Investigation of MQAM and MPSK with EGC in Generalized Flat-Fading Channels
Author(s): Jyoteesh Malhotra
Volume: 2
Issue: 4
Year: 2011




Inferring Asymmetry of Inhabitant Flow using Call Detail Records
Author(s): Santi Phithakkitnukoon | Carlo Ratti
Volume: 2
Issue: 4
Year: 2011




On Performance Evaluation of Mining Algorithm for Multiple-Level Association Rules based on Scale-up Characteristics
Author(s): Suraj K Srivastava | Harsh K Verma | Deepti Gupta
Volume: 2
Issue: 4
Year: 2011




Customer Interaction 2.0: Adopting Social Media as Customer Service Channel
Author(s): Michaela Geierhos
Volume: 2
Issue: 4
Year: 2011




An Efficient Technique for Detection of Suspicious Malicious Web Site
Author(s): K. Pragadeesh Kumar | N. Jaisankar | N. Mythili
Volume: 2
Issue: 4
Year: 2011




The Impact of the New Web 2.0 Technologies in Communication, Development, and Revolutions of Societies
Author(s): Ashraf Darwish | Kamaljit I. Lakhtaria
Volume: 2
Issue: 4
Year: 2011




Building Machine Learning Based Senti-word Lexicon for Sentiment Analysis
Author(s): Alaa Hamouda | Mahmoud Marei | Mohamed Rohaim
Volume: 2
Issue: 4
Year: 2011




The Utilization of Web2.0 Functionalities on E-Commerce Web Sites
Author(s): Yong-Mi Kim | Suliman Hawamdeh
Volume: 2
Issue: 4
Year: 2011




Redistribution of Paid Channels Freely by Modifying Live Video
Author(s): Prem Shanker Yadav | Manuj Darbari
Volume: 1
Issue: 4
Year: 2010




On Routing Protocols for WSNs with Additional Layers: Future Technology for IT
Author(s): Deepti Gupta | Ajay K Sharma
Volume: 1
Issue: 4
Year: 2010




A Client-based Vertical Handoff System in 4G Wireless Networks
Author(s): Shivakumar V Saboji | Channappa B Akki
Volume: 1
Issue: 4
Year: 2010




A Network Selection Mechanism for Fourth Generation Communication Networks
Author(s): Mohammod Sazid Zaman Khan | Shaiful Alam | Mohammad Rezaul Huque Khan
Volume: 1
Issue: 4
Year: 2010




A Hybrid Particle Swarm Optimization with Genetic Operator for Vehicle Routing Problem
Author(s): Geetha Shanmugam | Poonthalir Ganesan | Vanathi P T
Volume: 1
Issue: 4
Year: 2010




A Recent-Pattern Biased Dimension-Reduction Framework for Time Series Data
Author(s): Santi Phithakkitnukoon | Carlo Ratti
Volume: 1
Issue: 4
Year: 2010




Direct Torque Control of PMBLDC Motor using Hybrid (GA and Fuzzy Logic) Controller
Author(s): Esakkiappan Kaliappan | C. Sharmeela
Volume: 1
Issue: 4
Year: 2010




Using SAT-Based Techniques in Test Vectors Generation
Author(s): Fadi Aloul | Assim Sagahyroon
Volume: 1
Issue: 4
Year: 2010




Review of Machine Learning Approaches to Semantic Web Service Discovery
Author(s): Shalini Batra | Seema Bawa
Volume: 1
Issue: 3
Year: 2010




JPEG Compression Steganography & Crypography Using Image-Adaptation Technique
Author(s): Meenu Kumari | A. Khare | Pallavi Khare
Volume: 1
Issue: 3
Year: 2010




A Channel Allocation Algorithm for Hot-Spot Cells in Wireless Networks
Author(s): Rana Ejaz Ahmed
Volume: 1
Issue: 3
Year: 2010




GRAAA: Grid Resource Allocation Based on Ant Algorithm
Author(s): Manpreet Singh
Volume: 1
Issue: 3
Year: 2010




Discrete Characterization of Domain Using Semantic Clustering
Author(s): Sanjay Madan | Shalini Batra
Volume: 1
Issue: 3
Year: 2010




Peripheral Display for Multi-User Location Awareness
Author(s): Rahat Iqbal | Anne James | John Black | Witold Poreda
Volume: 1
Issue: 3
Year: 2010




A Location Dependent Connectivity Guarantee Key Management Scheme for Heterogeneous Wireless Sensor Networks
Author(s): Kamal Kumar | A. K. Verma | R.B. Patel
Volume: 1
Issue: 3
Year: 2010




Explaining Human Behavior in Dynamic Tasks through Reinforcement Learning
Author(s): Varun Dutt
Volume: 2
Issue: 3
Year: 2011




Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations
Author(s): N.R. Sunitha | B.B. Amberker
Volume: 2
Issue: 3
Year: 2011




Efficient Refinery Scheduling Heuristic in Heterogeneous Computing Systems
Author(s): Sunita Bansal | Chittaranjan Hota
Volume: 2
Issue: 3
Year: 2011




Hybrid Personalized Recommender System Using Fast K-medoids Clustering Algorithm
Author(s): Subhash K. Shinde | Uday V. Kulkarni
Volume: 2
Issue: 3
Year: 2011




A Novel History based Weighted Voting Algorithm for Safety Critical Systems
Author(s): Phanikumar Singamsetty | SeethaRamaiah Panchumarthy
Volume: 2
Issue: 3
Year: 2011




Differential Geometric Approach to Change Detection Using Remotely Sensed Images
Author(s): N Panigrahi | B K Mohan | G Athithan
Volume: 2
Issue: 3
Year: 2011




A Clonal Selection Algorithm Based Tabu Search for Satisfiability Problems
Author(s): Abdesslem Layeb
Volume: 3
Issue: 2
Year: 2012




Robust Power Control using Efficient Minimum Variance Beamforming for Cognitive Radio Networks
Author(s): Ummy Habiba | Zahed Hossain | Mohammad Abdul Matin
Volume: 3
Issue: 2
Year: 2012




A Dynamic Bandwidth Assignment Approach Under DDoS Flood Attack
Author(s): Raman Singh | Amandeep Verma
Volume: 3
Issue: 2
Year: 2012




Spread Spectrum Modem for Voice and Data Transmission
Author(s): Md. Abdul Alim
Volume: 3
Issue: 2
Year: 2012




Feature Optimization and Performance Evaluation of Machine Learning Algorithms for Identification of P2P Traffic
Author(s): Sunil Agrawal | Balwinder S. Sohi
Volume: 3
Issue: 2
Year: 2012




A Glimpse into the Research Space of Location Based Services
Author(s): Chen Wei Tan | Mohammod Sazid Zaman Khan | Thilek Silvadorai | Toni Anwar | Sureswaran Ramadass
Volume: 3
Issue: 2
Year: 2012




‘Quality & Popularity’ Prediction Modeling of TV Programme through Fuzzy QFD Approach
Author(s): Savitur Prakash | Manuj Darbari
Volume: 3
Issue: 2
Year: 2012




Generalization of VLC Decoding Trees-to-Processes Translation
Author(s): Guan Hong | ACM Fong
Volume: 1
Issue: 2
Year: 2010




An Ameliorated Methodology for Comprehension of Legacy System
Author(s): Shivanand M. Handigund | Ajeet Annarao Chikkamannur | K. Ananthapadmanabha | H. R. Shashidhara
Volume: 1
Issue: 2
Year: 2010




User Behavior Information and Diffusion Process for IC-Card System
Author(s): Donghun Yoon
Volume: 1
Issue: 2
Year: 2010




Adoption of E-Learning Technology for Anti-Money Laundering Training
Author(s): Alya H. Al-Hammadi | Rana E. Ahmed | Imran Zualkernan
Volume: 1
Issue: 2
Year: 2010




A Lightweight Model for Mobile Peer-to-Peer File Sharing Systems
Author(s): George Stephan | Badieh Traboulsi | Rabih Dbouk | Sanaa Sharafeddine
Volume: 1
Issue: 2
Year: 2010




A Fault-Tolerant Routing Protocol for Mobile Ad Hoc Networks
Author(s): Rana Ejaz Ahmed
Volume: 2
Issue: 2
Year: 2011




Design Research of an Adaptive-Fuzzy-Neural Controller
Author(s): Peifeng Niu | Guoqiang Li | Mizhe Zhang
Volume: 2
Issue: 2
Year: 2011




Analysis of Open Environment Sign-in Schemes-Privacy Enhanced & Trustworthy Approach
Author(s): Zubair Ahmad Khattak | Jamalul-lail Ab Manan | Suziah Sulaiman
Volume: 2
Issue: 2
Year: 2011




Emerging Intuitionistic Fuzzy Classifiers for Intrusion Detection System
Author(s): Kavitha B | Karthikeyan Subramanian | Sheeba Maybell P
Volume: 2
Issue: 2
Year: 2011




Defense Strategy Using Trust Based Model to Mitigate Active Attacks in DSR Based MANET
Author(s): N. Bhalaji | A. Shanmugam
Volume: 2
Issue: 2
Year: 2011




Security Model for TCP/IP Protocol Suite
Author(s): Anand Kumar | S. Karthikeyan
Volume: 2
Issue: 2
Year: 2011




Securing Retinal Template Using Quasigroups
Author(s): N. Radha | T. Rubya | S. Karthikeyan
Volume: 2
Issue: 2
Year: 2011




Components Based Key Management Algorithm for Storage Area Networks
Author(s): P. Mahalingam | Dr. N. Jayaprakash | Dr. S. Karthikeyan
Volume: 2
Issue: 2
Year: 2011




A Prognostics Framework for Health Degradation and Air Pollution Concentrations
Author(s): Bernard Fong | G. Y. Hong
Volume: 3
Issue: 1
Year: 2012




Discovery of Scalable Association Rules from Large Set of Multidimensional Quantitative Datasets
Author(s): Tamanna Siddiqui | M Afshar Aalam | Sapna Jain
Volume: 3
Issue: 1
Year: 2012




PSO tuned Adaptive Neuro-fuzzy Controller for Vehicle Suspension Systems
Author(s): Rajeswari Kothandaraman | Lakshmi Ponnusamy
Volume: 3
Issue: 1
Year: 2012




Multivariable control of nonlinear process using soft computing techniques
Author(s): N. Kamala | T. Thyagarajan | S. Renganathan
Volume: 3
Issue: 1
Year: 2012




A Hybrid Revisit Policy For Web Search
Author(s): Vipul Sharma | Mukesh Kumar | Renu Vig
Volume: 3
Issue: 1
Year: 2012




Activity Recognition in Ubiquitous Learning Environment
Author(s): Tao Lu | Shaokun Zhang | Qian Hao
Volume: 3
Issue: 1
Year: 2012




Design and Realization of Virtual Classroom
Author(s): Rong Zhu | Yong Wang
Volume: 3
Issue: 1
Year: 2012




Research on Learning Effect based on Outer P- set
Author(s): Xiu-qing Yu
Volume: 3
Issue: 1
Year: 2012




iiOSProTrain: An Interactive Intelligent Online System for Programming Training
Author(s): Tho Thanh Quan | Phung H Nguyen | Thang H Bui | Thuan Dinh Le | An Nhu Nguyen | Duc L.N. Hoang | Vu Huu Nguyen | Binh Thien Nguyen
Volume: 3
Issue: 1
Year: 2012




Metaphorical Interpretation of eLearning in Higher Education Institutions
Author(s): Allah Nawaz
Volume: 3
Issue: 1
Year: 2012




Automatic Segmentation of Liver and Tumor for CAD of Liver
Author(s): S S Kumar | R. S. Moni | J. Rajeesh
Volume: 2
Issue: 1
Year: 2011




Prediction of Number of Zombies in a DDoS Attack using Polynomial Regression Model
Author(s): B. B. Gupta | R. C. Joshi | Manoj Misra
Volume: 2
Issue: 1
Year: 2011




An ACO Algorithm for Effective Cluster Head Selection
Author(s): Amritha Sampath | Tripti C | Sabu M. Thampi
Volume: 2
Issue: 1
Year: 2011




Load Balancing in P2P Networks: Using Statistics to Fight Data and Execution Skew
Author(s): Daniel Warneke | Christian Dannewitz
Volume: 2
Issue: 1
Year: 2011




Using Materialized Views to Enhance a Traceable P2P Record Exchange Framework
Author(s): Fengrong Li | Yoshiharu Ishikawa
Volume: 2
Issue: 1
Year: 2011




PM4SWS: A P2P Model for Semantic Web Services Discovery and Composition
Author(s): Mohamed Gharzouli | Mahmoud Boufaida
Volume: 2
Issue: 1
Year: 2011




Complex Queries in P2P Networks with Resource-Constrained Devices
Author(s): Christian Dannewitz | Thorsten Biermann | Martin Dräxler | Holger Karl
Volume: 2
Issue: 1
Year: 2011




Dynamic Differential Evolution for Constrained Real-Parameter Optimization
Author(s): Youyun Ao | Hongqin Chi
Volume: 1
Issue: 1
Year: 2010




Integrated Performance and Visualization Enhancement of OLAP Using Growing Self Organizing Neural Networks
Author(s): Muhammad Usman | Sohail Asghar | Simon Fong
Volume: 1
Issue: 1
Year: 2010




On Performance of Multicast Delivery with Fixed WiMAX Telemedicine Networks Using Single-Carrier Modulation
Author(s): Bernard Fong | Guan Yue Hong
Volume: 1
Issue: 1
Year: 2010




Fuzzy Logic Based Position-Sensorless Speed Control of Multi Level Inverter Fed PMBLDC Drive
Author(s): T.V. Narmadha | T. Thyagarajan
Volume: 1
Issue: 1
Year: 2010




Multilingual Context Ontology Rule Enhanced Focused Web Crawler
Author(s): Mukesh Kumar | Renu Vig
Volume: 1
Issue: 1
Year: 2010




A Review of Machine Learning Algorithms for Text-Documents Classification
Author(s): Baharum Baharudin | Lam Hong Lee | Khairullah Khan
Volume: 1
Issue: 1
Year: 2010




Design and Implementation of an Online Social Network with Face Recognition
Author(s): Ray K. C. Lai | Jack C. K. Tang | Angus K. Y. Wong | Philip I. S. Lei
Volume: 1
Issue: 1
Year: 2010



