ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Proceeding

The Second International Conference on e-Technologies and Networks for Development (ICeND)

Publisher: The Society of Digital Information and Wireless Communication

Editors:

ISBN: 978-0-9853483-6-6

Date: 2013-3-4 - 2013-03-06

Conference Venue: Kuala Lumpur, Malaysia Malaysia

Proceeding URL: http://sdiwc.net/conferences/2013/Malaysia2external

  1. How Is Quantum Cryptography Used For Secure Financial Transactions?

    Authors: Sanwar Ali, Waleed Farag

  2. A Comparative Study of Classical And Quantum Cryptography Approaches: Review And Critical Analysis

    Authors: Ruwayda Q. Alharbi, Soha S. Zaghloul

  3. Understanding Teacher Identity Through The Use Of EPortfolios With Pre-Service Teachers

    Authors: Mingming Zhou, Stefanie Chye, Caroline Koh, Liu Woon Chia

  4. A Proposed Virtual Learning Environment (VLE) For Isabela State University (ISU)

    Authors: Irma T. Plata

  5. A Review On The Success Factors Of Learning

    Authors: Nadia Parsazadeh, Rosmah Ali, Norziha Megat Mohd Zainuddin, Amirshahram Hematian

  6. Exponential Random Graph Modeling for Micro-blog Network Analysis

    Authors: Dong-Hui Yang, Guang Yu

  7. Personalized Media Recommendation Algorithm Based On Smart Home

    Authors: Yuqing Feng, Ruichun Tang, Yili Zhai, Xiao Feng

  8. Short-Term Use Of Cell Phones Has No Significant Effect On The Salivary Oxidant/Antioxidant Profile

    Authors: Ahmad M Khalil, Khalid M Abu Khadra, Ahmad M Aljaberi, Marwan H Gagaa, Hamzah S Issa

  9. Performance Evaluation Of Enhanced Routing Discovery Under Different Mobility Models In MANETs

    Authors: Abdalla M. Hanashi, Irfan Awan

  10. Fault Tolerance Models In Ad Hoc Wireless Sensor Networks

    Authors: Maram Al-Shablan, Soha S. Zaghloul

  11. A Hierarchical-Cellular Fault Management Scheme For Ad Hoc Wireless Sensor Networks

    Authors: Soha S. Zaghloul

  12. A Survey on Security Solutions In Wireless Sensor Networks

    Authors: Hind Annahidh, Soha S. Zaghloul

  13. Environmental Monitoring And Data Collection System With Mobile Devices

    Authors: Yukihiro Daidai, Masahito Shiba

  14. An Integrated Intelligent Fuzzy System for Data Mining

    Authors: Do-Thanh Sang, Dong-Min Woo

  15. Behavioral Segmentation For Web Searching Users Using Self-Organizing Kohonen Maps

    Authors: Rawan Ghnemat, Ruba Zaghari, Jalal Atoum

  16. MMO Front-End And Back-End Databases For Small Game Developers

    Authors: John Matthews, Mudasser F. Wyne

  17. World-altering Features Of Semantic Web Service Description Languages

    Authors: Hadi Saboohi, Sameem Abdul Kareem, Gholamreza Ahakian

  18. GlobalAd: Online On-Demand Advertising Techniques

    Authors: Vitesh Shah, Satoshi Takahashi, Tokuro Matsuo, Roger Lee

  19. A Skype ML Datasets Validation and Detection Mechanism Using Machine Learning Approach

    Authors: Hamza Awad Elkarim Hamza Ibrahim, Sulaiman Mohd Nor, Izzeldin Ibrahim Mohamed Abdelaziz

  20. Battle For Online Freedom Of Speech-Identity: Authenticity Or Anonymity

    Authors: Lasa Sun

  21. Enhanced IDEA Algorithm For Strong Encryption Based On Efficient Strong Rotor Banks

    Authors: H. Elkamchouchi, Fatma Ahmed

  22. A New Gaussian Cipher With Optimal Keyed Process (KAM-FA)

    Authors: H. Elkamchouchi, Fatma Ahmed

  23. End-to-End Architecture For E-Commerce Security

    Authors: Houssam El Ismaili, Hanane Houmani, Adil Lebbat

  24. Generic Heuristics Encoding And Phylogenies

    Authors: Chadi Kallab

  25. Decision Making Principle From The Perspective Of Possibilistic Theory

    Authors: Nureize Arbaiy

  26. An Injury Recognition Model Using Single Rotatable Infrared Sensor

    Authors: Ong Chin Ann, Lau Bee Theng, Hamid Bagha

  27. Implementing Stochastic Gradient Descent Based On Historical Network Distance For Available Bandwidth

    Authors: Lim Su Jin, Lim Boon Ping, Lee Sze Wei, Simon Lau, Ettikan Karuppiah, Shahirina Mohd Tahir