Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development Ava Clare Marie O. Robles, Mindanao State University, Philippines
A New Algorithm For Cell Tracking Technique Ashraf A. Aly1, Safaai Bin Deris1 and Nazar Zaki2, 1Universiti Teknologi, Malaysia and 2UAE University, UAE
Improving Text Categorization By Using A Topic Model Wongkot Sriurai, Ubon Ratchathani University, Thailand
Cyclic Combination Method For Digital Image Steganography With Uniform Distribution Of Message Rajkumar Yadav, Ravi Saini and Kamaldeep, Maharshi Dayanand University, India
Design, Implementation And Characterization Of Xor Phase Detector For Dpll In 45 Nm Cmos Technology Delvadiya Harikrushna I, Mukesh Tiwari, Jay Karan Singh and Anubhuti Khare, Sri Satya Sai Institute of Science & Technology, India
Controlling The Problem Of Bloating Using Stepwise Crossover And Double Mutation Technique Arpit Bhardwaj, Aditi Sakalle, Harshita Chouhan and Harshit Bhardwaj, RGPV
India
The Expert System Designed To Improve Customer Satisfaction P.Isakki alias Devi1 and S.P.Rajagopalan2, 1Vels University, India and 2GKM College of Engineering & Technology, India
Optimized Performance With Process Chains M. Victoria Hebseeba1 and T. Bhaskara Reddy2, 1 Rayalaseema University, India and 2 S.K. University, India
Computation Of Transformer Losses Under The Effects Of Non-Sinusoidal Currents Amit Gupta and Ranjana Singh, Jabalpur Engineering College, India
Prospective benefits and criticalities of applying Semantic Web techniques in Software Engineering Harvinder, Galgotias College of Engineering and Technology, India
Multi-Touch Screen Interfaces And Gesture Analysis: A Study Mrudula Nimbarte, B. D. C. O. E. Sevagram, India
A Novel Approach For Pass Word Authentication Using Bidirectional Associative Memory A S N Chakravarthy1 , Penmetsa V Krishna Raja 2 , and P S Avadhani3, 1 Sri Aditya Engineering College, India , 2 JNTUK, India and 1 Andhra University, India
Using Triangular Function to Improve Size of Population in Quantum Evolution Algorithm for Fractal Image Compression Amin Qorbani1, Ali Nodehi1 and Saeed Nodehi2, 1 Islamic Azad University, Iran and 2 Mirdamad University, Iran
Overview Of Streaming-Data Algorithms T. Soni Madhulatha, Alluri Institute of Management Sciences, India
Empirical Studies On Machine Learning Based Text Classification Algorithms Shweta C. Dharmadhikari1, Maya Ingle2 and Parag Kulkarni1, 1 EkLat Solutions Pune,India and 2 IIST,India
Fingerprint Image Enhancement By Develop Mehtre Technique Mustafa Salah Khalefa1, Zaid Amin Abduljabar1 and Huda Ameer Zeki2, 1Basra University, Iraq and 2 Shatt Al-arab University College, Iraq
Neural networks approach v/s Algorithmic approach : A study through pattern recognition Namrata Aneja, Dyal Singh College, India
Adaptive Data Stream Management System Using Learning Automata Shirin Mohammadi1, Ali A. Safaei1, Fatemeh Abdi2 and Mostafa S. Haghjoo4, 1Iran University of Science and Technology,
Tehran, Iran and 2Islamic Azad University, Babol, Iran
Pre-Processing Of Medical Documents And Reducing Dimensionality S.Sagar Imambi1 and T.Sudha2, 1TJPS college , India and 2Vikram Simhapuri University , India
Analysis Of Spiht Algorithm For Satellite Image Compression K Nagamani and AG Ananth, R V College of Engineering, India
Cross Lingual Information Retrieval With SMT And Query Mining Suneet Kumar Gupta , Amit Sinha and Mradul Jain, ABES Engineering College, India
Enterprise Integration Using Service Oriented Architecture Oldooz karimi and Nasser modiri, Azad University,Branch Sofiyian
sofiyian, Iran
The Effects on Cells Mobility Due to Exposure to
EMF Radiation Ashraf A. Aly1, Safaai Bin Deris1 and Nazar Zaki2, 1Universiti Teknologi Malaysia, Malaysia and 2UAE University, UAE
Transport Layer Protocols Taxonomy From
Voice Over Ip Perspective Mosleh M. Abu-Alhaj, Ahmed Manasrah, Mahmoud Baklizi and Nibras, Universiti Sains Malaysia, Malaysia
Time complexity analysis of genetic- fuzzy system
for disease diagnosis. Ephzibah.E.P, VIT University, India.
A Novel Approach For Authenticating Textual Or Graphical Passwords Using Hopfield Neural Network
ASN Chakravarthy, P S Avadhani, P. E. S. N Krishna Prasad, N.Rajeev and D.Rajasekhar reddy, Sri Sai Aditya Institute of Science and Technology, Surampalem, India
Security Model For Service-Oriented Architecture
Oldooz Karimi, sofiyan Azad University, Iran,
A Novel Image Segmentation Enhancement Technique Based on Active Contour and Topological Alignments Ashraf A. Aly1, Safaai Bin Deris1 and Nazar Zaki2, 1Universiti Teknologi, Malaysia and 2UAE University, UAE
Power Management During Scan Based Sequential Circuit Testing Reshma.P and M.Geetha Priya, Amrita Vishwa Vidyapeetham University, India
Development of Mechanism for Enhancing Data Security in Quantum Cryptography Ajit Singh and Nidhi Sharma, BPS Mahila Vishwavidyalaya, India
Insider Threat Analysis of Case Based System Dynamics Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China
New Results on the Output Regulation of the Modified Arneodo Chaotic System by State Feedback Control Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India
Spam Detection By Stackelberg Game Alireza Naeimi Sadigh, Sattar Hashemi and Ali Hamzeh, Shiraz University, Iran
Energy Efficient Coverage Problems in Wireless Ad Hoc Sensor Networks D. G. Anand1, H. G. Chandrakanth1 and M. N. Giriprasad2, 1Sri Krishna Institute of Technology, India and 2Jawaharlal Nehru Technological University College of Engineering, India
Medical Image Denoising Using Adaptive Threshold Based on Contourlet Transform S. Satheesh1 and KVSVR Prasad2, 1G. Narayanamma Institute of Technology and Science, India and 2D.M.S.S.V.H. College of Engineering, India
Application of Threshold Techniques for Readability Improvement of Jawi Historical Manuscript Images Hafizan Mat Som1, Jasni Mohamad Zain2 and Amzari Jihadi Ghazali3, 1IKIP International College Taman Gelora, Malaysia, 2University Malaysia Pahang, Malaysia and 3Kolej Profesional Mara Indera Mahkota, Malaysia
Computerized Shape Analysis of Erythrocytes and Their Formed Aggregates in Patients Infected With P.Vivax Malaria R.Renuka Devi1, V.Rajagopal2, M.Senthil kumar1 and G.Magesh1, 1VIT University, India and 2Zonal Entomological Team - Vellore, India
Employing Reverse Polish Notation in Encryption S.S. Dhenakaran, Alagappa University, India
Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms Xu-Ren Luo1, Chen-Hui Jerry Lin1 and Te-Lung Yi2, 1National Defense University, Republic of China and 2China University of Technology, Republic of China
QoS Based User Driven Scheduler for Grid Environment Sanjay Patel1 and Madhuri Bhavsar2, 1SVBIT - Gandhinagar, India and 2Nirma University, India