nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Brief Overview Of Software Testing Metrics
|
Premal B. Nirpal, |
|
2011 |
3 |
1 |
p. 204-211 |
artikel |
2 |
A Content Management System for Building Quality Blogs
|
Mohammad Javad Kargar |
|
2011 |
3 |
1 |
p. 345-351 |
artikel |
3 |
A cross layer Design to Enhance Throughput for Multimedia Streaming over Mobile Ad hoc Networks
|
N.Gomathi |
|
2011 |
3 |
1 |
p. 114-126 |
artikel |
4 |
A Dynamic Slack Management Technique for Real-Time Distributed Embedded System with Enhanced Fault Tolerance and Resource Constraints
|
Santhi Baskaran, |
|
2011 |
3 |
1 |
p. 236-245 |
artikel |
5 |
A Face Recognition System Through Somatology
|
Dr. Sipi Dubey, |
|
2011 |
3 |
1 |
p. 155-160 |
artikel |
6 |
A generic Framework for Landmine detection using statistical classifier based on IR images
|
Dr.G.Padmavathi, |
|
2011 |
3 |
1 |
p. 254-261 |
artikel |
7 |
An Algorithm for Finding Frequent Itemset based on Lattice Approach for Lower Cardinality Dense and Sparse Dataset
|
Ajay Acharya, |
|
2011 |
3 |
1 |
p. 371-378 |
artikel |
8 |
An Approach to Automatic Generation of Test Cases Based on Use Cases in the Requirements Phase
|
U.Senthil Kumaran |
|
2011 |
3 |
1 |
p. 102-113 |
artikel |
9 |
An Efficient Approach for Image Recognition using Data Mining Walid MOUDANI, Ahmad SHAHIN, Fadi CHAKIK, A.R. SAYED, Félix
|
Walid MOUDAN |
|
2011 |
3 |
1 |
p. 55-68 |
artikel |
10 |
An Efficient Clustering Technique for Message Passing between Data Points using Affinity Propagation
|
D. NAPOLEON, |
|
2011 |
3 |
1 |
p. 8-14 |
artikel |
11 |
A PATTERN BASED KEY GENERATION TO AUTHENTICATION FOR MULTIHOP ROUTING IN WMSN
|
P. Kalyani |
|
2011 |
3 |
1 |
p. 299-306 |
artikel |
12 |
A Study on Block Matching Algorithms for Motion Estimation
|
S. Immanuel Alex Pandian, |
|
2011 |
3 |
1 |
p. 34-44 |
artikel |
13 |
A Survey on Sensor's Drift Counteraction Using Dynamic Pattern Recognition System
|
Tapsi Garg, |
|
2011 |
3 |
1 |
p. 127-132 |
artikel |
14 |
Bilateral Filtering using Modified Fuzzy Clustering for Image Denoising
|
G.Vijaya, |
|
2011 |
3 |
1 |
p. 45-49 |
artikel |
15 |
Bitwise Operations Based Encryption and Decryption
|
K.Naveen Kumar |
|
2011 |
3 |
1 |
p. 50-54 |
artikel |
16 |
CIRS: A State-Conscious Concurrency Control Protocol for Replicated Real-Time Databases
|
Vishal Pathak, |
|
2011 |
3 |
1 |
p. 430-434 |
artikel |
17 |
Class hierarchy method to find Change-Proneness
|
Malan V.Gaikwad |
|
2011 |
3 |
1 |
p. 21-27 |
artikel |
18 |
CLASSIFICATION OF AGRICULTURAL LAND SOILS A DATA MINING APPROACH
|
Ramesh Vamanan |
|
2011 |
3 |
1 |
p. 379-384 |
artikel |
19 |
Classification of Breast cancer by comparing Back propagation training algorithms
|
F.Paulin, |
|
2011 |
3 |
1 |
p. 327-332 |
artikel |
20 |
Classification of Herbs Plant Diseases via Hierarchical Dynamic Artificial Neural Network after Image Removal using Kernel Regression Framework
|
Lili N.A, |
|
2011 |
3 |
1 |
p. 15-20 |
artikel |
21 |
Classification of Incomplete Data Handling Techniques – An Overview
|
N.C. Vinod |
|
2011 |
3 |
1 |
p. 340-344 |
artikel |
22 |
Cluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS
|
M. A. Berlin, |
|
2011 |
3 |
1 |
p. 177-184 |
artikel |
23 |
Comparative study of Attacks on AODV-based Mobile Ad Hoc Networks
|
Ipsa De |
|
2011 |
3 |
1 |
p. 313-322 |
artikel |
24 |
Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio
|
M. M. Kazi, |
|
2011 |
3 |
1 |
p. 266-270 |
artikel |
25 |
Constructing Scalable local Distributed Decision Trees algorithm for heterogeneous data sources
|
Dr.E.Chandra, |
|
2011 |
3 |
1 |
p. 262-265 |
artikel |
26 |
CONTROLLING BURST LOSS RATIO IN OBS USING FEEDBACK CONTROL AND DYNAMIC TECHNIQUES
|
P. Boobalan, |
|
2011 |
3 |
1 |
p. 291-298 |
artikel |
27 |
Delayed Reservation And Differential Service For Multimedia Traffic In Optical Burst Switched Networks
|
P.BOOBALAN, |
|
2011 |
3 |
1 |
p. 286-290 |
artikel |
28 |
Dynamic Broadcast Scheduling in DDBMS
|
Babu Santhalingam, |
|
2011 |
3 |
1 |
p. 271-275 |
artikel |
29 |
Dynamic Steering Control of Battery Operated Car for Lane Keeping using Image Sensor
|
Ankit Sharma |
|
2011 |
3 |
1 |
p. 138-145 |
artikel |
30 |
Encryption using XOR based Extended Key for Information Security – A Novel Approach
|
E. Anupriya, |
|
2011 |
3 |
1 |
p. 146-154 |
artikel |
31 |
Enhanced Matrix Model for Finding Sequence Motif
|
Pankaj Agarwal |
|
2011 |
3 |
1 |
p. 76-82 |
artikel |
32 |
Extracting Noun Phrases in Subject and Object Roles for Exploring Text Semantics
|
Ani Thomas, |
|
2011 |
3 |
1 |
p. 1-7 |
artikel |
33 |
Facial Expressions with Some Mixed Expressions Recognition Using Neural Networks
|
Dr.R.Parthasarathi |
|
2011 |
3 |
1 |
p. 173-176 |
artikel |
34 |
Fingerprint Recognition Using Global and Local Structures
|
Kalyani Mali, |
|
2011 |
3 |
1 |
p. 161-172 |
artikel |
35 |
Frequent Itemset Discovery in E-commerce Domain: A novel Approach
|
Venkateswari S, |
|
2011 |
3 |
1 |
p. 83-88 |
artikel |
36 |
Fuzzy Metagraph and Hierarchical Modeling
|
Pankaj Dashore, |
|
2011 |
3 |
1 |
p. 435-439 |
artikel |
37 |
General Framework for Cluster based Active Learning Algorithm
|
Prerna Mahajan |
|
2011 |
3 |
1 |
p. 307-312 |
artikel |
38 |
Grid Computing: A Collaborative Approach in Distributed Environment for Achieving Parallel Performance and Better Resource Utilization
|
Sashi Tarun |
|
2011 |
3 |
1 |
p. 89-92 |
artikel |
39 |
Improved FCM algorithm for Clustering the IRIS data
|
K.Suresh, |
|
2011 |
3 |
1 |
p. 323-326 |
artikel |
40 |
Improved Hybrid Clustering and Distance-based Technique for Outlier Removal
|
P. Murugavel, |
|
2011 |
3 |
1 |
p. 333-339 |
artikel |
41 |
Improving diffusion power of AES Rijndael with 8x8 MDS matrix
|
R.Elumalai, |
|
2011 |
3 |
1 |
p. 246-253 |
artikel |
42 |
Inferring Packet Forwarding Priority, Network Tomography, Congestion Control Based On Packet Probing In Network
|
J.Benitha Christinal, |
|
2011 |
3 |
1 |
p. 401-409 |
artikel |
43 |
Location Management Techniques to Improve QoS in Mobile Networks Using Intelligent Agent
|
Selvan.C, |
|
2011 |
3 |
1 |
p. 192-198 |
artikel |
44 |
MEASURING THE QUALITY OF OBJECT ORIENTED SOFTWARE MODULARIZATION
|
Sunil L. Bangare |
|
2011 |
3 |
1 |
p. 445-450 |
artikel |
45 |
Multi-Criteria Genetic Algorithms for Solving Pig Food Problems
|
Anon Sukstrienwong |
|
2011 |
3 |
1 |
p. 225-235 |
artikel |
46 |
Neural Network Model Based Cluster Head Selection for Power Control
|
Krishan Kumar |
|
2011 |
3 |
1 |
p. 28-33 |
artikel |
47 |
NEW NUMERICAL ALGORITHMS FOR MINIMIZATION OF NON-LINEAR FUNCTIONS
|
K. Karthikeyan |
|
2011 |
3 |
1 |
p. 69-75 |
artikel |
48 |
OBJECT-ORIENTED DATABASE REPRESENTATION THORUGH UML
|
Dr. Vipin Saxena, |
|
2011 |
3 |
1 |
p. 440-444 |
artikel |
49 |
On the Security of Image Encoding Based on Fractal Functions
|
Nadia M. G. AL-Saidi |
|
2011 |
3 |
1 |
p. 385-392 |
artikel |
50 |
Opinion Mining Classification Using Key Word Summarization Based on Singular Value Decomposition
|
B Valarmathi |
|
2011 |
3 |
1 |
p. 212-215 |
artikel |
51 |
PARALLELS BETWEEN GLUCONEOGENESIS AND SYNCHRONOUS MACHINES
|
Monendra Grover |
|
2011 |
3 |
1 |
p. 185-191 |
artikel |
52 |
Performance Analysis of Lifetime Maximizing Trees for Data Aggregation in Wireless Sensor Networks
|
Deepali Virmani, |
|
2011 |
3 |
1 |
p. 276-285 |
artikel |
53 |
Performance Comparison of Wireless Ad Hoc Routing Protocols Ad Hoc On-Demand Distance Vector Routing, Dynamic Source Routing and Destination-Sequenced Distance-Vector
|
A.F.A. Abidin, |
|
2011 |
3 |
1 |
p. 216-224 |
artikel |
54 |
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
|
P.Suganthi |
|
2011 |
3 |
1 |
p. 133-137 |
artikel |
55 |
Prevention Of WormholeAttacks In Geographic Routing Protocol
|
E.Poornima, |
|
2011 |
3 |
1 |
p. 359-370 |
artikel |
56 |
Resolving Ambiguous Entity through Context Knowledge and Fuzzy Approach
|
Hejab M. Alfawareh |
|
2011 |
3 |
1 |
p. 410-422 |
artikel |
57 |
Rule Based Classification to Detect Malnutrition in Children
|
Xu Dezhi |
|
2011 |
3 |
1 |
p. 423-429 |
artikel |
58 |
SQL Injection Attacks: Techniques and Protection Mechanisms
|
Nikita Patel |
|
2011 |
3 |
1 |
p. 199-203 |
artikel |
59 |
User centric approach to itemset utility mining in Market Basket Analysis
|
Jyothi Pillai |
|
2011 |
3 |
1 |
p. 393-400 |
artikel |
60 |
Weblog Search Engine Based on Quality Criteria
|
F. Azimzadeh, |
|
2011 |
3 |
1 |
p. 352-358 |
artikel |