Shuffled Frog Leaping Algorithm for minimizing total holding cost with tardy jobs in Job shop scheduling
Author(s): G. Ramya
Volume: 3
Issue: 4
Year: 2013




STUDY OF FINANCIAL RISK INVOLVED IN BOT PROJECTS
Author(s): Renu Upadhyay
Volume: 3
Issue: 4
Year: 2013




A METHOD Of DETECTING DATA LEAKAGE INCIDENT USING MISUSEABILITY WEIGHT MEASURES
Author(s): Kalavathi Mekala
Volume: 3
Issue: 4
Year: 2013




Assessing Adequacy of Probability Distribution for Modelling Annual Maximum Rainfall
Author(s): N. Vivekanandan
Volume: 3
Issue: 4
Year: 2013




LDPE and CRMB Utilization in Bituminous Concrete Pavement Surfaces
Author(s): Payal Bakshi
Volume: 3
Issue: 4
Year: 2013




cell phone security: Emerging Threats, Essential Strategies
Author(s): Ritika Saroha
Volume: 3
Issue: 3
Year: 2013




SECURE AND TRUSTWORTHY INCENTIVES COOPERATION MECHANISM FOR MULTI-HOP WIRELESS NETWORKS
Author(s): Kirubaburi R
Volume: 3
Issue: 3
Year: 2013




Development of Local health Care Planning and Demanding in Saudi Arabia By Using GIS Applications
Author(s): Magdy Shayboub Ali Mahmoud
Volume: 3
Issue: 3
Year: 2013




STATE OF ART OF A WIRELESS SENSOR NETWORK SYSTEM FOR WEATHER PREDICTION
Author(s): Jagbir Dhillon
Volume: 3
Issue: 2
Year: 2013




A Survey Report on Disaster Management By Using Wireless Sensor
Author(s): Jagbir Dhillon
Volume: 3
Issue: 2
Year: 2013




Performance study of wireless sensor network in industrial machines monitoring scenario
Author(s): Jagbir Dhillon
Volume: 3
Issue: 2
Year: 2013




Diagnosis of HIV Using Pervasive Computing - A Conceptual Approach
Author(s): M. Suryakala
Volume: 3
Issue: 1
Year: 2013




Characterization of in-situ Lateritic soils as Barrier in Leachate Containment Facilities
Author(s): Olusegun IGE
Volume: 3
Issue: 1
Year: 2013




Implementation of Closed Loop Bi-Directional Speed Control of PMBLDC Motor by FPGA
Author(s): Aluru Ashokkumar
Volume: 3
Issue: 1
Year: 2013




Worm Gear Drive Optimization using Modified Artificial Immune Algorithm
Author(s): S. Padmanabhan
Volume: 3
Issue: 1
Year: 2013




Structural and Electrical Properties of BiFeO3 Nanoparticles Synthesized by Microcontroller based Thermogravimetric Analyser
Author(s): P.H. Suresha
Volume: 3
Issue: 1
Year: 2013




Content Based Image Retrieval Using Wavelet Transform
Author(s): Sachin Inzalkar
Volume: 3
Issue: 1
Year: 2013




Dynamic Demes Parallel Genetic Algorithm for Scheduling the Resources in Cloud
Author(s): Gayathri Prakash
Volume: 3
Issue: 1
Year: 2013




Security Analysis for Multi-Homed Body Sensor Networks
Author(s): Praveen Kumar
Volume: 3
Issue: 1
Year: 2013




Development of Database Security Using Row Level Masking
Author(s): Bireswar Dutta
Volume: 3
Issue: 1
Year: 2013




PARAMETER ESTIMATION IN GOMPERTZ SOFTWARE RELIABILITY ENGINEERING MODEL FOR WEB BASED APPLICATIONS
Author(s): Lilly Florence
Volume: 2
Issue: 6
Year: 2012




Analysis of Multitone Microwave Signals on Optical Fiber System using External laser Modulation
Author(s): Parveen Rani
Volume: 2
Issue: 6
Year: 2012




A Survey of Association Rule Based Technique for Protecting Sensitive Information
Author(s): Abhishek Diwan
Volume: 2
Issue: 6
Year: 2012




An Efficient Method for extracting Frequent Pattern Using Transposition of Database
Author(s): Sundar Birla
Volume: 2
Issue: 6
Year: 2012




Customization of Sensitive Association Rules in Data Mining
Author(s): Manish Vyas
Volume: 2
Issue: 6
Year: 2012




Effect of Cutting Parameters on Tool Wear Surface Roughness and Material Removal Rate during Dry Turning of EN-31 Steel
Author(s): SUDHANSU DAS
Volume: 2
Issue: 6
Year: 2012




SMART CREDENTIALS CUM UNIQUE IDENTIFICATION AND RECOGNITION SYSTEM
Author(s): Lokesh Khedekar
Volume: 2
Issue: 6
Year: 2012




An Efficient Technique for Mining Top Ranked Data from a Standard Data Set
Author(s): Hiresh Udiya
Volume: 2
Issue: 6
Year: 2012




A Modified Algorithm for Privacy Preserving Association Rule Hiding
Author(s): Manish Vyas
Volume: 2
Issue: 6
Year: 2012




Face Recognition under Expressions and Lighting Variations using Artificial Intelligence and Image Synthesizing
Author(s): D.CJoy Wise
Volume: 2
Issue: 5
Year: 2012




A Survey of Privacy Preserving in Association Rule Mining Techniques
Author(s): Devilal Birla
Volume: 2
Issue: 5
Year: 2012




Simulative Analysis of different Modulation Formats for Long-haul transmission
Author(s): Kamaljit Bhatia
Volume: 2
Issue: 5
Year: 2012




An Efficient Technique for Protecting Sensitive Information
Author(s): Devilal Birla
Volume: 2
Issue: 5
Year: 2012




Simultaneous Color Image Compression and Encryption using Number Theory
Author(s): Navaneethakrishnan Navaneethakrishnan
Volume: 2
Issue: 5
Year: 2012




Reducing Network Consumption Energy in Wireless Sensor Networks via Optimized Query Processing.
Author(s): Anand Nayyar
Volume: 2
Issue: 5
Year: 2012




A Survey of Sequential Rule Mining Techniques
Author(s): Bhupendra Mandloi
Volume: 2
Issue: 5
Year: 2012




Experimental Investigation of Cotton Seed Oil and Methyl Esters as Biodiesel on C.I. Engine
Author(s): Kaliyaperumal Karthikeyan
Volume: 2
Issue: 5
Year: 2012




A Supervisory Hierarchical Fuzzy Logic controller for Power System Stabilizer
Author(s): Surendra V
Volume: 2
Issue: 5
Year: 2012




An Overview of Association Rule Mining Techniques
Author(s): Hiresh Udiya
Volume: 2
Issue: 5
Year: 2012




SPEECH RECOGNITION - A COMPUTER MEDIATED APPROACH
Author(s): Kaliyaperumal Karthikeyan
Volume: 2
Issue: 5
Year: 2012




Nephele: Dynamic Allocation and Parallel Execution Security Model in Cloud Computing
Author(s): D.CJoy Wise
Volume: 2
Issue: 5
Year: 2012




Problems in Relational Object Oriented Requirement Engineering
Author(s): Anand Mahajan
Volume: 2
Issue: 5
Year: 2012




An Efficient Technique for Sequential Rule Mining
Author(s): Bhupendra Mandloi
Volume: 2
Issue: 5
Year: 2012




PARTIAL REPLACEMENT OF SAND WITH GRAVEL IN SANDCRETE BLOCK PRODUCTION
Author(s): G. K. Oyekan
Volume: 2
Issue: 4
Year: 2012




PHYTOCHEMICAL SCREENING AND ANTIMICROBIAL ACTIVITY OF DETARIUM MICROCARPUM ROOT EXTRACTS OBTAINED IN DEMSA, ADAMAWA STATE NIGERIA.
Author(s): Oliver Maitera
Volume: 2
Issue: 4
Year: 2012




A Fast Algorithm For High Speed Downlink Packet Access
Author(s): Abhishek Raghuvanshi
Volume: 2
Issue: 4
Year: 2012




WORKFLOW MANAGEMENT SYSTEM FOR STUDENTS REGISTRATION
Author(s): Njoku Anita
Volume: 2
Issue: 4
Year: 2012



