Vol 5, No 2 (2012)

Table of Contents

Vol 5, No 2 (2012)

Articles

A Secure and Robust Prototype for Electronic Voting System
Ashraf Darwish, Magidalgendy, Eman Mohamed
 Vol 5, No 2 (2012), Pagination: 161-168
ABSTRACT |  PDF Abstract Views: 176  |  PDF Views: 0
Virtual Reality Helps Rheumatoid Arthritis Patients
Wadee Alhalabi
 Vol 5, No 2 (2012), Pagination: 169-179
ABSTRACT |  PDF Abstract Views: 161  |  PDF Views: 0
An Alternate Approach to Compute the Reliability of a Network with Imperfect Nodes using Binary Decision Diagrams
Manoj Singhal
 Vol 5, No 2 (2012), Pagination: 181-188
ABSTRACT |  PDF Abstract Views: 166  |  PDF Views: 0
A Genetic Algorithm Scheduling Approach for Virtual Machine Resources in Cloud Data Centers
Zohreh Royaee, Majid Mohammadi
 Vol 5, No 2 (2012), Pagination: 189-197
ABSTRACT |  PDF Abstract Views: 219  |  PDF Views: 0
The Impact of Client-Server Modalities on Cryptography
Al-Shomrani Mohammed Mosa, Mohammad A. A. Al-Rababah, Hussein Ahmad
 Vol 5, No 2 (2012), Pagination: 199-204
ABSTRACT |  PDF Abstract Views: 173  |  PDF Views: 0
Queuing Approach to Estimate the MANET’s Optimal Number of Nodes
Saad Talib Hasson, Enass Fadil
 Vol 5, No 2 (2012), Pagination: 205-214
ABSTRACT |  PDF Abstract Views: 159  |  PDF Views: 0
Intelligent and Effective Diabetes Risk Prediction System Using Data Mining
Kawsar Ahmed, Tasnuba Jesmin, Ushin Fatima, Md. Moniruzzaman, Abdulla-Al-Emran, Md. Zamilur Rahman
 Vol 5, No 2 (2012), Pagination: 215-221
ABSTRACT |  PDF Abstract Views: 173  |  PDF Views: 0
Requirement for Computer Support and its Protocols for AVT
Asia Begum, Faheem Khan, Parveen Mehboob, Muhammad Shoaib, Lala Rukh
 Vol 5, No 2 (2012), Pagination: 223-230
ABSTRACT |  PDF Abstract Views: 161  |  PDF Views: 0
Using Artificial Bee Colony Algorithm for MLP Training on Software Defect Prediction
Solmaz Farshidpour, Farshid Keynia
 Vol 5, No 2 (2012), Pagination: 231-239
ABSTRACT |  PDF Abstract Views: 167  |  PDF Views: 0
New Developed Traffic Generator for NS-2
Saad Talib Hasson, Mohammad H. Husain
 Vol 5, No 2 (2012), Pagination: 241-250
ABSTRACT |  PDF Abstract Views: 140  |  PDF Views: 0
Feature Aware Prediction of User Action in Software Process
Seema Safi, Sajid Anwar, Lala Rukh
 Vol 5, No 2 (2012), Pagination: 251-256
ABSTRACT |  PDF Abstract Views: 158  |  PDF Views: 0
Review on Financial Forecasting using Neural Network and Data Mining Technique
Mehzabin Shaikh, Gyankamal J. Chhajed
 Vol 5, No 2 (2012), Pagination: 263-267
ABSTRACT |  PDF Abstract Views: 156  |  PDF Views: 0
A Review on Role of Information Technology in Business Management
A. Sreeram, D. R. P. Chandra Sekhar, S. R. Karumuri, Y. Srinivas, J. Vijayasekhar
 Vol 5, No 2 (2012), Pagination: 269-272
ABSTRACT |  PDF Abstract Views: 170  |  PDF Views: 0
Batch Installer Inoculation for Digital Repository Software Open Source DSpace
Bharat M. Chaudhari
 Vol 5, No 2 (2012), Pagination: 273-276
ABSTRACT |  PDF Abstract Views: 149  |  PDF Views: 0
Double-reflecting Data Perturbation Method for Information Security
Maram Balajee, Challa Narasimham
 Vol 5, No 2 (2012), Pagination: 283-288
ABSTRACT |  PDF Abstract Views: 152  |  PDF Views: 0
Impact of Information Technology in Various Sectors
A. Sreeram, Y. Srinivas, G. Ananda Rao, S. R. Karumuri, J. Vijayasekhar, R. Sampath Kumar
 Vol 5, No 2 (2012), Pagination: 289-294
ABSTRACT |  PDF Abstract Views: 136  |  PDF Views: 0
Service Oriented Architecture Integration
Suresh Krishnaraju, K. Subramani
 Vol 5, No 2 (2012), Pagination: 295-301
ABSTRACT |  PDF Abstract Views: 152  |  PDF Views: 0
Intelligent Fuzzy Analytic Hierarchy Processing Decision Support System-An Aid in Expert Analysis of Shoulder and Neck Pain Occupational Risk Factors
T. Padma, S. P. Shantharajah
 Vol 5, No 2 (2012), Pagination: 303-313
ABSTRACT |  PDF Abstract Views: 139  |  PDF Views: 0
SSL Based Transport Layer Security
J. Vijayabharathi
 Vol 5, No 2 (2012), Pagination: 315-320
ABSTRACT |  PDF Abstract Views: 149  |  PDF Views: 6
Secure Dynamic Data Aggregation Routing Protocol for Wireless Sensor Networks
Bhawana Mathur
 Vol 5, No 2 (2012), Pagination: 321-325
ABSTRACT |  PDF Abstract Views: 132  |  PDF Views: 0
Cloud Computing:Risks and Security Issues
Sucheta Arora
 Vol 5, No 2 (2012), Pagination: 327-332
ABSTRACT |  PDF Abstract Views: 119  |  PDF Views: 0