17. Secure and Verifiable 2, 2 Secret Sharing Scheme for Binary Images Sonali Patil, Sandip Sathe, Pravin Mehetre, Deepak Shinde, Kiran Bhalerao
and Pawankumar Pandey 290-293
18. Optimization Of IPv4 Packets Headers Fahim A. Ahmed Ghanem
294-302 19. Backstepping Adaptive Fuzzy Control for two-link robot manipulator
, Yongqiao Wei, , Jingdong Zhang, , Li Hou, , Fenglan Jia, and Qinglin Chang 303-308
20. Multi-Attribute Decision Making Scholarship Selection Using A Modified Fuzzy TOPSIS Gusti Ayu Made Shinta Wimatsari, Dr. I Ketut Gede Darma Putra, S.Kom. Mt and Putu
Wira Buana, S.Kom., Mt 309-317
21. A Novel Approach to Query Modification Based on Users Why-not Question Jianfeng Zhang, Weihong Han, Yan Jia, Peng Zou and Hua Fan
318-326 22. Using Arabic Wordnet for Semantic Indexation in Information Retrieval System
Mohammed Alaeddine Abderrahim, Mohammed El Amine Abderrahim and Mohammed Amine Chikh
327-332 23. Design and Development of an Intelligent Mobile Health Tele-assistance System in
Ambulance Practice Service
Rachid Merzougui 333-342
24. Review of Load Balancing in Cloud Computing Suriya Begum and Prashanth C.S.R
343-352 25. A Comprehensive Review for Central Processing Unit Scheduling Algorithm
Ryan Richard H. GuadaƱa, Maria Rona Perez and Larry T. Rutaquio Jr. 353-358
26. Implementation of DB-Scan in Multi-Type Feature CoSelection for Clustering K.Parimala and Dr. V.Palanisamy
359-363 27. Study on Steering by Wire Controller Based on Improved H8 Algorithm
Huipeng Chen, Qiqi Yu, Lingjun Zhu and Guojin Chen 375-380
28. Function Optimization Based on Quantum Genetic Algorithm Ying Sun, Yuesheng Gu and Hegen Xiong
381-387 29. Enhanced Intrusion Detection System for Input Validation Attacks in Web Application
Puspendra Kumar and R. K. Pateriya 434-441
30. A Comparative study of Analog and digital Controller On DCDC Buck-Boost Converter Four Switch for Mobile Device Applications
Benlafkih Abdessamad, Krit Salah-Ddine and Chafik Elidrissi Mohamed 442-447
31. Structural Fatigue Reliability Based on Extension of Random Loads into Interval Variables
Qiangfeng Wang, Jianjun Li and Shengli Zhang 448-453
32. Clinical Relationships Extraction Techniques from Patient Narratives Wafaa Tawfik Abdel-Moneim, Mohamed Hashem Abdel-Aziz and Mohamed Monier Hassan
454-468 33. E-Government Interoperability Framework based on a Real Time Architecture
Aris Puji Widodo, Jazi Eko Istiyanto, Retantyo Wardoyo and Purwo Santoso 469-477
34. Design and Implementation of Geographic Information System on Tourism Guide Using Web-Based Google Maps
I Putu Agus Sudarma, I Nyoman Piarsa, St., Mt and Putu Wira Buana, S.Kom., Mt 478-483
35. Combined Architecture for Early Test Case Generation and Test suit Reduction Amit Sinhal and Amit Sinhal
484-489 36. An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in
Wireless Sensor Networks
Abdoulaye Diop, Yue Qi, Qin Wang and Shariq Hussain 490-500
37. Intelligent Modeling and Decision Making For Product Quality of Manufacturing System Based on Fuzzy Cognitive Map
Jihong Pang 501-506
38. Analysis of Pipe Size Influence on Pipeline Displacement with Plain Dent Based on FE Calculation