A Secure Mechanism for Resilient of Data Mining-Based Fraud Detection

Author(s): K.Rachel Praveena | K.Suresh Babu | G. Sudhakar | Dr. G. Venkata Rami Reddy
Volume: 1
Issue: 3
Year: 2013





Optimizing Data-Oriented Architecture for Generating Random Numbers Uniform with Stack Machines Indeterminate Structure

Author(s): Razieh Yosefpoor | Pouya Derakhshan
Volume: 1
Issue: 3
Year: 2013





Software as a Service, Platform as a Service, Infrastructure as a Service − A Review

Author(s): Sumit Goyal
Volume: 1
Issue: 3
Year: 2013





Application of Rough Set Theory in Data Mining

Author(s): Thabet Slimani
Volume: 1
Issue: 3
Year: 2013





Combining MLP and Using Decision Tree in Order to Detect the Intrusion into Computer Networks

Author(s): Saba Sedigh Rad | Alireza Zebarjad
Volume: 1
Issue: 3
Year: 2013





ICT IN EDUCATION An Expertise towards Quality Teaching

Author(s): Er. Sanjay Agal
Volume: 1
Issue: 3
Year: 2013





E-learning Readiness of Faculty Members at Islamic Azad University Andimeshk

Author(s): Amir Afshe | Farhad KianFar
Volume: 1
Issue: 3
Year: 2013





User Behavior Analysis from Web Log using Log Analyzer Tool

Author(s): Brijesh Bakariya | Ghanshyam Singh Thakur
Volume: 1
Issue: 3
Year: 2013





Review Different File Allocation Table in Operating Systems

Author(s): Azar Mirzaei
Volume: 1
Issue: 3
Year: 2013





Proposing an Optimum Multicasting Routing Algorithm Using Ant Colony for Improving QoS in Wireless Mesh Network

Author(s): Mojtaba Khayat | Mohammad Behrouzian Nejad | Alireza Shahrbanoonezhad | Dina sadat Jalali
Volume: 1
Issue: 3
Year: 2013





Presenting a Hybrid Feature Selection Method Using Chi2 and DMNB Wrapper for E-Mail Spam Filtering

Author(s): Seyed Mostafa Pourhashemi | Alireza Osareh | Bita Shadgar
Volume: 1
Issue: 2
Year: 2013





Rare Events Prediction Using Importance Sampling in a Tandem Network

Author(s): Behrouz Safaiezadeh
Volume: 1
Issue: 2
Year: 2013





Providing a Security Model Based on Service Oriented Architecture in Electronic Banking

Author(s): Sima Emadi | Somayeh MehriArdestani
Volume: 1
Issue: 2
Year: 2013





Checking EABC performance in comparison others cryptography algorithms

Author(s): Hamid Mehdi
Volume: 1
Issue: 1
Year: 2013





Optimization Load Balancing Scheduling Algorithm in Distributed Multi-Agent Systems

Author(s): Maryam Jafari | Hossein SHirazi | Sayed Ali razavi Ebrahimi
Volume: 1
Issue: 1
Year: 2013





Inference System Modeling Using Hybrid Evolutionary Algorithm: Application to breast cancer data set

Author(s): Amin Einipour
Volume: 1
Issue: 1
Year: 2013





Reducing Energy Consumption in Billboards Using Wireless Sensor Networks

Author(s): Zakie Fard Nasiri | Hamid Mehdi
Volume: 1
Issue: 1
Year: 2013





Presentation New Method to Increase Network QOS using OSPF's Link Weight

Author(s): Ali Abulhallaj
Volume: 1
Issue: 1
Year: 2013





PTV: Presenting new way for Proving Traffic Violations system Using Wireless Sensor Networks

Author(s): Azar Mirzaei | Ali Barati
Volume: 1
Issue: 1
Year: 2013





A novel approach for ID distribution problem in Tree-based tag anti-collision protocols of RFID systems

Author(s): Milad HajMirzaei
Volume: 1
Issue: 1
Year: 2013




