Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "information technology"

ADD TO MY LIST
 
RADIOFREQUENCY AND MICROWAVE RADIATION HEALTH EFFECTS AND OCCUPATIONAL EXPOSURE

Author(s): Nataša Đinđić | Jovica Jovanović | Vladica Veličković | Ivana Damnjanović | Boris Đinđić | Jelena Radović
Semantic Based Image Annotation Using Descriptive Features and Retagging approach

Author(s): P.Nagarani | R.VenkataRamanaChary | D.Rajya Lakshmi
Feature Image Generation Using Low, Mid and High Frequency Regions for Face Recognition

Author(s): Vikas Maheshkar | Sushila Kamble | Suneeta Agarwal | Vinay Kumar Srivastava
Investigations of the MRI Images using Aura Transformation

Author(s): Parveen Lehana | Pawanesh Abrol | Saleem Khan | Sandeep Arya | Swapna Devi | Satnam Singh
Tree Based Wavelet Transform and DAG SVM for Seizure Detection

Author(s): A.S.Muthanantha Murugavel | S.Ramakrishnan
Audio Segmentation using Line Spectral Pairs

Author(s): N. P. Jawarkar | R. S. Holambe | T. K. Basu
Classification of paddy Variries using Image processing

Author(s): S. F. Lilhare | N G Bawane
Digital Signatura Schemes for Secure Video

Author(s): R. N. Mandavgane | N.G.Bawane
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
Energy Conservation of WSN using Routing Protocol

Author(s): Nitin V. Lonbale | Sunil Gupta | Rajesh S. Bhute
Condition Monitoring Program: A Need to Improve Performance of Manchineries

Author(s): P. S. Thakare | C. J. Choudhari | C. C. Handa
Using Ontology Reasoning over Location Based Services

Author(s): Akansha A. Totewar | Prashant N. Chatur | AmitMeena
A Study of Digital Forensic: Process and Tools

Author(s): Sandhya Dahake | Shubhangi Daware
QOS Improvement by Load Balancing using Nodal and Neighboring Load in Multipath Routing

Author(s): Jawade Nilima R | Bawane N G | Dongre Manoj M
Techniques for Traffic Sign Classification using Machine Learning- A Survey

Author(s): Meeta Kumar | JayshreeGhorpade | V. Y.Kulkarni
New generatition of Networking with OSPF

Author(s): Pratik N. Katolkar | Sneha R. Burnase
Review of Cloud Computing Architecture for Social Computing

Author(s): Vaishali D. Dhale | A. R. Mahajan
Novel Approach for Worm Detection using Modified CRC32 Algorithm

Author(s): Avinash Wadhe | Nikita Mahajan | Rahul Suryawanshi
Split Personality Malware: A Security Threat

Author(s): Nisha Lalwani | M.B.Chandak | R.V.Dharaskar
Efficient Single Rate based Multicast Congestion Control

Author(s): Sunil Kumar | Karan Singh
Trust Model for Reliable File Exchange In Cloud Computing

Author(s): Edna Dias Canedo | Rafael Timoteo de Sousa Junior | Robson de Oliveira Albuquerque
An Approach for Robots to Deal with Objects

Author(s): Sidiq S. Hidayat | Bong Keung Kim | Kohtaro Ohba
Kernel Based Object Tracking Using Mean Shift Method

Author(s): Swati P. Baviskar | Nitin S. Ujgare
FPGA Implementation of Viterbi Decoder

Author(s): ANUBHUTI KHARE | MANISH SAXENA | JAGDISH PATEL
Reliability Analysis of Multi Path Multistage Interconnection Networks

Author(s): Sudarson Jena | G.Sri Sowmya | P.Radhika | P.Venkat Reddy
J.H.Nirmal

Author(s): Suparva Patnaik | Mukesh Zaveri
Noise deduction using Quantum check Bits

Author(s): T.Godhavari | N.R.Alamelu
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
Positioning Webpage using Rank

Author(s): L. M. Barapatre | R.Sheikh
Two Degree Grayscale Differential Method for Teeth Image Recognition

Author(s): G.A. Kulkarni | A.S. Bhide | D.G. Patil
Coal Mine Rescue Robot

Author(s): C.D.Bhos | J.G.Rana
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Web Page Clustering using Latent Semantic Analysis

Author(s): Lalit A. Patil | S M. Kamalapur | Dhananjay Kanade
Acute Leukemia blast counting using RGB, HSI color spaces

Author(s): Rohini Patil | Mandar Sohani | Sachin Bojewar | Priya Tatiya
Mathematical Model for Digital Video Watermarking Based On 3D Wavelet Transform

Author(s): Sonam A. Bhandari | Amar D. Rana | Swati Z. Bhandari
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
Achieving Consensus with Individual Centrality Approach

Author(s): Vitri Tundjungsari | Jazi Eko Istiyanto | Edi Winarko | Retantyo Wardoyo
PAPR Reduction for OFDM System Using Companding Technique

Author(s): Bahubali K. Shiragapur | Uday Wali
An improved approach for Extended Visual Cryptography Scheme for Colour Images

Author(s): Bhandare Shital | Jhade Manoj | Jadhav Angarika
Analysis of Retaining Walls by Numerical Methods - A Literature Review

Author(s): P.N.Patil | U. O. Agrawal | K.A.Patil
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
Ranking Popular Items By Naive Bayes Algorithm

Author(s): Shiramshetty Gouthami | Golamari.Jose Mary | Pulluri Srinivas Rao
Quality of Service Using PSO Algorithm

Author(s): S.M. ELseuofi
Image Retrieval System Using Hybrid Feature Extraction Technique

Author(s): Vadhri Suryanarayana | M.V.L.N. Raja Rao | P. Bhaskara Reddy | G. Ravindra Babu
SignsWorld; Deeping into the Silence World and Hearing Its Signs (StAte oF the Art)

Author(s): A.M. Riad | Hamdy K.Elmonier | Samaa.M.Shohieb | A.S. Asem
Graph Based New Approach for Frequent Pattern Mining

Author(s): Anurag Choubey | Ravindra Patel | J.L. Rana
An Approach for Agile SOA Development using Agile Principals

Author(s): Majlesi Shahrbanoo | Mehrpour Ali | Mohsenzadeh Mehran
Visual Analysis of Cost Based Database Optimizers Using Picasso Tool

Author(s): Neeraj Sharma | Syed Imran Ali | Banshilal Patidar | Kavindra Raghuwanshi
Algorithm for XML Compression using DTD and Stack

Author(s): G. M. Tere | B. T. Jadhav
Hopfield Neural Network for Change Detection in Multitemporal Images

Author(s): Sneha Bishnoi | Vijay Gaikwad | Saurabh Asegaonkar
Potential Applications of Proteins in IT

Author(s): Shalini Katoch | Arpana Chaturvedi | Sonam Pareek | Arpana Deshmukh
An Effective CBIR using Texture

Author(s): Asmita Deshmukh | Leena Ragha | Gargi Phadke
Building of a Secure Data Warehouse by Enhancing the ETL Processes for Data Leakage

Author(s): Preeti Patil | Nitin Chavan | Srikantha Rao | S B Patil
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Modeling of SMF Link for Optical Networks

Author(s): B U Rindhe | S K Narayankhedkar | Sanjay Dudul
Nodes Credit based Direct Diffusion for wireless sensor networks

Author(s): Archana Patel | Surendra Verma | Roshani Patel
Web Usage Mining for Semantic WebPersonalization

Author(s): Pradnya jain | Rahul samant
Secured and Authenticated Sharing of Software Program

Author(s): Madhavi Gangurde | Umashankar prasad | Ranvir Kumar | Prashant Prajapati
Exploiting Web Search to Access IEEE papers

Author(s): Bidisha Roy | Machado Joy | Melcia Raj | Gnana Sonica
An Adult Site Access Verification System for Non-Adults

Author(s): Shalini Puri | Sona Kaushik
Android Geo Finder - A Real Time Tracking of Moveable Assets

Author(s): SR.Vijayshrenivas | P.Antony | Joe Christo
Contribution of environmental conditions in dental offices of Antioquia to the risk of mercury contamination

Author(s): Jairo A. Ruiz C | Gabriel J. Gómez M | Carlos J. Durán | Víctor M. Villa | Luis A. Zapata | Carlos M. Parra | Jorge I. Pérez R | Rosaura Carmona C
PREPARING A COMPREHENSIVE ANALYSIS OF THE MECHANICAL CLASSIFICATION OF STRUCTURAL GLASS

Author(s): Gergely Molnár | László Milán Molnár | Imre Bojtár
Studi Perbaikan Pengelolaan Perpustakaan dan Sistem Pengelolaan Arsip & Dokumen di PT Badak

Author(s): Kodrat Iman Satoto | Adian Fatchur Rochim | Yuli Christyono | Tri Handayani | Amin Taufiq | Putut Suharso
Improve Teaching Method of Data Mining Course

Author(s): Sakha'a Al Manaseer | Areej Malibari
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

Author(s): Vimal Bibhu | Dhirendra Kumar Singh
Speech Quality Assessment of VoIP: G.711 VS G.722 Based on Interview Tests with Thai Users

Author(s): Therdpong Daengsi | Chai Wutiwiwatchai | Apiruck Preechayasomboon | Saowanit Sukparungsee
A Hybrid Algorithm for Classification of Compressed ECG

Author(s): Shubhada S.Ardhapurkar | Ramandra R. Manthalkar | Suhas S.Gajre
Human Identification by Gait Using Corner Points

Author(s): Mridul Ghosh | Debotosh Bhattacharjee
Ear Biometrics in Human Identification System

Author(s): V.K. Narendira Kumar | B. Srinivasan
Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design

Author(s): M. Rizwan Jameel Qureshi | Mahaboob Sharief Shaik | Nayyar Iqbal
Diversity Through N-Version Programming: Current State, Challenges and Recommendations

Author(s): Raphaël Khoury | Abdelwahab Hamou-Lhadj | Mario Couture | Robert Charpentier
Reconstruction of Shape and Position for Scattering Objects by Linear Sampling Method

Author(s): A.R. Eskandari | M. Naser-Moghaddasi | M. Eskandari
A Smart and Secure Wireless Communication System: Cognitive Radio

Author(s): Shrikrishan Yadav | Santosh Kumar Singh | Krishna Chandra Roy
Interfacing of Sensor Network to Communication Network for Disaster Management

Author(s): Sanjay Patel | O. P. Vyas | Hansa Mehra
Path Congestion Control in Centralized Autonomous System

Author(s): Jaspreet Kaur Bagga | Kshitij Pathak | Narendra S. Chaudhari
Spatial and Frequency Domain for Grey level Digital Images

Author(s): Dharm Singh | Naveen Choudhary | Madhuri Agrawal
Analyzing Digital Signature Robustness with Message Digest Algorithms

Author(s): Rubina B. Patel | Naveen Chaudhary
An Integrated Framework for Malware Collection and Analysis for Botnet Tracking

Author(s): Rakesh Kumar Sehgal | D. S. Bhilare | Saurabh Chamotra
Social Impact of Internet Access: A Survey

Author(s): Poonam Dhaka | Sandeep Upadhyay | Drashti Dave
Privacy-Preserving Data Sharing Using Data Reconstruction Based Approach

Author(s): Kshitij Pathak | Narendra S. Chaudhari | Aruna Tiwari
K-anonymity Model for Multiple Sensitive Attributes

Author(s): Nidhi Maheshwarkar | Kshitij Pathak | Narendra S. Choudhari
Realization & Implementation of Wireless Parking System with GSM Based Security

Author(s): Meenakshi Tripathi | M. S. Gaur | Vijay Laxmi
Web based Farmers Bulletin for agricultural development using PAP Approach

Author(s): N.Manikandan | M.Sakthiganesh | P.J.Kumar | M.SenthilKumar
An Empirical Evaluation of Density-Based Clustering Techniques

Author(s): Glory H. Shah | C. K. Bhensdadia | Amit P. Ganatra
A Study of Role Based Access Control policies and Constraints

Author(s): Miriyala Markandeyulu | Bussa V.R.R.Nagarjuna | Akula Ratna Babu | A.S.K.Ratnam
ADVANCED ROTOR POSITION DETECTION TECHNIQUE FOR SENSORLESS BLDC MOTOR CONTROL

Author(s): S.JOSHUWA | E.SATHISHKUMAR | S.RAMSANKAR
K-ANONYMITY: The History of an IDEA

Author(s): Swagatika Devi
Software Quality Modeling and Current State of the Art

Author(s): N. Rajasekhar Reddy | R.J.Ramasree
Fuzzy C-Mean Clustering Algorithm Modification and Adaptation for Applications

Author(s): Bassam M. El-Zaghmouri | Marwan A. Abu-Zanona
Affiliate Program     

Tango Jona
Tangokurs Rapperswil-Jona