311 | -- | 319 | Tao Liao, Weicheng Fu, Shunxiang Zhang, Zongtian Liu. Event Trigger Recognition Based on Positive and Negative Weight Computing and its Application |
321 | -- | 334 | Tharam S. Dillon, Yi-Ping Phoebe Chen, Elizabeth Chang 0001, Mukesh K. Mohania, Vish Ramakonar. Conjoint Knowledge Discovery Utilizing Data and Content with Applications in Business, Bio-medicine, Transport Logistics and Electrical Power Systems |
335 | -- | 345 | Gundala Swathi. A Frame Work for Categorise the Innumerable Vulnerable Nodes in Mobile Adhoc Network |
347 | -- | 355 | Anar A. Hady. Duty Cycling Centralized Hierarchical Routing Protocol With Content Analysis Duty Cycling Mechanism for Wireless Sensor Networks |
357 | -- | 366 | Sivaranjani Balakrishnan, D. Surendran. Secure Information Access Strategy for a Virtual Data Centre |
367 | -- | 375 | Mohammad Behrouzian Nejad. Parametric Evaluation of Routing Algorithms in Network on Chip Architecture |
377 | -- | 383 | Zheng Zeng. Implementation of Embedded Technology-Based English Speech Identification and Translation System |
385 | -- | 393 | Garladinne Ravikanth, K. V. N. Sunitha, B. Eswara Reddy. Location Related Signals with Satellite Image Fusion Method Using Visual Image Integration Method |