Vol. 2 (2012) No. 5

Articles

SEIR Model for Transmission of Dengue Fever

Syafruddin Side, M. S. M. Noorani
pages: 341-345   Full text   DOI:10.18517/ijaseit.2.5.217

Inclined Magnetic Field Effects on Chaotic Convection for Moderate Prandtl Number

J.M. Jawdat, I. Hashim
pages: 346-349   Full text   DOI:10.18517/ijaseit.2.5.220

Statistical Modelling of CO2 Emissions in Malaysia and Thailand

Tay Sze Hui, Shapiee Abd Rahman, Jane Labadin
pages: 350-355   Full text   DOI:10.18517/ijaseit.2.5.221

Certain Subclasses of Analytic and Bi-Univalent Functions Involving Double Zeta Functions

Saibah Siregar, Sintuja Raman
pages: 356-358   Full text   DOI:10.18517/ijaseit.2.5.222

Subclass of Harmonic Univalent Functions Associated with Generalized Derivative Operator

Ebtisam Eljamal, M. Darus
pages: 359-362   Full text   DOI:10.18517/ijaseit.2.5.223

New Properties for Certain Generalized Ces“aro Integral Operator

Aisha Ahmed Amer, Maslina Darus
pages: 363-366   Full text   DOI:10.18517/ijaseit.2.5.224

Stability and Accuracy of Exponential Extrapolation Method

Asma A. Elbeleze, Bachok M. Taib
pages: 367-369   Full text   DOI:10.18517/ijaseit.2.5.225

A Review on Quantitative Approaches for Dock Door Assignment in Cross-Docking

Adibah Shuib, Wan Nor Ashikin Wan Ahmad Fatthi
pages: 370-374   Full text   DOI:10.18517/ijaseit.2.5.226

Assessing Right Amount of Quality Assurance (QA) for Software Products. "A Quality Assurances for Developing Software Projects"

Murtaza Hussain Shaikh, Mir Sajjad Hussain Talpur
pages: 375-378   Full text   DOI:10.18517/ijaseit.2.5.227

In Silico Analysis of Oncogenes for Renal Cancer

Sim-Hui Tee, Siew-Kien Mah
pages: 379-382   Full text   DOI:10.18517/ijaseit.2.5.228

Computational Analysis of PTEN Gene Mutation

Siew-Kien Mah, Sim-Hui Tee
pages: 383-386   Full text   DOI:10.18517/ijaseit.2.5.229

Securing the Application Layer in eCommerce

Bala Musa S, Norita Md Norwawi, Mohd Hasan Selamat
pages: 387-390   Full text   DOI:10.18517/ijaseit.2.5.230

Performance of Parallel Concatenated Convolutional Codes (PCCC) with BPSK in Nakagami Multipath M-Fading Channel

Mohamed Abd El-latif, Alaa El-Din Sayed Hafez, Sami H. Darwish
pages: 391-396   Full text   DOI:10.18517/ijaseit.2.5.231

Ancillary Resistor leads to Sparse Glitches: an Extra Approach to Avert Hacker using Syndicate Browser Design

Devaki Pendlimarri, Paul Bharath Bhushan Petlu
pages: 397-400   Full text   DOI:10.18517/ijaseit.2.5.232

Incorporating Prioritized User Preferences in Search System

Mashal Alqudah, Yuhanis Yusof, Shahrul Azman Mohd Noah, Alaa Almabhouh
pages: 401-404   Full text   DOI:10.18517/ijaseit.2.5.233

An Empirical Evaluation of BFS, and DFS Search Algorithms on J2ME Platform, and SVG Tiny Parsing on J2ME Platform Using SAX, StAX, and DOM Parsers

Venera Sengirova, Aidana Oralbekova, Nathar Shah
pages: 405-410   Full text   DOI:10.18517/ijaseit.2.5.234