Volume 2, Problème 5 (2014)

Article spécial

WEBGPSS as a Tool in Business Simulation

  • Laveena C D’Costa, Shilpashri, Sherol Manisha

Article spécial

A Framework for Agricultural Farm-to- Market Supply Chain

  • SumanA Lasrado , Erika EmaSequeira, Alisa D’costa

Article spécial

A Review on Recent Developments in Technology Forecasting

  • Dr. R Sasikumar, Anisha Mohan

Article spécial

Ambiguities in Natural Language Processing

  • Anjali M K, Babu Anto P

Article spécial

Protein Structure and Function Prediction Using Machine Learning Methods ? A Review

  • Hemalatha N., Siddhant Naik, Jeason Rinton Saldanha

Article spécial

Pattern Recognition in Image Processing ? A Study

  • Hemalatha, Jeevan K.A

Article spécial

Development of Prediction Tool for Drought Tolerant Protein in Rice Using Machine Learning Algorithm

  • Annapoorna Shetty, Hemalatha N , Mohammed Moideen Shihab , Brendon Victor Fernandes

Article spécial

Pedestrian Detection-A Comparative Study Using HOG and COHOG

  • Sujith B , Jyothiprakash

Article spécial

Comparative Analysis of Various Algorithms Used in Travelling Salesman Problem

  • Suchetha Vijaykumar, Sushma L Shetty , Saniha Maria Menezes

Article spécial

Recognising Partially Occluded Faces From a Video Sequence

  • Vijayalakshmi A , Pethuru Raj

Article spécial

A Modified Rough Fuzzy ?Clustering - Classification? Model For Gene Expression Data

  • Lt.Thomas Scaria, Dr.T Christopher, Gifty Stephen

Article spécial

Road Network Extraction from High Resolution Satellite Images

  • Srilakshmi D, Nazneen, Mustafa B

Article spécial

Applications of Machine Learning - A Survey

  • Hemalatha N, Larisa, Pradeep

Article spécial

PhzPred ? A Tool for Prediction of Phenazine Synthesizing Genes in Plant Growth Promoting Pseudomonas spp

  • Shilpa S, Anil Paul, Naganeeswaran S, Hemalatha N, Rajesh M.K

Article spécial

Traffic Light Control System Using Image Processing

  • Kavya P Walad, Jyothi Shetty

Article spécial

Statistical Inference and Reconstruction of Gene Regulatory Network from Observational Expression Profile

  • Prof. Shanthi Mahesh, Kavya Sabu, Dr. Neha Mangla, Jyothi G V, Suhas A Bhyratae, Keerthana Muniraju

Article spécial

A New Approach For an Improved Multiple Brain Lesion Segmentation

  • Prof. Shanthi Mahesh, Karthik Bharadwaj N, Suhas A Bhyratae ,Karthik Raju V, Karthik M N

Article spécial

Computational Method for Reconstruction of Gene Regulatory Network Using Microarray Data

  • Shanthi Mahesh, Dr. Neha Mangla, Suhas A Bhyratae, J. Sally Josephine, Chaithra L, Archana B G

Article spécial

Predictive Analytics Using Soft Computing: A Case Study on Forecasting For Indian Automobile Industry

  • Jewel Murel D’Souza, Sheik Sana Begam, Santhosh Rebello

Article spécial

A Framework for Opinion Mining- Root Cause Monitoring the Social System Which Keeps Tracks of Weak Points in Rural Areas

  • Suman A Lasrado, Dr. Vincent Mascarenhas , Pradeepkumar, Abdul Jamali

Article spécial

Ranking of Landmark Images

  • B.Chandirika, S.Selvarani

Article spécial

An Ontology-Based Information Retrieval Model for Domesticated Plants

  • Ruban S, Kedar Tendolkar, Austin Peter Rodrigues, Niriksha Shetty

Article spécial

Comparative Analysis of Various Techniques Used In Managing Big Data

  • Rakesh Kumar, Sanketh S Salian, Suraj Nayak

Article spécial

Optimization Based Data Mining in Business Research

  • Praveen Gujjar J, Dr. Nagaraja R

Article spécial

Discovering Relations among Documents Using Novel Text Retrieval Technique

  • Manjiri Gajanan Ghadi, Carmen Lysandra Pereira , Manimozhi R.

Article spécial

Comparison of Join Algorithms in Map Reduce Framework

  • Mani Bushan, Balaraj J, Oinam Martina Devi

Article spécial

A Survey on Time Series Data Mining

  • Kumar Vasimalla

Article spécial

A Genteel Requirement Engineering for Web Applications

  • S.Mary Helan Felista, S.Selvarani , S. Jebapriya

Article spécial

A Review on Asymmetric Cryptography ? RSA and ElGamal Algorithm

  • AnnapoornaShetty, Shravya Shetty K, Krithika K

Article spécial

A Review on Steganography - Least Significant Bit Algorithm and Discrete Wavelet Transform Algorithm

  • Vanitha T , Anjalin D Souza , Rashmi B, Sweeta DSouza

Article spécial

A Comparative Performance Analysis of DES and BLOWFISH Symmetric Algorithm

  • Srinivas B.L , Anish Shanbhag, Austin Solomon D’Souza

Article spécial

ASH-HEED Protocol for Heterogeneous Wireless Sensor Networks

  • P.Priya, Rupeshsah, P.saravanan ,Dr.J.SenthilKumar

Article spécial

Cryptographic process for Cyber Safeguard by using PGP

  • Bharatratna P. Gaikwad

Article spécial

An Analysis of Cloud Interoperability Standards onVarious Service Models

  • SuchethaVijayakumar, LenitaVelezaSerrao2, Hancel Anacletus D’Souza

Article spécial

Comparative Study of Workflow Scheduling Algorithms in Cloud Computing

  • Santhosh B, Harshitha, Prachi Kaneria A, Dr D.H Manjaiah

Article spécial

Comparative Study of Scheduling and Service Broker Algorithms in Cloud Computing

  • Santhosh B, Raghavendra Naik, Balkrishna Yende, Dr D.H Manjaiah

Article spécial

Survey on Need of Loop Transformations for Automatic Parallelization

  • Nisha, Rafiya Shahana ,Mustafa B

Article spécial

A Critical Review on Risk of Cloud Computing in Commercial

  • Bharatratna P. Gaikwad

article de recherche

Survey on Knowledge Discovery in Speech Emotion Detection

  • S.Jagadeesh Soundappan, Dr.R.Sugumar

article de recherche

A Survey on Attacks in Web Usage Mining

  • R.Natarajan, Dr.R.Sugumar

article de recherche

Home Automation and Energy Harvesting In Wireless Sensors Network

  • Sukesha, Harman Preet Kaur

article de recherche

A Hierarchical Approach to Access Control – A Review

  • Sunita Rani Jindal, Sahil Vasisth, Rajwinder Singh

article de recherche

Hybrid Clustering and Classification for Entropy Reduction: A Review

  • Palwinder kaur ,Usvir kaur ,Dr.Dheerendra Singh

article de recherche

Study of Cosmic Intelligence and Human Health

  • Dr.S.Sundaravadivelu,

article de recherche

Performance Analysis for All- Optical Networks Using Wavelength Routing Methods in Different Topologies

  • Santhosh Kumar C, Piruthiviraj.P , Dr. Preeta Sharan

article de recherche

Simulation and Analysis of Blocking Probability Using RWA Algorithm for All- Optical Networks

  • Mohammed Shadab, Piruthiviraj.P, Dr. Preeta Sharan

article de recherche

Network Planning and Engineering for Fiber Optic Transport Systems

  • Bharath Kumar S, N.Jayaraj

article de recherche

A WIRELESS SENSOR NETWORK

  • DR.K.P.KALIYAMURTHIE, D.PARAMESWARI

article de recherche

Performance Analysis of Low Rate WPAN Topologies

  • Arpitha E M, Ramesh T M

article de recherche

Design and Implementation of Efficient Packet Scheduling Algorithm

  • Anusha N, Reema Sharma

article de recherche

EFFICIENT ALLOCATION OF DYNAMIC RESOURCES IN A CLOUD

  • S.THIRUNAVUKKARASU, DR.K.P.KALIYAMURTHIE

article de recherche

A Survey of the Security Use Cases in Big Data

  • Kudakwashe Zvarevashe, Mainford Mutandavari, Trust Gotora

article de recherche

An Introduction of the RIST Framework on Information Security Awareness Practices in the Current Information Age

  • Kudakwashe Zvarevashe, Tinotenda Zwavashe, Cephas Mawere

article de recherche

Comparative Modeling, Quality Assessment and Validation of HYD1

  • Cephas Mawere, Suresh Kumar G, Shumbeyi Muzondo

article de recherche

Towards More Efficient DSP Implementations: An Analysis into the Sources of Error in DSP Design

  • Tinotenda Zwavashe, Rudo Duri, Mainford Mutandavari

article de recherche

Load Balancing in Structured Peer to Peer Systems

  • DR.K.P.KALIYAMURTHIE, D.PARAMESWARI

article de recherche

Design and Development of Autonomous Ground Vehicle for Wild Life Monitoring

  • J. Anupama, A. Kavitha, S. Harsha, M. Karthick

article de recherche

A Comparative study of Classifiers’ Performance for Gender Classification

  • Santanu Modak , Abhoy Chand Mondal

article de recherche

IMAGE BASED FINGERPRINT VERIFICATION

  • MR.KANNAN SUBRAMANIAN

article de recherche

Approach for Rule Pruning in Association Rule Mining for Removing Redundancy

  • Ashwini Batbarai, Devishree Naidu

article de recherche

A Narrative Approach for Data Preserving Techniques

  • K.S.Gangatharan, M.S.Thanabal

article de recherche

Case Study of Data Mining Models and Warehousing

  • Shivappa M Metagar, Praveenkumar D Hasalkar, Anil S Naik

article de recherche

Use of Symmetric Algorithm for Image Encryption

  • K.Brindha, Ritika Sharma, Sapanna Saini

article de recherche

Data Security in Cloud Using Elliptic Curve Crytography

  • Puneetha C, Dr. M Dakshayini

article de recherche

Energy Efficient Cognitive Radio Hybrid Voting Rule –PSO

  • Parth Gulati, Dr. Rajesh Khanna

article de recherche

A Survey on Process of Isolated Character Recognition

  • Karanbir Kaur,Naresh Kumar Garg

article de recherche

Analysis of Image Demosaicking Algorithms

  • Nivedita Chatterjee, Avinash Dhole

article de recherche

Reduction of PAPR in MIMO-OFDM/A System Using Polyphase Complementary Modulation

  • Balaji Naik.M , Ramana Reddy Gujjula,Bojja Durga Bhavani

article de recherche

Techniques of Node Localization in Wireless Sensor Networks: A Review

  • Lovepreet Singh, Sukhpreet Kaur

article de recherche

Energy Efficiency Techniques for Wireless Sensor Networks: A Review

  • Harshwinder Singh , Navpreet Kaur

article de recherche

Image Enhancement Using Wavelets

  • Shivani Jain, Jyoti Rani

article de recherche

A Survey on the Security Fight against Ransomware and Trojans in Android

  • Tatenda Trust Gotora, Kudakwashe Zvarevashe, Pranav Nandan

article de recherche

Security Issues in ALARM Protocol for Mutual Authentication in MANET: A Review

  • Gagandeep Kaur Virk, Dinesh Kumar

article de recherche

Analysis and Design of Distributed Wireless Network Using Multipath Routing Protocol

  • H.James Deva Koresh, J.Vijitha Ananthi

article de recherche

Privilege Based Attribute Encryption System For Secure and Reliable Data Sharing

  • T.Balasathuragiri, Prof. A.Suresh

article de recherche

Monitoring and Controlling Terminal Nodes under Hierarchical Heterogeneous Wireless Networks

  • D.SATHISH, S.G.MOHANAPRIYA, N.MARAGATHAM

article de recherche

Detection of Spoofing Attack and Localization of Multiple Adversaries in WSN

  • R. Panchabi kesavan, S.A. Ramesh kumar,

article de recherche

Intelligent Database Driven Reverse Dictionary

  • P. Arivazhagan, S.Thairiyalakshmi,

article de recherche

A Dynamic Resources Allocation by Data Migration within Cloud Resources by Gossip Protocol in Cloud Environments

  • Murgesh V Jambigi, S G Maknur, Arun Kumar G, C M Parameshwarappa, Srinivasa Rao Udara

article de recherche

2GHZ PLL Frequency Synthesizer for Zigbee Applications

  • Rajesh A. Dabhi, , Bharat H. Nagpara,

article de recherche

A Secured Algorithm Based On ECC and DWT with Watermarking

  • Sandeep kumar U, Y.Manjula, Dr.K.B.Shivakumar, Dr.M.Z.Kurian

article de recherche

Visual Cryptographic Technique for Enhancing the Security of Image Transaction

  • Akshatha M M, Lokesh B, Nuthan A C

article de recherche

Cloud Computing Based HPC: A Framework for Ethiopian Universities

  • Samuel Fentahuen, Sreenivas Velagapudi