Volumen 2, Ausgabe 5 (2014)

Sonderartikel

WEBGPSS as a Tool in Business Simulation

  • Laveena C D’Costa, Shilpashri, Sherol Manisha

Sonderartikel

A Framework for Agricultural Farm-to- Market Supply Chain

  • SumanA Lasrado , Erika EmaSequeira, Alisa D’costa

Sonderartikel

A Review on Recent Developments in Technology Forecasting

  • Dr. R Sasikumar, Anisha Mohan

Sonderartikel

Ambiguities in Natural Language Processing

  • Anjali M K, Babu Anto P

Sonderartikel

Protein Structure and Function Prediction Using Machine Learning Methods ? A Review

  • Hemalatha N., Siddhant Naik, Jeason Rinton Saldanha

Sonderartikel

Pattern Recognition in Image Processing ? A Study

  • Hemalatha, Jeevan K.A

Sonderartikel

Development of Prediction Tool for Drought Tolerant Protein in Rice Using Machine Learning Algorithm

  • Annapoorna Shetty, Hemalatha N , Mohammed Moideen Shihab , Brendon Victor Fernandes

Sonderartikel

Comparative Analysis of Various Algorithms Used in Travelling Salesman Problem

  • Suchetha Vijaykumar, Sushma L Shetty , Saniha Maria Menezes

Sonderartikel

Recognising Partially Occluded Faces From a Video Sequence

  • Vijayalakshmi A , Pethuru Raj

Sonderartikel

A Modified Rough Fuzzy ?Clustering - Classification? Model For Gene Expression Data

  • Lt.Thomas Scaria, Dr.T Christopher, Gifty Stephen

Sonderartikel

Road Network Extraction from High Resolution Satellite Images

  • Srilakshmi D, Nazneen, Mustafa B

Sonderartikel

Applications of Machine Learning - A Survey

  • Hemalatha N, Larisa, Pradeep

Sonderartikel

PhzPred ? A Tool for Prediction of Phenazine Synthesizing Genes in Plant Growth Promoting Pseudomonas spp

  • Shilpa S, Anil Paul, Naganeeswaran S, Hemalatha N, Rajesh M.K

Sonderartikel

Traffic Light Control System Using Image Processing

  • Kavya P Walad, Jyothi Shetty

Sonderartikel

Statistical Inference and Reconstruction of Gene Regulatory Network from Observational Expression Profile

  • Prof. Shanthi Mahesh, Kavya Sabu, Dr. Neha Mangla, Jyothi G V, Suhas A Bhyratae, Keerthana Muniraju

Sonderartikel

A New Approach For an Improved Multiple Brain Lesion Segmentation

  • Prof. Shanthi Mahesh, Karthik Bharadwaj N, Suhas A Bhyratae ,Karthik Raju V, Karthik M N

Sonderartikel

Computational Method for Reconstruction of Gene Regulatory Network Using Microarray Data

  • Shanthi Mahesh, Dr. Neha Mangla, Suhas A Bhyratae, J. Sally Josephine, Chaithra L, Archana B G

Sonderartikel

Predictive Analytics Using Soft Computing: A Case Study on Forecasting For Indian Automobile Industry

  • Jewel Murel D’Souza, Sheik Sana Begam, Santhosh Rebello

Sonderartikel

A Framework for Opinion Mining- Root Cause Monitoring the Social System Which Keeps Tracks of Weak Points in Rural Areas

  • Suman A Lasrado, Dr. Vincent Mascarenhas , Pradeepkumar, Abdul Jamali

Sonderartikel

Ranking of Landmark Images

  • B.Chandirika, S.Selvarani

Sonderartikel

An Ontology-Based Information Retrieval Model for Domesticated Plants

  • Ruban S, Kedar Tendolkar, Austin Peter Rodrigues, Niriksha Shetty

Sonderartikel

Comparative Analysis of Various Techniques Used In Managing Big Data

  • Rakesh Kumar, Sanketh S Salian, Suraj Nayak

Sonderartikel

Optimization Based Data Mining in Business Research

  • Praveen Gujjar J, Dr. Nagaraja R

Sonderartikel

Discovering Relations among Documents Using Novel Text Retrieval Technique

  • Manjiri Gajanan Ghadi, Carmen Lysandra Pereira , Manimozhi R.

Sonderartikel

Comparison of Join Algorithms in Map Reduce Framework

  • Mani Bushan, Balaraj J, Oinam Martina Devi

Sonderartikel

A Survey on Time Series Data Mining

  • Kumar Vasimalla

Sonderartikel

A Genteel Requirement Engineering for Web Applications

  • S.Mary Helan Felista, S.Selvarani , S. Jebapriya

Sonderartikel

A Review on Asymmetric Cryptography ? RSA and ElGamal Algorithm

  • AnnapoornaShetty, Shravya Shetty K, Krithika K

Sonderartikel

A Review on Steganography - Least Significant Bit Algorithm and Discrete Wavelet Transform Algorithm

  • Vanitha T , Anjalin D Souza , Rashmi B, Sweeta DSouza

Sonderartikel

A Comparative Performance Analysis of DES and BLOWFISH Symmetric Algorithm

  • Srinivas B.L , Anish Shanbhag, Austin Solomon D’Souza

Sonderartikel

ASH-HEED Protocol for Heterogeneous Wireless Sensor Networks

  • P.Priya, Rupeshsah, P.saravanan ,Dr.J.SenthilKumar

Sonderartikel

Cryptographic process for Cyber Safeguard by using PGP

  • Bharatratna P. Gaikwad

Sonderartikel

An Analysis of Cloud Interoperability Standards onVarious Service Models

  • SuchethaVijayakumar, LenitaVelezaSerrao2, Hancel Anacletus D’Souza

Sonderartikel

Comparative Study of Workflow Scheduling Algorithms in Cloud Computing

  • Santhosh B, Harshitha, Prachi Kaneria A, Dr D.H Manjaiah

Sonderartikel

Comparative Study of Scheduling and Service Broker Algorithms in Cloud Computing

  • Santhosh B, Raghavendra Naik, Balkrishna Yende, Dr D.H Manjaiah

Sonderartikel

Survey on Need of Loop Transformations for Automatic Parallelization

  • Nisha, Rafiya Shahana ,Mustafa B

Forschungsartikel

Survey on Knowledge Discovery in Speech Emotion Detection

  • S.Jagadeesh Soundappan, Dr.R.Sugumar

Forschungsartikel

A Survey on Attacks in Web Usage Mining

  • R.Natarajan, Dr.R.Sugumar

Forschungsartikel

Home Automation and Energy Harvesting In Wireless Sensors Network

  • Sukesha, Harman Preet Kaur

Forschungsartikel

A Hierarchical Approach to Access Control – A Review

  • Sunita Rani Jindal, Sahil Vasisth, Rajwinder Singh

Forschungsartikel

Hybrid Clustering and Classification for Entropy Reduction: A Review

  • Palwinder kaur ,Usvir kaur ,Dr.Dheerendra Singh

Forschungsartikel

Study of Cosmic Intelligence and Human Health

  • Dr.S.Sundaravadivelu,

Forschungsartikel

Performance Analysis for All- Optical Networks Using Wavelength Routing Methods in Different Topologies

  • Santhosh Kumar C, Piruthiviraj.P , Dr. Preeta Sharan

Forschungsartikel

Simulation and Analysis of Blocking Probability Using RWA Algorithm for All- Optical Networks

  • Mohammed Shadab, Piruthiviraj.P, Dr. Preeta Sharan

Forschungsartikel

Network Planning and Engineering for Fiber Optic Transport Systems

  • Bharath Kumar S, N.Jayaraj

Forschungsartikel

A WIRELESS SENSOR NETWORK

  • DR.K.P.KALIYAMURTHIE, D.PARAMESWARI

Forschungsartikel

Performance Analysis of Low Rate WPAN Topologies

  • Arpitha E M, Ramesh T M

Forschungsartikel

EFFICIENT ALLOCATION OF DYNAMIC RESOURCES IN A CLOUD

  • S.THIRUNAVUKKARASU, DR.K.P.KALIYAMURTHIE

Forschungsartikel

A Survey of the Security Use Cases in Big Data

  • Kudakwashe Zvarevashe, Mainford Mutandavari, Trust Gotora

Forschungsartikel

An Introduction of the RIST Framework on Information Security Awareness Practices in the Current Information Age

  • Kudakwashe Zvarevashe, Tinotenda Zwavashe, Cephas Mawere

Forschungsartikel

Comparative Modeling, Quality Assessment and Validation of HYD1

  • Cephas Mawere, Suresh Kumar G, Shumbeyi Muzondo

Forschungsartikel

Towards More Efficient DSP Implementations: An Analysis into the Sources of Error in DSP Design

  • Tinotenda Zwavashe, Rudo Duri, Mainford Mutandavari

Forschungsartikel

Load Balancing in Structured Peer to Peer Systems

  • DR.K.P.KALIYAMURTHIE, D.PARAMESWARI

Forschungsartikel

Design and Development of Autonomous Ground Vehicle for Wild Life Monitoring

  • J. Anupama, A. Kavitha, S. Harsha, M. Karthick

Forschungsartikel

A Comparative study of Classifiers’ Performance for Gender Classification

  • Santanu Modak , Abhoy Chand Mondal

Forschungsartikel

IMAGE BASED FINGERPRINT VERIFICATION

  • MR.KANNAN SUBRAMANIAN

Forschungsartikel

Approach for Rule Pruning in Association Rule Mining for Removing Redundancy

  • Ashwini Batbarai, Devishree Naidu

Forschungsartikel

A Narrative Approach for Data Preserving Techniques

  • K.S.Gangatharan, M.S.Thanabal

Forschungsartikel

Case Study of Data Mining Models and Warehousing

  • Shivappa M Metagar, Praveenkumar D Hasalkar, Anil S Naik

Forschungsartikel

Use of Symmetric Algorithm for Image Encryption

  • K.Brindha, Ritika Sharma, Sapanna Saini

Forschungsartikel

Data Security in Cloud Using Elliptic Curve Crytography

  • Puneetha C, Dr. M Dakshayini

Forschungsartikel

Energy Efficient Cognitive Radio Hybrid Voting Rule –PSO

  • Parth Gulati, Dr. Rajesh Khanna

Forschungsartikel

A Survey on Process of Isolated Character Recognition

  • Karanbir Kaur,Naresh Kumar Garg

Forschungsartikel

Analysis of Image Demosaicking Algorithms

  • Nivedita Chatterjee, Avinash Dhole

Forschungsartikel

Reduction of PAPR in MIMO-OFDM/A System Using Polyphase Complementary Modulation

  • Balaji Naik.M , Ramana Reddy Gujjula,Bojja Durga Bhavani

Forschungsartikel

Techniques of Node Localization in Wireless Sensor Networks: A Review

  • Lovepreet Singh, Sukhpreet Kaur

Forschungsartikel

Energy Efficiency Techniques for Wireless Sensor Networks: A Review

  • Harshwinder Singh , Navpreet Kaur

Forschungsartikel

Image Enhancement Using Wavelets

  • Shivani Jain, Jyoti Rani

Forschungsartikel

A Survey on the Security Fight against Ransomware and Trojans in Android

  • Tatenda Trust Gotora, Kudakwashe Zvarevashe, Pranav Nandan

Forschungsartikel

Security Issues in ALARM Protocol for Mutual Authentication in MANET: A Review

  • Gagandeep Kaur Virk, Dinesh Kumar

Forschungsartikel

Analysis and Design of Distributed Wireless Network Using Multipath Routing Protocol

  • H.James Deva Koresh, J.Vijitha Ananthi

Forschungsartikel

Detection of Spoofing Attack and Localization of Multiple Adversaries in WSN

  • R. Panchabi kesavan, S.A. Ramesh kumar,

Forschungsartikel

Intelligent Database Driven Reverse Dictionary

  • P. Arivazhagan, S.Thairiyalakshmi,

Forschungsartikel

A Dynamic Resources Allocation by Data Migration within Cloud Resources by Gossip Protocol in Cloud Environments

  • Murgesh V Jambigi, S G Maknur, Arun Kumar G, C M Parameshwarappa, Srinivasa Rao Udara

Forschungsartikel

2GHZ PLL Frequency Synthesizer for Zigbee Applications

  • Rajesh A. Dabhi, , Bharat H. Nagpara,

Forschungsartikel

A Secured Algorithm Based On ECC and DWT with Watermarking

  • Sandeep kumar U, Y.Manjula, Dr.K.B.Shivakumar, Dr.M.Z.Kurian

Forschungsartikel

Visual Cryptographic Technique for Enhancing the Security of Image Transaction

  • Akshatha M M, Lokesh B, Nuthan A C

Forschungsartikel

Cloud Computing Based HPC: A Framework for Ethiopian Universities

  • Samuel Fentahuen, Sreenivas Velagapudi