


default search action
1. A2CWiC 2010: Tamilnadu, India
- Krishnashree Achuthan, Gayatri Buragohain:

Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, September 16-17, 2010, Tamilnadu, India. ACM 2010, ISBN 978-1-4503-0194-7 - K. Hima Bindu

, P. S. V. S. Sai Prasad
, C. Raghavendra Rao:
Hybrid decision tree based on inferred attribute. 1:1-1:7 - Rama Devi Yellasiri

, P. Venu Gopal, P. S. V. S. Sai Prasad
:
Impact analysis of Jensen and Sk pal fuzzification in classification. 2:1-2:7 - Nisha Haridas, M. Nirmala Devi:

PSO learning on artificial neural networks. 3:1-3:6 - K. Sujatha

, N. Pappa
:
Temperature and combustion quality control in power station boilers using artificial neural networks. 4:1-4:6 - Manjusha Nair

, Nidheesh Melethadathil
, Bipin Nair
, Shyam Diwakar
:
Information processing via post-synaptic EPSP-spike complex and model-based predictions of induced changes during plasticity in cerebellar granular neuron. 5:1-5:8 - Mithula Parangan, Chitra Aravind, Harilal Parasuraman, Krishnashree Achuthan, Bipin Nair

, Shyam Diwakar
:
Action potential and bursting phenomena using analog electrical neuron. 6:1-6:7 - K. Lakshmi:

Multi-criteria hybrid PSO algorithm with communications for combinatorial optimisation. 7:1-7:8 - R. Sangeetha, B. Kalpana:

Optimizing the kernel selection for support vector machines using performance measures. 8:1-8:7 - D. Muruga Radha Devi, V. Maheswari

, P. Thambidurai:
Adaptive dimensionality reduction for recent-biased time series analysis. 9:1-9:7 - Najmeh Danesh, Malihe Danesh, Hossein Shirgahi, Abbas Ghaemi Bafghi:

Improving multiplication and reminder using implementation based on word and index. 10:1-10:6 - Mrudula Nimbarte, Smita Nagtode:

Method based technique of compilation with compilation server. 11:1-11:6 - (Withdrawn) Adaptive computer assisted instruction (CAI) for students with dyscalculia (learning disability in mathematics). 12:1-12:7

- B. Sarojini Ilango, N. Ramaraj:

A hybrid prediction model with F-score feature selection for type II Diabetes databases. 13:1-13:4 - Ipsita Bhattacharya, Mahinder Pal Singh Bhatia

:
SVM classification to distinguish Parkinson disease patients. 14:1-14:6 - Sapna P. G.

, Hrushikesha Mohanty:
Clustering test cases to achieve effective test selection. 15:1-15:8 - M. P. Preeja, K. P. Soman

:
Fast computation of marginalized walk kernel for virtual screening in drug discovery. 16:1-16:4 - K. V. Sujatha, S. Meenakshi Sundaram:

A combined PCA-MLP model for predicting stock index. 17:1-17:6 - Devi S. T. Pavithra, M. S. Vijaya:

Electroencephalogram wave signal analysis and epileptic seizure prediction using supervised classification approach. 18:1-18:6 - Upasna Singh, Gora Chand Nandi:

Efficient temporal pattern mining for humanoid robot. 19:1-19:7 - Rekha Singhal:

A national public healthcare framework using grid. 20:1-20:5 - B. Bhavani, Srividya Sheshadri

, R. Unnikrishnan
:
Vocational education technology: rural India. 21:1-21:7 - K. V. N. Sunitha

, A. Sharada:
Digitization of Indian literature: problem and solution. 22:1-22:7 - Jisha C. Thankappan, Sumam Mary Idicula:

Language independent voice-based gender identification system. 23:1-23:6 - Vani V

, S. Mohan:
Interactive 3D class room: a framework for Web3D using J3D and JMF. 24:1-24:7 - Marimuthu Krishnaveni

, Radha Venkatachalam:
Feature extraction based on multiphase level set framework for sign language recognition system. 25:1-25:6 - Rozita Jamili Oskouei:

The role of social networks on female students activities. 26:1-26:7 - V. Smrithi Rekha, Vidhya Balasubramanian, V. Adinarayanan:

Social computing in universities: an evaluation of practicality. 27:1-27:6 - G. Hemalatha, K. Thanuskodi:

Optimization of joins using random record generation method. 28:1-28:6 - E. Poovammal

, M. Ponnavaikko:
APPT: A privacy preserving transformation tool for micro data release. 29:1-29:8 - Smita Sengupta, Kavita V. V. Ganeshan, Nandlal L. Sarda:

Developing IITB Smart CampusGIS Grid. 30:1-30:8 - P. K. Srimani, Nanditha Prasad:

Analysis and evaluation of classifiers using multi-temporal images in land use and land cover mapping. 31:1-31:6 - B. Vanathi

, V. Rhymend Uthariaraj:
Context representation using hierarchical method and heuristic based context selection in context aware computing. 32:1-32:7 - P. Subashini, M. Krishnaveni

, Bernadetta Kwintiana Ane, Dieter Roller, Gerald Schaefer
:
A combined preprocessing scheme for texture based ice classification from SAR images. 33:1-33:6 - N. Valliammal, S. N. Geethalakshmi

:
Performance analysis of various leaf boundary edge detection algorithms. 34:1-34:6 - T. Sridevi, B. Krishnaveni

, V. Vijaya Kumar, Y. Rama Devi:
A video watermarking algorithm for MPEG videos. 35:1-35:6 - Dancy Kurian, R. S. Jayasree

, M. Wilscy, A. K. Gupta:
White Matter Hyperintensity segmentation using multiple stage FCM. 36:1-36:6 - S. S. Shylaja, S. Natarajan, K. N. Balasubramanya Murthy, K. G. Abhijit, Jayashree Diwakar, S. Mohammed Saifulla:

Aggregation of Gabor wavelets and curvelets with PCA for efficient retrieval of face images. 37:1-37:6 - K. J. Shanthi

, M. Sasi Kumar:
VLSI implementation of image segmentation processor for brain MRI. 38:1-38:6 - S. S. Sujatha, M. Mohammed Sathik:

A novel pixel based blind watermarking algorithm by applying Fibonacci transform. 39:1-39:6 - D. Maheswari, V. Radha

:
Enhanced layer based compound image compression. 40:1-40:8 - N. Sumathi, Antony Selvadoss Thanamani:

Pipelined backoff scheme for bandwidth measurement in QoS enabled routing towards scalability for MANets. 41:1-41:6 - Athira M. Nambiar

, Asha Vijayan, Aishwarya Nandakumar:
Wireless intrusion detection based on different clustering approaches. 42:1-42:7 - N. A. Vasanthi

, S. Annadurai:
Pattern based routing for event driven wireless sensor-actor networks. 43:1-43:6 - S. Simi, Maneesha V. Ramesh

:
Real-time monitoring of explosives using wireless sensor networks. 44:1-44:7 - S. Kirthiga, M. Jayakumar

:
AutoRegressive channel modeling and estimation using Kalman filter for downlink LTE systems. 45:1-45:5 - Deepali Virmani

, Satbir Jain:
Fault tolerant optimal path for data delivery in wireless sensor networks. 46:1-46:7 - Poonam Gera, Kumkum Garg, Manoj Misra:

Trust based security in MANET routing protocols: a survey. 47:1-47:7 - Archana Shukla:

A metadata and annotation extractor from PDF document for semantic web. 48:1-48:6 - M. Selvanayaki, V. Bhuvaneswari:

Finding microarray genes using GO ontology. 49:1-49:8 - Sunitha Abburu

, R. J. Anandhi:
Concept ontology construction for sports video. 50:1-50:6 - Swati Saigaonkar

, Madhuri Rao
:
XML filtering system based on ontology. 51:1-51:6 - Namita Mittal

, Richi Nayak
, Mahesh Chandra Govil, Kamal Chand Jain:
Evaluation of a hybrid approach of personalized web information retrieval using the FIRE data set. 52:1-52:6 - Ranaganayakulu Dhanalakshmi, Chenniappan Chellappan:

An intelligent technique to detect file formats and e-mail spam. 53:1-53:6 - R. Maheswari, S. Sheeba Rani:

An interactive RTOS based machine controller through speech using ESTREL. 54:1-54:4 - Bai. V. Ramani, S. N. Sivanandam:

An intelligent numerical algorithm for solving system of linear algebraic equations. 55:1-55:4 - V. Radhika

, G. Padmavathi:
A study on impulse noise removal for varied noise densities. 56:1-56:4 - G. Sudhamathy

:
Mining web logs: an automated approach. 57:1-57:4 - Raji R. Pillai, Sumam Mary Idicula:

Linear text segmentation using classification techniques. 58:1-58:4 - Anuj Mohamed

, K. N. Ramachandran Nair:
Continuous Malayalam speech recognition using Hidden Markov Models. 59:1-59:4 - Upasana Sharma:

Fault tolerant techniques for reconfigurable platforms. 60:1-60:4 - R. J. Anandhi, S. Natarajan, Sunitha Abburu

:
An enhanced clusterer aggregation using nebulous pool. 61:1-61:5 - S. Sangeetha

, Michael Arock
, Rini Smita Thakur:
Event mention detection using rough set and semantic similarity. 62:1-62:4 - Nandagopal Malarvizhi

, Kandaswamy Gokulnath, V. Rhymend Uthariaraj:
Sender initiated decentralized dynamic load balancing for multi cluster computational grid environment. 63:1-63:4 - Mary Priya Sebastian, Sheena Kurian K, G. Santhosh Kumar

:
English to Malayalam translation: a statistical approach. 64:1-64:5 - S. S. Anju, P. Harmya, Noopa Jagadeesh, R. Darsana:

Malware detection using assembly code and control flow graph optimization. 65:1-65:4 - R. Deepa Lakshmi, N. Radha:

Spam classification using supervised learning techniques. 66:1-66:4 - Vallidevi Krishnamurthy

, Chitra Babu:
Effective self adaptation by integrating adaptive framework with architectural patterns. 67:1-67:4 - Kanapathy Maheswari, M. Punithavalli:

Enhanced packet loss recovery in voice multiplex-multicast based VoIP networks. 68:1-68:4 - T. Arathi, Latha Parameswaran

, K. P. Soman
:
A study of reconstruction algorithms in computerized tomographic images. 69:1-69:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














