Study on Reconstruction Accuracy using shapiness index of morphological transformations P.Radhakrishnan,King Khalid University, Kingdom of Saudi Arabia
Efficient Schema Based Keyword Search in Relational Databases Myint Myint Thein and Mie Mie Su Thwin,University of Computer Studies, Myanmar
A Strategic Hybrid Technique to Develop a Game Player Randle O.A, Tshwane University of Technology, South Africa
Identification and Investigation of the User Session for Lan Connectivity Via Enhanced Partition Approach of Clustering Techniques K.Gunasekaran,Pavendar Bharathidasan College of Engineering & Technology,India.
Measurement of Semantic Similarity Between Words: A Survey Ankush Maind, Anil Deorankar and Prashant Chatur,Government College of Engineering, Amravati,India
Design and Implementation of Multistage Interconnection Networks for SoC Networks Mahsa Moazez1, Farshad Safaei2 and Majid Rezazadeh2, 1QIAU, Iran and 2Shahid Beheshti University G.C., Iran
Application Whitelisting: Approaches and Challenges Himanshu Pareek, Sandeep Romana and P R L Eswari,Centre for Development of Advanced Computing, India
Data Mining: A prediction Technique for the workers in the PR Department of Orissa (Block and Panchayat) Neelamadhab Padhy and Rasmita Panigrahi, Gandhi Institute of Engineering and Technology, India
Differentiated Services Ensuring QoS on Internet Pawansupreet Kaur, Monika Sachdeva and Gurjeet Kaur, SBS State Technical Campus, India
Recommendation System Using Social Networking Yoti Pareek1, Maitri Jhaveri2, Abbas Kapasi2 and Malhar Trivedi2, 1Gujarat University , India and 2Gujarat Technological University, India
Performance Analysis of Parallel Algorithms on Multi-core System using OpenMP Sanjay Kumar Sharma and Dr. Kusum Gupta ,Banasthali University, India
Criterion based Two Dimensional Protein Folding Using Extended GA T.Kalaichelvi1 and P.Rangarajan2, 1Sathyabama University, India and 2R.M.K.Engineering College,India
Distributed Coverage and Connectivity Preserving Algorithm with Support of Different Sensing Coverage Degrees in 3D Mobile Sensor Actor Networks Mohammad Javad Heydari and Saeid Pashazadeh ,University of Tabriz, Iran
Meta Data Quality Control Architecture in Data Warehousing Ramesh Babu Palepu1 and K V Sambasiva Rao2, 1Amrita Sai Institute of Science & Technology,India and 2MVR College of Engineering,India
Adaptable Fingerprint Minutiae Extraction Algorithm Based-on Crossing Number Method for Hardware Implementation using FPGA Device Sunny Arief Sudiro1 and Rudi Trisno Yuwono2, 1STMIK Jakarta STI&K, Indonesia , 2Gunadarma University, Indonesia.
A General Session Based Bit Level Block Encoding Technique using Symmetric Key Cryptography to Enhance the Security of Network Based Transmission Manas Paul1 and Jyotsna Kumar Mandal2, 1JIS College of Engineering, India, 2Kalyani University, India.
The Survey of Data Mining Applications and Feature Scope Neelamadhab Padhy, Pragnyaban Mishra and Rasmita Panigrahi,GIET ,India.
Energy Efficient Multicast Routing in Manet Sankar M S, and Suganthi B,Dhanalakshmi Srinivasan Engineering College, India.
Talash: A Semantic and Context Based Optimized Hindi Search Engine Nandkishor Vasnik, Shriya Sahu, and Devshri Roy,MANIT, India.
Anti-Synchronization of Hyperchaotic Bao and Hyperchaotic Xu Systems via Active Control Sundarapandian Vaidyanathan,Vel Tech Dr. RR & Dr. SR Technical University, India.
An Optimal Solution for Image Edge Detection Problem using Simplified Gabor Wavelet C.Sujatha1 and D. Selvathi2,1Sethu Institute of Technology, India , 2Mepco Schlenk Engineering College, India.
A Review on Blind Still Image Steganalysis Techniques Using Features Extraction and Pattern Classification Method Monisha Sharma and Swagota Bera, CSVT University,India
The Reduction in Computation Time in the Color Image Decomposition with the Bidimensional Empirical Mode Decomposition Approach Faten Ben Arfia1, Abdelouahed Sabri2, Mohamed Ben Messaoud1 and Mohamed Abid1, 1National Engineering School of Sfax, Tunisia and 2Dhar El mahraz FES. Morocco.
Security Vigilance System through Level Driven Security Maturity Model S. K. Pandey, The Institute of Chartered Accountants of India, India.
Algorithmic and Architectural Optimization of a 3D Reconstruction Medical Images Algorithm for a Hardware Implementation Mili Manel1, Mahmoud Bouraoui2, Boubaker Mohamed1,Ben Abdallah Asma1, Bedoui Mohamed Hedi1 and Akil Mohamed3, 1University of Monastir, Tunisia , 2University of Sousse, Tunisia and 3University of Paris, France.
Probabilistic Interpretation of Complex Fuzzy Set Nilambar Sethi1, S. K. Das2 and D.C. Panda3,1Gandhi Institute of Engineering & Technology, India, 2Berhampur University,India and 3Jagannath Institute of Technology & Management, India.
Factors Affecting Acceptance of Web-Based Training System: Using Extended Utaut and Structural Equation Modeling Thamer A. Alrawashdeh, Mohammad I. Muhairat and Sokyna M. Alqatawnah,Alzaytoonah, University of Jordan, Jordan.
Using Data Mining Techniques for Diagnosis and Prognosis of Cancer Disease Shweta Kharya, Bhilai Institute of Technology, India.
An Efficient Implementation of Tracking Using Kalman Filter for Underwater Robot Application Nagamani Modalavalasa1, G SasiBhushana Rao2 and K. Satya Prasad3, 1SBTET, India, 2Andhra University, India and 3Jawaharlal Nehru Technological University Kakinada, India.
CSHURI - Modified HURI Algorithm for Customer Segmentation and Transaction Profitability Jyothi Pillai1 and O.P.Vyas2, 1Bhilai Institute of Technology, India and 2Indian Institute of Information Technology - Allahabad, India.
A Novel Window Function Yielding Suppressed Mainlobe Width and Minimum Sidelobe Peak Md Abdus Samad, International Islamic University Chittagong,Bangladesh.
M-Fish Karyotyping - A New Approach Based on Watershed Transform Sreejini K S, Lijiya A and V K Govindan, National Institute of Technology-Calicut, India.
Error Performance Analysis Using Cooperative Contention-Based Routing in Wireless Adhoc Networks G.Srimathy, S.A Engineering College, India
Page Number Problem: An Evaluation of Heuristics and its Solution Using a Hybrid Evolutionary Algorithm Dharna Satsangi, Kamal Srivastava and Gursaran, Dayalbagh Educational Institute, India.
Grey Level Co-Occurrence Matrices: Generalisation and Some New Features Bino Sebastian V1,A.Unnikrishnan2 and Kannan Balakrishnan1,1Cochin University of Science and Technology, India and 2Naval Physical and Oceanographic Laboratory, India.
Automatic Identification of Cloud Cover Regions Using Surf Mohamed Mansoor Roomi, R.Bhargavi and T.M.Hajira Rahima Banu, Thiagarajar College of Engineering, India.
Meta-Heuristics Based Arf Optimization for Image Retrieval Darsana B1 and Rajan Chattamvelli2, 1The Oxford College of Engineering-Bangalore, India and 2Periyar Maniammai University, India.
Detection of Concealed Weapons in X-Ray Images Using Fuzzy K-NN Mohamed Mansoor Roomi and R.Rajashankari,Thiagarajar College of Engineering,India.
Gender Recognition System Using Speech Signal Md. Sadek Ali, Md. Shariful Islam and Md. Alamgir Hossain, Islamic University, Bangladesh
Fuzzy Weighted Associative Classifier : A Predictive Technique for Health Care Data Mining Sunita Soni1 and O.P.Vyas2, 1Bhilai Institute of Technology, India and 2Indian Institute of Information Technology - Allahabad, India
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti STBC in Different Modulation Schemes Rifat Ara Shams, M. Hasnat Kabir and Sheikh Enayet Ullah, University of Rajshahi, Bangladesh
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms T. Vijayakumar1, V.Nivedhitha2, K.Deeba2 and M. Sathya Bama2, 1Dr.N.G.P College of Engineering & Technology, India and 2Akshaya College of Engineering & Technology, India
Performance Analysis of Fingerprinting Extraction Algorithm in Video Copy Detection System R.Gnana Rubini, P.Tamije Selvy and P.Anantha Prabha, Sri Krishna College of Technology, India
Biometrics Authentication Technique for Intrusion Detection Systems Using Fingerprint Recognition Smita S. Mudholkar, Pradnya M. Shende and Milind V. Sarode, Amravati University, India
Face Recognition Using Different Local Features with Different Distance Techniques M.Koteswara Rao1, K.Veera Swamy1, K.Anithasheela2 and B.Chandra Mohan3, 1QIS College of Engineering & Technology, India,2JNTUH, India and 3Bapatla Engineering College, India
Biometric Application of Intelligent Agents in Fake Document Detection of Job Applicants Salathiel Bogle and Suresh Sankaranarayanan, University of West Indies, Jamaica
A Model for Remote Access and Protection of Smartphones Using Short Message Service K.S. Kuppusamy, Senthilraja.R and G. Aghila, Pondicherry University, India