| Discovering The Impact Of Knowledge In Recommender Systems: A Comparative Study |
| Bahram Amini, Roliana Ibrahim and Mohd Shahizan Othman, Universiti Teknologi Malaysia (UTM), Malaysia |
| Volume : 2 volume number : 3 pdf |
| Review On Feature Selection Techniques And The Impact Of Svm For Cancer Classification Using Gene Expression Profile |
| G.Victo Sudha George and V.Cyril Raj, Dr. M.G.R University, India |
| Volume : 2 volume number : 3 pdf |
| A Study On Face, Eye Detection And Gaze Estimation |
| Zeynep Orman, Abdulkadir Battal and Erdem Kemer, Istanbul University, Turkey |
| Volume : 2 volume number : 3 pdf |
| A Survey Of Fuzzy Control For Stabilized Platforms |
| Said LEGHMIZI and Sheng LIU, Harbin Engineering University, Harbin, China |
| Volume : 2 volume number : 3 pdf |
| The Systematic Review of Web Measurement |
| Arvinder Kaur and Diksha Dani,Guru Gobind Singh Inderprastha University,New Delhi,India and Inderprastha Engineering College,Ghaziabad,India |
| Volume : 2 volume number : 3 pdf |
| Security Risks In Mechanical Engineering Industries |
| Karen Benson and Syed (Shawon) M. Rahman, Capella University, Minneapolis, USA |
| Volume : 2 volume number : 3 pdf |
| Role Of Middleware For Internet Of Things: A Study |
| Soma Bandyopadhyay, Munmun Sengupta, Souvik Maiti and Subhajit Dutta, TATA Consultancy Services Ltd. Kolkata, India |
| Volume : 2 volume number : 3 pdf |
| Visualization Techniques For Intrusion Detection - A Survey |
| Ibrahim Elhenawy, Alaa El - Din Riad ,Ahmed Hassan and Nancy Awadallah, Zagazig University, Egypt and Mansoura University, Egypt |
| Volume : 2 volume number : 3 pdf |
| Energy Efficient Mac Protocols For Wireless Sensor Networks: A Survey |
| Bhavana Narain, Anuradha Sharma, Sanjay Kumar and Vinod Patle, Pt. Ravishankar Shukla University, India |
| Volume : 2 volume number : 3 pdf |
| Analysis Of Recent Checkpointing Techniques For Mobile Computing Systems |
| Ruchi Tuli and Parveen Kumar, Singhania University (Pacheri Bari), Rajasthan, India and Meerut Institute of Engineering & Technology, India |
| Volume : 2 volume number : 3 pdf |
| Defending Wormhole Attack in Wireless Ad-hoc Network |
| Nisha S.Raote, G.H.Raisoni College of Engineering, India |
| Volume : 2 volume number : 3 pdf |
| Survey on Parameters of Fingerprint Classification Methods Based On Algorithmic Flow |
| Dimple Parekh and Rekha Vig, NMIMS University, India |
| Volume : 2 volume number : 3 pdf |