Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computers & Technology

ISSN: 2277--3061
Publisher: Council for Innovative Research


ADD TO MY LIST
 
A STUDY BASIC PROGRAMMABLE LOGIC CONTROLLER (PLC) FOR EFFECTIVE LEARNING

Author(s): Syifaul Fuada | Miftakhul Huda | Rista Aprilowena
Volume: 3
Issue: 3
Year: 2012
Steganography: Securing Message in wireless network

Author(s): A H M Kamal
Volume: 4
Issue: 3
Year: 2013
Implementing Clustering Based Approach for Evaluation of Success of Software Reuse using K-means algorithm

Author(s): Jagmeet Kaur | Dr. Dheerendra Singh
Volume: 4
Issue: 3
Year: 2013
Dispersion Compensation In Optical Communication - A Review.

Author(s): Er. Abhishek Sharma | Er. Sukhbir Singh | Er. Bhubneshwar Sharma
Volume: 4
Issue: 3
Year: 2013
Fuzzy-based Leader Selection for Topology Controlled PEGASIS Protocol for Lifetime Enhancement in Wireless Sensor Network

Author(s): Vibha Nehra | Raju Pal | Ajay K Sharma
Volume: 4
Issue: 3
Year: 2013
STUDENTS LEARNING PATHS AS ‘DYNAMIC ENCEPHALOGRAPHS’ OF THEIR COGNITIVE DEVELOPMENT

Author(s): Stavroula Patsiomitou
Volume: 4
Issue: 3
Year: 2013
SW-SDF based privacy preserving data classification

Author(s): Kiran P | Kavya N. P.
Volume: 4
Issue: 3
Year: 2013
Fault Tolerant Heterogeneous Limited Duplication Scheduling algorithm for Decentralized Grid

Author(s): DR. NITIN | Neha Agarwal | Piyush Chauhan
Volume: 4
Issue: 3
Year: 2013
A Study of Distance Metrics in Histogram Based Image Retrieval

Author(s): Abhijeet Kumar Sinha | K.K. Shukla
Volume: 4
Issue: 3
Year: 2013
Comparative Study of Different Image Enhancement Techniques

Author(s): Saruchi Garg | Madan Lal
Volume: 2
Issue: 3
Year: 2012
Identifying Network Anomalies Using Clustering Technique in Weblog Data

Author(s): Kiran Kumar bejjanki | A. Bhaskar
Volume: 2
Issue: 3
Year: 2012
Database Services for Cloud Computing – An Overview

Author(s): Malliga P
Volume: 2
Issue: 3
Year: 2012
DO WE REALLY NEED COMPUTERS IN CLASSROOM INSTRUCTIONS

Author(s): Harpreet Kaur
Volume: 2
Issue: 3
Year: 2012
A Novel SLM based PAPR reduction Technique in OFDM-MIMO System.

Author(s): Er. Sukhjinder Singh | Er. Jagjit Malhotra | Er. Manwinder Singh
Volume: 2
Issue: 3
Year: 2012
USING MIXED METHOD APPROACH TO UNDERSTAND ACCEPTANCE AND USAGE OF ICT IN NIGERIAN PUBLIC UNIVERSITY

Author(s): Oye Nathaniel David | A. Iahad N. | Ab. Rahim N.
Volume: 2
Issue: 3
Year: 2012
NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS

Author(s): Harpreet Kaur
Volume: 2
Issue: 3
Year: 2012
IMPLEMENTING A NEW ALGORITHM FOR ANALYSIS OF PROTOCOL EFFICIENCY USING STABILITY AND DELAY TRADEOFF IN MANET

Author(s): Shiva Shankar | Dr. B. Sivakumar | Dr. G. Varaprasad
Volume: 2
Issue: 3
Year: 2012
Evaluation by Implementation of the Policy-based Network Management System Called DACS System

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii
Volume: 2
Issue: 3
Year: 2012
Opinion Mining and Sentiment Analysis: A Survey

Author(s): Mohammad Sadegh Hajmohammadi | Roliana Ibrahim | Zulaiha Ali Othman
Volume: 2
Issue: 3
Year: 2012
Implementation of Colored CAPTCHA

Author(s): Mandeep Kumar | Dr. Renu Dhir
Volume: 2
Issue: 3
Year: 2012
Path Mechanism to reduce packet data loss in Wireless Mesh Networks

Author(s): Rajinder Singh | Er. Nidhi Bhalla
Volume: 2
Issue: 3
Year: 2012
Overcoming the limitations of PDB format

Author(s): Shifali Mehta | Amardeep Singh
Volume: 2
Issue: 3
Year: 2012
A Context Model for Focused Web Search

Author(s): Sushil Kumar | Naresh Chauhan
Volume: 2
Issue: 3
Year: 2012
Reduction of Transmission Losses based on Optimal Power Flow using Genetic Algorithm

Author(s): Jinendra Rahul | Yagvalkya Sharma | Dinesh Birla
Volume: 2
Issue: 3
Year: 2012
Low Power/ High Speed Design in VLSI with the application of Pipelining and Parallel processing

Author(s): Shilpa Sathish | C. Lakshminarayana
Volume: 2
Issue: 3
Year: 2012
WATERMARKING TECHNIQUES

Author(s): Man Kan Dan | Dr. T. Meyappan
Volume: 2
Issue: 3
Year: 2012
SR-AODV: A Stable Route-AODV Protocol for Mobile Ad hoc Network

Author(s): Pratima Gupta | Dr. Rakesh Kumar
Volume: 2
Issue: 3
Year: 2012
Performance quantification of Wireless Sensor Networks by implementing ZRP

Author(s): Barjinder Singh | Rishma Chawla | Suminder Kaur
Volume: 2
Issue: 3
Year: 2012
Cloud Computing: An Internet Based Computing

Author(s): Hardeep Singh
Volume: 2
Issue: 3
Year: 2012
Stability Aware Routing in Mobile Ad-Hoc Networks using multiple Route

Author(s): Aniket mathuriya | Lovedeep Grover | Pushpraj Pal
Volume: 2
Issue: 3
Year: 2012
Enhance Location Based Power Aware Routing Protocol in Ad-Hoc Network

Author(s): Lal Pratap Verma | Aniket Mathuriya | Rajneesh Manwall
Volume: 2
Issue: 3
Year: 2012
A Novel Approach of Stability Awareness Routing in MANETs

Author(s): Lovedeep Grover | Maninder Kaur | Lal Pratap Verma
Volume: 2
Issue: 3
Year: 2012
OPPORTUNISTIC APPROACH TO EXPLOIT WIRELESS SPECTRUM BY USE OF COGNITIVE RADIO

Author(s): Tanu Preet Singh Preet | Prof. R.K Singh | Jaspreet Kaur | Vishal Sharma
Volume: 2
Issue: 3
Year: 2012
AN APPROACH TO GENERATE MST WITHOUT CHECKING CYCLE

Author(s): Sharadindu Roy | Prof. Samar Sen Sarma
Volume: 4
Issue: 2
Year: 2013
A View of Cloud Computing

Author(s): Bhagwan Singh | Sumeet Dhawan | Anish Arora | Abhishek Patail
Volume: 4
Issue: 2
Year: 2013
A Statistical Analysis of Bhairav-The first morning Raga

Author(s): Soubhik Chakraborty | Swarima Tewari
Volume: 4
Issue: 2
Year: 2013
RELATIVE STUDY OF SOLVERS FOR FINITE ELEMENT ANALYSIS

Author(s): Harpal Singh
Volume: 4
Issue: 2
Year: 2013
A Soft- Computing Approach for Multi Criteria Project Selection Problem with Grey Number

Author(s): TULI BAKSHI | BIJAN SARKAR | SUBIR KUMAR SANYAL
Volume: 4
Issue: 2
Year: 2013
Web Client and Web Server approaches to Prevent XSS Attacks

Author(s): Jyoti Snehi | Dr. Renu Dhir
Volume: 4
Issue: 2
Year: 2013
A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY

Author(s): Bohar Singh | Mandeep Kaur | Chetan Batra
Volume: 4
Issue: 2
Year: 2013
Evaluating the Effectiveness of Self and Peer Assessment using PBL on Student Performance and Preference: Malaysian’s Experience

Author(s): CHE KU NURAINI CHE KU MOHD | Faaizah Shahbodin
Volume: 4
Issue: 2
Year: 2013
DESIGN OF CMOS LOW DROP-OUT REGULATORS: A COMPARATIVE STUDY

Author(s): Ashvani Kumar Mishra | Rishikesh Pandey
Volume: 4
Issue: 2
Year: 2013
Conceptual Overlapping Clustering for Effective Selection of Parental Rice Varieties

Author(s): Madhavi Dabbiru | Shashi Mogalla | PRM Rao
Volume: 4
Issue: 2
Year: 2013
Change Detection on SAR data using PCA Algorithm

Author(s): Saurabh Srivastava | Vijay Kumar | Rahul Gupta | Supreet Kaur
Volume: 4
Issue: 2
Year: 2013
Business Intelligence framework to support Chronic Liver Disease Treatment

Author(s): Ayman Khedr
Volume: 4
Issue: 2
Year: 2013
Realization of different diversity technique for mimo based mobile ad-hoc network using space time block codes

Author(s): Swati Chowdhuri | Nilanjan Byabartal | Dr. S.S. Choudhury | Dr. P.K. Banerjee
Volume: 4
Issue: 2
Year: 2013
Maximizing Network Lifetime Operator for Wireless Sensor Networks

Author(s): Dr. Deepali Virmani
Volume: 4
Issue: 2
Year: 2013
Given a raga recording, can we scientifically verify which school of Vadi-Samvadi selection is supported by the artist?

Author(s): Soubhik Chakraborty | Rayalla Ranganayakulu | Shivee Chauhan | Sandeep Singh Solanki | Kartik Mahto
Volume: 4
Issue: 2
Year: 2013
Round-Robin Data Center Selection in Single Region for Service Proximity Service Broker in CloudAnalyst

Author(s): Vaishali Sharma | Dr. Rakesh Rathi | Sumit Kumar Bola
Volume: 4
Issue: 2
Year: 2013
HIGH SPEED CARRY SAVE MULTIPLIER BASED LINEAR CONVOLUTION USING VEDIC MATHAMATICS

Author(s): Bharathi Reddy | D. Leela Rani | Prof. S. Varadarajan
Volume: 4
Issue: 2
Year: 2013
IDARP: ID-based Address Resolution Protocol

Author(s): Imtiyaz Ahmad Lone | Jahangeer Ali | Kalimullah Lone
Volume: 4
Issue: 2
Year: 2013
Major Energy Efficient Routing Schemes in Wireless Sensor Networks: Survey and Idea

Author(s): Jahangeer Ali | Gulshan Kumar | Dr. Mritunjay Kumar Rai
Volume: 4
Issue: 2
Year: 2013
OPEN SOURCE SIMULATOR FOR NETWORK ON CHIP

Author(s): Monika Gupta | S. R. Biradar | B. P. Singh
Volume: 4
Issue: 2
Year: 2013
Survey on Decision Tree Classification algorithms for the Evaluation of Student Performance

Author(s): Anju Rathee | Robin Prakash Mathur
Volume: 4
Issue: 2
Year: 2013
Enhanced discussion on different techniques of spam detection

Author(s): Gurmeet Maan | Gaurav Tak
Volume: 4
Issue: 2
Year: 2013
Arabic Race Classification of Face Images

Author(s): Ahmad Awwad | Ashraf Ahmad | Walid a. Salameh
Volume: 4
Issue: 2
Year: 2013
Electronic Student Attendance Recording System

Author(s): Dr. AkramAbedelKarim Ahmad AbdelQader | Dr. Mohammed Abbas Fadhil Al-Husainy
Volume: 4
Issue: 2
Year: 2013
Bacterial Cell Growth Analysis and Cell Division Time Determination using Fuzzy Inference System

Author(s): Parashuram B Bannigidad | P.S. Hiremath
Volume: 4
Issue: 2
Year: 2013
Enhanced System to Secure Summative E-Assessment

Author(s): Hiba AL Husseiny | Ashraf Qaddoumi | Walid Salameh
Volume: 4
Issue: 2
Year: 2013
RSFTS: RULE-BASED SEMANTIC FAULT TOLERANT SCHEDULING FOR CLOUD ENVIRONMENT

Author(s): Pandeeswari R | Mohamadi Begum. Y
Volume: 4
Issue: 2
Year: 2013
A framework for a multi-tier Internet Service architecture for doctors’ directory

Author(s): B. O. Oguntunde | M. O. Odim
Volume: 4
Issue: 2
Year: 2013
A Methodology for Enhancing Template Extraction accuracy Of Heterogeneous Web Pages

Author(s): Vidya Kadam | Prof. Prakash R. Devale
Volume: 4
Issue: 2
Year: 2013
Feature Level Fusion of Multimodal Biometrics for Personal Authentication: A Review

Author(s): Dapinder kaur | Gaganpreet Kaur
Volume: 4
Issue: 2
Year: 2013
Incremental Frequent Pattern Mining using Graph based approach

Author(s): Sanjay Patel | Dr. Ketan Kotecha
Volume: 4
Issue: 2
Year: 2013
Fuzzy Weighted Ordered Weighted Average-Gaussian Mixture Model for Feature Reduction

Author(s): Charles. S | Dr. L. Arockiam
Volume: 4
Issue: 2
Year: 2013
Analysis of Load Balancing Techniques in Cloud Computing

Author(s): Amandeep Sidhu | Supriya Kinger
Volume: 4
Issue: 2
Year: 2013
HEAP: Hybrid Energy-efficient Aggregation Protocol for Large Scale Wireless Sensor Networks

Author(s): Santhosh Simon | K Paulose Jacob
Volume: 4
Issue: 2
Year: 2013
Online Signature Verification: State of the art

Author(s): Ibrahim El-Henawy | Magdy Rashad | Omima Nomir | Kareem Ahmed
Volume: 4
Issue: 2
Year: 2013
ANALYSIS AND COMPARISION OF SRG AND DFIG FOR WIND GENERATION APPLICATION

Author(s): Dr. N. C. Lenin | K. Prathap
Volume: 4
Issue: 2
Year: 2013
Evaluation of Operation of Lake Tana Reservoir Future Water Use under Emerging Scenario with and without climate Change Impacts, Upper Blue Nile

Author(s): Getachew Tegegne | Dr. Ing. Dereje Hailu | Prof. Dr. S. Moses Aranganathan
Volume: 4
Issue: 2
Year: 2013
Analysing The Quality Attributes of AOP using CYVIS Tool

Author(s): Hinam Garg | Mohit Garg
Volume: 4
Issue: 2
Year: 2013
Hybrid ANFIS Controller for 6-DOF Manipulator with 3D Model

Author(s): Yousif Al Mashhadany
Volume: 4
Issue: 2
Year: 2013
Comparative Study of Web application under Data Reverse Engineering

Author(s): Pooja Bakshi | Dr. Dheerendra Singh
Volume: 4
Issue: 2
Year: 2013
Cloud Computing Issues

Author(s): Rini Mahajan | Dr. Dheerendra Singh
Volume: 4
Issue: 2
Year: 2013
Energy Efficient Wireless Sensor Network Protocols for Node Cluster Analysis

Author(s): Harkeerat kaur | Himanshu Sharma
Volume: 4
Issue: 2
Year: 2013
Segmentation of Palmprint into Region of Interest (ROI): A Survey

Author(s): Sneha M. Ramteke | Prof. S. S. Hatkar
Volume: 4
Issue: 2
Year: 2013
An Adaptive and Interactive Agent Based ITS for Cognitive Skill Prediction and Improvement

Author(s): Mrs. R. Gowri | Dr. S. Kanmani | M. Santhosh | S. Naresh
Volume: 4
Issue: 2
Year: 2013
ROBUST SINGULAR VALUE DECOMPOSITION ALGORITHM FOR UNIQUE FACES

Author(s): Ibrahim Patel | Raghavendra Kulkarni | Dr.P. Nageswar Rao
Volume: 4
Issue: 2
Year: 2013
CONCEPTUAL THREE PHASE KDD MODEL AND FINANCIAL RESEARCH

Author(s): Dr. Simmi Bagga
Volume: 4
Issue: 2
Year: 2013
Composite Lowpass Filter Realized by Image Parameter method and Integrated with Defected Ground Structures

Author(s): Chandan Kumar Ghosh | Arabinda Roy | Susanta Kumar Parui
Volume: 4
Issue: 2
Year: 2013
TAXONOMY FOR WSN SECURITY-A SURVEY

Author(s): kshitija Ajabrao chaple
Volume: 4
Issue: 2
Year: 2013
ANALYSIS OF SOM & SOFM TECHNIQUES USED IN SATELLITE IMAGERY

Author(s): Rachita Sharma | Sanjay Kumar Dubey
Volume: 4
Issue: 2
Year: 2013
An UML Approach to Overcome Issues of Concurrency in Distributed Systems

Author(s): Om Kumar | Peyakunta Bhargavi Reddy
Volume: 4
Issue: 2
Year: 2013
Determination of Optimal Number of Relays Using a New Energy Model for WSN

Author(s): Partha Pratim Bhattacharya | Shilpi Gupta | Nupur Pal
Volume: 4
Issue: 2
Year: 2013
Optimal Tasks Assignment for Multiple Heterogeneous Processors with Dynamic Re-assignment

Author(s): Harendra Kumar | M. P. Singh | Pradeep Kumar Yadav
Volume: 4
Issue: 2
Year: 2013
Analysis and Comparison of Color Features for Content Based Image Retrieval

Author(s): Milind Vijayrao Lande | Prof. PraveenBhanodiya | Mr. Pritesh Jain
Volume: 4
Issue: 2
Year: 2013
Using 3GPP- A Secure IDS for MANETs

Author(s): Monika Garg | Karanvir Kaur | Simerpreet Kaur
Volume: 4
Issue: 2
Year: 2013
Rejuvenating Public-Private Partnerships (PPPs) in Asia

Author(s): Dr. (Mrs) Satinder Bhatia
Volume: 4
Issue: 2
Year: 2013
RE-MAC: A Reliable Energy Efficient MAC Protocol For Wireless Sensor Networks

Author(s): Santhosh Simon | K Paulose Jacob
Volume: 4
Issue: 2
Year: 2013
ENLIGHTENING THE CLOUD COMPUTING DOMAIN

Author(s): AmanPreet Kaur | Dr. Dheerendra Singh
Volume: 4
Issue: 2
Year: 2013
Analysis of MAC Protocol for Reliable Broadcast

Author(s): Savita Savita | Anjali Anjali | Gurpal Singh
Volume: 4
Issue: 2
Year: 2013
Enhancing the performance of web Focused CRAWLer Using Ontology

Author(s): Prasant Yadav | Mrs Mala Kalra | Dr. K.P Yadav
Volume: 4
Issue: 2
Year: 2013
A Review Of Internet Gateway Discovery Approaches For Mobile Adhoc Networks

Author(s): Deepak Kumar Patel | Rakesh Kumar
Volume: 4
Issue: 2
Year: 2013
A Simulated Novel Approach for Identifying Black Hole Attack in AODV based MANET

Author(s): Kanika Lakhani
Volume: 4
Issue: 2
Year: 2013
Investigations into Hybrid Magneto-hydrodynamic (MHD) Antenna

Author(s): Sunil Bist | Dr. Rajveer Singh Yaduvanshi
Volume: 4
Issue: 2
Year: 2013
THE IMPROVEMENT OF THE STABILITY PROBLEM OF RESHA GENERATION PLANT IN JORDAN

Author(s): Anwar Almofleh | Mahmoud Awad
Volume: 4
Issue: 2
Year: 2013
Providing security for Web Service Composition using Finite State Machine

Author(s): Priya Sundar | R Raju | P Mahalakshmi | G Lalitha
Volume: 4
Issue: 2
Year: 2013
Security Test by using F T M and Data Allocation Strategies on Leakage Detection

Author(s): Pallavali Radha | G. Sireesha
Volume: 4
Issue: 2
Year: 2013
Security from Denial of Sleep Attack in Wireless Sensor Network

Author(s): Simerpreet Kaur | Md. Ataullah | Monika Garg
Volume: 4
Issue: 2
Year: 2013
Web Service Negotiation Using AHP for Business Oriented Design of Service Level Agreements

Author(s): Mr. R. Raju | Ms. D. Dhivya | Ms. R. Saranya | Ms. S. I. Abbinaya
Volume: 4
Issue: 2
Year: 2013
Maintainability Evaluation of Object-Oriented Software System Using Clustering Techniques

Author(s): Astha Mehra | Sanjay Kumar Dubey
Volume: 5
Issue: 2
Year: 2013
ANALYSIS OF SUCCESS DRIVERS OF E-HEALTH INFRASTRUCTURE AND USE: A NATIONAL LEVEL STUDY

Author(s): KALLOL K. BAGCHI | Godwin J. Udo
Volume: 5
Issue: 2
Year: 2013
EXTENDING THE VISUAL CRYPTOGRAPHY ALGORITHM USING IMAGE WATERMARKING TECHNIQUE

Author(s): Dilip Kumar Kotthapalli | Dr. V.R. Anitha
Volume: 5
Issue: 2
Year: 2013
AN EFFICIENT MEMORY MANAGEMENT TECHNIQUE FOR SMART CARD OPERATING SYSTEM

Author(s): Shardha Porwal | Himanshu Mittal
Volume: 5
Issue: 2
Year: 2013
DEFINING QUALITY CRITERIA IN SITUATIONAL METHOD ENGINEERING

Author(s): Samir Azzouz | Naoufel Kraiem | Henda Ben Ghezala
Volume: 5
Issue: 2
Year: 2013
THE CHALLENGE OF IMPLEMENTING SCRUM AGILE METHODOLOGY IN A TRADITIONAL DEVELOPMENT ENVIRONMENT

Author(s): Renato Takeki Nishijima | Prof. Dr. José Gonçalo Dos Santos
Volume: 5
Issue: 2
Year: 2013
Intrusion Detection Techniques based on Cross Layer For Wireless Local Area Networks

Author(s): Dr. Vinod Kumar | Mr Sandeep Agarwal | Mr Avtar Singh
Volume: 5
Issue: 2
Year: 2013
PERFORMANCE ANALYSIS OF EFFECT RATE OF CROSS LAYER BASED INTRUSION DETECTION FOR WIRELESS LAN

Author(s): Dr. Vinod Kumar | Mr Avtar Singh | Mrs. Ritika Narang
Volume: 5
Issue: 2
Year: 2013
Multi-Agent System Overview: Architectural Designing using Practical Approach

Author(s): Mohamed Osama Khozium
Volume: 5
Issue: 2
Year: 2013
Simulation Tool for Queuing Models: QSIM

Author(s): Dr. Pratiksha Saxena | Lokesh Sharma
Volume: 5
Issue: 2
Year: 2013
Image Compression Techniques

Author(s): Hardeep Singh Samra
Volume: 2
Issue: 2
Year: 2012
Applying of an Ontology-driven Case-based Reasoning System in Logistics

Author(s): Martin Kowalski | Stephan Zelewski | Daniel Bergenrodt
Volume: 3
Issue: 2
Year: 2012
SOFTWARE CODE CLONE DETECTION MODEL USING HYBRID APPROACH

Author(s): Amandeep Kaur | Mandeep Singh Sandhu
Volume: 3
Issue: 2
Year: 2012
Improvement inEnergy Efficiency of Wireless Sensor Network

Author(s): Sawroop Kaur | Deepak Prashar | Rita Rani
Volume: 2
Issue: 2
Year: 2012
Segmentation of Touching Hand written Telugu Characters by using Drop Fall Algorithm

Author(s): Adabala Venkata Srinivasa Rao | D R Sandeep | V B Sandeep | S Dhanam Jaya
Volume: 3
Issue: 2
Year: 2012
Security Issues of Routing Protocols in MANETs

Author(s): Kaushal Gandhi | Rajneesh Narula | Sumeer Khullar | Anish Arora
Volume: 3
Issue: 2
Year: 2012
IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37

Author(s): Prakash Kuppuswamy | Dr. Saeed Q Y Al-Khalidi
Volume: 3
Issue: 2
Year: 2012
Exploring Problems and Solutions in estimating Testing Effort for Non Functional Requirement

Author(s): Pratima Singh | Anil Kumar Tripathi
Volume: 3
Issue: 2
Year: 2012
Novel Approach for Frequent Pattern Algorithm for Maximizing Frequent Patterns in Effective Time

Author(s): Rahul Sharma | Dr. Manish Manoria
Volume: 3
Issue: 2
Year: 2012
A Review of Classification and Novel Class Detection Technique of Data Streams

Author(s): Manish Rai | Rekha Pandit
Volume: 3
Issue: 2
Year: 2012
Toward a Unified Ontology of Cloud Computing

Author(s): Gagan Singh | Nimrat Kaur | Manpreet Kaur
Volume: 3
Issue: 2
Year: 2012
IMPLEMENTATION AND ANALYSIS OF FIR FILTER USING TMS 320C6713 DSK

Author(s): Sandeep Kumar | Munish Verma | Vijay K. Lamba | Susheel Kumar | Avinash Mehta
Volume: 3
Issue: 2
Year: 2012
Smile Theory of Everything

Author(s): Satish Gajawada
Volume: 3
Issue: 2
Year: 2012
Script Recovery from Scanned Document Image

Author(s): Rajesh Kumar | Dr. Srinivasan K.S
Volume: 3
Issue: 2
Year: 2012
COMPARATIVE ANALYSIS OF EXPONENTIAL WINDOW FUNCTION FOR DESIGNING OF FIR FILTERS

Author(s): Susheel Kumar | Munish Verma | Vijay K. Lamba | Avinash Kumar | Sandeep Kumar
Volume: 3
Issue: 2
Year: 2012
ANALYSIS OF MODIFIED COSH WINDOW FUNCTION AND PERFORMANCE EVALUATION OF THE FIR FILTER DESIGNED USING WINDOWING TECHNIQUES

Author(s): Avinash Mehta | Munish Verma | Vijay K. Lamba | Susheel Kumar | Sandeep Kumar
Volume: 3
Issue: 2
Year: 2012
INTEGRATED APPROACH FOR DEFECT DETECTION IN CERAMIC TILES

Author(s): Meenakshi Sharma | Gurleen Sidhu
Volume: 3
Issue: 2
Year: 2012
CPW Fed Hexagonal Patch Shape with Hexagonal slot Ultra Wideband Antenna

Author(s): Suman Gill | J S Ubhi
Volume: 3
Issue: 2
Year: 2012
A Comprehensive Analysis of Mobile Ad-Hoc Routing Protocols Under Varying Node Densities

Author(s): Manpreet Kaur Kaler | Sonia Malhotra
Volume: 3
Issue: 2
Year: 2012
Nano Whiskers ..A “BIG” discussion on “SMALL” things..

Author(s): Ruchi Sharma
Volume: 3
Issue: 2
Year: 2012
E-Security Issues

Author(s): Mani Arora
Volume: 3
Issue: 2
Year: 2012
WEB MINING THROUGH CUSTOMIZED MARKOV ALGORITHM

Author(s): Sourabh Mayria | Mr. Mahesh Malviya
Volume: 3
Issue: 2
Year: 2012
WEB-BASED PENSION FUND MANAGEMENT SYSTEM

Author(s): Afolashade Kuyoro | Okolie S. O. | Lawal O. A. | Aina Marshal A.
Volume: 3
Issue: 2
Year: 2012
Di-Diphone Arabic Speech Synthesis Concatenation

Author(s): Abdelkader Chabchoub | Salah Alahmadi | Adnan Cherif | Wahid Barkouti
Volume: 3
Issue: 2
Year: 2012
Review of Improvement of Web Search Based on Web Log File

Author(s): Soniya P. Chaudhari | Prof. Hitesh Gupta | S. J. Patil
Volume: 3
Issue: 2
Year: 2012
SHORT TERM WIND SPEED PREDICTION USING A NEW HYBRID MODEL WITH PASSIVE CONGREGATION

Author(s): Tarek Abdelwahab Aboueldahab
Volume: 3
Issue: 2
Year: 2012
Peer to Peer Video on Demand Architecture using V-Chaining

Author(s): Hareesh K | Manjaiah D. H
Volume: 3
Issue: 2
Year: 2012
ALTERNATIVES OF PROVIDING IPTV USING IP MULTIMEDIA SUBSYSTEM

Author(s): Ladislav Kočkovič | Ivan Baroňák
Volume: 3
Issue: 2
Year: 2012
OPTIMIZATION OF CHANNEL ALLOCATION ALGORITHM FOR HOT SPOT CELLS IN WIRELESS NETWORKS

Author(s): Kriti Saraswat | Ajit Kumar Shrivastava | Amit Saxena
Volume: 3
Issue: 2
Year: 2012
Evaluation of economic advantage for produced electrical energy usage by solar cell in compression with steam power plant in home in Isfahan city

Author(s): Hadi Parhizi Gashti | Abbas Ali Abounoori | Shahram Javadi | Hassan Ahmadi
Volume: 3
Issue: 2
Year: 2012
GRASPING SPATIAL SOLUTIONS IN DISTRIBUTED DYNAMIC WORLDS

Author(s): Peter Simon Sapaty
Volume: 3
Issue: 2
Year: 2012
COMPACT CPW FED ANTENNA HAVING DUAL ‘T’ AND BEAKER SHPED FOR WLAN/WIMAX OPERATIONS

Author(s): Davinder Parkash | Jyoti Sheokand
Volume: 3
Issue: 2
Year: 2012
Issues and Emerging Trends in Identity Management

Author(s): Manish Snehi | Jyoti Snehi | Renu Dhir
Volume: 3
Issue: 2
Year: 2012
MOBILE COMMERCE: A REVIEW

Author(s): Shruti Jain
Volume: 3
Issue: 2
Year: 2012
ANALYZING AND IMPROVING WEB APPLICATION QUALITY USING DESIGN PATTERNS

Author(s): Shikha Bhatia | Mr. Harshpreet Singh
Volume: 2
Issue: 2
Year: 2012
HYBRID TECHNIQUE FOR SOFTWARE CODE CLONE DETECTION

Author(s): Priyanka Batta | Miss Himanshi
Volume: 2
Issue: 2
Year: 2012
PERFORMANCE ANALYSIS OF OPEN SOURCE STORAGE CLOUDS IN CLOUD COMPUTING

Author(s): kumari shaveta rani | Sangeeta Sharma
Volume: 2
Issue: 2
Year: 2012
Improvement in energy efficiency of wireless sensor networks

Author(s): Sawroop Kaur | Deepak Prashar | Rita Rani
Volume: 2
Issue: 2
Year: 2012
Focused Web Search Agents A Critical Study

Author(s): Pankaj Mishra
Volume: 2
Issue: 2
Year: 2012
FOCUSED CRAWLING TECHNIQUES

Author(s): Pankaj Mishra
Volume: 2
Issue: 2
Year: 2012
EVALUATION OF BITMAP INDEX USING PROTOTYPE DATA WAREHOUSE

Author(s): Murtadha M. Hamad | Muhammed Abdul Raheem
Volume: 2
Issue: 2
Year: 2012
New Aggregation Operator for Triangular Fuzzy Numbers based on the Geometric Means of the Slopes of the L- and R- Membership Functions

Author(s): Manju Pandey | Dr. Nilay Khare | Dr. S.C. Shrivastava
Volume: 2
Issue: 2
Year: 2012
A DATA DISSEMINATION MODEL FOR VEHICULAR ADHOC NETWORK

Author(s): Anshu Garg | Sanjeev Bansal
Volume: 2
Issue: 2
Year: 2012
Study of Parameters for Evaluation of Software as a Service

Author(s): Aman deep Kaur | Lakhbir pal Singh | DR.Hardeep Singh
Volume: 2
Issue: 2
Year: 2012
The Impact of UTAUT Model and ICT Theoretical Framework on University Academic Staff: Focus on Adamawa State University, Nigeria

Author(s): Oye Nathaniel David | A.Iahad N. | Nor Zairah Ab.Rahim
Volume: 2
Issue: 2
Year: 2012
Image Compression Technique

Author(s): Hardeep Singh Samra
Volume: 2
Issue: 2
Year: 2012
SRGM with imperfect debugging using capability analysis of Log-logistic model

Author(s): Dr.O. Naga Raju | D. Rakesh | K.V. SubbaReddy
Volume: 2
Issue: 2
Year: 2012
MODEL OF PERCEIVED INFLUENCE OF ACADEMIC PERFORMANCE USING SOCIAL NETWORKING

Author(s): Oye Nathaniel David | Adam Mahamat Helou | Nor Zairah Ab.Rahim
Volume: 2
Issue: 2
Year: 2012
AN OVERVIEW OF CLOUD TESTING AS A SERVICE

Author(s): Amandeep Kaur Parmar | Navjeet Singh | Dr. Gurdev Singh
Volume: 2
Issue: 2
Year: 2012
Advanced IT Outsourcing By Using Cloud Computing Model

Author(s): Amanbir Kaur | Gurpreet Singh
Volume: 2
Issue: 2
Year: 2012
Algorithms in Simulated Parallel Condition – A Performance Analysis

Author(s): GAGANDEEP singh | Chhailadeep Kaur
Volume: 2
Issue: 2
Year: 2012
Cloud Computing: IT Industry’s Next Buzz-words.

Author(s): Harmandeep Singh | Arjinder Kaur | Anureet Kaur
Volume: 2
Issue: 2
Year: 2012
Understanding and Elevating Web Practice Through Web Analytics Final

Author(s): Swati Chawla | Dr. Gurdev Singh
Volume: 2
Issue: 2
Year: 2012
Trigger and Database Security

Author(s): YAYA ITAI | AWODELE OLUDELE PhD | NICOLAE GOGA PhD
Volume: 4
Issue: 1
Year: 2013
REVIEW OF DATABASE AND PROMINENT PROGRAMMES

Author(s): Dr. Vinod Kumar | Gagandeep Raheja | Sukhpreet Singh
Volume: 4
Issue: 1
Year: 2013
CRITICAL STUDY ON DATABASE AND PROMINENT PROGRAMMES

Author(s): Dr. Vinod Kumar | Gagandeep Raheja | Sukhpreet Singh
Volume: 4
Issue: 1
Year: 2013
Fuzzy Mean Point Clustering using K-means algorithm for implementing the movecentroid function code

Author(s): Ganeshchandra Narharrao Shinde | Inamdar S. A. | Narangale S.M.
Volume: 4
Issue: 1
Year: 2013
VIRTUAL REALITY IN EDUCATION: TRENDS AND ISSUES

Author(s): Kelvin Kabeti Omieno | Franklin Wabwoba | Nahason Matoke
Volume: 4
Issue: 1
Year: 2013
Signal and Image Processing with Side Looking Sonar

Author(s): Prof. Dr. R. Sathishkumar | T.V.S.Prasad Gupta | M.Ajay Babu
Volume: 4
Issue: 1
Year: 2013
CRYPTOGRAPHY

Author(s): Dr. Vinod Kumar | Er.Gagandeep Raheja | Ms Subeena Sareen
Volume: 4
Issue: 1
Year: 2013
How to Assured Quality in a Cloud and its Verification Process

Author(s): Prince Jain | Dr. Gurdev Singh | Dr. Mandeep Singh
Volume: 4
Issue: 1
Year: 2013
The place of the stored procedures in the cloud databases

Author(s): Constantin Florin Sîrbu
Volume: 4
Issue: 1
Year: 2013
A COMPARATIVE STUDY OF VARIOUS METHODS OF ANN FOR SOLVING TSP PROBLEM

Author(s): Sharadindu Roy | Prof Samer Sen Sarma | Soumyadip chakravorty | Suvodip Maity
Volume: 4
Issue: 1
Year: 2013
AN APPROACH OF FLOW MEASUREMENT IN SOLAR WATER HEATER USING TURBINE FLOW METER

Author(s): N. R. Kolhare | P. R. Thorat
Volume: 4
Issue: 1
Year: 2013
A Study on Knowledge Discovery of Relevant Web Services with Semantic and Syntactic approaches

Author(s): Mrs. M. Akila Rani | Dr. D. Shanthi
Volume: 4
Issue: 1
Year: 2013
CLOUD COMPUTING

Author(s): Dr. Vinod Kumar | Er. Gagandeep Raheja | Ms. Jyoti Sodhi
Volume: 4
Issue: 1
Year: 2013
THE PROSPECT OF SOLAR POWER GENERATION TECHNOLOGY

Author(s): Ajaegbu C. | Awodele O. | Afolashade Kuyoro | Omotunde A. A.
Volume: 4
Issue: 1
Year: 2013
A Novel Prime Number Path Tracing Scheme Using Clos Network

Author(s): Pankaj Singh | Gurpartap Singh
Volume: 4
Issue: 1
Year: 2013
EVALUTION AND CALIBRATION OF MINIATURE CIRCUIT BREAKER

Author(s): Ramandeep Singh | Baljinder Singh
Volume: 4
Issue: 1
Year: 2013
Study on Non Functional Software Testing

Author(s): Hardeep Singh Samra
Volume: 4
Issue: 1
Year: 2013
DNA sequence comparison based on Tabular Representation

Author(s): Archana Verma | Mr. R.K.Bharti | Prof. R.K. Singh
Volume: 4
Issue: 1
Year: 2013
EFFICIENT TECHNIQUE FOR AUTOMATIC EXTRACTION AND IDENTIFICATION OF ELEVATION FROM A REFERENCE IMAGE

Author(s): Mohan Pratap Pradhan | Mrinal Kanti Ghose | Gourav Mittal
Volume: 4
Issue: 1
Year: 2013
A FRAMEWORK FOR SPATIO-TEMPORAL DATA WAREHOUSE

Author(s): Lax maiah | DR.A.GOVARDHAN DR.A.GOVARDHAN | DR. C.SUNIL KUMAR
Volume: 4
Issue: 1
Year: 2013
Implementation and Evaluation of Rule Induction Algorithm with Association Rule Mining: A study in life insurance

Author(s): Kapil Sharma | Sheveta Vashisht | Heena Sharma | Jasreena kaur Bains | Richa Dhiman
Volume: 4
Issue: 1
Year: 2013
Are Internet-Based Services More Sustainable?

Author(s): Adi Wolfson | Dorith Tavor | Shlomo Mark
Volume: 4
Issue: 1
Year: 2013
Fuzzy Logic Based Advance Speed Control of Induction Motor

Author(s): Debirupa Hore
Volume: 4
Issue: 1
Year: 2013
Computational Analysis of Different Image Super-Resolution Reconstruction Algorithms

Author(s): Netra Lokhande | Dr. Dinkar M Yadav
Volume: 4
Issue: 1
Year: 2013
A CLUSTER ANALYSIS AND DECISION TREE HYBRID APPROACH IN DATA MINING TO DESCRIBING TAX AUDIT

Author(s): Richa Dhiman | Sheveta Vashisht | Kapil Sharma
Volume: 4
Issue: 1
Year: 2013
New Approach for Managing Keys in Cloud & Use Cases for Cloud Computing

Author(s): Sarvesh Singh | Anupam Shukla | Ankit Sharma | Kalimullah Lone
Volume: 4
Issue: 1
Year: 2013
Authentication Based Cloud Storage and Secure Data Forwarding

Author(s): Rajasekaran S | Kalifulla. Y | Murugesan. S | Ezhilvendan. M | Gunasekaran. J
Volume: 4
Issue: 1
Year: 2013
A REVIEW ARTICLE OF WATERMARKING

Author(s): Mandeep kaur | Navneet Kaur | Chetan Batra
Volume: 4
Issue: 1
Year: 2013
A REVIEW ARTICLE OF CLOUD COMPUTING

Author(s): Mandeep Kaur | Amandeep Kaur | Mandeep kaur
Volume: 4
Issue: 1
Year: 2013
A novel method for secret image sharing Using nibble exchange

Author(s): Anirban Chakraborty | Subhendu Das
Volume: 4
Issue: 1
Year: 2013
DECISION SUPPORT SYSTEM FOR PRECISION FARMING

Author(s): Harmandeep Singh | Nitika Sharma
Volume: 4
Issue: 1
Year: 2013
OPTIMAL ALGORITHM FOR PREDICTING STUDENTS’ ACADEMIC PERFORMANCE

Author(s): Afolashade Kuyoro | Prof. Nicolae Goga | Dr. Oludele Awodele | Dr. Samuel Okolie
Volume: 4
Issue: 1
Year: 2013
A Comprehensive review of Artificial Bee Colony Algorithm

Author(s): Kamalam Balasubramani | Karnan Marcus
Volume: 5
Issue: 1
Year: 2013
Image Steganography Based On Optimal LSB Pixel Adjustment Method

Author(s): Gowtham Prasad T V S | Dr. S Varadarajan | Dr. S.A.K Jilani | Dr. G N Kodandaramaiah
Volume: 5
Issue: 1
Year: 2013
BUILDING LEXICON FOR TELUGU SPEECH RECOGNITION

Author(s): K. V. N. Sunitha | A. Sharada
Volume: 5
Issue: 1
Year: 2013
The Analysis of Mobile WiMAX and LTE using MIMO technique

Author(s): Roopali Garg | Shafi Singla
Volume: 5
Issue: 1
Year: 2013
VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS

Author(s): Nutakki Praveena | Dr. Ujwal A. Lanjewar | Chilakalapudi Meher Babu
Volume: 5
Issue: 1
Year: 2013
Implementation of Brain Tumor Segmentation in brain MR Images using K-Means Clustering and Fuzzy C-Means Algorithm

Author(s): Ms. Pritee Gupta | Ms Mrinalini Shringirishi | Dr.yashpal Singh
Volume: 5
Issue: 1
Year: 2013
Performance Comparison Between Various Tuning Strategies: Ciancone, Cohen Coon & Ziegler- Nicholas Tuning Methods

Author(s): Ashok Kumar | Rajbir Morya | Dr. Munish Vashishath
Volume: 5
Issue: 1
Year: 2013
Privacy and Security Issues In Mobile Social Networking and in Modern Shopping Experience

Author(s): Sanjeev Kulkarni | Kirna Kumari | Naheeda Kittur
Volume: 5
Issue: 1
Year: 2013
ONTOLOGY BASED CLASSIFICATION AND CLUSTERING OF RESEARCH PROPOSALS AND EXTERNAL RESEARCH REVIEWERS

Author(s): Preet Kaur | Richa Sapra
Volume: 5
Issue: 1
Year: 2013
Study of Effect of Variations in slot dimensions on Fractal Patch antenna Performance

Author(s): Somesh Kumar | Ms. Monika
Volume: 5
Issue: 1
Year: 2013
Comparative Analysis of Various Cloud Technologies

Author(s): Akanksha Akanksha | Dr. Gurdev Singh
Volume: 1
Issue: 1
Year: 2012
Improved Adaptive Huffman Compression Algorithm

Author(s): Satpreet Singh | Harmandeep Singh
Volume: 1
Issue: 1
Year: 2012
STATIC AND DYNAMIC BNP PARALLEL SCHEDULING ALGORITHMS FOR DISTRIBUTED DATABASE

Author(s): Manik Sharma | Smriti Smriti
Volume: 1
Issue: 1
Year: 2012
An Alternate Algorithm for (3x3) Median Filtering of Digital Images

Author(s): Satinderjit Singh
Volume: 1
Issue: 1
Year: 2012
A METRICS BASED APPROACH TO ANALYSE WEB USAGE PATTERN

Author(s): Navneet Singh | Amit Makkar | Sukhjinder Singh
Volume: 1
Issue: 1
Year: 2012
Cloud Requirement and Cloud Analysis

Author(s): Gurdev Singh | Amandeep Singh | Harmandeep Singh
Volume: 2
Issue: 1
Year: 2012
PERFORMANCE EVALUATION OF IMAGE QUALITY BASED ON FRACTAL IMAGE COMPRESSION

Author(s): Gaganpreet Kaur | Hitashi Hitashi | Gurdev Singh
Volume: 2
Issue: 1
Year: 2012
COMPARATIVE STUDY OF STATIC METRICS OF PROCEDURAL AND OBJECT ORIENTED PROGRAMMING LANGUAGES

Author(s): Manik Sharma | Chandni Sharma | Gurdev Singh | Ankur Bhardwaj | Navpreet Singh
Volume: 2
Issue: 1
Year: 2012
Code Comprehending Measure (CCM)

Author(s): Satinderjit Singh | Gurdev Singh | Monika Monga
Volume: 2
Issue: 1
Year: 2012
CONCEPTUAL THREE PHASE ITERATIVE MODEL OF KDD

Author(s): Simmi Bagga | Dr. G.N. Singh
Volume: 2
Issue: 1
Year: 2012
Cloud Implementation and Cloud Integration

Author(s): Lalit Kumar | Gurdev Singh | Prince Jain
Volume: 2
Issue: 1
Year: 2012
STATIC AND DYNAMIC BNP PARALLEL SCHEDULING ALGORITHIMS FOR DISTRIBUTED DATABASE

Author(s): Manik Sharma
Volume: 1
Issue: 1
Year: 2012
An Alternate Algorithm for (3x3) Median Filtering of Digital Images

Author(s): Satinderjit Singh
Volume: 1
Issue: 1
Year: 2012
A METRICS BASED APPROACH TO ANALYSE WEB USAGE PATTERN

Author(s): Navneet Singh . | Sukhjinder Singh | Amit Makkar
Volume: 1
Issue: 1
Year: 2012
Comparative Analysis of Various Cloud Technologies

Author(s): akanksha garg | Dr. Gurdev Singh
Volume: 1
Issue: 1
Year: 2012
Improved Adaptive Huffman Compression Algorithm

Author(s): Satpreet Singh | Harmandeep Singh
Volume: 1
Issue: 1
Year: 2012
Green computing – The New Era of Energy Efficient Computing

Author(s): Rupali Dhir
Volume: 3
Issue: 1
Year: 2012
Review of Various SEO Techniques for Websites

Author(s): Manraj Singh | Harmanjit Singh
Volume: 3
Issue: 1
Year: 2012
Role of Adjacency Matrix & Adjacency List in Graph Theory

Author(s): Harmanjit Singh | Richa Sharma
Volume: 3
Issue: 1
Year: 2012
Content Based Image Retrieval using Texture, Color and Shape for Image Analysis

Author(s): Amanbir Sandhu | Aarti Kochhar
Volume: 3
Issue: 1
Year: 2012
Classical Encryption Techniques

Author(s): Ramandeep Sharma | Richa Sharma | Harmanjit Singh
Volume: 3
Issue: 1
Year: 2012
Finite State Testing and Syntax Testing

Author(s): Amandeep Singh | Harmanjit Singh
Volume: 3
Issue: 1
Year: 2012
Development Platforms for Mobile Applications: Status and Trends

Author(s): Richa Sharma
Volume: 3
Issue: 1
Year: 2012
Process of Web Usage Mining to find Interesting Patterns from Web Usage Data

Author(s): Ketul Patel | Dr. A. R. Patel
Volume: 3
Issue: 1
Year: 2012
Traveling Salesman Problem: A Case Study

Author(s): Dr. Leena Jain | Mr. Amit Bhanot
Volume: 3
Issue: 1
Year: 2012
NLP TOKEN MATCHING ON DATABASE USING BINARY SEARCH

Author(s): Ekta Aggarwal | Shreeja Nair
Volume: 3
Issue: 1
Year: 2012
HRMS: IS THE ROLE CHANGING FROM BEING ADMINISTRATIVE TO STRATEGIC?

Author(s): Goldy Mahajan | Prof. Versha Mehta
Volume: 3
Issue: 1
Year: 2012
Alternative Vidhi to Conversion of Cyclic CNF->GNF

Author(s): Avinash Bansal
Volume: 3
Issue: 1
Year: 2012
Software Quality

Author(s): Sukhvir Kaur
Volume: 3
Issue: 1
Year: 2012
A tool for prototyping a precision GPS system

Author(s): Héctor Nelson Acosta | Juan Manuel Toloza
Volume: 3
Issue: 1
Year: 2012
Design of IIR Filter using Remez Algorithm

Author(s): Aashu Gupta | Dr. Vijay Lamba | Er. Munish Verma
Volume: 3
Issue: 1
Year: 2012
FPGA IMPLEMENTATION OF INTELLIGENT EMBEDDED SYSTEM FOR DISTRIBUTED ELECTRICAL APPLIANCES

Author(s): Swathi Vejendla | Dr. M. Kamaraju
Volume: 3
Issue: 1
Year: 2012
Detecting the Sybil Attack in Wireless Sensor Network :Survey

Author(s): A.V Pramod | Md. Abdul Azeem | M. Om Prakash
Volume: 3
Issue: 1
Year: 2012
An Effective Approach to Contention Based Bandwidth Request Mechanism in WiMAX Networks

Author(s): Sonia Panchal | Satinder Pal
Volume: 3
Issue: 1
Year: 2012
A New Model of the Lifetime of Wireless Sensor Networks in Pure Water Communications

Author(s): Abdelrahman Elleithy | Gonhsin Liu | Ali Elrashidi
Volume: 3
Issue: 1
Year: 2012
In Search of a Better Heuristic Algorithm for Simplification of Switching Function - A Challenge to ESPRESSO

Author(s): Subhajit Guha | Uma Mitra | Pinki Dey | Samar Sen Sarma
Volume: 3
Issue: 1
Year: 2012
Simulation And Auditing of Network Security Based On Probabilistic Neural Network Approach

Author(s): Manoj Patel | Dr. Manish Shrivastava | Kavita Deshmukh
Volume: 3
Issue: 1
Year: 2012
LSB Embedding in Spatial Domain - A Review of Improved Techniques

Author(s): Himani Goyal | Shaveta Chutani
Volume: 3
Issue: 1
Year: 2012
Investigations on Receiver sensitivity of 10 Gbps SOA based optical communication system

Author(s): Sukhbir Singh | Kulwinder Singh
Volume: 3
Issue: 1
Year: 2012
A Collective Statistical Analysis of Outdoor Path Loss Models

Author(s): Saifuddin Abdullah | Dr. Fuad Al-Najjar
Volume: 3
Issue: 1
Year: 2012
Performance Evaluation of Image Enhancement Techniques in Spatial and Wavelet Domains

Author(s): Amardeep Singh Virk | Mandeep Kaur | Lovely Passrija
Volume: 3
Issue: 1
Year: 2012
GRAYSCALE IMAGE WATERMARK DETECTION

Author(s): Randeep Kaur | Kamaljit Kaur Dhillon
Volume: 3
Issue: 1
Year: 2012
Integration of Human Resource Information System to DSS, CMS and other applications to increase productivity

Author(s): Joydeep Chowdhury | Parimalendu Bandhyapadhya | Gunamoy Hazra
Volume: 3
Issue: 1
Year: 2012
Diagnosis of Dynamic Topology MANETs in Faulty Environment

Author(s): Kanwarpal Singh | Sumeet Kaur | Er. Rishma Chawla
Volume: 3
Issue: 1
Year: 2012
IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEM

Author(s): N. P. Jagtap | S. J. Patil | A. K. Bhavsar
Volume: 3
Issue: 1
Year: 2012
Low Cost VoIP Architecture Using Open Source Software Component in Tertiary Institutions

Author(s): Ebtesam Najim AlShemmary | Bahaa Qasim Al-Musawi
Volume: 3
Issue: 1
Year: 2012
A Mobile Technology for Hazard Management System

Author(s): Ajay Kumar | Amit Kumar Battan | Kumar Rahul
Volume: 3
Issue: 1
Year: 2012
Printed Arabic Characters Classification using A Statistical Approach

Author(s): Ihab Zaqout
Volume: 3
Issue: 1
Year: 2012
Performance Evaluation of Ciphers Using CRYPTOOL 2.0

Author(s): Kulwinder Kaur
Volume: 3
Issue: 1
Year: 2012
Providing Security in Data Aggregation using RSA algorithm

Author(s): Sukhpreet Singh | Er. Kumar Saurabh
Volume: 3
Issue: 1
Year: 2012
ARTIFICIAL NEURAL NETWORK BASED CHARACTER RECOGNITION USING BACKPROPAGAT

Author(s): Murtaza Abbas Rizvi | Madhup Shrivastava | Monika Sahu
Volume: 3
Issue: 1
Year: 2012
A NEW SIMPLIFIED APPROACH TO FIND THE EQUIVALENT RESISTANCE OF ANY COMPLEX EQUAL RESISTIVE NETWORK

Author(s): Karan Aneja | Vipin Kumar
Volume: 3
Issue: 1
Year: 2012
Affiliate Program      Why do you need a reservation system?