2nd International Conference on Computational and Network Technologies 2014

Previous Events

The 1st International Conference on Computational & Network Technologies was held in Adelaide, South Australia. The conference attracted numerous computer scientists from around the globe. The conference organized high quality technical lectures as well as refreshing breaks and tours.

The conference received numerous high quality manuscripts, which were published in a Special Issue of Journal of Computer Science. Manuscripts published in the Conference Proceedings are:

PERFORMANCE EVALUATION OF WORMHOLE SECURITY APPROACHES FOR AD-HOC NETWORKS
Ismail Hababeh, Issa Khalil, Abdallah Khreishah and Samir Bataineh

SERVICE ORIENTED ARCHITECTURE GOVERNANCE IMPLEMENTATION IN A SOFTWARE DEVELOPMENT PROJECT AS AN ENTERPRISE SOLUTIONS
Ryan Rahmansyah and Ford Lumban Gaol

THE ERROR REGISTRATION TECHNIQUE FOR MANEUVERING RADAR NETWORK
Liu Yu, Wang Haipeng, Xiong Wei and He You

ADAPTIVE RESOURCE CONTROL MECHANISM THROUGH REPUTATION-BASED SCHEDULING IN HETEROGENEOUS DISTRIBUTED SYSTEMS
Masnida Hussin and Rohaya Latip

A SURVEY: PARTICLE SWARM OPTIMIZATION-BASED ALGORITHMS FOR GRID COMPUTING SCHEDULING SYSTEMS
Faruku Umar Ambursa and Rohaya Latip

THE RATIONAL BEHIND THE SERVAL NETWORK LAYER FOR RESILIENT COMMUNICATIONS
Paul Gardner-Stephen, Andrew Bettison, Romana Challans and Jeremy Lakeman

IMPACT OF SOCIAL INFLUENCE ON INDIVIDUALS’ ADOPTION OF SOCIAL NETWORKS IN SMES
Majharul Talukder, Ali Quazi and Dede Djatikusumo

NEW TRACK-TO-TRACK CORRELATION ALGORITHMS BASED ON BITHRESHOLD IN A DISTRIBUTED MULTISENSOR INFORMATION FUSION SYSTEM
Liu Yu, Wang Haipeng, He You, Dong Kai and Xiao Chuwan

AN IN-DEPTH ANALYSIS ON INTEGRATING CAMPUS RADIO FREQUENCY IDENTIFICATION SYSTEM ON CLOUDS FOR ENHANCING SECURITY
Zainab Rasheed Mirza and Muhammad Nawaz Brohi

OBJECTIONABLE IMAGE DETECTION IN CLOUD COMPUTING PARADIGM-A REVIEW
Rashed Mustafa and Dingju Zhu

EFFECTIVE BLACK HOLE ATTACKS IN MANETS
Raja Azlina Raja Mahmood, Zurina Mohd Hanapi, Sazlinah Hasan and Asad Iqbal Khan

SMART TRAVELLING WITH RADIO FREQUENCY IDENTIFICATION
Zainab Rasheed Fahad Mirza and Muhammad Nawaz Brohi

M-ARRAY QUADRATURE AMPLITUDE MODULATION WIRELESS SENSOR NETWORK MODULATOR RELIABILITY AND ACCURACY ANALYZE IN CIVIL SHM
Mohammud Ershadul Haque, Mohammud Fauzi Mohammud Zain, Maslina Jamil, Mohammud Abdul

A NOVEL HYBRID NODE LOCALIZATION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Liu Yu, Wang Haipeng, He You and Shen Jian

DEVELOPMENT OF A FUZZY-SIMULATION MODEL OF SCHEDULING ROBOTIC FLEXIBLE ASSEMBLY CELLS
Khalid Abd, Kazem Abhary and Romeo Marian

APPLICATION OF A FUZZY-SIMULATION MODEL OF SCHEDULING ROBOTIC FLEXIBLE ASSEMBLY CELLS
Khalid Abd, Kazem Abhary and Romeo Marian

A NOVEL OPTIMIZATION MODEL FOR SIMULTANEOUS COST-RISK REDUCTION IN MULTI-SUPPLIERS JUST-IN-TIME SYSTEMS
Faraj El Dabee, Romeo Marian and Yousef Amer

TEXT SIGNAGE RECOGNITION IN ANDROID MOBILE DEVICES
Oi-Mean Foong, Suziah Sulaiman and Kiing Kiu Ling

DEVELOPMENT OF A PROXIMAL MACHINE VISION SYSTEM FOR OFF-SEASON WEED MAPPING IN BROADACRE NO-TILLAGE FALLOWS
H. Liu, C. Saunders and S. H. Lee

STRUCTURAL AND OPERATIONAL COMPLEXITY OF MANUAL ASSEMBLY SYSTEMS
Atiya Al-Zuheri

OPTIMIZATION OF MULTI-COMMODITIES CONSUMER SUPPLY CHAINS FOR-PART I-MODELING
Zeinab Haji Abolhasani, Romeo M. Marian and Lee Loung

INFORMATION TECHNOLOGY STRATEGIC PLANNING AT PT. VENTURIUM SYSTEM
Lola Oktavia and Ford Lumban Gaol



Testimonials

The ICCNT 2013 was a perfect event that enabled us to discuss in the areas of Computer Security and Networks. I appreciate the great efforts from the conference organizer and I am looking forward to attend ICCNT 2014.

Dr. Ford L Gaol, Binus University