Open Access
Subscription or Fee Access
Full Issue
View or download the full issue | FULL PDF |
Table of Contents
Articles
Mining the Change of Customer Behavior in Fuzzy Time-Interval Sequential Patterns with Aid of Similarity Computation Index (SCI) and Genetic Algorithm (GA) | |
L. Mary Gladence, T. Ravi | 2552-2561 |
RFID Data Encoding Scheme in Supply Chain Management with Aid of Orthogonal Transformation and Genetic Algorithm (GA) | |
Maria Anu V., G. S. Anandha Mala | 2562-2569 |
Tree-Based Weighted Interesting Pattern Mining Approach for Human Interaction Pattern Discovery | |
S. Uma, J. Suguna | 2570-2575 |
FCM-FCS: Hybridization of Fractional Cuckoo Search with FCM for High Dimensional Data Clustering Process | |
Golda George, Latha Parthiban | 2576-2585 |
Hybrid Model Based Feature Selection Approach Using Kernel PCA for Large Datasets | |
J. Vandar Kuzhali, S. Vengataasalam | 2586-2592 |
Review on Software Metrics Thresholds for Object-Oriented Software | |
Abubakar D. Bakar, Abu Bakar Md. Sultan, Zulzalil H., Jamilah Din | 2593-2600 |
Managing Software Project Risks (Design Phase) with Proposed Fuzzy Regression Analysis Techniques with Fuzzy Concepts | |
Abdelrafe Elzamly, Burairah Hussin | 2601-2613 |
A Cluster Based Routing Protocol with Mobility Prediction for Mobile Sensor Networks | |
Sachin Paranjape, Mukul Sutaone | 2614-2623 |
Propose Approach for UDP Random and Sequential Scanning Detection Based on the Connection Failure Messages | |
Mohammed Anbar, Sureswaran Ramadass, Selvakumar Manickam, Alhamza Munther, Esraa Alomari | 2624-2627 |
Interlinking of Communication Protocols Through WAP Gateway Technologies Using Network Simulator | |
K. Muruganandam, V. Palanisamy | 2628-2633 |
Performance Analysis of Cross Layer Communication in Wireless Sensor Network to Improve Throughput and Utility Maximization | |
K. Kalai Kumar, E. Baburaj | 2634-2641 |
Sem-Rank: a Page Rank Algorithm Based on Semantic Relevancy for Efficient Web Search | |
V. Vijayadeepa, D. K. Ghosh | 2642-2647 |
A Study on Web Accessibility in Perspective of Evaluation Tools | |
B. Gohin, Viji Vinod | 2648-2654 |
Corporate e-Learning Environment Using Concept Maps: a Case Study | |
Nazeeh A. Ghatasheh, Anas R. Najdawi, Mua’ad M. Abu-Faraj, Hossam Faris | 2655-2662 |
New Discovery of P2P Botnets Attack Pattern within Host-and-Network Atmosphere | |
Raihana Syahirah Abdullah, M. A. Faizal, Zul Azri Muhamad Noh | 2663-2670 |
Framework for Secure Routing for Shielding the Multimedia Contents in P2P Network | |
Ramesh Shahabadkar, Ramachandra V. Pujeri | 2671-2684 |
An Image Denoising Algorithm Based on Modified Nonlinear Filtering | |
Yazeed A. Al-Sbou | 2685-2694 |
A Common Operator for Discrete Wavelet Transform and Viterbi Algorithm | |
V. Rajesh, V. Palanisamy | 2695-2703 |
Enhancement of Speech Signals Using Weighted Mask and Neuro-Fuzzy Classifier | |
Judith Justin, Ila Vennila | 2704-2717 |
Audio Transcoding Using Covered Compression Scheme on Heterogenous Compressed Domain | |
S. Vetrivel, G. Athisha | 2718-2726 |
A Robust Noise Detector for High Density Impulse Noise | |
S. V. Priya, R. Seshasayanan | 2727-2732 |
Face Recognition Technique Based on Active Appearance Model | |
Mohammed Hasan Abdulameer, Siti Nourl Sheikh Abdullah, Zulaiha Ali Othman | 2733-2739 |
Wavelet Based Image Fusion for Medical Applications | |
P. S. Gomathi, B. Kalaavathi | 2740-2745 |
An Incremental Clustering Technique to Privacy Preservation Over Incremental Cloud Data | |
S. Nikkath Bushra, A. Chandra Sekar | 2746-2754 |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize