Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer & Electronics Research

ISSN: 2320--9348


ADD TO MY LIST
 
Sorting algorithms and difference of this algorithms

Author(s): Shirin Abbasloo | Faroukh Koroupi
Volume: 2
Issue: 5
Year: 2013
SURVEY OF MUTUAL EXCLUSION ALGORITHMS

Author(s): Hossein Nick Khah | Faroukh Koroupi | Arash Azizi Mazrae
Volume: 2
Issue: 5
Year: 2013
Design of UART-SPI converter for SOC

Author(s): K. Vinodalakshmi | Divya . | G. Sumalatha
Volume: 2
Issue: 5
Year: 2013
Similarities of Slant in Handwriting of Close Genotypic Family Members

Author(s): Vaibhav Saran | Suneet Kumar | Syeed Ahmed | A K Gupta
Volume: 2
Issue: 5
Year: 2013
SEQUENTIAL MINING: PATTERNS AND ALGORITHMS ANALYSIS

Author(s): Thabet Slimani | Amor Lazzez
Volume: 2
Issue: 5
Year: 2013
Comparison Between the Performance of Modified Multi-Diagonal Codes (MMD) and OOC Codes using Matlab

Author(s): Abdelkader Bouarfa | Malika Kandouci
Volume: 2
Issue: 5
Year: 2013
Processing Of Incomplete Data Set

Author(s): Mahesh Babanrao Shelke | K.B. Badade
Volume: 2
Issue: 5
Year: 2013
IRIS RECOGNITION FOR ATM BASED APPROACH

Author(s): J. Sowjanya | S. Srivani
Volume: 2
Issue: 4
Year: 2013
METHODS ORIENTED WITH DETECTION OF FRAUD BASED ON CREDIT CARD ANALYSIS

Author(s): Akkineni Sriranjani | Syed Sadat Ali
Volume: 2
Issue: 4
Year: 2013
DESIGN OF RFID BASED ATTRACTION OF TOURISTMONITORING SYSTEM

Author(s): Kommula Sahithya Devi | R. Bharath
Volume: 2
Issue: 4
Year: 2013
INTERNET ROUTING BASED MULTIPATH MEASUREMENT ANALYSIS ORIENTATION

Author(s): M. Sateesh | B. Sudhakar
Volume: 2
Issue: 4
Year: 2013
DATA PUBLISHING AND PRIVACY MAINTENANCE BY AN APPROACH ORIENTED SLICING

Author(s): Addagarla Harica | G. Minni
Volume: 2
Issue: 4
Year: 2013
A Review on Similarity Measure View Point Oriented Clustering

Author(s): M.Vinaya Babu | K.J. Sarma
Volume: 2
Issue: 4
Year: 2013
A RESOURCEFUL PRIVACY SAFEGUARDING METHOD AGAINST TRAFFIC ANALYSIS ATTACKS

Author(s): S.Venkata Subbaiah | A. Pravallika
Volume: 2
Issue: 4
Year: 2013
AN EFFICIENT DEPICTION OF DENIAL OF SERVICE ATTACKS IN WIRELESS NETWORKS

Author(s): A.Dastagiri Reddy | Y. Madhusekhar
Volume: 2
Issue: 4
Year: 2013
TEXTURE DEPICTION SUBSEQUENT TO VISUAL PERCEPTION

Author(s): P. Rajitha | Y. Madhusekhar
Volume: 2
Issue: 4
Year: 2013
MEASURING WEIGHT MISUSE BY EFFECTIVE M-SCORE PHENOMENA

Author(s): Narendra Karampudi | Syed Sadat Ali
Volume: 2
Issue: 4
Year: 2013
A Project Report on Mining Based User Oriented Online Recommendation

Author(s): Rekha Bantu | V. Narmada | S. Aparna | V.Murali Mohan
Volume: 2
Issue: 4
Year: 2013
A SYSTEM BASED DRIVER ASSISTANCE FOR EFFECTIVE DETECTION OF PEDESTRIAN

Author(s): Bodigari Rakesh | P. Prakash
Volume: 2
Issue: 4
Year: 2013
Network Oriented Blocking Followed by Misbehaving Oriented Phenomena

Author(s): Moghal Yaseen Pasha | Moghal Irfan Pasha
Volume: 2
Issue: 4
Year: 2013
SIGNIFYING SENTENCE FRAMEWORK IN MACHINE LEARNING METHOD FOR INFORMATION MINING

Author(s): V.Praveen Kumar | V.V.R.L.S. Gangadhar
Volume: 2
Issue: 4
Year: 2013
Data Based Text Encrypting in Audio

Author(s): Bommala Suneel Kumar | S. Satyanarayana
Volume: 2
Issue: 4
Year: 2013
SERVICES OF THE CLOUD BASED QUALITY PREDICTION STRATEGY

Author(s): Dandu Jagadeeswar Reddy | Shaik. Abdul
Volume: 2
Issue: 4
Year: 2013
AN APPROACH TOWARDS PUBLISH/SUBSCRIBE SYSTEM FOR WIRELESS NETWORKS

Author(s): Suman Kumar Shriramoju | Jagadeeshwar Madiraju | Adloori Ramesh Babu
Volume: 2
Issue: 4
Year: 2013
AN EFFECTIVE FRAMEWORK FOR DYNAMIC STRATEGY

Author(s): G. Santhosha | B. Deepthi
Volume: 2
Issue: 4
Year: 2013
An Advance towards Standard Utilities for Document Clustering

Author(s): Aggadi Gnanesh | M.Sudhir Kumar | M.Sudhir Kumar
Volume: 2
Issue: 4
Year: 2013
A WELL-ORGANIZED APPROACH TOWARDS SOCIAL TAGGING OF MULTIMEDIA CONTENT

Author(s): M.Praveen Kumar | Manjula Patil
Volume: 2
Issue: 4
Year: 2013
RECOVERING THE PERFORMANCE OF DISPERSED APPLICATIONS WITH DYNAMIC NETWORKS

Author(s): Yadla Kiran Kumar | G.Shiva Krishna
Volume: 2
Issue: 4
Year: 2013
History Search Organization

Author(s): P. Usha | Sheikh Gouse
Volume: 2
Issue: 4
Year: 2013
Cloud Based Integration of the Data by Efficient Outsourcing

Author(s): Darshane Shriniwas Vasudev | N.Pavan Kumar | Md. Anwar Ali
Volume: 2
Issue: 4
Year: 2013
ADVANCEMENT FOR INVOLUNTARY RECONFIGURATION FOR AMPLE RESPONSIBLE STORAGE SYSTEMS

Author(s): Velikanti Kiran Kumar | A. Satchidanandam
Volume: 2
Issue: 4
Year: 2013
OBSTRUCTION OF ACCESS TO DISRUPTIVE CLIENTS IN ANONYMIZING NETWORK SYSTEMS

Author(s): S.K. Alisha | N.G.K. Murthy | P. Pothuraju | D. Srikar
Volume: 2
Issue: 4
Year: 2013
AN EFFECTIVE STRATEGY OF THE PAST LESSON ORIENTED CLOUD

Author(s): M.Suchith Chandra | J. Thirupathi
Volume: 2
Issue: 4
Year: 2013
Queries Based Uncertain Locations across Mean Range Oriented Computation Efficiency

Author(s): G. Pushpa | M.V.Jagannatha Reddy
Volume: 2
Issue: 4
Year: 2013
Scheduling of Virtual Scheme for WSN Lifetime Maximisation

Author(s): P. Sateesh | K.Kiran Kumar
Volume: 2
Issue: 4
Year: 2013
IMAGE CLASSIFICATION FROM SEARCH ENGINE BASED WEB SHARING

Author(s): Sireesha Dhanekula | G. Minni
Volume: 2
Issue: 4
Year: 2013
PROBABILITY OF INITIATION AND IDENTIFYING JAMMING ATTACKS IN WIRELESS NETWORKS

Author(s): T.Charan Singh | Dayakar Kondamudi | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013
DISTRIBUTING SEARCH LOGS A RELATIVE STUDY OF CONFIDENTIALITY GUARANTEES

Author(s): V. Sujeeth | A. Satchidanandam
Volume: 2
Issue: 4
Year: 2013
SAFETY SUPERVISION OF FOCUSSING VITAL AREAS IN CLOUD COMPUTING

Author(s): Sagar Shivaji Sawant | S. Soujanya | G.Charles Babu
Volume: 2
Issue: 4
Year: 2013
A REVIEW ON SAFETY CONCERNS IN SERVICE DELIVERY ILLUSTRATION OF CLOUD COMPUTING

Author(s): M.Vijay Kumar | K.Veera Kishore
Volume: 2
Issue: 4
Year: 2013
EFFECTIVE RETRIEVAL OF THE IMAGES BASED ON THE CONTENT ORIENTED SKETCHES

Author(s): Mahesh T | Syed Yasin
Volume: 2
Issue: 4
Year: 2013
MULTILEVEL CASCADING STATCOM ORIENTED CONTROL OF DC BALANCED VOLTAGE CAPACITOR

Author(s): Vadlamudi Naresh | Ranapanga Saidulu
Volume: 2
Issue: 4
Year: 2013
Data Mining through Time Series Forecasting Algorithm

Author(s): Thudum Venkatesh | Kondabathula DurgaCharan | Krishna Kumar Singh
Volume: 2
Issue: 4
Year: 2013
PREVENTION OF ATTACKS BASED ON DOS AND ITS DETECTION

Author(s): N.Vijaya Sunder Sagar
Volume: 2
Issue: 4
Year: 2013
AN EFFICIENT AND PROTECTED ROUTING PRACTICE FOR HIGH RELIABILITY SENSOR NETWORKS

Author(s): E. Srinivas | M.Ekamabaram Naidu | Pasala Raja Prakasha Rao
Volume: 2
Issue: 4
Year: 2013
A PROJECT REPORT ON EMERGENCY HEALTHCARE BASED MOBILE COMPUTING FRAMEWORK

Author(s): J. Prashanth | Navnath D. Kale | N. Srinivas
Volume: 2
Issue: 4
Year: 2013
DISTRIBUTION OF THE LOAD BASED NETWORK ORIENTED MULTI PATH

Author(s): V.Ramana Babu | G.Chinni Krishna
Volume: 2
Issue: 4
Year: 2013
A Quick Review on Reordering Approaches in Statistical Machine Translation Systems

Author(s): Arefeh Kazemi | Amirhassan Monadjemi | Mohammadali Nematbakhsh
Volume: 2
Issue: 4
Year: 2013
SEARCH SPECIFIC DOMAIN BY A MODEL OF RANKING

Author(s): P.Rama Teja | J.Ravi Kumar
Volume: 2
Issue: 4
Year: 2013
CLOUD BASED STORAGE ORIENTED SECURE SERVICES

Author(s): P. Raghu | M. Sreenu
Volume: 2
Issue: 4
Year: 2013
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Jona
Tangokurs Rapperswil-Jona