Performance Assessment of MAC Layer Protocols in Pollution Monitoring System Based on Underwater Wireless Sensor Networks
Author(s): Ahmed Mosa AL-Zubydi | Mohammed Najm Abdallah
Volume: 4
Issue: 3
Year: 2013




Implementing a successful Business Intelligence framework for Enterprises
Author(s): Hanumanth Sistla Sastry | MS Prasada Babu
Volume: 4
Issue: 3
Year: 2013




FACE RECOGNITION USING PCA, LDA AND VARIOUS DISTANCE CLASSIFIERS
Author(s): Kuldeep Singh Sodhi | Madam Lal
Volume: 4
Issue: 3
Year: 2013




ON CTA USABILITY AND RURAL DEVELOPMENT IN INDIA
Author(s): Dr. Sanjay Kumar Gupta
Volume: 4
Issue: 3
Year: 2013




Web Accessibility Checking Tool
Author(s): Tripti Singh | Nitish Sharma
Volume: 4
Issue: 3
Year: 2013




A FINEST TIME QUANTUM FOR IMPROVING SHORTEST REMAINING BURST ROUND ROBIN (SRBRR) ALGORITHM
Author(s): P. Surendra Varma
Volume: 4
Issue: 3
Year: 2013




FUZZY METHODS AND TOOLS FOR CRANE MANAGEMENT SYSTEM BASED ON T-CONTROLLER
Author(s): Iryna Olehivna Verbenko
Volume: 4
Issue: 3
Year: 2013




TEXT MINING: CONCEPTS, PROCESS AND APPLICATIONS
Author(s): Lokesh Kumar | Parul Kalra Bhatia
Volume: 4
Issue: 3
Year: 2013




CLOUD COMPUTING AND SOCIAL NETWORKS: A COMPARISON STUDY OF MYSPACE AND FACEBOOK
Author(s): Priyanka Dudi
Volume: 4
Issue: 3
Year: 2013




A REVIEW OF THE COGNITIVE INFORMATION RETRIEVAL CONCEPT, PROCESS AND TECHNIQUES
Author(s): Parul Kalra Bhatia
Volume: 4
Issue: 3
Year: 2013




VOICE RECOGNITION USING GAUSSIAN MIXTURE MODEL
Author(s): Nikhil D. Karande
Volume: 4
Issue: 3
Year: 2013




The Heterogeneous Routing problem with stochastic demand and client priority solving by clustering genetic algorithm
Author(s): Amous Sawsan
Volume: 4
Issue: 3
Year: 2013




AN OPTIMAL ROUTE DETERMINING METHODOLOGY BASED ON DECISION SUPPORT SYSTEM
Author(s): H. Vignesh Ramamoorthy
Volume: 4
Issue: 3
Year: 2013




CONTRAST ENHANCEMENT FOR PCA FUSION OF MEDICAL IMAGES
Author(s): Dr. S. S. Bedi
Volume: 4
Issue: 3
Year: 2013




A DYNAMIC POSITION BASED ROUTING PROTOCOL TO OPTIMIZE PACKET DELIVERY IN MOBILE ADHOC NETWORK
Author(s): Saranya S
Volume: 4
Issue: 3
Year: 2013




IMPROVING THE CLASSIFICATION ACCURACY USING SUPPORT VECTOR MACHINES (SVMS) WITH NEW KERNEL
Author(s): Ashraf Afifi
Volume: 4
Issue: 2
Year: 2013




ANALYSIS OF MITM ATTACK IN SECURE SIMPLE PAIRING
Author(s): Praveen Mishra
Volume: 4
Issue: 2
Year: 2013




THE SECURITY OF INFORMATION EXCHANGE: E- COMMERCE
Author(s): Dhirendra Pandey
Volume: 4
Issue: 2
Year: 2013




GLYCEROL PRODUCTION BY HYDROGENOLYSIS OF SUCROSE: OPTIMIZATION OF (NI, W, CU)/KIESELGUHR CATALYST BY RESPONSE SURFACE METHODOLOGY AND ITS CHARACTERIZATION
Author(s): Tanuja Srivastava
Volume: 4
Issue: 2
Year: 2013




COGNITIVE RADIO NETWORK: SECURITY ENHANCEMENTS
Author(s): Muheet Ahmed Butt
Volume: 4
Issue: 2
Year: 2013




INTELLIGENT BRAIN TUMOR TISSUE SEGMENTATION FROM MAGNETIC RESONANCE IMAGE (MRI) USING META HEURISTIC ALGORITHMS
Author(s): K. Selvanayaki
Volume: 4
Issue: 2
Year: 2013




AUTOMATED DAMAGED FLOWER DETECTION USING IMAGE PROCESSING
Author(s): Kanij Fatema Aleya
Volume: 4
Issue: 2
Year: 2013




CONSTRUCTING OF PSEUDOINVARIANTS AND DIGITAL WATERMARKING OF SPEECH SIGNALS BASED ON A SINGULAR VALUE DECOMPOSITION
Author(s): Dmytro Dmytrovych Peleshko
Volume: 4
Issue: 2
Year: 2013




STATISTICAL FEATURE EXTRACTION TO CLASSIFY ORAL CANCERS
Author(s): Anuradha K
Volume: 4
Issue: 2
Year: 2013




DETECTION AND PREVENTION ROUTING MISBEHAVIOUR IN OLSR ROUTING
Author(s): Anita Namdev
Volume: 4
Issue: 2
Year: 2013




SECURITY ISSUES IN PROTECTING COMPUTERS AND MAINTENANCE
Author(s): V Saravanan | S Rajeshwari | P Jayashree
Volume: 4
Issue: 1
Year: 2013




IMAGE COMPRESSION USING HYBRID TRANSFORM TECHNIQUE
Author(s): Nikita Bansal
Volume: 4
Issue: 1
Year: 2013




GREEN SOFTWARE ENGINEERING PROCESS : MOVING TOWARDS SUSTAINABLE SOFTWARE PRODUCT DESIGN
Author(s): Shantanu Ray
Volume: 4
Issue: 1
Year: 2013




DESIGN AND IMPLEMENTATION OF MIMO-OFDM FOR 4G MOBILE COMMUNICATIONS
Author(s): Balaji Raja Sree | Balasubramanian D.P | kalaikaviya K. | sreevani pullareddy
Volume: 4
Issue: 1
Year: 2013




VARIOUS COLOUR SPACES AND COLOUR SPACE CONVERSION
Author(s): Nishad PM
Volume: 4
Issue: 1
Year: 2013




Genetic Algorithms for Image Segmentation using Active Contours
Author(s): Neeru Gulati | Poonam Panwar
Volume: 4
Issue: 1
Year: 2013




COMPARATIVE STUDY ON OIL PRODUCTS OF RICE BRAN
Author(s): Ashish Agrawal
Volume: 4
Issue: 1
Year: 2013




A SURVEY ON ENERGY EFFICIENT MODULATION AND CODING TECHNIQUES FOR WIRELESS SENSOR NETWORKS
Author(s): M. Sheik Dawood
Volume: 4
Issue: 1
Year: 2013




Multimodal Biometric Authentication and Intrusion Detection in Mobile ad hoc Network
Author(s): varsha sudhakar Upare | Lalit Kulkarni
Volume: 4
Issue: 1
Year: 2013




EMPOWERING CLOUD SECURITY THROUGH SLA
Author(s): Deveeshree Nayak | Er. Muheet Ahmed Butt
Volume: 4
Issue: 1
Year: 2013




INFORMATION CLEANUP FORMULATION: PRAGMATIC SOLUTION
Author(s): Qamar Rayees Khan
Volume: 4
Issue: 1
Year: 2013




Comparison of Six Prioritization Techniques for Software Requirements
Author(s): Manju Khari | Nikunj Kumar
Volume: 4
Issue: 1
Year: 2013




AN APPROACH FOR VERIFYING DIGITAL WATERMARKED-FINGERPRINT USING FUZZY COMMITMENT SCHEME
Author(s): bhupendra kumar | Deo Brat Ojha
Volume: 4
Issue: 1
Year: 2013




CRITICAL FAILURE FACTORS IN INFORMATION SYTSEM :
Author(s): bikram pal kaur
Volume: 4
Issue: 1
Year: 2013




IMPROVED FUZZY POSSIBLISTIC C-MEANS (IFPCM) ALGORITHMS FOR MAGNETIC RESONANCE IMAGES SEGMENTATION
Author(s): E.A. Zanaty
Volume: 4
Issue: 1
Year: 2013




CASE STUDY – CENTRALITY MEASURE ANALYSIS ON CO-AUTHORSHIP NETWORK
Author(s): Dr. V. Umadevi
Volume: 4
Issue: 1
Year: 2013




A COMPREHENSIVE REVIEW ON SEARCH ENGINE OPTIMIZATION
Author(s): Tanveer Singh
Volume: 4
Issue: 1
Year: 2013




Efficient Searching for Geographical Data Gathering using Knowledge Mining
Author(s): Kuldeep Singh Jadon
Volume: 3
Issue: 9
Year: 2012




ANALYSIS ON SUSPICIOUS THYROID RECOGNITION USING ASSOCIATION RULE MINING
Author(s): K. Saravana Kumar
Volume: 3
Issue: 9
Year: 2012




A SURVEY ON CONTENT BASED IMAGE RETRIEVAL USING BDIP,BVLC AND DCD
Author(s): Kanchan Saxena
Volume: 3
Issue: 9
Year: 2012




THE USEFULNESS OF RE PRACTICES IN S/W DEVELOPMENT
Author(s): Dhirendra Pandey | Ugrasen Suman
Volume: 3
Issue: 9
Year: 2012




COMPARATIVE STUDY OF VARIOUS EXISTING SECURITY SCENARIOS IN CLOUD COMPUTING ENVIRONMENT
Author(s): Dr. R. Sridevi
Volume: 3
Issue: 9
Year: 2012



