Issue 2 of Volume 22

Security Model to Incorporate Add-On Security for Business Services

Authors: M.Thirumaran, P.Dhavachelvan, S.Abarna

Safe Guard Anomalies against SQL Injection Attacks

Authors: Romil Rawat, Chandrapal Singh Dangi, Jagdish Patil

Breast Cancer Mass Detection in Mammograms using K-means and Fuzzy C-means Clustering

Authors: Nalini Singh, Ambarish G Mohapatra, Gurukalyan Kanungo

Impact of Ontology based Approach on Document Clustering

Authors: S.C. Punitha, K. Mugunthadevi, M. Punithavalli

Skew Correction for Chinese Character using Hough Transform

Authors: Tian Jipeng, G.Hemantha Kumar, H.K. Chethan

Radio Resource Management and Interference Analysis for Downlink OFDMA in LTE

Authors: P.Balasundaram, S.Nandakumar, J.Ajanthkumar, K.G.Lingesh

Price Prediction of Share Market using Artificial Neural Network (ANN)

Authors: Zabir Haider Khan, Tasnim Sharmin Alin, Md. Akter Hussain