#
|
ID
|
Paper
Title
|
1
|
6
|
GIS-Based Decision Support System for
Criminal Tracking
|
2
|
67_1
|
Curvelet Transform For Fingerprint Classification
with Gentle Adaboost classifier
|
3
|
49_3
|
Utilizing CommonKADS
as Problem-Solving and Decision-Making for Supporting Dynamic Virtual
Organization Creation
|
4
|
49_1
|
Collaboration
Network Organization Grid-Cloud Convergence Architecture (CNOGCA) Based on
Open Grid Services Architecture
|
5
|
55
|
Intelligent
State-based XML Firewall
|
6
|
66
|
A GIS-Based DSS for Evacuation Planning
|
7
|
64
|
Three
Models Based Data Fusion Approach for the Segmentation of MR Images: A Study
and an Evaluation
|
8
|
63
|
BOA: A Novel Optimization Algorithm
|
9
|
9
|
A
Framework for Developing Cross-Browser Data Intensive Arabic Web Applications
|
10
|
54
|
Online Quality Control Using GigE Vision inspection system
|
11
|
52
|
Sparse Watermarking using Compressed Sensing
Framework with Application to MP3 Audio
|
12
|
31
|
LOW-COST, ROBUST AND ACCURATE GIS
VECTORIZATION MODEL FOR
QUAD-TREE SATELLITE IMAGES
|
13
|
58
|
Solving
The Singularity of Car Like Robot With Back Trailer
|
14
|
46
|
Novel
Sensitive Object-Oriented Cohesion Metric
|
15
|
53
|
Video
Copy Detection Schemes Based On Video Signature
|
16
|
51
|
Transforming
Business Patterns to Colored Petri Nets using Graph Grammars
|
17
|
50
|
Towards
Retail Market Recommendations using Termite Colony Optimization
|
18
|
48
|
Semantic
Derivation of Enterprise Information Architecture from Business Process
Architecture
|
19
|
45
|
Skyline Sets Queries from Databases with
Missing Values
|
20
|
32
|
SOFTWARE
TESTING SUITE PRIORITIZATION USING MULTI-CRITERION FITNESS FUNCTION
|
21
|
34
|
A
Non-Linear Model for Fingerprints Matching Based On Minutiae-Core Pairs
Interaction
|
22
|
37
|
Implementation
of Set Partitioning In Hierarchical Trees on Reconfigurable Hardware
|
23
|
36
|
Maximum
Power Battery Charging from PV System Microcontroller Based
|
24
|
12_1
|
Parameter Determination Of Support Vector
Machine Using Scatter Search Approach
|
25
|
27
|
A
hybrid method for user query reformation and classification
|
26
|
22_1
|
Breast Cancer Diagnosis on Three Different Datasets Using
Multi-Classifiers
|
27
|
6_2
|
Satellite Image Encryption Using Neural
Networks Backpropagation
|
28
|
10_2
|
Practical Methodology of Control and
Protection of Field Oriented Induction Machine Using Digital Signal
Processing
|
29
|
15
|
On Balance between Security and Performance for
LTE Wireless Networks
|
30
|
14
|
An Evaluation of Enterprise
Architecture Frameworks for E-Government
|
31
|
19
|
Comparison Between
Different Decoder Algorithms for Quasi Orthogonal Space Time Codes
|
32
|
8
|
A Steganographic
method based on DCT and new quantization technique
|
33
|
12_2
|
Utilizing Support Vector Machines in Mining
Online Customer Reviews
|
34
|
10_1
|
Simulation Aides in Comparison between
Different Methodology of Field Oriented Control of Induction Motor Based on
Flux and Speed Estimation
|
35
|
4
|
SCENE ANALYSIS UNDER CLOSED WORLD
ASSUMPTION
|
36
|
70
|
HPRDG : A Scalable Framework
Hypercube-P2P-based for Resource Discovery in Computational Grid
|
37
|
71
|
Bug Fix-Time Prediction Model Using Naïve Bayes Classifier
|
38
|
73
|
Fuzzy-Based Framework for Enterprise
Resource Planning System Selection
|
39
|
74
|
PA-SET: Privacy-Aware SET Protocol
|
40
|
75
|
LU
FACTORIZATION USING MULTITHREADED SYSTEM
|
41
|
76
|
SEMANTIC FORM BASED GUIDED SEARCH
SYSTEM
|
42
|
77
|
Cloud Intermediate Service for Secure
Electronic Medical Record Exchange
|