Discovering The Impact Of Knowledge In Recommender Systems: A Comparative Study |
Bahram Amini, Roliana Ibrahim and Mohd Shahizan Othman, Universiti Teknologi Malaysia (UTM), Malaysia |
Volume : 2 volume number : 3 pdf |
Review On Feature Selection Techniques And The Impact Of Svm For Cancer Classification Using Gene Expression Profile |
G.Victo Sudha George and V.Cyril Raj, Dr. M.G.R University, India |
Volume : 2 volume number : 3 pdf |
A Study On Face, Eye Detection And Gaze Estimation |
Zeynep Orman, Abdulkadir Battal and Erdem Kemer, Istanbul University, Turkey |
Volume : 2 volume number : 3 pdf |
A Survey Of Fuzzy Control For Stabilized Platforms |
Said LEGHMIZI and Sheng LIU, Harbin Engineering University, Harbin, China |
Volume : 2 volume number : 3 pdf |
The Systematic Review of Web Measurement |
Arvinder Kaur and Diksha Dani,Guru Gobind Singh Inderprastha University,New Delhi,India and Inderprastha Engineering College,Ghaziabad,India |
Volume : 2 volume number : 3 pdf |
Security Risks In Mechanical Engineering Industries |
Karen Benson and Syed (Shawon) M. Rahman, Capella University, Minneapolis, USA |
Volume : 2 volume number : 3 pdf |
Role Of Middleware For Internet Of Things: A Study |
Soma Bandyopadhyay, Munmun Sengupta, Souvik Maiti and Subhajit Dutta, TATA Consultancy Services Ltd. Kolkata, India |
Volume : 2 volume number : 3 pdf |
Visualization Techniques For Intrusion Detection - A Survey |
Ibrahim Elhenawy, Alaa El - Din Riad ,Ahmed Hassan and Nancy Awadallah, Zagazig University, Egypt and Mansoura University, Egypt |
Volume : 2 volume number : 3 pdf |
Energy Efficient Mac Protocols For Wireless Sensor Networks: A Survey |
Bhavana Narain, Anuradha Sharma, Sanjay Kumar and Vinod Patle, Pt. Ravishankar Shukla University, India |
Volume : 2 volume number : 3 pdf |
Analysis Of Recent Checkpointing Techniques For Mobile Computing Systems |
Ruchi Tuli and Parveen Kumar, Singhania University (Pacheri Bari), Rajasthan, India and Meerut Institute of Engineering & Technology, India |
Volume : 2 volume number : 3 pdf |
Defending Wormhole Attack in Wireless Ad-hoc Network |
Nisha S.Raote, G.H.Raisoni College of Engineering, India |
Volume : 2 volume number : 3 pdf |
Survey on Parameters of Fingerprint Classification Methods Based On Algorithmic Flow |
Dimple Parekh and Rekha Vig, NMIMS University, India |
Volume : 2 volume number : 3 pdf |