TABLE OF CONTENTS
1. An Efficient Distributed Data Extraction Method for Mining Sensor Networks Data Azhar Mahmood, Ke Shi and Shaheen Khatoon
1-10 2. An Efficient Framework for Medical Image Retrieval System using Contribution
Mechanism
B.P. Mallikarjunaswamy and Mr. Shivamurthy R.C 11-20
3. Patterns Antennas Arrays Synthesis Based on Adaptive Particle Swarm Optimization and Genetic Algorithms
Boufeldja Kadri, Miloud Bousahla, Mohamed Brahimi, Ismail Khalil Bousserhane and Bendimerad Fethi Tarek
21-26 4. A Binary Quantum-behaved Particle Swarm Optimization Algorithm with Cooperative
Approach
Jing Zhao 112-118
5. Application of SketchUp in Coke Oven Three-Dimensional Digital Modeling Shuguang Ouyang, Jie Xu, Xiaoli Su and Zikan Wang
201-205 6. Analysing Word Importance for Image Annotation
Payal Gulati and A.K. Sharma 206-209
7. A Review on: Issues Related to Security on Tree Structure Data Vivek N. Waghamre and Ravindra C. Thool
210-214 8. Accurate Image Search using Local Descriptors into a Compact Image Representation
Soumia Benkrama, Lynda Zaoui and Christophe Charrier 220-225
9. Exploration of Success Factors of Information System Bikram Pal Kaur
226-235 10. IT outsourcing service provider dynamic evaluation model and algorithms based on
Rough Set
Li Shi 236-241
11. Review of Security Approaches in Routing Protocol in Mobile Adhoc Network Sumati Ramakrishna Gowda and P.S Hiremath
242-251 12. Association Technique based on Classification for Classifying Microcalcification and
Mass in Mammogram
Herwanto and Aniati Murni Arymurthy 252-259
13. A Cross-domain Authentication Protocol based on ID Zheng Jun, Guo Xianchen, Zhang Quanxin and Zhang Qikun
264-270 14. Supply Chain Dynamic Performance Measurement Based on BSC and SVM
Yan Hong and Yang Zhong-Hua 271-277
15. Study on the Distribution of the Magnetic Field of Circular and Square Exiting Coils in Electromagnetic Flow Meter
Ling-Fu Kong, Sheng-Xue Du and Ying-Wei Li 278-284
16. Multi- view Video Coding Scheme based upon enhanced Random Access capacity Xiaoxing Lv, Lini Ma and Jingjing Guo
285-289
17. Secure and Verifiable 2, 2 Secret Sharing Scheme for Binary Images Sonali Patil, Sandip Sathe, Pravin Mehetre, Deepak Shinde, Kiran Bhalerao
and Pawankumar Pandey 290-293
18. Optimization Of IPv4 Packets Headers Fahim A. Ahmed Ghanem
294-302 19. Backstepping Adaptive Fuzzy Control for two-link robot manipulator
, Yongqiao Wei, , Jingdong Zhang, , Li Hou, , Fenglan Jia, and Qinglin Chang 303-308
20. Multi-Attribute Decision Making Scholarship Selection Using A Modified Fuzzy TOPSIS Gusti Ayu Made Shinta Wimatsari, Dr. I Ketut Gede Darma Putra, S.Kom. Mt and Putu
Wira Buana, S.Kom., Mt 309-317
21. A Novel Approach to Query Modification Based on Users Why-not Question Jianfeng Zhang, Weihong Han, Yan Jia, Peng Zou and Hua Fan
318-326 22. Using Arabic Wordnet for Semantic Indexation in Information Retrieval System
Mohammed Alaeddine Abderrahim, Mohammed El Amine Abderrahim and Mohammed Amine Chikh
327-332 23. Design and Development of an Intelligent Mobile Health Tele-assistance System in
Ambulance Practice Service
Rachid Merzougui 333-342
24. Review of Load Balancing in Cloud Computing Suriya Begum and Prashanth C.S.R