Physical Modeling and Simulation of Thermal Heating in Vertical Integrated Circuits

Author(s): Abderrazzak El Boukili
Volume: 4
Issue: 2
Year: 2013





A Nobel Hybrid Approach for Edge Detection

Author(s): Palvi Rani | Poonam Tanwar
Volume: 4
Issue: 2
Year: 2013





Research on Distributed Software Testing Platform Based on Cloud Resource

Author(s): Shi Hengliang, Zhao Changwei | Huang Tao | Dong Yongsheng
Volume: 4
Issue: 2
Year: 2013





QoS aware Hierarchical Multi-hop Routing Protocols in MANETs

Author(s): Narendar Reddy Mandhadi | Lakshmi Rajamani
Volume: 4
Issue: 1
Year: 2013





An Overview of Digital Image Steganography

Author(s): R.Poornima | R.J.Iswarya
Volume: 4
Issue: 1
Year: 2013





Dataset Quality Assessment: An extension for analogy based effort estimation

Author(s): Mohammad Azzeh
Volume: 4
Issue: 1
Year: 2013





Techniques and Methodologies for Recognition of Tamil Typewritten and Handwritten Characters: A Survey
Author(s): C P Sumathi | S Karpagavalli
Volume: 3
Issue: 6
Year: 2013




Challenges and Weaknesses of Agile Method in Enterprise Architecture

Author(s): Zahra Askarinejad Amiri
Volume: 3
Issue: 6
Year: 2013





A Survey of Wireless Sensor Network Architectures

Author(s): Almir Davis | Hwa Chang
Volume: 3
Issue: 6
Year: 2013





Regression Models for 2-Dimensional Cartesian Coordinates Prediction: A Case study at University of Mines and Technology (UMaT), Tarkwa-Ghana.

Author(s): Yao Yevenyo Ziggah | Hu Youjian | Christian Odutola Amans | Bernard Kumi-Boateng
Volume: 3
Issue: 6
Year: 2013





Automatic Facial Expression Analysis A Survey

Author(s): C.P. Sumathi | T. Santhanam | M.Mahadevi
Volume: 3
Issue: 6
Year: 2013





DVR-Based Manet Routing Protocols Taxonomy

Author(s): Mrinal Kanti Debbarma | Sudipta Roy | Santanu Kumar Sen
Volume: 3
Issue: 5
Year: 2012





Assessments Of Different Speeded Up Robust Features (SURF) Algorithm Resolution For Pose Estimation Of UAV

Author(s): Bassem Sheta | Mohamed Elhabiby | Naser El-Sheimy
Volume: 3
Issue: 5
Year: 2012





LED-ID System: Coverage And Fast Link Recovery Technique

Author(s): Muhammad Shahin Uddin | Mst. Nargis Aktar | Yeong Min Jang
Volume: 3
Issue: 5
Year: 2012





Survey On Scheduling And Allocation In High Level Synthesis

Author(s): M. Chinnadurai | M. Joseph
Volume: 3
Issue: 5
Year: 2012





Second Generation Curvelet Transforms Vs Wavelet transforms and Canny Edge Detector for Edge Detection from WorldView-2 data

Author(s): Mohamed Elhabiby | Ahmed Elsharkawy | Naser El-Sheimy
Volume: 3
Issue: 4
Year: 2012





Computer-Aided Diagnosis of Thyroid Nodule: A Review

Author(s): Deepika Koundal | Savita Gupta | Sukhwinder Singh
Volume: 3
Issue: 4
Year: 2012





A Survey on Terrorist Network Mining: Current Trends and Opportunities

Author(s): Nisha Chaurasia | Mradul Dhakar | Akhilesh Tiwari | R. K. Gupta
Volume: 3
Issue: 4
Year: 2012





Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems

Author(s): Hossein Jadidoleslamy
Volume: 3
Issue: 4
Year: 2012





A Survey on Target Tracking Techniques in Wireless Sensor Networks

Author(s): K. Ramya | K. Praveen Kumar | V. Srinivas Rao
Volume: 3
Issue: 4
Year: 2012





Web Search Result Clustering- A Review

Author(s): Kishwar Sadaf | Mansaf Alam
Volume: 3
Issue: 4
Year: 2012





Hybrid Technique For Knowledge Representation & A Comparative Study

Author(s): POONAM TANWAR | T. V. PRASAD | KAMLESH DATTA
Volume: 3
Issue: 4
Year: 2012





A Survey On Various Approaches Of Text Extraction In Images

Author(s): C.P. Sumathi | G.Gayathri Devi | T. Santhanam
Volume: 3
Issue: 4
Year: 2012





A Survey Of Sql Injection Countermeasures

Author(s): R.P.Mahapatra | Subi Khan
Volume: 3
Issue: 3
Year: 2012





Cross Layer Protocols For Multimedia Transmission In Wireless Networks

Author(s): Santhosha Rao | Kumara Shama
Volume: 3
Issue: 3
Year: 2012





Security In Wireless Sensor Networks - Improving The LEAP Protocol

Author(s): Delan Alsoufi | Khaled Elleithy | Tariq Abuzaghleh | Ahmad Nassar
Volume: 3
Issue: 3
Year: 2012





Complete Synchronization Of Hyperchaotic Xu And Hyperchaotic Lu Systems Via Active Control

Author(s): Sundarapandian Vaidyanathan
Volume: 3
Issue: 3
Year: 2012





A Survey Of Dimensionality Reduction And Classification Methods

Author(s): Nebu Varghese | Vinay Verghese | Gayathri. P | N. Jaisankar
Volume: 3
Issue: 3
Year: 2012





Error Analysis Of 3d Polygonal Model:A Survey

Author(s): Devendra Singh Rajput | R Rama Kishore
Volume: 3
Issue: 2
Year: 2012





Inclusion Of Road Network In The Spatial Database For Features Searching Using Dynamic Index

Author(s): S. Sivasubramanian | M.Samundeeswari
Volume: 3
Issue: 2
Year: 2012





Performance analysis of Coiflet-type wavelets for a fingerprint image compression by using wavelet and wavelet packet transform

Author(s): Md. Rafiqul Islam | Farhad Bulbul | Shewli Shamim Shanta
Volume: 3
Issue: 2
Year: 2012





The necessities for building a model to evaluate Business Intelligence projects- Literature Rev

Author(s): Vahid Farrokhi | Laszlo Pokoradi
Volume: 3
Issue: 2
Year: 2012





Single Image Improvement using Superresolution

Author(s): Shwetambari Shinde | Meeta Dewangan
Volume: 3
Issue: 2
Year: 2012





Nymble Blocking System

Author(s): Anand Joshi | Arshiya Shaikh | Aruna Kadam | Vasudha Sahu
Volume: 3
Issue: 2
Year: 2012





The Proposal Of Hybrid Intrusion Detection For Defence Of Sync Flood Attack In Wireless Sensor Network

Author(s): Ruchi Bhatnagar | Udai Shankar
Volume: 3
Issue: 2
Year: 2012





The Study On Load Balancing Strategies In Distributed Computing System

Author(s): Md. Firoj Ali | Rafiqul Zaman Khan
Volume: 3
Issue: 2
Year: 2012





Energy Efficient Recognition Protocol for Ad Hoc Networks

Author(s): Taresh Singh | S Qamar
Volume: 3
Issue: 2
Year: 2012





Fault Based Techniques For Testing Boolean Expressions: A Survey

Author(s): Usha Badhera | Purohit G.N | S.Taruna
Volume: 3
Issue: 1
Year: 2012





Segment Based Visual Cryptography For Key Distribution

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Volume: 3
Issue: 1
Year: 2012





A comparative study analysis of materialized view for selection cost

Author(s): T.Nalini | A.Kumaravel | K.Rangarajan
Volume: 3
Issue: 1
Year: 2012





Energy Saving in Wireless Sensor Networks

Author(s): Zahra Rezaei | Shima Mobininejad
Volume: 3
Issue: 1
Year: 2012





A Survey On Detect - Discovering And Evaluating Trust Using Efficient Clustering Technique For Manets

Author(s): K.Sudharson | N.Partheeban
Volume: 3
Issue: 1
Year: 2012





Secure Key Agreement And Authentication Protocols

Author(s): B.Maheshwari
Volume: 3
Issue: 1
Year: 2012





Graph Partitioning Advance Clustering Technique

Author(s): T. Soni Madhulatha
Volume: 3
Issue: 1
Year: 2012





Adopting E-Commerce To User's Needs

Author(s): Mohammad Alshehri | Hamza Aldabbas | James Sawle | Mai Abu Baqar
Volume: 3
Issue: 1
Year: 2012





Watermarking Schemes For Copy Protection : A Survey

Author(s): Dolley Shukla | Manisha Sharma
Volume: 3
Issue: 1
Year: 2012





Secure And Reliable Routing In Mobile Adhoc Networks

Author(s): Rachid Haboub | Mohammed Ouzzif
Volume: 3
Issue: 1
Year: 2012





Pattern Association For Character Recognition By Back-Propagation Algorithm Using Neural Network Approach

Author(s): S.P.Kosbatwar | S.K.Pathan
Volume: 3
Issue: 1
Year: 2012





Spatiotemporal Data Mining: Issues, Tasks And Applications

Author(s): K.Venkateswara Rao | A.Govardhan | K.V.Chalapati Rao
Volume: 3
Issue: 1
Year: 2012





A Survey On Mac Protocols For Wireless Multimedia Networks

Author(s): S.P.V.Subba Rao | S. Venkata Chalam | D.Sreenivasa Rao
Volume: 2
Issue: 4
Year: 2011




