Table of Contents
Vol 2, No 12 (2010)
Open Access
Subscription Access
Articles
Fuzzy Clustering Algorithms-Different Methodologies and Parameters-A Survey | ||
B. S. Charulatha, Paul Rodrigues, T. Chitralekha | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 239 | PDF Views: 1 |
Data Mining Techniques for Malware Detection Using Signature Extraction | ||
D. Jayakumar | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 250 | PDF Views: 2 |
Efficient Clustering and Prediction of Mobile Behavior Pattern in Mobile Computing System | ||
S. Sujatha, G. Bharathi Mohan | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 237 | PDF Views: 1 |
Data Optimization from a Multiple Species Network using Modified SFLA (Shuffled Frog Leaping Algorithm) | ||
N. Kannaiya Raja, K. Arulanandam, S. K. Sugunedham | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 265 | PDF Views: 1 |
Memory Management by Using Association Rules Mining and Mine Frequent Pattern in Large Data Base | ||
S. Arulanandan, T. Senthilmurugan, E. Kannan | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 284 | PDF Views: 3 |
Privacy-Preserving Updates to Generalization-Based K-Anonymous and Confidential Database | ||
D. Radha | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 238 | PDF Views: 1 |
QoS Localized Routing for Guarantee Reliability in Wireless Sensor Networks using Data Fusion Method with Different Data Traffic Types | ||
S. J. Kavitha, J. Roselin, P. Latha | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 253 | PDF Views: 3 |
Rational Computation for Mining Association Rules from XML Documents | ||
T. Sandhiya, M. S. Saravanan | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 254 | PDF Views: 1 |