Previous Issues
Volume 15, Issue 2
Volume 15, Issue 1
Volume 14, Issue 4
Volume 14, Issue 3
Volume 14, Issue 2
Volume 14, Issue 1
Volume 13, Issue 4
Volume 13, Issue 3
Volume 13, Issue 2
Volume 13, Issue 1
Volume 12, Issue 4
Volume 12, Issue 3
Volume 12, Issue 2
Volume 12, Issue 1
Volume 11, Issue 4
Volume 11, Issue 3
Volume 11, Issue 2
Volume 11, Issue 1
Volume 10, Issue 4
Volume 10, Issue 3
Volume 10, Issue 2
Volume 10, Issue 1
Volume 9, Issue 4
Volume 9, Issue 3
Volume 9, Issue 2
Volume 9, Issue 1
Volume 8, Issue 4
Volume 8, Issue 3
Volume 8, Issue 2
Volume 8, Issue 1
Volume 7, Issue 4
Volume 7, Issue 3
Volume 7, Issue 2
Volume 7, Issue 1
Volume 6, Issue 4
Volume 6, Issue 3
Volume 6, Issue 2
Volume 6, Issue 1
Volume 5, Issue 4
Volume 5, Issue 3
Volume 5, Issue 2
Volume 5, Issue 1
Volume 4, Issue 4
Volume 4, Issue 3
Volume 4, Issue 2
Volume 4, Issue 1
Volume 3, Issue 4
Volume 3, Issue 3
Volume 3, Issue 2
Volume 3, Issue 1
Volume 2, Issue 4
Volume 2, Issue 3
Volume 2, Issue 2
Volume 2, Issue 1
Volume 1, Issue 4
Volume 1, Issue 3
Volume 1, Issue 2
Volume 1, Issue 1
Home
>>
Journals
>>
ICTACT Journal on Soft Computing
>>
View Articles
ICTACT Journal on Soft Computing
An International Publication of ICT Academy
Volume 4, Issue 2 Articles
January 2014
Volume 4
Issue 2
ISSN 2229-6956
Table of Contents
1204
Survey on Clustering Algorithm and Similarity Measure for Categorical Data
Page(s):
715-722
S. Anitha Elavarasi
1
, J. Akilandeswari
2
Sona College of Technology, India
Abstract
Full Text
DOI :
10.21917/ijsc.2014.0103
1203
Experiments Towards Determining Best Training Sample Size for Automated Evaluation of Descriptive Answers Through Sequential Minimal Optimization
Page(s):
710-714
Sunil Kumar C
1
, R. J. Rama Sree
2
Bharathiar University, India
1
, Rashtriya Sanskrit Vidyapeetha, India
2
Abstract
Full Text
DOI :
10.21917/ijsc.2014.0102
1202
Severity Classification of Microaneurysms Using Neural Network
Page(s):
703-709
Shree Divya R
1
, S. Balaji
2
Akshaya College of Engineering and Technology, India
Abstract
Full Text
DOI :
10.21917/ijsc.2014.0101
1201
A Proficient Model for High End Security in Cloud Computing
Page(s):
697-702
R. Bala Chandar
1
, M. S. Kavitha
2
, K. Seenivasan
3
Sri Shakthi Institute of Engineering and Technology, India
1
, Sri Eshwar College of Engineering and Technology, India
2
, Renganayagi Varatharaj College of Engineering, India
3
Abstract
Full Text
DOI :
10.21917/ijsc.2014.0100
1200
Web Content Extraction Using Hybrid Approach
Page(s):
692-696
K. Nethra, J. Anitha, G.Thilagavathi
Sri Ramakrishna Engineering College, India
Abstract
Full Text
DOI :
10.21917/ijsc.2014.0099
1199
Cat Swarm Optimization for Single Stage Supply Chain Distribution System with Fixed Charges
Page(s):
687-691
P. Manimaran
1
, V. Selladurai
2
Kamaraj College of Engineering and Technology, India
1
, Coimbatore Institute of Technology, India
2
Abstract
Full Text
DOI :
10.21917/ijsc.2014.0097
1198
Real-Time Intelligent Multilayer Attack Classification System
Page(s):
677-686
T Subbulakshmi
1
, S G Keerthiga
2
, R Dharini
3
Sethu Institute of Technology, India
1
, Thiagarajar College of Engineering, India
2
, Thiagarajar College of Engineering, India
3
Abstract
Full Text
DOI :
10.21917/ijsc.2014.0098
This work is licensed under a
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License
.