Table of Contents
Articles
| Fuzzy Clustering Algorithms - Different Methodologies and Parameters - A Survey |
PDF
|
| B.S. Charulatha, Dr. Paul Rodrigues, Dr.T. Chitralekha |
| Data Mining Techniques for Malware Detection Using Signature Extraction |
PDF
|
| D. Jayakumar |
| Efficient Clustering and Prediction of Mobile Behavior Pattern in Mobile Computing System |
PDF
|
| S. Sujatha, G. Bharathi Mohan |
| Data Optimization from a Multiple Species Network using Modified SFLA (Shuffled Frog Leaping Algorithm) |
PDF
|
| N. Kannaiya Raja, Dr.K. Arulanandam, S.K. Sugunedham |
| Memory Management by Using Association Rules Mining and Mine Frequent Pattern in Large Data Base |
PDF
|
| S. Arulanandan, T. Senthilmurugan, Dr.E. Kannan |
| Privacy-Preserving Updates to Generalization-Based K-Anonymous and Confidential Database |
PDF
|
| D. Radha |
| QoS Localized Routing for Guarantee Reliability in Wireless Sensor Networks using Data Fusion Method with Different Data Traffic Types |
PDF
|
| S.J. Kavitha, J. Roselin, Dr.P. Latha |
| Rational Computation for Mining Association Rules from XML Documents |
PDF
|
| T. Sandhiya, M.S. Saravanan |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578