Mục lục
Bridging Creativity and Group by Elements of Problem-Based Learning (PBL).- Password Recovery Using Graphical Method.- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA.- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources.- A study on changes of supervision model in universities and fostering creative Ph.D. students in China.- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis.- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation.- Can Single- Sign-On Improve Password Management? A Focus Group Study.- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review.- Finding the Effectiveness of Software Team Members Using Decision Tree.- Data Completeness Measures.- Cloud Computing: A General User’s Perception and Security Awareness in Malaysian Polytechnic.- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan.- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values.- The Impact of Knowledge Management in Pair Programming on Program Quality.- Social Networks Event Mining: A Systematic Literature Review.- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature.- Social Networks Content Analysis for Peacebuilding Application.- Tree-base Structure for Feature Selection in Writer Identification.- Factors That Affecting The Effective Online Collaborative Learning Environment.- Comparing Features Extraction Methods for Person Authentication using EEG Signals.- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification.-Risk assessment for Grid computing using Meta learning Ensembles.- Modeling Cloud Computing Risk Assessment Using Ensemble Methods.- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites.- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings.- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves.- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory.- Category-based Graphical User Authentication (CGUA) Scheme for Web Application.- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves.- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment.- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.