Open Access
Subscription or Fee Access
Full Issue
View or download the full issue | FULL PDF |
Table of Contents
Articles
Entropy Based Approach to Prevent the DDoS Attacks for Secured Web Services | |
S. Igni Sabasti Prabu, V. Jawahar Senthil Kumar | 888-891 |
Dynamic Extended Rectangle Based Method for 3D Visual Scene Segmentation | |
N. Charara, M. Sokhn, I. Jarkass, O. Abou Khaled, E. Mugellini | 892-899 |
Enhancement of Game Theoretic Approach Using Nash Equilibrium with Markov Chains for VANET Security | |
M. Prabakaran, A. R. Deepti, G. Mahadevan, R. M. S. Parvathy | 900-903 |
A Novel Approach for Hiding Image Using Pixel Intensity | |
M. Shobana, P. Gitanjali, M. Rajesh, R. Manikandan | 904-908 |
An Optimal Architecture for Dynamic Web Service Discovery and Selection | |
Abdallah Missaoui | 909-914 |
The Implementation of Plagiarism Detection System in Health Sciences Publications in Arabic and English Languages | |
K. Omar, B. AlKhatib, M. Dashash | 915-919 |
Sensitive Information Protection and Recovery Using One to One Compound Mapping | |
N. V. Chaithanya Kumar Reddy, Diwakar R. Marur, Vidhyacharan Bhaskar | 920-926 |
Review of Methods of Distributed Barrier Synchronization of Parallel Processes in Matrix VLSI Systems | |
Jamil S. Al-Azzeh | 927-932 |
Classification of Ultrasound Carotid Artery Images Using Texture Features | |
S. Dhanalakshmi, C. Venkatesh | 933-940 |
Fuzzy Based Congestion Detection Technique for Queuing in IP Networks | |
S. Nandhini, S. Palaniammal | 941-948 |
Combining UML Class and Activity Diagrams for MDA Generation of MVC 2 Web Applications | |
M'hamed Rahmouni, Samir Mbarki | 949-957 |
Digital Image Watermarking and Encryption Using DWT and RSA | |
Omar Alirr, Kasmiran Jumari | 958-963 |
Study on Multi-Agent Q Learning Based on Prediction | |
Ya Xie | 964-969 |
Optimization of Processor Architecture for Sobel Real-Time Edge Detection Using FPGA | |
Fawnizu Azmadi Hussin, Zahraa E. M. Osman, Likun Xia, Noohul Basheer Zain Ali | 970-982 |
Aspect-Oriented Modeling Approaches and Aspect Code Generation | |
Abid Mehmood, Dayang N. A. Jawawi | 983-995 |
Achieving Energy Efficient MAC Protocol for MANETs by Channel Utilization and Queue Size | |
P. Sivanesan, S. Thangavel | 996-1003 |
Image Compression Based on Crucial Region for Radiographic Weldment Images | |
V. Vaithiyanathan, B. Karthikeyan, B. Venkatraman | 1004-1011 |
Energy Based Efficiency Evaluation of Cluster and Tree Based Routing Protocols for Wireless Sensor Networks | |
M. Faheem, Zia Ud Din, M. A. Shahid, S. Ali, B. Raza, L. Sakar | 1012-1022 |
A Wavelet Based Scheme for Video Watermarking | |
Sundararajan Madhavan, Yamuna Govindarajan | 1023-1032 |
Signature Analyzer Block for Secure Node Entry | |
C. Navaneethan, K. Helen Prabha | 1033-1036 |
Swarm Based Topology Control for Fault Tolerance in MANET | |
D. Manohari, G. S. Anandha Mala | 1037-1044 |
A Bayesian Classification Approach for Handling Uncertainty in Adaptive E-Assessment | |
V. Geetha, D. Chandrakala, R. Nadarajan, C. K. Dass | 1045-1052 |
A Technique to Mine the Multi-Relational Patterns Using Relational Tree and a Tree Pattern Mining Algorithm | |
M. Ravi Sankar, P. Prem Chand | 1053-1061 |
Erratum
Automatic Jet Area during Mitral Regurgitation | |
Kalpana Saini, M. L. Dewal, Manojkumar Rohit | 1062 |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize