Academic Journals Database
Disseminating quality controlled scientific knowledge

Advanced Computing : an International Journal

ISSN: 2229--726X
Publisher: Academy & Industry Research Collaboration Center (AIRCC)


ADD TO MY LIST
 
Performance Evaluation of Ontology and Fuzzybase CBIR PDF available

Author(s): Tajman sandhu | Parminder Singh
Volume: 4
Issue: 3
Year: 2013
The Verification of Virtual Community Member's Socio-Demographic Profile PDF available

Author(s): Fedushko Solomia | Peleschyshyn Oksana | Peleschyshyn Andriy | Syerov Yuriy
Volume: 4
Issue: 3
Year: 2013
A Model to Compare the Degree of Refactoring Opportunities of Three Projects Using A Machine Algorithm PDF available

Author(s): Gauri Khurana | Sonika Jindal
Volume: 4
Issue: 3
Year: 2013
CUDA Based Performance Evaluation of the Computational Efficiency of the DCT Image Compression Technique on Both the CPU and GPU PDF available

Author(s): Kgotlaetsile Mathews Modieginyane | Zenzo Polite Ncube and Naison Gasela
Volume: 4
Issue: 3
Year: 2013
Rsa Signature: Behind The Scenes PDF available

Author(s): Dragan Vidakovic | Dusko Parezanovic | Olivera Nikolic | Jelena Kaljevic
Volume: 4
Issue: 2
Year: 2013
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts PDF available

Author(s): Yu Li | Sheng Zhong
Volume: 4
Issue: 2
Year: 2013
Method-Level Code Clone Modification using Refactoring Techniques for Clone Maintenance PDF available

Author(s): E. Kodhai | S. Kanmani
Volume: 4
Issue: 2
Year: 2013
Scaling Transform Methods For Compressing a 2D Graphical image PDF available

Author(s): A. J. Rajeswari Joe | N. Rama
Volume: 4
Issue: 2
Year: 2013
Path Finding Solutions For Grid Based Graph PDF available

Author(s): R.Anbuselvi
Volume: 4
Issue: 2
Year: 2013
Speaker Verification Using Acoustic and Prosodic Features PDF available

Author(s): Utpal Bhattacharjee | Kshirod Sarmah
Volume: 4
Issue: 1
Year: 2013
Veritas Mouseion 3d - Technology and Museum Information PDF available

Author(s): Janaina Mello | Irla Rocha
Volume: 4
Issue: 1
Year: 2013
Do New Mobile Devices in Enterprises Pose A Serious Security Threat? PDF available

Author(s): Ali A Altalbe
Volume: 4
Issue: 1
Year: 2013
Two Phase Clandestain Image Encryption PDF available

Author(s): V Hemanth | R Praveen Kumar
Volume: 4
Issue: 1
Year: 2013
Secure Cloud Architecture PDF available

Author(s): Kashif Munir | Sellapan Palaniappan
Volume: 4
Issue: 1
Year: 2013
A Multi - Population Based Frog - Memetic Algorithm for Job Shop Scheduling Problem PDF available

Author(s): Somayeh Kalantari | Mohammad Saniee Abadeh
Volume: 3
Issue: 6
Year: 2012
A Secure Key Transfer Protocol for Group Communication PDF available

Author(s): R. Velumadhava Rao | K Selvamani | R Elakkiya
Volume: 3
Issue: 6
Year: 2012
Vector Quantization for Privacy Preserving Clustering in Data Mining PDF available

Author(s): D.Aruna Kumari | Rajasekhara Rao | M.Suman
Volume: 3
Issue: 6
Year: 2012
A Study of Image Compression Based Transmission Algorithm Using Spiht for Low Bit Rate Application PDF available

Author(s): Ritu Chourasiya | Ajit Shrivastava
Volume: 3
Issue: 6
Year: 2012
Obesity Heuristic, New Way on Artificial Immune Systems PDF available

Author(s): M. A. El-Dosuky | M. Z. Rashad | T. T. Hamza | A.H. EL-Bassiouny
Volume: 3
Issue: 6
Year: 2012
Web Mining - A Catalyst For E-Business PDF available

Author(s): Abdul Rahaman Wahab Sait | T.Meyappan
Volume: 3
Issue: 6
Year: 2012
Justification of Montgomery Modular Reduction PDF available

Author(s): Salem Sherif Elfard
Volume: 3
Issue: 6
Year: 2012
Map /Reduce Design and Implementation of Apriori Algorithm for Handling Voluminous Data - Sets PDF available

Author(s): Anjan K Koundinya | Srinath N K, K A K Sharma | Kiran Kumar | Madhu M N | Kiran U Shanbag
Volume: 3
Issue: 6
Year: 2012
A Comparative Study of Root -Based and Stem -Based Approaches for Measuring the Similarity Between Arabic Words for Arabic Text Mining Applications PDF available

Author(s): Hanane FROUD | Abdelmonaim LACHKAR | Said ALAOUI OUATIK
Volume: 3
Issue: 6
Year: 2012
Frameworks Between Components And Objects PDF available

Author(s): Mohamed Belal | Ayman Khedr | Ahmed Gohar
Volume: 3
Issue: 5
Year: 2012
Dynamic Allocation Method For Efficient Load Balancing In Virtual Machines For Cloud Computing Environment PDF available

Author(s): Bhaskar. R | Deepu. S.R | B.S. Shylaja
Volume: 3
Issue: 5
Year: 2012
Justification of Montgomery Modular Reduction PDF available

Author(s): Salem Sherif Elfard
Volume: 3
Issue: 5
Year: 2012
Directional Based Watermarking Scheme Using A Novel Data Embedding Approach PDF available

Author(s): Y. RaghavenderRao | P. Nikhil | E.Nagabhooshanam
Volume: 3
Issue: 5
Year: 2012
Enhancement Of Improved Balanced LEACH For Heterogeneous Wireless Sensor Networks PDF available

Author(s): Yogesh Kuma | Kanwaljit Singh
Volume: 3
Issue: 5
Year: 2012
Generating domain specific sentiment lexicons using the Web Directory PDF available

Author(s): Akshay Minocha | Navjyoti Singh
Volume: 3
Issue: 5
Year: 2012
An Integrated ERP with Web Portal PDF available

Author(s): Yehia M. Helmy | Mohamed I. Marie | Sara M. Mosaad
Volume: 3
Issue: 5
Year: 2012
An Efficient Integrated Approach for the Detection of Exudates and Diabetic Maculopathy in Colour fundus Images

Author(s): B.Ramasubramanian | G.Mahendran
Volume: 3
Issue: 5
Year: 2012
Comparative Performance Analysis Of Rnsc And Mcl Algorithms On Power-Law Distribution PDF available

Author(s): Mousumi Dhara | K. K. Shukla
Volume: 3
Issue: 5
Year: 2012
Analyzing the Efficient Test Order for Integration Testing PDF available

Author(s): Reena Dadhich | Sourabh Sehgal
Volume: 3
Issue: 4
Year: 2012
Image Content in Location-Based Shopping Recommender Systems For Mobile Users PDF available

Author(s): Tranos Zuva | Sunday O. Ojo | Seleman M. Ngwira | Oludayo O. Olugbara
Volume: 3
Issue: 4
Year: 2012
Implementation of AES as a Custom Hardware using NIOS II Processor PDF available

Author(s): Meghana Hasamnis | Priyanka Jambhulkar | S.S. Limaye
Volume: 3
Issue: 4
Year: 2012
'CodeAliker' - Plagiarism Detection on the Cloud PDF available

Author(s): Nitish Upreti | Rishi Kumar
Volume: 3
Issue: 4
Year: 2012
Study and Implementation of Advanced Neuroergonomic Techniques PDF available

Author(s): B.F.Momin | Mamata S.Kalas
Volume: 3
Issue: 4
Year: 2012
Named Entity Recognition in Turkish Using Association Measures PDF available

Author(s): Senem Kumova Metin | Tarik Kisla | Bahar Karaoglan
Volume: 3
Issue: 4
Year: 2012
Privacy Preserving through Segment-Based Visual Cryptography PDF available

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Volume: 3
Issue: 4
Year: 2012
A New Approach to Theftware-Efficient Solution PDF available

Author(s): Prabhat Kumar | Abhishek, Milan Jain | Niraj Upadhyay | Avinash Thakur
Volume: 3
Issue: 4
Year: 2012
A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks PDF available

Author(s): Saeed Fathi Ghiri | Morteza Rahmani | Hassan Almasi
Volume: 3
Issue: 4
Year: 2012
Freeman Code Based Online Handwritten Character Recognition for Malayalam using Backpropagation Neural Networks PDF available

Author(s): Amritha Sampath | Tripti C | Govindaru V
Volume: 3
Issue: 4
Year: 2012
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Based Healthcare Applications PDF available

Author(s): Dipti Durgesh Patil | Vijay M. Wadhai
Volume: 3
Issue: 4
Year: 2012
A Novel Method for Obtaining a Better Quality Speech Signal for Cochlear Implants using Kalman with DRNL and SSB Technique PDF available

Author(s): Rohini S. Hallikar | Uttara Kumari | K Padmaraju
Volume: 3
Issue: 4
Year: 2012
Availability Of JobTracker Machine In Hadoop/MapReduce Zookeeper Coordinated Clusters PDF available

Author(s): Ekpe Okorafor | Mensah Kwabena Patrick
Volume: 3
Issue: 3
Year: 2012
Detecting Phishing Attacks In Purchasing Process Through Proactive Approach PDF available

Author(s): S.Arun | D.Ananda | T.Selvaprabhu | B.Sivakumar | P.Revathi | H.Shine
Volume: 3
Issue: 3
Year: 2012
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Rapperswil
Tango Rapperswil