Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science and Engineering Survey

ISSN: 0976--3252
Publisher: Academy & Industry Research Collaboration Center (AIRCC)


ADD TO MY LIST
 
Regression Models for 2-Dimensional Cartesian Coordinates Prediction: A Case study at University of Mines and Technology (UMaT), Tarkwa-Ghana. PDF available

Author(s): Yao Yevenyo Ziggah | Hu Youjian | Christian Odutola Amans | Bernard Kumi-Boateng
Volume: 3
Issue: 6
Year: 2013
Automatic Facial Expression Analysis A Survey PDF available

Author(s): C.P. Sumathi | T. Santhanam | M.Mahadevi
Volume: 3
Issue: 6
Year: 2013
Challenges and Weaknesses of Agile Method in Enterprise Architecture PDF available

Author(s): Zahra Askarinejad Amiri
Volume: 3
Issue: 6
Year: 2013
Techniques and Methodologies for Recognition of Tamil Typewritten and Handwritten Characters: A Survey

Author(s): C P Sumathi | S Karpagavalli
Volume: 3
Issue: 6
Year: 2013
A Survey of Wireless Sensor Network Architectures PDF available

Author(s): Almir Davis | Hwa Chang
Volume: 3
Issue: 6
Year: 2013
DVR-Based Manet Routing Protocols Taxonomy PDF available

Author(s): Mrinal Kanti Debbarma | Sudipta Roy | Santanu Kumar Sen
Volume: 3
Issue: 5
Year: 2012
Survey On Scheduling And Allocation In High Level Synthesis PDF available

Author(s): M. Chinnadurai | M. Joseph
Volume: 3
Issue: 5
Year: 2012
Assessments Of Different Speeded Up Robust Features (SURF) Algorithm Resolution For Pose Estimation Of UAV PDF available

Author(s): Bassem Sheta | Mohamed Elhabiby | Naser El-Sheimy
Volume: 3
Issue: 5
Year: 2012
LED-ID System: Coverage And Fast Link Recovery Technique PDF available

Author(s): Muhammad Shahin Uddin | Mst. Nargis Aktar | Yeong Min Jang
Volume: 3
Issue: 5
Year: 2012
Second Generation Curvelet Transforms Vs Wavelet transforms and Canny Edge Detector for Edge Detection from WorldView-2 data PDF available

Author(s): Mohamed Elhabiby | Ahmed Elsharkawy | Naser El-Sheimy
Volume: 3
Issue: 4
Year: 2012
Uclean: A Requirement Based Object-Oriented Etl Framework PDF available

Author(s): Payal Pahwa | Shweta Taneja | Garima Thakur
Volume: 2
Issue: 4
Year: 2011
An Overview Of Context-Aware Vertical Handover Schemes In Heterogeneous Networks PDF available

Author(s): Hanan Alhazmi | Nadine Akkari
Volume: 2
Issue: 4
Year: 2011
Thematic Analysis And Visualization Of Textual Corpus PDF available

Author(s): Anja Habacha Chabi | Ferihane Kboubi | Mohamed Ben Ahmed,
Volume: 2
Issue: 4
Year: 2011
The Challenges Of Using Multicomputing In Real Time Visualapplications PDF available

Author(s): AlaaYaseenTaqa | LiangShing Ng | Ajay Anant Joshi
Volume: 2
Issue: 4
Year: 2011
Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks - Survey PDF available

Author(s): Md Abdul Azeem | Khaleel-ur-Rahman khan | A.V.Pramod
Volume: 2
Issue: 4
Year: 2011
A Review of DDOS Attack and its Countermeasures in TCP Based Networks PDF available

Author(s): Akash Mittal | Ajit Kumar Shrivastava | Manish Manoria
Volume: 2
Issue: 4
Year: 2011
A Survey of Adaptive Distributed Clustering Algorithms for Wireless Sensor Networks PDF available

Author(s): S.R.Boselin Prabhu | S.Sophia
Volume: 2
Issue: 4
Year: 2011
A Comparative Study Of Clusterhead Selection Algorithms In Wireless Sensor Networks PDF available

Author(s): K.Ramesh | K.Somasundaram
Volume: 2
Issue: 4
Year: 2011
A Survey On Cooperative Diversity And Its Applications In Various Wireless Networks PDF available

Author(s): Gurpreet Kaur | Partha Pratim Bhattacharya
Volume: 2
Issue: 4
Year: 2011
A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis PDF available

Author(s): Morampudi Naresh kumar | Datrika Srinivas Rao | D.Sravanthi
Volume: 2
Issue: 4
Year: 2011
PrefixSpan: Mining Sequential Patterns by Prefix-Projected Pattern PDF available

Author(s): Poonam Sharma | Gudla.Balakrishna
Volume: 2
Issue: 4
Year: 2011
Survey On Fault Tolerance In Grid Computing PDF available

Author(s): P. Latchoumy | P. Sheik Abdul Khader
Volume: 2
Issue: 4
Year: 2011
Video Authentication- An Overview PDF available

Author(s): Saurabh Upadhyay | Sanjay Kumar Singh
Volume: 2
Issue: 4
Year: 2011
A Survey On Mac Protocols For Wireless Multimedia Networks PDF available

Author(s): S.P.V.Subba Rao | S. Venkata Chalam | D.Sreenivasa Rao
Volume: 2
Issue: 4
Year: 2011
A Survey on Target Tracking Techniques in Wireless Sensor Networks PDF available

Author(s): K. Ramya | K. Praveen Kumar | V. Srinivas Rao
Volume: 3
Issue: 4
Year: 2012
Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems PDF available

Author(s): Hossein Jadidoleslamy
Volume: 3
Issue: 4
Year: 2012
A Survey on Terrorist Network Mining: Current Trends and Opportunities PDF available

Author(s): Nisha Chaurasia | Mradul Dhakar | Akhilesh Tiwari | R. K. Gupta
Volume: 3
Issue: 4
Year: 2012
Computer-Aided Diagnosis of Thyroid Nodule: A Review PDF available

Author(s): Deepika Koundal | Savita Gupta | Sukhwinder Singh
Volume: 3
Issue: 4
Year: 2012
Hybrid Technique For Knowledge Representation & A Comparative Study PDF available

Author(s): POONAM TANWAR | T. V. PRASAD | KAMLESH DATTA
Volume: 3
Issue: 4
Year: 2012
Web Search Result Clustering- A Review PDF available

Author(s): Kishwar Sadaf | Mansaf Alam
Volume: 3
Issue: 4
Year: 2012
A Survey On Various Approaches Of Text Extraction In Images PDF available

Author(s): C.P. Sumathi | G.Gayathri Devi | T. Santhanam
Volume: 3
Issue: 4
Year: 2012
A Survey Of Sql Injection Countermeasures PDF available

Author(s): R.P.Mahapatra | Subi Khan
Volume: 3
Issue: 3
Year: 2012
A Survey Of Dimensionality Reduction And Classification Methods PDF available

Author(s): Nebu Varghese | Vinay Verghese | Gayathri. P | N. Jaisankar
Volume: 3
Issue: 3
Year: 2012
Complete Synchronization Of Hyperchaotic Xu And Hyperchaotic Lu Systems Via Active Control PDF available

Author(s): Sundarapandian Vaidyanathan
Volume: 3
Issue: 3
Year: 2012
Cross Layer Protocols For Multimedia Transmission In Wireless Networks PDF available

Author(s): Santhosha Rao | Kumara Shama
Volume: 3
Issue: 3
Year: 2012
Security In Wireless Sensor Networks - Improving The LEAP Protocol PDF available

Author(s): Delan Alsoufi | Khaled Elleithy | Tariq Abuzaghleh | Ahmad Nassar
Volume: 3
Issue: 3
Year: 2012
Survey on Parameters of Fingerprint Classification Methods Based On Algorithmic Flow PDF available

Author(s): Dimple Parekh | Rekha Vig
Volume: 2
Issue: 3
Year: 2011
Defending Wormhole Attack in Wireless Ad-hoc Network PDF available

Author(s): Nisha S.Raote
Volume: 2
Issue: 3
Year: 2011
Analysis Of Recent Checkpointing Techniques For Mobile Computing Systems PDF available

Author(s): Ruchi Tuli | Parveen Kumar
Volume: 2
Issue: 3
Year: 2011
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEY PDF available

Author(s): Bhavana Narain | Anuradha Sharma | Sanjay Kumar | Vinod Patle
Volume: 2
Issue: 3
Year: 2011
VISUALIZATION TECHNIQUES FOR INTRUSION DETECTION – A SURVEY PDF available

Author(s): Ibrahim Elhenawy | Alaa El - Din Riad | Ahmed Hassan | Nancy Awadallah
Volume: 2
Issue: 3
Year: 2011
ROLE OF MIDDLEWARE FOR INTERNET OF THINGS: A STUDY PDF available

Author(s): Soma Bandyopadhyay | Munmun Sengupta | Souvik Maiti | Subhajit Dutta
Volume: 2
Issue: 3
Year: 2011
SECURITY RISKS IN MECHANICAL ENGINEERING INDUSTRIES PDF available

Author(s): Karen Benson | Syed (Shawon) | M. Rahman
Volume: 2
Issue: 3
Year: 2011
The Systematic Review of Web Measurement PDF available

Author(s): Dr.Arvinder Kaur | Diksha Dani
Volume: 2
Issue: 3
Year: 2011
A SURVEY OF FUZZY CONTROL FOR STABILIZED PLATFORMS PDF available

Author(s): Said LEGHMIZI | Sheng LIU
Volume: 2
Issue: 3
Year: 2011
A STUDY ON FACE, EYE DETECTION AND GAZE ESTIMATION PDF available

Author(s): Zeynep Orman | Abdulkadir Battal | Erdem Kemer
Volume: 2
Issue: 3
Year: 2011
REVIEW ON FEATURE SELECTION TECHNIQUES AND THE IMPACT OF SVM FOR CANCER CLASSIFICATION USING GENE EXPRESSION PROFILE PDF available

Author(s): G.Victo Sudha George | Dr. V.Cyril Raj
Volume: 2
Issue: 3
Year: 2011
DISCOVERING THE IMPACT OF KNOWLEDGE IN RECOMMENDER SYSTEMS: A COMPARATIVE STUDY

Author(s): Bahram Amini | Roliana Ibrahim | Mohd Shahizan Othman
Volume: 2
Issue: 3
Year: 2011
A Nobel Hybrid Approach for Edge Detection PDF available

Author(s): Palvi Rani | Poonam Tanwar
Volume: 4
Issue: 2
Year: 2013
Research on Distributed Software Testing Platform Based on Cloud Resource PDF available

Author(s): Shi Hengliang, Zhao Changwei | Huang Tao | Dong Yongsheng
Volume: 4
Issue: 2
Year: 2013
Physical Modeling and Simulation of Thermal Heating in Vertical Integrated Circuits PDF available

Author(s): Abderrazzak El Boukili
Volume: 4
Issue: 2
Year: 2013
Performance analysis of Coiflet-type wavelets for a fingerprint image compression by using wavelet and wavelet packet transform PDF available

Author(s): Md. Rafiqul Islam | Farhad Bulbul | Shewli Shamim Shanta
Volume: 3
Issue: 2
Year: 2012
Inclusion Of Road Network In The Spatial Database For Features Searching Using Dynamic Index PDF available

Author(s): S. Sivasubramanian | M.Samundeeswari
Volume: 3
Issue: 2
Year: 2012
Nymble Blocking System PDF available

Author(s): Anand Joshi | Arshiya Shaikh | Aruna Kadam | Vasudha Sahu
Volume: 3
Issue: 2
Year: 2012
Single Image Improvement using Superresolution PDF available

Author(s): Shwetambari Shinde | Meeta Dewangan
Volume: 3
Issue: 2
Year: 2012
Error Analysis Of 3d Polygonal Model:A Survey PDF available

Author(s): Devendra Singh Rajput | R Rama Kishore
Volume: 3
Issue: 2
Year: 2012
The Proposal Of Hybrid Intrusion Detection For Defence Of Sync Flood Attack In Wireless Sensor Network PDF available

Author(s): Ruchi Bhatnagar | Udai Shankar
Volume: 3
Issue: 2
Year: 2012
The Study On Load Balancing Strategies In Distributed Computing System PDF available

Author(s): Md. Firoj Ali | Rafiqul Zaman Khan
Volume: 3
Issue: 2
Year: 2012
Energy Efficient Recognition Protocol for Ad Hoc Networks PDF available

Author(s): Taresh Singh | S Qamar
Volume: 3
Issue: 2
Year: 2012
The necessities for building a model to evaluate Business Intelligence projects- Literature Rev PDF available

Author(s): Vahid Farrokhi | Laszlo Pokoradi
Volume: 3
Issue: 2
Year: 2012
Multiple Component Based Information Tracking System PDF available

Author(s): Mathi Seelan.V | Sunitha Abburu
Volume: 2
Issue: 2
Year: 2011
Firewall Policy Management Through Sliding Window Filtering Method Using Data Mining Techniques PDF available

Author(s): Srinivasa Rao | Boddi Reddy Rama | K.Naga Mani
Volume: 2
Issue: 2
Year: 2011
Image Compression and Resizing for Retinal Implant in Bionic Eye PDF available

Author(s): N.Sharmili | P.S. Ramaiah | G.Swamynadhan
Volume: 2
Issue: 2
Year: 2011
Dual Band Two Elements Inverted-L Antenna for 3.5 & 5 Ghz Mobile Wimax/Wi-Fi Applications PDF available

Author(s): S.M. Sabbir Alam | A.S.M. Shariar Kabir Khan | Lakshman Saha | Mehedi Hassan Pavel | Tanvir Rahman
Volume: 2
Issue: 2
Year: 2011
One Time Secret Key Mechanism for Mobile Communication PDF available

Author(s): Vasu.R | Sunitha Abburu
Volume: 2
Issue: 2
Year: 2011
A Survey on Internal Validity Measure for Cluster Validation PDF available

Author(s): L.Jegatha Deborah | R.Baskaran | A.Kannan
Volume: 1
Issue: 2
Year: 2010
Routing Protocols in Wireless Sensor Networks - A Survey PDF available

Author(s): Shio Kumar Singh | M P Singh | D K Singh
Volume: 1
Issue: 2
Year: 2010
Multimodal Biometric Systems - Study to Improve Accuracy and Performance PDF available

Author(s): K.Sasidhar | Vijaya L Kakulapati | Kolikipogu Ramakrishna | K.KailasaRao
Volume: 1
Issue: 2
Year: 2010
Multi Tree Data Base Architecture for Location Tracking in Next Generation Mobile Network PDF available

Author(s): Sailaja M | Ramya K
Volume: 1
Issue: 2
Year: 2010
Survey on Various Gesture Recognition Techniques for Interfacing Machines Based on Ambient Intelligence PDF available

Author(s): Harshith.C | Karthik.R.Shastry | Manoj Ravindran | M.V.V.N.S Srikanth | Naveen Lakshmikhanth
Volume: 1
Issue: 2
Year: 2010
Selection & Maintenance of Materialized View and It's Application for Fast Query Processing: A Survey PDF available

Author(s): P. P. Karde | V. M. Thakare
Volume: 1
Issue: 2
Year: 2010
Probabilistic Broadcasting Protocol In AD HOC Network And Its Advancement: A Review PDF available

Author(s): Tasneem Bano | Jyoti Singhai
Volume: 1
Issue: 2
Year: 2010
Reduction of Cogging Torque in IPM Motors by Using the Taguchi and Finite Element Method PDF available

Author(s): S. RASHIDAEE | S. Asghar GHOLAMIAN
Volume: 2
Issue: 2
Year: 2011
QoS aware Hierarchical Multi-hop Routing Protocols in MANETs PDF available

Author(s): Narendar Reddy Mandhadi | Lakshmi Rajamani
Volume: 4
Issue: 1
Year: 2013
An Overview of Digital Image Steganography PDF available

Author(s): R.Poornima | R.J.Iswarya
Volume: 4
Issue: 1
Year: 2013
Dataset Quality Assessment: An extension for analogy based effort estimation PDF available

Author(s): Mohammad Azzeh
Volume: 4
Issue: 1
Year: 2013
Secure Key Agreement And Authentication Protocols PDF available

Author(s): B.Maheshwari
Volume: 3
Issue: 1
Year: 2012
Segment Based Visual Cryptography For Key Distribution PDF available

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Volume: 3
Issue: 1
Year: 2012
Graph Partitioning Advance Clustering Technique PDF available

Author(s): T. Soni Madhulatha
Volume: 3
Issue: 1
Year: 2012
Fault Based Techniques For Testing Boolean Expressions: A Survey PDF available

Author(s): Usha Badhera | Purohit G.N | S.Taruna
Volume: 3
Issue: 1
Year: 2012
A Survey On Detect - Discovering And Evaluating Trust Using Efficient Clustering Technique For Manets PDF available

Author(s): K.Sudharson | N.Partheeban
Volume: 3
Issue: 1
Year: 2012
Watermarking Schemes For Copy Protection : A Survey PDF available

Author(s): Dolley Shukla | Manisha Sharma
Volume: 3
Issue: 1
Year: 2012
Secure And Reliable Routing In Mobile Adhoc Networks PDF available

Author(s): Rachid Haboub | Mohammed Ouzzif
Volume: 3
Issue: 1
Year: 2012
Spatiotemporal Data Mining: Issues, Tasks And Applications PDF available

Author(s): K.Venkateswara Rao | A.Govardhan | K.V.Chalapati Rao
Volume: 3
Issue: 1
Year: 2012
Energy Saving in Wireless Sensor Networks PDF available

Author(s): Zahra Rezaei | Shima Mobininejad
Volume: 3
Issue: 1
Year: 2012
A comparative study analysis of materialized view for selection cost PDF available

Author(s): T.Nalini | A.Kumaravel | K.Rangarajan
Volume: 3
Issue: 1
Year: 2012
Adopting E-Commerce To User's Needs PDF available

Author(s): Mohammad Alshehri | Hamza Aldabbas | James Sawle | Mai Abu Baqar
Volume: 3
Issue: 1
Year: 2012
A Survey on Routing Mechanism and Techniques in Vehicle to Vehicle Communication (VANET) PDF available

Author(s): Yugal Kumar | Pradeep Kumar | Akash Kadian
Volume: 2
Issue: 1
Year: 2011
Intelligent Approaches to interact with Machines using Hand Gesture Recognition in Natural way: A Survey PDF available

Author(s): Ankit Chaudhary | J. L. Raheja | Karen Das | Sonia Raheja
Volume: 2
Issue: 1
Year: 2011
Automated Software Test Data Generation: Direction of Research PDF available

Author(s): Hitesh Tahbildar | Bichitra Kalita
Volume: 2
Issue: 1
Year: 2011
An Improvement in Maximum Likelihood Location Estimation Algorithm in Sensor Networks PDF available

Author(s): Zeinab Abbasi | Ahmad Farahi | Hamid Haj Seyed Javadi
Volume: 2
Issue: 1
Year: 2011
Overview and Challenges of Overlay Networks: A Survey PDF available

Author(s): Jaime Galán-Jiménez | Alfonso Gazo-Cervero
Volume: 2
Issue: 1
Year: 2011
WIMAX Basics From PHY Layer to Scheduling And Multicasting Approaches PDF available

Author(s): Manal Al-bzoor | Khaled Elleithy
Volume: 2
Issue: 1
Year: 2011
Fault Tolerance In Grid Computing: State of the Art and Open Issues PDF available

Author(s): Ritu Garg | Awadhesh Kumar Singh
Volume: 2
Issue: 1
Year: 2011
A New Distributed Weighted Multidimensional Scaling Algorithm for Localization in Wireless Sensor Networks PDF available

Author(s): Fahimeh Doremami | Hamid Haj Seyyed Javadi | Ahmad Farahi
Volume: 2
Issue: 1
Year: 2011
Framework to Solve Load Balancing Problem in Heterogeneous Web Servers PDF available

Author(s): Deepti Sharma | Archana B.Saxena
Volume: 2
Issue: 1
Year: 2011
A Novel Model for Timed Event Extraction and Temporal Reasoning In Legal Text Documents PDF available

Author(s): Kolikipogu Ramakrishna | Vanitha Guda | B.Padmaja Rani | Vinaya Ch
Volume: 2
Issue: 1
Year: 2011
A Survey of Real-Time Routing Protocols for Wireless Sensor Networks PDF available

Author(s): Sandhya Rachamalla | Anitha Sheela Kancharla
Volume: 04
Issue: 03
Year: 2013
An Approach to Detect Packets Using Packet Sniffing PDF available

Author(s): Rupam | Atul Verma | Ankita Singh,
Volume: 04
Issue: 03
Year: 2013
Artificial Intelligence Markup Language: A Brief Tutorial PDF available

Author(s): Maria das Gracas Bruno Marietto | Rafael Varagode Aguiar | Gislene de Oliveira Barbosa | Wagner Tanaka Botelho | Edson Pimentel | Robson dos Santos Franca | Vera Lucia da Silva
Volume: 04
Issue: 03
Year: 2013
Survey on Parameters of Fingerprint Classification Methods Based On Algorithmic Flow PDF available

Author(s): Dimple Parekh | Rekha Vig
Volume: 02
Issue: 03
Year: 2011
Defending Wormhole Attack in Wireless Ad-hoc Network PDF available

Author(s): Nisha S.Raote
Volume: 02
Issue: 03
Year: 2011
ANALYSIS OF RECENT CHECKPOINTING TECHNIQUES FOR MOBILE COMPUTING SYSTEMS PDF available

Author(s): Ruchi Tuli | Parveen Kumar
Volume: 02
Issue: 03
Year: 2011
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEY PDF available

Author(s): Bhavana Narain | Anuradha Sharma | Sanjay Kumar | Vinod Patle
Volume: 02
Issue: 03
Year: 2011
VISUALIZATION TECHNIQUES FOR INTRUSION DETECTION – A SURVEY PDF available

Author(s): Ibrahim Elhenawy | Alaa El - Din Riad | Ahmed Hassan | Nancy Awadallah
Volume: 02
Issue: 03
Year: 2011
ROLE OF MIDDLEWARE FOR INTERNET OF THINGS: A STUDY PDF available

Author(s): Soma Bandyopadhyay | Munmun Sengupta | Souvik Maiti | Subhajit Dutta
Volume: 02
Issue: 03
Year: 2011
SECURITY RISKS IN MECHANICAL ENGINEERING INDUSTRIES PDF available

Author(s): Karen Benson | Syed (Shawon) M. Rahman
Volume: 02
Issue: 03
Year: 2011
The Systematic Review of Web Measurement PDF available

Author(s): Dr.Arvinder Kaur | Diksha Dani
Volume: 02
Issue: 03
Year: 2011
A SURVEY OF FUZZY CONTROL FOR STABILIZED PLATFORMS PDF available

Author(s): Said LEGHMIZI | Sheng LIU
Volume: 02
Issue: 03
Year: 2011
A STUDY ON FACE, EYE DETECTION AND GAZE ESTIMATION PDF available

Author(s): Zeynep Orman | Abdulkadir Battal | Erdem Kemer
Volume: 02
Issue: 03
Year: 2011
REVIEW ON FEATURE SELECTION TECHNIQUES AND THE IMPACT OF SVM FOR CANCER CLASSIFICATION USING GENE EXPRESSION PROFILE PDF available

Author(s): G.Victo Sudha George | Dr. V.Cyril Raj
Volume: 02
Issue: 03
Year: 2011
DISCOVERING THE IMPACT OF KNOWLEDGE IN RECOMMENDER SYSTEMS: A COMPARATIVE STUDY PDF available

Author(s): Bahram Amini | Roliana Ibrahim | Mohd Shahizan Othman
Volume: 02
Issue: 03
Year: 2011
Why do you need a reservation system?      Save time & money - Smart Internet Solutions