Voice Recognition System using Template Matching

Author(s): Luqman Gbadamosi
Volume: 3
Issue: 5
Year: 2013





Channel Aware Mac Protocol for Maximizing Throughput and Fairness

Author(s): G. Suseendran | E. Chandrasekaran
Volume: 3
Issue: 5
Year: 2013





Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sensor Networks

Author(s): Mrs. U. Urathal alias Sri Swathiga | Dr. C. Chandrasekar
Volume: 3
Issue: 4
Year: 2013





A Review and Analysis on Mobile Application Development Processes using Agile Methodologies

Author(s): Harleen K. Flora | Dr. Swati V. Chande
Volume: 3
Issue: 4
Year: 2013





A Study of Routing Techniques in Intermittently Connected MANETs

Author(s): S. Ramesh | P. Ganesh Kumar
Volume: 3
Issue: 3
Year: 2013





An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System

Author(s): P. Neelakantan
Volume: 3
Issue: 3
Year: 2013





A Survey on Tools used in Web Harvesting and a Methodology to Extract Data from Facebook

Author(s): Karuna Gull | Akshata Angadi | Dr. Santoshkumar Gandhi | Santoshkumar B. Shali
Volume: 3
Issue: 3
Year: 2013





The Design of Cognitive Social Simulation Framework using Statistical Methodology in the Domain of Academic Science

Author(s): V. Maniraj | R. Sivakumar
Volume: 3
Issue: 3
Year: 2013





Improving the Efficiency of Spectral Subtraction Method by combining it with Wavelet Thresholding Technique

Author(s): G. R. Mishra | Saurabh Kumar Mishra | Akanksha Trivedi | O.P. Singh | Satish Kumar
Volume: 3
Issue: 3
Year: 2013





A PSO-Based Subtractive Data Clustering Algorithm

Author(s): Mariam El-Tarabily | Rehab Abdel-Kader | Mahmoud Marie | Gamal Abdel-Azeem
Volume: 3
Issue: 2
Year: 2013





An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positioning Systems

Author(s): Jalal Atoum | Ishraq Al-Fataftah
Volume: 3
Issue: 2
Year: 2013





Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Network

Author(s): Angshuman Ray | Sourav Mukhopadhyay | Bimal Datta
Volume: 3
Issue: 1
Year: 2013





Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks

Author(s): Shiva Prasad Kaleru | Damodaram Avula
Volume: 3
Issue: 1
Year: 2013





Ant Colony with Colored Pheromones Routing for Multi Objectives Quality of Services in WSNs

Author(s): Fatemeh Rismanian Yazdi
Volume: 3
Issue: 1
Year: 2013





Design a New Image Encryption using Fuzzy Integral Permutation with Coupled Chaotic Maps

Author(s): Yasaman Hashemi
Volume: 3
Issue: 1
Year: 2013





From Physical to Virtual Wireless Sensor Networks using Cloud Computing

Author(s): Maki Matandiko Rutakemwa
Volume: 3
Issue: 1
Year: 2013





A Conceptual Model for Ontology Based Learning

Author(s): Touraj Banirostam | Kamal Mirzaie | Mehdi N. Fesharaki
Volume: 2
Issue: 6
Year: 2012





Can “Feature” be used to Model the Changing Access Control Policies?

Author(s): K.Shantha Kumari
Volume: 2
Issue: 6
Year: 2012





Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?

Author(s): S.M. Vidanagamachchi | S.D. Dewasurendra | R.G. Ragel
Volume: 2
Issue: 6
Year: 2012





Ontology Based Information Extraction for Disease Intelligence

Author(s): Prabath Chaminda Abeysiriwardana | Saluka R. Kodituwakku
Volume: 2
Issue: 6
Year: 2012





A Comparative Study of Image Compression Algorithms

Author(s): Kiran Bindu | Anita Ganpati | Aman Kumar Sharma
Volume: 2
Issue: 5
Year: 2012





A Robust Cryptographic System using Neighborhood-Generated Keys

Author(s): Samuel King Opoku
Volume: 2
Issue: 5
Year: 2012





A Threshold Secure Data Sharing Scheme for Federated Clouds

Author(s): K.Venkataramana | Dr. M. Padmavathamma
Volume: 2
Issue: 5
Year: 2012





Study of Influencing Factors of Tender Evaluation: An Evidential Reasoning Approach

Author(s): Smita Sarker | Mohammad Salah Uddin Chowdury | Pulok Deb
Volume: 2
Issue: 5
Year: 2012





Secure Electronic Lock using PIC 16f628a Microcontroller

Author(s): Muhanad Hayder Mohammed
Volume: 2
Issue: 5
Year: 2012





Development of an E-Learning System Incorporating Semantic Web

Author(s): Khurram Naim Shamsi | Zafar Iqbal Khan
Volume: 2
Issue: 5
Year: 2012





Academic Talent Model Based on Human Resource Data Mart

Author(s): Mahani Saron | Zulaiha Ali Othman
Volume: 2
Issue: 5
Year: 2012





A Survey on Clustering Techniques for Wireless Sensor Network

Author(s): Rudranath Mitra | Diya Nandy
Volume: 2
Issue: 4
Year: 2012





A Data Hiding Techniques Based on Length of English Text using DES and Attacks

Author(s): Sanjay Jadhav | Viddhulata Mohite
Volume: 2
Issue: 4
Year: 2012





A Novel Statistical Method for Thermostable Proteins Discrimination

Author(s): Elham Nikookar | Kambiz Badie | Mehdi Sadeghi
Volume: 2
Issue: 4
Year: 2012





Texture Classification based on Gabor Wavelet

Author(s): Amandeep Kaur | Savita Gupta
Volume: 2
Issue: 4
Year: 2012





Analysis of Handoff techniques used for hybrid networks: Cellular / WLAN

Author(s): Dr. P.B.Mane | Viddhulata Mohite
Volume: 2
Issue: 4
Year: 2012





BIGP- A New Single Protocol that can work as an IGP (Interior Gateway Protocol) as well as EGP (Exterior Gateway Protocol)

Author(s): Isha Gupta
Volume: 2
Issue: 4
Year: 2012





Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clustering

Author(s): P. Rajesh | G. Narasimha | N.Saisumanth
Volume: 2
Issue: 4
Year: 2012





Studies on the Production of Rhamnolipids by Pseudomonas Putida

Author(s): Harikrishna Yadav Nanganuru | Narasimhulu Korrapati
Volume: 2
Issue: 4
Year: 2012





A Study and Comparative Analysis of Conditional Random Fields for Intrusion Detection

Author(s): Deepa Guleria | M.K.Chavan
Volume: 2
Issue: 4
Year: 2012





A Randomized Load Balancing Algorithm In Grid using Max Min PSO Algorithm

Author(s): C.Kalpana | U.Karthick Kumar | R.Gogulan
Volume: 2
Issue: 3
Year: 2012





An Analysis of The Methods Employed for Breast Cancer Diagnosis

Author(s): Mahjabeen Mirza Beg | Monika Jain
Volume: 2
Issue: 3
Year: 2012





A Comparison of Computation Techniques for DNA Sequence Comparison

Author(s): Harshita G. Patil | Manish Narnaware
Volume: 2
Issue: 3
Year: 2012





Optimal Location of Multi-types of FACTS Devices using Genetic Algorithm

Author(s): Jigar S.Sarda | Manish J. Chauhan | Viren B. Pandya | Dhaval G. Patel
Volume: 2
Issue: 3
Year: 2012





A Comparative Study of Recent Ontology Visualization Tools with a Case of Diabetes Data

Author(s): V. Swaminathan | R. Sivakumar
Volume: 2
Issue: 3
Year: 2012





Modified Approach of Hough Transform for Skew Detection and Correction in Documented Images

Author(s): Deepak Kumar | Dalwinder Singh
Volume: 2
Issue: 3
Year: 2012





Cloud GIS for Crime Mapping

Author(s): Harpinder Singh | Rajneesh Kumar | Amardeep Singh | P.K. Litoria
Volume: 2
Issue: 3
Year: 2012





ROI Segmentation for Feature Extraction from Human Facial Images

Author(s): Surbhi | Vishal Arora
Volume: 2
Issue: 3
Year: 2012





A Novel Approach to Genetic Algorithm Based Cryptography

Author(s): Farhat Ullah Khan | Surbhi Bhatia
Volume: 2
Issue: 3
Year: 2012





Ontology Mapping for Dynamic Multiagent Environment

Author(s): M.Jenifer | P.S.Balamurugan | T. Prince
Volume: 2
Issue: 3
Year: 2012





Max Min Fair Scheduling Algorithm using In Grid Scheduling with Load Balancing

Author(s): R.Gogulan | A.Kavitha | U.Karthick Kumar
Volume: 2
Issue: 3
Year: 2012





Unification of Randomized Anomaly in Deception Detection using Fuzzy Logic Under Uncertainty

Author(s): S.Rajkumar | V.Narayani | Dr.S.P.Victor
Volume: 2
Issue: 2
Year: 2012





Duplicate Detection of Records in Queries using Clustering

Author(s): M.Anitha | A.Srinivas | T.P.Shekhar | D.Sagar
Volume: 2
Issue: 2
Year: 2012





Adoption of Parallel Genetic Algorithms for the Solution of System of Equations

Author(s): Shilpa S Babalad | Anand M Shivapuji
Volume: 2
Issue: 2
Year: 2012




