An Empirical Study on the Procedure to Derive Software Quality Estimation Models |
Jie Xu, Danny Ho, Luiz Fernando Capretz |
Vol 2, No 4 (2010), Pagination: 1-16
|
ABSTRACT |
PDF
|
|
Abstract Views: 282 |
PDF Views: 153
|
Diphone Speech Synthesis System for Arabic Using MARY TTS |
M. Z. Rashad, Hazem M. El-Bakry, Islam R. Isma'il |
Vol 2, No 4 (2010), Pagination: 18-26
|
ABSTRACT |
PDF
|
|
Abstract Views: 318 |
PDF Views: 151
|
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm |
Sandeep Singh Rawat, Lakshmi Rajamani |
Vol 2, No 4 (2010), Pagination: 28-37
|
ABSTRACT |
PDF
|
|
Abstract Views: 315 |
PDF Views: 154
|
Improvement in Delay of Information Flow in Energy Efficiency Organization |
Elham Hasanzadeh, Reza Askari Moghadam |
Vol 2, No 4 (2010), Pagination: 39-46
|
ABSTRACT |
PDF
|
|
Abstract Views: 274 |
PDF Views: 139
|
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy |
S. Veeramalai, N. Jaisankar, A. Kannan |
Vol 2, No 4 (2010), Pagination: 60-74
|
ABSTRACT |
PDF
|
|
Abstract Views: 297 |
PDF Views: 175
|
M-Learning: A New Paradigm of Learning Mathematics in Malaysia |
Saipunidzam Mahamad, Mohammad Noor Ibrahim, Shakirah Mohd Taib |
Vol 2, No 4 (2010), Pagination: 76-86
|
ABSTRACT |
PDF
|
|
Abstract Views: 281 |
PDF Views: 168
|
Utilizing Diagnosing Problems in a Probabilistic Domain to Build Student Models |
Nabila Khodeir, Nayer Wanas, Nevin Darwish, Nadia Hegazy |
Vol 2, No 4 (2010), Pagination: 88-97
|
ABSTRACT |
PDF
|
|
Abstract Views: 261 |
PDF Views: 145
|
Clustering and Feature Specific Sentence Extraction Based Summarization of Multiple Documents |
A. Kogilavani, P. Balasubramani |
Vol 2, No 4 (2010), Pagination: 99-111
|
ABSTRACT |
PDF
|
|
Abstract Views: 299 |
PDF Views: 142
|
Mining Target-Oriented Sequential Patterns with Time-Intervals |
Hao-En Chueh |
Vol 2, No 4 (2010), Pagination: 113-123
|
ABSTRACT |
PDF
|
|
Abstract Views: 274 |
PDF Views: 167
|
A Survey of QOS Routing Protocols for Mobile AD HOC Networks |
G. Santhi, Alamelu Nachiappan |
Vol 2, No 4 (2010), Pagination: 125-136
|
ABSTRACT |
PDF
|
|
Abstract Views: 322 |
PDF Views: 184
|
Spiking Neurons with Asnn Based-Methods for the Neural Block Cipher |
Saleh Ali K. Al-Omari, Putra Sumari |
Vol 2, No 4 (2010), Pagination: 138-148
|
ABSTRACT |
PDF
|
|
Abstract Views: 305 |
PDF Views: 163
|
Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms |
Rahmat Widia Sembiring, Jasni Mohamad Zain, Abdullah Embong |
Vol 2, No 4 (2010), Pagination: 162-170
|
ABSTRACT |
PDF
|
|
Abstract Views: 271 |
PDF Views: 158
|
A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on Particle Swarm Theory with Arithmetic Crossover |
Md. Amjad Hossain, Md. Kowsar Hossain, M. M. A. Hashem |
Vol 2, No 4 (2010), Pagination: 172-187
|
ABSTRACT |
PDF
|
|
Abstract Views: 422 |
PDF Views: 172
|