Virtual Machines Detection Methods Using IP Timestamps Pattern Characteristic |
M.Noorafiza, H.Maeda, T.Kinoshita and R.Uda, Tokyo University of Technology, Japan |
Volume : 8 volume number : 1 pdf |
Intrusion Detection Using Feature Selection and Machine Learning Algorithm with Misuse Detection |
Harvinder Pal Singh Sasan and Meenakshi Sharma, Sri Sai College of Engineering and Technology, India |
Volume : 8 volume number : 1 pdf |
Content Based Video Categorization Using Relational Clustering with Local Scale Parameter |
Mohamed Maher Ben Ismail and OuiemBchir, King Saud University, KSA |
Volume : 8 volume number : 1 pdf |
Segmentation of Magnetic Resonance Brain Tumor Using Integrated Fuzzy K-Means Clustering |
P.Pedda Sadhu Naik1 and T.Venu Gopal2 , 1Jawaharlal Nehru Technological University, India and 2JNTUH College of Engineering, India |
Volume : 8 volume number : 1 pdf |
A Study of the Reliability and Validity of the Leader-Member Exchange (LMX) Instrument in Arabic |
Areej Alshamasi and Nahla Aljojo, King Abdulaziz University, Saudi Arabia |
Volume : 8 volume number : 1 pdf |
The Study of Stable Marriage Problem with Ties and Incomplete Bounded Length Preference List under Social Stability |
Ashish Shrivastava and C. Pandu Rangan, Indian Institute of Technology, India |
Volume : 8 volume number : 1 pdf |
Extracting Arabic Relations from the Web |
Shimaa M.Abd El-salam1, Enas M.F. El Houby1, A.K. Al sammak2 and T.A. El-shishtawy2, 1National Research Centre, Egypt and 2Benha University, Egypt |
Volume : 8 volume number : 1 pdf |
Framework for Educational Competence with Emerging Scenario |
Rakeshh Mohan Bhatt, HNB Garhwal University, India |
Volume : 8 volume number : 1 pdf |