European Journal of Applied Sciences (EJAS)
Volume
8 Number 4, 2016
Prediction of Drowsy Drivers Fault Using Bio Signals Joint Stachostic FSD (BJSFSD) Algorithm
A. Saravanamoorthi and R.S.D. Wahidha Banu
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Village Chickens Housing System in Kaffa and Benchmaji Zone, Ethiopia
Kibreab Yosefe, Zelalem Abate and Kassa Tarekegn
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
An Examination of the Relationship between 2d:4d Finger
Length Proportions and Anaerobic Power in Athletes
Yasar Köroglu, Cemil Aksoy, Özdemir Atar and Hürmüz Koç
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Detecting and Preventing DDoS in Cloud Using Average Distance Estimation Technique
Sujith Kumar Mahakud and J. Jackulin Reeja
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Proficient Mmins Algorithm in Integratedvanet-4G Milieu
P. Dharanyadevi and K. Venkatalakshmi
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Data Integrity Checking in Multi Cloud Storage
G. Arthi and N. Srinivasan Narayanasamy
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Tampering Detection and Hash Coding Self-Recovery
in Digital Image Protection
M. Aruna and Dr. N. Srinivasan Narayanasamy
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Efficient Entity Resolution Method for Heterogeneous Information Spaces
Manjula and S. Jancy
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Analysis of Swarm Intelligent Based Defense Algorithm for
Detecting Jamming Attack in Wireless Sensor Networks (WSNS)
E. Sasikala and N. Rengarajan
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
A Multi-Tenant Web Application Framework for Software as a Service (SAAS)
J.M. Naveen and B. Muthu Kumar
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————
Empirical Evaluation of Different Machine Learning Methods for
Software Services Development Effort Estimation Through Correlation Analysis
Amid Khatibi Bardsiri and Seyyed Mohsen Hashemi
[ Abstract ] [ Full Text ]
——————————————————————————————————————————————————————————————————————————————————————————————————————————