Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Global Research in Computer Science

ISSN: 2229--371X


ADD TO MY LIST
 
Performance Assessment of MAC Layer Protocols in Pollution Monitoring System Based on Underwater Wireless Sensor Networks

Author(s): Ahmed Mosa AL-Zubydi | Mohammed Najm Abdallah
Volume: 4
Issue: 3
Year: 2013
Implementing a successful Business Intelligence framework for Enterprises

Author(s): Hanumanth Sistla Sastry | MS Prasada Babu
Volume: 4
Issue: 3
Year: 2013
FACE RECOGNITION USING PCA, LDA AND VARIOUS DISTANCE CLASSIFIERS

Author(s): Kuldeep Singh Sodhi | Madam Lal
Volume: 4
Issue: 3
Year: 2013
ON CTA USABILITY AND RURAL DEVELOPMENT IN INDIA

Author(s): Dr. Sanjay Kumar Gupta
Volume: 4
Issue: 3
Year: 2013
Web Accessibility Checking Tool

Author(s): Tripti Singh | Nitish Sharma
Volume: 4
Issue: 3
Year: 2013
A FINEST TIME QUANTUM FOR IMPROVING SHORTEST REMAINING BURST ROUND ROBIN (SRBRR) ALGORITHM

Author(s): P. Surendra Varma
Volume: 4
Issue: 3
Year: 2013
Enhancement of Polygon Meshes

Author(s): Vamsi kiran Surathu
Volume: 4
Issue: 3
Year: 2013
FUZZY METHODS AND TOOLS FOR CRANE MANAGEMENT SYSTEM BASED ON T-CONTROLLER

Author(s): Iryna Olehivna Verbenko
Volume: 4
Issue: 3
Year: 2013
TEXT MINING: CONCEPTS, PROCESS AND APPLICATIONS

Author(s): Lokesh Kumar | Parul Kalra Bhatia
Volume: 4
Issue: 3
Year: 2013
CLOUD COMPUTING AND SOCIAL NETWORKS: A COMPARISON STUDY OF MYSPACE AND FACEBOOK

Author(s): Priyanka Dudi
Volume: 4
Issue: 3
Year: 2013
A REVIEW OF THE COGNITIVE INFORMATION RETRIEVAL CONCEPT, PROCESS AND TECHNIQUES

Author(s): Parul Kalra Bhatia
Volume: 4
Issue: 3
Year: 2013
INTEGRATING MCT WITH RFID: A CASE STUDY

Author(s): Majid Zaman
Volume: 4
Issue: 3
Year: 2013
VOICE RECOGNITION USING GAUSSIAN MIXTURE MODEL

Author(s): Nikhil D. Karande
Volume: 4
Issue: 3
Year: 2013
AN OPTIMAL ROUTE DETERMINING METHODOLOGY BASED ON DECISION SUPPORT SYSTEM

Author(s): H. Vignesh Ramamoorthy
Volume: 4
Issue: 3
Year: 2013
CONTRAST ENHANCEMENT FOR PCA FUSION OF MEDICAL IMAGES

Author(s): Dr. S. S. Bedi
Volume: 4
Issue: 3
Year: 2013
ANALYSIS OF MITM ATTACK IN SECURE SIMPLE PAIRING

Author(s): Praveen Mishra
Volume: 4
Issue: 2
Year: 2013
THE SECURITY OF INFORMATION EXCHANGE: E- COMMERCE

Author(s): Dhirendra Pandey
Volume: 4
Issue: 2
Year: 2013
COGNITIVE RADIO NETWORK: SECURITY ENHANCEMENTS

Author(s): Muheet Ahmed Butt
Volume: 4
Issue: 2
Year: 2013
AUTOMATED DAMAGED FLOWER DETECTION USING IMAGE PROCESSING

Author(s): Kanij Fatema Aleya
Volume: 4
Issue: 2
Year: 2013
STATISTICAL FEATURE EXTRACTION TO CLASSIFY ORAL CANCERS

Author(s): Anuradha K
Volume: 4
Issue: 2
Year: 2013
DETECTION AND PREVENTION ROUTING MISBEHAVIOUR IN OLSR ROUTING

Author(s): Anita Namdev
Volume: 4
Issue: 2
Year: 2013
SECURITY ISSUES IN PROTECTING COMPUTERS AND MAINTENANCE

Author(s): V Saravanan | S Rajeshwari | P Jayashree
Volume: 4
Issue: 1
Year: 2013
IMAGE COMPRESSION USING HYBRID TRANSFORM TECHNIQUE

Author(s): Nikita Bansal
Volume: 4
Issue: 1
Year: 2013
DESIGN AND IMPLEMENTATION OF MIMO-OFDM FOR 4G MOBILE COMMUNICATIONS

Author(s): Balaji Raja Sree | Balasubramanian D.P | kalaikaviya K. | sreevani pullareddy
Volume: 4
Issue: 1
Year: 2013
VARIOUS COLOUR SPACES AND COLOUR SPACE CONVERSION

Author(s): Nishad PM
Volume: 4
Issue: 1
Year: 2013
Genetic Algorithms for Image Segmentation using Active Contours

Author(s): Neeru Gulati | Poonam Panwar
Volume: 4
Issue: 1
Year: 2013
GAME DECISION MAKING IN MULTI AGENT SYSTEMS

Author(s): Temani Moncef
Volume: 4
Issue: 1
Year: 2013
COMPARATIVE STUDY ON OIL PRODUCTS OF RICE BRAN

Author(s): Ashish Agrawal
Volume: 4
Issue: 1
Year: 2013
Multimodal Biometric Authentication and Intrusion Detection in Mobile ad hoc Network

Author(s): varsha sudhakar Upare | Lalit Kulkarni
Volume: 4
Issue: 1
Year: 2013
EMPOWERING CLOUD SECURITY THROUGH SLA

Author(s): Deveeshree Nayak | Er. Muheet Ahmed Butt
Volume: 4
Issue: 1
Year: 2013
INFORMATION CLEANUP FORMULATION: PRAGMATIC SOLUTION

Author(s): Qamar Rayees Khan
Volume: 4
Issue: 1
Year: 2013
Comparison of Six Prioritization Techniques for Software Requirements

Author(s): Manju Khari | Nikunj Kumar
Volume: 4
Issue: 1
Year: 2013
AN APPROACH FOR VERIFYING DIGITAL WATERMARKED-FINGERPRINT USING FUZZY COMMITMENT SCHEME

Author(s): bhupendra kumar | Deo Brat Ojha
Volume: 4
Issue: 1
Year: 2013
CRITICAL FAILURE FACTORS IN INFORMATION SYTSEM :

Author(s): bikram pal kaur
Volume: 4
Issue: 1
Year: 2013
CASE STUDY – CENTRALITY MEASURE ANALYSIS ON CO-AUTHORSHIP NETWORK

Author(s): Dr. V. Umadevi
Volume: 4
Issue: 1
Year: 2013
A COMPREHENSIVE REVIEW ON SEARCH ENGINE OPTIMIZATION

Author(s): Tanveer Singh
Volume: 4
Issue: 1
Year: 2013
Efficient Searching for Geographical Data Gathering using Knowledge Mining

Author(s): Kuldeep Singh Jadon
Volume: 3
Issue: 9
Year: 2012
ANALYSIS ON SUSPICIOUS THYROID RECOGNITION USING ASSOCIATION RULE MINING

Author(s): K. Saravana Kumar
Volume: 3
Issue: 9
Year: 2012
A SURVEY ON CONTENT BASED IMAGE RETRIEVAL USING BDIP,BVLC AND DCD

Author(s): Kanchan Saxena
Volume: 3
Issue: 9
Year: 2012
THE USEFULNESS OF RE PRACTICES IN S/W DEVELOPMENT

Author(s): Dhirendra Pandey | Ugrasen Suman
Volume: 3
Issue: 9
Year: 2012
RPA Switzerland

RPA Switzerland

Robotic process automation

    

Tango Rapperswil
Tango Rapperswil