PRE-IDEALS AND NEW TOPOLOGIES USING FUZZY SETS

Author(s): M. MARY VICTORIA FLORENCE | Dr.R.Alagar
Volume: 4
Issue: 5
Year: 2013





STUDY AND PERFORMANCE ANALYSIS OF THE WYLLIE’S LIST RANKING ALGORITHM USING VARIOUS PARALLEL PROGRAMMING MODELS

Author(s): B. Muni Lavanya
Volume: 4
Issue: 5
Year: 2013





SERVICE-ORIENTED CLOUD ARCHITECTURE SCHEMA TO BRIDGE GAP BETWEEN STUDENT, STAFF AND ACADEMIA

Author(s): Ravulakollu Kiran Kumar | Pankaj Chejara
Volume: 4
Issue: 5
Year: 2013





Concert Investigation of Novel Deterministic Interleaver for OFDM-IDMA System

Author(s): A. Mary Juliet | S.Jayashri
Volume: 4
Issue: 5
Year: 2013





Automated GUI Test Cases Generation with Optimization Algorithm using a Model Driven Approach

Author(s): Prabhu.J | Dr.N.Malmurugan
Volume: 4
Issue: 5
Year: 2013





Functional Verification of Enhanced RISC Processor

Author(s): SHANKER NILANGI | SOWMYA L
Volume: 4
Issue: 5
Year: 2013





AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING

Author(s): S. Prince Mary | E. Baburaj
Volume: 4
Issue: 5
Year: 2013





Searching SNT in XML Documents Using Reduction Factor

Author(s): Mary Posonia A | Dr V L Jyothi
Volume: 4
Issue: 5
Year: 2013





A SURVEY ON EYE-GAZE TRACKING TECHNIQUES

Author(s): H.R. Chennamma | Xiaohui Yuan
Volume: 4
Issue: 5
Year: 2013





MRI BRAIN IMAGE SEGMENTATION TECHNIQUES - A REVIEW

Author(s): D.SELVARAJ | R.DHANASEKARAN
Volume: 4
Issue: 5
Year: 2013





REGULATED RR-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS

Author(s): Kirubakaran M.K | Dr.Sankar ram N
Volume: 4
Issue: 5
Year: 2013





ANONYMIZATION BASED ON NESTED CLUSTERING FOR PRIVACY PRESERVATION IN DATA MINING

Author(s): V.Rajalakshmi | G.S.Anandha Mala
Volume: 4
Issue: 3
Year: 2013





REGRESSION TESTING : TABU SEARCH TECHNIQUE FOR CODE COVERAGE

Author(s): T.Prem Jacob | Dr.T.Ravi
Volume: 4
Issue: 3
Year: 2013





Congestion in Wireless Sensor Networks and Mechanisms for Controling Congestion

Author(s): Raheleh Hashemzehi | Reza Nourmandipour | Farokh koroupi
Volume: 4
Issue: 3
Year: 2013





PUBLISHING PATIENT DATA SET SECURELY THROUGH DIFFERENTIAL PRIVACY VIA WAVELET TRANSFORMS

Author(s): Mr. P.M.GAVALI | Prof. P.C.BHASKAR
Volume: 4
Issue: 2
Year: 2013





IMPLEMENTATION OF FUZZY MULTI OBJECTIVE LINEAR PROGRAMMING FOR DECISION MAKING AND PLANNING UNDER UNCERTAINTY

Author(s): C.KAVITHA | C.VIJAYALAKSHMI
Volume: 4
Issue: 2
Year: 2013





Solving Scheduling problems using Selective Breeding Algorithm and Hybrid Algorithm

Author(s): P.Sriramya | B.Parvathavarthini | M.Chandrasekaran
Volume: 4
Issue: 2
Year: 2013





Moving Object Tracking Techniques: A Critical Review

Author(s): Sandeep Kumar Patel | Agya Mishra
Volume: 4
Issue: 2
Year: 2013





Comparative study of security parameters by Cloud Providers

Author(s): Manish Kumar Aery | Sumit Gupta
Volume: 4
Issue: 2
Year: 2013





COHERENCE PROPERTY ESTIMATION FOR VARIOUS OCEAN DEPTHS

Author(s): V.G.Sivakumar | Dr.V.Rajendran
Volume: 4
Issue: 2
Year: 2013





Software Architecture modeling framework using UML

Author(s): R. Aroul canessane | Dr. S. Srinivasan
Volume: 4
Issue: 2
Year: 2013





CENTRALIZED RELIABILITY INDEX TECHNIQUE FOR CONGESTION CONTROL IN WIRELESS SENSOR NETWORKS

Author(s): Srinivasan G | Dr.Murugappan S
Volume: 4
Issue: 2
Year: 2013





PERFORMANCE EVALUATION OF CONTENT BASED IMAGE RETRIEVAL FOR MEDICAL IMAGES

Author(s): SASI KUMAR. M | Dr. Y.S. KUMARASWAMY
Volume: 4
Issue: 2
Year: 2013





PERFORMANCE EVALUATION OF IMAGE COMPRESSION FOR MEDICAL IMAGE

Author(s): Loganathan R. | Dr.Y.S.Kumaraswamy
Volume: 4
Issue: 2
Year: 2013





JOINT CHANNEL ESTIMATION AND DECODING OF RAPTOR CODE ON FADING CHANNEL

Author(s): Saikat Majumder | Shrish Verma
Volume: 4
Issue: 2
Year: 2013





A SURVEY OF TIME SERIES DATA PREDICTION ON SHOPPING MALL

Author(s): Mohammed Ali. Shaik | S.Narasimha Rao | Abdul Rahim
Volume: 4
Issue: 2
Year: 2013





Countering the DDoS Attacks for a Secured Web Service

Author(s): S.Igni Sabasti Prabu | Dr. V.Jawahar Senthil Kumar
Volume: 4
Issue: 2
Year: 2013





A REVIEW PAPER ON MULTIDIMENTIONAL DATA STRUCTURES

Author(s): Kujani. T | Dhanalakshmi. T | Pradha. P
Volume: 4
Issue: 2
Year: 2013





CFD ANALYSIS OF CHEMICAL TRANSPORT IN HUMAN NOSE

Author(s): M.V.SHYLA | K.B. NAIDU
Volume: 4
Issue: 2
Year: 2013





M-BOARD IN AN AD-HOC NETWORK ENVIRONMENT

Author(s): Sharon Panth | Mahesh Jivani
Volume: 4
Issue: 2
Year: 2013





Statistical Analysis of Reliability in edge detection techniques using Optical Coherent Tomography image

Author(s): G MOHANDASS | DR. R. ANANDA NATARAJAN
Volume: 4
Issue: 2
Year: 2013





OCCLUSION VERIFICATION IN FACE DETECTION AND AGE ESTIMATION USING LOCAL BINARY PATTERN AND DTOD CLASSIFIER USING MORPH DATASET

Author(s): P.Karthigayani | Dr.S.Sridhar
Volume: 4
Issue: 1
Year: 2013





APPLICABILITY OF CLOUD COMPUTING IN ACADEMIA

Author(s): Prof. Atul B Naik | Prof. Amarendra Kumar Ajay | Prof. Swapna S Kolhatkar
Volume: 4
Issue: 1
Year: 2013





AN EFFICIENT TEXT CLUSTERING ALGORITHM USING AFFINITY PROPAGATION

Author(s): Kumar Vasantha | Jagadeesh Majji
Volume: 4
Issue: 1
Year: 2013





Performance Evaluation of Dynamic and Static Sensor Node in Wireless Sensor Network

Author(s): Payal T Mahida | Rahil Patel | Parixit Patel | Sanket Mody
Volume: 4
Issue: 1
Year: 2013





Road network analysis in Neyveli Township, Cuddalore District by using Quantum GIS

Author(s): K. Ilayaraja
Volume: 4
Issue: 1
Year: 2013





Recognition and Elimination of Malicious Nodes in Vehicular Ad hoc Networks (VANET’s)

Author(s): Prashant Sangulagi | Mallikarjun Sarsamba | Mallikarjun Talwar | Vijay Katgi
Volume: 4
Issue: 1
Year: 2013





A NOVEL APPROACH FOR SELECTION OF BEST SET OF OPTIMIZATION FUNCTIONS FOR A BENCHMARK APPLICATION USING AN EFFECTIVE STRATEGY

Author(s): J.Andrews | Dr.T.Sasikala
Volume: 4
Issue: 1
Year: 2013





Spatial Fuzzy C-Means PET Image Segmentation of Neurodegenerative Disorder

Author(s): A. Meena | K. Raja
Volume: 4
Issue: 1
Year: 2013





DESIGN AND ANALYSIS OF MULTIBAND OFDM SYSTEM OVER ULTRA WIDE BAND CHANNELS

Author(s): G.Joselin Retna Kumar | K.S.Shaji
Volume: 4
Issue: 1
Year: 2013





AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS

Author(s): G.MERLIN SHEEBA | Dr.ALAMELU NACHIAPPAN
Volume: 4
Issue: 1
Year: 2013





AN PROFICIENT LS BASED SWITCHED PREDICTOR FOR LOSSLESS CONFINING OF 4-D MEDICAL

Author(s): UTSAV THAKAR | ROHIT SRIVASTAVA
Volume: 4
Issue: 1
Year: 2013





DESIGN OF MODULO-6-COUNTER USING CARBON NANOTUBE FIELD EFFECT TRANSISTOR

Author(s): V.Saravanan | V.Kannan
Volume: 3
Issue: 5
Year: 2012





A FREQUENT DOCUMENT MINING ALGORITHM WITH CLUSTERING

Author(s): Mr. Rakesh Kumar Soni | Prof. Neetesh Gupta | Prof. Amit Sinhal
Volume: 3
Issue: 5
Year: 2012





DETERMINING THE NUMBER OF CLUSTERS FOR A K-MEANS CLUSTERING ALGORTIHM

Author(s): Abhijit Kane
Volume: 3
Issue: 5
Year: 2012





7TH CENTURY ANCIENT TAMIL CHARACTER RECOGNITION FROM TEMPLE WALL INSCRIPTIONS

Author(s): Rajakumar S. | Dr.Subbiah Bharathi V.
Volume: 3
Issue: 5
Year: 2012





COMPONENT TESTING USING FINITE AUTOMATA

Author(s): Damini Verma | Karambir
Volume: 3
Issue: 5
Year: 2012





Confidentiality and Availability of Data Warehouses in the Cloud Computing System

Author(s): NDINGA YESO SALAZAR | Hu Jiming
Volume: 3
Issue: 5
Year: 2012





MOMENT AND DENSITY BASED HADWRITTEN MARATHI NUMERAL RECOGNITION

Author(s): S. M. Mali
Volume: 3
Issue: 5
Year: 2012




