1 |
Volume 3 |
Issue 4 |
Constructing Evolutionary Tree [Phylogeny] using BIRCH Algorithm |
V.Bhuvaneswari , R.Sindhu |
|
2 |
Volume 3 |
Issue 4 |
A Study Of Elliptic Curve Cryptography |
E.Kesavulu Reddy |
|
3 |
Volume 3 |
Issue 4 |
Hardware-Software Functional Partitioning Of Embedded Systems Using Genetic Algorithms |
M.Jagadeeswari , M.C.Bhuvaneswari |
|
4 |
Volume 3 |
Issue 4 |
Ant Colony Optimization For Discovering Classification Rules |
S. Sivakumari , R. Praveena Priyadarsini , P. Amudha |
|
5 |
Volume 3 |
Issue 4 |
A Hybrid Data Mining Technique For Face Recognition System Using Enhanced Independent Component Analysis |
K.Umamaheswari , S.Sumathi , T. Dhinesh Kumar |
|
6 |
Volume 3 |
Issue 4 |
Detection Of Transmission Data Error In Distributed Computer System Through Uml |
Vipin Saxena , Deepak Arora |
|
7 |
Volume 3 |
Issue 4 |
Signature Verification on Bank Checks Using Hopfield Neural Network |
Vijaypal Singh Dhaka, Mukta Rao, Manu Pratap Singh |
|
8 |
Volume 3 |
Issue 4 |
A new Adaptable Quality Model for Software Quality Assurance |
G. Vijaya , S. Arumugam |
|