Open Access
Subscription or Fee Access
Full Issue
View or download the full issue | FULL PDF |
Table of Contents
Articles
Location Aided Cluster Based Geographical Routing Protocol for Intermittently Connected MANET | |
B. Muthusenthil, S. Murugavalli | 1-8 |
Eliminating False Data and Improving Network Lifetime Using Mobile Data Collector in Wireless Sensor Networks | |
M. K. Sandhya, K. Murugan | 9-17 |
Non Cooperative Power Control Game with New Pricing for Wireless Ad Hoc Networks | |
Sanjay Kumar Suman, Dhananjay Kumar, L. Bhagyalakshmi | 18-28 |
Meta-Analysis of Ontology Software Development Process | |
Marzanah A. Jabar, Mustafa S. Khalefa, Rusli Hj. Abdullah, Salfarina Abdullah | 29-37 |
Cluster Based AODV Protocol to Minimizing the Route Rediscovery Process and to Improve the Lifetime of Network in MANET | |
R. Senthil Kumar, C. Sureshkumar | 38-47 |
An Efficient Autonomous Key Management with Verifiable Secret Sharing Schemes for Reduced Communication/Computation Costs in MANET | |
M. Devi, S. Chenthur Pandian | 48-53 |
An Optimized Inference of Pattern Recognition Using Fuzzy Ant Based Clustering Algorithm | |
K. Sathesh Kumar, M. Hemalatha | 54-63 |
Componentized Service Oriented Architectural Model for Power System Problems | |
V. Gomathi, V. Ramachandran | 64-73 |
Design and Modeling of SMA Architecture Using MaSE Methodologies | |
R. Moussaoui, H. Medroumi, F. Moutaouakkil | 74-79 |
Improved Parallel Pattern Growth Data Mining Algorithm | |
P. Asha, T. Jebarajan | 80-87 |
Innovative Features in Pathological Tissues Segmentation and Classification of MRI Brain Images with Aid of Back Propagation Neural Network | |
J. C. Smitha, S. Suresh Babu | 88-100 |
Services and Agents Based Mediation System Architecture (SAMED Architecture) | |
T. Rachad, S. Elghazi, J. Boutahar | 101-109 |
A Technique for Web Security Using Mutual Authentication and Clicking-Cropping Based Image Captcha Technology | |
K. Suresh Kumar, T. Sasikala | 110-118 |
An Efficient Secure Enhanced Routing Protocol for DDoS Attacks in MANET | |
K. Rama Abirami, M. G. Sumithra, J. Rajasekaran | 119-127 |
Soap Communication Model for Video on Demand | |
R. Lavanya, V. Ramachandran | 128-134 |
Web Mining: the Demystification of Multifarious Aspects | |
M. Ambika, K. Latha | 135-141 |
Image Processing on GPU: Application of Integral Image | |
Marwa Chouchene, Fatma Sayadi | 142-146 |
An Efficient Image Clustering and Content Based Image Retrieval Using Fuzzy K Means Clustering Algorithm | |
K. Haridas, Antony Selvadoss Thanamani | 147-153 |
CBIR Using Similarity Measure Analysis Based on Region Based Level Set Segmentation | |
R. V. Rajesh, S. Arif Abdul Rahuman, J. Veerappan | 154-160 |
Image Reconstruction via Classification Using Fourier Synthesis and Prior Information in Bayesian Analysis | |
B. Mansouri, Z. Chama, A. M-Djafari | 161-168 |
A Novel Approach for Face Recognition System Based on Rotational Invariant Transform and Artificial Neural Networks | |
P. Kannan, R. Shantha Selva Kumari | 169-177 |
Hybrid Feature Analysis for Assessment of Glaucoma Using RNFL Defects | |
S. Karthikeyan, N. Rengarajan | 178-187 |
A Modified Decision Tree Algorithm for Uncertain Data Classification | |
S. Meenakshi, V. Venkatachalam | 188-196 |
Test Data Compression Using Multiple Run Length Code Technique | |
B. Manjurathi, R. Hari Kumar, P. Nirmal Kumar | 197-202 |
A Multiplier-Less Lifting Scheme Based DWT Structure | |
A. Akilandeswari | 203-210 |
Erratum
Face Recognition Technique Based on Active Appearance Model (in: Vol. 8, n. 11, 2013) | |
Mohammed Hasan Abdulameer, Siti Nourl Sheikh Abdullah, Zulaiha Ali Othman | 211 |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize