Volume 3 - Issue 1 (January 2014)

# Article Title
1 Development of a Web-Based Geographical Information System for Interactive Visualization and Analysis of Container Itineraries
Authors : Tatyana Dimitrova, Aris Tsois, Elena Camossi
2 Intrusion Detection Based on Information Entropy of Multiple Support Vector Machine
Author : Li Wei
3 Gender and Mobile Payment System Adoption among Students of Tertiary Institutions in Nigeria
Authors : Aminu Hamza, Asadullah Shah
4 Validity of Use of Various Concepts of Risk Management and Risk Engineering in Practice
Author : Dana Prochazkova
5 Synthesis of Moore FSM with Expanded Coding Space
Authors : Olena Hebda, Larysa Titarenko
6 Dynamic Scaling of Pipeline Depth: Power Analysis of a Floating-point Fused Multiply-Add Unit
Authors : Hunpil Kim, Yongsurk Lee, Sukhan Lee
7 Multi-Objective Vehicle Routing Problems with Time Windows: A Vector Evaluated Artificial Bee Colony Approach
Authors : Oren Efraim Nahum, Yuval Hadas, Uriel Spiegel
8 Noise Signal Identification by Modified Self-Organizing Maps
Authors : Thomas Bryant, Mohamed Zohdy
9 A Collaboration Index for Research Institutions
Authors : Tendani J. Lavhengwa, Eve M. Lavhengwa, Jacobus S. van der Walt
10 On the Feasible Sets of Products of bi-hypergraphs
Authors : Jihong Liu, Jingge Bai, Wenai Xu, Ping Zhao
11 The Role of Information Technology Centers in Improving Education: Analytical Study of Taibah University
Author : Qasem Nijem
12 Adaptive Phase Matching in Grover's algorithm with Weighted Targets
Authors : Shuyun Yang, Panchi Li
13 Mathematical Approximation of Delay in Voice over IP
Author : Mohammed M. Alani
14 Quantum-inspired Neural Networks with Applications
Authors : Maojun Cao, Panchi Li
15 A Robust Method for Recognizing Accents in Vietnamese Handwriting Characters
Authors : Trong-Nguyen Nguyen, Huu-Hung Huynh, Jean Meunier
16 Remote Asynchronous Testing: A Cost-Effective Alternative for Website Usability Evaluation
Authors : Rob Martin, Majed Al Shamari, Mohamed E.Seliaman, Pam Mayhew
17 MAC Protocols Security in Wireless Sensor Networks: A Survey
Authors : Ehsan Sharifi, Mohammadreza Khandan, Mahboobeh Shamsi
18 ‘Exceptions’ in Queuing Theory
Authors : Harpreet Singh, Muhammad Ghazie Ismail
19 Design and Implementation of Result Processing System for Public Secondary Schools in Nigeria
Authors : Ezenma A. Añulika, Emmanuel Bala, Choji D. Nyap
20 A Comparative Study between AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks using Network Simulator NS2
Author : Marwan Aziz Mohammed
21 Motivation for Trainee Teachers: Non-Computing Background Learn Action Script
Author : Erni Marlina Saari
22 Learning Time-based Rules for Prediction of Alarms from Telecom Alarm Data Using Ant Colony Optimization
Authors : Imran Khan, Joshua Z. Huang, Nguyen Thanh Tung
23 Video Indexing: A Survey
Authors : Muhammad Nabeel Asghar, Fiaz Hussain, Rob Manton
24 Integrity Modeling - A Study Among Malaysian Academic Management Officers
Authors : Azman Ta’a, Kamarul Faizal Hashim, Muhammad Shahbani Abu Bakar, Luthfi Mohd Radzi
25 Artificial Neural Networks Application to Predict Type of Pregnancy in Women Equal or Greater Than 35 Years of Age
Authors : Sedigheh Nouhjah, Sharareh R. Niakan Kalhori
26 Automated Quality Assurance System
Authors : Kshirsagar Aniruddha P., Balekar Swapnaja S., Rasal Swati A.