621 | -- | 626 | Hamza Zidoum, Fatma Al-Rasbi, Muna Al-Awfi. Towards the construction of a comprehensive arabic lexical reference system |
627 | -- | 634 | Loan T. T. Nguyen, Bay Vo, Tzung-Pei Hong. CARIM: an efficient algorithm for mining class-association rules with interestingness measures |
635 | -- | 641 | Thomson Fredrick, Govindaraju Radhamani. The fuzzy logic based ECA rule processing for XML databases |
642 | -- | 649 | Muthukumar Arunachalam, Kannan Subramanian. Finger knuckle print authentication using AES and K-means algorithm |
650 | -- | 657 | Tameem Eissa, Gihwan Cho. Lightweight anti-censorship online network for anonymity and privacy in middle eastern countries |
658 | -- | 665 | Marappagounder Shanker, Keppanagounder Thanushkodi. An effective approach to software cost estimation based on soft computing techniques |
666 | -- | 671 | Teena Mittal, Rajendra Kumar Sharma. Multiclass SVM based spoken hindi numerals recognition |
672 | -- | 679 | Shyam Lal, Rahul Kumar. An efficient method for contrast enhancement of real world hyper spectral images |
680 | -- | 687 | Iyapparaja Meenakshisundaram, Sureshkumar Sreedharan. Intelligent risk analysis model for mining adaptable reusable component |
688 | -- | 694 | Subbian Suganthi, Rethanaswamy Nadarajan. Adaptability metric for adaptation of the dynamic changes |
695 | -- | 700 | Jaison Bennet, Chilambuchelvan Ganaprakasam, Nirmal Kumar. A hybrid approach for gene selection and classification using support vector machine |
701 | -- | 707 | Hemalatha Gunasekaran, ThanushkodiKeppana Gowder. New bucket join algorithm for faster join query results |
708 | -- | 713 | L. Jani Anbarasi, G. S. Anandha Mala. Verifiable multi secret sharing scheme for 3D models |
714 | -- | 718 | Ravva Santosh, Challa Narasimham, Pallam Shetty. Short secret exponent attack on LSBS-RSA |
719 | -- | 727 | Iman Kashefi, Maryam Kassiri, Mazleena Salleh. Preventing collusion attack in android |
728 | -- | 734 | Kaliappan Jeyakumar, Thiagarajan Revathi, Sundararajan Karpagam. Intrusion detection using artificial neural networks with best set of features |
735 | -- | 740 | ShanmughaSundaram Mythili, Subramani Sarala. A measurement of similarity to identify identical code clones |
741 | -- | 747 | Amit Joshi, Vivekanand Mishra, Rajendra Patrikar. Real time implementation of integer DCT based video watermarking architecture |
748 | -- | 754 | Raman Beena, Subramani Sarala. An efficient specific update search domain based glowworm swarm optimization for test case prioritization |
755 | -- | 763 | Satyendr Singh, Tanveer J. Siddiqui. Utilizing corpus statistics for hindi word sense disambiguation |
764 | -- | 771 | Thumma Kumar, Kamireddy Reddy. A technique for burning area identification UIHS transformation and image segmentation |
772 | -- | 779 | Akila Thiyagarajan, UmaMaheswari Pandurangan. Comparative analysis of classifier Performance on MR brain images |
780 | -- | 784 | Siva Sankar Kanahasabapathy, Jebarajan Thanganadar, Padmasuresh Lekshmikanthan. A novel approach to develop dynamic portable instructional operating system for minimal utilization |
785 | -- | 790 | Ghulam Mujtaba, David J. Parish. A statistical framework for identification of tunnelled applications using machine learning |
791 | -- | 796 | Sanjay K. Dwivedi, Pramod P. Sukhadeve. Translation rules for english to hindi machine translation system: homoeopathy domain |
797 | -- | 805 | Krishna Priya Remamany, Thanga Raj Chelliah, Kesavadas Chandrasekaran, Kannan Subraman. Brain tumor segmentation in MRI images using integrated modified PSO-fuzzy approach |