e-ISSN:0976-5166 p-ISSN:2231-3850
Vol. 5, No. 2 |
Article # |
Article Title & Authors (Volume 5 Number 2 April-May 2014) |
Page |
1. |
REINFORCEMENT LEARNING IN COMPLEX REAL WORLD DOMAINS: A REVIEW
Samiksha Mahajan
Abstract | PDF |
32-40 |
2. |
Green Cloud: Smart Resource Allocation and Optimization using Simulated Annealing Technique
AkshatDhingra, Sanchita Paul
Abstract | PDF |
41-49 |
3. |
DETECTION OF CROSS-PROJECT BENEFICIAL CLONES
Ms.Kavitha Esther Rajakumari, Dr.T.Jebarajan
Abstract | PDF |
50-54 |
4. |
SCHEDULING OF MECHANICS IN AUTOMOBILE REPAIR SHOPS USING ANN
N. SHIVASANKARAN, P. SENTHILKUMAR
Abstract | PDF |
55-60 |
5. |
SV MACHINES FOR FUNCTION ESTIMATION COVERING QUADRATIC PROGRAMMING WITH LARGE DATA SETS USING FOR INTERIOR POINT ALGORITHM
M. Premalatha, Dr. C. VijayaLakshmi
Abstract | PDF |
61-66 |
6. |
A Technique to improve Security of Data in Multilevel Trust
A. Viji Amutha Mary, Dr. T. Jebarajan
Abstract | PDF |
67-70 |
7. |
A SURVEY ON AUTHENTICATION ATTACKS AND COUNTERMEASURES IN A DISTRIBUTED ENVIRONMENT
Jesudoss A., Subramaniam N.P.
Abstract | PDF |
71-77 |
8. |
ESTIMATION OF THE BURST LENGTH IN OBS NETWORKS
Pallavi S., M. Lakshmi
Abstract | PDF |
78-84 |
9. |
PREDICTION OF RAINFALL USING DATAMINING TECHNIQUE OVER ASSAM
PINKY SAIKIA DUTTA, HITESH TAHBILDER
Abstract | PDF |
85-90 |
10. |
Comparison between simulations of different RBSD Adder Circuits
SOBINA GUJRAL, ROBINA GUJRAL
Abstract | PDF |
91-96 |
11. |
Link Stability Based Hop By Hop Multicast Protocol For Vanets
G.Mary Valantina, Dr.S.Jayashri
Abstract | PDF |
97-100 |
12. |
DATA MINING: A ‘RIM’ ALGORITHM FOR SPYWARE DETECTION WITH PRUNING
Mrs. Indulakshmi, Dr.Nalini
Abstract | PDF |
101-104 |