An Empirical Study on the Procedure to Derive Software Quality Estimation Models |
Jie Xu, Danny Ho, Luiz Fernando Capretz |
Vol 2, No 4 (2010), Pagination: 1-16
|
ABSTRACT |
PDF
|
|
Abstract Views: 375 |
PDF Views: 196
|
Diphone Speech Synthesis System for Arabic Using MARY TTS |
M. Z. Rashad, Hazem M. El-Bakry, Islam R. Isma'il |
Vol 2, No 4 (2010), Pagination: 18-26
|
ABSTRACT |
PDF
|
|
Abstract Views: 427 |
PDF Views: 195
|
Discovering Potential User Browsing Behaviors Using Custom-Built Apriori Algorithm |
Sandeep Singh Rawat, Lakshmi Rajamani |
Vol 2, No 4 (2010), Pagination: 28-37
|
ABSTRACT |
PDF
|
|
Abstract Views: 404 |
PDF Views: 201
|
Improvement in Delay of Information Flow in Energy Efficiency Organization |
Elham Hasanzadeh, Reza Askari Moghadam |
Vol 2, No 4 (2010), Pagination: 39-46
|
ABSTRACT |
PDF
|
|
Abstract Views: 368 |
PDF Views: 176
|
Efficient Web Log Mining Using Enhanced Apriori Algorithm with Hash Tree and Fuzzy |
S. Veeramalai, N. Jaisankar, A. Kannan |
Vol 2, No 4 (2010), Pagination: 60-74
|
ABSTRACT |
PDF
|
|
Abstract Views: 397 |
PDF Views: 224
|
M-Learning: A New Paradigm of Learning Mathematics in Malaysia |
Saipunidzam Mahamad, Mohammad Noor Ibrahim, Shakirah Mohd Taib |
Vol 2, No 4 (2010), Pagination: 76-86
|
ABSTRACT |
PDF
|
|
Abstract Views: 388 |
PDF Views: 206
|
Utilizing Diagnosing Problems in a Probabilistic Domain to Build Student Models |
Nabila Khodeir, Nayer Wanas, Nevin Darwish, Nadia Hegazy |
Vol 2, No 4 (2010), Pagination: 88-97
|
ABSTRACT |
PDF
|
|
Abstract Views: 361 |
PDF Views: 181
|
Clustering and Feature Specific Sentence Extraction Based Summarization of Multiple Documents |
A. Kogilavani, P. Balasubramani |
Vol 2, No 4 (2010), Pagination: 99-111
|
ABSTRACT |
PDF
|
|
Abstract Views: 407 |
PDF Views: 183
|
Mining Target-Oriented Sequential Patterns with Time-Intervals |
Hao-En Chueh |
Vol 2, No 4 (2010), Pagination: 113-123
|
ABSTRACT |
PDF
|
|
Abstract Views: 369 |
PDF Views: 207
|
A Survey of QOS Routing Protocols for Mobile AD HOC Networks |
G. Santhi, Alamelu Nachiappan |
Vol 2, No 4 (2010), Pagination: 125-136
|
ABSTRACT |
PDF
|
|
Abstract Views: 429 |
PDF Views: 244
|
Spiking Neurons with Asnn Based-Methods for the Neural Block Cipher |
Saleh Ali K. Al-Omari, Putra Sumari |
Vol 2, No 4 (2010), Pagination: 138-148
|
ABSTRACT |
PDF
|
|
Abstract Views: 406 |
PDF Views: 199
|
Clustering High Dimensional Data Using Subspace and Projected Clustering Algorithms |
Rahmat Widia Sembiring, Jasni Mohamad Zain, Abdullah Embong |
Vol 2, No 4 (2010), Pagination: 162-170
|
ABSTRACT |
PDF
|
|
Abstract Views: 368 |
PDF Views: 200
|
A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on Particle Swarm Theory with Arithmetic Crossover |
Md. Amjad Hossain, Md. Kowsar Hossain, M. M. A. Hashem |
Vol 2, No 4 (2010), Pagination: 172-187
|
ABSTRACT |
PDF
|
|
Abstract Views: 517 |
PDF Views: 220
|