

Full Issue
View or download the full issue |
FULL PDF
![]() |
Table of Contents
Articles
Segmentation of Cerebrospinal Fluid and Internal Brain Nuclei in Brain Magnetic Resonance Images |
PDF
![]() |
D. Selvaraj, R. Dhanasekaran | 1063-1071 |
Intrusion Detection System Using Artificial Immune System and New Multi Core Technology |
PDF
![]() |
Anas Bakla, Rand El-Koutly | 1072-1075 |
Clustering Network Traffic Utilization |
PDF
![]() |
Nazli Mohd. Khairudin, Zaiton Muda, Aida Mustapha, Yogeswaran Nagarathinam, Mohd. Sidek Salleh | 1076-1081 |
Genetic Algorithm Based Optimization of Vertical Links for Efficient 3D NoC Multicore Crypto Processor |
PDF
![]() |
A. Vino Vilmet Rose, R. Seshasayanan | 1082-1090 |
Timeout Misbehavior Detection Algorithm: a Novel Method for the Detection of MANET Misbehavior |
PDF
![]() |
R. Kalaiarasi, D. Sridharan | 1091-1096 |
An Efficient Iterative Modulo Scheduling Approach for Improved Resource Allocation for Effective Multimedia Communication on Grid Computing Environment |
PDF
![]() |
G. Saravanan, V. Gopalakrishanan | 1097-1107 |
Comparison of TCP Variants in Wired-Cum-Wireless Environment |
PDF
![]() |
Nitin Jain, Neelam Srivastava | 1108-1110 |
Queuing Mechanism in Migrating Workflow System Based on Cloud Computing Paradigm (MWfSCC) |
PDF
![]() |
Wu Xiuguo | 1111-1119 |
Experimental Evaluation of T-Learning Applications Usability |
PDF
![]() |
Vladimír Bureš, Jaroslava Mikulecká, Daniela Ponce, Tereza Otčenášková | 1120-1125 |
Intelligent Agent for Extracting Interesting Information Using Mining Algorithm |
PDF
![]() |
M. Vinoth Kumar, G. Tholkappia Arasu | 1126-1134 |
Main Types of Peer-to-Peer Live Video Streaming Topologies and their Data Delivery Mechanism |
PDF
![]() |
Ammar Waysi AlTuhafi, Raja Kumar Murugesan, Sureswaran Ramadas | 1135-1140 |
Dynamic Traffic Energy Efficient Topology Based Routing Protocol for Wireless Ad Hoc Sensor Networks |
PDF
![]() |
N. Thangadurai, R. Dhanasekaran, R. D. Karthika | 1141-1148 |
Priority Based Fault Tolerant Technique for Wireless Body Area Networks (WBANs) |
PDF
![]() |
K. T. Meena Abarna, K. Venkatachalapathy | 1149-1155 |
Probabilistic Key Chain Based Key Distribution Schemes for WSN |
PDF
![]() |
T. Kavitha, D. Sridharan | 1156-1169 |
Evaluation of WSN Hierarchical Routing Protocols According to Energy Efficiency Heterogeneity Levels |
PDF
![]() |
Ahmad Al-Hilal, Salah Dowaji | 1170-1179 |
Low Complexity, High Throughput Layered FFT Structure for BI Based COFDM Systems |
PDF
![]() |
T. Deepa, R. Kumar | 1180-1185 |
Optimal Software Architecture Design Based on Responsibilities Using Adaptive Genetic Algorithm |
PDF
![]() |
M. Sunil Kumar, A. Rama Mohan Reddy | 1186-1194 |
Network Intrusion Detection System Based on Negative Selection Algorithm Reinforced by Danger Theory |
PDF
![]() |
Younes Chihab, Abdellah Ait Ouahman, Omar Bencharef | 1195-1198 |
The Coverage Analysis of Hierarchical Networks with Specified Reliability Indices |
PDF
![]() |
Fares A. H. AL-hadsha, Sergey V. Gaevoy, Viktor S. Luk’yanov | 1199-1202 |
Multivariate Gaussian Mean Distributed Network Topology for Energy Efficient Communication in Wireless Sensor Networks |
PDF
![]() |
T. Shankar, S. Shanmugavel, A. Karthikeyan, Arshad Nadeem | 1203-1208 |
Study of Personalization in E-Learning |
PDF
![]() |
V. Senthil Kumaran, A. Sankar | 1209-1217 |
An Efficient Machine Learning Approach for Screening of COPD Lung Disease |
PDF
![]() |
K. Meenakshi Sundaram, C. S. Ravichandran | 1218-1226 |
Erratum
Fuzzy Based Congestion Detection Technique for Queuing in IP Networks (in: Vol. 8, n. 4, 2013) |
![]() |
S. Nandhini, S. Palaniammal | 1227 |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2023 Praise Worthy Prize