Information Security Risk Analysis Methods and Research Trends AHP and Fuzzy Comprehensive Method
ijcsit050310.pdf
A Systematic Mapping Study on Business Process Variability
A Neuro-Fuzzy Approach for the Fault Location Estimation of Unsynchronized Two-Terminal Transmission Lines
Sobel Edge Detection Method to Identify and Quantify the Risk Factors for Diabetic Foot Ulcers
Improving the Management of Cost and Scope in Software Projects Using Agile Practices
An Evaluation Method of Research on Wearable Wireless Body Area Network in Healthcare
Pre-Segmentation for the Computer Aided Diagnosis System
Extended Nymble: Method for Tracking Misbehaving Users Anonymosly While Blocking
Correlation Based VMS Placement Resource Provision
Classification Methods of Skin Burn Images
Concept-Based Indexing in Text Information Retrieval
Performance Analysis of Kernel-Based Virtual Machine
Analysis of Digital Images Using Morphlogical Operations
An Ontology based Text Mining framework for R&D Project Selection
Mining Closed Regular Patterns in Data Streams
Teaching Automated Test Data Generation Tools for C, C++ , and Java Programs
A Tabu Search Algorithm With Efficient Diversification Strategy for High Schooltimetabling Problem
Following Car Algorithm With Multiagent Randomized System
Comparative Study of Backpropagation Algorithms Inneural Network Based Identification of Power System