Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Advanced Computer Research

ISSN: 2249--7277
Publisher: Association of Computer Communication Education for National Triumph (ACCENT)


ADD TO MY LIST
 
Review of Information Authentication in Mobile Cloud over SaaS & PaaS Layers PDF available

Author(s): Vineet Guha, | Manish Shrivastava
Volume: 3
Issue: 9
Year: 2013
Association Rules Optimization: A Survey PDF available

Author(s): Anshuman Singh Sadh, | Nitin Shukla
Volume: 3
Issue: 9
Year: 2013
Implement Security using smart card on Cloud PDF available

Author(s): Amish Kumar Aman | Vijay Prakash
Volume: 3
Issue: 9
Year: 2013
Reactive Power Compensation on 132 KV Substation Using Soft Computing Techniques (Fuzzy Logic) PDF available

Author(s): Yojna Saratkar, | Arun Pachori
Volume: 3
Issue: 9
Year: 2013
An Efficient Image Denoising Method based on Fourth-Order Partial Differential Equations PDF available

Author(s): Anand Swaroop Khare, | Ravi Mohan, | Sumit Sharma
Volume: 3
Issue: 9
Year: 2013
Reactive Power Compensation in Transmission Line using Fuzzy Control Method: A Survey PDF available

Author(s): Yojna Saratkar, | Arun Pachori
Volume: 3
Issue: 9
Year: 2013
A Secure Mechanism to Supervise Automotive Sensor Network by Client on Smart Phone PDF available

Author(s): T R Yashavanth, | Ravi S Malashetty, | V R Udupi
Volume: 3
Issue: 9
Year: 2013
Extracting Person Name, Date and Place from Text Documents Using LEX Tool PDF available

Author(s): Roohi Sharma
Volume: 3
Issue: 9
Year: 2013
Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network

Author(s): Neha Gupta, | Manish Shrivastava
Volume: 3
Issue: 9
Year: 2013
Robust LQR Control Design of Gyroscope PDF available

Author(s): Ashok S. Chandak | Anil J. Patil
Volume: 3
Issue: 9
Year: 2013
Block Based Information Hiding using Cosine, Hartley, Walsh and Haar Wavelets PDF available

Author(s): H. B. Ke kre | Sude e p D. The pade | Ratne sh N. Chaturve di
Volume: 3
Issue: 9
Year: 2013
A Survey of latest Algorithms for Frequent Itemset Mining in Data Stream PDF available

Author(s): U.Chandrasekhar, | Sandeep Kumar. K, | Yakkala Uma Mahesh
Volume: 3
Issue: 9
Year: 2013
A Review of Protein-DNA Binding Motif using Association Rule Mining PDF available

Author(s): Virendra Kumar Tripathi, | Hitesh Gupta
Volume: 3
Issue: 9
Year: 2013
Credential Clustering in Parallel Comparability Frequency Amplitude PDF available

Author(s): Ameela.T, | Kaleeswaran.D
Volume: 3
Issue: 9
Year: 2013
Speech parameterization based on AM-FM model and its application in speaker identification using AANN PDF available

Author(s): D. Giften Francis Samuel , | D. Synthiya Vinothini
Volume: 3
Issue: 9
Year: 2013
Attack Detection in Watermarked Images with PSNR and RGB Intensity PDF available

Author(s): Neha Chauhan, | Akhilesh A. Waoo, | P. S. Patheja
Volume: 3
Issue: 9
Year: 2013
Multi-Level Security for Automotive – RFID Based Technology with Lab VIEW Implementation PDF available

Author(s): Priya Darshini .V, | Prakash.R, | Prasannabalaje.S.M, | Sangeetha Monica.T
Volume: 3
Issue: 9
Year: 2013
Plasmonics based VLSI processes PDF available

Author(s): Shreya Bhattacharya
Volume: 3
Issue: 9
Year: 2013
Image Denoising based on Fourth-Order Partial Differential Equations: A Survey PDF available

Author(s): Anand Swaroop Khare, | Ravi Mohan, | Sumit Sharma
Volume: 3
Issue: 9
Year: 2013
An Ensemble Method based on Particle of Swarm for the Reduction of Noise, Outlier and Core Point PDF available

Author(s): Satish Dehariya, | Divakar Singh
Volume: 3
Issue: 9
Year: 2013
An Efficient Partition Technique to reduce the Attack Detection Time with Web based Text and PDF files PDF available

Author(s): Animesh Dubey, | Ravindra Gupta, | Gajendra Singh Chandel
Volume: 3
Issue: 9
Year: 2013
A Survey of Middleware in different languages for Ubiquitous Services PDF available

Author(s): Neha Sharma, | Usha Batra, | Saurabh Mukherjee
Volume: 3
Issue: 9
Year: 2013
Modeling For Runtime Locality Optimizations of Distributed Java Applications Using Dynamic Localization Algorithm PDF available

Author(s): Daya Shankar Verma , Abhay Kumar , Amarto Chakrabarty , Haider Banka , Amrita Priyam
Volume: 3
Issue: 8
Year: 2013
Approaches for Disambiguation in Hindi Language PDF available

Author(s): Pankaj Kumar, Atul Vishwakarma and Ashwani Kr. Verma
Volume: 3
Issue: 8
Year: 2013
A Comprehensive study on Cloud Green Computing: To Reduce Carbon Footprints Using Clouds PDF available

Author(s): Chiranjeeb Roy Chowdhury, Arindam Chatterjee, Alap Sardar, Shalabh Agarwal, Asoke Nath
Volume: 3
Issue: 8
Year: 2013
Content Base Image Retrieval using Combination of Color, Shape and Texture Features PDF available

Author(s): Neha Jain, Sumit Sharma, Ravi Mohan Sairam
Volume: 3
Issue: 8
Year: 2013
An Unsupervised approach for augmentation of Protein Structure PDF available

Author(s): Geetika S. Pandey, R.C Jain
Volume: 3
Issue: 8
Year: 2013
A linear Fuzzy Goal Programming Method for Solving Optimal Power Generation and Dispatch Problem PDF available

Author(s): Bijay Baran Pal, Mousumi Kumar
Volume: 3
Issue: 8
Year: 2013
A study on implementing Green IT in Enterprise 2.0 PDF available

Author(s): Shalabh Agarwal, Asoke Nath
Volume: 3
Issue: 8
Year: 2013
SEPIC Based PFC Converter for PMBLDCM Drive in Air Conditioning System PDF available

Author(s): Amit Kumar Sinha, Gandhi. R
Volume: 3
Issue: 8
Year: 2013
Analysis on Photovoltaic Assisted Three Phase five level Unipolar PWM Inverter for Induction Motor Driven Water Pumping System PDF available

Author(s): Ajay Kumar Maurya, Kishore Chahar, Y. K. Chauhan
Volume: 3
Issue: 8
Year: 2013
A Technique for Image Search Using Fractal Quadtree Partitioned Iterated Function System-A Survey PDF available

Author(s): Shraddha Viraj Pandit,Manish Shreevastava
Volume: 3
Issue: 8
Year: 2013
Implementation of ON/OFF and PID controller using TCP Protocol Based on Virtual Instrumentation PDF available

Author(s): Abhyarthana Bisoyi , Umesh Chandra Pati
Volume: 3
Issue: 8
Year: 2013
Steganography in MPEG V ideo F iles using MACROBLOCKS PDF available

Author(s): Lathikanandini. M , Suresh. J
Volume: 3
Issue: 8
Year: 2013
Numerical Analysis of Free Surface in Water Model for Design of Submerged Entry Nozzle PDF available

Author(s): Rajat Kumar Das, Sukanta Kumar Dash
Volume: 3
Issue: 8
Year: 2013
Efficient Frequent Pattern Mining Techniques of Semi Structured data: a Survey PDF available

Author(s): Leena A Deshpande, R.S. Prasad
Volume: 3
Issue: 8
Year: 2013
DEDD Symmetric-Key Cryptosystem PDF available

Author(s): Praloy Shankar De, Prasenjit Maiti
Volume: 3
Issue: 8
Year: 2013
An Evaluation of MANET Routing Protocol PDF available

Author(s): Neha Gupta, Manish Shrivastava
Volume: 3
Issue: 8
Year: 2013
Selection of suitable Topology and Switching Technique of ZSI for wind power application PDF available

Author(s): Tanmoy Maity, Santosh Sonar
Volume: 3
Issue: 8
Year: 2013
ECG signal analysis for detection of Heart Rate and Ischemic Episodes PDF available

Author(s): Goutam Kumar Sahoo, Samit Ari, Sarat Kumar Patra
Volume: 3
Issue: 8
Year: 2013
Cross Dumbbell Periodic Defected Ground Structure Characteristics PDF available

Author(s): Prakash K Kuravatti, T. S. Rukmini
Volume: 3
Issue: 8
Year: 2013
Genetic Algorithm Based Goal Programming Procedure for Solving Interval-Valued Multilevel Programming Problems PDF available

Author(s): Papun Biswas, Bijay Baran Pal, Anirban Mukhopadhyay, Debjani Chakraborti
Volume: 3
Issue: 8
Year: 2013
Ethics of E-Commerce in Information and Communications Technologies PDF available

Author(s): Santosh Kumar Das, Abhishek Kumar, Bappaditya Das, A.P.Burnwal
Volume: 3
Issue: 8
Year: 2013
Application of Green computing in Framing Energy Efficient Software Engineering PDF available

Author(s): Aritra Mitra, Riya Basu, Avik Guha, Shalabh Agarwal, Asoke Nath
Volume: 3
Issue: 8
Year: 2013
Microstrip Antenna with Centrally Loaded Inductive Discontinuity for Dual Band Operation PDF available

Author(s): A. Raaz, S. Chattopadhyay
Volume: 3
Issue: 8
Year: 2013
Pair Programming “Potential Benefits and Threats” PDF available

Author(s): Supriya Gupta , Vandana Bhattacharya, Madhumita Singha
Volume: 3
Issue: 8
Year: 2013
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage PDF available

Author(s): Nithiavathy.R, Suresh.J
Volume: 3
Issue: 8
Year: 2013
MRI Brain Image Segmentation based on Thresholding PDF available

Author(s): G. Evelin Sujji, Y.V.S. Lakshmi, G. Wiselin Jiji
Volume: 3
Issue: 8
Year: 2013
Semi-Automatic Mapping Generation for the DBpedia Information Extraction Framework PDF available

Author(s): Arup Sarkar, Ujjal Marjit, Utpal Biswas
Volume: 3
Issue: 8
Year: 2013
Research on Qualitative Analysis of LEACH with Wormhole attack in Wireless Sensor Network PDF available

Author(s): Priya Maidamwar and Nekita Chavhan
Volume: 3
Issue: 8
Year: 2013
Effect of Blur and Noise on Image Denoising based on PDE PDF available

Author(s): Meenal Jain , Sumit Sharma, Ravi Mohan Sairam
Volume: 3
Issue: 8
Year: 2013
A Piecewise Linear Approximation Method to Solve Fuzzy Separable Quadratic Programming Problem PDF available

Author(s): Shyamal Sen, Bijay Baran Pal
Volume: 3
Issue: 8
Year: 2013
A Survey on Different Approaches for Energy Conservation in Wireless Sensor Networks PDF available

Author(s): Rumpa Mukherjee,Arindom Mukherjee
Volume: 3
Issue: 8
Year: 2013
Design of Ultrasonic Transducer MEMS Model for Distance Measurement using Multiphysics PDF available

Author(s): Priyabrata Pattnaik, Jhansirani Jena, S.K.Pradhan, S. K. Kamilla, Mihir Narayan Mohanty
Volume: 3
Issue: 8
Year: 2013
Design of Rectangular Stepped DRA for Wireless Local Area Network (Wlan) Applications PDF available

Author(s): Chinmaya Sahoo, P. K. Sahu, S. K. Behera
Volume: 3
Issue: 8
Year: 2013
Renovated Cluster Based Routing Protocol for MANET PDF available

Author(s): Yuvraj Kumbharey, Suwesh Shukla, Sushil Chaturvedi
Volume: 3
Issue: 8
Year: 2013
Modeling and Simulation on Double Delta Wing PDF available

Author(s): Sukanta Saha, Bireswar Majumdar
Volume: 3
Issue: 8
Year: 2013
Fuzzy Goal Programming Approach to Chance Constrained Multilevel Programming Problems PDF available

Author(s): Mousumi Kumar, Bijay Baran Pal
Volume: 3
Issue: 8
Year: 2013
Monitoring and Analysis of Vibration Signal Based On Virtual Instrumentation

Author(s): Sunita Mohanta, Umesh Chandra Pati
Volume: 3
Issue: 8
Year: 2013
Performance Comparison of AODV & DSR Routing Protocol in a Fading Environmen PDF available

Author(s): D.D.Seth, Harpreet Jolly, Dipti Divya, Garima Aastha, Jewsree Brahma
Volume: 3
Issue: 8
Year: 2013
Privacy and Security: Online Social Networking PDF available

Author(s): Akriti Verma, Deepak Kshirsagar, Sana Khan
Volume: 3
Issue: 8
Year: 2013
Shaft MisalignmentDetectionusing Stator Current Monitoring PDF available

Author(s): Alok Kumar Verma, Somnath Sarangi and M.H. Kolekar
Volume: 3
Issue: 8
Year: 2013
Ethics of Reducing Power Consumption in Wireless Sensor Networks using Soft Computing Techniques PDF available

Author(s): Santosh Kumar Das, Abhishek Kumar, Bappaditya Das and A.P.Burnwal
Volume: 3
Issue: 8
Year: 2013
Spintronics: A New Nanoelectronics Adventure PDF available

Author(s): Rohit Apurva, Sonia Chandan, Abhilash Katkar, Prashant Shinde
Volume: 3
Issue: 8
Year: 2013
An effective algorithm for Image security based on Compression and Decomposition method PDF available

Author(s): Seetaiah Kilaru, Yojana Kanukuntla, K B S Chary
Volume: 3
Issue: 8
Year: 2013
Mechanical usage for Unused Mineral Insulating Oils for Transformers and Switchgear PDF available

Author(s): L.D.N. Sahdeo, Arvind Kumar
Volume: 3
Issue: 8
Year: 2013
PLST: Point Location Using Search Technique Algorithms PDF available

Author(s): Syed Jaffar Abbas ,Raju Manjhi
Volume: 3
Issue: 8
Year: 2013
Study on Testing as a Service on Cloud PDF available

Author(s): Shruti N. Pardeshi
Volume: 3
Issue: 8
Year: 2013
New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate PDF available

Author(s): Aditi Garg, Ankita Agrawal, Niharika Chaudhary, Shivanshu Gupta, Devesh Pandey, Tumpa Roy
Volume: 3
Issue: 8
Year: 2013
A Robust Technique for Feature-based Image Mosaicing using Image Fusion PDF available

Author(s): Vimal Singh Bind, Priya Ranjan Muduli, Umesh Chandra Pati
Volume: 3
Issue: 8
Year: 2013
Effective Performance Evaluation of On-Demand Routing Protocol for Cognitive Radio Ad Hoc Network PDF available

Author(s): Srinivas Sethi, Sangita Pal, Ashima Rout
Volume: 3
Issue: 8
Year: 2013
Implementing Log Based Security in Data Warehouse PDF available

Author(s): Amritpal Singh, Nitin Umesh
Volume: 3
Issue: 8
Year: 2013
Performance Evaluation Using J2ME with Android over Cloud Services: A Simulation Approach PDF available

Author(s): Bharat Prajapat and Manish Shrivastava
Volume: 3
Issue: 8
Year: 2013
A Multi Maximal Length Multi Time Period Pseudorandom Bit Sequence (PRBS) Generator PDF available

Author(s): Aritra Sinha | Sunit Kumar Sen
Volume: 3
Issue: 8
Year: 2013
A Vectorial modeling for the pentaphase Permanent Magnet Synchronous Machine based on multimachine approach PDF available

Author(s): Abdelkrim Sellam,Boubakeur Dehiba,Mohamed B. Benabdallah,Mohamed Abid,Nacéra Bachir Bouiadjra,Boubakeur Bensaid,Mustapha Djouhri
Volume: 2
Issue: 7
Year: 2012
Towards a New Approach for Mining Frequent Itemsets on Data Stream PDF available

Author(s): Shailendra Jain, Sonal Patil
Volume: 2
Issue: 7
Year: 2012
Performance evaluation of DWT based image watermarking using error correcting codes. PDF available

Author(s): Shaikh Rakhshan Anjum, Priyanka Verma
Volume: 2
Issue: 7
Year: 2012
Reduced Order Modelling and Optimal Control of Fluid Flow Instability PDF available

Author(s): Vinay Anand Yadav, Ganapati Joshi
Volume: 2
Issue: 7
Year: 2012
Wireless Sensor Network and Emergency Communication System for Fire Safety PDF available

Author(s): Yogesh.S.Kale,A.V. Bapat, Piyush Pande
Issue: 7
Year: 2012
Improving RBF Kernel Function of Support Vector Machine using Particle Swarm Optimization PDF available

Author(s): Smruti Rekha Das, Pradeepta Kumar Panigrahi, Kaberi Das3and Debahuti Mishra
Volume: 2
Issue: 7
Year: 2012
Comparison between Different Scheduling Strategies by Using Cost239 Optical Network PDF available

Author(s): Pooja Meena, Manish Shrivastava, Sushil Chaturvedi
Volume: 2
Issue: 7
Year: 2012
Design a New Methodology for Removing Fog from the Image PDF available

Author(s): Jyoti Sahu
Volume: 2
Issue: 7
Year: 2012
An Efficient Data Mining for Credit Card Fraud Detection using Finger Print Recognition PDF available

Author(s): V.Priyadharshini, G.Adiline Macriga
Volume: 2
Issue: 7
Year: 2012
Mine Classification with Imbalanced Data PDF available

Author(s): Madhuri Agrawal, Gajendra Singh, Ravindra Kumar Gupta
Volume: 2
Issue: 7
Year: 2012
Automatic Speaker Recognition System PDF available

Author(s): Parul,R. B. Dubey
Volume: 2
Issue: 7
Year: 2012
An efficient Support Vector Clustering with combined core outlier and boundary value for pre-processing of data PDF available

Author(s): Deepak Kumar Vishwakarma, Anurag Jain
Volume: 2
Issue: 7
Year: 2012
Implementation of Plasmonics in VLSI PDF available

Author(s): Shreya Bhattacharya
Volume: 2
Issue: 7
Year: 2012
Particle swarm optimization technique to solve unit commitment problem PDF available

Author(s): P.V. Rama Krishna, G. Poornachandra Rao, Dr Sukhdeo Sao
Volume: 2
Issue: 7
Year: 2012
Driver’s alertness detection for based on eye blink duration via EOG & EEG PDF available

Author(s): Yash S. Desai
Volume: 2
Issue: 7
Year: 2012
Character localization and recognition application for Smartphone PDF available

Author(s): Snehal Charjan, R. V. Mante, P. N. Chatur
Volume: 2
Issue: 7
Year: 2012
Transfer Capability Enhancement of Transmission Line using Static Synchronous Compensator (STATCOM) PDF available

Author(s): Arti Pateriya,Nitin Saxena ,Manoj Tiwari
Volume: 2
Issue: 7
Year: 2012
Vehicle License Plate Recognition Syst PDF available

Author(s): Meenakshi,R. B. Dubey
Volume: 2
Issue: 7
Year: 2012
Result Analysis of Blur and Noise on Image Denoising based on PDE PDF available

Author(s): Meenal Jain , Sumit Sharma, Ravi Mohan Sairam
Volume: 2
Issue: 7
Year: 2012
To Study the Mathematical Analysis for Human area Networking using Finite Element Method PDF available

Author(s): Kakade Priyanka, Khobragade S V
Volume: 2
Issue: 7
Year: 2012
Segmentation of One and Two Hand Gesture Recognition using Key Frame Selection PDF available

Author(s): Ketki P. Kshirsagar
Volume: 2
Issue: 7
Year: 2012
Result Analysis on Content Base Image Retrieval using Combination of Color, Shape and Texture Features PDF available

Author(s): Neha Jain, Sumit Sharma, Ravi Mohan Sairam
Volume: 2
Issue: 7
Year: 2012
A Comprehensive Study in Data Mining Frameworks for Intrusion Detection PDF available

Author(s): R.Venkatesan, R. Ganesan, A. Arul Lawrence Selvakumar
Volume: 2
Issue: 7
Year: 2012
Semantic Web Mining: Benefits, Challenges and Opportunities PDF available

Author(s): Syeda Farha Shazmeen, Etyala Ramyasree
Volume: 2
Issue: 7
Year: 2012
T-Learning: An Interactive Learning Services Framework for Indian Educational Broadcasts PDF available

Author(s): Shubhanshu Gupta, Sayali Godbole, Yogesh Angadi, Sudesh Mudliar
Volume: 2
Issue: 7
Year: 2012
An Evaluation of Two Mammography Segmentation Techniques PDF available

Author(s): Sujata, R. B. Dubey, R. Dhiman, T. J. Singh Chugh
Volume: 2
Issue: 7
Year: 2012
Real Time Scheduling Services for Distributed RT-CORBA Applications PDF available

Author(s): Bineta Tresa Mathew
Volume: 2
Issue: 7
Year: 2012
Baseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline Requirements and Architecture for Cloud Computing ServicesBaseline PDF available

Author(s): Abdur Rahim Choudhary
Volume: 2
Issue: 7
Year: 2012
An Efficient load balancing using Genetic algorithm in Hierarchical structured distributed system PDF available

Author(s): Priyanka Gonnade, Sonali Bodkhe
Volume: 2
Issue: 6
Year: 2012
Analysis of Information Systems Security Issues and Security Techniques PDF available

Author(s): Rakesh Kumar, Dr.Hardeep Singh
Volume: 2
Issue: 6
Year: 2012
Using the concept of Multi-Threaded Programming Preparing the Object Oriented Design Model PDF available

Author(s): Tauseef Ahmad, Tameem Ahmad
Volume: 2
Issue: 6
Year: 2012
Improved Tiled Bitmap Forensic Analysis Algorithm PDF available

Author(s): C. D. Badgujar, G. N. Dhanokar
Volume: 2
Issue: 6
Year: 2012
Real-Time Scheduling for Parallel Task Models on Multi-core Processors - A critical review" PDF available

Author(s): Mahesh Lokhande, Dr. Mohd. Atique
Volume: 2
Issue: 6
Year: 2012
Comparative study of several Clustering Algorithms PDF available

Author(s): Prof. Neha Soni, Dr. Amit Ganatra
Volume: 2
Issue: 6
Year: 2012
Reduction of Negative and Positive Association Rule Mining and Maintain Superiority of Rule Using Modified Genetic Algorithm PDF available

Author(s): Nikhil Jain,Vishal Sharma,Mahesh Malviya
Volume: 2
Issue: 6
Year: 2012
Bit Level Generalized Modified Vernam Cipher Method with Feedback PDF available

Author(s): Prabal Banerjee, Asoke Nath
Volume: 2
Issue: 6
Year: 2012
Air Pollution Monitoring & Tracking System Using Mobile Sensors and Analysis of Data Using Data Mining PDF available

Author(s): Umesh M. Lanjewar, J. J. Shah
Volume: 2
Issue: 6
Year: 2012
Depiction of New Static - Starting and Excitation Systems to start Short Circuit Generators PDF available

Author(s): G.Venkateswarlu, N.R.Mondal, J.R.Gajbhiye, A.K.Khairwar
Volume: 2
Issue: 6
Year: 2012
Fuzzy Based Control Using Lab view For Temperature Process PDF available

Author(s): S.Kavitha, B.Chinthamani, S.Joshibha Ponmalar
Volume: 2
Issue: 6
Year: 2012
Data Preparation for Web Mining – A survey PDF available

Author(s): Amog Rajenderan
Volume: 2
Issue: 6
Year: 2012
Study of an Intelligent Spider Algorithm & Metasearch Engines PDF available

Author(s): Govinda Borse, Ankita Baheti,
Volume: 2
Issue: 6
Year: 2012
Visualization Techniques for Digital forensics: A Survey PDF available

Author(s): Mr.Sushilkumar Chavhan, Ms.S.M.Nirkhi
Volume: 2
Issue: 6
Year: 2012
Computer Aided Design in Digital Human Modeling for Human Computer Interaction in Ergonomic Assessment: A Review PDF available

Author(s): Suman Mukhopadhyay , Sanjib Kumar Das and Tania Chakraborty
Volume: 2
Issue: 6
Year: 2012
Liver Ultrasound Image Analysis using Enhancement Techniques PDF available

Author(s): Smriti Sahu, Maheedhar Dubey, Mohammad Imroze Khan
Volume: 2
Issue: 6
Year: 2012
Softening Misbehaviour of Nodes and Enforcing Cooperation in Mobile Ad Hoc Networks PDF available

Author(s): Atul Kumar Purohit, Mukesh Kumar Baghel and Hitesh Gupta, Parmalik Kumar
Volume: 2
Issue: 6
Year: 2012
A Review of Network Forensics Techniques for the Analysis of Web Based Attack PDF available

Author(s): Mr. Sudhakar Parate, Ms. S. M. Nirkhi
Volume: 2
Issue: 6
Year: 2012
Study of Efficient Utilization of Power using green Computing PDF available

Author(s): Ms .Dheera Jadhwani, Mr.Mayur Agrawal, Mr.Hemant Mande
Volume: 2
Issue: 6
Year: 2012
A Review of the Fatigue Analysis of an Automobile Frames PDF available

Author(s): Jadav Chetan S., Panchal Khushbu C., Patel Fajalhusen*
Volume: 2
Issue: 6
Year: 2012
Intelligent Traffic System for VANET: A Survey PDF available

Author(s): Ganesh S. Khekare, Apeksha V. Sakhare
Volume: 2
Issue: 6
Year: 2012
Securing Storage Data in Cloud Using RC5 Algorithm PDF available

Author(s): Jay Singh, Brajesh Kumar, Asha Khatri
Volume: 2
Issue: 6
Year: 2012
A review of optimization of Automobile structures PDF available

Author(s): Khushbu C. Panchal, Chetan S. Jadav, Hirak Patel
Volume: 2
Issue: 6
Year: 2012
Secure Image Transcoding technique using chaotic key based algorithm PDF available

Author(s): Anoop B N , Sudhish N George , Deepthi P P
Volume: 2
Issue: 6
Year: 2012
A Study of Design and Implementation Techniques of Active Soft Orthotic Ankle Foot PDF available

Author(s): Ganesh K. Yenurkar, Swapnili P. Karmore
Volume: 2
Issue: 6
Year: 2012
Automated Verification of Memory Consistencies of DSM System on Unified Framework PDF available

Author(s): Dr. Pankaj Kumar, Durgesh Kumar
Volume: 2
Issue: 6
Finding Frequent Pattern with Transaction and Occurrences based on Density Minimum Support Distribution PDF available

Author(s): Preeti Khare | Hitesh Gupta
Volume: 2
Issue: 5
Year: 2012
A Review of Multi-Class Classification for Imbalanced Data PDF available

Author(s): Mahendra Sahare | Hitesh Gupta
Volume: 2
Issue: 5
Year: 2012
An Efficient Wavelength variation approach for Bend Sensing in Single mode- Multimode-Single mode Optical Fiber Sensors PDF available

Author(s): Abdul Samee Khan | Prof. Mohd. Sarwar Raeen
Volume: 2
Issue: 5
Year: 2012
Reduction of Noise Image Using LMMSE PDF available

Author(s): Joginder Singh | R. B. Dubey
Volume: 2
Issue: 5
Year: 2012
Analysis and comparison of the 4-PSK and 8-PSK STTC over Rayleigh fading Channels for determining Performance PDF available

Author(s): Pragya Gupta | Uday Pratap Singh | Vineet Richhariya
Volume: 2
Issue: 5
Year: 2012
Secure Query Processing and Routing in Wireless Sensor Networks PDF available

Author(s): R. Jebakumar | P. Vivekanandan
Volume: 2
Issue: 5
Year: 2012
An Optimized Feature Selection for Image Classification Based on SVMACO PDF available

Author(s): Priyanka Dhasal | Shiv Shakti Shrivastava | Hitesh Gupta | Parmalik Kumar
Volume: 2
Issue: 5
Year: 2012
Studies on IPTV over IMS test bed PDF available

Author(s): K. Sundara Raja Raja Perumal | D. Vinayagam | K. Porkamalapathandevi
Volume: 2
Issue: 5
Year: 2012
An Empirical Study on feature selection for Data Classification PDF available

Author(s): S.Rajarajeswari | K.Somasundaram
Volume: 2
Issue: 5
Year: 2012
Transmission of Power to the Island Using HVDC PDF available

Author(s): B. Vijayalakshmi | C. Ram Kumar
Volume: 2
Issue: 5
Year: 2012
Swing Detection Using Onto Tree PDF available

Author(s): Rakesh Pandit | Parag Sohoni | Sachin Patel
Volume: 2
Issue: 5
Year: 2012
Investigation of rerouting system in Optical Network PDF available

Author(s): Sushil Chaturvedi | Manish Shrivastava
Volume: 2
Issue: 5
Year: 2012
Analysis of fault using microcomputer protection by symmetrical component method PDF available

Author(s): Mr. Ashish Choubey | Ms. Latika Pande
Volume: 2
Issue: 5
Year: 2012
Biorthogonal Wavelet Transform Digital Image Watermarking PDF available

Author(s): B. Rajendra Prasad | k.Vinayaka Kota | B. Mysura Reddy
Volume: 2
Issue: 5
Year: 2012
Performance evaluation of cross layer QoS scheduling for Long Term Evolution Network PDF available

Author(s): D. Vinayagam | R. Kurinjimalar | D. Srinivasan
Volume: 2
Issue: 5
Year: 2012
Comparison and Analysis of an efficient Image Compression Technique Based on Discrete 2-D wavelet transforms with Arithmetic Coding PDF available

Author(s): Deepika Sunoriya | Prof. Uday Pratap Singh | Prof. Vineet Ricchariya
Volume: 2
Issue: 5
Year: 2012
Location Privacy Using User Anonymity and Dummy Locations PDF available

Author(s): Prince Kumar Sahu | Saroj Kumar Chandra
Volume: 2
Issue: 5
Year: 2012
A Review of Content Based Image Classification using Machine Learning Approach PDF available

Author(s): Sandeep Kumar | Zeeshan Khan | Anurag jain
Volume: 2
Issue: 5
Year: 2012
Prevention of Cross-Site Scripting Vulnerabilities using Dynamic Hash Generation Technique on the Server Side PDF available

Author(s): Shashank Gupta | Lalitsen Sharma | Manu Gupta | Simi Gupta
Volume: 2
Issue: 5
Year: 2012
Medical Image Protection using steganography by crypto-image as cover image PDF available

Author(s): Vinay Pandey | Manish Shrivastava
Volume: 2
Issue: 5
Year: 2012
Removal of cyclic prefix in Adaptive Non-Contiguous OFDM for Dynamic Spectrum Access using DWT and WT PDF available

Author(s): Saket kumar | Puspraj Tanwar
Volume: 2
Issue: 5
Year: 2012
Design and Experimental Implementation of Bipedal robot PDF available

Author(s): Sreejith C | Sreeshma K
Volume: 2
Issue: 5
Year: 2012
Modeling & Simulation of Multi-Pulse Converters for Harmonic Reduction PDF available

Author(s): Deependra Singh | Prof. Hemant Mahala | Prof. Paramjeet Kaur
Volume: 2
Issue: 5
Year: 2012
Survey paper on different approaches of Threshold Cryptography PDF available

Author(s): Neha Gupta | Dr. Manish Shrivastava | Dr. Aditya Goel
Volume: 2
Issue: 5
Year: 2012
Reduction of Co-Channel Interference in transmit/Receive diversity (TRD) in MIMO System PDF available

Author(s): Manisha Rathore | Puspraj Tanwar
Volume: 2
Issue: 5
Year: 2012
FPGA Based Quadruple Precision Floating Point Arithmetic for Scientific Computations PDF available

Author(s): Mamidi Nagaraju | Geedimatla Shekar
Volume: 2
Issue: 5
Year: 2012
Tag Based Client Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique PDF available

Author(s): Syed Imran Ahmed Qadri, | Prof. Kiran Pandey
Volume: 2
Issue: 5
Year: 2012
BER Analysis of MIMO-OFDM System using BPSK Modulation Scheme PDF available

Author(s): Shruti Trivedi | Mohd. Sarwar Raeen | Shalendra Singh pawar
Volume: 2
Issue: 5
Year: 2012
Java Based Resource Sharing with Secure Transaction in User Cloud Environment PDF available

Author(s): Mr. Sanjay Kumar Brahman | Prof. Brijesh Patel
Volume: 2
Issue: 5
Year: 2012
A Review of Density-Based clustering in Spatial Data PDF available

Author(s): Pragati Shrivastava | Hitesh Gupta
Volume: 2
Issue: 5
Year: 2012
Feature Extraction of Mammograms PDF available

Author(s): Monika Sharma | R. B. Dubey | Sujata | S. K. Gupta
Volume: 2
Issue: 5
Year: 2012
A Study Paper on IDS Attack Classification Using Various Data Mining Techniques PDF available

Author(s): Mrs. Sneha Kumari | Dr. Maneesh Shrivastava
Volume: 2
Issue: 5
Year: 2012
Design Hybrid method for intrusion detection using Ensemble cluster classification and SOM network PDF available

Author(s): Deepak Rathore | Anurag Jain
Volume: 2
Issue: 5
Year: 2012
SVD Detection for Cognitive Radio Network based on Average of Maximum- Minimum of the ICDF PDF available

Author(s): Mohd. Fahad Fahim | Mohd. Sarwar Raeen
Volume: 2
Issue: 5
Year: 2012
A New Classification Approach for PolSAR Images PDF available

Author(s): T. J. Singh Chugh | R. B. Dubey | Sujata
Volume: 2
Issue: 5
Year: 2012
An Approach to Simplify Reversible Logic Circuits PDF available

Author(s): Pabitra Roy | Pabitra Roy | Samar Sensarma
Volume: 2
Issue: 5
Year: 2012
An Comparison and Evaluation for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink PDF available

Author(s): Mr. Ravindra K. Gupta | Mr. Shashank Saxena | Dr. Shailendra Singh | Mr. Gajendra Singh
Volume: 2
Issue: 2
Year: 2012
Cloud Computing Issues-A Survey PDF available

Author(s): M.Malathi
Volume: 2
Issue: 2
Year: 2012
A Study of Various Intrusion Detection Model Based on Data Fusion, Neural Network and D-S Theory PDF available

Author(s): Ramnaresh Sharma | Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012
Web based Measurement System for Solar Radiation PDF available

Author(s): Shachi Awasthi | Dr. P. Mor
Volume: 2
Issue: 2
Year: 2012
Image Compression Technique Based on Discrete 2-D wavelet transforms with Arithmetic Coding PDF available

Author(s): Deepika Sunoriya | Prof. Uday Pratap Singh | Prof. Vineet Ricchariya
Volume: 2
Issue: 2
Year: 2012
Intrusion Awareness Based on Data Fusion and SVM Classification PDF available

Author(s): Ramnaresh Sharma | Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012
Web Usage Data Clustering Using Improved Genetic Fuzzy C-Means Algorithm PDF available

Author(s): Karunesh Gupta | Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012
An Improved Single and Multiple association Approach for Mining Medical Databases PDF available

Author(s): Mr. Sachin sohra | Mr. Narendra Rathod
Volume: 2
Issue: 2
Year: 2012
An Efficient Range Partitioning Method for Finding Frequent Patterns from Huge Database PDF available

Author(s): Ms. Ruchita Gupta | Dr.C.S.Satsangi
Volume: 2
Issue: 2
Year: 2012
Using Local Binary Pattern Variance for Land Classification and Crop Identification PDF available

Author(s): Mr. Ashwin A. Shinde | Dr. Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012
Review of Data Mining Techniques in Cloud Computing Database PDF available

Author(s): Astha Pareek | Dr.Manish Gupta
Volume: 2
Issue: 2
Year: 2012
Application of Value Engineering in Wireless Nano- sensor Network to Monitor Global warming Affected by Uncontrolled Urbanization PDF available

Author(s): Mr. Vimal Upadhyay | Dr. Sonali Agarwal | Dr. R. S. Sikarwar
Volume: 2
Issue: 2
Year: 2012
A Novel Association Rule Mining with IEC Ratio Based Dissolved Gas Analysis for Fault Diagnosis of Power Transformers PDF available

Author(s): Ms. Kanika Shrivastava | Mr. Ashish Choubey
Volume: 2
Issue: 2
Year: 2012
29 A Novel Approach for Identify Small and Capital Handwritten Letter PDF available

Author(s): Ms. Ekta Tiwari | Dr. Maneesh Shreevastava
Volume: 2
Issue: 2
Year: 2012
Finding the Chances and Prediction of Cancer through Apriori Algorithm with Transaction Reduction PDF available

Author(s): Shashank Singh | Manoj Yadav | Hitesh Gupta
Volume: 2
Issue: 2
Year: 2012
Real Time Eye Template Detection and Tracking PDF available

Author(s): Richa Mehta | Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012
Estimating Lower Bound and Upper Bound of a Markov chain over a noisy communication channel with Poisson distribution PDF available

Author(s): Mr. Vinay Mahajan | Prof. Rajesh Nema
Volume: 2
Issue: 2
Year: 2012
A hybrid method for image Denoising based on Wavelet Thresholding and RBF network PDF available

Author(s): Sandeep dubey | Fehreen hasan | Gaurav Shrivastava
Volume: 2
Issue: 2
Year: 2012
Congestions control through cloud computing with MANET PDF available

Author(s): Mr. Ajey Singh | Dr. Maneesh shrivastava
Volume: 2
Issue: 2
Year: 2012
Web Usage Mining Clustering Using Hybrid FCM with GA PDF available

Author(s): Karunesh Gupta | Manish Shrivastava
Volume: 2
Issue: 2
Year: 2012
Document Fraud Detection with the help of Data Mining and Secure Substitution Method with Frequency Analysis PDF available

Author(s): Ms.Namrata Shukla | Ms. Shweta Pandey
Volume: 2
Issue: 2
Year: 2012
A Novel Approach for Improving Communication by Wavelength Utilizati PDF available

Author(s): Mr. Shrangesh Dahat | Dr. Maneesh Shreevastava
Volume: 2
Issue: 2
Year: 2012
A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API PDF available

Author(s): Ms. Shikha Joshi | Ms. Pallavi Jain
Volume: 2
Issue: 2
Year: 2012
A Novel Technique to Read Small and Capital Handwritten Character PDF available

Author(s): Ms. Ekta Tiwari | Dr. Maneesh Shreevastava
Volume: 2
Issue: 2
Year: 2012
A Wireless Sensor Network in Vibration Monitoring of Equipments PDF available

Author(s): Mr. Vimal Upadhyay | Dr. R. S. Sikarwar | Shuchi Sharma | Shivalika Singh
Volume: 1
Issue: 2
Year: 2011
Cloud Computing Utility and Applications PDF available

Author(s): Mr. Pradeep Kumar Tiwari | Mr. Rajesh Kumar Shrivastava | Mr. Satish Pandey | Mr. Pradeep | Kumar Tripathi
Volume: 1
Issue: 2
Year: 2011
Generation of Multiresonator Based RFID System with Accurate Attenuation and Fill until Complete Mechanism (AAFCM) PDF available

Author(s): Ms. Shazia Shireen | Prof. Rajesh Nema | Prof. Puran Gour
Volume: 1
Issue: 2
Year: 2011
A Practical approach for fault component network for Current and Voltage Phasor Diagram in Power Electronic Environment PDF available

Author(s): Mr. Ashish Choubey | Ms. Latika Pande
Volume: 1
Issue: 2
Year: 2011
Improving Performance of Wi-Fi by Compact MIMO Systems by using Gama Frequency-Selective Fading Channels PDF available

Author(s): Mr. Sudesh Gupta | Prof. Rajesh Nema | Prof. Puran Gour
Volume: 1
Issue: 2
Year: 2011
Result Analysis and Benefits of Detecting Replicate Documents Using MD5 Hash Function PDF available

Author(s): Mr. Pushpendra Singh Tomar | Dr. Maneesh Shreevastava
Volume: 1
Issue: 2
Year: 2011
Artificial Neural Network Based Approach for short load forecasting PDF available

Author(s): Mr. Rajesh Deshmukh | Dr. Amita Mahor
Volume: 1
Issue: 2
Year: 2011
Recovery of Alum Coagulant from Water Treatment Plant Sludge: A Greener Approach for Water Purification PDF available

Author(s): Ms. Smita Joshi | Ms. Kriti Shrivastava
Volume: 1
Issue: 2
Year: 2011
Comparisons of Short Term Load Forecasting using Artificial Neural Network and Regression Method PDF available

Author(s): Mr. Rajesh Deshmukh | Dr. Amita Mahor
Volume: 1
Issue: 2
Year: 2011
Comparative study of space time trellis code using two transmitter and various receiver anteena using rayleigh fading scenario PDF available

Author(s): Mr. Sujeet Singh Bhadouria | Dr. Manish Shrivastava | Miss Kavita Deshmukh
Volume: 1
Issue: 2
Year: 2011
Applying Frequent Pattern Mining in Cloud Computing Environment PDF available

Author(s): Mr. Dheresh Soni | Mr. Atish Mishra | Mr. Satyendra Singh Thakur | Mr. Nishant Chaurasia
Volume: 1
Issue: 2
Year: 2011
Web Log Mining using Improved Version of Proposed Algorithm PDF available

Author(s): Dr. Manish Shrivastava | Mr. Kapil Sharma | MR. Angad Singh
Volume: 1
Issue: 2
Year: 2011
Advanced Instrumentation PDF available

Author(s): Mr. Yogendra Dubey | Ms. Madhurima Bose | Mr. Priyesh Jiaswal
Volume: 1
Issue: 2
Year: 2011
A Novel Reconfigurable Character based Token Set Pruner (RCBTSP) for Heterogeneous Environment PDF available

Author(s): Reeta Budhani | Dalima Parwani | Meenu Tahilyani | Subuhi Kashif Ansari
Volume: 1
Issue: 2
Year: 2011
A Novel Java Based Computation and Comparison Method (JBCCM) for Differentiating Object Oriented Paradigm Using Coupling Measures PDF available

Author(s): Sandeep Singh | Geetika S.pandey | Dr.Yogendra Kumar Jain
Volume: 1
Issue: 2
Year: 2011
Cloud Computing Services Accounting PDF available

Author(s): Igor Ruiz-Agundez | Yoseba K. Penya | Pablo G. Bringas
Volume: 2
Issue: 2
Year: 2012
Performance Analysis of Image Classification Algorithm Based on Feature Fusing Technique Model PDF available

Author(s): Mukul Yadav | Gaje ndra Singh Chandel | Ravindra Gupta
Volume: 3
Issue: 10
Year: 2013
An Efficient Algorithm for Calculating Maximum Bipartite matching in a Graph PDF available

Author(s): Neha Bo ra | Swati Arora | Nitin Arora
Volume: 3
Issue: 10
Year: 2013
Performance of coop MAC P rotocols over C SMA/CA 802.11 protocols PDF available

Author(s): H.Srikanth.Kamath
Volume: 3
Issue: 10
Year: 2013
Data Authentication Using Cryptography PDF available

Author(s): Sagar Chouksey | Rashi Agrawal | Dushyant Verma | Tarun Metta
Volume: 3
Issue: 10
Year: 2013
An efficient Synchronization Aspects in Cognitive Radio Systems PDF available

Author(s): Dhawal Beohar | V.B . Baru
Volume: 3
Issue: 10
Year: 2013
Video Object Tracking based on Automatic Background Segmentation and updating using RBF neural network PDF available

Author(s): Pushpender Prasad Chaturvedi | Amit Singh Rajput | Aabha Jain
Volume: 3
Issue: 10
Year: 2013
Monitoring Greenhouse using Wireless Sensor Network PDF available

Author(s): Rohit.K.Nikhade | S.L.Nalbalwar
Volume: 3
Issue: 10
Year: 2013
Implementation of FFT by using MATLAB: SIMULINK on Xilinx Virtex - 4 FPGAs: Performance of a Paired Transform Based FFT PDF available

Author(s): Ranganadh Narayanam | Artyom M. Grigoryan | Bindu Tushara D
Volume: 3
Issue: 10
Year: 2013
Behaviour of OFDM System u sing MATLAB Simulation PDF available

Author(s): S.S.Ghorpade | S.V.Sankpal
Volume: 3
Issue: 10
Year: 2013
A Study of Video Object Tracking based on Automatic Background Segmentation and updating using Different Technique PDF available

Author(s): Pushpender Prasad Chaturvedi | Amit Singh Rajput | Aabha Jain
Volume: 3
Issue: 10
Year: 2013
An Auto ranging Data Converter Implementation in FPGA PDF available

Author(s): Jithin Krishnan | Sreekumari B | Jiju K
Volume: 3
Issue: 10
Year: 2013
Implementation of 64-Point Reconfigurable FFT Processor for ASIP Architecture PDF available

Author(s): B.S.Mahant | L.P.Thakare
Volume: 3
Issue: 10
Year: 2013
Angular Skew Correction Al g o rithm for Handwritten Hindi Text PDF available

Author(s): Rohit Sharma | Utkarsh Mathur | Naveen Srivastava
Volume: 3
Issue: 10
Year: 2013
Apriori and Ant Colony Optimization of Association Rules PDF available

Author(s): Anshuman Singh Sadh | Nitin Shukla
Volume: 3
Issue: 10
Year: 2013
Classification of Cancer Gene Selection Using Random Forest and Neural Network Based Ensemble Classifier PDF available

Author(s): Jogendra Kushwah | Divakar Singh
Volume: 3
Issue: 10
Year: 2013
Cross Layer Energy Conservation in Routing Protocol for MANET PDF available

Author(s): Pandit Savyasaachi J | Shah Niyati
Volume: 3
Issue: 10
Year: 2013
Comparative Result Analysis of Novel Algorithm based on RBF Network for Image Enhancement PDF available

Author(s): Shobhit Verma | Hitesh Gupta
Volume: 3
Issue: 10
Year: 2013
OFDM Channel Estimation using a MMSE Estimator of a Comb - type System PDF available

Author(s): Sonali .D.Sahu | A.B.Nandgaonkar
Volume: 3
Issue: 10
Year: 2013
Content Sniffing Attack Detection in Client and Server Side: A Survey PDF available

Author(s): Bhupendra Singh Thakur | S apna Chaudhary
Volume: 3
Issue: 10
Year: 2013
A Distributed DB Architecture for Processing cPIR Queries PDF available

Author(s): Sultan.M | Karthi.M | ManikandaPrabhu.M | Muruganandham.N | Tashelat Masleena.S
Volume: 3
Issue: 10
Year: 2013
A survey of Performance Analysis in MIMO - OFDM Systems PDF available

Author(s): J itendra K umar D aksh | Ravi Mohan | Sumit Sharma
Volume: 3
Issue: 10
Year: 2013
Energy Efficient Routing Protocol for Wireless Sensor Networks PDF available

Author(s): H.Srikanth.Kamath
Volume: 3
Issue: 10
Year: 2013
Performance Analysis with Space - time coding in MIMO - OFDM Systems with Multiple Antennas PDF available

Author(s): itendra K umar D aksh | Ravi Mohan | Sumit Sharma
Volume: 3
Issue: 10
Year: 2013
An Efficient Algorithm for Auto Upload and Chi - Square Test on Application Software PDF available

Author(s): Sampada Kembhavi | Ravindra Gupta | Gajendra Singh
Volume: 3
Issue: 10
Year: 2013
Harmonics Mitigation Using Active Power Filter PDF available

Author(s): Sourabh Gupta | Preeti Gupta
Volume: 3
Issue: 10
Year: 2013
Topology control in MANET for efficient energy conservation PDF available

Author(s): Krushna J. Pandit | Shah Niyati
Volume: 3
Issue: 10
Year: 2013
Reduction of Data Sparsity in Collaborative Filtering based on Fuzzy Inference Rules PDF available

Author(s): A tisha Sachan | Vineet Richhariya
Volume: 3
Issue: 10
Year: 2013
Triangulated Irregular Network Model from Mass Points PDF available

Author(s): Neeraj Bhargava | Ritu Bhargava | Prakash Singh Tanwar
Volume: 3
Issue: 10
Year: 2013
Implementation of Co-Operative Communication Protocol PDF available

Author(s): H.Srikanth.Kamath
Volume: 3
Issue: 10
Year: 2013
Performance Analysis of Generalized MC DS-CDMA System PDF available

Author(s): Rishi Choubey | Ravi Mohan | Sumit Sharma
Volume: 3
Issue: 10
Year: 2013
Improved registration system of Cloudtarun over Android Devices PDF available

Author(s): Tarun Goyal | Aakanksha Agrawal | Somil Jain | Vaibhav Doshi
Volume: 3
Issue: 10
Year: 2013
Design of Intrusion Detection Model Based on FP-Growth and Dynamic Rule Generation with Clustering PDF available

Author(s): Manish Somani | Roshni Dubey
Volume: 3
Issue: 10
Year: 2013
Personal Identification with F ace Bio metrics using Co lor Local Texture Features PDF available

Author(s): Vani A.Hiremani | Sanjeevakumar | M.Hatture
Volume: 3
Issue: 10
Year: 2013
Review of various Techniques in Clustering PDF available

Author(s): Megha Gupta | Vishal Shrivast a va
Volume: 3
Issue: 10
Year: 2013
A survey of BER Performance of Generalized MC DS - CDMA System PDF available

Author(s): Rishi Choubey | Ravi Mohan | Sumit Sharma
Volume: 3
Issue: 10
Year: 2013
The Study of Detecting Replicate Documents Using MD5 Hash Functio PDF available

Author(s): Mr. Pushpendra Singh Tomar | Dr. Maneesh Shreevastava
Volume: 1
Issue: 1
Year: 2011
Secure Three Prime RSA from Hardware Fault Attack PDF available

Author(s): Mr. Ravi Rai Chaudhary | Prof. Deepali Kelkar | Mr. Vikas Arya
Volume: 1
Issue: 1
Year: 2011
A Novel Data Gathering Protocol with Node Detection and Sharing (DGPNDS) in Mobile-Sink Based Java Environment PDF available

Author(s): Mr. Yogesh Rai | Prof. Vineet Richhariya | Prof. Vivek Richhariya
Volume: 1
Issue: 1
Year: 2011
Biometrics-A Way of Brain Fingerprinting PDF available

Author(s): Ms. Ruby Tiwari | Mr. Yogendra Dubey | Ms. Madhurima Bose
Volume: 1
Issue: 1
Year: 2011
An Object Oriented Record Management System (OORMS) for M-Commerce System Based on J2ME Wireless Tool Kit PDF available

Author(s): Mr. Santosh Kushwaha | Prof. Shiv Kumar | Prof. Neetesh Gupta
Volume: 1
Issue: 1
Year: 2011
Analysis of Function generation on the basis of Object Oriented paradigm PDF available

Author(s): Mr. Kamlesh Gujar | Prof. Surendra Mishra | Mr. Pankaj Kawadkar
Volume: 1
Issue: 1
Year: 2011
Cloud Aggregation and Bursting for Object Based Sharable Environment PDF available

Author(s): Mr. Pradeep Kumar Tripathi | Prof. Surendra Mishra | Mr. Pankaj Kawadkar
Volume: 1
Issue: 1
Year: 2011
Dynamic Dropped packet regulation of contention window for enhancement of IEEE_802.11e PDF available

Author(s): Mr. Nakul Vyas | Prof. Ashutosh Kumar Dubey | Prof. Yogeshver Khandagre
Volume: 1
Issue: 1
Year: 2011
Object Oriented Mutation Applied in Java Application programming Interface and C++ Classes PDF available

Author(s): Mr. Titu Singh Arora | Prof. Ravindra Gupta
Volume: 1
Issue: 1
Year: 2011
Impact of Cloud Computing Platform Based on Several Software Engineering Paradigm PDF available

Author(s): Ms. Monika Kherajani | Mr. Ajit Shrivastava
Volume: 1
Issue: 1
Year: 2011
Analytical Approach for Analyzing Trusted Security System for Data Sharing in Cloud Environment PDF available

Author(s): Mr. Anand Srivastava | Prof. Surendra Mishra | Mr. Pankaj Kawadkar
Volume: 1
Issue: 1
Year: 2011
A Novel Cloud Computing Mapping and Management through Class and Object Hierarchy (CCMMCOH) PDF available

Author(s): Mr. Naveen Gurjar | Prof. Ravindra Gupta
Volume: 1
Issue: 1
Year: 2011
Comprehensive Analysis with KVM Techniques and Implementation Of Object Pool Based On J2ME RMS PDF available

Author(s): Ms. Nandika Sood | Mr. Amit Sinhal
Volume: 1
Issue: 1
Year: 2011
Performance of Turbo Code for UMTS in AWGN channel PDF available

Author(s): Ms. Bhavana Shrivastava | Mr. Yudhishthir Raut | Dr. Ravi Shankar Mishra
Volume: 1
Issue: 1
Multi-Input Multi-Output Fading Channel Equalization with Constellation Selection and Space-Time Precoders PDF available

Author(s): Ms. Ankita Shukla | Prof. Abhishek Choubey
Volume: 1
Issue: 1
Exploiting need of Service-Oriented Framework for Executing Data Mining Services PDF available

Author(s): Ms. Sonali Jain | Mr. Niket Bhargava
Volume: 1
Issue: 1
Year: 2011
A Novel Open Service Framework Mining (OSFM) For Executing Data Mining tasks PDF available

Author(s): Mr. Asif Ali | Prof. Gajendra Chandel
Volume: 1
Issue: 1
An Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Real Environment

Author(s): Mr. Pritesh Jain | Vaishali Chourey | Prof. Dheeraj Rane
Volume: 1
Issue: 1
Year: 2011
Performance Analysis and Simulation Result of MC-CDMA for AWGN Channel and Raleigh Based on SNR/BER PDF available

Author(s): Mr. Vikas Gupta | Ms. Ruby Tiwari
Volume: 1
Issue: 1
Year: 2011
A Modern Non Candidate Approach for sequential pattern mining with Dynamic Minimum Support PDF available

Author(s): Ms. Kumudbala Saxena | Dr. C.S. Satsangi
Volume: 1
Issue: 1
Year: 2011
Uses of ICT in Agriculture PDF available

Author(s): Manish Mahant | Abhishek Shukla | Sunil Dixit | Dileshwer Patel
Volume: 2
Issue: 1
Year: 2012
Overview of Security issues in Cloud Computing PDF available

Author(s): Mr. Ajey Singh | Dr. Maneesh Shrivastava
Volume: 2
Issue: 1
Year: 2012
Comparative Study between Traditional and Heuristic Approach on Close-degree Concept Lattice for better Attribute Reduction PDF available

Author(s): Mr. Ravindra k. Gupta | Ms. Sapna Sahu | Dr. Shailendra Singh
Volume: 2
Issue: 1
Year: 2012
A Profound Survey on Swarm Intelligence PDF available

Author(s): Manish Mahant | Bharat Choudhary | Abhishek Kesharwani | Kalyani Singh Rathore
Volume: 2
Issue: 1
Year: 2012
Investigation on TCP/IP Congestion Control in Optical Burst Switched (OBS) Network PDF available

Author(s): Ms. Payal Daryani | Prof. Sanjay Sharma
Volume: 2
Issue: 1
Year: 2012
Performance of ANN using Back Propagation Algorithm for Medical Diagnosis System PDF available

Author(s): Arti Gupta | Dr. Manish Shrivastava
Volume: 2
Issue: 1
Year: 2012
Recent Research and Comparison of QoS Routing Algorithms for MPLS Networks PDF available

Author(s): Dr. Santosh Kulkarni | Mrs. Reema Sharma
Volume: 2
Issue: 1
Year: 2012
Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol) PDF available

Author(s): Ranbir Sinha | Nishant Behar | Devendra Singh
Volume: 2
Issue: 1
Year: 2012
A Reducing Data Traffic and Enhancing Data Availability to Deliver Packet in Mobile Ad-Hoc Network PDF available

Author(s): 1Prashant Shrivastava | Dr. Manish Shrivastava | Kavita Deshmukh
Volume: 2
Issue: 1
Year: 2012
Authentication of Primary User in Cognitive Radio PDF available

Author(s): Mr. Sudesh Gupta | Prof. Rajesh Nema | Prof. Puran Gour
Volume: 2
Issue: 1
Year: 2012
Performance Improvement of TCP by TCP Reno and SACK Acknowledgement PDF available

Author(s): Mrs. Reena Rai | Dr. Maneesh Shreevastava
Volume: 2
Issue: 1
Year: 2012
Future of Cloud Computing in India PDF available

Author(s): Pradeep Kumar Tiwari
Volume: 2
Issue: 1
Year: 2012
Exploring Quantum Dot Cellular Automata Based Reversible Circuit PDF available

Author(s): Saroj Kumar Chandra | Deepak Kant Netam
Volume: 2
Issue: 1
Year: 2012
Email Spam Filter using Bayesian Neural Networks PDF available

Author(s): Nibedita Chakraborty | Anjani Patel
Volume: 2
Issue: 1
Year: 2012
Identification of current attacks and their counter measures in Optical Burst Switched (OBS) network PDF available

Author(s): Siddharth Singh Chouhan | Prof. Sanjay Sharma
Volume: 2
Issue: 1
Year: 2012
The Efficient SVM Kernel Method for Image Compression and Image Recognition PDF available

Author(s): A.Athiraja | A.Baranidharan | S.Vignesh Manickam
Volume: 2
Issue: 1
Year: 2012
Examining of Blocking Probability Computation in Optical Network PDF available

Author(s): Mr.Anurag Anant Mishra | Prof. Sanjay Sharma
Volume: 2
Issue: 1
Year: 2012
An Analytical Approach for Optimal Clustering Architecture for Maximizing Lifetime in Large Scale Wireless Sensor Networks PDF available

Author(s): Mr. Yogesh Rai | Prof. Vineet Richhariya
Volume: 1
Issue: 1
Year: 2011
A Novel Class, Object and Inheritance based Coupling Measure (COICM) to Find Better OOP Paradigm using JAVA PDF available

Author(s): Mr. Narendra Pal Singh Rathore | Prof. Ravindra Gupta
Volume: 1
Issue: 1
Year: 2011
Save time & money - Smart Internet Solutions      Why do you need a reservation system?