Volume 9, Issue 4, January 2016

Table of Contents


The Review of Soft Computing Applications in Humanitarian Demining Robots Design  | 
Mehdi Neshat, Ghodrat Sepidname, Elnaz Mehri, Amin Zalimoghadam
DOI: 10.17485/ijst/2016/v9i4/55595 | Total views: 979
Low Power 64 Point FFT Processor  | 
V. Sarada, T. Vigneswaran
DOI: 10.17485/ijst/2016/v9i4/83322 | Total views: 546
Deadline Aware Two Stage Scheduling Algorithm in Cloud Computing  | 
Indukuri R. Krishnam Raju, Penmasta Suresh Varma, M. V. Rama Sundari, G. Jose Moses
DOI: 10.17485/ijst/2016/v9i4/80553 | Total views: 922
An Efficient Low Power and High Speed Distributed Arithmetic Design for FIR Filter  | 
E. Chitra, T. Vigneswaran
DOI: 10.17485/ijst/2016/v9i4/79055 | Total views: 590
Optimization of Building Envelope to Reduce Air Conditioning  | 
T. V. K. Sushil Kumar, J. Chandrasekar, Satish Kumar Moorthy, A. Sakthikala, S. R. Arvind Bharath
DOI: 10.17485/ijst/2016/v9i4/79072 | Total views: 479
A Review of Scenarios and Enabling Technology Directions for 5g Wireless Communications  | 
Usman Tariq
DOI: 10.17485/ijst/2016/v9i4/80420 | Total views: 1608
Bottom-up Approach of Modeling Human Decision Making for Building Intelligent Agents  | 
R. John Martin, S. Sujatha
DOI: 10.17485/ijst/2016/v9i4/81628 | Total views: 515
An Error Analysis of Matriculation Students' Permutations and Combinations  | 
Rusydah Usry, Roslinda Rosli, Siti Mistima Maat
DOI: 10.17485/ijst/2016/v9i4/81793 | Total views: 503
Rapid Mass Propagation of Salacia Chinensis L., an Endangered Valuable Medicinal Plant through Direct Organogenesis  | 
B. N. Majid, K. K. K. Sampath, H. S. Prakash, N. Geetha
DOI: 10.17485/ijst/2016/v9i4/84743 | Total views: 825
An Analysis of Modern Approaches to the Delivery of Unwanted Emails (spam)  | 
D. S. Silnov
DOI: 10.17485/ijst/2016/v9i4/84803 | Total views: 517
Optimization of Acid Leaching of Rutile Containing Slag using Factorial Based Response Surface Modeling  | 
Armin Abazarpoor, Mohammad Halali, Hediyeh Khatibnezhad
DOI: 10.17485/ijst/2016/v9i4/52194 | Total views: 477
A Khattak Approach for Detection and Removal of Black and Gray Hole Attacks in Manet  | 
K. Hizbullah, U. Arif Iqbal, Insafullah
DOI: 10.17485/ijst/2016/v9i4/77755 | Total views: 604
Antioxidant Potential, Polyphenols and Diphenol Content of Seaweed Available at Veraval Coast, Saurashtra Region - Gujarat  | 
Ajaj H. Ishakani, Nilesh H. Joshi, M. Ayaz, K. Sumara, Kailash H. Vadher
DOI: 10.17485/ijst/2016/v9i4/78665 | Total views: 2382
Simulation and Performance Analysis of Carbon Nano-materials based Patch Antennas  | 
Sandeep Dhariwal, Vijay Kumar Lamba, Ajay Kumar
DOI: 10.17485/ijst/2016/v9i4/84748 | Total views: 512
Developing a Modified Logistic Regression Model for Diabetes Mellitus and Identifying the Important Factors of Type II Dm  | 
M . Nirmala Devi, Appavu alias Balamurugan, M. Reshma Kris
DOI: 10.17485/ijst/2016/v9i4/87028 | Total views: 614
Enhanced De-Noising Technique for Region Growing Segmentation  | 
D. Anithadevi, K. Perumal
DOI: 10.17485/ijst/2016/v9i4/87029 | Total views: 514
Bi-Analysis Recommendation for Utilization of ICT in E-Governance Services for BSNL using Data Analytics  | 
C . Periasamy, N. Rama
DOI: 10.17485/ijst/2016/v9i4/87030 | Total views: 474
Predictive Modeling of Student Dropout Indicators in Educational Data Mining using Improved Decision Tree  | 
Subitha Sivakumar, Sivakumar Venkataraman, Rajalakshmi Selvaraj
DOI: 10.17485/ijst/2016/v9i4/87032 | Total views: 879
Enhancing the Security for Manet by Identifying Untrusted Nodes using Uncertainity Rules  | 
S. Muthuramalingam, T. Suba Nachiar
DOI: 10.17485/ijst/2016/v9i4/87043 | Total views: 455
Analysis of Process Mining Model for Software Reliability Dataset using HMM  | 
V. Priyadharshini, A. Malathi
DOI: 10.17485/ijst/2016/v9i4/52931 | Total views: 494
The Health Status Model in Urban and Rural Society in West Sumatera, Indonesia: An Approach of Structural Equation Modeling  | 
Ferra Yanuar
DOI: 10.17485/ijst/2016/v9i4/72601 | Total views: 391
Production of Medically Important Lactic Acid by Lactobacillus Pentosus: A Biological Conversion Method  | 
Mohammed A. Almalki
DOI: 10.17485/ijst/2016/v9i4/84143 | Total views: 454
Comparative Study of Different Methods for Brain Tumor Extraction from MRI Images using Image Processing  | 
Neha Baraiya, Hardik Modi
DOI: 10.17485/ijst/2016/v9i4/85624 | Total views: 1164
Rainwater Runoff Estimation using Empirical formulae Computed in C Programming Software for Puriliya District of West Bengal  | 
P. Vijayalakshmi, Prince Kumar Luv, Ankit Kumar Soni
DOI: 10.17485/ijst/2016/v9i4/55229 | Total views: 370
New Method for Assessment of Serum Catalase Activity  | 
Mahmoud H. Hadwan
DOI: 10.17485/ijst/2016/v9i4/80499 | Total views: 3166
A Novel Approach for Performance and Security Enhancement during Live Migration  | 
B. Lakshmipriya, R. Leena Sri, N. Balaji
DOI: 10.17485/ijst/2016/v9i4/87031 | Total views: 544
A Review of Downlink Packet Scheduling Algorithms for Real Time Traffic in LTE-Advanced Networks  | 
S. Radhakrishnan, S. Neduncheliyan, K. K. Thyagharajan
DOI: 10.17485/ijst/2016/v9i4/84061 | Total views: 612
A Voice Identification System using Hidden Markov Model  | 
T. K. Das, Khalid M. O. Nahar
DOI: 10.17485/ijst/2016/v9i4/83894 | Total views: 607
Generalized Fuzzy σ - Algebra and Generalized Fuzzy Measure on Soft Sets  | 
Vakkas Ulucay, Mehmet Sahin, Necati Olgun, Ozge Oztekin, Aykut Emniyet
DOI: 10.17485/ijst/2016/v9i4/61989 | Total views: 394
Assessment of Selection Criteria in Sesame by using Correlation and Path Coefficient Analysis under High Moisture and Acidic Stress Soil Condition  | 
Mohan Lal, Sukriti Dutta, Debajit Saikia, B. S. Bhau
DOI: 10.17485/ijst/2016/v9i4/71453 | Total views: 456
Challenging Aspects for Facial Feature Extraction and Age Estimation  | 
A. Deepa, T. Sasipraba
DOI: 10.17485/ijst/2016/v9i4/72315 | Total views: 547
A Tourism Arrival Forecasting using Genetic Algorithm based Neural Network  | 
Edi Noersasongko, Fenty Tristanti Julfia, Abdul Syukur, Purwanto , Ricardus Anggi Pramunendar, Catur Supriyanto
DOI: 10.17485/ijst/2016/v9i4/78722 | Total views: 2512
Application of Heuristics for Parallel Flow Line Scheduling Problem  | 
S. Rajendran, K. Balasubramanian
DOI: 10.17485/ijst/2016/v9i4/80082 | Total views: 332
An Appraisal of Meta-Heuristic Resource Allocation Techniques for IaaS Cloud  | 
Syed Hamid Hussain Madni, Muhammad Shafie Abd Latiff, Yahaya Coulibaly, Shafi’i Muhammad Abdulhamid
DOI: 10.17485/ijst/2016/v9i4/80561 | Total views: 1561
Factors Affecting Consumer Attitudes, Intentions and Behaviors toward SMS Advertising in Palestine  | 
Mohammed Zedan Yehia Salem
DOI: 10.17485/ijst/2016/v9i4/80216 | Total views: 1213
Topological Indices and Interpolation of Sequences  | 
Mahmood Ebrahimi, Mehdi Alaeiyan
DOI: 10.17485/ijst/2016/v9i4/77268 | Total views: 273
Knowledge Discovery in Databases (KDD) as Tools for Developing Customer Relationship Management as External Uncertain Environment: A Case Study with Reference to State Bank of India  | 
Priyaranjan Dash, Sabyasachi Pattnaik, Biswaranjan Rath
DOI: 10.17485/ijst/2016/v9i4/82902 | Total views: 442
Motor Function Outcome Assessment by Grip and Pinch Strength Following Carpal Tunnel Release  | 
Surendra U. Kamath, Nahar Vivek, K. R. Gowtham
DOI: 10.17485/ijst/2016/v9i4/56916 | Total views: 356
Big Data Architecture for Capturing, Storing, Analyzing and Visualizing of Web Server Logs  | 
P. Parthiban, S. Selvakumar
DOI: 10.17485/ijst/2016/v9i4/84173 | Total views: 1165
Saudi Higher Education Reality and Prospects: Evaluating Careers’ Dimensions of University Teaching, Scientific Research and Community Service Northern Border University as a Model  | 
M. Alsharari Mufadhi Ratyan, A. Almadani Maen Mohammad
DOI: 10.17485/ijst/2016/v9i4/84984 | Total views: 786
Perfect Vertex (Edge) Domination in Fuzzy Graphs  | 
S. Ramya, S. Lavanya
DOI: 10.17485/ijst/2016/v9i4/70772 | Total views: 390
Genetic Integrity in Wild Stock of Babylonia spirata (Linnaeus, 1758) and Babylonia zeylanica (Bruguiere, 1789) from Southeast Coast of India: An important Mariculture Gastropod Species  | 
M. Chandra Shekar, S. Arularasan, Neelam M. Nathani, Shefali Macwan, S. T. Somasundaram
DOI: 10.17485/ijst/2016/v9i4/81799 | Total views: 331
A Review on Polymer Nanocomposites: Synthesis, Characterization and Mechanical Prop  | 
Shivraj Puggal, Novepreet Dhall, Navjeet Singh, Manpreet Singh Litt
DOI: 10.17485/ijst/2016/v9i4/81100 | Total views: 911
Policy Approval Engine - A Framework for Securing Web Applications and Web User  | 
A. Saravanan, M. S. Irfan Ahmed, S. Sathya Bama
DOI: 10.17485/ijst/2016/v9i4/84341 | Total views: 337
An Optimized Approach on Link Stability with Load Balancing in MANET using Balanced Reliable Shortest Route AOMDV (BRSR_AOMDV)  | 
D. Maheshwari, R. Nedunchezhian
DOI: 10.17485/ijst/2016/v9i4/70487 | Total views: 409
A Survey on Data Redundancy Check in a Hybrid Cloud by using Convergent Encryption  | 
N. R. Anitha Rani, S. K. Ram Kumar, P. Prem Kumar
DOI: 10.17485/ijst/2016/v9i4/87036 | Total views: 405
A Novel Clustering based Feature Subset Selection Framework for Effective Data Classification  | 
Sivakumar Venkataraman, Subitha Sivakumar, Rajalakshmi Selvaraj
DOI: 10.17485/ijst/2016/v9i4/87038 | Total views: 465
Metaheuristic Approach for Efficient Feature Selection: A Data Classification Perspective  | 
B. Amarnath, S. Appavu alias Balamurugan
DOI: 10.17485/ijst/2016/v9i4/87039 | Total views: 401
Data Confidentiality and Privacy in Cloud Computing  | 
S. Rajarajeswari, K. Somasundaram
DOI: 10.17485/ijst/2016/v9i4/87040 | Total views: 460
Classification of Adverse Event Thyroid Cancer using Naïve Entropy and Association Function  | 
K. V. Uma, S. Appavu alias Balamurugan
DOI: 10.17485/ijst/2016/v9i4/87042 | Total views: 290
Performance Comparison of Line-Start Permanent Magnet Synchronous Motors with Interior and Surface Rotor Magnets  | 
Cosmas U. Ogbuka, Cajethan M. Nwosu, Marcel U. Agu
DOI: 10.17485/ijst/2016/v9i4/72038 | Total views: 374
The Effect from Finite DC Gain and Gain-Bandwidth of an Op-amp on Pipelined Analog-to-Digital Converter Errors  | 
Alexander Korotkov, Ivan Piatak
DOI: 10.17485/ijst/2016/v9i4/72205 | Total views: 292
Scope and Prospects of Non-Invasive Visual Inspection Systems for Industrial Applications  | 
Zainul Abdin Jaffery, Ashwani Kumar Dubey
DOI: 10.17485/ijst/2016/v9i4/80067 | Total views: 543
Textural Properties of Kodo (Paspalum scrobiculatum L.) based Soy Fortified Ready to Eat Extruded Snacks using Response Surface Methodology  | 
Mohammad Azam, Mohan Singh, Devendra Kumar Verma
DOI: 10.17485/ijst/2016/v9i4/84142 | Total views: 390
A Mathematical Model to Control the Transmission of Thalassemia Disease using Pure Fractions  | 
S. Thakur, S. N. Raw, R. Sharma
DOI: 10.17485/ijst/2016/v9i4/78206 | Total views: 519
An Intelligent Hybrid Mechanism to Predict the Risk of Cardio Vascular Disease  | 
Sivagowry Shathesh, M. Durairaj
DOI: 10.17485/ijst/2016/v9i4/82278 | Total views: 420
Performance Analysis of AD-HOC on-Demand Distance Vector Routing Protocol  | 
N. M. Balamurugan, S. Appavu Alias Balamurugan
DOI: 10.17485/ijst/2016/v9i4/87973 | Total views: 325

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.