Journal: JCS

Volume 9, Issue 2

147 -- 154C. Sathiyakumar, K. Duraiswamy. A Hybrid Approach for Node Co-Operation based Clustering in Mobile Ad Hoc Networks
155 -- 158Naveen Raman, Thanushkodi Keppanagounder. Gate Replacement Technique for Reducing Leakage current in Wallace Tree Multiplier
159 -- 168Mohammed Serrhini, Abdelazziz Ait Moussa. Home Users Security and the Web Browser Inbuilt Settings, Framework to setup IT Automatically
169 -- 175J. Venkatesh, C. Aarthy, S. Thenmozhi, P. Balasubramanie. Operation of Enterprise Resource Planning System Implementation Compatibility towards Technical Advancement
176 -- 182T. Sree Sharmila, K. Ramar 0001, T. Sree Renga Raja. Comparative Analysis of satellite Image pre-Processing Techniques
183 -- 197Danilo Pelusi, Raffaele Mascella. Optimal control Algorithms for second order Systems
198 -- 206C. Sundar, M. Chitradevi, G. Geetharamani. An Overview of Research Challenges for Classification of cardiotocogram Data
207 -- 217Godfrey Winster Sathianesan, Swamynathan Sankaranarayanan. Unified Semantic Blog Mining Framework and Summarized Blog Retrieval
218 -- 224Wikaria Gazali, Haryono Soeparno, Ngarap Im. Manik. The Classification Model of Sandals Dhiif’S Product with Back Propagation and Fourier Descriptors method
225 -- 234R. Sadasivam, K. Duraiswamy. Efficient Approach to Discover interval-based Sequential Patterns
235 -- 243R. Kannan, S. Ravi. Second-order Statistical Approach for Digital modulation Scheme Classification in Cognitive Radio using Support Vector Machine and k-Nearest Neighbor Classifier
244 -- 251Imas Sukaesih Sitanggang, Razali Yaakob, Norwati Mustapha, A. N. Ainuddin. Classification Model for Hotspot Occurrences using Spatial Decision Tree Algorithm
252 -- 263Isam Azawi Mohialdeen. Comparative Study of Scheduling al-Grotihms in Cloud Computing
264 -- 270Ali Maroosi, Ravie Chandren Muniyandi. Membrane Computing Inspired Genetic Algorithm on Multi-Core Processors
271 -- 276S. Periyasamy, K. Duraiswamy. A proficient Traceback Approach using Provincial Locality Aspects to Eliminate Denial of Service Attacks