Open Access
Subscription or Fee Access
Table of Contents
Articles
Fuzzy Clustering Algorithms - Different Methodologies and Parameters - A Survey | |
B.S. Charulatha, Dr. Paul Rodrigues, Dr.T. Chitralekha |
Data Mining Techniques for Malware Detection Using Signature Extraction | |
D. Jayakumar |
Efficient Clustering and Prediction of Mobile Behavior Pattern in Mobile Computing System | |
S. Sujatha, G. Bharathi Mohan |
Data Optimization from a Multiple Species Network using Modified SFLA (Shuffled Frog Leaping Algorithm) | |
N. Kannaiya Raja, Dr.K. Arulanandam, S.K. Sugunedham |
Memory Management by Using Association Rules Mining and Mine Frequent Pattern in Large Data Base | |
S. Arulanandan, T. Senthilmurugan, Dr.E. Kannan |
Privacy-Preserving Updates to Generalization-Based K-Anonymous and Confidential Database | |
D. Radha |
QoS Localized Routing for Guarantee Reliability in Wireless Sensor Networks using Data Fusion Method with Different Data Traffic Types | |
S.J. Kavitha, J. Roselin, Dr.P. Latha |
Rational Computation for Mining Association Rules from XML Documents | |
T. Sandhiya, M.S. Saravanan |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9578