- Loghman Kaki, Mohammad Teshnehlab, Mahdi Aliyari Shoorehdeli:
Classification of Multi-Class Datasets Using 2D Membership Functions in TSK Fuzzy System. Int. J. Adv. Comp. Techn. 2(1): 33-40 (2010) - A. N. M. Rezaul Karim, Thwarique:
Face Recognition Using Matrix Decomposition Technique Eigenvectors and SVD. Int. J. Adv. Comp. Techn. 2(1): 64-71 (2010) - Fatemeh Kafili Kasmaee, Ramin Nassiri, Gholamreza Latif Shabgahi:
Achieving CMMI Maturity Level 3 by Implementing FEAF Reference Models. Int. J. Adv. Comp. Techn. 2(4): 115-122 (2010) - Prabhjot Kaur, Moin Uddin, Arun Khosla:
Adaptive Bandwidth Allocation Scheme for Cognitive Radios. Int. J. Adv. Comp. Techn. 2(2): 35-41 (2010) - Bahaa I. Kazem, Ali H. Hamad, Mustafa M. Mozael:
Modified Vector Field Histogram with a Neural Network Learning Model for Mobile Robot Path Planning and Obstacle Avoidance. Int. J. Adv. Comp. Techn. 2(5): 166-173 (2010) - Davood KeyKhosravi, Ali Ghaffari, Ali Hosseinalipour, Batool Abadi Khasragi:
New Clustering Protocol to Decrease Probability Failure Nodes and Increasing the Lifetime in WSNs. Int. J. Adv. Comp. Techn. 2(2): 117-121 (2010) - Zahra Khanmirzaei, Mohammad Teshnehlab:
Prediction Using Recurrent Neural Network Based Fuzzy Inference system by the Modified Bees Algorithm. Int. J. Adv. Comp. Techn. 2(2): 42-55 (2010) - Aasia Khanum:
An Intelligent Framework for Natural Object Identification in Images. Int. J. Adv. Comp. Techn. 2(2): 122-129 (2010) - Shailesh Khapre, Madarapu Naresh Kumar, P. Dhavachelvan, S. K. V. Jayakumar:
V-Book: Memoryless Editor for eBooks. Int. J. Adv. Comp. Techn. 2(3): 47-63 (2010) - Nasser N. Khmiss, Msc Huthaifa T. Akrm:
A New Approach of Digital Subscriber Line2 Initialization Process. Int. J. Adv. Comp. Techn. 2(1): 16-32 (2010) - Hee-Cheul Kim, Hyoung-Keun Park:
The Comparative Study of Software Optimal Release Time Based on Burr Distribution. Int. J. Adv. Comp. Techn. 2(3): 119-129 (2010) - Jaakko Korpi, Jussi Koskinen:
Constructive Dynamic Program Slicing Research. Int. J. Adv. Comp. Techn. 2(2): 7-23 (2010) - Yonsik Lee, Jeongsu Lee:
The Migration of Mobile Agent Using the Object Replication. Int. J. Adv. Comp. Techn. 2(3): 15-21 (2010) - Yonsik Lee, Kwangwoo Nam:
The Metatable of Naming Agent for the Naming Service of Sensor Network. Int. J. Adv. Comp. Techn. 2(3): 77-83 (2010) - Jing-Chiou Liou, Sujith Bhashyam:
On Improving Feasibility and Security Measures of Online Authentication. Int. J. Adv. Comp. Techn. 2(4): 6-16 (2010) - Rahul Malhotra, Narinder Singh, Yaduvir Singh:
An Efficient Fuzzy-GA Flow Control of Turbine Compressor System: A Process Control Case Study. Int. J. Adv. Comp. Techn. 2(4): 128-139 (2010) - Azzam A. Marouf, Ali H. Hamad, Sameer A. Abdelrazzak:
A Developed Modified OSAP Controller with Repetitive Control Action for UPS. Int. J. Adv. Comp. Techn. 2(5): 153-165 (2010) - Antonio Martín, Carlos León, Félix Biscarri:
Intelligent Integrated Management for Telecommunication Networks. Int. J. Adv. Comp. Techn. 2(2): 158-171 (2010) - Osamu Mizuno, Hideaki Hata:
A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis. Int. J. Adv. Comp. Techn. 2(5): 1-12 (2010) - Ali Modirkhazeni, Norafida Ithnin, Othman Ibrahim:
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks. Int. J. Adv. Comp. Techn. 2(5): 25-41 (2010) - Amir Sabbagh Molahosseini, M. Kuchaki Rafsanjani, S. H. Ghafouri, M. Hashemipour:
A Reduced-Area Reverse Converter for the Moduli Set {2n, 2n-1, 22n-1-1}. Int. J. Adv. Comp. Techn. 2(5): 61-65 (2010) - Mohammad Reza Moohebat, Mohammad Davarpanah Jazi:
A Comparative Study of Critical Success Factors (CSFs) in Implementation of ERP in Developed and Developing Countries. Int. J. Adv. Comp. Techn. 2(5): 99-110 (2010) - Vasi Narasimhulu, Pothula Sujatha, P. Dhavachelvan, M. S. Saleem Basha:
Enhanced Named Entity Transliteration Model Using Machine Learning Algorithm. Int. J. Adv. Comp. Techn. 2(3): 84-93 (2010) - Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta, Srishti Sarin:
Enhancing E-mail Security by CAPTCHA based Image Grid Master Password. Int. J. Adv. Comp. Techn. 2(5): 89-98 (2010) - Ali Abdulhadi Noaman:
Concentric Circular Array Antenna Null Steering Synthesis by Using Modified Hybrid Ant Colony System Algorithm. Int. J. Adv. Comp. Techn. 2(2): 144-157 (2010) - Shinya Nozaki, Yen-Wei Chen, Rumiko Azuma, Zensho Nakao, Yoshinori Namihira:
A Fourier Series Based Method of CT Image Reconstruction for Laser Fusion Research. Int. J. Adv. Comp. Techn. 2(3): 102-113 (2010) - Om Pal, Peeyush Jain, Sudhansu Goyal, Zia Saquib, Bernard L. Menezes:
Intrusion Detection Using Graph Support: A Hybrid Approach of Supervised and Unsupervised Techniques. Int. J. Adv. Comp. Techn. 2(3): 114-118 (2010) - Rezwanur Rahman, Joydip Saha, Ashirul Mubin:
Fast Scene Change Detection in Surveillance Systems Using ANOVA on Color Histogram. Int. J. Adv. Comp. Techn. 2(1): 72-77 (2010) - Ravi Rastogi, Nitin, Durg Singh Chauhan:
Fast Interconnections: A Case Tool for Developing Fault-tolerant Multi-stage Interconnection Networks. Int. J. Adv. Comp. Techn. 2(5): 13-24 (2010) - Saif D. Salman, Ahmed A. Bahrani:
Segmentation of Tumor Tissue in Gray Medical Images Using Watershed Transformation Method. Int. J. Adv. Comp. Techn. 2(4): 123-127 (2010)