Open Access
Subscription or Fee Access
Full Issue
View or download the full issue | FULL PDF |
Table of Contents
Articles
Learning Objects Retrieval Algorithm Using Semantic Annotation and New Matching Score | |
E. A. Vimal, S. Chandramathi | 2755-2764 |
An Efficient Technique for Frequent Item Set Mining in Time Series Data with Aid of AFCM | |
J. Mercy Geraldine, E. Kirubakaran | 2765-2772 |
Approximate Search in Very Large Files Using the Pigeonhole Principle | |
Maryam S. Yammahi, Chen Shen, Simon Berkovich | 2773-2783 |
A Comparative Analysis of Software Clone Management Techniques | |
E. Kodhai, S. Kanmani | 2784-2797 |
A New Ontological Approach to Build Projects Memories in Software Development Life Cycle. A Case Study of the Software Industry | |
Rabab Chakhmoune, Hicham Behja, Youssef Benghabrit, Abdelaziz Marzak | 2798-2804 |
A Requirements Engineering Process Assessment Model for Small Software Development Organization | |
Anurag Shrivastava, Surya Prakash Tripathi | 2805-2811 |
QoS Aware Vertical Handoff Decision for UMTS-WiMAX Networks | |
T. Nirmal Raj, R. M. Suresh | 2812-2820 |
Route Optimization Using Adaptive Shrink Mechanism for MANET | |
G. Mathiyalagan, Amitabh Wahi | 2821-2830 |
Performance Analysis of MAC Schemes in Wireless Sensor Networks | |
Revathi Venkataraman, M. Pushpalatha, K. Sornalakshmi | 2831-2836 |
Surrogate Object Based Mobile Transaction | |
S. Ravimaran, A. N. Gnana Jeevan | 2837-2848 |
Random Scheduling for Exploiting Throughput and TSMA Scheduling for Alleviating Interference in Wireless Systems | |
D. Rosy Salomi Victoria, S. Senthil Kumar | 2849-2858 |
Analysis and Improvement Design on P2P Botnets Detection Framework | |
Raihana Syahirah Abdullah, M. A. Faizal, Zul Azri Muhamad Noh, Robiah Yusof | 2859-2867 |
An Adaptive Iris Recognition System with Aid of Local Histogram and Optimized FFBNN-AAPSO | |
Nuzhat F. Shaikh, Dharmpal D. Doye | 2868-2879 |
New Automatic Clustering Method Based on the Dissemination of Binary Trees Applied to Video Segmentation | |
A. Chergui, W. Sabbar, A. Bekkhoucha | 2880-2891 |
Dead Sea Water Level and Surface Area Monitoring Using Spatial Data Extraction from Remote Sensing Images | |
Nazeeh A. Ghatasheh, Mua’ad M. Abu-Faraj, Hossam Faris | 2892-2897 |
3D Face Matching Based on Depth-Level Curves | |
Naouar Belghini, Arsalane Zarghili | 2898-2902 |
Efficient Multimodal Biometric System Based on Feature Level Fusion of Palmprint and Finger Vein | |
C. Murukesh, K. Thanushkodi | 2903-2908 |
An Analysis of Object Detection and Tracking Using Recursive and Non Recursive Algorithms for Motion Based Video | |
K. Thulasimani, K. G. Srinivasagan | 2909-2916 |
Automatic Feature Extraction Using Replica Based Approach in Digital Fundus Images | |
S. Padmalal, Babu C. Nelson Kennedy | 2917-2924 |
A Review of Biometric Template Protection Techniques for Online Handwritten Signature Application | |
Fahad Laythx Malallah, Sharifah Mumtazah Syed Ahmad, Salman Yussof, Wan Azizun Wan Adnan, Vahab Iranmanesh, Olasimbo A. Arigbabu | 2925-2933 |
Heuristic Search Attacks on Gradual Secret Release Protocol: a Cryptanalysis Approach on E-Learning Security | |
Jibulal B. Nair, Saurabh Mukherjee | 2934-2939 |
Developing an Effective and Compressed Hybrid Signcryption Technique Utilizing Huffman Text Coding Procedure | |
R. Sujatha, M. Ramakrishnan | 2940-2947 |
Efficient Elliptic Curve Cryptography Encryption Framework for Cloud Computing | |
Aws N. Jaber, Mohamad Fadli Bin Zolkipli | 2948-2952 |
Performance Evalution of CSTA Based Effective Transpiration in Data Hiding | |
R. Kalaiselvi, V. Kavitha | 2953-2958 |
Analysis Electroencephalogram Signals Using ANFIS and Periodogram Techniques | |
S. Elouaham, R. Latif, B. Nassiri, A. Dliou, M. Laaboubi, F. Maoulainine | 2959-2966 |
Optimized Fuzzy Min-Max Artificial Neural Network Got Cervical Cancer Application | |
Anas Mohammad Quteishat | 2967-2973 |
Watermarking of Medical Images with Optimized Biogeography | |
A. Umaamaheshvari, K. Prabhakaran, K. Thanushkodi | 2974-2984 |
Bi-Dimensional Zero Padding Angular Interpolation for Arc Handling in Computed Tomography Scanner | |
Ahmed Bacha, A. Oukebdanne, A. Belbachir | 2985-2991 |
Cross-Layer Based Energy Efficient Congestion Control Protocol for MANETs | |
R. Vinod Kumar, R. S. D. Wahidabanu | 2992-3001 |
Authorship Attribution in Tamil Language Email for Forensic Analysis | |
A. Pandian, Abdul Karim Sadiq | 3002-3008 |
Erratum
Study of Energy Efficient Protocols Using Data Aggregation in Wireless Sensor Network (in: Vol. 8, n. 10, 2013) | |
Nagendra Nath Giri, G. Mahadevan | 3009 |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize