Vol 9, No 1 (2014)

Open Access Open Access  Restricted Access Subscription or Fee Access

Full Issue

View or download the full issue FULL PDF

Table of Contents

Articles

Location Aided Cluster Based Geographical Routing Protocol for Intermittently Connected MANET PDF
B. Muthusenthil, S. Murugavalli 1-8

Eliminating False Data and Improving Network Lifetime Using Mobile Data Collector in Wireless Sensor Networks PDF
M. K. Sandhya, K. Murugan 9-17

Non Cooperative Power Control Game with New Pricing for Wireless Ad Hoc Networks PDF
Sanjay Kumar Suman, Dhananjay Kumar, L. Bhagyalakshmi 18-28

Meta-Analysis of Ontology Software Development Process PDF
Marzanah A. Jabar, Mustafa S. Khalefa, Rusli Hj. Abdullah, Salfarina Abdullah 29-37

Cluster Based AODV Protocol to Minimizing the Route Rediscovery Process and to Improve the Lifetime of Network in MANET PDF
R. Senthil Kumar, C. Sureshkumar 38-47

An Efficient Autonomous Key Management with Verifiable Secret Sharing Schemes for Reduced Communication/Computation Costs in MANET PDF
M. Devi, S. Chenthur Pandian 48-53

An Optimized Inference of Pattern Recognition Using Fuzzy Ant Based Clustering Algorithm PDF
K. Sathesh Kumar, M. Hemalatha 54-63

Componentized Service Oriented Architectural Model for Power System Problems PDF
V. Gomathi, V. Ramachandran 64-73

Design and Modeling of SMA Architecture Using MaSE Methodologies PDF
R. Moussaoui, H. Medroumi, F. Moutaouakkil 74-79

Improved Parallel Pattern Growth Data Mining Algorithm PDF
P. Asha, T. Jebarajan 80-87

Innovative Features in Pathological Tissues Segmentation and Classification of MRI Brain Images with Aid of Back Propagation Neural Network PDF
J. C. Smitha, S. Suresh Babu 88-100

Services and Agents Based Mediation System Architecture (SAMED Architecture) PDF
T. Rachad, S. Elghazi, J. Boutahar 101-109

A Technique for Web Security Using Mutual Authentication and Clicking-Cropping Based Image Captcha Technology PDF
K. Suresh Kumar, T. Sasikala 110-118

An Efficient Secure Enhanced Routing Protocol for DDoS Attacks in MANET PDF
K. Rama Abirami, M. G. Sumithra, J. Rajasekaran 119-127

Soap Communication Model for Video on Demand PDF
R. Lavanya, V. Ramachandran 128-134

Web Mining: the Demystification of Multifarious Aspects PDF
M. Ambika, K. Latha 135-141

Image Processing on GPU: Application of Integral Image PDF
Marwa Chouchene, Fatma Sayadi 142-146

An Efficient Image Clustering and Content Based Image Retrieval Using Fuzzy K Means Clustering Algorithm PDF
K. Haridas, Antony Selvadoss Thanamani 147-153

CBIR Using Similarity Measure Analysis Based on Region Based Level Set Segmentation PDF
R. V. Rajesh, S. Arif Abdul Rahuman, J. Veerappan 154-160

Image Reconstruction via Classification Using Fourier Synthesis and Prior Information in Bayesian Analysis PDF
B. Mansouri, Z. Chama, A. M-Djafari 161-168

A Novel Approach for Face Recognition System Based on Rotational Invariant Transform and Artificial Neural Networks PDF
P. Kannan, R. Shantha Selva Kumari 169-177

Hybrid Feature Analysis for Assessment of Glaucoma Using RNFL Defects PDF
S. Karthikeyan, N. Rengarajan 178-187

A Modified Decision Tree Algorithm for Uncertain Data Classification PDF
S. Meenakshi, V. Venkatachalam 188-196

Test Data Compression Using Multiple Run Length Code Technique PDF
B. Manjurathi, R. Hari Kumar, P. Nirmal Kumar 197-202

A Multiplier-Less Lifting Scheme Based DWT Structure PDF
A. Akilandeswari 203-210

Erratum

Face Recognition Technique Based on Active Appearance Model (in: Vol. 8, n. 11, 2013)
Mohammed Hasan Abdulameer, Siti Nourl Sheikh Abdullah, Zulaiha Ali Othman 211




Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize