5 |
An Evaluation of Software Estimation Techniques, their Results and Behavior Based on 4 Data Sets Syed Ali Abbas1, Xiaofang Liao1, Zaki Hassan Kazmi2 and Wajid Abbasi2,1Chongqing University, China and 2 University of Azad Jammu & Kashmir, India. |
9 |
RFID-Based Navigation Services on Smartphones Hassan Karimi and Konstantinos Pelechrinis, University of Pittsburgh, US. |
10 |
Prediction of malignancy in suspected thyroid tumour patients by three different methods of classification in data mining techniques Saeedeh Pourahmad, Mohsen Azad and Sharam Paydar Shiraz University of Medical Sciences, Iran. |
13 |
Need of Programming Models, Tools and Algorithms for New Generation HPC (EXASCALE System) Abbas Mohammed1 and Niraj Upadhayaya2,1VIFCET, India and 2 JBIT College of Engineering & Technology, India. |
14 |
Fool proof public distribution system Sivaramarajalu R V, Vignesh S and Venkatakrishnan, M P St.Joseph's College of Engineering, India. |
15 |
Adaptive Wavelet Packet Basis Selection for Zero Tree Image Coding Pandian Ramanathan,Sathyabama University, India. |
16 |
A New Hybrid Approach CrypSteg of Data Hiding in Images using Cryptography and Steganography
Pria Bharti and Roopali Soni, OCT, India |
18 |
Creating Context Aware and Adaptable Web Services within a Security Framework Richard Millham, Durban University of Technology, South Africa |
22 |
An Improved Dynamically Reconfigurable Pipelined Adaptive Viterbi Decoder for High Throughput Nitin Sonar1,Faris Al-Naimy1 and R. R. Mudholkar2, 1Ibra College of Technology, Oman and 2 Shivaji University, India. |
24 |
Comparative Study and Performance Enhancement of Scaled out Cloud Architecture of Amazon Web Services D.S. Chauhan1 and Manjeet Gupta2,1UTU,India and 2 JMIT, India. |
27 |
An Active Research Directions in Wireless Sensor Networks Vikash Singh and Kalpana Sharma,Sikkim Manipal Institute of Technology, India. |
28 |
A Synchronized Distributed Denial of Service Prevention System Metasebia Alemante1 and Mulugata Libsie2,1ZTE University, Ethiopia and 2Addis Ababa University, Ethiopia. |
29 |
A Review on Soft Computing Technique in Intrusion Detection System Noor Suhana Sulaiman1, Rohani Abu Bakar2 and Norrozila Sulaiman2,1TATiUC, Malaysia and 2UMP, Malaysia. |
30 |
An Adaptive Threshold Selection Technique in Video Compression by Using FHW and Evolutionary Programming Hanumanthu Rajasekhar and Bhima Prabhakara Rao, JNTUK, India. |
35 |
The Potential of Cloud Computing as an Alternative Technology for SMES in South Africa Mpho Mohlameane and Nkqubela Ruxwana Tshwane University of Technology, South Africa. |
37 |
Solution for Ubiquitous Network Physical Access Management and Monitoring Phan Xuan Tan, Ha Quoc Trung and Nguyen Manh Cuong, Hanoi University of Science and Technology, Viet Nam. |
38 |
Privacy-Preserving Data Mining Technology Mohnish Patel1, Ruchi Gupta2 and Rishi Kant Malviya1, 1NIRT, India and 2BIST, India. |
39 |
Developing Multithreaded Database Application Using Java Tools and Oracle Database Management System in Intranet Environment Raied Salman, Stratford University, US. |
42 |
Performance Evaluation of WIMAX Communication System using Labview Syed Abdul Rehman Rizvi, Syed Zeeshan Yousuf, Abdul Aziz, Muhammad Akeel, Hunzila Nasir and Iftkhar-Ul Hassan,The Islamia University of Bahawalpur, Pakistan. |
44 |
Park’s Vector Approach to detect an inter turn stator fault in a doubly fed induction machine by a neural network Amel Ourici and Ahmed Ouari, University Badji Mokhtar Annaba, Algeria. |
45 |
Energy Constraint in the MMSN (Mobile Multimedia Sensor Networks) F.Chabane and M.Derdour, University of Tebessa |
46 |
mBlog: Mobile Content Management System Njuguna Simon Mwangi and Ephantus Kinyanjui karari, Kimathi University College of Technology, Kenya |
47 |
Secure Adaptive Traffic Lights System for VANETs Kishore Biradar1, Radhika M. Pai2, Manohara Pai M.M2 and Joseph Mouzna2, 1Manipal University, Manipal and 2ESIGELEC, France |
48 |
Game Theoretical Approach to Modeling Intrusion Detection in Mobile Adhoc Networks Balasubramanian Paramasivan and Mohaideen Pitchai,National Engineering College, India. |
49 |
A TTP Based Efficient Non-Repudiation Scheme for Storage Clouds Wenqi Ma, Qingbo Wu and Yusong Tan, National University of Defense Technology, China. |
50 |
Projector Calibration Using Passive Stereo and Triangulation Yousef B. Mahdy, Khaled F. Hussain and Mostafa A. Abdel-Majid, Assiut University, Egypt |
51 |
Distributed Traffic by Load-Balancing Approach for AOMDV in Ad-hoc Networks Mahamed Abdelmadjid Allali1, Zoulikha Mekkakia Maaza2, Ali Kies2, Redouane Belbachir2 1University Hassiba Ben Bouali of Chlef, Algeria and 2University of Sciences and Technology of Oran, Algeria |


