

Table of Contents
Articles
Web Application Protection from Wide Range of Web Vulnerabilities |
PDF
![]() |
K. Venkatesh Sharma, K. Satish Kumar | 265-271 |
Determine the Properties of Objects to Maximum Clearance |
PDF
![]() |
K. Venkatesh Sharma, K.Hanumanth Rao, P. Nagaraj | 272-286 |
Classification using Generalization Based Decision Tree Induction along with Relevance Analysis Based on Relational Database |
PDF
![]() |
Amit Thakkar, Yogeshwar P Kosta, Amit Ganatra | 287-293 |
Intelligent Knowledge Based Heterogeneous Database using OGSA-DAI Architecture |
PDF
![]() |
G. Appasami, S. Karthikeyan | 294-299 |
Predicting Academic Performance Using Genetic Algorithm and SVM Classifier |
PDF
![]() |
P. Usha, K. Nandhini | 300-304 |
Simulator for Database Aggregation Using Metadata |
PDF
![]() |
Sandeep Kumar, Dr. Shiv Kumar | 305-309 |
Revealing of NOSQL Secrets |
PDF
![]() |
S. Vijaykumar, S.G. Saravanakumar | 310-314 |
Empirical Evaluation of Grid-Based Text Mining Tasks |
PDF
![]() |
R. Boobathiraj, J. Geetha | 315-320 |
A Survey on Clustering Analysis |
PDF
![]() |
C. Mythili, Dr.V. Kavitha | 321-325 |
Data Warehouse Automation – A Review |
PDF
![]() |
A. S. Kavitha, R. Kavitha | 326-331 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578