| 147 | -- | 154 | C. Sathiyakumar, K. Duraiswamy. A Hybrid Approach for Node Co-Operation based Clustering in Mobile Ad Hoc Networks |
| 155 | -- | 158 | Naveen Raman, Thanushkodi Keppanagounder. Gate Replacement Technique for Reducing Leakage current in Wallace Tree Multiplier |
| 159 | -- | 168 | Mohammed Serrhini, Abdelazziz Ait Moussa. Home Users Security and the Web Browser Inbuilt Settings, Framework to setup IT Automatically |
| 169 | -- | 175 | J. Venkatesh, C. Aarthy, S. Thenmozhi, P. Balasubramanie. Operation of Enterprise Resource Planning System Implementation Compatibility towards Technical Advancement |
| 176 | -- | 182 | T. Sree Sharmila, K. Ramar 0001, T. Sree Renga Raja. Comparative Analysis of satellite Image pre-Processing Techniques |
| 183 | -- | 197 | Danilo Pelusi, Raffaele Mascella. Optimal control Algorithms for second order Systems |
| 198 | -- | 206 | C. Sundar, M. Chitradevi, G. Geetharamani. An Overview of Research Challenges for Classification of cardiotocogram Data |
| 207 | -- | 217 | Godfrey Winster Sathianesan, Swamynathan Sankaranarayanan. Unified Semantic Blog Mining Framework and Summarized Blog Retrieval |
| 218 | -- | 224 | Wikaria Gazali, Haryono Soeparno, Ngarap Im. Manik. The Classification Model of Sandals DhiifS Product with Back Propagation and Fourier Descriptors method |
| 225 | -- | 234 | R. Sadasivam, K. Duraiswamy. Efficient Approach to Discover interval-based Sequential Patterns |
| 235 | -- | 243 | R. Kannan, S. Ravi. Second-order Statistical Approach for Digital modulation Scheme Classification in Cognitive Radio using Support Vector Machine and k-Nearest Neighbor Classifier |
| 244 | -- | 251 | Imas Sukaesih Sitanggang, Razali Yaakob, Norwati Mustapha, A. N. Ainuddin. Classification Model for Hotspot Occurrences using Spatial Decision Tree Algorithm |
| 252 | -- | 263 | Isam Azawi Mohialdeen. Comparative Study of Scheduling al-Grotihms in Cloud Computing |
| 264 | -- | 270 | Ali Maroosi, Ravie Chandren Muniyandi. Membrane Computing Inspired Genetic Algorithm on Multi-Core Processors |
| 271 | -- | 276 | S. Periyasamy, K. Duraiswamy. A proficient Traceback Approach using Provincial Locality Aspects to Eliminate Denial of Service Attacks |