nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abnormal Gait Recognition
|
Naveen Rohila |
|
2010 |
|
5 |
p. 1544-1551 |
artikel |
2 |
ACO Based Feature Subset Selection for Multiple k-Nearest Neighbor Classifiers
|
Shailendra Kumar Shrivastava |
|
2011 |
|
5 |
p. 1831-1838 |
artikel |
3 |
A Comparative Study of Classification Algorithms for Spam Email Data Analysis
|
Aman Sharma, |
|
2011 |
|
5 |
p. 1890-1895 |
artikel |
4 |
A Comparative Study of Public Key Cryptosystem based on ECC and RSA
|
Arun kumar, |
|
2011 |
|
5 |
p. 1904-1909 |
artikel |
5 |
A Framework for an Ontology-Based Data- Gleaning and Agent Based Intelligent Decision Support PPDM System Employing Generalization Technique for Health Care
|
K. Murugesan |
|
2010 |
|
5 |
p. 1588-1596 |
artikel |
6 |
A GENETIC ALGORITHM FOR REGRESSION TEST CASE PRIORITIZATION USING CODE COVERAGE
|
Arvinder Kaur, |
|
2011 |
|
5 |
p. 1839-1847 |
artikel |
7 |
A Journey from floppy disk to cloud storage
|
Bindu Trikha |
|
2010 |
|
5 |
p. 1449-1452 |
artikel |
8 |
Algorithm for Efficient Multilevel Association Rule Mining
|
Pratima Gautam, |
|
2010 |
|
5 |
p. 1700-1774 |
artikel |
9 |
Algorithm for Solving Job Shop Scheduling Problem Based on machine availability constraint
|
Kanate Ploydanai, |
|
2010 |
|
5 |
p. 1919-1925 |
artikel |
10 |
Ambient Noise Tomography of the Central India
|
Abhay P. Singh, |
|
2011 |
|
5 |
p. 2068-2075 |
artikel |
11 |
AN ALGORITHM FOR STEERING CONTROL WITH SIMULATION RESULTS
|
Apeksha V. Sakhare, |
|
2010 |
|
5 |
p. 1435-1438 |
artikel |
12 |
ANALYSIS OF ELECTRONIC VOTING SYSTEM IN VARIOUS COUNTRIES
|
Sanjay Kumar, |
|
2011 |
|
5 |
p. 1825-1830 |
artikel |
13 |
Analyzing Motivation of Private Engineering College Students: A Fuzzy Logic Approach (A case study of private Engineering College)
|
Abhishek Srivastava, |
|
2010 |
|
5 |
p. 1467-1476 |
artikel |
14 |
An Analysis on Preservation of Privacy in Data Mining
|
Madhan Subramaniam |
|
2010 |
|
5 |
p. 1696-1699 |
artikel |
15 |
An Artificial Immune System Model for Multi Agents Resource Sharing in Distributed Environments
|
Tejbanta Singh Chingtham |
|
2010 |
|
5 |
p. 1813-1818 |
artikel |
16 |
Android in opposition to iPhone
|
Kavita Sharma |
|
2011 |
|
5 |
p. 1965-1969 |
artikel |
17 |
An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures
|
Pooja Sharma, |
|
2010 |
|
5 |
p. 1830-1835 |
artikel |
18 |
AN EFFICIENT CLASSIFICATION OF GENOMES BASED ON CLASSES AND SUBCLASSES
|
B.V. DHANDRA, |
|
2010 |
|
5 |
p. 1690-1695 |
artikel |
19 |
An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
|
Er. Saiqa Khan |
|
2010 |
|
5 |
p. 1801-1806 |
artikel |
20 |
AN EFFICIENT SUPER RESOLUTION TECHNIQUE FOR LOSS LESS COMPRESSED BAYER COLOUR FILTER ARRAY IMAGES
|
K.Chiranjeevi, |
|
2011 |
|
5 |
p. 1804-1814 |
artikel |
21 |
A NEW APPROACH FOR VARIANT MULTI ASSIGNMENT PROBLEM
|
SOBHAN BABU.K, |
|
2010 |
|
5 |
p. 1633-1640 |
artikel |
22 |
A New Approach to Secure Data Aggregation protocol for Wireless Sensor Network
|
Mukesh Kumar Jha |
|
2010 |
|
5 |
p. 1539-1543 |
artikel |
23 |
A New Look to Traversal Algorithms Using Set Construct Data Structure
|
Vineet Kumar Sharma, |
|
2010 |
|
5 |
p. 1445-1448 |
artikel |
24 |
AN EXTENDED METHOD FOR ORDER REDUCTION OF LARGE SCALE MULTI VARIABLE SYSTEMS
|
Dr. G.Saraswathi |
|
2011 |
|
5 |
p. 2109-2118 |
artikel |
25 |
An Implementation of I2C using VHDL for DATA surveillance
|
Arvind Sahu, |
|
2011 |
|
5 |
p. 1857-1865 |
artikel |
26 |
An Improved Hop-Count Metric for Infrastructural Wireless Mesh Network
|
Paramjeet Kaur Bedi, |
|
2011 |
|
5 |
p. 1757-1763 |
artikel |
27 |
A novel application for transmission of Orthogonal Embedded Images by using Morphological Transform Domain & cryptographic methods
|
M.Venkata Kishore, |
|
2011 |
|
5 |
p. 1866-1877 |
artikel |
28 |
A NOVEL CODEBOOK INITIALISATION TECHNIQUE FOR GENERALIZED LLOYD ALGORITHM USING CLUSTER DENSITY
|
K.Somasundaram |
|
2010 |
|
5 |
p. 1807-1809 |
artikel |
29 |
A Novel Document Clustering Algorithm Using Squared Distance Optimization Through Genetic Algorithms
|
Harish Verma |
|
2010 |
|
5 |
p. 1875-1879 |
artikel |
30 |
An Overview of Side Channel Attacks and Its Countermeasures using Elliptic Curve Cryptography
|
M.Prabu, |
|
2010 |
|
5 |
p. 1492-1495 |
artikel |
31 |
APPRAISAL OF QUESTION CATEGORIZATION FOR AN ADAPTIVE ASSESSMENT IN ELEARNING
|
R. KAVITHA |
|
2011 |
|
5 |
p. 1933-1937 |
artikel |
32 |
A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security
|
K. Venkata Ramana, |
|
2011 |
|
5 |
p. 1878-1889 |
artikel |
33 |
A Single Fromat for Measuring different Aspects of Testing
|
Mahwish Kundi, |
|
2010 |
|
5 |
p. 1729-1732 |
artikel |
34 |
A Study on Enhancement of Loadability of Large-Scale Emerging Power Systems by Using FACTS Controllers
|
Bindeshwar Singh, |
|
2010 |
|
5 |
p. 1893-1903 |
artikel |
35 |
A Survey of Denial of Service Attacks and it's Countermeasures on Wireless Network
|
Arockiam. L |
|
2010 |
|
5 |
p. 1563-1571 |
artikel |
36 |
A Survey On Coding Algorithms In Medical Image Compression
|
S.Bhavani, |
|
2010 |
|
5 |
p. 1429-1434 |
artikel |
37 |
A Survey on Intrusion in Ad Hoc Networks and its Detection Measures
|
Ms. Preetee K. Karmore, |
|
2009 |
|
5 |
p. 1896-1903 |
artikel |
38 |
A Survey on Telecommunication Technology Standards
|
Sandeep Singh Sengar, |
|
2011 |
|
5 |
p. 2061-2067 |
artikel |
39 |
Automated Load Shedding Period Control System (An effective way to reduce human effort)
|
Dwijen Rudrapal, |
|
2011 |
|
5 |
p. 1764-1772 |
artikel |
40 |
A VIEW ON SECURE ROUTING IN ADHOC NETWORKS
|
V. Venkata Ramana, |
|
2010 |
|
5 |
p. 1887-1892 |
artikel |
41 |
A Wavelet Transform Algorithm for 2n Shades Image
|
Aditya Kumar, |
|
2011 |
|
5 |
p. 2136-2144 |
artikel |
42 |
CBIR Using Kekre's Transform over Row column Mean and Variance Vectors
|
Dr. H. B. Kekre |
|
2010 |
|
5 |
p. 1609-1614 |
artikel |
43 |
CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks
|
Dr.G.Padmavathi |
|
2010 |
|
5 |
p. 1524-1531 |
artikel |
44 |
Classification of Different Species Families using Clustering Algorithm
|
D.Chandravathi |
|
2010 |
|
5 |
p. 1884-1886 |
artikel |
45 |
CLASSIFICATION TECHNIQES IN EDUCATION DOMAIN
|
B.Nithyasri |
|
2010 |
|
5 |
p. 1679-1684 |
artikel |
46 |
Clustering Mixed Data Set Using Modified MARDL Technique
|
Mrs. J.Jayabharathy |
|
2010 |
|
5 |
p. 1852-1860 |
artikel |
47 |
COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS
|
SUNIL K. PARYANI, |
|
2011 |
|
5 |
p. 2024-2027 |
artikel |
48 |
Comparative and Analysis of Biometric Systems
|
Manivannan, |
|
2011 |
|
5 |
p. 2156-2162 |
artikel |
49 |
COMPARATIVE STUDY OF BROWSER BASED OPEN SOURCE TESTING TOOLS WATIR AND WET
|
Nisha Gogna, |
|
2011 |
|
5 |
p. 1910-1923 |
artikel |
50 |
Decentralized Service Orchestration by Continuous Message Passing
|
R.JAYAPRAKASH |
|
2010 |
|
5 |
p. 1627-1632 |
artikel |
51 |
Design and Simulation for Producing Two Amplitude Matched Anti-phase Sine Waveforms Using ±2.5 V CMOS Current-Mode Approach
|
Anil Kumar Sharma, |
|
2010 |
|
5 |
p. 1482-1486 |
artikel |
52 |
DESIGN MODEL OF FUZZY LOGIC MEDICAL DIAGNOSIS CONTROL SYSTEM
|
Faran Baig, |
|
2011 |
|
5 |
p. 2093-2108 |
artikel |
53 |
Development of a quality design framework for usable User Interfaces
|
Dr. S. Qamar Abbas |
|
2010 |
|
5 |
p. 1763-1767 |
artikel |
54 |
Development of Coalmine Safety System Using Wireless Sensor Network
|
S.Vandana, |
|
2011 |
|
5 |
p. 2076-2085 |
artikel |
55 |
Differential Evolution for Optimization of PID Gains in Automatic Generation Control
|
Dr. L.D. Arya, |
|
2011 |
|
5 |
p. 1848-1856 |
artikel |
56 |
Direct Processor Access for Non Dedicated Server using Multi Core Processor
|
P. S. BALAMURUGAN, |
|
2010 |
|
5 |
p. 1861-1864 |
artikel |
57 |
Dynamic Resource Allocation in Desktop Grids
|
Bismi A S, |
|
2010 |
|
5 |
p. 1913-1918 |
artikel |
58 |
E-Commerce Security using PKI approach
|
Mr. Vikas Rattan |
|
2010 |
|
5 |
p. 1439-1444 |
artikel |
59 |
Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)
|
Prof.N..Penchalaiah, |
|
2010 |
|
5 |
p. 1641-1645 |
artikel |
60 |
Effective Term Based Text Clustering Algorithms
|
P. Ponmuthuramalingam, |
|
2010 |
|
5 |
p. 1665-1673 |
artikel |
61 |
Efficient Secured Hash Based Password Authentication in Multiple Websites
|
T.S.Thangavel, |
|
2010 |
|
5 |
p. 1846-1851 |
artikel |
62 |
Emerging Requirements Of Reconfigurable Computing Systems For Performance Enhancement
|
M. Aqeel Iqbal |
|
2010 |
|
5 |
p. 1572-1579 |
artikel |
63 |
Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method
|
Padma Bh |
|
2010 |
|
5 |
p. 1904-1907 |
artikel |
64 |
Enhancement of LSB based Steganography for Hiding Image in Audio
|
Pradeep Kumar Singh |
|
2010 |
|
5 |
p. 1652-1658 |
artikel |
65 |
Enhancement of Network Security Techniques using Quantum Cryptography
|
Navleen Kaur, |
|
2011 |
|
5 |
p. 1960-1964 |
artikel |
66 |
Evolutionary Aspects Of Windows Operating System To Enhance Existing Technology
|
M. Asad Kayani |
|
2010 |
|
5 |
p. 1504-1513 |
artikel |
67 |
Exploring Issues for QoS Based Routing Algorithms
|
Dr. Shuchita Upadhyaya |
|
2010 |
|
5 |
p. 1792-1795 |
artikel |
68 |
Extraction of Radiology Reports using Text mining
|
A.V.Krishna Prasad |
|
2010 |
|
5 |
p. 1558-1562 |
artikel |
69 |
Facial Expression Recognition
|
Neeta Sarode |
|
2010 |
|
5 |
p. 1552-1557 |
artikel |
70 |
FEATURE SELECTION METHODS AND ALGORITHMS
|
L.Ladha, |
|
2011 |
|
5 |
p. 1787-1797 |
artikel |
71 |
Global Chaos Synchronization of Four-Scroll and Four-Wing Attractors by Active Nonlinear Control
|
Dr. V. Sundarapandian |
|
2011 |
|
5 |
p. 2145-2155 |
artikel |
72 |
Global Chaos Synchronization of the Pehlivan Systems by Sliding Mode Control
|
Dr. V. Sundarapandian |
|
2011 |
|
5 |
p. 2163-2169 |
artikel |
73 |
Grid Computing Used For Next Generation High Speed Processing Technology
|
Muhammad Naqaash |
|
2010 |
|
5 |
p. 1926-1933 |
artikel |
74 |
High Performance VLSI Design Using Body Biasing in Domino Logic Circuits
|
Salendra.Govindarajulu, |
|
2010 |
|
5 |
p. 1741-1745 |
artikel |
75 |
HYBRID FEATRUE SELECTION FOR NETWORK INTRUSION
|
S.Sethuramalingam, |
|
2011 |
|
5 |
p. 1773-1780 |
artikel |
76 |
Hybrid Particle Swarm Optimization for Regression Testing
|
Dr. Arvinder Kaur |
|
2011 |
|
5 |
p. 1815-1824 |
artikel |
77 |
Implementation and simulation of arithmetic logic unit, shifter and Multiplier in Quantum cellular automata technology
|
Dr.E.N.Ganesh |
|
2010 |
|
5 |
p. 1824-1829 |
artikel |
78 |
Implementation of a Secured system with Roaming Server and Roaming Ports
|
R. Bharathi, |
|
2011 |
|
5 |
p. 1781-1786 |
artikel |
79 |
Implementing Ant Colony Optimization for Test Case Selection and Prioritization
|
Bharti Suri, |
|
2011 |
|
5 |
p. 1924-1932 |
artikel |
80 |
Improved Fuzzy C-Means Algorithm for MR Brain Image Segmentation
|
P.Vasuda, |
|
2010 |
|
5 |
p. 1713-1715 |
artikel |
81 |
Improving Ischemic Beat Classification Using Fuzzy-Genetic Based PCA And ICA
|
S. Murugan |
|
2010 |
|
5 |
p. 1532-1538 |
artikel |
82 |
Introducing a New Language for Stream Applications
|
Mohamad Dabbagh |
|
2011 |
|
5 |
p. 2119-2126 |
artikel |
83 |
Intrusion Detection using unsupervised learning
|
Kusum bharti |
|
2010 |
|
5 |
p. 1865-1870 |
artikel |
84 |
Investigation on Efficient Management of workflows in cloud computing Environment
|
M.Sudha, |
|
2010 |
|
5 |
p. 1841-1845 |
artikel |
85 |
Investigations and Performance Evaluation of Dynamic Routing Protocol with New Proposed Protocol for WAN
|
Vasudha, |
|
2011 |
|
5 |
p. 1970-1979 |
artikel |
86 |
k-dominant and Extended k-dominant Skyline Computation by Using Statistics
|
Md. Anisuzzaman Siddique, |
|
2010 |
|
5 |
p. 1934-1943 |
artikel |
87 |
MESSAGE INDUCED SOFT CHEKPOINTING FOR RECOVERY IN MOBILE ENVIRONMENTS
|
Ruchi Tuli, |
|
2011 |
|
5 |
p. 1798-1803 |
artikel |
88 |
MISSING DATA IMPUTATION IN CARDIAC DATA SET (SURVIVAL PROGNOSIS)
|
R.KAVITHA KUMAR |
|
2010 |
|
5 |
p. 1836-1840 |
artikel |
89 |
Modeling Of Combinational Circuits Based On Ternary Multiplexer Using VHDL
|
A.Sathish kumar, |
|
2010 |
|
5 |
p. 1777-1791 |
artikel |
90 |
Modern Trends Used In Operating Systems For High Speed Computing Applications
|
Qurat-ul-Ain Malik |
|
2010 |
|
5 |
p. 1514-1523 |
artikel |
91 |
Modified Order Crossover (OX) Operator
|
Ms. Monica Sehrawat, |
|
2011 |
|
5 |
p. 2019-2023 |
artikel |
92 |
Neuro Language Generator
|
P. Dinadayalan |
|
2010 |
|
5 |
p. 1453-1461 |
artikel |
93 |
Next Generation High Speed Computing Using Photonic Based Technology
|
Umer Farooq |
|
2010 |
|
5 |
p. 1496-1503 |
artikel |
94 |
On Human Intelligence
|
M.A.Anusuya |
|
2010 |
|
5 |
p. 1674-1678 |
artikel |
95 |
Optimal Capacitor For Maximum Output Power Tracking Of Self Excited Induction Generator Using Fuzzy Logic Approach
|
Mr.M.Senthilkumar |
|
2010 |
|
5 |
p. 1758-1762 |
artikel |
96 |
Optimizing Dependencies - A solution to Failure Proneness of software
|
Dr.G.AppaRao, |
|
2011 |
|
5 |
p. 2010-2018 |
artikel |
97 |
Output Regulation of the Arneodo Chaotic System
|
Sundarapandian Vaidyanathan |
|
2010 |
|
5 |
p. 1601-1608 |
artikel |
98 |
Output Regulation of the Tigan System
|
Dr. V. Sundarapandian |
|
2011 |
|
5 |
p. 2127-2135 |
artikel |
99 |
Performance Comparision of Image Retrieval using Row Mean of Transformed Column Image
|
Dr. H.B.Kekre |
|
2010 |
|
5 |
p. 1908-1912 |
artikel |
100 |
Performance Evaluation and Optimization of DSR Routing Algorithm over 802.11 based Wireless Mesh Network
|
Birinder Singh, |
|
2011 |
|
5 |
p. 1980-1985 |
artikel |
101 |
Performance Evaluation Of Different Adaptive Filters For ECG Signal Processing
|
Sachin singh, |
|
2010 |
|
5 |
p. 1880-1883 |
artikel |
102 |
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
|
Prof.S.P. Setti, |
|
2010 |
|
5 |
p. 1796-1800 |
artikel |
103 |
Performance evaluation of H.264 decoder on different processors
|
H.S.Prasantha |
|
2010 |
|
5 |
p. 1768-1776 |
artikel |
104 |
PERFORMANCE OF MULTI SERVER AUTHENTICATION AND KEY AGREEMENT WITH USER PROTECTION IN NETWORK SECURITY
|
NAGAMALLESWARA RAO.DASARI, |
|
2010 |
|
5 |
p. 1705-1712 |
artikel |
105 |
Performance of TCP/IP/ UDP adaptive header compression algorithm for wireless network
|
Prof.N.Penchalaiah |
|
2010 |
|
5 |
p. 1646-1651 |
artikel |
106 |
Poly Substitution Method for Encryption and Decryption
|
Jeetendra Kumar Ambulkar |
|
2010 |
|
5 |
p. 1810-1812 |
artikel |
107 |
Power Aware Scheduling for Resource Constrained Distributed Real-Time Systems
|
Santhi Baskaran |
|
2010 |
|
5 |
p. 1746-1753 |
artikel |
108 |
Prediction of Profitability of Industries using Weighted SVR
|
Divya Tomar, |
|
2011 |
|
5 |
p. 1938-1945 |
artikel |
109 |
Prediction of Protein Secondary Structure using Artificial Neural Network
|
MN Vamsi Thalatam |
|
2010 |
|
5 |
p. 1615-1621 |
artikel |
110 |
Prediction of the Query of Search Engine Using Back Propagation Algorithm
|
Deepti Gupta , |
|
2011 |
|
5 |
p. 1946-1959 |
artikel |
111 |
Printed and Handwritten Mixed Kannada Numerals Recognition Using SVM
|
G. G. Rajput |
|
2010 |
|
5 |
p. 1622-1626 |
artikel |
112 |
Quantum Black Holes and pseudotelepathy in biological organisms
|
Monendra Grover, |
|
2011 |
|
5 |
p. 1995-1998 |
artikel |
113 |
Quantum Teleportation circuit using Matlab and Mathematica
|
Ms.Swati Sharma, |
|
2010 |
|
5 |
p. 1597-1600 |
artikel |
114 |
Reconfigurable Computing Systems Used To Support Next Generation High Speed Applications
|
M. Munawwar Iqbal Ch |
|
2010 |
|
5 |
p. 1580-1587 |
artikel |
115 |
Revisions & Altercations in the Administration of Assets for Mobile Grid Computing
|
Aditya Vidyarthi, |
|
2011 |
|
5 |
p. 2041-2045 |
artikel |
116 |
Robot Assisted Wireless Sensor Network for Monitoring and Detection of Explosives in Indoor Environment
|
Joshua D Freeman, |
|
2011 |
|
5 |
p. 2046-2053 |
artikel |
117 |
ROLE OF SYNUCLEIN BETA (SNCB) AND SYNUCLEIN GAMMA (SNCG) IN GLAUCOMA AND ALZHEIMER'S DISEASES – A BIOINFORMATIC APPROACH
|
Kiran Kumar Reddi |
|
2010 |
|
5 |
p. 1871-1874 |
artikel |
118 |
Secure Mobile Agent based Information Gathering in Wireless Network
|
Ashish Kumar Srivastava |
|
2010 |
|
5 |
p. 1685-1689 |
artikel |
119 |
Self-Healing in Dynamic Web Service Composition
|
S.Poonguzhali, |
|
2011 |
|
5 |
p. 2054-2060 |
artikel |
120 |
SEMANTIC BASED MULTIPLE WEB SEARCH ENGINE
|
MS.S.LATHA SHANMUGAVADIVU, |
|
2010 |
|
5 |
p. 1722-1728 |
artikel |
121 |
Sequence Related IT Functions for String Based Update Operations by New Operational Transformation Algorithms for Wide-Area Collaborative Applications
|
Santosh kumawat |
|
2010 |
|
5 |
p. 1716-1721 |
artikel |
122 |
SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH
|
M.V.P. Chandra Sekhara Rao |
|
2010 |
|
5 |
p. 1754-1757 |
artikel |
123 |
Short Message Service using SMS Gateway
|
Veena K.Katankar |
|
2010 |
|
5 |
p. 1487-1491 |
artikel |
124 |
Spam Classification using new kernel function in Support Vector Machine
|
Surendra Kumar Rakse |
|
2010 |
|
5 |
p. 1819-1823 |
artikel |
125 |
SPEAKER IDENTIFICATION USING 2-D DCT, WALSH AND HAAR ON FULL AND BLOCK SPECTROGRAM
|
Dr. H. B. Kekre, |
|
2010 |
|
5 |
p. 1733-1740 |
artikel |
126 |
Spectrum sensing and Spectrum shifting implementation in a Cognitive Radio based IEEE 802.22 Wireless Regional Area Network
|
Mithun Chakraborty |
|
2010 |
|
5 |
p. 1477-1481 |
artikel |
127 |
Superresolution: A Novel Application to Image Restoration
|
Sanket B.Kasturiwala, |
|
2010 |
|
5 |
p. 1659-1664 |
artikel |
128 |
Test Case Prioritization for Regression Testing based on Severity of Fault
|
R. Kavitha, |
|
2010 |
|
5 |
p. 1462-1466 |
artikel |
129 |
The Integration and Development of the Leisure and Hospitality Information System Module with the Embedded Technology
|
Chih-Yao Lo |
|
2011 |
|
5 |
p. 1986-1994 |
artikel |
130 |
Towards Learner Model Sharing Among Heterogeneous E-Learning Environments
|
R. Sunitha, |
|
2011 |
|
5 |
p. 2034-2040 |
artikel |
131 |
Trust Negotiations Using Cryptographic Approach
|
Sandeep.V, |
|
2011 |
|
5 |
p. 2086-2092 |
artikel |
132 |
Using Association Rule Mining for Extracting Product Sales Patterns in Retail Store Transactions
|
Pramod Prasad, |
|
2011 |
|
5 |
p. 2177-2182 |
artikel |
133 |
Web Page Prediction using Hybrid Model
|
Shreya Dubey, |
|
2011 |
|
5 |
p. 2170-2176 |
artikel |
134 |
ZigBee Based Industrial Automation Profile for Power Monitoring Systems
|
Archana R. Raut, |
|
2011 |
|
5 |
p. 2028-2033 |
artikel |