1 |
Volume 2 |
Issue 6 |
An Analysis Of Bayesian & Non – Bayesian Functions For Motif Detection Using Genetic Algorithm |
V. Bhuvaneswari , Nusrath.A |
|
2 |
Volume 2 |
Issue 6 |
An Empirical Study Of A Model For Adhoc Mobile Networks Using Cluster Based Intrusion Detection Technique |
A. Marimuthu , Dr. A. Shanmugam |
|
3 |
Volume 2 |
Issue 6 |
Non – Linear Cellular Automata In Improving The Quality Of Clustering For Medical Image Processing |
P.Kiranshree , Dr.I.Rameshbabu , N.S.S.S.N. Usha Devi |
|
4 |
Volume 2 |
Issue 6 |
Association Rule Based Closed Frequent Item Set Algorithm (CFIA) For Chess Data Set |
Dr. E.Ramaraj , Gokulakrishnan.R , K.Rameshkumar |
|
5 |
Volume 2 |
Issue 6 |
Two Region Fuzzy Logic Controller For A Two Capacity Interacting Non Linear Level Process |
N.Jaya , Sivakumar |
|
6 |
Volume 2 |
Issue 6 |
Face Detection In Color Images Using Pixel Based Skin Color Detection Techniques |
Ravi Subban , Krishnan Nallaperumal |
|
7 |
Volume 2 |
Issue 6 |
Packet Dropping Alleviation In Mobile Adhoc Networks By Power Saving AODV |
Gunasekaran.R , Divya , Sharanya.S |
|
8 |
Volume 2 |
Issue 6 |
Managing Software Risk – A Lifecycle Approach |
R.A.Khan , K.Mustafa |
|