34. On the local controllability of class of a discrete-timeinhomogeneous multi-input bilinear systems
Omar Balatif, , and 227-231
35. Two-terminal Fault Location Method Based on the Lines Converted Midpoint and HHT Yutian Wang, Huixin Wang, Shuqing Zhang and Hanlu Shangguan
245-249 36. Performance Analysis of Web Page Recommendation Algorithm Based on Weighted
Sequential Patterns and Markov Model
K.Suneetha and M. Usha Rani 250-257
37. Predicting the Effects of Medical Waste in the Environment Using Artificial Neural Networks: A Case Study
Qeethara Al-Shayea and Ghaleb El-Refae 258-261
38. Some Models for Multiple Attribute Decision Making with Intuitionistic Fuzzy Information and Uncertain Weights
Yujun Luo, Xianfu Li, Ying Yang and Zhenglong Liu 262-266
39. Review of Intelligent Techniques Applied for Classification and Preprocessing of Medical Image Data
H S Hota, S P Shukla and Kajal Gulhare 267-272
40. Research on Spatial Estimation of Soil Property Based on Improved RBF Neural Network
Jianbo Xu, Quanyuan Tan, Lisheng Song, Kai Hao and Ke Xiao 273-280
41. Software Process Improvement Framework Based on CMMI Continuous Model Using QFD
Yonghui Cao 281-287
42. Research of the Decision-theoretic Intelligent Multi-agent Self-organization System Yonghui Cao
288-295 43. Refactoring Model of Legacy Software in Smart Grid based on Cloned Codes Detection
Meng Fanqi 296-303
44. Rolling Bearing Diagnosis Based on LMD and Neural Network Baoshan Huang, Baoshan Huang, Wei, Wei Xu, and Xinfeng Zou
304-309 45. Research on the Classification of Reviewers in Online Auction
Ren Licheng and Wu Ming 310-316
46. The Study on the Application of Business Intelligence in Manufacturing: A Review Ernie Mazuin Mohd Yusof, Mohd Shahizan Othman, Yuhanis Omar and Ahmad Rizal
Mohd Yusof 317-324
47. Problems in Software Quality Assurance and Reasons Mohammed Khalaf M Alshammri
325-327 48. Policy-Based Support for Mobile Grid Services
Tariq Alwada’n, Thair Khdour, Helge Janicke, Abdulsalam Alarabeyyat and Abdel Rahman Alkharabsheh
328-337 49. Phishing Detection Taxonomy for Mobile Device
Cik Feresa Mohd Foozy, Rabiah Ahmad and Mohd Faizal Abdollah 338-344
50. Security Aspects of Sensor Networks Mohd Muntjir, Mohd Rahul and
345-350 51. Towards a Graph-Based Approach for Web Services Composition
Chaker Ben Mahmoud, Fathia Bettahar, Hajer Abderrahim and Houda Saidi 351-356
52. A Calculus for Non Repudiation Protocols Abdesselam Redouane
357-362 53. Virtual Reality: An Efficient Way in GIS Classroom Teaching
Jiangfan Feng 363-367
54. Semantic Description of Web Services Thabet Slimani