Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Global Research in Computer Science

ISSN: 2229--371X


ADD TO MY LIST
 
THE USEFULNESS OF RE PRACTICES IN S/W DEVELOPMENT

Author(s): Dhirendra Pandey | Ugrasen Suman
Volume: 3
Issue: 9
Year: 2012
ANALYSIS ON SUSPICIOUS THYROID RECOGNITION USING ASSOCIATION RULE MINING

Author(s): K. Saravana Kumar
Volume: 3
Issue: 9
Year: 2012
Efficient Searching for Geographical Data Gathering using Knowledge Mining

Author(s): Kuldeep Singh Jadon
Volume: 3
Issue: 9
Year: 2012
A SURVEY ON CONTENT BASED IMAGE RETRIEVAL USING BDIP,BVLC AND DCD

Author(s): Kanchan Saxena
Volume: 3
Issue: 9
Year: 2012
The Amazing Dual Role Player - BIGP

Author(s): Hemanta Sahu
Volume: 3
Issue: 9
Year: 2012
REQUIREMENT ENGINEERING: AN APPROACH TO QUALITY SOFTWARE DEVELOPMENT

Author(s): Dr. Dhirendra Pandey | Vandana Pandey
Volume: 3
Issue: 9
Year: 2012
On a key exchange technique, avoiding man-in-the-middle-attack

Author(s): Barun Biswas
Volume: 3
Issue: 9
Year: 2012
A HIGH SENSITIVE APPROACH FOR GENDER PREDICTION BY USING PUPIL DILATON

Author(s): Ms. Priyanka Thapak
Volume: 3
Issue: 9
Year: 2012
INFORMATION HIDING WATERMARKING DETECTION TECHNIQUE BY PSNR AND RGB INTENSITY

Author(s): Ms. Neha Chauhan
Volume: 3
Issue: 9
Year: 2012
HIGHLY SECURED AND RANDOMIZED IMAGE STEGANOGRAPHIC ALGORITHM

Author(s): Dr. R. Sridevi
Volume: 3
Issue: 9
Year: 2012
ANALYSIS AND ASSESSMENT OF SURFACE IMAGE TEXTURE MECHANISMS

Author(s): T.Venkat Narayana Rao
Volume: 3
Issue: 9
Year: 2012
A NOVEL APPROACH FOR IMPROVING PERFORMANCE OF WSN USING R-MAC SCHEDULE

Author(s): Ms. Laxmi Singh
Volume: 3
Issue: 9
Year: 2012
STATISTICAL BIOMETRIC METHODS

Author(s): Sushma Jaiswal
Volume: 2
Issue: 9
Year: 2011
EFFICIENT SECURE CLUSTERING PROTOCOL FOR MOBILE AD-HOC NETWORK

Author(s): Shubha Mishra
Volume: 2
Issue: 9
Year: 2011
PARTITION BASED FACE RECOGNITION SYSTEM

Author(s): T.Venkat Narayana Rao
Volume: 2
Issue: 9
Year: 2011
IMPROVED BOOTSTRAP SECURITY WITH CONSISTENT CACHE IN MOBILE AD HOC NETWORK ROUTING

Author(s): P. Parameswari
Volume: 2
Issue: 9
Year: 2011
RECOGNITION OF VERNACULAR LANGUAGE SPEECH FOR DISCRETE WORDS USING LPC TECHNIQUE

Author(s): Omesh Wadhwani
Volume: 2
Issue: 9
Year: 2011
DESIGN OF 32-BIT RISC CPU BASED ON MIPS

Author(s): N. Alekya
Volume: 2
Issue: 9
Year: 2011
A NEW APPROACH TO EDGE DETECTION USING RULE BASED FUZZY LOGIC

Author(s): Er. Manpreet Kaur
Volume: 2
Issue: 9
Year: 2011
VLIW BASED VEX TOOL AND VALIDATION OF SIM-A WITH VEX

Author(s): Dr. Manoj Kumar Jain | Gajendra Kumar Ranka
Volume: 2
Issue: 9
Year: 2011
PATH IDENTIFICATION IN MULTIPATH ROUTING

Author(s): Dr. Shuchita Upadhyaya
Volume: 2
Issue: 9
Year: 2011
Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES ,AES and Blowfish

Author(s): Pratap Chandra Mandal
Volume: 3
Issue: 8
Year: 2012
AN EFFECTIVE SCHEME OF LOCATION PRIVACY PRESERVING IN MONITORING SYSTEM FOR WSNs

Author(s): K. Chaithanya Jyothi
Volume: 3
Issue: 8
Year: 2012
Analysis of Lossless Reversible Transformation Algorithms to Enhance Data Compression

Author(s): Jeyanthi Perumal | Anuratha Vinodkumar
Volume: 3
Issue: 8
Year: 2012
Impact of Similarity Measures on Causal Relation Based Feature Selection Method for Clustering Maritime Accident Reports

Author(s): Santosh Tirunagari | Maria Hanninen | Abhishek Guggilla | Kaarle Stahlberg | Pentti Kujala
Volume: 3
Issue: 8
Year: 2012
IMPROVEMENT OF CLUSTERING ON HIGH DIMENSIONAL DATASETS USING PCA

Author(s): Dr. Dharmender Kumar
Volume: 3
Issue: 8
Year: 2012
APPLICATIONS OF ASSOCIATION RULE MINING IN DIFFERENT DATABASES

Author(s): Dr. M. Renuka Devi
Volume: 3
Issue: 8
Year: 2012
Event Detection in Cricket Video based on Visual and Acoustic Features

Author(s): V Vijayakumar
Volume: 3
Issue: 8
Year: 2012
DISTRIBUTED SOURCE RATE LIMITING MECHANISM FOR WIRELESS MESH NETWORK

Author(s): Navdeep Saluja
Volume: 2
Issue: 8
Year: 2011
Overview of Graph Partitioning with Natural Heuristics Cuts

Author(s): Dilpreet Kaur
Volume: 2
Issue: 8
Year: 2011
AN APPROACH TO MEASURE RESEARCH RELATED DOMAINS USING WEB-MINING TECHNIQUES

Author(s): Nilesh Jain | Dr vijay Singh Rathore
Volume: 2
Issue: 8
Year: 2011
Reputation System in Peer-To-Peer Network: Design and Classification

Author(s): Sandeep Kumar
Volume: 2
Issue: 8
Year: 2011
A Network engineering Solution for Data sharing across healthcare providers and protects patients health data privacy using EHR System

Author(s): Syed Mohsin Saif | Sani Asnain Wani | M Maheswran | Shabir Ahmad Khan
Volume: 2
Issue: 8
Year: 2011
A COMPREHENSIVE REVIEW ON IMPROVING QOS FOR VOIP IN WIRELESS MESH NETWORKS

Author(s): Ramanjot Kaur Kehal
Volume: 2
Issue: 8
Year: 2011
WIRELESS SENSOR NETWORK BASED TRAFFIC MONITORING; OVERVIEW AND THREATS TO ITS SECURITY

Author(s): Sareh Nasaghchi Kheirabadi
Volume: 2
Issue: 8
Year: 2011
Cluster Based Security Architecture In Wireless Ad-Hoc Networks: An Overview

Author(s): Avinash Jethi
Volume: 2
Issue: 8
Year: 2011
AN INTRODUCTION TO QUANTUM NEURAL COMPUTING

Author(s): Shaktikanta Nayak
Volume: 2
Issue: 8
Year: 2011
EFFICIENT TECHNIQUES FOR SAODV IN MOBILE ADHOC NETWORK

Author(s): Anil Suryavanshi
Volume: 2
Issue: 8
Year: 2011
IMAGE WATERMARKING: A SURVEY

Author(s): Sirsendu Sarbavidya
Volume: 2
Issue: 8
Year: 2011
Colorization Of Grayscale Images-An Overview

Author(s): Ambika Kalia
Volume: 2
Issue: 8
Year: 2011
A MANUSCRIPT OF FLOODING ALGORITHM IN VANET: A REVIEW

Author(s): Vinod Kumar
Volume: 2
Issue: 8
Year: 2011
STORE-AND-SEARCH: A MODEL FOR KNOWLEDGE DISCOVERY

Author(s): Dr. S.S. Dhenakaran
Volume: 2
Issue: 8
Year: 2011
EXTRACTING PLAIN TEXT FROM CORRUPTED WORD DOCUMENT

Author(s): Saptarshi Naskar
Volume: 2
Issue: 8
Year: 2011
A NOVEL APPROACH FOR CLOUD-BASED COMPUTING USING REPLICATE DATA DETECTION

Author(s): Pritaj Yadav
Volume: 3
Issue: 8
Year: 2012
Comparison of Supervised and Unsupervised Learning Classifiers for Travel Recommendations

Author(s): Zohreh Bahman Isfahani
Volume: 3
Issue: 8
Year: 2012
KEY MANAGEMENT WITH PAIRING IN MANETS

Author(s): Ritu Nagpal
Volume: 3
Issue: 8
Year: 2012
PERFORMANCE EVALUATION OF SYMMETRIC ALGORITHMS

Author(s): S. Pavithra
Volume: 3
Issue: 8
Year: 2012
APPLICATIONS OF FUZZY ERROR CORRECTION IN COMMUNICATION SECURITY IN CRYPTOGRAPHY

Author(s): Akshay Kumar Tyagi
Volume: 3
Issue: 8
Year: 2012
NOVEL VOLTAGE STABILITY ANALYSIS OF A GRID CONNECTED – PHOTOVOLTIC SYSTEM

Author(s): K. Vanchinathan
Volume: 3
Issue: 7
Year: 2012
Moving Towards SAN Storage: An Enterprise Perspective

Author(s): rabi prasad padhy
Volume: 3
Issue: 7
Year: 2012
Maintainability Assessment of Web Based Application

Author(s): Gauri Shankar
Volume: 3
Issue: 7
Year: 2012
Evaluation of Face Recognition Methods

Author(s): sushma jaiswal
Volume: 2
Issue: 7
Year: 2011
5G TECHNOLOGIES – AN ANECDOTE OF NETWORK SERVICE FOR THE FUTURE

Author(s): Professor T.Venkat Narayana Rao
Volume: 2
Issue: 7
Year: 2011
Network Security

Author(s): Rahul Pareek
Volume: 2
Issue: 7
Year: 2011
Cloud Computing

Author(s): Rahul Pareek | Anju Gautam
Volume: 2
Issue: 7
Year: 2011
SECURITY ISSUES IN COMPUTER NETWORK ARCHITECTURE

Author(s): Dr. M. Lilly Florence
Volume: 2
Issue: 7
Year: 2011
A SURVEY ON WIRELESS SENSOR NETWORK ARCHITECTURE, PROTOCOLS AND APPLICATIONS

Author(s): Dr. M. Lilly Florence
Volume: 2
Issue: 7
Year: 2011
International Data Encryption Algorithm (IDEA) – A Typical Illustration

Author(s): Sandipan Basu
Volume: 2
Issue: 7
Year: 2011
TO DESIGN A SIMULATOR FOR PERFORMANCE COMPARISION OF COST MODELS

Author(s): Manpreet Kaur
Volume: 2
Issue: 7
Year: 2011
Frontal Face Detection Methods –Neural Networks and Aggressive Learning Algorithm

Author(s): sushma jaiswal
Volume: 2
Issue: 7
Year: 2011
RENEWED APPROACH FOR IMAGE RECTIFICATION

Author(s): sahil bansal
Volume: 2
Issue: 7
Year: 2011
Analyzing the Superlative Symmetric Cryptographic Encryption Algorithm

Author(s): panchamukesh chandaka
Volume: 2
Issue: 7
Year: 2011
COMBATING CORRUPTION THROUGH E-GOVERNANCE IN PUBLIC SERVICE DELIVERY SYSTEM

Author(s): SUSHIL KUMAR SINGLA | HIMANSHU AGGARWAL
Volume: 2
Issue: 7
Year: 2011
Region growing Adaptive Contrast Enhancement of Medical MRI Images

Author(s): sonia goyal
Volume: 2
Issue: 7
Year: 2011
AN INTELLIGENT DECISION SUPPORT USING GENETIC FUZZY INTEGRATION FOR CAPABILITY ANALYSIS

Author(s): Kunjal B. Mankad
Volume: 2
Issue: 7
Year: 2011
Efficient audio processing in android 2.3

Author(s): kailash pathak
Volume: 2
Issue: 7
Year: 2011
PATTERN RECOGNIZATION USING NEURAL NETWORK OF HAND BIOMETRICS

Author(s): amit taneja
Volume: 2
Issue: 7
Year: 2011
A Metric Framework for Analysis of OOD

Author(s): Suruchi Mehra
Volume: 2
Issue: 7
Year: 2011
APPLICATION BASED UNDERSTANDING AND CLASSIFYING WEB QUIRES

Author(s): Rajesh Kumar Ahirwar
Volume: 2
Issue: 7
Year: 2011
MINING CO-LOCATION PATTERNS FROM SPATIAL DATA USING RULEBASED APPROACH

Author(s): G. Priya
Volume: 2
Issue: 7
Year: 2011
A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Author(s): ganesan manikandan | ganesan krishnan | natarajan sairam
Volume: 2
Issue: 7
Year: 2011
AN EFFICIENT APPROACH TO DETECT FOREST FIRE USING K-MEDIODS ALGORITHM

Author(s): A Gnana Baskaran
Volume: 2
Issue: 7
Year: 2011
Data Diffusion and Gathering in Wireless Sensor Networks

Author(s): bala murugan
Volume: 2
Issue: 7
Year: 2011
3D face Recognition and Modeling System

Author(s): sushma jaiswal
Volume: 2
Issue: 7
Year: 2011
ENERGY BALANCING INTELLIGENT CLUSTRING PROTOCOL FOR WIRELESS SENSOR NETWORK

Author(s): Navroop Kaur Chattha
Volume: 2
Issue: 7
Year: 2011
ANALYSIS OF DDoS ATTACKS IN DISTRIBUTED PEER TO PEER NETWORKS

Author(s): Vooka Pavan Kumar
Volume: 2
Issue: 7
Year: 2011
ENERGY CONSERVATION OF WSNS THROUGH DIFFERENT CLUSTERING ALGORITHMS

Author(s): Kirtika Goyal
Volume: 2
Issue: 7
Year: 2011
MULTILEVEL CRYPTOGRAPHY TECHNIQUE USING GRACEFUL CODES

Author(s): Prof K. Govinda1
Volume: 2
Issue: 7
Year: 2011
Evaluation of Face Recognition Methods

Author(s): Sushma Jaiswal
Volume: 2
Issue: 7
Year: 2011
5G TECHNOLOGIES – AN ANECDOTE OF NETWORK SERVICE FOR THE FUTURE

Author(s): T.Venkat Narayana Rao
Volume: 2
Issue: 7
Year: 2011
NETWORK SECURITY: AN APPROACH TOWARDS SECURE COMPUTING

Author(s): Rahul Pareek
Volume: 2
Issue: 7
Year: 2011
Cloud Computing

Author(s): Rahul Pareek
Volume: 2
Issue: 7
Year: 2011
SECURITY ISSUES IN COMPUTER NETWORK ARCHITECTURE

Author(s): Dr. M. Lilly Florence
Volume: 2
Issue: 7
Year: 2011
A SURVEY ON WIRELESS SENSOR NETWORK ARCHITECTURE, PROTOCOLS AND APPLICATIONS

Author(s): Dr. M. Lilly Florence
Volume: 2
Issue: 7
Year: 2011
Frontal Face Detection Methods –Neural Networks and Aggressive Learning Algorithm

Author(s): Sushma Jaiswal
Volume: 2
Issue: 7
Year: 2011
International Data Encryption Algorithm (IDEA) – A Typical Illustration

Author(s): Sandipan Basu
Volume: 2
Issue: 7
Year: 2011
TO DESIGN A SIMULATOR FOR PERFORMANCE COMPARISION OF COST MODELS

Author(s): Manpreet Kaur
Volume: 2
Issue: 7
Year: 2011
RENEWED APPROACH FOR IMAGE RECTIFICATION

Author(s): Sahil Bansal
Volume: 2
Issue: 7
Year: 2011
Analyzing the Superlative Symmetric Cryptographic Encryption Algorithm

Author(s): Srinivasarao D
Volume: 2
Issue: 7
Year: 2011
COMBATING CORRUPTION THROUGH E-GOVERNANCE IN PUBLIC SERVICE DELIVERY SYSTEM

Author(s): Sushil Kumar Singla
Volume: 2
Issue: 7
Year: 2011
Region growing Adaptive Contrast Enhancement of Medical MRI Images

Author(s): Sonia Goyal
Volume: 2
Issue: 7
Year: 2011
AN INTELLIGENT DECISION SUPPORT USING GENETIC FUZZY INTEGRATION FOR CAPABILITY ANALYSIS

Author(s): Kunjal B. Mankad
Volume: 2
Issue: 7
Year: 2011
Efficient audio processing in android 2.3

Author(s): Kailash Pathak
Volume: 2
Issue: 7
Year: 2011
PATTERN RECOGNIZATION USING NEURAL NETWORK OF HAND BIOMETRICS

Author(s): Amit Taneja
Volume: 2
Issue: 7
Year: 2011
A Metric Framework for Analysis of OOD

Author(s): Suruchi Mehra
Volume: 2
Issue: 7
Year: 2011
APPLICATION BASED UNDERSTANDING AND CLASSIFYING WEB QUIRES

Author(s): Rajesh Kumar Ahirwar
Volume: 2
Issue: 7
Year: 2011
MINING CO-LOCATION PATTERNS FROM SPATIAL DATA USING RULEBASED APPROACH

Author(s): G. Priya
Volume: 2
Issue: 7
Year: 2011
A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Author(s): Manikandan. G
Volume: 2
Issue: 7
Year: 2011
AN EFFICIENT APPROACH TO DETECT FOREST FIRE USING K-MEDIODS ALGORITHM

Author(s): A Gnana Baskaran
Volume: 2
Issue: 7
Year: 2011
Data Diffusion and Gathering in Wireless Sensor Networks

Author(s): P. Balamurugan
Volume: 2
Issue: 7
Year: 2011
3D face Recognition and Modeling System

Author(s): Sushma Jaiswal
Volume: 2
Issue: 7
Year: 2011
ENERGY BALANCING INTELLIGENT CLUSTRING PROTOCOL FOR WIRELESS SENSOR NETWORK

Author(s): Navroop kaur Chattha
Volume: 2
Issue: 7
Year: 2011
ANALYSIS OF DDoS ATTACKS IN DISTRIBUTED PEER TO PEER NETWORKS

Author(s): Vooka Pavan Kumar
Volume: 2
Issue: 7
Year: 2011
ENERGY CONSERVATION OF WSNS THROUGH DIFFERENT CLUSTERING ALGORITHMS

Author(s): Kirtika Goyal
Volume: 2
Issue: 7
Year: 2011
MULTILEVEL CRYPTOGRAPHY TECHNIQUE USING GRACEFUL CODES

Author(s): Prof K. Govinda
Volume: 2
Issue: 7
Year: 2011
NOVEL APPROCH FOR OFT BASED WEB DOMAIN PREDICTION

Author(s): A. Niky Singhai
Volume: 3
Issue: 7
Year: 2012
ON DEMAND EFFICIENT FREQUENT ITEMSET METHOD IN UNCERTAIN DATA

Author(s): Sanjaydeep Singh Lodhi
Volume: 3
Issue: 7
Year: 2012
RECOGNITION OF SIGNBOARD IMAGES OF GURMUKHI

Author(s): Er.Puneet Kaur
Volume: 3
Issue: 6
Year: 2012
SOA BASED MULTI PARTY WEB SERVICES USING DYNAMIC AUTHENTICATION

Author(s): Nalini Priya G
Volume: 3
Issue: 6
Year: 2012
ENHANCING SECURITY BY BROADENING NYMBLE SYSTEM IN ANONYMIZING NETWORKS

Author(s): Yenumula Sankara Rao
Volume: 3
Issue: 6
Year: 2012
Advanced Secure Dynamic-ID Based Remote User Authentication Scheme

Author(s): chandra sekhar vorugunti
Volume: 3
Issue: 6
Year: 2012
INFORMATION RETRIEVAL USING INDEXING SCHEME FOR TREE PATTERN FRAMEWORK

Author(s): Muthukumar R
Volume: 3
Issue: 6
Year: 2012
SIMULATED ANNEALING BASED PLACEMENT ALGORITHMS AND RESEARCH CHALLENGES : A SURVEY

Author(s): Rakesh Mohanty | Suchismita Pattanaik | Shubhendu Prakash Bhoi
Volume: 3
Issue: 6
Year: 2012
AN EFFICIENT FRAMEWORK FOR NETWORK BASED QUERY PROCESSING IN ROAD NETWORKS

Author(s): Akula S R Lingeswara Rao
Volume: 3
Issue: 6
Year: 2012
A REVIEW ON VISUAL CRYPTOGRAPHY SCHEMES

Author(s): Thottempudi Kiran
Volume: 3
Issue: 6
Year: 2012
EFFICIENT GENETIC ALGORITHM ON LINEAR PROGRAMMING PROBLEM FOR FITTEST CHROMOSOMES

Author(s): Subrata Datta
Volume: 3
Issue: 6
Year: 2012
PROPOSED ALGORITHM FOR FREQUENT ITEMSETS PATTERNS

Author(s): Shweta Sharma | Ritika Pandhi
Volume: 3
Issue: 6
Year: 2012
AN EFFICIENT AND ROBUST MODEL FOR DATA LEAKAGE DETECTION SYSTEM

Author(s): Janga Ajay Kumar
Volume: 3
Issue: 6
Year: 2012
Advanced Secure Remote User Authentication Scheme Preserving User Anonymity

Author(s): chandra sekhar vorugunti | Mrudula Sarvabhatla
Volume: 3
Issue: 6
Year: 2012
ADAPTIVE JOIN OPERATORS FOR RESULT RATE MAXIMIZATION

Author(s): Pallavi D. Umap
Volume: 3
Issue: 6
Year: 2012
User Desired Information Translation

Author(s): Majid Zaman | Muheet Ahmed Butt | Dr. SMK Quadri
Volume: 3
Issue: 6
Year: 2012
Multi Agent System Based Scheme for Revised National Tuberculosis Control Program

Author(s): Shibakali Gupta | Sesa Singha Roy | Indrasish Bannerjee
Volume: 2
Issue: 6
Year: 2011
Q-ROUTING AND INTRUSION DETECTION

Author(s): D.B. Ojha
Volume: 2
Issue: 6
Year: 2011
Face Recognition Using different level of Algorithms

Author(s): sushma jaiswal
Volume: 2
Issue: 6
Year: 2011
MORPHOLOGICAL METHOD, PCA AND LDA WITH NEURAL NETWORKS-FACE RECOGNITION

Author(s): Sushma Jaiswal
Volume: 2
Issue: 6
Year: 2011
FEATURE DETECTION APPROACH FROM VIRUSES THROUGH MINING

Author(s): Raviraj Choudhary
Volume: 2
Issue: 6
Year: 2011
ATTACK DESCRIPTION LANGUAGE FOR COLLABORATED ALERTS-USING XML AND UML

Author(s): K.V.S.N. Rama Rao
Volume: 2
Issue: 6
Year: 2011
PREVENTION AND REACTION BASED SECURE ROUTING IN MANETS

Author(s): Ajay Jangra
Volume: 2
Issue: 6
Year: 2011
SOFTWARE COMPONENT COMPLEXITY MEASUREMENT THROUGH PROPOSED INTEGRATION METRICS

Author(s): Ms. Latika
Volume: 2
Issue: 6
Year: 2011
A MARKOV CHAIN MODEL FOR ROUND ROBIN SCHEDULING IN OPERATING SYSTEM

Author(s): Deepak Sisodia
Volume: 2
Issue: 6
Year: 2011
3D Face Modeling: Comprehensive Description

Author(s): sushma jaiswal
Volume: 2
Issue: 6
Year: 2011
BMP To JPEG- the conversion process

Author(s): Anjali Anand | Himanshu Aggarwal
Volume: 2
Issue: 6
Year: 2011
SURVEY ON HANDOFF TECHNIQUES

Author(s): bhuvaneswari krishna
Volume: 2
Issue: 6
Year: 2011
ASSESSMENT OF SECURITY IN MOBILE AD-HOC NETWORKS (MANET)

Author(s): Deepak Chayal
Volume: 2
Issue: 6
Year: 2011
NOVEL GRAY SCALE CONVERSION TECHNIQUES BASED ON PIXEL DEPTH

Author(s): Debasish Biswas
Volume: 2
Issue: 6
Year: 2011
HIBERNATE TECHNOLOGY FOR AN EFFICIENT BUSINESS APPLICATION EXTENSION

Author(s): B. Vasavi
Volume: 2
Issue: 6
Year: 2011
Improving Quality using Testing Strategies

Author(s): sahil batra
Volume: 2
Issue: 6
Year: 2011
Model to improve Correctness and Quality and Reducing Testing Time (MCQRTT)

Author(s): sahil batra
Volume: 2
Issue: 6
Year: 2011
Searching Improvement in Blogs Using Data Mining Techniques

Author(s): Robin Singh Bhadoria
Volume: 2
Issue: 6
Year: 2011
EVALUATING THE PERFORMANCE OF ASSOCIATION RULE MINING ALGORITHMS

Author(s): K. Vanitha
Volume: 2
Issue: 6
Year: 2011
A VALIDATION OF SIM-A WITH OVPSIM

Author(s): Gajendra Kumar Ranka
Volume: 2
Issue: 6
Year: 2011
SEMANTIC WEB MINING FOR INTELLIGENT WEB PERSONALIZATION

Author(s): Anil Sharma
Volume: 2
Issue: 6
Year: 2011
3D Face Modeling: Comprehensive Description

Author(s): Sushma Jaiswal
Volume: 2
Issue: 6
Year: 2011
BMP To JPEG- the conversion process

Author(s): Anjali Anand
Volume: 2
Issue: 6
Year: 2011
SURVEY ON HANDOFF TECHNIQUES

Author(s): A. Bhuvaneswari
Volume: 2
Issue: 6
Year: 2011
ASSESSMENT OF SECURITY IN MOBILE AD-HOC NETWORKS (MANET)

Author(s): Deepak Chayal
Volume: 2
Issue: 6
Year: 2011
HIBERNATE TECHNOLOGY FOR AN EFFICIENT BUSINESS APPLICATION EXTENSION

Author(s): B. Vasavi
Volume: 2
Issue: 6
Year: 2011
NOVEL GRAY SCALE CONVERSION TECHNIQUES BASED ON PIXEL DEPTH

Author(s): Debasish Biswas
Volume: 2
Issue: 6
Year: 2011
Improving Quality using Testing Strategies

Author(s): Sahil Batra
Volume: 2
Issue: 6
Year: 2011
Model to improve Correctness and Quality and Reducing Testing Time (MCQRTT)

Author(s): Sahil Batra
Volume: 2
Issue: 6
Year: 2011
Searching Improvement in Blogs Using Data Mining Techniques

Author(s): Robin Singh Bhadoria
Volume: 2
Issue: 6
Year: 2011
EVALUATING THE PERFORMANCE OF ASSOCIATION RULE MINING ALGORITHMS

Author(s): K. Vanitha
Volume: 2
Issue: 6
Year: 2011
A VALIDATION OF SIM-A WITH OVPSIM

Author(s): Gajendra Kumar Ranka | Dr. Manoj Kumar Jain
Volume: 2
Issue: 6
Year: 2011
SEMANTIC WEB MINING FOR INTELLIGENT WEB PERSONALIZATION

Author(s): Anil Sharma
Volume: 2
Issue: 6
Year: 2011
Multi Agent System Based Scheme for Revised National Tuberculosis Control Program

Author(s): Shibakali Gupta
Volume: 2
Issue: 6
Year: 2011
Q-ROUTING AND INTRUSION DETECTION

Author(s): D.B. Ojha
Volume: 2
Issue: 6
Year: 2011
KEY BASED STEGANOGRAPHY IN A GRAY LEVEL IMAGE INVOLVING PERMUTATION AND MODULAR ARITHMETIC ADDITION

Author(s): V.U.K. Sastry | Ch. Samson
Volume: 2
Issue: 6
Year: 2011
KEY BASED STEGANOGRAPHY IN A GRAY LEVEL IMAGE INVOLVING PERMUTATION AND XOR OPERATION

Author(s): V.U.K. Sastry | Ch. Samson
Volume: 2
Issue: 6
Year: 2011
Face Recognition Using different level of Algorithms

Author(s): Sushma Jaiswal
Volume: 2
Issue: 6
Year: 2011
MORPHOLOGICAL METHOD, PCA AND LDA WITH NEURAL NETWORKS-FACE RECOGNITION

Author(s): Sushma Jaiswal
Volume: 2
Issue: 6
Year: 2011
FEATURE DETECTION APPROACH FROM VIRUSES THROUGH MINING

Author(s): Raviraj Choudhary | Ravi Saharan
Volume: 2
Issue: 6
Year: 2011
ATTACK DESCRIPTION LANGUAGE FOR COLLABORATED ALERTS-USING XML AND UML

Author(s): K.V.S.N. Rama Rao
Volume: 2
Issue: 6
Year: 2011
PREVENTION AND REACTION BASED SECURE ROUTING IN MANETS

Author(s): Ajay Jangra
Volume: 2
Issue: 6
Year: 2011
SOFTWARE COMPONENT COMPLEXITY MEASUREMENT THROUGH PROPOSED INTEGRATION METRICS

Author(s): Ms. Latika
Volume: 2
Issue: 6
Year: 2011
A MARKOV CHAIN MODEL FOR ROUND ROBIN SCHEDULING IN OPERATING SYSTEM

Author(s): Deepak Sisodia
Volume: 2
Issue: 6
Year: 2011
AN EFFICIENT AND EFFECTIVE RANKING ON SPATIAL DATA BY QUALITY PREFERENCES

Author(s): Dhanavarapu Ramakrishna
Volume: 3
Issue: 6
Year: 2012
AN IMPROVED ROUND ROBIN CPU SCHEDULING ALGORITHM

Author(s): Manish Kumar Mishra
Volume: 3
Issue: 6
Year: 2012
AN EFFECTIVE ANALYSIS OF SPATIAL DATA MINING METHODS USING RANGE QUERIES

Author(s): Gangireddy Ravikumar
Volume: 3
Issue: 6
Year: 2012
SURVEY ON CAPTCHA SYSTEMS

Author(s): Rizwan ur Rizwan
Volume: 3
Issue: 6
Year: 2012
A DETAIL REVIEW ON ENERGY EFFICIENT FAULT-TOLERANCETECHNIQUES AND RELATED ISSUES IN WSNS

Author(s): Kandarpa Gowri Rama Lakshmi
Volume: 3
Issue: 6
Year: 2012
Semi-Supervised learning of utterances using hidden vector state language model

Author(s): Manzoor Ahmad Chachoo
Volume: 3
Issue: 6
Year: 2012
TRUST BASED SECURE AODV IN MANET

Author(s): Pankaj Sharma
Volume: 3
Issue: 6
Year: 2012
JOUST FOR SUPREMACY-BOOTH’S & BKS MULTIPLICATION ALGORITHM

Author(s): Barun Biswas
Volume: 3
Issue: 5
Year: 2012
DEFENDING AGAINST WEB VULNERABILITIES AND CROSS-SITE SCRIPTING

Author(s): T.Venkat Narayana Rao
Volume: 3
Issue: 5
Year: 2012
OPTIMIZED GENETIC ALGORITHM FOR SPATIAL DATA EVENTS IN ACTIVE DATA WAREHOUSE

Author(s): Paramasivam K
Volume: 3
Issue: 5
Year: 2012
Autonomic Computing: A Long Term Vision in Computing

Author(s): Sandeep Kumar Chauhan
Volume: 3
Issue: 5
Year: 2012
LOGIC BASED RULES FOR PROJECT ASSIGN PREDICTION

Author(s): Ashu Singla
Volume: 2
Issue: 5
Year: 2011
Edge Detection of Human Eye based on Homogeneity Analysis

Author(s): Samir Kumar Bandyopadhyay
Volume: 2
Issue: 5
Year: 2011
Lip contour Detection Techniques based on Front View of Face

Author(s): Samir Kumar Bandyopadhyay
Volume: 2
Issue: 5
Year: 2011
DETECTING ANOMALIES DURING MULTIPLE INHERITANCE

Author(s): shubpreet kaur
Volume: 2
Issue: 5
Year: 2011
Text Steganography using CALP with High Embedding Capacity

Author(s): Souvik Bhattacharyya
Volume: 2
Issue: 5
Year: 2011
MULTIHOMING ARCHITECTURE USED IN ATTACKING MAIL AND WEB SERVERS

Author(s): Kewal Krishan Sharma | Rakesh Dube
Volume: 2
Issue: 5
Year: 2011
Anti-Random Test Generation In Software Testing

Author(s): seema rani
Volume: 2
Issue: 5
Year: 2011
Data Forwarding in Adhoc Wireless Sensor Network Using Shortest Path Algorithm

Author(s): P.K. Singh
Volume: 2
Issue: 5
Year: 2011
VULNERABILITIES AND SOLUTIONS: MOBILE AD HOC NETWORKS (MANETs) FOR OPTIMAL ROUTING AND SECURITY

Author(s): Shruti Sangwan | Ajay Jangra | Nitin Goel
Volume: 2
Issue: 5
Year: 2011
Weighted Mean Priority Based Scheduling for Interactive Systems

Author(s): Himansu Sekhar Behera | Sabaysachi Sahu | Sourav Kumar Bhoi
Volume: 2
Issue: 5
Year: 2011
Data Warehouse and Its Methods

Author(s): Sandeep Singh | Sona Malhotra
Volume: 2
Issue: 5
Year: 2011
PASSWORD IN PRACTICE: AN USABILITY SURVEY

Author(s): Naveen Kumar
Volume: 2
Issue: 5
Year: 2011
Research Support Systems as an Effective Web Based Information System

Author(s): Gaurav Kumar
Volume: 2
Issue: 5
Year: 2011
XML Mining Using Genetic Algorithm

Author(s): Amitava Nag
Volume: 2
Issue: 5
Year: 2011
LINEAR AND NON-LINEAR CAMERA CALIBRATION TECHNIQUES

Author(s): Manoj Gupta
Volume: 2
Issue: 5
Year: 2011
Security threats in Wireless Sensor Networks

Author(s): rahul kadian
Volume: 2
Issue: 5
Year: 2011
The IHS Transformations Based Image Fusion

Author(s): Firouz AL-wassai | Dr. N.V Kalyankar | Dr. Ali Al-Zuky
Volume: 2
Issue: 5
Year: 2011
Integrating Information from Heterogeneous Data Sources

Author(s): Muheet Ahmed Butt
Volume: 3
Issue: 5
Year: 2012
A REVIEW OF ENERGY EFFICIENT ROUTING PROTOCOLS FOR MOBILE AD-HOC NETWORK

Author(s): Shwaita Kodesia
Volume: 3
Issue: 5
Year: 2012
Comparative Analysis on Turing Machine and Quantum Turing Machine

Author(s): Tirtharaj Dash | Tanistha Nayak
Volume: 3
Issue: 5
Year: 2012
Data Warehouse and Its Methods

Author(s): Sandeep Singh
Volume: 2
Issue: 5
Year: 2011
PASSWORD IN PRACTICE: AN USABILITY SURVEY

Author(s): Naveen Kumar
Volume: 2
Issue: 5
Year: 2011
Research Support Systems as an Effective Web Based Information System

Author(s): Sheilini Jindal
Volume: 2
Issue: 5
Year: 2011
XML Mining Using Genetic Algorithm

Author(s): Soumadip Ghosh
Volume: 2
Issue: 5
Year: 2011
LINEAR AND NON-LINEAR CAMERA CALIBRATION TECHNIQUES

Author(s): Suchi Upadhyay
Volume: 2
Issue: 5
Year: 2011
Security threats in Wireless Sensor Networks

Author(s): Sona Malhotra | Rahul Kadian
Volume: 2
Issue: 5
Year: 2011
The IHS Transformations Based Image Fusion

Author(s): Mrs. Firouz Abdullah Al-Wassai
Volume: 2
Issue: 5
Year: 2011
LOGIC BASED RULES FOR PROJECT ASSIGN PREDICTION

Author(s): Ashu Singla
Volume: 2
Issue: 5
Year: 2011
Edge Detection of Human Eye based on Homogeneity Analysis

Author(s): Prof. Samir K. Bandyopadhyay
Volume: 2
Issue: 5
Year: 2011
Lip contour Detection Techniques based on Front View of Face

Author(s): Prof. Samir K. Bandyopadhyay
Volume: 2
Issue: 5
Year: 2011
DETECTING ANOMALIES DURING MULTIPLE INHERITANCE

Author(s): Shubpreet Kaur | Shivani Goel
Volume: 2
Issue: 5
Year: 2011
Text Steganography using CALP with High Embedding Capacity

Author(s): Souvik Bhattacharyya
Volume: 2
Issue: 5
Year: 2011
MULTIHOMING ARCHITECTURE USED IN ATTACKING MAIL AND WEB SERVERS

Author(s): Kewal Krishan Sharma
Volume: 2
Issue: 5
Year: 2011
Anti-Random Test Generation In Software Testing

Author(s): Kulvinder Singh | Seema Rani
Volume: 2
Issue: 5
Year: 2011
Data Forwarding in Adhoc Wireless Sensor Network Using Shortest Path Algorithm

Author(s): P.K. Singh
Volume: 2
Issue: 5
Year: 2011
Weighted Mean Priority Based Scheduling for Interactive Systems

Author(s): H.S. Behera
Volume: 2
Issue: 5
Year: 2011
DESIGN OF RECTANGULAR PATCH ANTENNA USING MLP ARTIFICIAL NEURAL NETWORK

Author(s): P. Kala
Volume: 3
Issue: 5
Year: 2012
GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY

Author(s): Samir Kumar Bandyopadhyay
Volume: 1
Issue: 5
Year: 2011
A NEW METHOD FOR EMBEDDING DATA WITHIN AN IMAGE

Author(s): Samir Kumar Bandyopadhyay
Volume: 1
Issue: 5
Year: 2011
PRTF: PERSON RELATED TO A FIELD PROTOCOL FOR SEARCHING IN SOCIAL NETWORK DATABASES

Author(s): Ashok Bhansali
Volume: 1
Issue: 5
Year: 2011
ERRORS OF SUPERVISED CLASSIFICATION TECHNIQUES ON REAL WORLD PROBLEMS

Author(s): J. Ashok Kumar
Volume: 1
Issue: 5
Year: 2011
Cluster Detection using GA-KNN Conjunction Approach

Author(s): Manoj Kumar Rawat
Volume: 3
Issue: 5
Year: 2012
MIGRATED LEGACY DATA ISSUES - RECOVERY, CONCURRENCY & SECURITY

Author(s): Er. Muheet Ahmed Butt
Volume: 3
Issue: 5
Year: 2012
SOME OBSERVATION ON MAINTAINABILITY METRICS AND MODELS FOR WEB BASED SOFTWARE SYSTEM

Author(s): Laxmi Shanker Maurya
Volume: 3
Issue: 5
Year: 2012
Initial Concept how to Design a Software Requirement Identification Model

Author(s): Sudhir Singh
Volume: 3
Issue: 5
Year: 2012
ZOUST FOR SUPREMECY-BOOTH’S & BKS MULTIPLICATION ALGORITHM

Author(s): Barun Biswas
Volume: 3
Issue: 5
Year: 2012
DEFENCE AGAINST MAN IN MIDDLE ATTACK IN SECURE SIMPLE PAIRING

Author(s): Nishant Mishra
Volume: 3
Issue: 5
Year: 2012
Data Hiding of Binary Image Using Discrete Wavelet Transformation

Author(s): Vaishali C. Sanap
Volume: 1
Issue: 5
Year: 2011
VERTICAL HANDOFF DECISION SCHEMES IN HETEROGENEOUS WIRELESS NETWORK USING MADM

Author(s): K. Savitha
Volume: 1
Issue: 5
Year: 2011
PRE PROCESSING HIERARCHY DESIGNED FOR ENHANCED FACE DETECTION

Author(s): S. Venkatesan
Volume: 1
Issue: 5
Year: 2011
IMPLEMENTATION OF IMAGE STEGANOGRAPHY

Volume: 1
Issue: 5
Year: 2011
Secure E-Link For Jostle Conduit

Author(s): Meenu Sahni
Volume: 1
Issue: 5
Year: 2011
SECURE AND ERROR FREE TRANSMISSION OF AUDIO/VISUAL CONTENT

Author(s): Deo Brat Ojha
Volume: 1
Issue: 5
Year: 2011
A JAVA BASED TOOL FOR BASIC IMAGE PROCESSING AND EDGE DETECTION

Author(s): Tirtharaj Dash
Volume: 3
Issue: 5
Year: 2012
OPTIMAL POWER MANAGEMENT IN WIRELESS SENSOR NETWORKS FOR ENHANCED LIFE TIME

Author(s): NAGENDRA PRASAD MANDRU
Volume: 3
Issue: 4
Year: 2012
A SURVEY OF FOCUSED CRAWLER APPROACHES

Author(s): Maryam Hazman
Volume: 3
Issue: 4
Year: 2012
ENHANCED RELIABLE TCP FOR CONGESTION CONTROL WITH CORRUPTION CONTROL IN MOBILE AD HOC NETWORKS

Author(s): Poonam Tomar | Shweta Yadav
Volume: 3
Issue: 4
Year: 2012
A MULTI-AGENT SYSTEM BASED ASSISTIVE LEARNING SYSTEM FOR DISABLED STUDENTS

Author(s): Shiladitya Pujari
Volume: 3
Issue: 4
Year: 2012
RESULT DOWNLOAD MANAGER AND ANALYZER SYSTEM

Author(s): Atul Kumar
Volume: 3
Issue: 4
Year: 2012
E-LEARNING METHODOLOGIES AND ITS TRENDS IN MODERN INFORMATION TECHNOLOGY

Author(s): Joyshree Nath
Volume: 3
Issue: 4
Year: 2012
LOW POWER ENCRYPTED MIPS PROCESSOR BASED ON AES ALGORITHM

Author(s): Kirat Pal Singh | Shivani Parmar
Volume: 3
Issue: 4
Year: 2012
PORTFOLIO OPTIMIZATION USING NEURO FUZZY SYSTEM IN INDIAN STOCK MARKET

Author(s): Guna Sekar
Volume: 3
Issue: 4
Year: 2012
PUBLIC-KEY STEGANOGRAPHY BASED ON MODIFIED LSB METHOD

Author(s): Vivek Jain
Volume: 3
Issue: 4
Year: 2012
Fault Tolerance in Grid Computing Using WADE

Author(s): Gangineni Veeranjaneyulu
Volume: 3
Issue: 4
Year: 2012
PERFORMANCE BASED SECURE OPTIMIZED ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORK

Author(s): Anoop Kumar Jain
Volume: 3
Issue: 4
Year: 2012
Autonomous Mobile Robots Designing

Author(s): Dr. V. M. Murthy (Director)
Volume: 2
Issue: 4
Year: 2011
Free Forms + CRM     Why do you need a reservation system?