![Open Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
Analysis and Pattern Deduction on Linguistic based Mean and Fuzzy Association Rule Algorithm on any Geo-referenced Crime Point Data |
PDF
![]() |
R. Sridhar, S.R. Sathyaraj, S. Balasubramaniam | 846-849 |
GPU-Accelerated Focus and Context based Visualization of Volume Data |
PDF
![]() |
Priyanka Sinha, Anupam Agrawal | 850-853 |
Implementation of Information Security System with Proposed Substitution Cipher Model using Cryptography Tools and Methods |
PDF
![]() |
R. Venkateswaran, Dr.V. Sundaram | 854-857 |
Simple Password Protector |
PDF
![]() |
I. Rajasekhar, M. Srikanth, M. Sreelatha, M. Shashi | 858-861 |
Defending DoS Attacks Using a Puzzle-Based Approach and Tracing Back to the Attacker |
PDF
![]() |
Anup Mathew Abraham, Shweta Vincent | 862-865 |
A Comprehensive Study on Data Mining Process with Distribution |
PDF
![]() |
Dr. Rajayyagari Sivaram, Kethavarapu. Uma Pavan Kumar, Gummadi Kalyan Chakravarthy | 866-868 |
The Centroid Initialization for K-Means Clustering Algorithm based on T-Score Ranking Method |
PDF
![]() |
V. Kathiresan, Dr.P. Sumathi | 869-872 |
Selecting Optimal Weighted Medoids for Clustering |
PDF
![]() |
B. VaraPrasada Rao, M. Sreelatha, M. Shashi | 873-877 |
Exploring User Navigation with the Synergy of Modified Ant Based Clustering and LCS Classification |
PDF
![]() |
M. Raji, N. Muthumani | 878-882 |
PurposeNet – A Semantic Knowledgebase |
PDF
![]() |
P. Kiran Mayee | 883-890 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578