K-Means Clustering and Affinity Clustering based on Heterogeneous Transfer Learning
Assessment of Potential SQL Injection Threat into the Design Phase
An Approach to Linear Spatial Filtering Method based on Anytime Algorithm for Real-time Image Processing
E-mail Classification in An Instance-Based System Using Header Information and Text Mining Techniques
Overflow Detection Scheme in RNS Multiplication Before Forward Conversion
When Do Refactoring Tools Fall Short
Prioritization of Detected Intrusion in Biometric Template Storage for Prevention using Neuro-Fuzzy Approach
Business Process: The Model and The Reality
Hybrid Network Coding Peer-to-Peer Content Distribution
Complex Event Processing - A Survey
A Compact Priority based Architecture Designed and Simulated for Data Sharing based on Reconfigurable Computing
Applying a natural intelligence pattern in cognitive robots
Detection and Estimation of multiple far-field primary users using sensor array in Cognitive Radio Networks
Image Retrival of Domain Name system Space Adjustment Technique
Hiding Image in Image by Five Modulus Method for Image Steganography
Energy Efficient Routing Protocol Using Local Mobile Agent for Large Scale WSNs
Real-Time Markerless Square-ROI Recognition based on Contour-Corner for Breast Augmentation
Analytical Study of AHP and Fuzzy AHP Techniques
Using case-based decision support systems for accounting choices (CBDSS): an experimental investigation
Exploring leadership role in GSD: potential contribution to an overall knowledge management strategy