Vol. 5, No. 1 February 2016
Table of Contents
Accepted Refereed Research Articles
Structured Analysis and Modeling of a Supervisory Control and Data Acquisition in a Thermal Power Plant | |
Najeh Lakhoua, Marwa Ben Hamouda, Raja Glaa, Lilia El Amraoui | 1-6 |
Software Development Lifecycle for Extreme Programming | |
Aroosa Hameed | 7-13 |
Signal Masking for Secure Communication based on Rikitake Chaotic Attractor | |
S. Magidi | 14-17 |
A Proposed Framework for High Speed Downlink Packet Access (HSDPA) as a turbo charger in Universal M | |
Syed Rizwan Ali, 2Azmat Khan, 3 Ghulam Muhammad, & 4 Shujaat Hussain Butt | 18-22 |
A Survey on Effects of Caching Strategies in Multi-Processors | |
1Hina Shafique, #2Fareeha Aftab, #3Aqsa Ruba Tariq, #4Maira Yousaf, #5Aiysha Anwar | 23-29 |
Autonomous Mobile Fire Detection System with Global Positioning System-Based Navigation | |
Anierobi C. Peter, Bolu Popoola, Olives U. Marvellous, Felix Okoh Olise, Gold Okiemute, Enenuvwedia Oghenetejiri, Otuvwievwiere O. Kelvin, Kekong James, Dr. Godswill Ofualagba, Dr. O’tega A. Ejofodomi | 30-34 |
Structured Analysis and Modeling of a Supervisory Control and Data Acquisition in a Thermal Power Plant | |
Najeh Lakhoua, Marwa Ben Hamouda, Raja Glaa, Lilia El Amraoui | 35-44 |
A Contemporary Overview and Applications of Artificial Intelligence | |
Ms.Saria Abbasi | 45-50 |