default search action
1. A2CWiC 2010: Tamilnadu, India
- Krishnashree Achuthan, Gayatri Buragohain:
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, September 16-17, 2010, Tamilnadu, India. ACM 2010, ISBN 978-1-4503-0194-7 - K. Hima Bindu, P. S. V. S. Sai Prasad, C. Raghavendra Rao:
Hybrid decision tree based on inferred attribute. 1:1-1:7 - Rama Devi Yellasiri, P. Venu Gopal, P. S. V. S. Sai Prasad:
Impact analysis of Jensen and Sk pal fuzzification in classification. 2:1-2:7 - Nisha Haridas, M. Nirmala Devi:
PSO learning on artificial neural networks. 3:1-3:6 - K. Sujatha, N. Pappa:
Temperature and combustion quality control in power station boilers using artificial neural networks. 4:1-4:6 - Manjusha Nair, Nidheesh Melethadathil, Bipin Nair, Shyam Diwakar:
Information processing via post-synaptic EPSP-spike complex and model-based predictions of induced changes during plasticity in cerebellar granular neuron. 5:1-5:8 - Mithula Parangan, Chitra Aravind, Harilal Parasuraman, Krishnashree Achuthan, Bipin Nair, Shyam Diwakar:
Action potential and bursting phenomena using analog electrical neuron. 6:1-6:7 - K. Lakshmi:
Multi-criteria hybrid PSO algorithm with communications for combinatorial optimisation. 7:1-7:8 - R. Sangeetha, B. Kalpana:
Optimizing the kernel selection for support vector machines using performance measures. 8:1-8:7 - D. Muruga Radha Devi, V. Maheswari, P. Thambidurai:
Adaptive dimensionality reduction for recent-biased time series analysis. 9:1-9:7 - Najmeh Danesh, Malihe Danesh, Hossein Shirgahi, Abbas Ghaemi Bafghi:
Improving multiplication and reminder using implementation based on word and index. 10:1-10:6 - Mrudula Nimbarte, Smita Nagtode:
Method based technique of compilation with compilation server. 11:1-11:6 - (Withdrawn) Adaptive computer assisted instruction (CAI) for students with dyscalculia (learning disability in mathematics). 12:1-12:7
- B. Sarojini Ilango, N. Ramaraj:
A hybrid prediction model with F-score feature selection for type II Diabetes databases. 13:1-13:4 - Ipsita Bhattacharya, Mahinder Pal Singh Bhatia:
SVM classification to distinguish Parkinson disease patients. 14:1-14:6 - Sapna P. G., Hrushikesha Mohanty:
Clustering test cases to achieve effective test selection. 15:1-15:8 - M. P. Preeja, K. P. Soman:
Fast computation of marginalized walk kernel for virtual screening in drug discovery. 16:1-16:4 - K. V. Sujatha, S. Meenakshi Sundaram:
A combined PCA-MLP model for predicting stock index. 17:1-17:6 - Devi S. T. Pavithra, M. S. Vijaya:
Electroencephalogram wave signal analysis and epileptic seizure prediction using supervised classification approach. 18:1-18:6 - Upasna Singh, Gora Chand Nandi:
Efficient temporal pattern mining for humanoid robot. 19:1-19:7 - Rekha Singhal:
A national public healthcare framework using grid. 20:1-20:5 - B. Bhavani, Srividya Sheshadri, R. Unnikrishnan:
Vocational education technology: rural India. 21:1-21:7 - K. V. N. Sunitha, A. Sharada:
Digitization of Indian literature: problem and solution. 22:1-22:7 - Jisha C. Thankappan, Sumam Mary Idicula:
Language independent voice-based gender identification system. 23:1-23:6 - Vani V, S. Mohan:
Interactive 3D class room: a framework for Web3D using J3D and JMF. 24:1-24:7 - Marimuthu Krishnaveni, Radha Venkatachalam:
Feature extraction based on multiphase level set framework for sign language recognition system. 25:1-25:6 - Rozita Jamili Oskouei:
The role of social networks on female students activities. 26:1-26:7 - V. Smrithi Rekha, Vidhya Balasubramanian, V. Adinarayanan:
Social computing in universities: an evaluation of practicality. 27:1-27:6 - G. Hemalatha, K. Thanuskodi:
Optimization of joins using random record generation method. 28:1-28:6 - E. Poovammal, M. Ponnavaikko:
APPT: A privacy preserving transformation tool for micro data release. 29:1-29:8 - Smita Sengupta, Kavita V. V. Ganeshan, Nandlal L. Sarda:
Developing IITB Smart CampusGIS Grid. 30:1-30:8 - P. K. Srimani, Nanditha Prasad:
Analysis and evaluation of classifiers using multi-temporal images in land use and land cover mapping. 31:1-31:6 - B. Vanathi, V. Rhymend Uthariaraj:
Context representation using hierarchical method and heuristic based context selection in context aware computing. 32:1-32:7 - P. Subashini, M. Krishnaveni, Bernadetta Kwintiana Ane, Dieter Roller, Gerald Schaefer:
A combined preprocessing scheme for texture based ice classification from SAR images. 33:1-33:6 - N. Valliammal, S. N. Geethalakshmi:
Performance analysis of various leaf boundary edge detection algorithms. 34:1-34:6 - T. Sridevi, B. Krishnaveni, V. Vijaya Kumar, Y. Rama Devi:
A video watermarking algorithm for MPEG videos. 35:1-35:6 - Dancy Kurian, R. S. Jayasree, M. Wilscy, A. K. Gupta:
White Matter Hyperintensity segmentation using multiple stage FCM. 36:1-36:6 - S. S. Shylaja, S. Natarajan, K. N. Balasubramanya Murthy, K. G. Abhijit, Jayashree Diwakar, S. Mohammed Saifulla:
Aggregation of Gabor wavelets and curvelets with PCA for efficient retrieval of face images. 37:1-37:6 - K. J. Shanthi, M. Sasi Kumar:
VLSI implementation of image segmentation processor for brain MRI. 38:1-38:6 - S. S. Sujatha, M. Mohammed Sathik:
A novel pixel based blind watermarking algorithm by applying Fibonacci transform. 39:1-39:6 - D. Maheswari, V. Radha:
Enhanced layer based compound image compression. 40:1-40:8 - N. Sumathi, Antony Selvadoss Thanamani:
Pipelined backoff scheme for bandwidth measurement in QoS enabled routing towards scalability for MANets. 41:1-41:6 - Athira M. Nambiar, Asha Vijayan, Aishwarya Nandakumar:
Wireless intrusion detection based on different clustering approaches. 42:1-42:7 - N. A. Vasanthi, S. Annadurai:
Pattern based routing for event driven wireless sensor-actor networks. 43:1-43:6 - S. Simi, Maneesha V. Ramesh:
Real-time monitoring of explosives using wireless sensor networks. 44:1-44:7 - S. Kirthiga, M. Jayakumar:
AutoRegressive channel modeling and estimation using Kalman filter for downlink LTE systems. 45:1-45:5 - Deepali Virmani, Satbir Jain:
Fault tolerant optimal path for data delivery in wireless sensor networks. 46:1-46:7 - Poonam Gera, Kumkum Garg, Manoj Misra:
Trust based security in MANET routing protocols: a survey. 47:1-47:7 - Archana Shukla:
A metadata and annotation extractor from PDF document for semantic web. 48:1-48:6 - M. Selvanayaki, V. Bhuvaneswari:
Finding microarray genes using GO ontology. 49:1-49:8 - Sunitha Abburu, R. J. Anandhi:
Concept ontology construction for sports video. 50:1-50:6 - Swati Saigaonkar, Madhuri Rao:
XML filtering system based on ontology. 51:1-51:6 - Namita Mittal, Richi Nayak, Mahesh Chandra Govil, Kamal Chand Jain:
Evaluation of a hybrid approach of personalized web information retrieval using the FIRE data set. 52:1-52:6 - Ranaganayakulu Dhanalakshmi, Chenniappan Chellappan:
An intelligent technique to detect file formats and e-mail spam. 53:1-53:6 - R. Maheswari, S. Sheeba Rani:
An interactive RTOS based machine controller through speech using ESTREL. 54:1-54:4 - Bai. V. Ramani, S. N. Sivanandam:
An intelligent numerical algorithm for solving system of linear algebraic equations. 55:1-55:4 - V. Radhika, G. Padmavathi:
A study on impulse noise removal for varied noise densities. 56:1-56:4 - G. Sudhamathy:
Mining web logs: an automated approach. 57:1-57:4 - Raji R. Pillai, Sumam Mary Idicula:
Linear text segmentation using classification techniques. 58:1-58:4 - Anuj Mohamed, K. N. Ramachandran Nair:
Continuous Malayalam speech recognition using Hidden Markov Models. 59:1-59:4 - Upasana Sharma:
Fault tolerant techniques for reconfigurable platforms. 60:1-60:4 - R. J. Anandhi, S. Natarajan, Sunitha Abburu:
An enhanced clusterer aggregation using nebulous pool. 61:1-61:5 - S. Sangeetha, Michael Arock, Rini Smita Thakur:
Event mention detection using rough set and semantic similarity. 62:1-62:4 - Nandagopal Malarvizhi, Kandaswamy Gokulnath, V. Rhymend Uthariaraj:
Sender initiated decentralized dynamic load balancing for multi cluster computational grid environment. 63:1-63:4 - Mary Priya Sebastian, Sheena Kurian K, G. Santhosh Kumar:
English to Malayalam translation: a statistical approach. 64:1-64:5 - S. S. Anju, P. Harmya, Noopa Jagadeesh, R. Darsana:
Malware detection using assembly code and control flow graph optimization. 65:1-65:4 - R. Deepa Lakshmi, N. Radha:
Spam classification using supervised learning techniques. 66:1-66:4 - Vallidevi Krishnamurthy, Chitra Babu:
Effective self adaptation by integrating adaptive framework with architectural patterns. 67:1-67:4 - Kanapathy Maheswari, M. Punithavalli:
Enhanced packet loss recovery in voice multiplex-multicast based VoIP networks. 68:1-68:4 - T. Arathi, Latha Parameswaran, K. P. Soman:
A study of reconstruction algorithms in computerized tomographic images. 69:1-69:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.