Table of Contents
Articles
| Analysis and Pattern Deduction on Linguistic based Mean and Fuzzy Association Rule Algorithm on any Geo-referenced Crime Point Data |
PDF
|
| R. Sridhar, S.R. Sathyaraj, S. Balasubramaniam | 846-849 |
| GPU-Accelerated Focus and Context based Visualization of Volume Data |
PDF
|
| Priyanka Sinha, Anupam Agrawal | 850-853 |
| Implementation of Information Security System with Proposed Substitution Cipher Model using Cryptography Tools and Methods |
PDF
|
| R. Venkateswaran, Dr.V. Sundaram | 854-857 |
| Simple Password Protector |
PDF
|
| I. Rajasekhar, M. Srikanth, M. Sreelatha, M. Shashi | 858-861 |
| Defending DoS Attacks Using a Puzzle-Based Approach and Tracing Back to the Attacker |
PDF
|
| Anup Mathew Abraham, Shweta Vincent | 862-865 |
| A Comprehensive Study on Data Mining Process with Distribution |
PDF
|
| Dr. Rajayyagari Sivaram, Kethavarapu. Uma Pavan Kumar, Gummadi Kalyan Chakravarthy | 866-868 |
| The Centroid Initialization for K-Means Clustering Algorithm based on T-Score Ranking Method |
PDF
|
| V. Kathiresan, Dr.P. Sumathi | 869-872 |
| Selecting Optimal Weighted Medoids for Clustering |
PDF
|
| B. VaraPrasada Rao, M. Sreelatha, M. Shashi | 873-877 |
| Exploring User Navigation with the Synergy of Modified Ant Based Clustering and LCS Classification |
PDF
|
| M. Raji, N. Muthumani | 878-882 |
| PurposeNet – A Semantic Knowledgebase |
PDF
|
| P. Kiran Mayee | 883-890 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578