Secure Authentication using Anti-Screenshot Virtual Keyboard
Author(s): Ankit Parekh | Ajinkya Pawar | Pratik Munot | Piyush Mantri

X-ray view on a Class using Conceptual Analysis in Java Environment
Author(s): Gulshan Kumar | Mritunjay Kumar Rai

A fast multi-class SVM learning method for huge databases
Author(s): Djeffal Abdelhamid | Taleb-Ahmed Abdelmalik

Fast FPGA Implementation of EBCOT block in JPEG2000 Standard
Author(s): Anass Mansouri | Ali Ahaitouf | Farid Abdi

Reliable Communication in Wireless Body Area Sensor Network for Health Monitoring
Author(s): Saeid Bahanfar | Ladan Darougaran | Helia Kousha | Shahram Babaie

An Efficient I-MINE Algorithm for Materialized Views in a data Warehouse Environment
Author(s): T.Nalini | Dr. A. Kumaravel | Dr.K.Rangarajan

Implementation of re-configurable Digital front end module of MIMO-OFDM module using NCO
Author(s): Veena M.B. | Dr. M.N. Shanmukha swamy

A Review of Clustering Techniques Based on Machine learning Approach in Intrusion Detection Systems
Author(s): Ala' Yaseen Ibrahim Shakhatreh | Kamalrulnizam Abu Bakar

A new method for classification of Brachiopods based on the radon transformation
Author(s): Youssef Ait khouya | Noureddine Alaa

Development of CAD System Based on Enhanced Clustering Based Segmentation Algorithm for Detection of Masses in Breast DCE-MRI
Author(s): D. Janaki Sathya

Secure Geographic Routing Protocols: Issues and Approaches
Author(s): Mehdi sookhak | Ramin Karimi | NorafidaIthnin | Mahboobeh Haghparast | Ismail FauziISnin

A Detailed Study on Energy Efficient Techniques for Mobile Adhoc Networks
Author(s): S. Suganya | S. Palaniammal

Design of a new model of miniature antenna quasi-isotropic coverage
Author(s): Abdellatif Berkat | Noureddine Boukli-Hacene | F. Tarik Bendimerad

SWOT Analysis of Software Development Process Models
Author(s): Ashish B. Sasankar | Dr. Vinay Chavan

Object-Oriented Software Methodologies: Roadmap to the Future
Author(s): Usman Ali Khan | Dr. Ibrahim A. Al-Bedewi | Kunal Gupta

Corporate Customers Usage of Internet Banking in East Africa
Author(s): Nelson Jagero | Silvance O. Abeka

Dynamic unlicensed bands access based on the decentralized resource distribution approach
Author(s): Souleymane Oumtanaga | Zamble Raoul | Michel Babri

Image Restoration Using Thresholding Techniques on Wavelet Coefficients
Author(s): Rubeena Vohra | Akash Tayal

An Alternative Process Documentation for Data Warehouse Projects
Author(s): Jyothi Prasad K S S | G Hima Bindu | G Lakshmeeswari

Enrich the E-publishing Community Website with Search Engine Optimization Technique
Author(s): Vadivel Rangasamy | Dr. K. Baskaran

The Regulatory Challenges and Opportunities of IP Telephony: Perspective on Malaysia
Author(s): Md Khaled Shukran

Analysis and Improvement of DSDV Protocol
Author(s): Nayan Ranjan Paul | Laxminath Tripathy | Pradipta Kumar Mishra

Fuzzy Kernel and Fuzzy Subsemiautomata with Thresholds
Author(s): M. Basheer Ahamed | J. Michael Anna Spinneli

Classification of Load Balancing Conditions for parallel and distributed systems
Author(s): Mohammad Zubair Khan | R. Singh | J. Alam | S. Saxena

Towards Maximum Spanning Tree Model in Web 3.0 Design and Development for Students using Discriminant Analysis
Author(s): S.Padma | Ananthi Seshasaayee

A study for Issues of the Location ManagementIn Mobile Networks
Author(s): Sami M. Halawani | Dr. Ab Rahman bin Ahmad | M. Z. Khan

ZigBee Based Electric Meter Reading System
Author(s): S. Arun | R. Krishnamoorthy | Dr. VenuGopala Rao.M

Comparative Performance Analysis Of Different Radio Channel Modelling For Bluetooth Localization System
Author(s): Idigo Victor | Okezie C.C | Akpado Kenneth | Ohaneme C.O

Entropy of Data Compression Using Object Oriented Data Warehousing
Author(s): Pushpa Suri | Meenakshi Sharma

Establishing Relationship between Complexity and Faults for Object-Oriented Software Systems
Author(s): Usha Chhillar | Sucheta Bhasin

Adverse Conditions and ASR Techniques for Robust Speech User Interface
Author(s): Urmila Shrawankar | Dr. Vilas Thakare

Data Visualization Technique Framework for Intrusion detection
Author(s): Alaa El - Din Riad | Ibrahim Elhenawy | Ahmed Hassan | Nancy Awadallah

Novel information security model using proposed e-cipher method with combining the features of cryptic-steganography
Author(s): Prof. R. Venkateswaran | Prof. Dr.V. Sundaram

Generation of Random Fields for Image Enhancement and Reconstruction
Author(s): B.Srinivasa Rao | K.Srinivas | Dr.LSS Reddy

Query Optimization Using Genetic Algorithms in the Vector SpaceModel
Author(s): Eman Al Mashagba | Feras Al Mashagba | Mohammad Othman Nassar

Cluster Based Hybrid Niche Mimetic and Genetic Algorithm for Text Document Categorization
Author(s): A. K. Santra | C. Josephine Christy | B. Nagarajan

Modeling Component-based Bragg gratings Application: tunable lasers
Author(s): Hedara Rachida | Mohammed Chikh-Bled

Weighted Bit Rate Allocation in JPEG2000 Tile Encoding
Author(s): Singara Singh | R. K. Sharma | M. K. Sharma

A Routing Algorithm based on Cellular Automata for Mobile Ad-hoc Networks
Author(s): Azadeh Ghalavand | Ahmad khademzadeh | Arash Dana | Golnoosh Ghalavand

WiBro Mobility Simulation Model
Author(s): Junaid Qayyum | Shahid Latif | Faheem Khan | Muhammad LaL | Shahzad Hameed | Asad Malook

Research on effective factors on Verification Results in Software Systems
Author(s): Alireza Souri | Mohammad ali Sharifloo | Monire Norouzi

Implementing and Managing framework for PaaS in Cloud Computing
Author(s): Junaid Qayyum | Faheem Khan | Muhammad LaL | Fayyaz Gul | Muhammad Sohaib | Fahad Masood

Identifying Reference Objects by Hierarchical Clustering in Java Environment
Author(s): RAHUL SAHA | Dr. G. Geetha

Development of MIL-STD-1553B Synthesizable IP Core for Avionic Applications
Author(s): Enumala Srikrishna | P.H.S.T.Murthy | L.MadanMohan

Multimedia-based Medicinal Plants Sustainability Management System
Author(s): Zacchaeus Omogbadegun | Charles Uwadia | Charles Ayo | Victor Mbarika | Nicholas Omoregbe | Efe Otofia | Frank Chieze

Comparison of Conventional and Modern Load Forecasting Techniques Based on Artificial Intelligence and Expert Systems
Author(s): Badar ul Islam

Design and implementation of a platform for location-based services: a case study of GIS of archaeological and handicraft of Fez Medina
Author(s): Essayad Abdesslam

A Methodological Review for the Analysis of Divide and Conquer Based Sorting/ Searching Algorithms
Author(s): Deepak Abhyankar | Maya Ingle

A framework for dynamic indexing from hidden web
Author(s): Hasan Mahmud | Moumie Soulemane | Mohammad Rafiuzzaman

Rise of Data Mining: Current and Future Application Areas
Author(s): Dharminder Kumar | Deepak Bhardwaj

Energy Efficient Clustering Algorithms in Wireless Sensor Networks: A Survey
Author(s): Vinay Kumar | Sanjeev Jain | Sudarshan Tiwari

Effect of different defuzzification methods in a fuzzy based load balancing application
Author(s): Sameena Naaz | Afshar Alam | Ranjit Biswas

Modelling An Enhanced Routing Protocol For Wireless Sensor Networks Using Implicit Clustering Technique
Author(s): Idigo Victor | Azubogu A.C.O | Oguejiofor Obinna samuel | Nnebe Scholar

Visualising Pipeline Sensor Datasets with Modified Incremental Orthogonal Centroid Algorithm
Author(s): Folorunso Olufemi Ayinde | Mohd Shahrizal Sunar

Genetic programming approach on evaporation losses and its effect on climate change for Vaipar Basin
Author(s): K.S.Kasiviswanathan | R. Soundhara Raja Pandian | S.Saravanan | Avinash Agarwal

Models of Growth Heterogeneous Cancer Cells with Chains Markoviens and Estimation of Their Fractal Dimension
Author(s): Labib Sadek Terrissa | Abdelhamid Zerroug

A Framework to Enhance Quality of Service for Content Delivery Network Using Web Services: A Review
Author(s): K.Manivannan | C.G.Ravichandran

Filtration Of Artifacts In ECG Signal Using Rectangular Window-Based Digital Filters
Author(s): Mbachu C.B | Idigo Victor | Ifeagwu Emmanuel | Nsionu I. I

Object Recognition Using Support Vector Machine Augmented by RST Invariants
Author(s): Muralidharan R | Dr.C.Chandrasekar

Improved Exemplar Based Texture Synthesis Method for Natural Scene Image Completion
Author(s): K. Sangeetha | Dr. P. Sengottuvelan | E. Balamurugan

Study of Performance of the combined MIM0 MMSE VBLAST-OFDM for Wi-Fi (802.11n)
Author(s): Souhila Ferouani | G. Abdellaoui | F. Debbat | F. T. Bendimerad

Neural networks for error detection and data aggregation in wireless sensor network
Author(s): Saeid Bahanfar | Helia Kousha | Ladan Darougaran

Aspect-Oriented Requirements Engineering for Advanced Separation of Concerns: A Review
Author(s): Narender Singh | Nasib Singh Gill

Performance of MIMO VBLAST-OFDM in Ka-Band
Author(s): Souhila Ferouani | G. Abdellaoui | F. Debbat | F. T. Bendimerad

Automatic image clustering using a swarm intelligence approach
Author(s): Ouadfel Salima | Batouche Mohamed | Abdlemalik Ahmed-Taleb

Energy Efficient Adaptive Protocol for Clustered Wireless Sensor Networks
Author(s): K.Padmanabhan | P. Kamalakkannan

A Cryptographic Algorithm based onBilinear Transformation
Author(s): Phani krishna kishore M | Venugopal IVS

Encrypted IT Auditing and Log Management on Cloud Computing
Author(s): Rajiv R Bhandari | Nitin Mishra

Low Power NoC Switch using Novel Adaptive Virtual Channels
Author(s): Rabab Ezz-Eldin | Magdy A. El-Moursy | Amr M. Refaat

GPRS and Bluetooth Based Devices/Mobile Connectivity Shifting From Manual To Automation For Performance Optimization
Author(s): Nazia Bibi | Tahira Mahboob | Malik Sikander Hayat Khiyal

Emotion Recognition using Dynamic Time Warping Technique for Isolated Words
Author(s): N. Murali Krishna | P.V. Lakshmi | Y. Srinivas | J. Sirisha Devi

A New Routing Algorithm for a Three-Stage Clos Interconnection Networks
Author(s): Zahra sadat Ghandriz | Esmaeil Zeinali Khasraghi

Image Mining for Mammogram Classification by Association Rule Using Statistical and GLCM features
Author(s): Aswini Kumar Mohanty | Sukanta Kumar Swain | Pratap Kumar Champati | Saroj Kumar Lenka

Decentralized Lifetime Maximizing Tree with Clustering for Data Delivery in Wireless Sensor Networks
Author(s): Deepali Virmani | Satbir Jain

Application of Neural Networks for Noise and Filter Classification to enhance the Image Quality
Author(s): Dr. T. Santhanam | S. Radhika

Development Strategy using Cognitive Domain in e-Requirement Engineering Learning System
Author(s): Nor Azliana Akmal Jamaludin | Shamsul Sahibuddin

Proposing Cluster_Similarity Method in Order to Find as Much Better Similarities in Databases
Author(s): Mohammad-Reza Feizi-Derakhshi | Azade Roohany

Study of the Master-Slave replication in a distributed database
Author(s): Kalonji Kalala Hercule | Mbuyi Mukendi Eugene | Boale Bomolo Paulin | Lilongo Bokaletumba Joel

An Image Compression Approach using Wavelet Transform and Modified Self Organizing Map
Author(s): G. Boopathi

Impact of Outlier Removal and Normalization Approach in Modified k-Means Clustering Algorithm
Author(s): Vaishali Rajeev Patel | Rupa G. Mehta

Knowledge Collaboration in Higher Educational Institutions in India: Charting a Knowledge Management Solution
Author(s): Mamta Bhusry | Jayanti Ranjan

Energy Efficient Routing Scheme for Sensor Networks Using Connected Dominating Set
Author(s): K. P. Sampoornam | Dr. K. Rameshwaran

Autonomic Management for Multi-agent Systems
Author(s): Nadir kamal Salih | G. K. Viju | Abdelmotalib A.Mohamed

Performance Enhancement of a Dynamic System Using PID Controller Tuning Formulae
Author(s): Jyotiprakash Patra | Dr.Partha Sarathi Khuntia

Application of Cluster Analysis In Expert System - A Brief Survey
Author(s): Mamta Tiwari | Bharat Misra

A Fuzzy Neural Clustering approach for Fingerprint Recognition
Author(s): Mahendra Kondekar | Uday Kulkarni | Santosh Chowhan

A Framework for Picture Extraction on Search Engine: Improved and Meaningful Result
Author(s): Anamika Sharma | Sarita Sharma

Using Bee Colony Optimization to Solve the Task Scheduling Problem in Homogenous Systems
Author(s): Vahid Arabnejad | Ali Moeini | Nasrollah Moghadam

Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris
Author(s): Mr.P.Balakumar | Dr.R.Venkatesan

Analysis of Stemming Algorithm for Text Clustering
Author(s): N.Sandhya | Y.Srilalitha | V.Sowmya | Dr.K.Anuradha | Dr.A.Govardhan

Enhancing Information Systems Security in Educational Organizations in KSA through proposing security model
Author(s): Hussain A.H. Awad | Fadi M. Battah

Image Transference and Retrieval over SMS
Author(s): Muhammad Fahad Khan | Saira Beg | Fakhra Kashif

Process of Reverse Engineering of Enterprise Information System Architecture
Author(s): Mohammed Abdul Bari | Shahanawaj Ahamad

An Adaptive Notch Filter For Noise Reduction and Signal Decomposition.
Author(s): Vikas S. Mane | Amrita A. Agashe

Dynamic Reputation Based Trust Management Using Neural Network Approach
Author(s): Reza Azmi | Mahdieh Hakimi | Zahra Bahmani

Farsi/Arabic Document Image Retrieval through Sub -Letter Shape Coding for mixed Farsi/Arabic and English text
Author(s): Zahra Bahmani | Reza Azmi

An Efficient Secure Biometric System with Non-Invertible Gabor Transform
Author(s): N.Radha | Dr.S.Karthikeyan

Multi agent Simulation: A Unified Framework for the analysis of viral infections within a bovine population
Author(s): Dr. Tahar Guerram | Nour El Houda Dehimi

A Subnet Based Intrusion Detection Scheme for Tracking down the Origin of Man-In-The-Middle Attack
Author(s): S.Vidya | R.Bhaskaran

High Capacity and Resistance to Additive Noise Audio Steganography Algorithm
Author(s): Haider Ismael Shahadi | Razali Bin Jidin

A Comparative Study of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET
Author(s): Tamilarasan

Medicinal Plants Database and Three Dimensional Structure of the Chemical Compounds from Medicinal Plants in Indonesia
Author(s): Arry Yanuar | Abdul Mun'im | Akma Bertha Aprima Lagho | Rezi Riadhi Syahdi | Marjuqi Rahmat | Heru Suhartanto

A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions
Author(s): Javad Alizadeh | Abdolrasoul Mirghadri

Identifying Clusters of Concepts in a Low Cohesive Class for Extract Class Refactoring Using Metrics Supplemented Agglomerative Clustering Technique
Author(s): A. Ananda Rao | K. Narendar Reddy

Named Entity Identifier for Malayalam Using Linguistic Principles Employing Statistical Methods
Author(s): Bindu.M.S | Sumam Mary Idicula

Amalgamation of Automated Testing and Data Mining: A Novel Approach in Software Testing
Author(s): Sarita Sharma | Anamika Bhargava

Image Independent Filter for Removal of Speckle Noise
Author(s): K. Bala Prakash | R.Venu Babu | B.VenuGopal

Simulation of Thermal Comfort of a Residential House
Author(s): Masine Md. Tap | Haslinda Mohamed Kamar | Abdul Kadir Marsono | Nazri Kamsah | Khairul Amry Mohd Salimin

Improved Datagram Transport Protocol over Wireless Sensor Networks- TCP Fairness
Author(s): Senthil Kumaran .M | Dr. R. Rangarajan

Evaluation Of Scheduling And Load Balancing Techniques In Mobile Grid Architecture
Author(s): Debabrata Singh | Sandeep Nanda | Sarbeswara Hota | Manas Kumar Nanda

Optimized Fuzzy Logic Based Segmentation for Abnormal MRI Brain Images Analysis
Author(s): Indah Soesanti | Thomas Sri Widodo | Maesadji Tjokronagoro

A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key
Author(s): Tanmay Bhattacharya | Sirshendu Hore | S. R. Bhadra Chaudhuri

A Study of Library Databases by Translating Those SQL Queries into Relational Algebra and Generating Query Trees
Author(s): Santhi Lasya | Sreekar Tanuku

Intelligent Scheduling in Health Care Domain
Author(s): Srividya Bhat | Ravi S Malashetty | Nandini S Sidnal

Fast Hybrid PSO and Tabu Search Approach for Optimization of a Fuzzy Controller
Author(s): Nesrine Talbi

Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking
Author(s): Abduljabbar Shaamala | Shahidan M. Abdullah | Azizah A. Manaf

The Descriptive Study of Knowledge Discovery from Web Usage Mining
Author(s): Yogish H K | Dr. G T Raju | Manjunath T N

Robust Model for Text Extraction from Complex Video Inputs Based on SUSAN Contour Detection and Fuzzy C Means Clustering
Author(s): Narasimha Murthy K N

A Robust Watermarking Algorithm Based on Image Normalization and DC Coefficients
Author(s): Tumula Sridevi | V. Vijaya Kumar

Improved Free-Form Database Query Language for Mobile Phones
Author(s): Shiramshetty Gouthami | Pulluri Srinivas Rao | Jayadev Gyani

Architectural Model of Localization in Multi-Scale Communication for Wireless Sensor Networks
Author(s): S Swapna Kumar | Dr M. Nanda Kumar | Dr V.S Sheeba

FinFET Architecture Analysis and Fabrication Mechanism
Author(s): Sarman K Hadia | , Rohit R. Patel | Dr. Yogesh P. Kosta

A Novel Method for Efficient Text Extraction from Real Time Images with Diversified Background using Haar Discrete Wavelet Transform and K-Means Clustering
Author(s): Narasimha Murthy K N

Classification of EEG data using FHT and SVM based on Bayesian Network
Author(s): V. Baby Deepa | Dr. P. Thangaraj

Indication of Efficient Technique for Detection of Check Bits in Hamming Code
Author(s): Rahat Ullah | Jahangir Khan | Shahid Latif | Inayat Ullah

Feature Extraction and Classification of Oil Spills in SAR Imagery
Author(s): Radhika V | G.Padmavathi

Configuration of FPGA For Computerized Speech/Sound Processing For Bio-Computing Systems
Author(s): V. Hanuman Kumar | P. Seetha Ramaiah

Corpus Based Context Free Grammar Design for Natural Language Interface to Database
Author(s): Avinash J. Agrawal | Dr. O.G. Kakde
