Vol 5, No 2 (2012)

Table of Contents

Vol 5, No 2 (2012)

Articles

A Secure and Robust Prototype for Electronic Voting System
Ashraf Darwish, Magidalgendy, Eman Mohamed
 Vol 5, No 2 (2012), Pagination: 161-168
ABSTRACT |  PDF Abstract Views: 234  |  PDF Views: 0
Virtual Reality Helps Rheumatoid Arthritis Patients
Wadee Alhalabi
 Vol 5, No 2 (2012), Pagination: 169-179
ABSTRACT |  PDF Abstract Views: 223  |  PDF Views: 0
An Alternate Approach to Compute the Reliability of a Network with Imperfect Nodes using Binary Decision Diagrams
Manoj Singhal
 Vol 5, No 2 (2012), Pagination: 181-188
ABSTRACT |  PDF Abstract Views: 223  |  PDF Views: 0
A Genetic Algorithm Scheduling Approach for Virtual Machine Resources in Cloud Data Centers
Zohreh Royaee, Majid Mohammadi
 Vol 5, No 2 (2012), Pagination: 189-197
ABSTRACT |  PDF Abstract Views: 298  |  PDF Views: 0
The Impact of Client-Server Modalities on Cryptography
Al-Shomrani Mohammed Mosa, Mohammad A. A. Al-Rababah, Hussein Ahmad
 Vol 5, No 2 (2012), Pagination: 199-204
ABSTRACT |  PDF Abstract Views: 240  |  PDF Views: 0
Queuing Approach to Estimate the MANET’s Optimal Number of Nodes
Saad Talib Hasson, Enass Fadil
 Vol 5, No 2 (2012), Pagination: 205-214
ABSTRACT |  PDF Abstract Views: 226  |  PDF Views: 0
Intelligent and Effective Diabetes Risk Prediction System Using Data Mining
Kawsar Ahmed, Tasnuba Jesmin, Ushin Fatima, Md. Moniruzzaman, Abdulla-Al-Emran, Md. Zamilur Rahman
 Vol 5, No 2 (2012), Pagination: 215-221
ABSTRACT |  PDF Abstract Views: 234  |  PDF Views: 0
Requirement for Computer Support and its Protocols for AVT
Asia Begum, Faheem Khan, Parveen Mehboob, Muhammad Shoaib, Lala Rukh
 Vol 5, No 2 (2012), Pagination: 223-230
ABSTRACT |  PDF Abstract Views: 228  |  PDF Views: 0
Using Artificial Bee Colony Algorithm for MLP Training on Software Defect Prediction
Solmaz Farshidpour, Farshid Keynia
 Vol 5, No 2 (2012), Pagination: 231-239
ABSTRACT |  PDF Abstract Views: 225  |  PDF Views: 0
New Developed Traffic Generator for NS-2
Saad Talib Hasson, Mohammad H. Husain
 Vol 5, No 2 (2012), Pagination: 241-250
ABSTRACT |  PDF Abstract Views: 197  |  PDF Views: 0
Feature Aware Prediction of User Action in Software Process
Seema Safi, Sajid Anwar, Lala Rukh
 Vol 5, No 2 (2012), Pagination: 251-256
ABSTRACT |  PDF Abstract Views: 223  |  PDF Views: 0
Review on Financial Forecasting using Neural Network and Data Mining Technique
Mehzabin Shaikh, Gyankamal J. Chhajed
 Vol 5, No 2 (2012), Pagination: 263-267
ABSTRACT |  PDF Abstract Views: 221  |  PDF Views: 0
A Review on Role of Information Technology in Business Management
A. Sreeram, D. R. P. Chandra Sekhar, S. R. Karumuri, Y. Srinivas, J. Vijayasekhar
 Vol 5, No 2 (2012), Pagination: 269-272
ABSTRACT |  PDF Abstract Views: 234  |  PDF Views: 0
Batch Installer Inoculation for Digital Repository Software Open Source DSpace
Bharat M. Chaudhari
 Vol 5, No 2 (2012), Pagination: 273-276
ABSTRACT |  PDF Abstract Views: 210  |  PDF Views: 0
Double-reflecting Data Perturbation Method for Information Security
Maram Balajee, Challa Narasimham
 Vol 5, No 2 (2012), Pagination: 283-288
ABSTRACT |  PDF Abstract Views: 215  |  PDF Views: 0
Impact of Information Technology in Various Sectors
A. Sreeram, Y. Srinivas, G. Ananda Rao, S. R. Karumuri, J. Vijayasekhar, R. Sampath Kumar
 Vol 5, No 2 (2012), Pagination: 289-294
ABSTRACT |  PDF Abstract Views: 197  |  PDF Views: 0
Service Oriented Architecture Integration
Suresh Krishnaraju, K. Subramani
 Vol 5, No 2 (2012), Pagination: 295-301
ABSTRACT |  PDF Abstract Views: 208  |  PDF Views: 0
Intelligent Fuzzy Analytic Hierarchy Processing Decision Support System-An Aid in Expert Analysis of Shoulder and Neck Pain Occupational Risk Factors
T. Padma, S. P. Shantharajah
 Vol 5, No 2 (2012), Pagination: 303-313
ABSTRACT |  PDF Abstract Views: 202  |  PDF Views: 0
SSL Based Transport Layer Security
J. Vijayabharathi
 Vol 5, No 2 (2012), Pagination: 315-320
ABSTRACT |  PDF Abstract Views: 210  |  PDF Views: 6
Secure Dynamic Data Aggregation Routing Protocol for Wireless Sensor Networks
Bhawana Mathur
 Vol 5, No 2 (2012), Pagination: 321-325
ABSTRACT |  PDF Abstract Views: 184  |  PDF Views: 0
Cloud Computing:Risks and Security Issues
Sucheta Arora
 Vol 5, No 2 (2012), Pagination: 327-332
ABSTRACT |  PDF Abstract Views: 173  |  PDF Views: 0