Vol 8, No 12 (2013)

Open Access Open Access  Restricted Access Subscription or Fee Access

Full Issue

View or download the full issue FULL PDF

Table of Contents

Articles

Learning Objects Retrieval Algorithm Using Semantic Annotation and New Matching Score PDF
E. A. Vimal, S. Chandramathi 2755-2764

An Efficient Technique for Frequent Item Set Mining in Time Series Data with Aid of AFCM PDF
J. Mercy Geraldine, E. Kirubakaran 2765-2772

Approximate Search in Very Large Files Using the Pigeonhole Principle PDF
Maryam S. Yammahi, Chen Shen, Simon Berkovich 2773-2783

A Comparative Analysis of Software Clone Management Techniques PDF
E. Kodhai, S. Kanmani 2784-2797

A New Ontological Approach to Build Projects Memories in Software Development Life Cycle. A Case Study of the Software Industry PDF
Rabab Chakhmoune, Hicham Behja, Youssef Benghabrit, Abdelaziz Marzak 2798-2804

A Requirements Engineering Process Assessment Model for Small Software Development Organization PDF
Anurag Shrivastava, Surya Prakash Tripathi 2805-2811

QoS Aware Vertical Handoff Decision for UMTS-WiMAX Networks PDF
T. Nirmal Raj, R. M. Suresh 2812-2820

Route Optimization Using Adaptive Shrink Mechanism for MANET PDF
G. Mathiyalagan, Amitabh Wahi 2821-2830

Performance Analysis of MAC Schemes in Wireless Sensor Networks PDF
Revathi Venkataraman, M. Pushpalatha, K. Sornalakshmi 2831-2836

Surrogate Object Based Mobile Transaction PDF
S. Ravimaran, A. N. Gnana Jeevan 2837-2848

Random Scheduling for Exploiting Throughput and TSMA Scheduling for Alleviating Interference in Wireless Systems PDF
D. Rosy Salomi Victoria, S. Senthil Kumar 2849-2858

Analysis and Improvement Design on P2P Botnets Detection Framework PDF
Raihana Syahirah Abdullah, M. A. Faizal, Zul Azri Muhamad Noh, Robiah Yusof 2859-2867

An Adaptive Iris Recognition System with Aid of Local Histogram and Optimized FFBNN-AAPSO PDF
Nuzhat F. Shaikh, Dharmpal D. Doye 2868-2879

New Automatic Clustering Method Based on the Dissemination of Binary Trees Applied to Video Segmentation PDF
A. Chergui, W. Sabbar, A. Bekkhoucha 2880-2891

Dead Sea Water Level and Surface Area Monitoring Using Spatial Data Extraction from Remote Sensing Images PDF
Nazeeh A. Ghatasheh, Mua’ad M. Abu-Faraj, Hossam Faris 2892-2897

3D Face Matching Based on Depth-Level Curves PDF
Naouar Belghini, Arsalane Zarghili 2898-2902

Efficient Multimodal Biometric System Based on Feature Level Fusion of Palmprint and Finger Vein PDF
C. Murukesh, K. Thanushkodi 2903-2908

An Analysis of Object Detection and Tracking Using Recursive and Non Recursive Algorithms for Motion Based Video PDF
K. Thulasimani, K. G. Srinivasagan 2909-2916

Automatic Feature Extraction Using Replica Based Approach in Digital Fundus Images PDF
S. Padmalal, Babu C. Nelson Kennedy 2917-2924

A Review of Biometric Template Protection Techniques for Online Handwritten Signature Application PDF
Fahad Laythx Malallah, Sharifah Mumtazah Syed Ahmad, Salman Yussof, Wan Azizun Wan Adnan, Vahab Iranmanesh, Olasimbo A. Arigbabu 2925-2933

Heuristic Search Attacks on Gradual Secret Release Protocol: a Cryptanalysis Approach on E-Learning Security PDF
Jibulal B. Nair, Saurabh Mukherjee 2934-2939

Developing an Effective and Compressed Hybrid Signcryption Technique Utilizing Huffman Text Coding Procedure PDF
R. Sujatha, M. Ramakrishnan 2940-2947

Efficient Elliptic Curve Cryptography Encryption Framework for Cloud Computing PDF
Aws N. Jaber, Mohamad Fadli Bin Zolkipli 2948-2952

Performance Evalution of CSTA Based Effective Transpiration in Data Hiding PDF
R. Kalaiselvi, V. Kavitha 2953-2958

Analysis Electroencephalogram Signals Using ANFIS and Periodogram Techniques PDF
S. Elouaham, R. Latif, B. Nassiri, A. Dliou, M. Laaboubi, F. Maoulainine 2959-2966

Optimized Fuzzy Min-Max Artificial Neural Network Got Cervical Cancer Application PDF
Anas Mohammad Quteishat 2967-2973

Watermarking of Medical Images with Optimized Biogeography PDF
A. Umaamaheshvari, K. Prabhakaran, K. Thanushkodi 2974-2984

Bi-Dimensional Zero Padding Angular Interpolation for Arc Handling in Computed Tomography Scanner PDF
Ahmed Bacha, A. Oukebdanne, A. Belbachir 2985-2991

Cross-Layer Based Energy Efficient Congestion Control Protocol for MANETs PDF
R. Vinod Kumar, R. S. D. Wahidabanu 2992-3001

Authorship Attribution in Tamil Language Email for Forensic Analysis PDF
A. Pandian, Abdul Karim Sadiq 3002-3008

Erratum

Study of Energy Efficient Protocols Using Data Aggregation in Wireless Sensor Network (in: Vol. 8, n. 10, 2013)
Nagendra Nath Giri, G. Mahadevan 3009




Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize