Design and Implementation of Government Website Cluster Wei Zhang Reproducible Research in Speech Sciences Kálmán Abari Research of Embedded Hardware Optimization Design Algorithm Xuesong Yan Reconceptualization of Class-based Representation in UML Sabah

TABLE OF CONTENTS 1. Hough Transform and Active Contour for Enhanced Iris Segmentation Alaa Hilal, Bassam Daya and Pierre Beauseroy 1-10 2. Automated Extraction of Geospatial Features from Satellite Imagery: Computer Vision Oriented Plane Surveying Usman Babawuro and Zou Beiji 11-17 3. The Harris Corner Detection Method Based on Three Scale Invariance Spaces Yutan Wang, Huixin Wang, Jing Li and Biming Li 18-22 4. Service Priority based Reliable Routing Path Select Method in Smart Grid Communication Network Kaixuan Wang, Xuesong Qiu and Zhipeng Gao 23-30

5. Design and Implementation of Government Website Cluster Wei Zhang

31-35 6. Secure Data Exchange in P2P Data Sharing Systems in eHealth Perspective Mehedi Masud and Sk. Md. Mizanur Rahman 36-42

7. Reproducible Research in Speech Sciences Kálmán Abari

43-52 8. Cultural Algorithm for Engineering Design Problems Xuesong Yan 53-61 9. Homemade Antennas Implementation: A Comparative Analysis of the Quality of Service Josué Emmanuel Tec Castro, Cinhtia Maribel González Segura, Michel García García, Lizzie Edmea Narváez Díaz and Maximiliano Canché Euán 62-69

10. Research of Embedded Hardware Optimization Design Algorithm Xuesong Yan

70-78 11. Strongly Nonlinear Parabolic Unilateral Problems Without Sign Conditions and Three Unbounded Nonlinearities Youssef Akdim, Jaouad Bennouna, A. Bouajaja and Mounir Mekkour 79-90

12. Reconceptualization of Class-based Representation in UML Sabah Al-Fedaghi

91-99 13. Motion Detection Real Time 3D Walkthrough in Limkokwing University of Creative Technology Modet-Walk using Kinect XBox Behrang Parhizkar, Kanammal Ap Sandrasekaran and Arash Habibi Lashkari 100-109

14. RSSVM-based Multi-Instance Learning for Image Categorization Daxiang Li

110-118 15. Matrix Access structure Policy used in Attribute-Based Proxy Re-encryption Li Keying 119-127 16. Software Evaluation for Crowd Evacuation - Case Study: Al-Masjid An-Nabawi Fazilah Haron, Yasser M. Alginahi, Muhammad N. Kabir and Ali I. Mohamed 128-134 17. A HMM-Based Method for Vocal Fold Pathology Diagnosis Vahid Majidnezhad and Igor Kheidorov 135-138

18. Application of Inventory Management Principles for Efficient Data Placement in Storage Networks

Arokia Paul Rajan and Sagayaraj Francis 139-145 19. Part of speech Tagging in Manipuri with Hidden Markov Model Kh Raju Singha, Bipul Syam Purkayastha and Kh Dhiren Singha 146-149 20. Face Gender Image Classification Using Various Wavelet Transform and Support Vector Machine with various Kernels Amjath Fareeth Basha and Gul Shaira Banu Jahangeer 150-157 21. How using business intelligence can improve SCPMS project maturity: an empirical investigation in large sized Moroccan companies Chafik Okar, Abderrahim El Amraoui, Faycal Fedouaki and Said Barrijal 158-164 22. An Empirical Study of COTS components Persuasion, Evaluation Selection and Integration in software houses Faisalabad, Pakistan Zahid Javed, Ahsan Raza Sattar, Tasleem Mustafa and Muhammad Shakeel Faridi 165-169 23. Autonomous Multilevel Policy Based Security Configuration in Distributed Database Neera Batra and Hemant Aggarwal 170-176 24. Decision Feedback Blind Equalization Based on Recurrent Least Squares Algorithm for Underwater Acoustic Channels Ying Xiao 177-181 25. Performance of Network Coding Based Multipath Routing in Wireless Sensor Networks Baolin Sun, Chao Gui, Ying Song and Ting Zhang 182-187 26. A Self-Optimization Method for System Service Dependability based on Autonomic Computing Qingtao Wu, Lina Zhu, Ying Lou and Ruijuan Zheng 188-193 27. Improved Ensemble Empirical Mode Decomposition and its Applications to Gearbox Fault Signal Processing Jinshan Lin 194-199

28. Improved Time Aware Incremental PageRanking Using Personalized Link Structure Analysis