Performance Evaluation of Ontology and Fuzzybase CBIR

Author(s): Tajman sandhu | Parminder Singh
Volume: 4
Issue: 3
Year: 2013





The Verification of Virtual Community Member's Socio-Demographic Profile

Author(s): Fedushko Solomia | Peleschyshyn Oksana | Peleschyshyn Andriy | Syerov Yuriy
Volume: 4
Issue: 3
Year: 2013





A Model to Compare the Degree of Refactoring Opportunities of Three Projects Using A Machine Algorithm

Author(s): Gauri Khurana | Sonika Jindal
Volume: 4
Issue: 3
Year: 2013





CUDA Based Performance Evaluation of the Computational Efficiency of the DCT Image Compression Technique on Both the CPU and GPU

Author(s): Kgotlaetsile Mathews Modieginyane | Zenzo Polite Ncube and Naison Gasela
Volume: 4
Issue: 3
Year: 2013





Rsa Signature: Behind The Scenes

Author(s): Dragan Vidakovic | Dusko Parezanovic | Olivera Nikolic | Jelena Kaljevic
Volume: 4
Issue: 2
Year: 2013





Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts

Author(s): Yu Li | Sheng Zhong
Volume: 4
Issue: 2
Year: 2013





Method-Level Code Clone Modification using Refactoring Techniques for Clone Maintenance

Author(s): E. Kodhai | S. Kanmani
Volume: 4
Issue: 2
Year: 2013





Scaling Transform Methods For Compressing a 2D Graphical image

Author(s): A. J. Rajeswari Joe | N. Rama
Volume: 4
Issue: 2
Year: 2013





Speaker Verification Using Acoustic and Prosodic Features

Author(s): Utpal Bhattacharjee | Kshirod Sarmah
Volume: 4
Issue: 1
Year: 2013





Veritas Mouseion 3d - Technology and Museum Information

Author(s): Janaina Mello | Irla Rocha
Volume: 4
Issue: 1
Year: 2013





Do New Mobile Devices in Enterprises Pose A Serious Security Threat?

Author(s): Ali A Altalbe
Volume: 4
Issue: 1
Year: 2013





Design and Implementation of an IP based authentication mechanism for Open Source Proxy Servers in Interception Mode

Author(s): Tejaswi Agarwal | Mike Leonetti
Volume: 4
Issue: 1
Year: 2013





Two Phase Clandestain Image Encryption

Author(s): V Hemanth | R Praveen Kumar
Volume: 4
Issue: 1
Year: 2013





Secure Cloud Architecture

Author(s): Kashif Munir | Sellapan Palaniappan
Volume: 4
Issue: 1
Year: 2013





A Multi - Population Based Frog - Memetic Algorithm for Job Shop Scheduling Problem

Author(s): Somayeh Kalantari | Mohammad Saniee Abadeh
Volume: 3
Issue: 6
Year: 2012





Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach

Author(s): Meenakshi Sharma | Anil Kumar.Shaw
Volume: 3
Issue: 6
Year: 2012





A Secure Key Transfer Protocol for Group Communication

Author(s): R. Velumadhava Rao | K Selvamani | R Elakkiya
Volume: 3
Issue: 6
Year: 2012





Vector Quantization for Privacy Preserving Clustering in Data Mining

Author(s): D.Aruna Kumari | Rajasekhara Rao | M.Suman
Volume: 3
Issue: 6
Year: 2012





A Study of Image Compression Based Transmission Algorithm Using Spiht for Low Bit Rate Application

Author(s): Ritu Chourasiya | Ajit Shrivastava
Volume: 3
Issue: 6
Year: 2012





Obesity Heuristic, New Way on Artificial Immune Systems

Author(s): M. A. El-Dosuky | M. Z. Rashad | T. T. Hamza | A.H. EL-Bassiouny
Volume: 3
Issue: 6
Year: 2012





Web Mining - A Catalyst For E-Business

Author(s): Abdul Rahaman Wahab Sait | T.Meyappan
Volume: 3
Issue: 6
Year: 2012





Justification of Montgomery Modular Reduction

Author(s): Salem Sherif Elfard
Volume: 3
Issue: 6
Year: 2012





Map /Reduce Design and Implementation of Apriori Algorithm for Handling Voluminous Data - Sets

Author(s): Anjan K Koundinya | Srinath N K, K A K Sharma | Kiran Kumar | Madhu M N | Kiran U Shanbag
Volume: 3
Issue: 6
Year: 2012





A Comparative Study of Root -Based and Stem -Based Approaches for Measuring the Similarity Between Arabic Words for Arabic Text Mining Applications

Author(s): Hanane FROUD | Abdelmonaim LACHKAR | Said ALAOUI OUATIK
Volume: 3
Issue: 6
Year: 2012





Frameworks Between Components And Objects

Author(s): Mohamed Belal | Ayman Khedr | Ahmed Gohar
Volume: 3
Issue: 5
Year: 2012





Autocodecovergen: Prototype Of Data Driven Unit Test Genration Tool That Guarantees 100% Code Coverage For C#

Author(s): Arpit Christi
Volume: 3
Issue: 5
Year: 2012





Dynamic Allocation Method For Efficient Load Balancing In Virtual Machines For Cloud Computing Environment

Author(s): Bhaskar. R | Deepu. S.R | B.S. Shylaja
Volume: 3
Issue: 5
Year: 2012





Justification of Montgomery Modular Reduction

Author(s): Salem Sherif Elfard
Volume: 3
Issue: 5
Year: 2012





Directional Based Watermarking Scheme Using A Novel Data Embedding Approach

Author(s): Y. RaghavenderRao | P. Nikhil | E.Nagabhooshanam
Volume: 3
Issue: 5
Year: 2012





Enhancement Of Improved Balanced LEACH For Heterogeneous Wireless Sensor Networks

Author(s): Yogesh Kuma | Kanwaljit Singh
Volume: 3
Issue: 5
Year: 2012





Generating domain specific sentiment lexicons using the Web Directory

Author(s): Akshay Minocha | Navjyoti Singh
Volume: 3
Issue: 5
Year: 2012





An Integrated ERP with Web Portal

Author(s): Yehia M. Helmy | Mohamed I. Marie | Sara M. Mosaad
Volume: 3
Issue: 5
Year: 2012





An Efficient Integrated Approach for the Detection of Exudates and Diabetic Maculopathy in Colour fundus Images
Author(s): B.Ramasubramanian | G.Mahendran
Volume: 3
Issue: 5
Year: 2012




Comparative Performance Analysis Of Rnsc And Mcl Algorithms On Power-Law Distribution

Author(s): Mousumi Dhara | K. K. Shukla
Volume: 3
Issue: 5
Year: 2012





Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach

Author(s): Meenakshi Sharma | Anil Kumar. Shaw
Volume: 3
Issue: 5
Year: 2012





Analyzing the Efficient Test Order for Integration Testing

Author(s): Reena Dadhich | Sourabh Sehgal
Volume: 3
Issue: 4
Year: 2012





Image Content in Location-Based Shopping Recommender Systems For Mobile Users

Author(s): Tranos Zuva | Sunday O. Ojo | Seleman M. Ngwira | Oludayo O. Olugbara
Volume: 3
Issue: 4
Year: 2012





Implementation of AES as a Custom Hardware using NIOS II Processor

Author(s): Meghana Hasamnis | Priyanka Jambhulkar | S.S. Limaye
Volume: 3
Issue: 4
Year: 2012





'CodeAliker' - Plagiarism Detection on the Cloud

Author(s): Nitish Upreti | Rishi Kumar
Volume: 3
Issue: 4
Year: 2012





Study and Implementation of Advanced Neuroergonomic Techniques

Author(s): B.F.Momin | Mamata S.Kalas
Volume: 3
Issue: 4
Year: 2012





Named Entity Recognition in Turkish Using Association Measures

Author(s): Senem Kumova Metin | Tarik Kisla | Bahar Karaoglan
Volume: 3
Issue: 4
Year: 2012





Privacy Preserving through Segment-Based Visual Cryptography

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Volume: 3
Issue: 4
Year: 2012





A New Approach to Theftware-Efficient Solution

Author(s): Prabhat Kumar | Abhishek, Milan Jain | Niraj Upadhyay | Avinash Thakur
Volume: 3
Issue: 4
Year: 2012





A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks

Author(s): Saeed Fathi Ghiri | Morteza Rahmani | Hassan Almasi
Volume: 3
Issue: 4
Year: 2012





Freeman Code Based Online Handwritten Character Recognition for Malayalam using Backpropagation Neural Networks

Author(s): Amritha Sampath | Tripti C | Govindaru V
Volume: 3
Issue: 4
Year: 2012





Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Based Healthcare Applications

Author(s): Dipti Durgesh Patil | Vijay M. Wadhai
Volume: 3
Issue: 4
Year: 2012





A Novel Method for Obtaining a Better Quality Speech Signal for Cochlear Implants using Kalman with DRNL and SSB Technique

Author(s): Rohini S. Hallikar | Uttara Kumari | K Padmaraju
Volume: 3
Issue: 4
Year: 2012





Availability Of JobTracker Machine In Hadoop/MapReduce Zookeeper Coordinated Clusters

Author(s): Ekpe Okorafor | Mensah Kwabena Patrick
Volume: 3
Issue: 3
Year: 2012





Detecting Phishing Attacks In Purchasing Process Through Proactive Approach

Author(s): S.Arun | D.Ananda | T.Selvaprabhu | B.Sivakumar | P.Revathi | H.Shine
Volume: 3
Issue: 3
Year: 2012




