default search action
Journal of Computer Science, Volume 10
Volume 10, Number 1, 2014
- G. PadmaPriya, K. Duraiswamy:
An Approach for Text Summarization using Deep Learning Algorithm. 1-9 - Bayu Kanigoro, Widodo Budiharto, Jurike V. Moniaga, Muhsin Shodiq:
Web based Conference System for Intelligence Telepresence robot: a Framework. 10-14 - Jeyanthi Prabhu, V. Jawahar Senthil Kumar:
Wavelet based Content based Image Retrieval using Color and texture Feature Extraction by Gray Level Coocurence Matrix and Color Coocurence Matrix. 15-22 - Hala Albaroodi, Selvakumar Manickam, Parminder Singh Bawa:
Critical Review of OpenStack Security: Issues and Weaknesses. 23-33 - Thiruvengatanadhan Ramalingam, P. Dhanalakshmi:
Speech/Music Classification using wavelet based Feature Extraction Techniques. 34-44 - J. Mannar Mannan, Murugesan Sundarambal, S. Raghul:
Selection of Ontology for Web Service Description Language to Ontology Web Language conversion. 45-53 - Munaisyah Abdullah, Salwani Abdullah, Abdul Razak Hamdan, Roslan Ismail:
Optimization Model of Selective cutting for timber Harvest Planning based on a Simulated Annealing Approach. 54-65 - S. T. Sadish Kumar, N. Kasthuri:
Determination of epileptic Disorder with discrete wavelet transforms and Neural Network Classifier. 66-72 - Aram Baruch González Perez, Jorge Adolfo Ramírez Uresti:
Strategy Patterns Prediction Model. 73-84 - Poonkuzhali Ramadoss, Sanavullah Mohamed Yakub, Sabari Annaji:
A Preemptive Link State Spanning Tree Source Routing Protocol for Mobile Adhoc Networks. 85-90 - Govindaraju Kavya, V. Thulasi Bai:
Design and Implementation of Global Positioning System receiver in field Programmable gate array with Short Message Service. 91-98 - Mustafa M. H. Ibrahim, Mohd. Hasbullah Omar, Adib M. Monzer Habbal, Khuzairi Mohd Zaini:
Analysis of Internet Traffic in Educational Network based on Users' Preferences. 99-105 - V. Saishanmuga Raja, S. P. Rajagopalan:
A Comparative Analysis of Optimization Techniques for Artificial Neural Network in Bio Medical Applications. 106-114 - P. Karthigayani, Sridhar Sundaramoorthy:
Decision Tree based Occlusion Detection in Face Recognition and estimation of Human Age using Back Propagation Neural Network. 115-127 - Adriano Cesar Ribeiro, Alex Roschildt Pinto, Geraldo Francisco Donegá Zafalon, Daniel Fernando Pigatto, Kalinka Castelo Branco, Adriano Mauro Cansian:
An Approach to mitigate Denial of Service Attacks in IEEE 802.11 Networks. 128-137 - Thangavel Prem Jacob, Thavasi Anandam Ravi:
A Novel Approach for Test Suite prioritization. 138-142 - Mohan Raj Velayudhan Kumar, Shriram Raghunathan:
Energy Efficient and Interference Aware Provisioning in Virtualized Server Cluster Environment. 143-156 - Ro'fah Nur Rachmawati, Sufon, Widodo Budiharto:
European Call option Application in Incomplete Market-Analysis and Development. 157-168 - Mohammed Jamil Elhalabi, Selvakumar Manickam, Loai Bani Melhim, Mohammed Anbar, Huda Alhalabi:
A Review of Peer-to-Peer Botnet Detection Techniques. 169-177 - S. Selva Nidhyananthan, R. Shantha Selva Kumari:
A Framework for Multilingual Text- Independent speaker identification System. 178-189
Volume 10, Number 2, 2014
- Prabhu Jayagopal, Malmurugan Nagarajan:
A Novel prioritization Algorithm Model based Test-Suite Generation using Regression Testing. 190-197 - Sabitha Gauni, Kumar Ramamoorthy:
Analysis of Reduction in Complexity of Multiple input- Multiple output-orthogonal frequency Division Multiplexing Systems with carrier frequency offset estimation and correction. 198-209 - Sarfraz Nawaz Brohi, Mervat Adib Bamiah, Suriayati Chuprat, Jamalul-lail Ab Manan:
Design and Implementation of a Privacy Preserved off-Premises Cloud Storage. 210-223 - D. V. Pradeep Sankar, K. Muneeswaran:
Reducing Call Blocking Probability in Hybrid Multicast wavelength Division Multiplexing Networks using Weighted Routing and wavelength Assignment Algorithm. 224-232 - Rawan Baroudy, Bassam Lala:
Computer-Aided Decision System for Refractive surgeries with excimer laser. 233-239 - Mervat Adib Bamiah, Sarfraz Nawaz Brohi, Suriayati Chuprat, Jamalul-lail Ab Manan:
Trusted Cloud Computing Framework for Healthcare Sector. 240-250 - Adi Narayana Reddy Kaipa, Vishnu Vardhan Bulusu, Ramakrishna Reddy Koduru, Durga Prasad Kavati:
A Hybrid Cryptosystem using variable Length sub Key Groups and Byte Substitution. 251-254 - R. Nandhini, N. Devarajan:
A Cross-Layer Scheduler with channel State Information for guaranteed Quality of Service. 255-263 - SitiZubaidahMohd Tumari, Rubita Sudirman, Abdul Hamid Ahmad:
Event-Related potentials Extraction of Working Memory using wavelet Algorithm. 264-271 - Shriram K. Vasudevan, P. L. K. Priyadarsini, Kaushik Velusamy, Balachandran Arumugam:
An Efficient/Enhanced Content based Image Retrieval for a Computational Engine. 272-284 - Victor Ceronmani Sharmila, George Amalanathan:
Construction of Strategic Connected Dominating Set for Mobile Ad Hoc Networks. 285-295 - Hanan Aljuaid, Dzulkifli Mohamad:
Child video Dataset Tool to Develop Object tracking simulates Babysitter Vision robot. 296-304 - Iman A. Saad, Loay Edwar George, Ahmad Tayyar:
Accurate and Fast pupil localization using contrast stretching, Seed Filling and circular Geometrical Constraints. 305-315 - Lau Chee Yong, Tan Tian Swee:
Low footprint High intelligibility Malay speech synthesizer based on Statistical Data. 316-324 - A. Vasanthi, T. Purusothaman:
Optimizing batch Rekeying interval for Secure Group Communication based on Queuing Model. 325-329 - N. Shanmugapriya, R. Nallusamy:
A New Content based Image Retrieval System using GMM and Relevance feedback. 330-340 - Dennise Adrianto:
Comparison using Particle Swarm Optimization and Genetic Algorithm for Timetable Scheduling. 341-346 - Syed Jahangir Badashah, P. Subbaiah:
Design Implementation and Hardware Structure for Image enhancement and surface roughness with Feature Extraction using discrete wavelet transform. 347-352 - Emna Chebbi, Faouzi Benzarti, Hamid Amiri:
An Improvement of Structural Similarity Index for Image Quality Assessment. 353-360 - Zainab Rasheed Mirza, Muhammad Nawaz Brohi:
Integrating Radio frequency identification Technology in Academic Management System. 361-365
Volume 10, Number 3, 2014
- Rathi, Viswanathan:
Two phase Clustering method for LEACH Protocol for Effective Cluster Head Selection. 366-375 - Mohamed Osman Ali Hegazi:
A Conceptual Foundation and Integration Database Designing Model. 376-381 - Sathish Sekar, Shriram K. Vasudevan, Kaushik Velusamy, Y. Mrinal Purohit, Ganesh Alagappan, Nivedita Venkatapathy:
Ubiquitous Palm display and fingertip Tracker System using OpenCV. 382-392 - Mahdi Sahlabadi, Ravie Chandren Muniyandi, Zarina Shukur:
Detecting Abnormal Behavior in Social Network Websites by using a Process Mining Technique. 393-402 - Balachandran Arumugam, P. R. Suresh, Shriram K. Vasudevan, Kaushik Velusamy:
Enhancement of total Technical Life of Aero planes. 403-410 - Govindarajalu Bakthavatsalam, K. M. Mehata:
A Case for Hybrid Instruction Encoding for Reducing Code Size in Embedded System-on-Chips based on RISC Processor Cores. 411-422 - Ali Maqousi, Hussein Al-Bahadili:
Evaluating the Performance of the Location-Aided Routing-1p Route Discovery Algorithm. 423-433 - N. Amutha Prabha, Sagar G. V., Venugopal Manikandan:
Migitation of Inter cell Interference and fading in LTE Systems. 434-442 - Lavanya Sankara Narayanan, Murali Baskaran Venugopal:
An Application Specific Windows Management Instrumentation Architecture for Improving Performance on Wireless Network. 443-452 - Widodo Budiharto:
The Access control System based on linear Discriminant Analysis. 453-457 - K. Jayanthi, V. P. Arunachalam, C. Vasanthanayaki:
Improving the Performance and Reducing bit error rate on Wireless Deep fading Environment receivers. 458-468 - Jagannadham Dulipala, P. Seethalakshmi:
A Novel Architectural Framework for Aggregated subscriber Profile. 469-476 - Khamiss Masaoud S. Algabary, Khairuddin Omar, Mohd Jan Nordin:
3-dimensional Ear Recognition based iterative Closest Point with stochastic Clustering Matching. 477-483 - P. Prakash, G. Kousalya, Shriram K. Vasudevan, Kawshik K. Rangaraju:
Distributive Power Migration and Management Algorithm for Cloud Environment. 484-491 - S. Muthukumar, P. K. Jawahar:
Hit rate Maximization by Logical Cache Partitioning in a Multi-Core Environment. 492-498 - Sevenpri Candra:
Knowledge Management and Enterprise Resource Planning Implementation: a Conceptual Model. 499-507 - A. Arivoli, P. Narayanasamy:
C-Load Power control Protocol-Cross-Layer Design of a Network Layer Load Power control Protocol in Wireless Ad Hoc Networks. 508-520 - S. Chakaravarthi, V. Ramachandran:
Permutation of Httpi and HTTPS in Web Services against Attacks for Security enhancement. 521-529 - Lydia Abdul Hamid, Dzati Athiar Ramli:
Quality based speaker Verification Systems using fuzzy Inference fusion Scheme. 530-543 - B. Hari Krishna, S. Ravi:
Reconfiguring Evolved Circuits using controller: a Real Time Approach. 544-551
Volume 10, Number 4, 2014
- S. Muruganathan, N. Devarajan, D. Chitra, T. Manigandan:
Shape Retrieval through Mahalanobis Distance with Shortest Augmenting Path Algorithm. 552-562 - C. Mahesh, E. Kannan, M. S. Saravanan:
Generalized Regression Neural Network based Expert System for Hepatitis B Diagnosis. 563-569 - Mohammed Hayel Refai, Yuhanis Yusof:
Partial Rule Match for filtering Rules in Associative Classification. 570-577 - Indira Priya Ponnuvel, Dalim Kumar Ghosh, Arputharaj Kannan, Sannasi Ganapathy:
Neuro fuzzy Link based Classifier for the Analysis of Behavior Models in Social Networks. 578-584 - Veenu Mangat, Renu Vig:
An Algorithm for Mining Usable Rules using a Holistic Swarm based Approach. 585-592 - Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
A Refinement of Dijkstra's Algorithm for Extraction of Shortest Paths in generalized Real Time-multigraphs. 593-603 - Abdul Haris Rangkuti:
Content based Batik Image Classification using wavelet transform and fuzzy Neural Network. 604-613 - Shanmugarathinam Ganesarathinam, Kanniappan Vivekanandan:
Cluster based Cache Consistency using Agent Technique in Mobile Environment. 614-622 - R. Vanithamani, G. Umamaheswari:
Speckle Reduction in ultrasound Images using Neighshrink and bilateral filtering. 623-631 - Nidhal Khdhair El Abbadi, Abbas Hussien Miry:
Automatic Segmentation of Skin Lesions using Histogram thresholding. 632-639 - N. Danapaquiame, E. Ilavarasan, Neeraj Kumar:
A Framework to magnitude the Performance and Behavior of Web Services using Ontology. 640-646 - Senthilkumar Chennakrishnan, Midthe Vijayaraghavan Srinath:
Software Process Maturity and Capability Evaluation and its Implementation in the areas of E-Learning Organizations. 647-651 - Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
A New Cloud based supervisory control and Data Acquisition Implementation to Enhance the Level of Security using Testbed. 652-659 - J. Ramya, B. Parvathavarthini:
Feed Forward Back Propagation Neural Network based Character Recognition System for Tamil Palm Leaf Manuscripts. 660-670 - Mutasem Alsmadi, Usama Badawi, Hatem M. Moharram:
Server Failures Enabled JavaSpaces Service. 671-679 - Ranjana Ponraj, George Amalanathan:
Optimizing Multiple travelling Salesman Problem considering the Road Capacity. 680-688 - Abdulkareem Al-Alwani:
A Novel Email response Algorithm for Email Management Systems. 689-696 - Hermawan Syahputra, Agus Harjoko, Retantyo Wardoyo, Reza Pulungan:
Plant Recognition using Stereo Leaf Image using Gray-Level Co-Occurrence Matrix. 697-704 - C. P. Sumathi, Gadi Gayathri Devi:
Automatic Text Extraction from Complex Colored Images using Gamma correction method. 705-715 - Nidal Yousef, Aymen M. Abu-Errub, Ashraf Odeh, Hayel Khafajeh:
An Improved Arabic Word's roots Extraction method using n-Gram Technique. 716-719
Volume 10, Number 5, 2014
- Baseera, Srinath:
Design and Development of a Recommender System for E-Learning Modules. 720-722 - Praveena Murugesan, Thanushkodi Keppanagounder:
Design of Optimal Carry Skip Adder and Carry Skip BCD Adder using Reversible Logic Gates. 723-728 - Auxeeliya Jesudoss, S. V. Kasmir Raja, Ashraph Sulaiman:
A Broadcast based Routing Protocol for Inter-Cluster Data Dissemination in Vehicular Communication. 729-736 - C. G. Ravichandran, S. Venkateshbabu:
High Speed Probabilistic Adder for signal Processing Subsystems. 737-744 - H. Anandakumar, K. Umamaheswari:
Energy Efficient Network Selection using 802.16g based GSM Technology. 745-754 - Julio Cezar Zanoni, Milton Pires Ramos, Cesar Augusto Tacla, Gilson Yukio Sato, Gregory Moro Puppi Wanderley, Emerson Cabrera Paraiso:
Comente+: a Tool for Improving Source Code Documentation using Information Retrieval. 755-762 - K. Nirmala Devi, A. Tamilarasi:
Improving Fault Tolerant Resource Optimized Aware Job Scheduling for Grid Computing. 763-773 - Krishnamoorthy Natarajan, Ramasamy Asokan, Sangeetha Subramanian:
Quantitative Evaluation of Job and Resources for Better Selection to Improve makespan in Grid Scheduling. 774-782 - C. Vivek, S. Audithan:
A Novelty Approach of Spatial Co-Occurrence and discrete Shearlet transform based texture Classification using LPboosting Classifier. 783-793 - Nawzat Sadiq Ahmed, Norizan Mohd Yasin:
Factors affecting Cooperation among Physicians in Sharing Information within the Hospital Environment: a Study of two Hospitals. 794-808 - P. Kalaivani, K. L. Shunmuganathan:
An Agent based Framework for Sentiment Classification of Online Reviews using Ontology. 809-820 - P. G. V. Ramesh, Prita Nair:
Evaluation of Hidden Markov Model based adaptive Provisioning of optical burst switching Networks Amenable for Upgradation to Green Flexigrid Networks. 821-827 - Insaf Bellamine, Hamid Tairi:
Motion Detection using the Space-Time Interest Points. 828-839 - P. Prabhakaran, C. Nelson Kennedy Babu:
Cluster based Architecture for localization and tracking in Wireless Sensor Network. 840-843 - Edy Winarno, Agus Harjoko, Aniati Murni Arymurthy, Edi Winarko:
Improved Real-Time Face Recognition based on three Level wavelet Decomposition-Principal Component Analysis and Mahalanobis Distance. 844-851 - Kittipol Wisaeng, Nualsawat Hiransakolwong, Ekkarat Pothiruk:
Identification of exudates using fuzzy Mathematical Morphology. 852-860 - N. Hema Priya, A. M. Shobana Priya, S. Chandramathi:
Qos based Selection and Composition of Web Services-a fuzzy Approach. 861-868 - Mariana D. C. Lima, Silvia M. Nassar, Pedro Ivo R. B. G. Rodrigues, Paulo José de Freitas Filho, Carlos M. C. Jacinto:
Heuristic discretization method for Bayesian Networks. 869-878 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:
Blood vessel diameter Measurement on retinal Image. 879-883 - V. S. Chandrika, A. Ebenezer Jeyakumar:
On the Detection of Open and Short Fault in switched Reluctance motor with Classification. 884-895
Volume 10, Number 6, 2014
- K. Devaki, V. Murali Bhaskaran:
A Novel Approach to Detect Fissures in Lung CT Images using Marker-based Watershed Transformation. 896-905 - Anthony N. Ilukwe, Yevgen Biletsky:
Hybrid Search and Delivery of Learning Objects System. 906-924 - A. Haris Rangkuti, Agus Harjoko, Agfianto Eko Putra:
Content based Batik Image Retrieval. 925-934 - S. Balaji, N. Vasudevan:
Cuckoo Search-Aided LMS Algorithm for channel estimation in MC-CDMA Systems. 935-947 - VijayaKumar G. Dhas, S. Saibharath, V. Rhymend Uthariaraj:
Using Mobile Agents for Load Balancing in Peer-to-Peer Systems Hosting Virtual Servers. 948-960 - Alaa Mohamed Youssef, Mohamed S. El-Mahallawy, Amr Badr:
Egyptian License plate Recognition using Enhanced Stroke Width Transformation and fuzzy ARTMAP. 961-969 - Binod Kumar Pattanayak, Mamata Rath:
A Mobile Agent based Intrusion Detection System Architecture for Mobile Ad Hoc Networks. 970-975 - Agus Buono, Imas Sukaesih Sitanggang, Mushthofa, Aziz Kustiyo:
A Time-delay Cascading Neural Network Architecture for Modeling Time-dependent predictor in onset Prediction. 976-984 - R. Malini, C. Vasanthanayaki:
Color perception Histogram for Image Retrieval using Multiple Similarity Measures. 985-994 - A. K. Mwinyi, Syed Abdul Rahman Al-Haddad, Shaiful Jahari Bin Hashim, R. Bin Hj Abdullah:
Review on Multi-Agent System Collaboration in Learning Management System Domain by Deploying Wireless Sensor Networks for Student Location Detection. 995-1002 - A. Pandian, Md. Abdul Karim Sadiq:
Authorship Categorization in Email Investigations using Fisher's linear Discriminant method with radial Basis function. 1003-1014 - Seyed Reza Hasani, Zulaiha Ali Othman, Seyed Mostafa Mousavi Kahaki:
Hybrid Feature Selection Algorithm for Intrusion Detection System. 1015-1025 - R. Palson Kennedy, T. V. Gopalakrishnan:
An Effective Optimized Genetic Algorithm for Scalable Information Retrieval from Cloud using Big Data. 1026-1035 - Walaa E. Elhady, Heba A. Elnemr, Gamal Selim:
Implementation and Evaluation of Image Processing Techniques on a Vision Navigation Line follower robot. 1036-1044 - K. Padmapriya, Sridhar Sundaramoorthy:
Finding a residence with All Facilities using Nearest Neighbor Search. 1045-1050 - Jaafar A. Aldhaibani, Abid Yahya, R. Badlishah Ahmad, Rashid A. Fayadh, Ameer H. Abbas:
Reducing transmitted Power of Moving Relay Node in Long-Term Evolution-Advanced Cellular Networks. 1051-1061 - Ahmed Jumaa Alsaket, Mohd Juzaiddin Ab Aziz:
Arabic-Malay Machine Translation using Rule-based Approach. 1062-1068 - L. Ramaparvathy:
A New-Threshold based Job Scheduling for Grid System. 1069-1076 - Amandeep, G. Geetha:
Implications of Bitsum Attack on Tiny Encryption Algorithm and XTEA. 1077-1083 - Maicon A. Sartin, Alexandre C. R. da Silva, Claudinei Kappes:
Image Segmentation with Artificial Neural Network for nutrient deficiency in Cotton crop. 1084-1093
Volume 10, Number 7, 2014
- N. Shylashree, V. Sridhar:
Hardware Realization of High Speed Elliptic Curve Point Multiplication using Precomputation over GF(P). 1094-1106 - P. Nalina, T. Meenambal, R. Sathyanarayan Sridhar:
Slope stability Analysis of Kallar-Coonoor Hill Road Stretch of the Nilgiris. 1107-1114 - Gianluca Costa, Claudia D'Ambrosio, Silvano Martello:
Graphsj 3: a Modern Didactic Application for Graph Algorithms. 1115-1119 - Saravanan Dhavamani, Chandarasekaran Ramasamy, M. G. Sharavana Kumar:
Trustworthy Enabled Reliable Communication Architecture in Mobile Ad Hoc Network. 1120-1129 - R. M. Bommi, S. Selvakumar Raja:
All optical Implementation of High Speed and low Power Reversible Full Adder using semiconductor optical amplifier based Mach-Zehnder Interferometer. 1130-1134 - M. Saravanan, K. Suresh Manic:
Novel Reversible variable Precision Multiplier using Reversible Logic Gates. 1135-1138 - Md. Ashad Alam, Kenji Fukumizu:
Hyperparameter Selection in Kernel Principal Component Analysis. 1139-1150 - P. Vasudevan:
Iterative Dichotomiser-3 Algorithm in Data Mining Applied to Diabetes Database. 1151-1155 - A. Paulin Florence, V. Shanthi:
A Load Balancing Model using Firefly Algorithm in Cloud Computing. 1156-1165 - A. S. Ghabayen, Shahrul Azman Noah:
Exploiting Social Tags to Overcome cold Start Recommendation Problem. 1166-1173 - K. Sridharan, M. Chitra:
Trust based Automatic Query formulation Search on Expert and Knowledge Users Systems. 1174-1185 - N. Rajkumar, K. Senthil Kumar, P. Subha, R. Kavitha:
An Efficient Hybrid Algorithm to Reduce Latency in Ad-Hoc Aggregation. 1186-1196 - Bashar Aubaidan, Masnizah Mohd, Mohammed Albared:
Comparative Study of k-means and k-Means++ Clustering Algorithms on Crime Domain. 1197-1206 - G. Geetha, C. Jayakumar:
Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent. 1207-1215 - C. Balamurugan, M. Viswanathan, T. Abhishek Kumar, G. S. Raj:
Detection of flood Attacks in DTN using rate limiter Technique. 1216-1221 - Nidhal K. El Abbadi, Adil Mohamad, Mohamed AbdulHameed:
Image Encryption based on singular Value Decomposition. 1222-1230 - S. Mohan, K. Venkatachalapathy, P. Sudhakar:
An Intelligent Recognition System for identification of Wood species. 1231-1237 - Oh-Chul Kwon, Jusung Kim, Chang-Gun Lee:
Adaptive I/O switching for Seamless convergence of Smart phones and External I/O Devices. 1238-1248 - Afan Galih Salman, Rojali, Bayu Kanigoro, Nayoko:
Steganography Application Program using the ID3v2 in the MP3 audio File on Mobile phone. 1249-1252 - Maya Eapen, Reeba Korah:
Medical Image Segmentation for Anatomical Knowledge Extraction. 1253-1258 - Nik Mohd Ramli Nik Yusoff, Helmi Zulhaidi Mohd Shafri, Ratnasamy Muniandy, Islam Mohammad Wali:
Development of obstacle avoidance Technique in Web-based Geographic Information System for Traffic Management using Open Source Software. 1259-1268 - Amr Adel, Essam El Fakharany, Amr Badr:
Clustering Tweets using Cellular Genetic Algorithm. 1269-1280 - R. Pugalenthi, T. V. Gopal:
An Efficient and variable interval Rekeying for Dynamic Ad Hoc Multicast Group using Key Path Reduction. 1281-1290 - Shobhanjaly P. Nair, K. Silambarasan, N. Bindhu, R. Srinivasan:
A Bio-Surveillance System using Efficient Algorithm for Information Sharing Applications. 1291-1297 - Hasan Kahtan, Nordin Abu Bakar, Rosmawati Nordin:
Dependability Attributes for increased Security in Component-based Software Development. 1298-1306 - S. Saravanakumar, A. Ebenezer Jeyakumar, K. N. Vijeyakumar:
Removal of High density impulse noise using Morphological based adaptive unsymmetrical trimmed mid-Point filter. 1307-1314 - K. Chandramohan, P. Kamalakkannan:
Traffic controlled-Dedicated Short Range Communication: a Secure Communication using Traffic controlled Dedicated Short Range Communication Model in Vehicular Ad Hoc Networks for Safety Related Services. 1315-1323 - Ayman H. Nasr, Ghada Samy El-Tawel, Ashraf K. Helmy:
Super Resolution for Egyptsat-1 Images with erratic Shift. 1324-1335 - K. Sasi Kala Rani, J. Suganthi:
Improving Quality of Service in IP Networks for Multimedia Applications with Optimal Fragmentation. 1336-1343 - Rosilah Hassan, Amjed Sid Ahmed, Nur Effendy Othman, Samer Sami:
Enhanced encapsulated Security payload a New Mechanism to Secure Internet Protocol Version 6 over Internet Protocol Version 4. 1344-1354
Volume 10, Number 8, 2014
- Ahmed Tobal, Sahar A. Mokhtar:
Weeds identification using Evolutionary Artificial Intelligence Algorithm. 1355-1361 - S. J. Grace Shoba, A. Brintha Therese:
A modified Spatial fuzzy C-means Clustering Algorithm for Detecting Glaucomain retinal fundus Images. 1362-1372 - G. Joselin Retna Kumar, K. S. Shaji:
Neuro fuzzy based Performance Analysis of multiband ultra Wide band orthogonal frequency Division Multiplexing System. 1373-1379 - Waheed Yasin, Hamidah Ibrahim, Nur Izura Udzir, Nor Asilah Wati Abdul Hamid:
Windows Web Proxy Caching simulation: a Tool for simulating Web Proxy Caching under Windows Operating Systems. 1380-1388 - Inass Shahadha Hussein, Mohd Jan Nordin:
Palmprint Verification using Invariant moments based on wavelet transform. 1389-1396 - Dhanasekaran Raghavan, G. Singaravel:
Denial of Service Attack in Distributed Wireless Network by Distributed jammer Network: a Birth-Death Random Process Analysis. 1397-1402 - M. Ravichandran, A. Shanmugam:
Combination of difference subspace and Oppurtunistic Clustering on High dimensional Data. 1403-1410 - Hasan Kahtan, Nordin Abu Bakar, Rosmawati Nordin:
Awareness of Embedding Security Features into Component-based Software Development Model: a Survey. 1411-1417 - R. Lakshmana Kumar, M. S. Irfan Ahmed:
Semantic Enhanced UDDI using OWL-S Profile Ontology for the Automatic Discovery of Web Services in the Domain of Telecommunication. 1418-1422 - Luciane Telinski Wiedermann Agner, Inali Wisniewski Soares, Jean Marcelo Simão, Paulo Cézar Stadzisz:
Applying Black-Box Testing to Model Transformations in the Model Driven Architecture Context. 1423-1427 - Ibrahim Ahmed Al-Baltah, Abdul Azim Abdul Ghani, Wan Nurhayati Wan Ab. Rahman, Rodziah Binti Atan:
Semantic Conflicts Detection of Heterogeneous Messages of Web Services: Challenges and solution. 1428-1439 - Aditya Kurniawan, Bina Bestina Harefa, Surya Sujarwo:
Unified Modeling Language Tools Collaboration for Use Case, class and Activity Diagram Implemented with HTML 5 and JavaScript Framework. 1440-1446 - D. Raghupathikumar, K. Bommanna Raja:
A combined low Latency and Weighted Fair Queuing based Scheduling of an input-Queued Switch. 1447-1457 - B. Swaminathan, Sheila Anand:
A Multi Attribute Ranking Mechanism for Peer-to-Peer Networks. 1458-1465 - Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa:
Performance Analysis of Adhoc on demand Distance Vector Protocol with Blackhole Attack in WSN. 1466-1472 - G. Jayamurugan, P. Kamalakkannan:
Detecting Multiple Intrusion Attacks using Permanent girth Clustering Model in Wireless Sensor Network. 1473-1479 - V. Karthikeyan, S. Ravi, M. Anand:
Robust Memory Management using Real Time Concepts. 1480-1487 - Nidhal K. El Abbadi, Lamis Al Saadi:
Fast Image Matching in Huge Database. 1488-1496 - B. Thenkalvi, S. Murugavalli:
Image Retrieval using certain Block based difference of inverse Probability and certain Block based variation of Local Correlation coefficients Integrated with wavelet moments. 1497-1507 - A. S. Radhamani, E. Baburaj:
Low Complexity Constraints for Energy and Performance Management of Heterogeneous Multicore Processors using Dynamic Optimization. 1508-1516 - Sartika Kurniali:
An Approach to Online Learning using Learning Management System in Higher Education Institution. 1517-1521 - Robertus Nugroho Perwiro Atmojo, Anggita Dian Cahyani:
Recommendations for Development of Online bookstore in Indonesia: a Review from Writer's Perspective. 1522-1530 - M. Nirmala, Ramachandra V. Pujeri:
Performance of Transmission control Protocol Congestioncontrol Algorithms on Teledesic satellites constellations. 1531-1542 - A. Rajesh, Mohan Ellappan:
Classification of Microcalcification based on wave atom transform. 1543-1547 - Asaad Noori Hashim, Zahir M. Hussain:
Novel Image-dependent Quality Assessment Measures. 1548-1560 - P. R. Jasmine Jeni, Asokan Vimala Juliet, A. Messiah Bose:
An Enhanced Route Failure Recovery Model for Mobile Ad Hoc Networks. 1561-1568 - S. P. Karuppiah, S. K. Srivatsa:
An Innovative Morphological Approach for noise removal cum Edge Detection for Digitized Paintings. 1569-1574 - Siham Ezzouak, Mohammed El Amrani, Abdelmalek Azizi:
A variant of Pollard's rho Attack on Elliptic Curve Cryptosystems. 1575-1581 - R. Ganesh Kumar, Y. S. Kumaraswamy:
Spline activated Neural Network for Classifying Cardiac arrhythmia. 1582-1590 - R. Niruban, T. Sree Renga Raja, T. Sree Sharmila:
Novel Color filter array demosaicing in frequency Domain with Spatial Refinement. 1591-1599
Volume 10, Number 9, 2014
- Idris Abubakar Umar, Zurina Mohd Hanapi:
Comparative Study on Energy Consumption in Dynamic Window Secured Implicit Geographic Forwarding Routing Protocol. 1600-1607 - J. Manoranjini, A. Chandrasekar:
Dedicated Trustee detector of Black Holes in MANETs. 1608-1616 - Dahlia Sam, Velankanni Cyril Raj:
A Time Synchronized Hybrid Vehicular Ad Hoc Network of Roadside Sensors and Vehicles for Safe driving. 1617-1627 - Amal Latrache, El Habib Nfaoui, Jaouad Boumhidi:
A Mobile Agent based Approach for Automating “Discover-Compose” Process of Semantic Web Services. 1628-1641 - M. Thangavel, M. Chandrasekaran, M. Madheswaran:
Carotid plaque Classification using Contourlet Features and Support Vector Machines. 1642-1649 - Nafeesa Begum Jeddy, Krishnan Kumar, Vembu Sumathy:
Hierarchical Access control in Dynamic Peer Groups using Symmetric Polynomial and Tree based Group Elliptic Curve Diffie Hellman Scheme. 1650-1665 - Afan Galih Salman, Ro'fah Nur Rachmawati, Hendry:
Euro-USD Prediction Application using Weighted Moving Average on Mobile Device. 1666-1671 - K. Selvarangam, K. Ramesh Kumar:
Selecting Perfect Interestingness Measures by coefficient of variation based Ranking Algorithm. 1672-1679 - C. Prema, D. Manimegalai:
Fusion of Color and modified Weber's Law descriptor based Human Skin Detection. 1680-1691 - A. Selwin Mich Priyadharson, M. S. Saravanan, N. Gomathi, S. Vinson Joshua, A. Mutharasan:
Energy Efficient Flow and Level control in a hydro Power plant using fuzzy Logic. 1703-1711 - R. Kumar, G. Kousalya:
Cognitive Agents based Security Scheme to Handle Routing Loops in Wireless Networks. 1712-1724 - Abdelrafe Elzamly, Burairah Hussin:
A Comparison of Stepwise and fuzzy Multiple Regression Analysis Techniques for Managing Software Project Risks: Analysis phase. 1725-1742 - V. Kaviha, V. Kannan, S. Ravi:
Implementation of Central Queue based Realtime Scheduler for Multiple Source Data Streaming. 1743-1751 - T. Blesslin Sheeba, P. Rangarajan:
A Novel Substitution Box Design for humming Bird-2 against Side channel Attack. 1752-1757 - Bahareh Nakisa, Mohd Zakree Ahmad Nazri, Mohammad Naim Rastgoo, Salwani Abdullah:
A Survey: Particle Swarm Optimization based Algorithms to solve premature convergence Problem. 1758-1765 - S. Thangalakshmi, P. Valsalal:
Congestion Management by Optimal Allocation of Facts controllers using Hybrid fish Bee Optimization. 1766-1775 - S. Yasodha, S. S. Dhenakaran:
Ontopark: Ontology based Page Ranking Framework using Resource Description Framework. 1776-1781 - S. A. A. Fayoumi, A. A. Hegazy, M. A. Belal:
Genetic-based Nutrition Recommendation Model. 1782-1791 - Ananthi Jebaseeli SamuelRaj, Sundararajan Jayapal, Vijayaraghavan Varadharajan:
Network Mobility Supported Proxy Mobile IPv6. 1792-1797 - Tamilarasi Karuppiah, M. Ramakrishnan:
Intelligent Search Engine-based Universal Description, Discovery and Integration for Web Service Discovery. 1798-1810 - Joseph Issa:
Hybrid Implementation and Performance Analysis for High Performance Computation Workload. 1811-1818 - T. Vimala, Uma Rajaram:
Self Powered Energy Aware Internet of Things. 1819-1826 - Arulmurugan Ramu, P. Sengottuvelan:
Classification of Digital Images using fusion elevated order Classifier in wavelet Neural Network. 1827-1838 - Abdellah Idrissi, Fadoua Yakine:
Multicast Routing with Quality of Service Constraints in the Ad Hoc Wireless Networks. 1839-1849 - K. Santhi, B. Parvathavarthini:
Performance Analysis of Randomized Reverse Ad Hoc on demand Distance Vector Routing Protocol in MANET. 1850-1858 - A. Sumathi, B. Vinayagasundaram:
Evaluating an Authenticated Trust based Adhoc on demand Distance Vector for Malicious Nodes Isolation in MANET. 1859-1864 - Rund Mahafdah, Nazlia Omar, Omaia Al-Omari:
Arabic Part of speech Tagging using k-Nearest Neighbour and Naive Bayes Classifiers Combination. 1865-1873 - Jayanthi Gokulakrishnan, V. Thulasi Bai:
Performance of Topology Aware Reliable Routing Protocol for Large Scale Virtual Private Network. 1874-1880 - N. Yamuna Devi, J. Devi Shree:
A Combintorial Tree based Frequent Pattern Mining. 1881-1889
Volume 10, Number 10, 2014
- Iman Ahmed Mahmoud, Amr A. Badr, Mostafa Abdel Azim:
A Comparative Study for rhodopsin protein Folding Problem. 1890-1899 - C. Geetha, M. Ramakrishnan:
Extended-Randomized, Efficient, Distributed: a Dynamic Detection of clone Attacks in Static Wireless Sensor Networks. 1900-1907 - V. Anitha, S. Murugavalli:
Brain tumor Classification based on Clustered discrete cosine transform in Compressed Domain. 1908-1916 - S. A. AlFayoumi, A. A. Hegazy, M. A. Belal:
Influence of Evolutionary Computing on Nutrition Recommendation: a Survey. 1917-1923 - Arun Ambashanker, Palanisamy Nirmal Kumar:
Sopc based Wireless Remote Patient Monitoring using ultra Lightweight Cryptography. 1924-1928 - R. Anitha, Saswati Mukherjee:
Metadata Driven Efficient Key Generation and Distribution in Cloud Security. 1929-1938 - Omid Seifaddini, Azizol Abdullah, Shamala Subramaniam:
An Event Driven simulation for adaptive Gentle Random Early Detection (Agred) Algorithm. 1939-1945 - M. Thirumaran, M. Jannani, P. Dhavachelvan:
Optimized Incident Matching and Auto-Mated Verification of Composition PAT-terns in Long Term Composed Services. 1946-1954 - Sanjay K. Dwivedi, Ajay Kumar Bharti:
Process Mapping for Service Delivery through NSDG in Public Transportation in India. 1955-1960 - Khalid Khalifa, Nazlia Omar:
A Hybrid method using Lexicon-based Approach and Naive Bayes Classifier for Arabic Opinion Question Answering. 1961-1968 - Ratnavel Rajalakshmi:
Supervised Term Weighting Methods for URL Classification. 1969-1976 - S. Chitrakala, S. P. Surendernath, R. Priyatharshini:
Constraint Sovling Engine based Nurse rostering with Intelligent Backtracking. 1977-1984 - M. Elkhal, Abdelghni Lakehal, Khalid Satori:
A New method for 3D Shape Indexing and Retrieval in Large Database by using the Level Cut. 1985-1993 - T. S. Arulananth, T. Jayasingh, S. Ravi:
Tracking the position of Multiple Human Gestures using Contour Mapping Algorithm. 1994-2005 - Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan:
The Security Survey and Anaylsis on supervisory control and Data Acquisition Communication. 2006-2019 - V. Venkatesan, A. Sankar:
Investigation of Student's Personality on Pair Programming to Enhance the Learning Activity in the Academia. 2020-2028 - Mehdi Barati, Azizol Abdullah, Nur Izura Udzir, Mostafa Behzadi, Ramlan Mahmod, Norwati Mustapha:
Intrusion Detection System in Secure Shell Traffic in Cloud Environment. 2029-2036 - Wesam Bhaya, Mehdi Ebady Manaa:
Review Clustering Mechanisms of Distributed Denial of Service Attacks. 2037-2046 - K. Munusamy, R. M. S. Parvathi:
Sensor Network periodical Data assembly using Imbalanced Clustering Energy Efficient Mechanism. 2047-2054 - Yulius Lie, Bens Pardamean:
Critical Success Factors-based Content Management System Development for Small and Medium Size Enterprises. 2055-2059 - Rohollah Moosavi Tayebi, Puteri Suhaiza Sulaiman, Rahmita Wirza, Mohd Zamrin Dimon, Suhaini B. Kadiman, Fatimah Khalid, Samaneh Mazaheri:
A Fast and accurate method for Automatic coronary arterial Tree Extraction in angiograms. 2060-2076 - D. Sumathi, Ramachandra V. Pujeri:
A modified Elliptic Curve Digital Signature Algorithm for Public Verifiability with Data dynamics in Cloud Computing. 2077-2087 - A. Siva Sangari, J. Martin Leo Manickam:
A light-weight Cryptography Analysis for Wireless based Healthcare Applications. 2088-2094 - Nidhal K. El Abbadi, Adil Al Rammahi, Dheiaa Shakir Redha, Mohamed AbdulHameed:
Image Compression based on SVD and MPQ-BTC. 2095-2104 - G. M. Karthik, S. Karthik:
Frequent correlated periodic Pattern Mining for Large Volume Set using Time Series Data. 2105-2116 - Budi Yulianto, Lusiana Citra Dewi:
Beeboard: from Wiimote to Interactive whiteboard Application for Classroom. 2117-2123 - Gabriel Ferreira Araújo, Hendrik T. Macedo, Marco Túlio Chella, Carlos-Alberto Estombelo-Montesco, Marcus Medeiros:
Parallel Implementation of Expectation-maximisation Algorithm for the Training of Gaussian Mixture Models. 2124-2134 - Saini Jacob Soman, S. Murugappan:
A Study of Spam Detection Algorithm on Social Media Networks. 2135-2140 - Rocco Furferi, Lapo Governi, Luca Puggelli, Yary Volpe:
Improved Interactive method for Reco-Vering 2.5D Models from single Images. 2141-2154 - G. M. Rajathi, R. Rangarajan, R. Haripriya, R. Nithya:
Fuzzy Shrink Image denoising using smoothing spline estimation. 2155-2163
Volume 10, Number 11, 2014
- Jesus Friginal:
Emerging Trends in adaptive Computation for MobiQuitous Systems. 2164 - Joachim Perchat, Mikael Desertot, Sylvain Lecomte:
Common Framework: a Hybrid Approach to Integrate Cross-Platform Components in Mobile Application. 2165-2181 - Ahmed Soua, Hossam Afifi:
Adopel: adaptive Data Collection Protocol using Reinforcement Learning for VANETs. 2182-2193 - Luiz Angelo Steffenel, Olivier Flauzac, Andrea Schwertner Charão, Patrícia Pitthan Barcelos, Benhur de Oliveira Stein, Guilherme W. Cassales, Sergio Nesmachnow, Javier Rey, Matias Cogorno, Manuele Kirsch-Pinheiro, Carine Souveyet:
Mapreduce Challenges on Pervasive Grids. 2194-2210 - Britton Wolfe, James Harpe:
Incorporating Prior Knowledge into Temporal difference Networks. 2211-2219 - Anas A. Abboud, Rahmita Wirza O. K. Rahmat, Suhaini B. Kadiman, Mohd Zamrin Dimon, Lili Nurliyana Abdullah, M. Iqbal Saripan, Hasan H. Khaleel:
Cavity Segmentation and Stroke Volume Measurement Methods from Echocardiographic Images: Review. 2220-2231 - Aisha Adel, Nazlia Omar, Adel Al-Shabi:
A Comparative Study of combined Feature Selection Methods for Arabic Text Classification. 2232-2239 - Naragain Phumchusri, Julie L. Swann:
Dynamic Pricing with updated demand for the Sports and Entertainment Ticket Industry. 2240-2252 - Abed Saif Alghawli:
Modelling the switching Link and Mathematical of Actual Traffic. 2253-2259 - S. V. Kasmir Raja, V. Rajitha, Meenakshi Lakshmanan:
Computational Model to Generate Case-Inflected Forms of masculine Nouns for Word Search in Sanskrit E-Text. 2260-2268 - Asmhan Flieh Hassan, Cailin Dong, Zahir M. Hussain:
An Information-Theoretic Image Quality Measure: Comparison with Statistical Similarity. 2269-2283 - R. Vimal Karthick, G. S. Raj, R. Srinivasan, S. Sibi Chakkaravarthy, P. Visu:
Asynchronous Time encoder based quasi-Static modelling for Human Area Network in VANET. 2284-2291 - J. Nithyashri, G. Kulanthaivel:
A Gaussian Mixture Model for Classifying the Human Age using DWT and Sammon Map. 2292-2298 - Marwan Ibrahim Alshar'e, Rossilawati Sulaiman, Mohd Rosmadi Mokhtar, Abdullah Mohd Zin:
Design and Implementation of the TPM User Authentication Model. 2299-2314 - Mutlaq B. Alotaibi:
Exploring Users' Attitudes and Intentions toward the Adoption of Cloud Computing in Saudi Arabia: an Empirical Investigation. 2315-2329 - K. G. Madhwaraj:
Empirical Comparison of two Metrics Suites for Maintainability Prediction in packages of Object-Oriented Systems: a Case Study of Open Source Software. 2330-2338 - Nada A. Rasheed, Mohd Jan Nordin:
A Polynomial function in the Automatic Reconstruction of Fragmented Objects. 2339-2348 - M. Sujitha, V. Kannan, S. Ravi:
Rtos Implementation of non-linear System using Multi Tasking, Scheduling and Critical Section. 2349-2357
Volume 10, Number 12, 2014
- Tan Yan, Liudmila Ulanova, Ye Ouyang, Fengyuan Xu:
Data Mining in Time Series: Current Study and Future Trend. 2358-2359 - Rahib H. Abiyev:
Facial Feature Extraction Techniques for Face Recognition. 2360-2365 - Fawaz S. Al-Anzi, Shafiullah Khan:
Wireless Mesh Network Cross-Layer Intrusion Detection. 2366-2373 - Carmen Joham, Majharul Talukder, Mohammed Aseeri:
Innovation through a Self-Organization Lens. 2374-2382 - Oi-Mean Foong, Jing-Mei Yong, Suziah Sulaiman, Dayang Rohaya Awang Rambli:
Mobile Health Awareness in pre-Detection of mild Stroke Symptoms. 2383-2394 - Achmad Nizar Hidayanto, Arfian Herbowo, Nur Fitriah Ayuning Budi, Yudho Giri Sucahyo:
Determinant of Customer Trust on E-Commerce and its Impact to Purchase and Word of Mouth Intention: a Case of Indonesia. 2395-2407 - Atieh Khanjani, Wan Nurhayati Wan Ab. Rahman, Abdul Azim Abdul Ghani:
Feature-based Analysis into the Trend of Software Technologies from Traditional to Service Oriented Architecture and SaaS Cloud. 2408-2414 - P. Pradeepa, Ila Vennila:
Multimodal retinal Image Registration using RANSAC Matching and Gradient ICP Algorithm. 2415-2421 - Sri Suwarno, Subanar, Agus Harjoko, Sri Hartati:
Estimation of Fingerprint Orientation field by utilizing Prior Knowledge and Self-Organizing Map. 2422-2428 - Hung-Yi Teng, Chun-Hung Wu, Ren-Hung Hwang:
Optimal Resource Allocation for Layered video Multicasting in WiMAX. 2429-2441 - Rohaya Latip, Zulaile Mabni, Hamidah Ibrahim, Azizol Abdullah, Masnida Hussin:
A Clustering-based Hybrid Replica control Protocol for High Availability in Grid Environment. 2442-2449 - Mohsen Gharakhani, Forough Zarea Fazlelahi, Seyed Jafar Sadjadi:
A robust Optimization Approach for Index tracking Problem. 2450-2463 - Henry Chong, Hantze Sudarma, Ferdinand Ariandy Luwinda, Ikhtiar Faahakhododo, Ford Lumban Gaol:
Wirest Lang Lab: Mobile Platform Language Laboratory based on REST Web Service. 2464-2468 - Mamadou Diop, Chot Hun Lim, Tien Sze Lim, Lee-Yeng Ong:
A Vision-based travelled Distance estimation Algorithm in an indoor Environment using a Mobile robot. 2469-2480 - Qilong Zhang, Fei Qin:
A low-Cost Effective UWB Location System based on frequency synthesis Technology. 2481-2487 - Benfano Soewito, Yonathan Marcellinus, Manik Hapsara:
Secure Wireless Ad Hoc Networks using Zero Knowledge Proof. 2488-2493 - Aslina Baharum, Azizah Jaafar:
Evaluation of ASEAN Mental Models Pattern of Web User-Centered Interface Design using eye-tracking Technology. 2494-2506 - Faraj El Dabee, Romeo M. Marian, Yousef Amer:
A Genetic Algorithm for a simultaneous optimisation of Cost-Risk Reduction under a Just-in-Time Adaption. 2507-2517 - Ika Alfina, Joni Ero, Achmad Nizar Hidayanto, Muhammad Rifki Shihab:
The Impact of Cognitive Trust and E-WOM on Purchase Intention in C2C E-Commerce Site. 2518-2524 - Mohd Jan Nordin, Abdul Aziz K. Abdul Hamid, Sumazly Ulaiman, Rudrusamy U. Gobithaasan:
Radius based Block Local Binary Pattern on T-Zone Face Area for Face Recognition. 2525-2537 - Lee-Yeng Ong, Siong-Hoe Lau, Voon Chet Koo:
A New Approach of Local Feature Descriptors using moment Invariants. 2538-2547 - Ahmad Shukri Mohd Noor, Nur Farhah Mat Zian, Md. Yazid Mohd. Saman:
Circular Neighbor Replication. 2548-2552 - Bakri Yahaya, Rohaya Latip, Azizol Abdullah, Mohamed Othman:
Resource Broker Management by Adopting Self-adaptive Multi-Instance Broker Scheduling in Grid Computing. 2553-2563 - Chot Hun Lim, Tien Sze Lim, Voon Chet Koo:
Implementation of ANFIS for GPS-Aided INS UAV motion Sensing at Short Term GPS Outage. 2564-2575 - Maizura Ibrahim, Hamidah Ibrahim, Azizol Abdullah, Rohaya Latip:
Enhancing the Performance of Advanced Fine-Grained Grid Authorization System. 2576-2583 - Mudiana Binti Mokhsin, Nurlaila Binti Rosli, Suzana Zambri, Nor Diana Ahmad, Saidatul Rahah Hamidi:
Automatic Music Emotion Classification using Artificial Neural Network based on vocal and instrumental Sound Timbres. 2584-2592 - Mohammed A. Bindrees, Robert J. Pooley, Idris Skloul Ibrahim, Diana S. Bental:
How Public organisational Structures Influence Software Development Processes. 2593-2607 - Danu Wiroteurairuang, Sanun Srisuk, Chom Kimpan, Thanwa Sripramong:
K-means based Image denoising using bilateral filtering and total variation. 2608-2618 - Khairi Abdulrahim, Chris Hide, Terry Moore, Chris Hill:
Rotating a MEMS inertial Measurement Unit for a foot-mounted Pedestrian Navigation. 2619-2627 - Siti Fajar Jalal, Masnida Hussin:
Multi-Level Priority-based Scheduling Model in Heterogeneous Cloud. 2628-2635 - Edhi Juwono, Harjanto Prabowo, Dyah Budihastuti, Ford Lumban Gaol:
Aligning IT with Business Model to Perform Organizational Capabilities in Achieving Business Performance. 2636-2639 - Quang Huy Dinh, Nasimul Noman, Hitoshi Iba:
Oscillatory Synthetic biological System Construction using Interactive Evolutionary Computations. 2640-2652 - Bambang Saras Yulistiawan, Harjanto Prabowo, Dyah Budihastuti, Ford Lumban Gaol:
Maturity Model to Measure the Government Institutions of Indonesia (the Environment Bureaucracy of Education) in the Implementation of E-Government. 2653-2657 - Subana Shanmuganathan:
From Data Mining and Knowledge Discovery to Big Data Analytics and Knowledge Extraction for Applications in Science. 2658-2665
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.