Vol 10, No 2 (2015)

Open Access Open Access  Restricted Access Subscription or Fee Access

Full Issue

View or download the full issue FULL PDF

Table of Contents


A Robust Routing Protocol for Ad Hoc Vehicular Networks PDF
K. Raghava Rao, Pandula Chandra Mouli 112-119

SLGAS: Supervised Learning Using Gain Ratio as Attribute Selection Measure to Nowcast Snow/No-Snow PDF
C. Kishor Kumar Reddy, C. H. Rupa, B. Vijaya Babu 120-129

An Efficient Framework for Enhancing User Authentication in Cloud Storage Using Digital Watermark PDF
Abderrahim Abdellaoui, Younes Idrissi Khamlichi, Habiba Chaoui 130-136

An Approach for Text Steganography: Generating Tamil Text Summary Using Tamil Phonetics PDF
K. Manimozhi, V. Kalaichelvi, M. Poornima, A. Sumathi 137-143

An Information Dispersal Algorithm Based Technique for Backup of Data in Cloud Data Centers PDF
Sakshi Goyal, Makhan Singh, Sarbjeet Singh 144-156

A Subpel Motion Vector Estimation for Embedded Video Encoder PDF
Wissal Hassen, Hamid Amiri 157-163

Intelligent Coordinator Selection Mechanism (ICSM) for IEEE802.15.4 Beacon-Enabled MAC Protocol in Mobile Wireless Sensor Networks PDF
Kartinah Zen, Muhammad Javed, Halikul Bin Lenando, Hushairi Zen, Adnan Shahid Khan 164-173

Classification of Sleep Stages Based on EEG Signals PDF
Hayet Werteni, S. Yacoub, N. Ellouze 174-181

Histopathology Image Analysis and Classification for Cancer Detection Using 2D Autoregressive Model PDF
D. Vaishali, R. Ramesh, J. Anita Christaline 182-188

Enhancement of Wireless Sensor Network Lifetime with Mobile Base Station Using Particle Swarm Optimization PDF
N. M. Abdul Latiff, N. A. Abdul Latiff, R. B. Ahmad 189-199

A Novel Approach for Optimizing Web Service Composition Considering Inter-Web Service Dependency Using Conditional Probability PDF
Mehdi Jafarzadeh Samani, Farhad Mardukhi, Bahman Zamani, Saeed Ayat 200-207

Strength Assessment of Modern Cryptosystems Using Methods of the Analysis Based on the Solutions of Combined Equations PDF
Ekaterina Maro, Evgeniya Ishchukova, Liudmila Babenko 208-221

A Novel Technique for Prolonging the Connectivity of Wireless Sensor Networks PDF
E. Anna Devi, J. Martin Leo Manickam 222-229

A Combined Throughput and Hierarchical Strategies for Medium Access in Wireless Network PDF
Sihame El-Hammani, Khalil Ibrahimi, El-Houssine Bouyakhf 230-240

Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize