Observer Design for Simultaneous State and Faults Estimation

Author(s): Wafa JAMEL | Atef KHEDHER | Nasreddine BOUGUILA | Kamel BEN OTHMAN
Volume: 5
Issue: 9
Year: 2013





Purchase Decision for ATUR Broadband Network

Author(s): Chung Yeh | Wen-Chin Liu | Rang-Shing Ting
Volume: 5
Issue: 9
Year: 2013





SEGMENTATION OF CT SCAN LUMBAR SPINE IMAGE USING MEDIAN FILTER AND CANNY EDGE DETECTION ALGORITHM

Author(s): E.Punarselvam | Dr.P.Suresh | R.Parthasarathy
Volume: 5
Issue: 9
Year: 2013





Improvised Interpolation of Contour Lines Using Spider Weaving Approach

Author(s): Mohan P Pradhan | M K Ghose
Volume: 5
Issue: 9
Year: 2013





Mathematical Formula Recognition and Transformation to a Linear Format Suitable for Vocalization

Author(s): Azadeh Nazemi | Iain Murray
Volume: 5
Issue: 9
Year: 2013





An Efficient Autoadaptive Edge Detection Approach for Flame and Fire Images

Author(s): D. Baswaraj | D. Swarna Sree | Dr. A. Govardhan | Dr. P. Premchand
Volume: 5
Issue: 9
Year: 2013





INTERNAL COMPACT PRINTED LOOP ANTENNA WITH MATCHING ELEMENT FOR LAPTOP APPLICATIONS

Author(s): Shakti S Chauhan | R.P.S. Gangwar | Abhay Sharma
Volume: 5
Issue: 9
Year: 2013





USER INTEREST LEVEL BASED PREPROCESSING ALGORITHMS USING WEB USAGE MINING

Author(s): R. Suguna | Dr. D. Sharmila
Volume: 5
Issue: 9
Year: 2013





A Novel Biometric system for Person Recognition Using Palm vein Images

Author(s): S.Manikanda prabu | S.N.Sivanandam
Volume: 5
Issue: 8
Year: 2013





Cloud Computing: Securing Client Data Storage

Author(s): Mrs.Ashwini Prakash Sawant | Prof. Sandeep Vanjale | Mrs. Mousami Vanjale
Volume: 5
Issue: 8
Year: 2013





A Survey on Service Oriented Architecture and Metrics to Measure Coupling

Author(s): D. Vinay Babu | Manoj Prabhakar Darsi
Volume: 5
Issue: 8
Year: 2013





Analysis on Image Processing of Human Hip Joints during Lifting Using MAT Lab and ANSYS

Author(s): N. Sundaram | Dr. P. Suresh
Volume: 5
Issue: 8
Year: 2013





A Framework For An E-Learning System Based on Semantic Web

Author(s): Tarek M. Mahmoud | Tarek Abd-El-Hafeez | Ahmed Badawy
Volume: 5
Issue: 8
Year: 2013





Locating ATMs in Urban Areas

Author(s): Mehdi MoradiTabar | Omid Bushehrian | Reza Askari Moghadam
Volume: 5
Issue: 8
Year: 2013





WebParF:A Web Partitioning Framework for Parallel Crawler

Author(s): Sonali Gupta | Komal Bhatia | Pikakshi Manchanda
Volume: 5
Issue: 8
Year: 2013





The Imperative Information Security Management System Measures In the Public Sectors of Ghana. A Case Study of the Ghana Audit Service

Author(s): Dr Ing Edward Opoku-Mensah | Christopher A Abilimi | Linda Amoako
Volume: 5
Issue: 8
Year: 2013





Modelisation of the maintenanceproduction couple by a graph of scheduling

Author(s): IDRISSI BADR | EL KIHEL BACHIR | Mohammed BADAOUI
Volume: 5
Issue: 8
Year: 2013





Study of Speaker’s Emotion Identification for Hindi Speech

Author(s): Sushma Bahuguna | Y.P Raiwani
Volume: 5
Issue: 7
Year: 2013





Fingerprint Verification System Using Support Vector Machine

Author(s): S. Adebayo Daramola | Tola Sokunbi | A.U Adoghe
Volume: 5
Issue: 7
Year: 2013





AN ARTIFICIAL FISH SWARM OPTIMIZED FUZZY MRI IMAGE SEGMENTATION APPROACH FOR IMPROVING IDENTIFICATION OF BRAIN TUMOUR

Author(s): R.Jagadeesan | S. N. Sivanandam
Volume: 5
Issue: 7
Year: 2013





NODE ADDRESSING SCHEMES FOR SCALABLE ROUTING IN HIERARCHICAL WSN

Author(s): Mr.GANESH.S.PISE | Mr. VINOD. V.KIMBAHUNE
Volume: 5
Issue: 7
Year: 2013





Hierarchical classification of web content using Naïve Bayes approach

Author(s): Neetu
Volume: 5
Issue: 5
Year: 2013





Distance Based Fault detection in wireless sensor network

Author(s): Ayasha Siddiqua | Shikha Swaroop | Prashant Krishan | Sandip Mandal
Volume: 5
Issue: 5
Year: 2013





Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network

Author(s): Shikha Swaroop | Ashish Kumar
Volume: 5
Issue: 5
Year: 2013





Performance Evaluation of CPU-GPU communication Depending on the Characteristic of Co-Located Workloads

Author(s): Dongyou Seo | Shin-gyu Kim | Hyeonsang Eom | Heon Y. Yeom
Volume: 5
Issue: 5
Year: 2013





An Analysis and Knowledge Representation System to attain the genuine web user usage behavior

Author(s): V.V.R. Maheswara Rao | Dr. V. Valli Kumari
Volume: 5
Issue: 5
Year: 2013





A Bee-Hive Optimization Approach to Improve the Network Lifetime in Wireless Sensor Networks

Author(s): S. Bhuvaneshwari | P.S. Balamurugan
Volume: 5
Issue: 5
Year: 2013





Cryptanalysis of Vigenere Cipher using Particle Swarm Optimization with Markov chain random walk

Author(s): Aditi Bhateja | Shailender Kumar | Ashok K. Bhateja
Volume: 5
Issue: 5
Year: 2013





Massive Open Online Courses : A New Dawn for Higher Education?

Author(s): Sara Ibn El Ahrache | Hassan Badir | Yassine Tabaa | Abdellatif Medouri
Volume: 5
Issue: 5
Year: 2013





Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Author(s): Dr.G.Mary Jansi Rani | Dr. S. Arumugam
Volume: 5
Issue: 5
Year: 2013





Novel Time Aware Regression Testing Technique

Author(s): Harsh Bhasin | Praveen | Anju Gera
Volume: 5
Issue: 5
Year: 2013





Application of fuzzy-AHP extent analysis to determine the relative importance of risk factors in operative mortality after Coronary Artery Bypass surgery

Author(s): Mahyar Taghizadeh Nouei | Ali Vahidian Kamyad | Somayeh Ghazalbash | MahmoodReza Sarzaeem
Volume: 5
Issue: 5
Year: 2013





A Survey : Code Optimization using Refactoring

Author(s): Piyush Chandi
Volume: 5
Issue: 5
Year: 2013





Cryptography on Android Message Applications – A Review

Author(s): Nishika | Rahul Kumar Yadav
Volume: 5
Issue: 5
Year: 2013





Web Miner: A Tool for Discovery of Usage Patterns From Web Data

Author(s): Roop Ranjan | Sameena Naaz | Neeraj Kaushik
Volume: 5
Issue: 5
Year: 2013





DESIGN AND SIMULATION OF MULTIBAND PLANAR INVERTED-F ANTENNA FOR MOBILE PHONE APPLICATIONS

Author(s): Abhay Sharma | R.P.S. Gangwar | Shakti S Chauhan
Volume: 5
Issue: 5
Year: 2013





Human Age Prediction and Classification Using Facial Image

Author(s): Sithu Ubaid | Dr. Shyama Das | Imthiyas M.P.
Volume: 5
Issue: 5
Year: 2013





FRAUDULENT ACTIVITIES USING VIRTUAL MEETINGS

Author(s): Aamo Iorliam | Anne James
Volume: 5
Issue: 5
Year: 2013





Implementation of Neural Network with a variant of Turing Machine for Traffic Flow Control

Author(s): Rashmi Sehrawat | Honey Malviya | Vanditaa Kaul
Volume: 5
Issue: 5
Year: 2013





Efficient Parallel Data Processing in the Cloud

Author(s): THANAPAL.P | NISHANTHI.S.P
Volume: 5
Issue: 5
Year: 2013





A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection

Author(s): Sukhpreet Kaur | Geetanjali babbar
Volume: 5
Issue: 5
Year: 2013





Principles of Video Segmentation Scenarios

Author(s): M. R. KHAMMAR | YUNUSA ALI SAI’D | M. H. MARHABAN | F. ZOLFAGHARI
Volume: 5
Issue: 5
Year: 2013





A Model Driven approach for Applicationspecific Mismatch Detection

Author(s): Amit Raj
Volume: 5
Issue: 5
Year: 2013





Analysis and diagnosis of the different defects of asynchronous machines by vibration analysis

Author(s): Abdelkader BENBOUAZA | Bachir ELKIHEL | Fabienne DELAUNOIS
Volume: 5
Issue: 4
Year: 2013





SOFTWARE ARCHITECTURE BASED REGRESSION TESTING

Author(s): Harsh Bhasin | Ankush Goyal | Deepika Goyal
Volume: 5
Issue: 4
Year: 2013





Analyzing the Critical Issues of Mobile Users in Cloud Computing

Author(s): Geetha Krishnamoorthy
Volume: 5
Issue: 4
Year: 2013





Extraction and Recognition of Text From Digital English Comic Image Using Median Filter

Author(s): S.Ranjini | Dr.M.Sundaresan
Volume: 5
Issue: 4
Year: 2013





Two-Level Dynamic Load Balancing Algorithm Using Load Thresholds and Pairwise Immigration

Author(s): Hojiev Sardor Qurbonboyevich | Tae-Young Choe
Volume: 5
Issue: 4
Year: 2013





Deep Webpage Classification and Extraction (DWCE)

Author(s): Meenakshi Sharma | Supriya
Volume: 5
Issue: 4
Year: 2013




