TABLE OF CONTENTS
1. Hough Transform and Active Contour for Enhanced Iris Segmentation Alaa Hilal, Bassam Daya and Pierre Beauseroy
1-10 2. Automated Extraction of Geospatial Features from Satellite Imagery: Computer Vision
Oriented Plane Surveying
Usman Babawuro and Zou Beiji 11-17
3. The Harris Corner Detection Method Based on Three Scale Invariance Spaces Yutan Wang, Huixin Wang, Jing Li and Biming Li
18-22 4. Service Priority based Reliable Routing Path Select Method in Smart Grid
Communication Network
Kaixuan Wang, Xuesong Qiu and Zhipeng Gao 23-30
5. Design and Implementation of Government Website Cluster Wei Zhang
31-35 6. Secure Data Exchange in P2P Data Sharing Systems in eHealth Perspective
Mehedi Masud and Sk. Md. Mizanur Rahman 36-42
7. Reproducible Research in Speech Sciences Kálmán Abari
43-52 8. Cultural Algorithm for Engineering Design Problems
Xuesong Yan 53-61
9. Homemade Antennas Implementation: A Comparative Analysis of the Quality of Service Josué Emmanuel Tec Castro, Cinhtia Maribel González Segura, Michel García
García, Lizzie Edmea Narváez Díaz and Maximiliano Canché Euán 62-69
10. Research of Embedded Hardware Optimization Design Algorithm Xuesong Yan
70-78 11. Strongly Nonlinear Parabolic Unilateral Problems Without Sign Conditions and Three
Unbounded Nonlinearities
Youssef Akdim, Jaouad Bennouna, A. Bouajaja and Mounir Mekkour 79-90
12. Reconceptualization of Class-based Representation in UML Sabah Al-Fedaghi
91-99 13. Motion Detection Real Time 3D Walkthrough in Limkokwing University of Creative
Technology Modet-Walk using Kinect XBox
Behrang Parhizkar, Kanammal Ap Sandrasekaran and Arash Habibi Lashkari 100-109
14. RSSVM-based Multi-Instance Learning for Image Categorization Daxiang Li
110-118 15. Matrix Access structure Policy used in Attribute-Based Proxy Re-encryption
Li Keying 119-127
16. Software Evaluation for Crowd Evacuation - Case Study: Al-Masjid An-Nabawi Fazilah Haron, Yasser M. Alginahi, Muhammad N. Kabir and Ali I. Mohamed
128-134 17. A HMM-Based Method for Vocal Fold Pathology Diagnosis
Vahid Majidnezhad and Igor Kheidorov 135-138
18. Application of Inventory Management Principles for Efficient Data Placement in Storage Networks
Arokia Paul Rajan and Sagayaraj Francis 139-145
19. Part of speech Tagging in Manipuri with Hidden Markov Model Kh Raju Singha, Bipul Syam Purkayastha and Kh Dhiren Singha
146-149 20. Face Gender Image Classification Using Various Wavelet Transform and Support
Vector Machine with various Kernels
Amjath Fareeth Basha and Gul Shaira Banu Jahangeer 150-157
21. How using business intelligence can improve SCPMS project maturity: an empirical investigation in large sized Moroccan companies
Chafik Okar, Abderrahim El Amraoui, Faycal Fedouaki and Said Barrijal 158-164
22. An Empirical Study of COTS components Persuasion, Evaluation Selection and Integration in software houses Faisalabad, Pakistan
Zahid Javed, Ahsan Raza Sattar, Tasleem Mustafa and Muhammad Shakeel Faridi 165-169
23. Autonomous Multilevel Policy Based Security Configuration in Distributed Database Neera Batra and Hemant Aggarwal
170-176 24. Decision Feedback Blind Equalization Based on Recurrent Least Squares Algorithm for
Underwater Acoustic Channels
Ying Xiao 177-181
25. Performance of Network Coding Based Multipath Routing in Wireless Sensor Networks Baolin Sun, Chao Gui, Ying Song and Ting Zhang
182-187 26. A Self-Optimization Method for System Service Dependability based on Autonomic
Computing
Qingtao Wu, Lina Zhu, Ying Lou and Ruijuan Zheng 188-193
27. Improved Ensemble Empirical Mode Decomposition and its Applications to Gearbox Fault Signal Processing
Jinshan Lin 194-199
28. Improved Time Aware Incremental PageRanking Using Personalized Link Structure Analysis