ANALYSIS OF SUCCESS DRIVERS OF E-HEALTH INFRASTRUCTURE AND USE: A NATIONAL LEVEL STUDY
Author(s): KALLOL K. BAGCHI | Godwin J. Udo
Volume: 5
Issue: 2
Year: 2013




Intrusion Detection Techniques based on Cross Layer For Wireless Local Area Networks
Author(s): Dr. Vinod Kumar | Mr Sandeep Agarwal | Mr Avtar Singh
Volume: 5
Issue: 2
Year: 2013




Multi-Agent System Overview: Architectural Designing using Practical Approach
Author(s): Mohamed Osama Khozium
Volume: 5
Issue: 2
Year: 2013




PERFORMANCE ANALYSIS OF EFFECT RATE OF CROSS LAYER BASED INTRUSION DETECTION FOR WIRELESS LAN
Author(s): Dr. Vinod Kumar | Mr Avtar Singh | Mrs. Ritika Narang
Volume: 5
Issue: 2
Year: 2013




EXTENDING THE VISUAL CRYPTOGRAPHY ALGORITHM USING IMAGE WATERMARKING TECHNIQUE
Author(s): Dilip Kumar Kotthapalli | Dr. V.R. Anitha
Volume: 5
Issue: 2
Year: 2013




THE CHALLENGE OF IMPLEMENTING SCRUM AGILE METHODOLOGY IN A TRADITIONAL DEVELOPMENT ENVIRONMENT
Author(s): Renato Takeki Nishijima | Prof. Dr. José Gonçalo Dos Santos
Volume: 5
Issue: 2
Year: 2013




AN EFFICIENT MEMORY MANAGEMENT TECHNIQUE FOR SMART CARD OPERATING SYSTEM
Author(s): Shardha Porwal | Himanshu Mittal
Volume: 5
Issue: 2
Year: 2013




Maintainability Evaluation of Object-Oriented Software System Using Clustering Techniques
Author(s): Astha Mehra | Sanjay Kumar Dubey
Volume: 5
Issue: 2
Year: 2013




DEFINING QUALITY CRITERIA IN SITUATIONAL METHOD ENGINEERING
Author(s): Samir Azzouz | Naoufel Kraiem | Henda Ben Ghezala
Volume: 5
Issue: 2
Year: 2013




Simulation Tool for Queuing Models: QSIM
Author(s): Dr. Pratiksha Saxena | Lokesh Sharma
Volume: 5
Issue: 2
Year: 2013




Implementation of Brain Tumor Segmentation in brain MR Images using K-Means Clustering and Fuzzy C-Means Algorithm
Author(s): Ms. Pritee Gupta | Ms Mrinalini Shringirishi | Dr.yashpal Singh
Volume: 5
Issue: 1
Year: 2013




Privacy and Security Issues In Mobile Social Networking and in Modern Shopping Experience
Author(s): Sanjeev Kulkarni | Kirna Kumari | Naheeda Kittur
Volume: 5
Issue: 1
Year: 2013




ONTOLOGY BASED CLASSIFICATION AND CLUSTERING OF RESEARCH PROPOSALS AND EXTERNAL RESEARCH REVIEWERS
Author(s): Preet Kaur | Richa Sapra
Volume: 5
Issue: 1
Year: 2013




Performance Comparison Between Various Tuning Strategies: Ciancone, Cohen Coon & Ziegler- Nicholas Tuning Methods
Author(s): Ashok Kumar | Rajbir Morya | Dr. Munish Vashishath
Volume: 5
Issue: 1
Year: 2013




BUILDING LEXICON FOR TELUGU SPEECH RECOGNITION
Author(s): K. V. N. Sunitha | A. Sharada
Volume: 5
Issue: 1
Year: 2013




Image Steganography Based On Optimal LSB Pixel Adjustment Method
Author(s): Gowtham Prasad T V S | Dr. S Varadarajan | Dr. S.A.K Jilani | Dr. G N Kodandaramaiah
Volume: 5
Issue: 1
Year: 2013




VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS
Author(s): Nutakki Praveena | Dr. Ujwal A. Lanjewar | Chilakalapudi Meher Babu
Volume: 5
Issue: 1
Year: 2013




A Comprehensive review of Artificial Bee Colony Algorithm
Author(s): Kamalam Balasubramani | Karnan Marcus
Volume: 5
Issue: 1
Year: 2013




Study of Effect of Variations in slot dimensions on Fractal Patch antenna Performance
Author(s): Somesh Kumar | Ms. Monika
Volume: 5
Issue: 1
Year: 2013




The Analysis of Mobile WiMAX and LTE using MIMO technique
Author(s): Roopali Garg | Shafi Singla
Volume: 5
Issue: 1
Year: 2013




Fuzzy-based Leader Selection for Topology Controlled PEGASIS Protocol for Lifetime Enhancement in Wireless Sensor Network
Author(s): Vibha Nehra | Raju Pal | Ajay K Sharma
Volume: 4
Issue: 3
Year: 2013




Dispersion Compensation In Optical Communication - A Review.
Author(s): Er. Abhishek Sharma | Er. Sukhbir Singh | Er. Bhubneshwar Sharma
Volume: 4
Issue: 3
Year: 2013




ANALYSIS OF HUMAN FACE RECOGNITION ALGORITHM USING PCA+FDIT IN IMAGE DATABASE FOR CRIME INVESTIGATION
Author(s): V. S. Manjula
Volume: 4
Issue: 3
Year: 2013




Implementing Clustering Based Approach for Evaluation of Success of Software Reuse using K-means algorithm
Author(s): Jagmeet Kaur | Dr. Dheerendra Singh
Volume: 4
Issue: 3
Year: 2013




Steganography: Securing Message in wireless network
Author(s): A H M Kamal
Volume: 4
Issue: 3
Year: 2013




A Study of Distance Metrics in Histogram Based Image Retrieval
Author(s): Abhijeet Kumar Sinha | K.K. Shukla
Volume: 4
Issue: 3
Year: 2013




Dynamic Energy Aware Gur Game based Algorithms for Self Optimizing Wireless Sensor Networks
Author(s): Nitin Nitin
Volume: 4
Issue: 3
Year: 2013




STUDENTS LEARNING PATHS AS ‘DYNAMIC ENCEPHALOGRAPHS’ OF THEIR COGNITIVE DEVELOPMENT
Author(s): Stavroula Patsiomitou
Volume: 4
Issue: 3
Year: 2013




SW-SDF based privacy preserving data classification
Author(s): Kiran P | Kavya N. P.
Volume: 4
Issue: 3
Year: 2013




Fault Tolerant Heterogeneous Limited Duplication Scheduling algorithm for Decentralized Grid
Author(s): DR. NITIN | Neha Agarwal | Piyush Chauhan
Volume: 4
Issue: 3
Year: 2013




A View of Cloud Computing
Author(s): Bhagwan Singh | Sumeet Dhawan | Anish Arora | Abhishek Patail
Volume: 4
Issue: 2
Year: 2013




A Methodology for Enhancing Template Extraction accuracy Of Heterogeneous Web Pages
Author(s): Vidya Kadam | Prof. Prakash R. Devale
Volume: 4
Issue: 2
Year: 2013




Feature Level Fusion of Multimodal Biometrics for Personal Authentication: A Review
Author(s): Dapinder kaur | Gaganpreet Kaur
Volume: 4
Issue: 2
Year: 2013




Segmentation of Palmprint into Region of Interest (ROI): A Survey
Author(s): Sneha M. Ramteke | Prof. S. S. Hatkar
Volume: 4
Issue: 2
Year: 2013




Enhanced discussion on different techniques of spam detection
Author(s): Gurmeet Maan | Gaurav Tak
Volume: 4
Issue: 2
Year: 2013




HIGH SPEED CARRY SAVE MULTIPLIER BASED LINEAR CONVOLUTION USING VEDIC MATHAMATICS
Author(s): Bharathi Reddy | D. Leela Rani | Prof. S. Varadarajan
Volume: 4
Issue: 2
Year: 2013




Security from Denial of Sleep Attack in Wireless Sensor Network
Author(s): Simerpreet Kaur | Md. Ataullah | Monika Garg
Volume: 4
Issue: 2
Year: 2013




OPEN SOURCE SIMULATOR FOR NETWORK ON CHIP
Author(s): Monika Gupta | S. R. Biradar | B. P. Singh
Volume: 4
Issue: 2
Year: 2013




Determination of Optimal Number of Relays Using a New Energy Model for WSN
Author(s): Partha Pratim Bhattacharya | Shilpi Gupta | Nupur Pal
Volume: 4
Issue: 2
Year: 2013




Artificial Neural Network Based Method for Classification of Gene Expression Data of Human Diseases along with Privacy Preserving
Author(s): Sathish Kumar Subramanian | Duraipandian N
Volume: 4
Issue: 2
Year: 2013




A Graphical Tool Designed to Deploy Wireless Sensors in Homogeneous Grid Selected from Irregular Polygon
Author(s): DR. Nitin
Volume: 4
Issue: 2
Year: 2013




ANALYSIS AND COMPARISION OF SRG AND DFIG FOR WIND GENERATION APPLICATION
Author(s): Dr. N. C. Lenin | K. Prathap
Volume: 4
Issue: 2
Year: 2013




Evaluating the Effectiveness of Self and Peer Assessment using PBL on Student Performance and Preference: Malaysian’s Experience
Author(s): CHE KU NURAINI CHE KU MOHD | Faaizah Shahbodin
Volume: 4
Issue: 2
Year: 2013




DESIGN OF CMOS LOW DROP-OUT REGULATORS: A COMPARATIVE STUDY
Author(s): Ashvani Kumar Mishra | Rishikesh Pandey
Volume: 4
Issue: 2
Year: 2013




A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY
Author(s): Bohar Singh | Mandeep Kaur | Chetan Batra
Volume: 4
Issue: 2
Year: 2013




Online Signature Verification: State of the art
Author(s): Ibrahim El-Henawy | Magdy Rashad | Omima Nomir | Kareem Ahmed
Volume: 4
Issue: 2
Year: 2013




Providing security for Web Service Composition using Finite State Machine
Author(s): Priya Sundar | R Raju | P Mahalakshmi | G Lalitha
Volume: 4
Issue: 2
Year: 2013




CONCEPTUAL THREE PHASE KDD MODEL AND FINANCIAL RESEARCH
Author(s): Dr. Simmi Bagga
Volume: 4
Issue: 2
Year: 2013




Incremental Frequent Pattern Mining using Graph based approach
Author(s): Sanjay Patel | Dr. Ketan Kotecha
Volume: 4
Issue: 2
Year: 2013




RELATIVE STUDY OF SOLVERS FOR FINITE ELEMENT ANALYSIS
Author(s): Harpal Singh
Volume: 4
Issue: 2
Year: 2013



