Case Study for Hajj-Pilgrim Traffic Monitoring and Control Omar Tayan and Abdullah Al-Binali 325-330

49. A New Scheme Based Biometric to Protect Location Privacy in Wireless Body Area Networks

Mohammed Mana, Mohamed Feham and Boucif Amar Bensaber 331-337 50. Simulation of Efficient Real-time Scheduling and Power Optimization Rym Cheour, Urunuela Richard, Yvon Trinquet and Mohamed Abid 338-346 51. Web Usage Mining: Data Preprocessing and Multi Level analysis on Moodle Nawal Sael, Abdelaziz Marzak and Hicham Behja 347-354 52. Performance Comparison of MIMO Systemsover AWGN and Rician Channels using OSTBC3 with Zero Forcing Receivers Navjot Kaur and Lavish Kansal 355-364 53. A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks Haixia Zhao, Yaowei Li, Jincheng Shen, Mingchuan Zhang, Ruijuan Zheng and Qingtao Wu 365-372

54. A Superlinearly feasible SQP algorithm for Constrained Optimization Zhijun Luo

373-379 55. Performance Analysis of ST,SF and STF IN MIMO-OFDM Technique M.Vijaya Laxmi and S.Narayana Reddy 380-384 56. Deployment of Palm Recognition Approach using Image Processing Technique Jugal Kishore Patel and Sanjay Kumar Dubey 385-390 57. A Linear Active Disturbance Rejection Control applied for DFIG based Wind Energy Conversion System Ali Boukhriss, Tamou Nasser and Ahmed Essadki 391-399 58. The Gray images of linear codes over the ring F3+vF3+v2F3 Yazhou Xiong, Shujie Yun, Jingyuan Xing and Xiaofang Xu 400-405 59. Multi-Objective Particle Swarm Optimization for Facility Location Problem in Wireless Mesh Networks Tarik Mountassir, Bouchaib Nassereddine, Abdelkrim Haqiq and Samir Bennani 406-413 60. Failure Detection and Recovery in Hierarchical Network Using FTN Approach Bhagvan Krishna Gupta, Ankit Mundra and Nitin Rakesh 414-421 61. Handwritten Word Recognition Using MLP based Classifier: A Holistic Approach Ankush Acharyya, Sandip Rakshit, Ram Sarkar, Subhadip Basu and Mita Nasipuri 422-427

62. Proposal to Enhance AntNet Routing Algorithm by Exploiting Association Rules as Analysis Tool