Periocular Recognition Using Reduced Features

Author(s): Ambika D R, | Radhika K R | D Sehsachalam
Volume: 5
Issue: 4
Year: 2013





GPS Tracking System Coupled With Image Processing in Traffic Signals to Enhance Life Security

Author(s): Manoj Prabhakar k | Manoj Kumar S
Volume: 5
Issue: 4
Year: 2013





Following Car Algorithm With Multi Agent Randomized System

Author(s): Mounir Gouiouez | Noureddine Rais | Mostafa Azzouzi Idrissi
Volume: 5
Issue: 4
Year: 2013





Design and Development of Secure Navigation System for Visually Impaired People

Author(s): Prashant Bhardwaj | Jaspal Singh
Volume: 5
Issue: 4
Year: 2013





A Heuristic Approach for Web-Service Discovery and Selection

Author(s): Achraf Karray | Rym Teyeb | Maher Ben Jemaa
Volume: 5
Issue: 2
Year: 2013





Social Media News: Motivation, Purpose and Usage

Author(s): Samaneh Beheshti-Kashi | Baharak Makki
Volume: 5
Issue: 2
Year: 2013





Pixel Size Reduction Loss-Less Image Compression Algorithm

Author(s): Pralhadrao V Shantagiri | Saravanan K N
Volume: 5
Issue: 2
Year: 2013





Shadow Detection Using Tricolor Attenuation Model Enhanced with Adaptive Histogram Equalization

Author(s): Jyothisree V. | Smitha Dharan
Volume: 5
Issue: 2
Year: 2013





Adaboost Ensemble with Simple Genetic Algorithm for Student Prediction Mode

Author(s): AhmedSharaf ElDen | ElDen1Malaka A. Moustafa2Hany | M. Harb | AbdelH.Emara
Volume: 5
Issue: 2
Year: 2013





Requirements Engineering of a Web Portal Using Organizational Semiotics Artifacts and Participatory Practices

Author(s): Flávia Linhalis Arantes
Volume: 5
Issue: 2
Year: 2013





AN INVESTIGATION OF THE ENERGY CONSUMPTION BY INFORMATION TECHNOLOGY EQUIPMENTS

Author(s): Baharak Makki | Bahador Makki
Volume: 5
Issue: 2
Year: 2013





Performance Analysis of Parallel Pollard's Rho Factoring Algorithm

Author(s): Anjan K Koundinya | Harish G | Srinath N K | Raghavendra G E | Pramod Y V | Sandeep R | Punith Kumar G
Volume: 5
Issue: 2
Year: 2013





An Effective Method for Information Security Awareness Raising Initiatives

Author(s): AliMaqousi | TatianaBalikhina | Michael Mackay
Volume: 5
Issue: 2
Year: 2013





HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES

Author(s): Ibrahim Kabiru Musa | Stuart Walker
Volume: 5
Issue: 2
Year: 2013





An Application Behavior Analysis And Classification System

Author(s): Himanshu Pareek | P R L Eswari | Sarat Chandra Babu
Volume: 5
Issue: 2
Year: 2013





OBTAINING SUPER-RESOLUTION IMAGES BY COMBINING LOW-RESOLUTION IMAGES WITH HIGH-FREQUENCY INFORMATION DERIVEDFROM TRAINING IMAGES

Author(s): Emil Bilgazyev | Nikolaos Tsekos | Ernst Leiss
Volume: 5
Issue: 2
Year: 2013





STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS

Author(s): Maya Samaha Rupert
Volume: 5
Issue: 2
Year: 2013





Developing Mobile Agent for Intrusion Detection

Author(s): Bambang Sugiantoro | Retantyo Wardoyo | Sri Hartati | Jazi Eko Istiyanto
Volume: 5
Issue: 2
Year: 2013





Adaptive Design of Controller and Synchronizer for Lu-Xiao Chaotic System with Unknown Parameters

Author(s): Sundarapandian Vaidyanathan,
Volume: 5
Issue: 1
Year: 2013





Concept-Based Indexing in Text Information Retrieval

Author(s): Fatiha Boubekeur | Wassila Azzoug
Volume: 5
Issue: 1
Year: 2013





An Ontology based Text Mining framework for R&D Project Selection

Author(s): N.Arunachalam | E.Sathya | S.Hismath Begum | M . U m a M a k e s w ar i
Volume: 5
Issue: 1
Year: 2013





Mining Closed Regular Patterns in Data Streams

Author(s): M.Sreedevi | L.S.S.Reddy
Volume: 5
Issue: 1
Year: 2013





Teaching Automated Test Data Generation Tools for C, C++ , and Java Programs

Author(s): Hitesh Tahbildar | Plabita Borbora | G. P. Khataniar
Volume: 5
Issue: 1
Year: 2013





A Neuro-Fuzzy Approach for the Fault Location Estimation of Unsynchronized Two-Terminal Transmission Lines

Author(s): Ramadoni Syahputra
Volume: 5
Issue: 1
Year: 2013





Pre-Segmentation for the Computer Aided Diagnosis System

Author(s): Myat Mon Kyaw
Volume: 5
Issue: 1
Year: 2013





Extended Nymble: Method for Tracking Misbehaving Users Anonymosly While Blocking

Author(s): M.Durga Prasad | P.Chenna Reddy | Banoth Samya
Volume: 5
Issue: 1
Year: 2013





An Evaluation Method of Research on Wearable Wireless Body Area Network in Healthcare

Author(s): Roberto Vito Rodrigues Filho | Renato Freitas Bulcao Neto | Bruno Oliveira Silvestre | Leandro Luis Galdino de Oliveira | Rogerio Orlow de Oliveira | Iwens Gervásio Sene Júnior
Volume: 5
Issue: 1
Year: 2013





A Systematic Mapping Study on Business Process Variability

Author(s): George Valenca | Carina Alves | Vander Alves | Nan Niu
Volume: 5
Issue: 1
Year: 2013





Classification Methods of Skin Burn Images

Author(s): Malini Suvarna | Sivakumar | U C Niranjan
Volume: 5
Issue: 1
Year: 2013





Analysis of Digital Images Using Morphlogical Operations

Author(s): Amalorpavam.G | Harish Naik T | Jyoti Kumari | Suresha M
Volume: 5
Issue: 1
Year: 2013





Correlation Based VMS Placement Resource Provision

Author(s): Zar Lwin Phyo | Thandar Thein
Volume: 5
Issue: 1
Year: 2013





Sobel Edge Detection Method to Identify and Quantify the Risk Factors for Diabetic Foot Ulcers

Author(s): Kunjam Nageswara Rao | P srinivasa Rao | Allam Appa Rao | G R Sridhar
Volume: 5
Issue: 1
Year: 2013





Improving the Management of Cost and Scope in Software Projects Using Agile Practices

Author(s): Mariana de Azevedo Santos | Paulo Henrique de Souza Bermejo | Marcelo Silva de Oliveira | Adriano Olimpio Tonelli | Enio Junior Seidel
Volume: 5
Issue: 1
Year: 2013





Performance Analysis of Kernel-Based Virtual Machine

Author(s): Sudha M | Harish G M | Nandan A | Usha J
Volume: 5
Issue: 1
Year: 2013





Adaptive Backstepping Controller and Synchronizer Design for Arneodo Chaotic System With Unknown Parameters

Author(s): Sundarapandian Vaidyanathan
Volume: 4
Issue: 6
Year: 2013





Multi-Homing Enabled Cognitive Radio Based Inter-Vehicle Communication System

Author(s): Faisal Riaz | Kaleem Ahmed | Iftikhar Ahmad | Muhammad Ibrahim | Samreen Ayaz | Rabia Rauf | Muhammad Kabeer | Naheed Akhtar | Jameel Ahmed | Sadat Dar
Volume: 4
Issue: 6
Year: 2013





Rotation Invariant Color Retrieval

Author(s): Swapna Borde | Udhav Bhosle
Volume: 4
Issue: 6
Year: 2013





Ear Recognition and Occlusion

Author(s): B. S. El-Desoky | M. Z. Rashad | Mahmoud M. Eid | M. El-Kady | Alaa Tharwat
Volume: 4
Issue: 6
Year: 2013





An Efficient Passage Ranking Technique For a QA System

Author(s): Pooja A | Vinodh Krishnan | Geetha Manjunath
Volume: 4
Issue: 6
Year: 2013





Computing Installation Parameters Of CCTV Cameras for Traffic Surveillance

Author(s): Pratishtha Gupta | G. N. Purohit
Volume: 4
Issue: 6
Year: 2013





A Novel and Single Chip Tri-Band Low-Noise Amplifier for Wlan, Wifi and Wimax Receivers

Author(s): I. Akhchaf | S. Khoulji | M. Essaidi | M.L. Kerkeb
Volume: 4
Issue: 6
Year: 2013





Improved Spatial Gray Level Dependence Matrices for Texture Analysis

Author(s): Olfa Ben Sassi | Lamia sellami | Mohamed Ben Slima | Khalil Chtourou | Ahmed Ben Hamida
Volume: 4
Issue: 6
Year: 2013





Denoising of Medical Ultrasound Images Using Spatial Filtering and Multiscale Transforms

Author(s): V N Prudhvi Raj | T Venkateswarlu
Volume: 4
Issue: 6
Year: 2013





R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)

Author(s): Dhananjoy Dey | Noopur Shrotriya | Indranath Sengupta
Volume: 4
Issue: 6
Year: 2013





Accessibility of Information Technologies in the Resting Home

Author(s): Ozlem Cakır
Volume: 4
Issue: 6
Year: 2013





An Experimental Survey Towards Engaging Trustable Hypervisor Log Evidence Within a Cloud Forensic Environment

Author(s): Sean Thorpe
Volume: 4
Issue: 6
Year: 2013





An Information System to Support and Monitor Clinical Trial Process

Author(s): Daniela Luzi | Fabrizio Pecoraro
Volume: 4
Issue: 6
Year: 2013





Design of Physical Games for Learning the Lotus Effect

Author(s): Wernhuar Tarng | Shih-Hsien Tsai | Chih Ming Lin | Chi-Young Lee | Hsin-Hun Liou
Volume: 4
Issue: 6
Year: 2013





Shaping of Location Conscious Information

Author(s): Palson Kennedy .R | Rajashekhara
Volume: 4
Issue: 6
Year: 2013





Design of an Efficient MAC Protocol for Opportunistic Cognitive Radio Networks

Author(s): Mahfuzulhoq Chowdhury | Asaduzzaman | Mohammad Obaidur Rahman | Md. Fazlul Kader
Volume: 4
Issue: 5
Year: 2012




