17. A Novel Malicious Web Crawler Detector: Performance and Evaluation Dexiang Zhang, Difan Zhang and Xun Liu
121-126 18. Convergent Projective Non-negative Matrix Factorization
Lirui Hu, Jianguo Wu and Lei Wang 127-133
19. Job Scheduling Model for Cloud Computing Based on Multi-Objective Genetic Algorithm
Jing Liu, Xing-Guo Luo, Xing-Ming Zhang, Fan Zhang and Bai-Nan Li 134-139
20. Implementation of Data Mining in Estimating The Growth Of Local Sheep Aan Kardiana and Lilis Khotijah
140-144 21. An Optimal Scheduling Algorithm for Real Time Applications in Grid System
S.Baghavathi Priya and T.Ravichandran 145-150
22. A Group Decision Making Methodology for Emergency Decision Tiejun Cheng, Fengping Wu and Yanping Chen
151-157 23. Analysis of the impact of parameters values on the Genetic Algorithm for TSP
Avni Rexhepi, and 158-164
24. Interoperability between .Net framework and Python in Component way M. K. Pawar, Ravindra Patel and Dr. N. S. Chaudhari
165-170 25. Intelligent Car Parking Management System On FPGA
Rehanullah Khan, Yasir Ali Shah, Kashif Ahmed, Asif Manzoor and Amjad Ali 171-175
26. Improvement in Accuracy for Three-Dimensional Sensor Faro Photon 120 Scanner Mohd Azwan Abbas, Halim Setan, Zulkepli Majid, Albert K. Chong, Lau Chong Luh, Mohd
Farid Mohd Ariff and Khairulnizam M. Idris 176-182
27. A Method of neural network internal model control in unstable time-lag process Liu Qi, Liu Qi, Zhang Honghui, Zhang Honghui, Shao Yonggang, Shao Yonggang, Liu
Kuili, Liu Kuili, Wang Jie, Wang Jie, Chen Zhanwei, Chen Zhanwei, Huang Zhenzhen and Huang Zhenzhen
183-188
28. Integration of Public Transportation through National e-Governance Service Delivery Framework
Ajay Kumar Bharti and Sanjay K. Dwivedi 189-192
29. Numerical Simulation of Two Phase Flow in Reconstructed Pore Network Based on Lattice Boltzmann Method
Song Rui, Liu Jianjun and Qin Dahui 193-200
30. New Delay-dependent Stability Criteria for Linear Systems with Time-varying Delay Weiwei Zhang, Chao Ge and Hong Wang
201-209 31. Routing Protocol in Urban Environment for V2V communication Vanet
My Driss Laanaoui and Said Raghay 210-214
32. Mining User Similarity Using Spatial-temporal Intersection Yimin Wang, Ruimin Hu, Wenhua Huang and Jun Chen
215-221 33. Network Security Using Job Oriented Architecture SUJOA
Tariq Ahamad and Abdullah Aljumah 222-226
34. On the local controllability of class of a discrete-timeinhomogeneous multi-input bilinear systems
Omar Balatif, , and 227-231
35. Two-terminal Fault Location Method Based on the Lines Converted Midpoint and HHT Yutian Wang, Huixin Wang, Shuqing Zhang and Hanlu Shangguan
245-249 36. Performance Analysis of Web Page Recommendation Algorithm Based on Weighted
Sequential Patterns and Markov Model
K.Suneetha and M. Usha Rani 250-257
37. Predicting the Effects of Medical Waste in the Environment Using Artificial Neural Networks: A Case Study
Qeethara Al-Shayea and Ghaleb El-Refae 258-261
38. Some Models for Multiple Attribute Decision Making with Intuitionistic Fuzzy Information and Uncertain Weights
Yujun Luo, Xianfu Li, Ying Yang and Zhenglong Liu 262-266
39. Review of Intelligent Techniques Applied for Classification and Preprocessing of Medical Image Data
H S Hota, S P Shukla and Kajal Gulhare 267-272
40. Research on Spatial Estimation of Soil Property Based on Improved RBF Neural Network