November 2013, Volume 3, Number 6 | |
Business and Technical Requirements of Software-As-A-Service: Implications in Portuguese Enterprise Business Context[Pdf] |
|
Cloud Computing Technology for Egovernment Architecture[Pdf] |
|
An Interactive Approach to Requirements Prioritization Using Quality Factors[Pdf] |
|
Protect Mobile Agent Against Malicious Host Using Partial-Mobility Mechanism[Pdf] |
|
A New Approach to Analyze Visual Secret Sharing Schemes For Biometric Authentication-A Survey[Pdf] |
|
Improving Data Transmission in the Vanet Using Multi-Criteria Decision Making Method Based on Fuzzy Logic[Pdf] |
|
A Comparative Study on Remote Tracking of Parkinson’s Disease Progression Using Data Mining Methods[Pdf] |
|
Secure File Management System for Java Cards[Pdf]
Reza Asgari and Reza Ebrahimi Atani, University of Guilan, Iran
Simulation and Analysis of AODV, DSDV, ZRP In Vanet[Pdf]
Abhishek Singh and Anil K. Verma, Thapar University, India
GA-CFS Approach to Increase the Accuracy of Estimates in Elections Participation[Pdf]
Seyyed Reza Khaze, Ramin Jafarzadeh, Laya Ebrahimi And Isa Maleki, Islamic Azad University, Iran
Optimization of Cross Domain Sentiment Analysis Using Sentiwordnet[Pdf]
K Paramesha1 and K C Ravishankar2, 1Vidyavardhaka College of Engg, India and 2Government Engineering College, India
Graph Colouring Problem Based on Discrete Imperialist Competitive Algorithm[Pdf]
Hojjat Emami1 and Shahriar Lotfi2, 1Islamic Azad University, Iran and 2University of Tabriz, Iran
A New Mechanism for Service Recovery Technology by Using Recovering Service`s Data[Pdf]
Monire Norouzi, Islamic Azad University, Iran
Health Care Monitoring for the CVD Detection Using Soft Computing Techniques [Pdf]
N.Sathiya Rani, K.Vimala and V.Kalaivani, National Engineering College, India
Wind Speed Data Analysis for Various Seasons during a Decade by Wavelet and S transform [Pdf]
Sabyasachi Mukhopadhyay and Prasanta K Panigrahi, Indian Institutes of Science Education and Research, India
Logmin: A Model for Call Log Mining in Mobile Devices[Pdf]
K.S. Kuppusamy, Leena Mary Francis and G. Aghila, Pondicherry University, India
Short Listing Likely Images Using Proposed Modified-Sift Together with Conventional Sift for Quick Sketch to Photo Matching[Pdf]
Mohd. Ahmed, S. A. Patekar and Mandar Sohani, Vidyalankar Institute of Technology, India
Devnagari Numerals Classification and Recognition Using an Integrated Approach [Pdf]
Kanika Bansal and Rajiv Kumar, Thapar University, India
Hidden Markov Model Based Named Entity Recognition Tool[Pdf]
Deepti Chopra, Sudha Morwal and G.N. Purohit, Banasthali Vidyapith,(Raj.), India
Qoe Model for Multimedia Content Delivery from Mcloud to Mobile Devices[pdf]
Aleksandar Karadimce and Danco Davcev, University Ss Cyril and Methodius, R. Macedonia
Delivering IT as A Utility- A Systematic Review[pdf]
Inderveer Chana and Tarandeep Kaur, Thapar University, India
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wireless Sensor Networks[pdf]
Ramya Shivanagu and Deepti C, The Oxford College of Engineering, India
On 2-Repeated Solid Burst Errors[pdf]
P. K. Das, Shivaji College (University of Delhi), India
A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of The Graph Coloring Problem[pdf]
Ramin Maazallahi and Aliakbar Niknafs, Shahid Bahonar University of Kerman, Iran
A Review On Semantic Relationship Based Applications[pdf]
P.Shanthi Bala and G.Aghila, Pondicherry University, India
A New Research and Design for Grid Portal Security System [pdf]
Alireza Souri, Islamic Azad University, Iran
A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems[pdf]
V. Ravibabu, Manonmaniam Sundaranar University, India
Evaluation Of The Data Security Methods In Cloud Computing Environments[pdf]
Farhad Soleimanian Gharehchopogh and Meysam Bahari, Islamic Azad University, Iran.
Scalable Cluster Based Cloud Storage[pdf]
Parinaz Eskandarian Miyandoab1 and Jaber Karimpour2, 1Islamic Azad University, Iran and 2University of Tabriz, Iran
A New Greedy Randomized Adaptive Search Procedure for Multiobjective RNA Structural Alignment[pdf]
Abdesslem Layeb, Amira Boudra, Wissem Korichi and Salim Chikhi, University of Constantine, Algeria
A New MVP Based Approach in Software Architecture for Time Reduction in Software Development[pdf]
Farhad Soleimanian Gharehchopogh and Mortaza Abdollahiasl, Islamic Azad University, Iran
Cryptographic Control for Risk Assessment on Unix Operating System-I[pdf]
Prashant Kumar Patra1 and Padma Lochan Pradhan2, 1BPUT, India and 2Sikha `O` Anusandhan University (SOA), India