Pages | Title and author(s) |
131-147 | Mining images using clustering and data compressing techniquesSabyasachi Pattnaik, Pranab Kumar Das Gupta, Manojranjan Nayak DOI: 10.1504/IJICT.2008.019098 |
148-158 | Clarifying the metaVladan Devedzic, Dragan Gasevic, Dragan Djuric DOI: 10.1504/IJICT.2008.019099 |
159-170 | A novel approach of speaker authentication by fusion of speech and image features using Artificial Neural NetworksAnupam Shukla, Ritu Tiwari DOI: 10.1504/IJICT.2008.019100 |
171-184 | Simple cryptanalysis studies of a stream cipherN. Nalini, G. Raghavendra Rao DOI: 10.1504/IJICT.2008.019101 |
185-198 | Wavelet-based, speaker-independent isolated Hindi digit recognitionHaamid M. Gazi, Omar Farooq, Yusuf U. Khan, Sekharjit Datta DOI: 10.1504/IJICT.2008.019102 |
199-223 | An adaptable transport protocol based on Genetic AlgorithmsSheng-Uei Guan, Chek Liang Dominic Boh, Fei Liu DOI: 10.1504/IJICT.2008.019103 |
224-239 | Atmospheric temperature retrieval using a Radial Basis Function Neural NetworkE.H. Shiguemori, J.D.S. Da Silva, H.F. De Campos Velho, J.C. Carvalho DOI: 10.1504/IJICT.2008.019104 |