Volume
11 Number 1 (2015)
Contents
A Study on linear time-invariant Transistor Circuit using Adomian Decomposition Method
pp.1-3
S. Sekar and M. Nalini
A Study on Single Server Queue in Southern Railway using Monte Carlo Simulation
pp.4-9
S.Shanmugasundaram and P.Banumathi
Analysis of the linear time-invariant Electronic Circuit using Adomian Decomposition Method
pp.10-13
S. Sekar and A. Kavitha
CHARACTERIZATION OF FUZZY
BRIDGES AND FUZZY CUTNODES
pp.14-17
A.MOHAMED UDHUMAN, S.NAGARAJAN, M.CHANDRASEKHARAN
CHARACTERIZATION OF NEARLY OPEN SETS USING FUZZY SETS
pp.18-20
R.PADMAPRIYA and P.THANGAVELU
Composition Operators
pp.21-26
G.Balaji C.V.Seshaiah B.Vennila and N. Meenambigai
Decision Tree Construction for Rule Generation Using Rough Set
pp.27-32
P.Seethalakshmi and S.Vengataasalam
Future Behavior of Toll plaza Using Monte Carlo Simulation
pp.33-38
S.Shanmugasundaram and S.Punitha
Fuzzy Row Penalty Method to solve Assignment Problems with uncertain parameters
pp.39-44
K.Rathi, S.Balamohan, P.Shanmugasundaram, and M.Revathi
MULTI-SERVER FUZZY QUEUEING MODEL USING DSW ALGORITHM
pp.45-51
S. Shanmugasundaram and B.Venkatesh
Numerical aspects of Fuzzy Differential Inclusions using Leapfrog Method
pp.52-55
S. Sekar and K. Prabhavathi
Numerical Investigation of Single-Term Haar Wavelet Series to Second Order Linear System with Singular - A
pp.56-61
G. Balaji, A. Shobana, S. Vengataasalam, S. Sekar
Numerical Strategies for the Time Varying Delay System using Haar Wavelet Method
pp.62-67
K. Prabakaran, and S . Vengataasalam
Observer design of Singular Systems (Robot Arm Model) using Leapfrog Method
pp.68-71
S. Sekar and M. Vijayarakavan
Robust reliable sampled-data control for flight control systems via mixed H1 and passivity approach
pp.72-83
K.Sundareswari
Role of cloud in integrating Knowledge management and E-learning system
pp.84-89
A. Priya Dharshini, S. Chandrakumarmangalam
TIME DEPENDENT SOLUTION OF M//1 RETRIAL QUEUE AND FEEDBACK ON NON –RETRAIL CUSTOMERS WITH CATASTROPHES
pp.90-95
S. Shanmugasundaram and S.Chitra
SECURED PUBLISH/SUBSCRIBER SYSTEMS VIA TWO WAY AUTHENTICATION USING IDENTITY-BASED ENCRYPTION
pp.95-100
V.Muthu and R.R.Prianka
Web Services Based on User Profile Using Ontology to Minimize Search Time
pp.101-104
J. Sowmiya and Viji Vinod
Intrusion Detection System by Combining Fuzzy Logic with Genetic Algorithm
pp.105-106
A.Angel Cerli and S.Ramamoorthy
Reduction of Dimensionality for High Dimensional Data using Correlation Measures
pp.107-111
S. Malavika and K.Selvam
Relational Parametric Search Methodology and their Performance Measures
pp.112-115
S.Geetha and K.Selvam
An Enhanced Captcha Algorithm for 3D Images
pp.116-123
N. Kamatchi and S. Rama Moorthy
CPACK—APPLYING CLUSTER APPROACH IN PREDICTION BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM
pp.124-127
S.Kokilavani and V.SaralaDevi
MINIMIZING DISTORTION IN 3D IMAGES USING GRADIENT - BASED METHOD.
pp.128-135
G.Dhanalakshmi and S. Rama Moorthy,
GRAPH COLORING ANDEDGE CONNECTIVITY INTRAFFIC SIGNAL PROBLEM
pp.136-142
R.Nagarathinam and N.Parvathi,
Minimum spanning tree of a
Rough graph having weights as Trapezoidal Fuzzy numbers.
pp.143-147
S.Dhanalakshmi and N.Parvathi
STUDY OF ADVERSARY MODELS IN
DISTRIBUTED STORAGE SYSTEMS
pp.148-155
C.K. Shyamala and R.R.Sharanya
COMPARATIVE STUDY ON BIG DATA
MINING AND PLATFORM - A SURVEY
pp.156-162
B. Sabira and J. Ilamchezhian
Reinforced learning to
enhance life skills in the Autistic: An Artificial Neural Network
Approach
pp.163-166
Asha Kurian and Viji Vinod