Abstract is missing.
- Mining Top-K Frequent Correlated Subgraph Pairs in Graph DatabasesLi Shang, Yujiao Jian. 1-8 [doi]
- Evolutionary Approach for Classifier Ensemble: An Application to Bio-molecular Event ExtractionAsif Ekbal, Sriparna Saha 0001, Sachin Girdhar. 9-15 [doi]
- A Novel Clustering Approach Using Shape Based SimilaritySmriti Srivastava, Saurabh Bhardwaj, J. R. P. Gupta. 17-27 [doi]
- Knowledge Discovery Using Associative Classification for Heart Disease PredictionM. Akhil Jabbar, Bulusu Lakshmana Deekshatulu, Priti Chandra. 29-39 [doi]
- An Application of K-Means Clustering for Improving Video Text DetectionV. N. Manjunath Aradhya, M. S. Pavithra. 41-47 [doi]
- Integrating Global and Local Application of Discriminative Multinomial Bayesian Classifier for Text ClassificationEmmanuel Pappas, Sotiris B. Kotsiantis. 49-55 [doi]
- Protein Secondary Structure Prediction Using Machine LearningSriparna Saha 0001, Asif Ekbal, Sidharth Sharma, Sanghamitra Bandyopadhyay, Ujjwal Maulik. 57-63 [doi]
- Refining Research Citations through Context AnalysisG. S. Mahalakshmi, S. Sendhilkumar, Dilip S. Sam. 65-71 [doi]
- Assessing Novelty of Research Articles Using Fuzzy Cognitive MapsS. Sendhilkumar, G. S. Mahalakshmi, S. Harish, R. Karthik, M. Jagadish, Dilip S. Sam. 73-79 [doi]
- Towards an Intelligent Decision Making SupportNesrine Ben Yahia, Narjès Bellamine-Ben Saoud, Henda Hajjami Ben Ghézala. 81-86 [doi]
- An Approach to Identify n-wMVD for Eliminating Data RedundancySangeeta Viswanadham, Vatsavayi Valli Kumari. 89-97 [doi]
- Comparison of Question Answering SystemsTripti Dodiya, Sonal Jain. 99-107 [doi]
- Transform for Simplified Weight Computations in the Fuzzy Analytic Hierarchy ProcessManju Pandey, Nilay Khare, S. Shrivastava. 109-117 [doi]
- Parameterizable Decision Tree Classifier on NetFPGAAlireza Monemi, Roozbeh Zarei, Muhammad Nadzir Marsono, Mohamed Khalil Hani. 119-128 [doi]
- Diagnosing Multiple Faults in Dynamic Hybrid SystemsImtiez Fliss, Moncef Tagina. 129-139 [doi]
- Investigation of Short Base Line Lightning Detection System by Using Time of Arrival MethodBehnam Salimi, Zulkurnain Abdul-Malek, S. J. Mirazimi, Kamyar MehranZamir. 141-147 [doi]
- Investigation on the Probability of Ferroresonance Phenomenon Occurrence in Distribution Voltage Transformers Using ATP SimulationZulkurnain Abdul-Malek, Kamyar MehranZamir, Behnam Salimi, S. J. Mirazimi. 149-155 [doi]
- Design of SCFDMA System Using MIMOKaushik Kapadia, Anshul Tyagi. 157-164 [doi]
- Testing an Agent Based E-Novel System - Role Based ApproachN. Sivakumar, K. Vivekanandan. 165-173 [doi]
- Comparative Genomics with Multi-agent SystemsJuan Francisco de Paz, Carolina Zato, Fernando de la Prieta, Javier Bajo, Juan M. Corchado, Jesús M. Hernández. 175-181 [doi]
- Causal Maps for Explanation in Multi-Agent SystemAroua Hedhili, Wided Lejouad Chaari, Khaled Ghédira. 183-191 [doi]
- Hierarchical Particle Swarm Optimization for the Design of Beta Basis Function Neural NetworkHabib Dhahri, Adel M. Alimi, Ajith Abraham. 193-205 [doi]
- Fuzzy Aided Ant Colony Optimization Algorithm to Solve Optimization ProblemAloysius George, B. R. Rajakumar. 207-215 [doi]
- Self-adaptive Gesture Classifier Using Fuzzy Classifiers with Entropy Based Rule PruningRiidhei Malhotra, Ritesh Srivastava, Ajeet Kumar Bhartee, Mridula Verma. 217-223 [doi]
- Speaker Independent Word Recognition Using Cepstral Distance MeasurementArnab Pramanik, Rajorshee Raha. 225-235 [doi]
- Wavelet Packet Based Mel Frequency Cepstral Features for Text Independent Speaker IdentificationSmriti Srivastava, Saurabh Bhardwaj, Abhishek Bhandari, Krit Gupta, Hitesh Bahl, J. R. P. Gupta. 237-247 [doi]
- Optimised Computational Visual Attention Model for Robotic CognitionJ. Amudha, Ravi Kiran Chadalawada, V. Subashini, B. Barath Kumar. 249-260 [doi]
- A Rule-Based Approach for Extraction of Link-Context from Anchor-Text StructureSuresh Kumar, Naresh Kumar, Manjeet Singh, Asok De. 261-271 [doi]
- Malayalam Offline Handwritten Recognition Using Probabilistic Simplified Fuzzy ARTMAPV. Vidya, T. R. Indhu, V. K. Bhadran, R. Ravindra Kumar. 273-283 [doi]
- Development of a Bilingual Parallel Corpus of Arabic and Saudi Sign Language: Part IYahya O. Mohamed Elhadj, Zouhir Zemirli, Kamel Ayyadi. 285-295 [doi]
- Software-Based Malaysian Sign Language RecognitionFarrah Wong, G. Sainarayanan, Wan Mahani Abdullah, Ali Chekima, Faysal Ezwen Jupirin, Yona Falinie Abdul Gaus. 297-306 [doi]
- An Algorithm for Headline and Column Separation in Bangla DocumentsFarjana Yeasmin Omee, Shiam Shabbir Himel, Md. Abu Naser Bikas. 307-315 [doi]
- A Probabilistic Model for Sign Language Translation MemoryAchraf Othman, Mohamed Jemni. 317-324 [doi]
- Selective Parameters Based Image Denoising MethodMantosh Biswas, Hari Om. 325-332 [doi]
- A Novel Approach to Build Image Ontology Using TextonR. I. Minu, K. K. Thyagarajan. 333-339 [doi]
- Cloud Extraction and Removal in Aerial and Satellite ImagesLizy Abraham, M. Sasikumar. 341-347 [doi]
- 3D360: Automated Construction of Navigable 3D Models from Surrounding Real EnvironmentsShreya Agarwal. 349-356 [doi]
- Real Time Animated Map Viewer (AMV)Neeraj Gangwal, P. K. Garg. 357-363 [doi]
- A Novel Fuzzy Sensing Model for Sensor Nodes in Wireless Sensor NetworkSuman Bhowmik, Chandan Giri. 365-371 [doi]
- Retraining Mechanism for On-Line Peer-to-Peer Traffic ClassificationRoozbeh Zarei, Alireza Monemi, Muhammad Nadzir Marsono. 373-382 [doi]
- Novel Monitoring Mechanism for Distributed System Software Using Mobile AgentsRajwinder Singh, Mayank Dave. 383-392 [doi]
- Investigation on Context-Aware Service Discovery in Pervasive Computing EnvironmentsS. Sreethar, E. Baburaj. 393-403 [doi]
- A Fuzzy Logic System for Detecting Ping Pong Effect Attack in IEEE 802.15.4 Low Rate Wireless Personal Area NetworkC. Balarengadurai, S. Saraswathi. 405-416 [doi]
- Differentiated Service Based on Reinforcement Learning in Wireless NetworksMalika Bourenane. 417-424 [doi]
- Multimodal Biometric Authentication Based on Score Normalization TechniqueT. Sreenivasa Rao, E. Sreenivasa Reddy. 425-434 [doi]
- Extracting Extended Web Logs to Identify the Origin of Visits and Search KeywordsJeeva Jose, P. Sojan Lal. 435-441 [doi]
- A Novel Community Detection Algorithm for Privacy Preservation in Social NetworksFatemeh Amiri, Nasser Yazdani, Heshaam Faili, Alireza Rezvanian. 443-450 [doi]
- Provenance Based Web SearchAjitha Robert, S. Sendhilkumar. 451-458 [doi]
- A Filter Tree Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS AttackTarun Karnwal, Sivakumar Thandapanii, Gnanasekaran Aghila. 459-469 [doi]
- Cloud Based Heterogeneous Distributed FrameworkAnirban Kundu, Chunlin Ji, Ruopeng Liu. 471-478 [doi]
- An Enhanced Load Balancing Technique for Efficient Load Distribution in Cloud-Based IT IndustriesRashmi KrishnaIyengar Srinivasan, V. Suma, Vaidehi Nedu. 479-485 [doi]
- PASA: Privacy-Aware Security Algorithm for Cloud ComputingAjay Jangra, Renu Bala. 487-497 [doi]
- A New Approach to Overcome Problem of Congestion in Wireless NetworksUmesh Kumar Lilhore, Praneet Saurabh, Bhupendra Verma. 499-506 [doi]
- CoreIIScheduler: Scheduling Tasks in a Multi-core-Based Grid Using NSGA-II TechniqueJavad Mohebbi Najm Abad, S. Kazem Shekofteh, Hamid Tabatabaee, Maryam Mehrnejad. 507-518 [doi]