Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Hidden Web"

ADD TO MY LIST
 
An automated protein annotation filter for integrating web-based annotation tools

Author(s): Vijayakumar Saravanan | Primanayagam Shanmughavel
Centroid Based Text Clustering

Author(s): Priti Maheshwari | Jitendra Agrawal
Automated genome mining for natural products

Author(s): Li Michael | Ung Peter | Zajkowski James | Garneau-Tsodikova Sylvie | Sherman David
Guest Editorial

Author(s): Hyunseung Choo | Sang-goo Lee | Katsumi Tanaka | Chin-Cheng Chang
Frequent Pattern Mining in Web Log Data

Author(s): Renáta Iváncsy | István Vajk
Decision Support in Heart Disease Prediction System using Naive Bayes

Author(s): G.Subbalakshmi, | K. Ramesh, | M. Chinna Rao
HMM Logos for visualization of protein families

Author(s): Schuster-Böckler Benjamin | Schultz Jörg | Rahmann Sven
A hidden Markov model approach for determining expression from genomic tiling micro arrays

Author(s): Munch Kasper | Gardner Paul | Arctander Peter | Krogh Anders
Image Analysis for Online Dynamic Steganography Detection

Author(s): Kevin Curran | Joanne Mc Devitt
Dual Layer Privacy Model for Hidden Databases

Author(s): Richa Jindal | Chander Kiran
A New Text Mining Approach Based on HMM-SVM for Web News Classification

Author(s): Krishnalal G | S Babu Rengarajan | K G Srinivasagan
Microsatellites in varied arenas of research

Author(s): Remya K | Joseph Sigimol | Lakshmi P | Akhila S
A Framework for Mining Ontological Information Nets

Author(s): Saqib Saeed | Christoph Kunz
Elusive multiquark spectroscopy

Author(s): Richard J.-M.
A Framework for Incremental Hidden Web Crawler

Author(s): Rosy Madaan | Ashutosh Dixit, | A.K. Sharma | Komal Kumar Bhatia
PDBalert: automatic, recurrent remote homology tracking and protein structure prediction

Author(s): Agarwal Vatsal | Remmert Michael | Biegert Andreas | Söding Johannes
Structural descriptor database: a new tool for sequence-based functional site prediction

Author(s): Bernardes Juliana | Fernandez Jorge | Vasconcelos Ana
Prediction of nuclear proteins using SVM and HMM models

Author(s): Kumar Manish | Raghava Gajendra
7TMRmine: a Web server for hierarchical mining of 7TMR proteins

Author(s): Lu Guoqing | Wang Zhifang | Jones Alan | Moriyama Etsuko
Identification of gene targets of ISGF-3 transcription factor

Author(s): Tokovenko B. T. | Dragushchenko O. O. | Kuklin A. V. | Obolenskaya M. Yu.
Technology Integration around the Geographic Information: A State of the Art

Author(s): Rafael Ponce-Medellin | Gabriel Gonzalez-Serna | Rocio Vargas | Lirio Ruiz
SoyDB: a knowledge database of soybean transcription factors

Author(s): Wang Zheng | Libault Marc | Joshi Trupti | Valliyodan Babu | Nguyen Henry | Xu Dong | Stacey Gary | Cheng Jianlin
e-Text Watermarking: Utilizing 'Kashida' Extensions in Arabic Language Electronic Writing

Author(s): Adnan Abdul-Aziz Gutub | Fahd Al-Haidari | Khalid M. Al-Kahsah | Jamil Hamodi
Efficient Selection and Integration of Hidden Web Database

Author(s): Xuefeng Xian | Pengpeng Zhao | Yuanfeng Yang | Jie Xin | Zhiming Cui
Guest Editorial

Author(s): Fei Yu | Chin-Chen Chang | Guangxue Yue | Jiexian Zeng | Wen Chen
Review of Robust Video Watermarking Algorithms

Author(s): Mrs Neeta Deshpande | Dr.Archana Rajurkar | Dr. R Manthalkar
Role of Data Mining in E-Payment systems

Author(s): Sabyasachi Pattanaik | Partha Pratim Ghosh
Improvement in Recognition Techniques for Human Computer Interaction

Author(s): Raju M. Tugnayat | Nitin K. Choudhary | M.V.Sarode
BEYOND CONNECTIVITY. FUTURE CHALLENGES FOR E-INCLUSION POLICIES

Author(s): Radu Gheorghiu | Manuela Unguru
Survey on Text Document Clustering

Author(s): M.Thangamani | Dr.P.Thangaraj
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences

Author(s): Ashish Patel | M. Shah | Rajarathnam Chandramouli | Koduvayur P. Subbalakshmi
Mining of Users Access Behaviour for Frequent Sequential Pattern From Web Logs

Author(s): S.Vijayalakshmi | V.Mohan | S.Suresh Raja
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

Author(s): Yi-Hsun Wang | Ching-Hao Mao | Hahn-Ming Lee
Algorithms and semantic infrastructure for mutation impact extraction and grounding

Author(s): Laurila Jonas | Naderi Nona | Witte René | Riazanov Alexandre | Kouznetsov Alexandre | Baker Christopher
A Hidden Markov Model method, capable of predicting and discriminating β-barrel outer membrane proteins

Author(s): Bagos Pantelis | Liakopoulos Theodore | Spyropoulos Ioannis | Hamodrakas Stavros
A method for the prediction of GPCRs coupling specificity to G-proteins using refined profile Hidden Markov Models

Author(s): Sgourakis Nikolaos | Bagos Pantelis | Papasaikas Panagiotis | Hamodrakas Stavros
A data integration approach for cell cycle analysis oriented to model simulation in systems biology

Author(s): Alfieri Roberta | Merelli Ivan | Mosca Ettore | Milanesi Luciano
ReAlignerV: Web-based genomic alignment tool with high specificity and robustness estimated by species-specific insertion sequences

Author(s): Iwana Hisakazu | Hori Yukio | Matsumoto Kensuke | Murao Koji | Ishida Toshihiko
Session Fixation Vulnerability in Web-Based Application

Author(s): A.P. Jadhav | A.P. Jadhav | Vaibhav B. Lohkare | Bhagyashri R.Deulkar
Secure Authentication using Anti-Screenshot Virtual Keyboard

Author(s): Ankit Parekh | Ajinkya Pawar | Pratik Munot | Piyush Mantri
A framework for dynamic indexing from hidden web

Author(s): Hasan Mahmud | Moumie Soulemane | Mohammad Rafiuzzaman
Design of Hidden Web Search Engine

Author(s): Anuradha | A. K. Sharma
Guest Editorial

Author(s): Tianlong Gu | Shenghui Li
WS-DAI-DM: An Interface Specification for Data Mining in Grid Environments

Author(s): Yan Zhang | Luoming Meng | Honghui Li | Alexander Woehrer | Peter Brezany
Guest Editorial

Author(s): Ian Greenshields
Ontology Based Automatic Attributes Extracting and Queries Translating for Deep Web

Author(s): Hao Liang | Fei Ren | Wanli Zuo | Fengling He
Guest Editorial

Author(s): Mei-Ling Shyu | Yu Cao | Ming Li | Jun Kong | Jie Bao
Software Cost Regressing Testing Based Hidden MORKOV Model

Author(s): Mrs. P.Thenmozhi, | Dr. P. Balasubramanie
Binary Particle Swarm Optimization based Biclustering of Web Usage Data

Author(s): R. Rathipriya | K. Thangavel | J. Bagyamani
Service Oriented Architecture based SDI Model for Geographical Indication Web Services

Author(s): Rabindra K. Barik | Arun B. Samaddar | Shefalika G. Samaddar
Modeling and Analyze the Deep Web: Surfacing Hidden Value

Author(s): Suneet Kumar | Anuj Kumar Yadav | Rakesh Bharati | Rani Choudhary
Implementation of Secure Cross-site Communication on QIIIEP

Author(s): Dilip Kumar Sharma | Ashok Kumar Sharma
Accurate And Efficient Crawling The Deep Web: Surfacing Hidden Value

Author(s): Suneet Kumar | Anuj Kumar Yadav | Rakesh Bharti | Rani Choudhary
Save time & money - Smart Internet Solutions      Why do you need a reservation system?