Simulation Study for Performance and Prediction of Parallel Computers

Author(s): Neeraj Kumar
Volume: 4
Issue: 2
Year: 2012





Quantitative Analysis of Spin Hall Effect in Nanostructures

Author(s): N. Gupta | K. K. Choudhary | S. Katiyal
Volume: 4
Issue: 2
Year: 2012





An Innovative Use of Information & Communication Technology (ICT) in Trade Facilitation in India

Author(s): V. S. Rana
Volume: 4
Issue: 2
Year: 2012





A Robust and Efficient Homography Based Approach for Ground Plane Detection

Author(s): Ajay Mittal | Sanjeev Sofat
Volume: 4
Issue: 2
Year: 2012





A Robust Source Coding Watermark Technique Based on Magnitude DFT Decomposition

Author(s): S. K. Muttoo | Sushil Kumar
Volume: 4
Issue: 2
Year: 2012





Boosting Geographic Information System’s Performance Using In-Memory Data Grid
Author(s): Barkha Bahl | Vandana Sharma | Navin Rajpal
Volume: 4
Issue: 2
Year: 2012




Tracking Digital Footprints of Scareware to Thwart Cyber Hypnotism Through Cyber Vigilantism in Cyberspace

Author(s): yberspace Neelabh
Volume: 4
Issue: 2
Year: 2012





Performance Analysis of Variation in Power Consumption and Frequency on Different Topologies of Ring VCO in 70 nm CMOS Technology

Author(s): Shitesh Tiwari | Parag Parandkar | Sumant Katiyal
Volume: 4
Issue: 2
Year: 2012





Process Benchmarking Through Lean Six Sigma for ERP Sustainability in Small & Medium Enterprises

Author(s): Rashmi Jha | A. K. Saini
Volume: 3
Issue: 2
Year: 2011





Efficiency Metrics

Author(s): Tamanna Siddiqui | Munior Ahmad Wani | Najeeb Ahmad Khan
Volume: 3
Issue: 2
Year: 2011





Exploring Alternative Topologies for Network-on-Chip Architectures

Author(s): Shafi Patel | Parag Parandkar | Sumant Katiyal | Ankit Agrawal
Volume: 3
Issue: 2
Year: 2011





Two Level Caching Techniques for Improving Result Ranking

Author(s): Amarjeet Singh | Mohd. Hussain | Rakesh Ranjan
Volume: 3
Issue: 2
Year: 2011





The Impact of Patent Applications Filed on Sustainable Development of Selected Asian Countries

Author(s): A.K. Saini | Surabhi Jain
Volume: 3
Issue: 2
Year: 2011





An Empirical Evaluation of LIKE Operator in Oracle

Author(s): Manoj Kumar Gupta | Pravin Chandra
Volume: 3
Issue: 2
Year: 2011





Measuring IT Effectiveness in Banks of India for Sustainable Development

Author(s): Sanjay Dhingra
Volume: 3
Issue: 2
Year: 2011





A Study to Examine the Digital Divide Factors: Jammu and Kashmir Perspective

Author(s): Preeti Dubey | JeevanJyoti | Devanand
Volume: 3
Issue: 2
Year: 2011





A Framework for Hierarchical Clustering Based Indexing in Search Engines

Author(s): Parul Gupta | A.K. Sharma
Volume: 3
Issue: 2
Year: 2011





Nonlinear Cicuit Modeling Using Volterra Series

Author(s): Akash Tayal, | Harneet Kaur. | Manika Babbar | Saumya Tyagi
Volume: 2
Issue: 2
Year: 2010





Energy Harvesting via Piezoelectricity

Author(s): Tanvi Dikshit | Dhawal Shrivastava | Abhijeet Gorey | Ashish Gupta | Parag Parandkar | Sumant Katiyal
Volume: 2
Issue: 2
Year: 2010





Minor Irrigation Census Computerization: A Step towards ICT For Micro Level Planning in Water Resources Management and Planning to Achieve Rural Prosperity

Author(s): Ajay Kumar Gupta | Kishore Kumar | Madaswamy Moni
Volume: 2
Issue: 2
Year: 2010





A Secure Private Key Encryption Technique For Data Security in Modern Cryptosystem

Author(s): Dilbag Singh
Volume: 2
Issue: 2
Year: 2010





Design Patterns For Successful Service Oriented Architecture Implementation

Author(s): G. M. Tere | B. T. Jadhav
Volume: 2
Issue: 2
Year: 2010





Traffic Generation Model for Delhi Urban Area Using Artificial Neural Network

Author(s): Shivendra Goel | J. B. Singh2 | Ashok Kumar Sinha
Volume: 2
Issue: 2
Year: 2010





Restricted Backtracked Algorithm For Hamiltonian Circuit in Undirected Graph

Author(s): Vinay Kumar
Volume: 2
Issue: 2
Year: 2010





System Versus Process Perspectives of Enterprise Resource Planning Implementations
Author(s): Vikram Tiwari
Volume: 2
Issue: 2
Year: 2010




Application of Fuzzy Relations in Convalescing Link Structure

Author(s): Raj Gaurang Tiwari | Mohd. Husain | Raees Ahmad Khan
Volume: 2
Issue: 2
Year: 2010





A Comparative Study of Software Requirements Tools For Secure Software Development

Author(s): Mohammad Ubaidullah Bokhari | Shams Tabrez Siddiqui
Volume: 2
Issue: 2
Year: 2010





Optimized Image Representation in Memory Using Linear Arrays

Author(s): Anu Suneja
Volume: 1
Issue: 2
Year: 2009





Performance Analysis of High Speed Data Networks Using Priority Discipline

Author(s): K. Bhatia | A. K. Pal | Anu Chaudhary
Volume: 1
Issue: 2
Year: 2009





Web Document Clustering for Finding Expertise in Research Area

Author(s): Anil Kumar Pandey | T. Jaya Lakshmi
Volume: 1
Issue: 2
Year: 2009





Digital Tampering Detection Techniques: A Review
Author(s): Kusam | Pawanesh Abrol | Devanand
Volume: 1
Issue: 2
Year: 2009




Evolution of Home Automation Technology

Author(s): Mohd. Rihan | M. Salim Beg
Volume: 1
Issue: 2
Year: 2009





Distribution Based Change-Point Problem With Two Types of Imperfect Debugging in Software Reliability

Author(s): P. K. Kapur | Sameer Anand | V. B. Singh
Volume: 1
Issue: 2
Year: 2009





Solving Sequence Alignment Problem Using Pipeline Approach

Author(s): Pankaj Agarwal | S. A. M. Rizvi
Volume: 1
Issue: 2
Year: 2009





Service Oriented Architecture for Business Dynamics: An Agent Based Business Modeling Approach

Author(s): O. P. Rishi
Volume: 1
Issue: 2
Year: 2009





Comparative Study of Distributed Computing Paradigms

Author(s): Harvendra Kumar
Volume: 1
Issue: 2
Year: 2009





Robust Source Coding Steganographic Technique Using Wavelet Transforms

Author(s): S. K. Muttoo | Sushil Kumar
Volume: 1
Issue: 2
Year: 2009





Obstacle Avoidance Through Visual Teleoperation

Author(s): Muhammad Usman Keerio
Volume: 1
Issue: 2
Year: 2009





Performance Analysis of Massively Parallel Architectures

Author(s): Z. A. Khan | J. Siddiqui | A. Samad
Volume: 5
Issue: 1
Year: 2013





A Reversible Image Steganographic Algorithm Based on Slantlet Transform

Author(s): Sushil Kumar | S. K. Muttoo
Volume: 5
Issue: 1
Year: 2013





Miniaturisation of WLAN Feeler Using Media with a Negative Refractive Index

Author(s): Bimal Garg | Ranjeet Pratap Singh Bhadoriya
Volume: 5
Issue: 1
Year: 2013





E-Licensing in DGFT: A Best E-Governance Application

Author(s): V. S. Rana
Volume: 5
Issue: 1
Year: 2013





Knowledge Representation in pAninI Framework Using Neural Network Model

Author(s): Smita Selot | Neeta Trpathi | A.S Zadgaonkar
Volume: 5
Issue: 1
Year: 2013





Descriptive Analysis of Enrollment Data and Adaptive Educational Hypermedia

Author(s): Nidhi Chopra | Manohar Lal
Volume: 5
Issue: 1
Year: 2013





Survey of Energy Computing in the Smart Grid Domain

Author(s): Rajesh Kumar | Arun Agarwala
Volume: 5
Issue: 1
Year: 2013





Performance Evaluation of Superscalar Processor Architecture Through UML

Author(s): Taskeen Zaidi | Vipin Saxena
Volume: 5
Issue: 1
Year: 2013





Design and Implementation of Monophones and Triphones-Based Speech Recognition Systems for Voice Activated Telephony

Author(s): Rupayan Das | Pradip K. Das
Volume: 5
Issue: 1
Year: 2013





Online Rule Generation Software Process Model

Author(s): Rajni Jain | Satma M C | Alka Aroa | Sudeep Marwaha | R C Goyal
Volume: 5
Issue: 1
Year: 2013





Rough Set Techniques for 24 Hour Knowledge Factory

Author(s): Niti Verma | Neha Verma | A. B. Patki
Volume: 4
Issue: 1
Year: 2012





Study of Impact of Mobile Ad hoc Networking and its Future Applications

Author(s): Ashema Hasti
Volume: 4
Issue: 1
Year: 2012





Attrition of Knowledge Workforce in Healthcare in Northern parts of India – Health Information Technology as a Plausible Retention Strategy

Author(s): Indrajit Bhattacharya | Anandhi Ramachandran | R. K. Suri | S. L. Gupta
Volume: 4
Issue: 1
Year: 2012





Open Source Software Reliability Growth Model by Considering Change- Point

Author(s): V. B. Singh | P. K. Kapur | Mashaallah Basirzadeh
Volume: 4
Issue: 1
Year: 2012





Optimization of Material Procurement Plan - A Database Oriented Decision Support System

Author(s): Shyamalesh Khan | Sanjay Kumar
Volume: 4
Issue: 1
Year: 2012





Applications of Public Key Watermarking for Authentication of Job-Card in MGNREGA

Author(s): Sirsendu Sarbavidya | Sunil Karforma
Volume: 4
Issue: 1
Year: 2012





Determination of Efficiency of Hybrid Photovoltaic Thermal Air Collectors Using Artificial Neural Network Approach for Different PV Technology

Author(s): Deepali Kamthania | G. N. Tiwari
Volume: 4
Issue: 1
Year: 2012





Performance Comparison of XY, OE and DY Ad Routing Algorithm by Load Variation Analysis of 2-Dimensional Mesh Topology Based Network-on-Chip

Author(s): Parag Parandkar | Jayesh kumar Dalal | Sumant Katiyal
Volume: 4
Issue: 1
Year: 2012





A Test of Transactional and Transformational Leadership Behaviour of Salesman on Customer Relationship Marketing Behaviour: A Study of the Indian Banking Sector

Author(s): Puja Khatri | Sumit Duggal
Volume: 4
Issue: 1
Year: 2012





Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software

Author(s): Anu G. Aggarwal | P. K. Kapur | Gurjeet Kaur | Ravi Kumar
Volume: 4
Issue: 1
Year: 2012





Iterative Self Organized Data Algorithm for Fault Classification of Mechanical System

Author(s): Jayamala K. Patil | P. B. Ghewari | S. S. Nagtilak
Volume: 3
Issue: 1
Year: 2011





Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block Scheme

Author(s): P. C. Jha | Shivani Bali | P. K. Kapur
Volume: 3
Issue: 1
Year: 2011





An Enhanced Genetic Algorithm Approach to ATM Network Design

Author(s): Susmi Routray
Volume: 3
Issue: 1
Year: 2011





Load Balancing in Integrated MANET, WLAN and Cellular Network

Author(s): Sulata Mitra | Arkadeep Goswami
Volume: 3
Issue: 1
Year: 2011





Simulation and Proportional Evaluation of AODV and DSR in Different Environment of WSN

Author(s): Pranav M. Pawar | Smita Shukla | Pranav Kulkarni | Adishri Pujari
Volume: 3
Issue: 1
Year: 2011





Study of the Effects of Noise & Future Time Stamps on a New Model Based Encryption Mechanism

Author(s): A. V. N. Krishna | P. V. Sarat Chand
Volume: 3
Issue: 1
Year: 2011





Dynamic Data Updates for Mobile Devices by Using 802.11 Wireless Communications

Author(s): B. V. Ramanamurthy | K. Srinivas Babu | Mohammed Sharfuddin
Volume: 3
Issue: 1
Year: 2011





MANEMO for Fishing Trolleys in Deep Sea

Author(s): Sulata Mitra | Sumanta Pyne | Arkadeep Goswami
Volume: 3
Issue: 1
Year: 2011





ACBRAAM: A Content Based Routing Algorithm Using Ant Agents for MANETs

Author(s): Ramkumar K. R. | Sakthivel K. | Ravichandran C. S.
Volume: 3
Issue: 1
Year: 2011





On Lattice Based Cryptographic Sampling: An Algorithmic Approach

Author(s): Sunder Lal | Santosh Kumar Yadav | Kuldeep Bhardwaj
Volume: 2
Issue: 1
Year: 2010





Computational Modeling of Cell Survival Using VHDL

Author(s): Shruti Jain1, | Pradeep K. Naik | Sunil V. Bhooshan
Volume: 2
Issue: 1
Year: 2010





Revival of Tutor Model: A Domain Independent Intelligent Tutoring System (ITS)

Author(s): Abrar S. Alvi | M. S. Ali
Volume: 2
Issue: 1
Year: 2010





An Effective Technique For Data Security in Modern Cryptosystem

Author(s): Dilbag Singh | Ajit Singh
Volume: 2
Issue: 1
Year: 2010





Evolutionary Analytics on Lysosomal Associated Membrane Protein -1 (LAMP-1)

Author(s): Manish Dwivedi | Vijay Tripathi | Ashutosh Mani | Dwijendra K. Gupta
Volume: 2
Issue: 1
Year: 2010





Management Information System in Indian Universities: A Comparative Study

Author(s): Sangeeta Gupta | H. Bansal | A. K. Saini
Volume: 2
Issue: 1
Year: 2010





Replication Strategies in Mobile Environments

Author(s): Salman Abdul Moiz | Lakshmi Rajamani
Volume: 2
Issue: 1
Year: 2010





A Novel Metric For Detection of Jellyfish Reorder Attack on Ad Hoc Network

Author(s): B. B. Jayasingh | B. Swathi
Volume: 2
Issue: 1
Year: 2010





Fuzzy Expert System For Noise Induced Sleep Disturbance And Health Effects

Author(s): Devendra K. Tayal | Amita Jain | Vinita Gupta
Volume: 2
Issue: 1
Year: 2010





EECHDA: Energy Efficient Clustering Hierarchy and Data Accumulation For Sensor Networks

Author(s): Dilip Kumar | T. C. Aseri | R. B. Patel
Volume: 2
Issue: 1
Year: 2010





Computer and Internet use Among Families: A Case of Botswana
Author(s): Dr. Rama Srivastava | Mr. Ishaan Srivastava
Volume: 1
Issue: 1
Year: 2008




A Mobile Transaction System for Open Networks

Author(s): R. B. Patel | Anu
Volume: 1
Issue: 1
Year: 2008





Design of an Agent Based Context Driven Focused Crawler

Author(s): Naresh Chauhan | A. K. Sharma
Volume: 1
Issue: 1
Year: 2008





Data Dissemination in Mobile Computing Environment

Author(s): S. Krishna Mohan Rao | Dr A. Venugopal Reddy
Volume: 1
Issue: 1
Year: 2008





NFCKE: New Framework for Document Classification and Knowledge Extraction

Author(s): Ghanshyam Singh Thakur | Dr. R. C. Jain
Volume: 1
Issue: 1
Year: 2008





Process Centric Development to Improve Quality of Service (QoS) in Building Distributed Applications

Author(s): K. Krishna Mohan | A. Srividya | A. K. Verma | Ravi Kumar Gedela
Volume: 1
Issue: 1
Year: 2008





Modified Incremental Linear Discriminant Analysis for Face Recognition

Author(s): R. K. Agrawal | Ashish Chaudhary
Volume: 1
Issue: 1
Year: 2008





Antecedents of Success in Business Process Outsourcing: An Empirical Study of the Indian BPO Sector

Author(s): Aparna Daityari | Prof A. K. Saini | Romit Gupta
Volume: 1
Issue: 1
Year: 2008





Mining Techniques for Integrated Multimedia Repositories: A Review

Author(s): Naveen Aggarwal | Dr. Nupur Prakash | Dr. Sanjeev Sofat
Volume: 1
Issue: 1
Year: 2008





Pattern Matching Based Technique to Solve Motif-Finding Problem

Author(s): Pankaj Agarwal | Dr. S. A. M. Rizvi
Volume: 1
Issue: 1
Year: 2008





Genetic Algorithm: A Versatile Optimization Tool

Author(s): Prof. Swati V. Chande | Dr. Madhavi Sinha
Volume: 1
Issue: 1
Year: 2008





Fuzzy Logic Based Revised Defect Rating for Software Lifecycle Performance Prediction Using GMR

Author(s): A K Verma | Anil R | Dr. Om Prakash Jain
Volume: 1
Issue: 1
Year: 2008




