Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computers & Technology

ISSN: 2277--3061
Publisher: Council for Innovative Research


ADD TO MY LIST
 
ANALYSIS OF SUCCESS DRIVERS OF E-HEALTH INFRASTRUCTURE AND USE: A NATIONAL LEVEL STUDY

Author(s): KALLOL K. BAGCHI | Godwin J. Udo
Volume: 5
Issue: 2
Year: 2013
Intrusion Detection Techniques based on Cross Layer For Wireless Local Area Networks

Author(s): Dr. Vinod Kumar | Mr Sandeep Agarwal | Mr Avtar Singh
Volume: 5
Issue: 2
Year: 2013
Multi-Agent System Overview: Architectural Designing using Practical Approach

Author(s): Mohamed Osama Khozium
Volume: 5
Issue: 2
Year: 2013
PERFORMANCE ANALYSIS OF EFFECT RATE OF CROSS LAYER BASED INTRUSION DETECTION FOR WIRELESS LAN

Author(s): Dr. Vinod Kumar | Mr Avtar Singh | Mrs. Ritika Narang
Volume: 5
Issue: 2
Year: 2013
EXTENDING THE VISUAL CRYPTOGRAPHY ALGORITHM USING IMAGE WATERMARKING TECHNIQUE

Author(s): Dilip Kumar Kotthapalli | Dr. V.R. Anitha
Volume: 5
Issue: 2
Year: 2013
THE CHALLENGE OF IMPLEMENTING SCRUM AGILE METHODOLOGY IN A TRADITIONAL DEVELOPMENT ENVIRONMENT

Author(s): Renato Takeki Nishijima | Prof. Dr. José Gonçalo Dos Santos
Volume: 5
Issue: 2
Year: 2013
AN EFFICIENT MEMORY MANAGEMENT TECHNIQUE FOR SMART CARD OPERATING SYSTEM

Author(s): Shardha Porwal | Himanshu Mittal
Volume: 5
Issue: 2
Year: 2013
Maintainability Evaluation of Object-Oriented Software System Using Clustering Techniques

Author(s): Astha Mehra | Sanjay Kumar Dubey
Volume: 5
Issue: 2
Year: 2013
DEFINING QUALITY CRITERIA IN SITUATIONAL METHOD ENGINEERING

Author(s): Samir Azzouz | Naoufel Kraiem | Henda Ben Ghezala
Volume: 5
Issue: 2
Year: 2013
Simulation Tool for Queuing Models: QSIM

Author(s): Dr. Pratiksha Saxena | Lokesh Sharma
Volume: 5
Issue: 2
Year: 2013
Implementation of Brain Tumor Segmentation in brain MR Images using K-Means Clustering and Fuzzy C-Means Algorithm

Author(s): Ms. Pritee Gupta | Ms Mrinalini Shringirishi | Dr.yashpal Singh
Volume: 5
Issue: 1
Year: 2013
Privacy and Security Issues In Mobile Social Networking and in Modern Shopping Experience

Author(s): Sanjeev Kulkarni | Kirna Kumari | Naheeda Kittur
Volume: 5
Issue: 1
Year: 2013
ONTOLOGY BASED CLASSIFICATION AND CLUSTERING OF RESEARCH PROPOSALS AND EXTERNAL RESEARCH REVIEWERS

Author(s): Preet Kaur | Richa Sapra
Volume: 5
Issue: 1
Year: 2013
Performance Comparison Between Various Tuning Strategies: Ciancone, Cohen Coon & Ziegler- Nicholas Tuning Methods

Author(s): Ashok Kumar | Rajbir Morya | Dr. Munish Vashishath
Volume: 5
Issue: 1
Year: 2013
BUILDING LEXICON FOR TELUGU SPEECH RECOGNITION

Author(s): K. V. N. Sunitha | A. Sharada
Volume: 5
Issue: 1
Year: 2013
Image Steganography Based On Optimal LSB Pixel Adjustment Method

Author(s): Gowtham Prasad T V S | Dr. S Varadarajan | Dr. S.A.K Jilani | Dr. G N Kodandaramaiah
Volume: 5
Issue: 1
Year: 2013
VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS

Author(s): Nutakki Praveena | Dr. Ujwal A. Lanjewar | Chilakalapudi Meher Babu
Volume: 5
Issue: 1
Year: 2013
A Comprehensive review of Artificial Bee Colony Algorithm

Author(s): Kamalam Balasubramani | Karnan Marcus
Volume: 5
Issue: 1
Year: 2013
Study of Effect of Variations in slot dimensions on Fractal Patch antenna Performance

Author(s): Somesh Kumar | Ms. Monika
Volume: 5
Issue: 1
Year: 2013
The Analysis of Mobile WiMAX and LTE using MIMO technique

Author(s): Roopali Garg | Shafi Singla
Volume: 5
Issue: 1
Year: 2013
Fuzzy-based Leader Selection for Topology Controlled PEGASIS Protocol for Lifetime Enhancement in Wireless Sensor Network

Author(s): Vibha Nehra | Raju Pal | Ajay K Sharma
Volume: 4
Issue: 3
Year: 2013
Dispersion Compensation In Optical Communication - A Review.

Author(s): Er. Abhishek Sharma | Er. Sukhbir Singh | Er. Bhubneshwar Sharma
Volume: 4
Issue: 3
Year: 2013
Implementing Clustering Based Approach for Evaluation of Success of Software Reuse using K-means algorithm

Author(s): Jagmeet Kaur | Dr. Dheerendra Singh
Volume: 4
Issue: 3
Year: 2013
Steganography: Securing Message in wireless network

Author(s): A H M Kamal
Volume: 4
Issue: 3
Year: 2013
A Study of Distance Metrics in Histogram Based Image Retrieval

Author(s): Abhijeet Kumar Sinha | K.K. Shukla
Volume: 4
Issue: 3
Year: 2013
STUDENTS LEARNING PATHS AS ‘DYNAMIC ENCEPHALOGRAPHS’ OF THEIR COGNITIVE DEVELOPMENT

Author(s): Stavroula Patsiomitou
Volume: 4
Issue: 3
Year: 2013
SW-SDF based privacy preserving data classification

Author(s): Kiran P | Kavya N. P.
Volume: 4
Issue: 3
Year: 2013
Fault Tolerant Heterogeneous Limited Duplication Scheduling algorithm for Decentralized Grid

Author(s): DR. NITIN | Neha Agarwal | Piyush Chauhan
Volume: 4
Issue: 3
Year: 2013
A View of Cloud Computing

Author(s): Bhagwan Singh | Sumeet Dhawan | Anish Arora | Abhishek Patail
Volume: 4
Issue: 2
Year: 2013
A Methodology for Enhancing Template Extraction accuracy Of Heterogeneous Web Pages

Author(s): Vidya Kadam | Prof. Prakash R. Devale
Volume: 4
Issue: 2
Year: 2013
Feature Level Fusion of Multimodal Biometrics for Personal Authentication: A Review

Author(s): Dapinder kaur | Gaganpreet Kaur
Volume: 4
Issue: 2
Year: 2013
Segmentation of Palmprint into Region of Interest (ROI): A Survey

Author(s): Sneha M. Ramteke | Prof. S. S. Hatkar
Volume: 4
Issue: 2
Year: 2013
Enhanced discussion on different techniques of spam detection

Author(s): Gurmeet Maan | Gaurav Tak
Volume: 4
Issue: 2
Year: 2013
HIGH SPEED CARRY SAVE MULTIPLIER BASED LINEAR CONVOLUTION USING VEDIC MATHAMATICS

Author(s): Bharathi Reddy | D. Leela Rani | Prof. S. Varadarajan
Volume: 4
Issue: 2
Year: 2013
Security from Denial of Sleep Attack in Wireless Sensor Network

Author(s): Simerpreet Kaur | Md. Ataullah | Monika Garg
Volume: 4
Issue: 2
Year: 2013
OPEN SOURCE SIMULATOR FOR NETWORK ON CHIP

Author(s): Monika Gupta | S. R. Biradar | B. P. Singh
Volume: 4
Issue: 2
Year: 2013
Determination of Optimal Number of Relays Using a New Energy Model for WSN

Author(s): Partha Pratim Bhattacharya | Shilpi Gupta | Nupur Pal
Volume: 4
Issue: 2
Year: 2013
ANALYSIS AND COMPARISION OF SRG AND DFIG FOR WIND GENERATION APPLICATION

Author(s): Dr. N. C. Lenin | K. Prathap
Volume: 4
Issue: 2
Year: 2013
Evaluating the Effectiveness of Self and Peer Assessment using PBL on Student Performance and Preference: Malaysian’s Experience

Author(s): CHE KU NURAINI CHE KU MOHD | Faaizah Shahbodin
Volume: 4
Issue: 2
Year: 2013
DESIGN OF CMOS LOW DROP-OUT REGULATORS: A COMPARATIVE STUDY

Author(s): Ashvani Kumar Mishra | Rishikesh Pandey
Volume: 4
Issue: 2
Year: 2013
A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY

Author(s): Bohar Singh | Mandeep Kaur | Chetan Batra
Volume: 4
Issue: 2
Year: 2013
Online Signature Verification: State of the art

Author(s): Ibrahim El-Henawy | Magdy Rashad | Omima Nomir | Kareem Ahmed
Volume: 4
Issue: 2
Year: 2013
Providing security for Web Service Composition using Finite State Machine

Author(s): Priya Sundar | R Raju | P Mahalakshmi | G Lalitha
Volume: 4
Issue: 2
Year: 2013
CONCEPTUAL THREE PHASE KDD MODEL AND FINANCIAL RESEARCH

Author(s): Dr. Simmi Bagga
Volume: 4
Issue: 2
Year: 2013
Incremental Frequent Pattern Mining using Graph based approach

Author(s): Sanjay Patel | Dr. Ketan Kotecha
Volume: 4
Issue: 2
Year: 2013
RELATIVE STUDY OF SOLVERS FOR FINITE ELEMENT ANALYSIS

Author(s): Harpal Singh
Volume: 4
Issue: 2
Year: 2013
RPA Switzerland

RPA Switzerland

Robotic process automation

    

Tango Rapperswil
Tango Rapperswil