Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Technology and Applications

ISSN: 2229--6093
Publisher: Technopark Publications


ADD TO MY LIST
 
Generic Architecture for Mobile Check System PDF available

Author(s): KARIMA MAAZOUZ | HABIB.BENLAHMER | NACEUR.ACHTAICH
Volume: 04
Issue: 06
Year: 2013
Design and Developmet of Fixture with Cantilever beam for Intermediate Gearbox PDF available

Author(s): K.PRABHAKAR | Dr .M. ASHOK KUMAR | E.V.SUBBAREDDY | S.KASIMVALI
Volume: 04
Issue: 06
Year: 2013
An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman coding PDF available

Author(s): Dr. T. Bhaskara Reddy | Hema Suresh Yaragunti | T. Sri Harish Reddy | Dr. S. Kiran
Volume: 04
Issue: 06
Year: 2013
A Simple Algorithm for Eye Detection and Cursor Control PDF available

Author(s): Surashree Kulkarni | Sagar Gala
Volume: 04
Issue: 06
Year: 2013
Encryption Quality Analysis in MPEG Video Format PDF available

Author(s): Priyanka Sharma | Dinesh Goyal
Volume: 04
Issue: 06
Year: 2013
Exploiting Maximum Value and Energy Awareness in Real-Time Scheduling PDF available

Author(s): Gangman Yi
Volume: 02
Issue: 06
Year: 2011
Methods and Techniques to Protect the Privacy Information in Privacy Preservation Data Mining PDF available

Author(s): N.Punitha | R.Amsaveni
Volume: 02
Issue: 06
Year: 2011
Analysis of BER Degradation for Transmitted Downlink DSCDMA Signals PDF available

Author(s): Ashok Ch | Murali Mohan K V | David Solomon Raju Y
Volume: 02
Issue: 06
Year: 2011
Survey on Visual backchannel for web events based on cloud computing PDF available

Author(s): Santhosh.kola | SanjibkumarNayak
Volume: 02
Issue: 06
Year: 2011
Non-linear Filter for Digital Image De-Noising PDF available

Author(s): Ranjeet Kaur | P.S.Maan
Volume: 02
Issue: 06
Year: 2011
Performance Analysis of DYMO, LANMAR, STAR Routing Protocols for Grid Placement model with varying Network Size PDF available

Author(s): Harish Shakywar | Sanjeev Sharma | Santoh Sahu
Volume: 02
Issue: 06
Year: 2011
Generation of new Fractals for SINE Function PDF available

Author(s): Rajeshri Rana | Yashwant Singh Chauhan | Ashish Negi
Volume: 02
Issue: 06
Year: 2011
Remote Procedures Calls Implementing using Distributed Algorithm PDF available

Author(s): G. MURALI | K.ANUSHA | A. SHIRISHA | S.SRAVYA
Volume: 02
Issue: 06
Year: 2011
Graphical Simulation of N Queens Problem PDF available

Author(s): G. Murali | Sadia Naureen | Y.Abhigna Reddy | M.Swetha Reddy
Volume: 02
Issue: 06
Year: 2011
Multiple Features Subset Selection using Meta-Heuristic Function PDF available

Author(s): L. S. Maurya | Susheel Jain
Volume: 02
Issue: 06
Year: 2011
A Review on Awareness of Decentralized QOS Using Wireless Checkpointing In MoG PDF available

Author(s): Thanmayee.T
Volume: 02
Issue: 06
Year: 2011
Blind Channel Equalization Based On Constant Power Criterion PDF available

Author(s): D. Lalitha Kumari | S.Sreekanth | B.Janardhana Rao
Volume: 02
Issue: 06
Year: 2011
QOS Enhancement for OFDM System Using Queuing Theory and an Optimized Estimator PDF available

Author(s): P.V.N. Lakshmi | Prof.K.Ashok kumar
Volume: 02
Issue: 06
Year: 2011
Design and Analysis of Software fault-Tolerant techniques for Softcore processors in reliable SRAM based FPGA PDF available

Author(s): Vatsya Tiwari | Prof. Pratap Singh Patwal
Volume: 02
Issue: 06
Year: 2011
Semantic Search Engine: A Survey PDF available

Author(s): Anusree.ramachandran | R.Sujatha
Volume: 02
Issue: 06
Year: 2011
Network Security Scanner PDF available

Author(s): G. Murali | M.Pranavi | Y.Navateja | K.Bhargavi
Volume: 02
Issue: 06
Year: 2011
Cloud Computing and Online Operating System PDF available

Author(s): Mohit Jain | Mohd. Danish | Hemant Yadav
Volume: 02
Issue: 06
Year: 2011
Dynamic Routing with Security Considerations PDF available

Author(s): G. Murali | D. Pavan | V.V. Rajesh Reddy | P. Bharath kumar
Volume: 02
Issue: 06
Year: 2011
A New Pattern Recognition Approach Based on Color Structure and Image Euclidean Distances PDF available

Author(s): Ravendra Singh | Niresh Sharma
Volume: 02
Issue: 06
Year: 2011
Effect of Applied Magnetic Field on Pulsatile Flow of Blood in a Porous Channel PDF available

Author(s): Sarfraz Ahmed | Dusmanta Kumar Sut
Volume: 02
Issue: 06
Year: 2011
Study the Micropolar Fluid Flow near the Stagnation on a Vertical Plate with Prescribed Wall Heat Flux PDF available

Author(s): Gitima Patowary | Dusmanta Kumar Sut
Volume: 02
Issue: 06
Year: 2011
Transform Coefficient Histogram and Edge Preserving Image Enhancement Using Contrast Entropy PDF available

Author(s): K. Sundar Srinivas | K. Naga Lakshmi Kalyani
Volume: 02
Issue: 06
Year: 2011
Context Based Word Sense Extraction in Text PDF available

Author(s): Ranjeetsingh S.Suryawanshi | Prof.D. M. Thakore
Volume: 02
Issue: 06
Year: 2011
A Fast String Matching Algorithm PDF available

Author(s): H N Verma | Ravendra Singh
Volume: 02
Issue: 06
Year: 2011
Differentiated Coverage Based Key Management Scheme for Heterogeneous Sensor Networks PDF available

Author(s): R.Vijay Kumar Reddy | Subba Rao Peram | Raghunath Akkineni
Volume: 02
Issue: 06
Year: 2011
Analysis of Incremental Growth in Image Steganography Techniques for Various Parameters PDF available

Author(s): Rajkumar Yadav
Volume: 02
Issue: 06
Year: 2011
A New Framework for improving low Quality Fingerprint Images PDF available

Author(s): JitendraChoudhary | Dr.Sanjeev Sharma | Jitendra Singh Verma
Volume: 02
Issue: 06
Year: 2011
A Review Of Various Attacks On Biometrics System And Their Known Solutions PDF available

Author(s): Kamaldeep
Volume: 02
Issue: 06
Year: 2011
Fusion of Iris and Retina Using Rank-Level Fusion Approach PDF available

Author(s): A. Kavitha | N. Radha
Volume: 02
Issue: 06
Year: 2011
A Novel Approach of Image Encoding and Hiding using Spiral Scanning and Wavelet Based Alpha-Blending Technique PDF available

Author(s): Nilanjan Dey | Sourav Samanta | Anamitra Bardhan Roy
Volume: 02
Issue: 06
Year: 2011
A Novel Processor Architecture for Pairing Based Cryptography Applications PDF available

Author(s): Ravi Kumar. K | K. Bhavya Deepthi | K. Gowtham | T. Yamini
Volume: 02
Issue: 06
Year: 2011
Hierarchial key management scheme in mobile ad hoc networks PDF available

Author(s): M.Poongodi | L.Manjula | S.Pradeepkumar
Volume: 02
Issue: 06
Year: 2011
Information Retrieval Issues on the World Wide Web PDF available

Author(s): Ashraf Ali | Dr. Israr Ahmad
Volume: 02
Issue: 06
Year: 2011
IEEE 802.11x, and WEP, EAP,WPA / WPA2 PDF available

Author(s): A.S.Rumale | Dr. D. N. Chaudhari
Volume: 02
Issue: 06
Year: 2011
Performance Evaluation of Agent-based Upstream Congestion Control Approach in WSN PDF available

Author(s): V. Vijaya Raja | R. Rani Hemamalini | A. Jose Anand
Volume: 02
Issue: 06
Year: 2011
A Comparative Study of Stemming Algorithms PDF available

Author(s): Anjali Ganesh Jivani
Volume: 02
Issue: 06
Year: 2011
Improvement of Performance of Mobile AD HOC Network using K- Path Splittable Traffic flow Scheme PDF available

Author(s): Sushil Chandra Dimri | Kamlesh C. Purohit | Durgesh Pant
Volume: 02
Issue: 06
Year: 2011
Network Resilience through Multiple Routing Configurations PDF available

Author(s): Naga Raju Pamidi | Y.Srinivasa Rao
Volume: 02
Issue: 06
Year: 2011
Self-Test Techniques in SoC for Low Power Consumption PDF available

Author(s): M.Venkateswara Rao | N.SaiSravani | S.P.V.A.Brahmanandam
Volume: 02
Issue: 06
Year: 2011
A Proposed method for EDGE Detection of and Image Based on Self-Similarity Parameterisation by Fractal Coding PDF available

Author(s): Sri Shimal Das | Dr. Dibyendu Ghoshal
Volume: 02
Issue: 06
Year: 2011
Implementation of Unified Power Flow Controller (UPFC) for Power Quality Improvement in IEEE 14-Bus System PDF available

Author(s): Arup Ratan Bhowmik | Champa Nandi
Volume: 02
Issue: 06
Year: 2011
Fuzzy logic for Software Effort Estimation Using Polynomial Regression as Firing Interval

Author(s): J.N.V.R Swarup Kumar | Aravind Mandala | M. Vishnu Chaitanya | G.V.S.N.R.V Prasad
Volume: 02
Issue: 06
Year: 2011
Applied Taxonomy Techniques Intended for Strenuous Random Forest Robustness PDF available

Author(s): Tarannum A. Bloch | Prof. V.B.Vaghela | Dr.K.H.Wandra
Volume: 02
Issue: 06
Year: 2011
Elasticity Variation under Rest State Environment In Case of Internet Traffic Sharing in Computer Network PDF available

Author(s): Diwakar Shukla | Sharad Gangele | Kapil Verma | Manish Trivedi
Volume: 02
Issue: 06
Year: 2011
Information Extraction Tools for Portable Document Format PDF available

Author(s): Sarang Pitale | Tripti Sharma
Volume: 02
Issue: 06
Year: 2011
Power Aware Live Migration for Data Centers in Cloud using Dynamic Threshold PDF available

Author(s): Richa Sinha | Nidhi Purohit | Hiteshi Diwanji
Volume: 02
Issue: 06
Year: 2011
Link Adaptation and Recursive Estimation for GPRS Wirless Networks PDF available

Author(s): Swarna Kumari K | Prasanna S | David Solomon Raju Y
Volume: 02
Issue: 06
Year: 2011
Information Security Using Blend of Steganography and Cryptography PDF available

Author(s): Rajkumar Yadhav
Volume: 02
Issue: 06
Year: 2011
Improving Quantitative Measurements using Different Segmentation Techniques for Satellite Images PDF available

Author(s): K. Ravi Kumar | K. Kavindra Kumar | R.S.V.M.Krishna | P. K. Bharadwaj
Volume: 02
Issue: 06
Year: 2011
Analysis of Pulsatile Flow of Blood in a Porous Channel under Effect of Magnetic Field PDF available

Author(s): Mitali Sarma | Dusmanta Kumar Sut
Volume: 02
Issue: 06
Year: 2011
Handoff Management Scheme using PHMIPv6 in Mobile ADHOC Networks PDF available

Author(s): K.Swetha | V.Malsoru
Volume: 02
Issue: 06
Year: 2011
High Throughput AES Encryption Algorithm Implementation on FPGA PDF available

Author(s): Gurmail Singh | Rajesh Mehra
Volume: 02
Issue: 06
Year: 2011
Open source tools: Empowered the e-learning pedagogy in distance education PDF available

Author(s): M. U. Bokhari | Iqrar Ahmad
Volume: 02
Issue: 06
Year: 2011
Iris recognition: An emerging security environment for human identification PDF available

Author(s): M.Daris Femila | A. Anthony Irudhayaraj
Volume: 02
Issue: 06
Year: 2011
A Genetic Based Non-Invertible Cryptographic Key Generation From Cancelable Biometric in MANET PDF available

Author(s): Manisha Mehta | Hiteishi Diwanji | Jagdish S Shah
Volume: 02
Issue: 06
Year: 2011
A Survey on Digital Video Watermarking PDF available

Author(s): Swati Patel | Anilkumar Katharotiya | Mahesh Goyani
Volume: 02
Issue: 06
Year: 2011
Mining of Emerging Pattern: Discovering Frequent itemsets in a Stock Data PDF available

Author(s): Mukesh Kumar | Arvind Kalia
Volume: 02
Issue: 06
Year: 2011
A Multi-threaded Neural Network approach for Steganography PDF available

Author(s): Srinivasan SP
Volume: 02
Issue: 06
Year: 2011
COCOMO based on Clean room Development Methodology PDF available

Author(s): Mahesh Bahadur Singh | Hradesh Kumar | Anendra Kumar
Volume: 02
Issue: 06
Year: 2011
An Efficient Load Balancing Algorithm for a Distributed Computer Systems PDF available

Author(s): K.Kungumaraj | Dr. T.Ravichandran
Volume: 02
Issue: 06
Year: 2011
Re-Ranking Process for Image Based Retrieval Using Geometric Techniques PDF available

Author(s): Ravi Tej Kumar Maguluri | Podila Manoj | S.Roja Ramani | K.Naga Prakash | K.Ravi Kumar
Volume: 02
Issue: 06
Year: 2011
Proactive Secret Sharing Scheme for Mobile Ad-hoc Networks PDF available

Author(s): Chauhan Gargi K | H. M. Diwanji
Volume: 02
Issue: 06
Year: 2011
Multi Relational Data Mining Classification Processions – A Survey PDF available

Author(s): Prof. Saurabh Tandel | Prof. Vimal Vaghela | Dr. Nilesh Modi | Dr. Kalpesh Vandra
Volume: 02
Issue: 06
Year: 2011
Survey on Architecture of Peer-to-Peer Network PDF available

Author(s): Kaushik Adhikary | Amit Bindal | Gurmanjeet Kaur
Volume: 02
Issue: 06
Year: 2011
Searching an XML File and its Context in a Folder PDF available

Author(s): Priyanka suram | Dr.V.Janaki | Suma Patra | Nalubala Deepika
Volume: 02
Issue: 06
Year: 2011
Security Conformance for the Dynamically Routed Data PDF available

Author(s): Suma Patra | Dr.V.Janaki | Priyanka suram | Nalubala Ranjeeth Kumar
Volume: 02
Issue: 06
Year: 2011
Behavioural Business Intelligence Framework Based on Online Buying Behaviour in Indian Context: A Knowledge Management Approach PDF available

Author(s): Archana Shrivastava | Dr. Ujwal Lanjewar
Volume: 02
Issue: 06
Year: 2011
Attrition and Retention of Employees in BPO Sector PDF available

Author(s): Ankita Srivastava | Yogesh Tiwari | Hradesh Kumar
Volume: 02
Issue: 06
Year: 2011
A Survey On Meta Search Engine in Semantic Web PDF available

Author(s): G.Sudeepthi | Prof. M.Surendra Prasad Babu
Volume: 02
Issue: 06
Year: 2011
An Implementation and Comparative Analysis of PID Controller and their Auto tuning method Considering uncertainty for the Robust Control of Concentration in CSTR PDF available

Author(s): Er. Farhad Aslam | Er. Lava Kumar Sinha | Dr. Dipak Ranjan Jana
Volume: 02
Issue: 06
Year: 2011
Testing Of Network Intrusion Detection System PDF available

Author(s): B.S.Chaitanya Vamsee Pavan | M.Nalini Sri | Jagadeep Vegunta
Volume: 02
Issue: 06
Year: 2011
CDRAMM: Character And Digit Recognition Aided by Mathematical Morphology PDF available

Author(s): Richa Sharma | Arun Jain | Ritika Sharma | Jyoti Wadhwa
Volume: 04
Issue: 05
Year: 2013
Understanding various Techniques for Background Subtraction and Implementation of Shadow Detection PDF available

Author(s): Harsha Varwani | Heena Choithwani | Tina Gyanchandani | Dashrath Mane | Kajal Sahatiya | Shruti Gangan
Volume: 04
Issue: 05
Year: 2013
Comparative study of Barcode, QR-code and RFID System PDF available

Author(s): Trupti Lotlikar | Rohan Kankapurkar | Anand Parekar | Akshay Mohite
Volume: 04
Issue: 05
Year: 2013
An Efficient Approach Optimized Performance with SAP Net Weaver BI Accelerator PDF available

Author(s): Prof.B.Lakshma Reddy | Dr.T.Bhaskara Reddy | M.Victoria Hebseeba | Dr. S.Kiran
Volume: 04
Issue: 05
Year: 2013
Efficient Machine Learning Approach for Contour-Based Image Segmentation PDF available

Author(s): D. Baswaraj | Dr. A. Govardhan | Dr. P. Premchand
Volume: 04
Issue: 05
Year: 2013
Symptoms Based Detection and Removal of Bot Processes PDF available

Author(s): T Ravi Prasad | Adepu Sridhar
Volume: 04
Issue: 05
Year: 2013
Performance Evaluation of Real Time database Systems in Distributed Environment PDF available

Author(s): Shetan Ram Choudhary | C.K. Jha
Volume: 04
Issue: 05
Year: 2013
Intricate Port Scanning PDF available

Author(s): Pratik Kanani | Hiral Raveshiya
Volume: 04
Issue: 05
Year: 2013
A Comparative Analysis of Low Power and Area Efficient Digital Circuit Design PDF available

Author(s): B. Dilli Kumar | A. Chandra Babu | V. Prasad
Volume: 04
Issue: 05
Year: 2013
The Formalization of the Problem area, Implementation and Maintenance of Business process by a group of unmanned vehicles PDF available

Author(s): Kuandykov A.A | Kassenkhan A.M | Mukazhanov N.K | Kozhamzharova D.K | Kalpeeva Zh.B | Sholpanbaev A.T
Volume: 04
Issue: 05
Year: 2013
Natural Language Processing PDF available

Author(s): Preeti | BrahmaleenKaurSidhu
Volume: 04
Issue: 05
Year: 2013
Classification Algorithms in Intrusion Detection System: A Survey PDF available

Author(s): V. Jaiganesh | Dr. P. Sumathi | A.Vinitha
Volume: 04
Issue: 05
Year: 2013
Automated Parking Management System Using License Plate Recognition PDF available

Author(s): Deepak Harjani | Mohita Jethwani | Nikita Keswaney | Sheba Jacob
Volume: 04
Issue: 05
Year: 2013
Enabling Higher Education Leaders towards an Effective Web Presence Strategy PDF available

Author(s): Steve Fudally | Dr. Rao Nemani
Volume: 04
Issue: 05
Year: 2013
Application Specific Text Relations using Real Time Group Editors PDF available

Author(s): K.Kumar | B.Vijayalakshmi
Volume: 04
Issue: 05
Year: 2013
Gesture Based Authentication System PDF available

Author(s): Deepak Nair
Volume: 04
Issue: 05
Year: 2013
An Efficient Salt and Pepper noise Removal and Edge preserving Scheme for Image Restoration PDF available

Author(s): Mohd Dilshad Ansari | Garima Singh | Arjun Singh | Ashwani Kumar
Volume: 03
Issue: 05
Year: 2012
The Design of FPGA Implementation of 16-Tap FIR Filter using Improved DA Algorithm PDF available

Author(s): K.Tirupathaiah | K.Rajasekhar | D.krishna,M.Tech
Volume: 03
Issue: 05
Year: 2012
Efficiency of k-Means and K-Medoids Algorithms for Clustering Arbitrary Data Points PDF available

Author(s): Dr. T. VELMURUGAN
Volume: 03
Issue: 05
Year: 2012
Approaches to Ontology Based Algorithms for Clustering Text Documents PDF available

Author(s): V.Sureka | S.C.Punitha
Volume: 03
Issue: 05
Year: 2012
Observing the Protection of Confidential Location System for WSNs PDF available

Author(s): RAJITHA JAMPALA | JOHNSON KOLLURI
Volume: 03
Issue: 05
Year: 2012
Grid Scheduling Strategy using GA (GSSGA) PDF available

Author(s): Dr.D.I.George Amalarethinam | F.Kurus Malai Selvi
Volume: 03
Issue: 05
Year: 2012
Contrast Enhancement and Smoothing Using Histogram Modification Method for Medical Images PDF available

Author(s): Manali S. Rathi | Atul H. Karode | Shekhar R. Suralkar
Volume: 03
Issue: 05
Year: 2012
A New Holistic Algorithm and Application for XML Tree Pattern Matching PDF available

Author(s): K. SRIDHAR | SATYA SANDEEP KANUMALLI | T.ANIL KUMAR
Volume: 03
Issue: 05
Year: 2012
Relative Study of CGS with ACO and BCO Swarm Intelligence Techniques PDF available

Author(s): T.Hashni | T.Amudha
Volume: 03
Issue: 05
Year: 2012
Design and Implementation of Series Micro Strip Patch Antenna Array for Wireless Communication PDF available

Author(s): Priya Upadhyay | Richa Sharma
Volume: 03
Issue: 05
Year: 2012
Synchronization Scheme in Multimedia and Hypermedia Application Development PDF available

Author(s): R. N. Jugele | Dr. V. N. Chavan
Volume: 03
Issue: 05
Year: 2012
An Efficient Reversible Design of BCD Adder PDF available

Author(s): T.S.R.Krishna Prasad | Y.Satyadev
Volume: 03
Issue: 05
Year: 2012
Making Method of the Data Processing System in the Experiment of the Planck Constant Measuring with Photoelectric Effect PDF available

Author(s): JIANG Xing-fang | LIYan-ji | JIANG Hong
Volume: 03
Issue: 05
Year: 2012
Event Sequence Analysis using Self Organizing Map PDF available

Author(s): Dharmendra Kaushik | Babita Kubde
Volume: 03
Issue: 05
Year: 2012
Realising State Model for Air Seperation unit using Subspace Identification Method PDF available

Author(s): P A NAGESWARA RAO | P MALLIKARJUNA RAO | B RAJESH KUMAR
Volume: 03
Issue: 05
Year: 2012
A UPFC damping control scheme using Lead-Lag and ANN based Adaptive controllers PDF available

Author(s): D. Ramesh | L.V.MaheshBabu
Volume: 03
Issue: 05
Year: 2012
Fault-Tolerant Identification in Wireless Sensor Networks for Maximizing System Lifetime PDF available

Author(s): Middela Shailaja | AnandaRaj S.P | Poornima.S
Volume: 03
Issue: 05
Year: 2012
An Efficient CBIR System for Gray Scale Image Based on Local Row and Column Mean PDF available

Author(s): Madhavi kshatri | Prof.Yogesh Ratore
Volume: 03
Issue: 05
Year: 2012
Human Computer Interaction – A Modern Overview PDF available

Author(s): Rachit Gupta
Volume: 03
Issue: 05
Year: 2012
A Novel Approach to Conquer Inference Problems and Inference Risks in Secured Database PDF available

Author(s): K. Karthikeyan | Dr. T. Ravichandran
Volume: 03
Issue: 05
Year: 2012
A Survey on Congestion Control and Maximization of Throughput in Wireless Networks PDF available

Author(s): K.Ravindra Babu | J.Ranga Rao
Volume: 03
Issue: 05
Year: 2012
Web Document Clustering Using KEA-Means Algorithm PDF available

Author(s): Swapnali Ware | N.A.Dhawas
Volume: 03
Issue: 05
Year: 2012
Strenthening Hash Functions using Block Symmetric Key Encryption Algorithm PDF available

Author(s): Richa Purohit | Yogendra Singh | Dr. Upendra Mishra | Dr. Abhay Bansal
Volume: 03
Issue: 05
Year: 2012
A Survey on Security Issues and Threat Models in the Cloud PDF available

Author(s): S.Neelima | Y. Lakshmi Prasanna | M.Padmavathi
Volume: 03
Issue: 05
Year: 2012
Design of Fuzzy Logic Controller to Enhance the Operation of Cricket Bowling Machine PDF available

Author(s): Manas Yetirajam | Manas Ranjan Nayak | Dr.Subhagata Chattopadhyay
Volume: 03
Issue: 05
Year: 2012
The Web Page Prediction by "TRP" Machine PDF available

Author(s): Sourabh Mayria
Volume: 03
Issue: 05
Year: 2012
A Comparative Evaluation of Cryptographic Algorithms PDF available

Author(s): Kumar Saurabh | Ravinder singh Mann
Volume: 03
Issue: 05
Year: 2012
Avi Sorting Network PDF available

Author(s): Avinash Bansal | Kamal Gupta
Volume: 03
Issue: 05
Year: 2012
Wireless Sensor Networks Issues and Applications PDF available

Author(s): Rajkumar | Vani B A | Kiran Jadhav | Vidya S
Volume: 03
Issue: 05
Year: 2012
Data Access by Data Intrusion PDF available

Author(s): SarathChand P.V | VenuMadhav K | Mahendra Arya Bhanu | Rajalakshmi Selvaraj | Laxmaiah.M
Volume: 02
Issue: 05
Year: 2011
Test case Effectiveness of higher order Mutation Testing PDF available

Author(s): Shalini Kapoor
Volume: 02
Issue: 05
Year: 2011
Automatic Identification used in Audio-Visual indexing and Analysis PDF available

Author(s): A. Satish Chowdary | N.Tirupathi | K. Nageswara Rao | K. Nagamani
Volume: 02
Issue: 05
Year: 2011
Data Clustering Method for Very Large Databases using entropy-based algorithm PDF available

Author(s): S.Karunakar | K.Rajesh | Ashraf Ali | K.Nageswara Rao | CH.Srinivas Rao
Volume: 02
Issue: 05
Year: 2011
A Least Square Approach to Analyze usage data for Effective web Personilization PDF available

Author(s): S. S. Patil
Volume: 02
Issue: 05
Year: 2011
On Union and Intersection of Fuzzy Soft Set PDF available

Author(s): Tridiv Jyoti Neog | Dusmanta Kumar Sut
Volume: 02
Issue: 05
Year: 2011
Spatial Intrusion of Mining PDF available

Author(s): SarathChand P.V | Bhukya Shankar Nayak | Rambabu pemula | Nagamani K | Bhukya Ravindranaik,
Volume: 02
Issue: 05
Year: 2011
Multiple Sequence Alignment using Boolean Algebra and Fuzzy Logic:A Comparative Study PDF available

Author(s): Nivit Gill | Shailendra Singh
Volume: 02
Issue: 05
Year: 2011
A Review of Retinal Vessel Segmentation Techniques and Algorithms PDF available

Author(s): Mohd. Imran Khan | Heena Shaikh | Anwar Mohd. Mansuri
Volume: 02
Issue: 05
Year: 2011
Dynamic telecast Routing with Security Intensification PDF available

Author(s): BeerthiSahadev | Panuganti.Srinivas | Ganta.Raju
Volume: 02
Issue: 05
Year: 2011
A Client Level Tool for Concluding Router Packet Forwarding Priority PDF available

Author(s): T.Chandrasekhar | Pallamreddy VenkataSubbaReddy | Sk.Faiz Ahamed
Volume: 02
Issue: 05
Year: 2011
Image Watermarking Techniques in Spatial Domain: A Review PDF available

Author(s): Alankrita Aggarwal | Monika Singla
Volume: 02
Issue: 05
Year: 2011
Analysis of Coaxial Feeding and Strip Line Feeding on the Performance of the Square Patch Antenna PDF available

Author(s): B.T.P.Madhav | J.Chandrasekhar Rao | K.Nalini | N.Durga Indira
Volume: 02
Issue: 05
Year: 2011
Four Field Motion Adaptive Deinterlacing Algorithm PDF available

Author(s): S.Sreekanth | Y.Chakrapani | Sandeep Pasala
Volume: 02
Issue: 05
Year: 2011
Oriya Multiword Chunking using Lexical knowledge base of verbs PDF available

Author(s): Manoj kumar Jena | S .Mohanty | Rakesh Balabantaray
Volume: 02
Issue: 05
Year: 2011
Metamorphic Testing: Using the Properties of Sut PDF available

Author(s): Amanjot Singh | Sandeep Kang | Shavinder bajwa
Volume: 02
Issue: 05
Year: 2011
Analysis of Frequent Item set Mining on Variant Datasets PDF available

Author(s): Robin Singh Bhadoria | Rohit Bansal | Henry Alexander
Volume: 02
Issue: 05
Year: 2011
Deformation and Improvement of Video Segmentation Based on morphology Using SSD Technique PDF available

Author(s): Ram Kumar Yadav | Dr. Sanjeev Sharma | Jitendra Singh Verma
Volume: 02
Issue: 05
Year: 2011
Dynamic Service Composition in SOA and QoS Related Issues PDF available

Author(s): Shazia Usmani | Naheed Azeem | Asia Samreen
Volume: 02
Issue: 05
Year: 2011
Semi Pixel Difference Method for Digital Image Watermarking With Minimum Degradation in Image Quality PDF available

Author(s): Rajkumar Yadav | Gaurav Chawla | Ravi Saini
Volume: 02
Issue: 05
Year: 2011
VERSIONS OF 802.16 PDF available

Author(s): Rajinder Kumar | Kaushik Adhikary | Mr.Rohit Vaid
Volume: 02
Issue: 05
Year: 2011
Privacy Enhancing and Breach Reduction PDF available

Author(s): SUSHMA RANI.N | TULASI PRASAD | PRASAD KAVITI
Volume: 02
Issue: 05
Year: 2011
High Density Four Transistor SRAM Cell with low Power Consumption PDF available

Author(s): Sushil Bhushan | Shishir Rastogi | Mayank Shastri | Asso. Professor Shyam Akashe | Dr. Sanjay Sharma
Volume: 02
Issue: 05
Year: 2011
Application of MPI for Efficient Detection and Extraction of Features in Video Surveillance PDF available

Author(s): Debmalya Sinha | Gautam Sanya
Volume: 02
Issue: 05
Year: 2011
Performance and Analysis of Directional Edge detectord on 3- planer image Corrupted with Image noise PDF available

Author(s): Shilpa Narula | Ashish Oberoi | Sumit Kaushik | Dr.D.S.Rao
Volume: 02
Issue: 05
Year: 2011
Hardware Enhancement Association Rule with Privacy Preservation PDF available

Author(s): Phani Ratna Sri Redipalli | G.Srinivasa Rao
Volume: 02
Issue: 05
Year: 2011
Study the Effect of Variable Viscosity and Thermal Conductivity of Micropolar Fluid in a Porous Channel PDF available

Author(s): Gitima Patowary | Dusmanta Kumar Sut
Volume: 02
Issue: 05
Year: 2011
Framework for suggesting POPULAR ITEMS to users by Analyzing Randomized Algorithms PDF available

Author(s): Y.Maanasa | V.Kumar | P.Satish Babu
Volume: 02
Issue: 05
Year: 2011
Studies on Fuzzy Logic and Dispositions for Medical Diagnosis PDF available

Author(s): Prof. Sripati Mukhopadhyay | Jyotirmoy Ghosh
Volume: 02
Issue: 05
Year: 2011
Analyzing performance of proactive and reactive routing protocols for Manets PDF available

Author(s): Pakanati venkateswarao | B. Prasad | Dr. S.P.Setty
Volume: 02
Issue: 05
Year: 2011
Data Tagging and Data Locating In Cloud Based SOA PDF available

Author(s): Boopathy.D | R.Srividhya
Volume: 02
Issue: 05
Year: 2011
An Efficient Architecture for 3-D lifting based Discrete Wavelet Transform PDF available

Author(s): M.Janardan | Dr. K ASHOK BABU
Volume: 02
Issue: 05
Year: 2011
Robust Face Detection and Tracking Using Pyramidal Lucas Kanade Tracker Algorithm PDF available

Author(s): Nandita Sethi | Alankrita Aggarwal
Volume: 02
Issue: 05
Year: 2011
A Computational Method for Solving Two Point Boundary Value Problems of Order Four PDF available

Author(s): Yogesh Gupta | Pankaj Kumar Srivastava
Volume: 02
Issue: 05
Year: 2011
Rotation, Scaling and Translation Analysis of Biometric Signature Templates PDF available

Author(s): Aman Chadha | Divya Jyoti | M. Mani Roja
Volume: 02
Issue: 05
Year: 2011
An Analytical Model to evaluate the Approaches of Mobility Management PDF available

Author(s): G.Vijaya Kumar | A.Lakshman Rao
Volume: 02
Issue: 05
Year: 2011
An Interactive System using Association Rule Discovery for Dyeing Processing System PDF available

Author(s): Saravanan M.S | Rama Sree .R.J
Volume: 02
Issue: 05
Year: 2011
An Appliance Approach: RTST to Reduce Cost & Time PDF available

Author(s): Neeraj Kumar | Prof. (Dr.) Ajay Rana
Volume: 02
Issue: 05
Year: 2011
High performance Ordering Scheme for MIMO Transmission PDF available

Author(s): A. Sreekanth | Prof. K ASHOK BABU
Volume: 02
Issue: 05
Year: 2011
Reliable and Efficient flooding Algorithm for Broadcasting in VANET PDF available

Author(s): Vinod Kumar | Meenakshi Bansal
Volume: 02
Issue: 05
Year: 2011
A Survey of Human Cancer Classification using Micro Array Data PDF available

Author(s): G. Sophia Reena | P. Rajeswari
Volume: 02
Issue: 05
Year: 2011
High-Speed Data Rate Controller Using Verilog PDF available

Author(s): K. Harikishore | B.K.V.Prasad | G.V. Ravi Kumar
Volume: 02
Issue: 05
Year: 2011
A Study and Comparison of Automated Techniques for Exudate Detection Using Digital Fundus Images of Human Eye: A Review for Early Identification of Diabetic Retinopathy PDF available

Author(s): M.Ramaswamy | D.Anitha | S.Priya Kuppamal | R.Sudha | S.Fepslin Athish Mon
Volume: 02
Issue: 05
Year: 2011
Performance Evaluation & Application of Smart Antenna in Sensor Networks PDF available

Author(s): Nidhi jain | Dr. R.P. Yadav
Volume: 02
Issue: 05
Year: 2011
Performance Comparison of Single and Multipath Routing Protocols in Adhoc Networks PDF available

Author(s): Deepinder Singh Wadhwa | Tripatjot Singh Panag
Volume: 02
Issue: 05
Year: 2011
Review: Competitive Learning Algorithm of Neural Network PDF available

Author(s): Jithendra Singh Sengar | Niresh Sharma
Volume: 02
Issue: 05
Year: 2011
Secure Digital signature scheme for Image authentication over wireless channels PDF available

Author(s): K SriSwathi | S.Gopi Krishna
Volume: 02
Issue: 05
Year: 2011
Framework to measure and maintain the quality of software using the concept of Code Readability PDF available

Author(s): Rambabu P | Kumar J | Praneeth S | Jyothi B
Volume: 02
Issue: 05
Year: 2011
A Survey on Various Approaches in Document Clustering PDF available

Author(s): K.Sathiyakumari | V.Preamsudha | G.Manimekalai
Volume: 02
Issue: 05
Year: 2011
Role of Metadata in Cyber forensic and status of Indian Cyber Law PDF available

Author(s): Aashish Kumar Purohit | Naveen Hemrajani | Ruchi Dave
Volume: 02
Issue: 05
Year: 2011
Adaptive filtering algorithms for channel equalization and echo cancellation PDF available

Author(s): Swati Dhamija | Akash Tayal
Volume: 02
Issue: 05
Year: 2011
Enhanced EFCI Congestion Control Scheme for ATM Networks PDF available

Author(s): M.Sreenivasulu | Dr. E.V. Prasad | Dr. G.S.S. Raju
Volume: 02
Issue: 05
Year: 2011
Dynamic threshold based Secret Sharing Scheme using polynomial function PDF available

Author(s): R. Varalakshmi | Dr. V. Rhymend Uthariaraj
Volume: 02
Issue: 05
Year: 2011
One Time Password Security through Cryptography For Mobile Banking PDF available

Author(s): Dr.D.S.Rao | Gurleen Kour | Divya Jyoti
Volume: 02
Issue: 05
Year: 2011
Dynamic job Scheduling in Cloud Computing based on horizontal load balancing PDF available

Author(s): Mousumi Paul | Debabrata Samanta | Goutam Sanyal
Volume: 02
Issue: 05
Year: 2011
Segmentation Technique of SAR Imagery using Entropy PDF available

Author(s): Debabrata Samanta | Mousumi Paul | ,Goutam Sanyal
Volume: 02
Issue: 05
Year: 2011
Estimation of Hardware Complexity of Residue Number System for Signal Processing Application PDF available

Author(s): Chaitali Biswas Dutta | Partha Garai | Amitabha Sinha
Volume: 02
Issue: 05
Year: 2011
Resource Management in Distributed System PDF available

Author(s): Shalini Kapoor | Poonam Kashyap
Volume: 02
Issue: 05
Year: 2011
Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing PDF available

Author(s): Vasu Raju | Raj Kumar | Anand Raj
Volume: 02
Issue: 05
Year: 2011
Leaf Disease Grading by Machine Vision and Fuzzy Logic PDF available

Author(s): Sanjeev S Sannakki | Vijay S Rajpurohit | V B Nargund | Arun Kumar R | Prema S Yallur
Volume: 02
Issue: 05
Year: 2011
Secure Routing Protocol for Multi-hop Wireless Networks PDF available

Author(s): Nagaraju Jampani | B.Premamayudu | A.Raghunath
Volume: 02
Issue: 05
Year: 2011
Analysing Cognitive Radio Physical Layer on BER Performance over Rician Fading Channel PDF available

Author(s): Amandeep Kaur Virk | Ajay K Sharma
Volume: 02
Issue: 05
Year: 2011
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks PDF available

Author(s): Rajasekhar Mungara | K.VenkateswaraRao | VenkataSubbaReddy Pallamreddy
Volume: 02
Issue: 05
Year: 2011
Low Bit-Rate Image Compression using Adaptive Down-Sampling technique PDF available

Author(s): V.Swathi | Prof K.Ashok Babu
Volume: 02
Issue: 05
Year: 2011
Identification and Analysis of hard disk drive in digital forensic PDF available

Author(s): Kailash Kumar | Dr. Sanjeev Sofat | Dr. Naveen Aggarwal
Volume: 02
Issue: 05
Year: 2011
Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks PDF available

Author(s): Hamed Jalali Qomi | Mohammad Hesam Tadayon
Volume: 02
Issue: 05
Year: 2011
Wide-Area Traffic: IP Multicast Receiver Handover for Mobile IP Networks PDF available

Author(s): Shaik Raf | Sayeed Yasin
Volume: 02
Issue: 05
Year: 2011
Trustworthy Computing under Identity-Based Encryption PDF available

Author(s): Shabaaz Shaik | M.Srikanth Yadav
Volume: 02
Issue: 05
Year: 2011
Review of Solutions for securing the Vehicular Networks PDF available

Author(s): Upasana Singh | Pardeep Singh
Volume: 02
Issue: 05
Year: 2011
An Overview of on Demand Wirless ADHOC Netorks protocols : DSR & TORA PDF available

Author(s): RAHUL MALHOTRA | GURPREET SINGH
Volume: 02
Issue: 05
Year: 2011
An Approach to Mapping Scientific Workflow in Cloud Computing data centers to Minimize Costs of Workflow Execution PDF available

Author(s): A. Zareie | M.M. Pedram | M. Kelarestaghi | A. kosari
Volume: 02
Issue: 05
Year: 2011
Quantitative Analysis of DSR Routing Algorithm for Carrying Packet Telephony PDF available

Author(s): P.K.Suri | Sandeep Maan
Volume: 02
Issue: 05
Year: 2011
Design of Multiuser CDMA Systems in Fading Channels PDF available

Author(s): J. RAJESH | Prof. K ASHOK BABU
Volume: 02
Issue: 05
Year: 2011
Micro strip Patch Antenna and its Applications: a Survey PDF available

Author(s): Indrasen Singh | Dr. V.S. Tripathi
Volume: 02
Issue: 05
Year: 2011
Three Party Quantum Authenticated Key Distribution Protocol Using Superposition States PDF available

Author(s): K. Sathi Reddy | Raja Kumar Medapati
Volume: 02
Issue: 05
Year: 2011
Priority Based Sceduling Algorithm using Time and Transmission Length in 802.11 Networks PDF available

Author(s): N.Elamathi | Dr.C.Chandrasekar
Volume: 03
Issue: 04
Year: 2012
Performance Evaluation of CLIR and MLIR using Precision Metric Variants PDF available

Author(s): Pothula Sujatha
Volume: 03
Issue: 04
Year: 2012
Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT PDF available

Author(s): Dinesh Kumar | Bhaskar Anand
Volume: 03
Issue: 04
Year: 2012
A Survey on Web Usage Mining: Theory and Applications PDF available

Author(s): P.Nithya | Dr. P.Sumathi
Volume: 03
Issue: 04
Year: 2012
Finding skewness and deskewing scanned document PDF available

Author(s): Sunita Parashar | Sharuti Sogi
Volume: 03
Issue: 04
Year: 2012
Night Image Enhancement using Hybrid of Good and Poor Images PDF available

Author(s): Manpreet Kaur | Sukhwinder Singh
Volume: 03
Issue: 04
Year: 2012
RED Algorithm based Iris Recognition PDF available

Author(s): Mayuri M. Memane | Sanjay R. Ganorkar
Volume: 03
Issue: 04
Year: 2012
Optimization of Word Sense Disambiguation using Clustering in WEKA PDF available

Author(s): Neetu Sharma | Dr. S. Niranjan
Volume: 03
Issue: 04
Year: 2012
Image Interpretation System for Informed Consent to Patients by Use of a Skeletal Tracking PDF available

Author(s): Naoki Kamiya | Hiroki Osaki | Jun Kondo | Huayue Chen | Hiroshi Fujita
Volume: 03
Issue: 04
Year: 2012
Implementation of Concurrent Online MBIST for RFID Memories PDF available

Author(s): SUNIL KUMAR CHALAMACHERLAB | Dr. K.PADMAPRIYA
Volume: 03
Issue: 04
Year: 2012
Moving Object Detection using Frame Interleaving and Clustering based Compression PDF available

Author(s): Sunil Kumar S | Santhosh Rao | Shivaray Pai
Volume: 03
Issue: 04
Year: 2012
Detection of Rogue Base Station in WIMAX/IEEE 802.16 using Sensors PDF available

Author(s): Deepti | Deepika Khokhar
Volume: 03
Issue: 04
Year: 2012
An LMS Based Data Reduction Technique for Energy Conservation in Wireless Sensor Network (WSN) PDF available

Author(s): M. Arun raja | V.Malathi
Volume: 03
Issue: 04
Year: 2012
Low Power Analysis of Network-Level On-chip communication using Asynchronous AMBA protocol PDF available

Author(s): E. Sakthivel | Dr. Malathi
Volume: 03
Issue: 04
Year: 2012
Isolation of Malicious Node in DOS Scenario in MANET PDF available

Author(s): Pooja | Er. Deepika Khokhar
Volume: 03
Issue: 04
Year: 2012
Optimized Reversible carry select BCD adders using Reversible logic gates PDF available

Author(s): Prathibha Rani T.R | H.R.Bhagyalakshmi | M.K.Venkatesha
Volume: 03
Issue: 04
Year: 2012
Traffic Handling Approach with Intelligent Speed Control and Prioritization of Emergency Vehicles using PCM Agent PDF available

Author(s): T.Karthikeyan | N.Sudha Bhuvaneswari | S.Sujatha
Volume: 03
Issue: 04
Year: 2012
COAR: Combining Arc flag with Reach based method for shortest path computation PDF available

Author(s): Thangalatha legaz.C
Volume: 03
Issue: 04
Year: 2012
Performance Comparison of BPSK, PPM and PPV Modulation Based IR-UWB Receiver Using Wide Band LNA PDF available

Author(s): Alpana P. Adsul | Dr. S. K. Bodhe
Volume: 03
Issue: 04
Year: 2012
Communication with Less Hardware PDF available

Author(s): Ambily Joseph | Jaini Sara Babu | K. P. Soman
Volume: 03
Issue: 04
Year: 2012
A Performance Analysis Between AODV & DSR Routing Protocol PDF available

Author(s): Sankalp Bahadur Singh | Bharat Pesswani
Volume: 03
Issue: 04
Year: 2012
Enhancement of the Accuracy of photonic structure of photonic crystal fibre by using Artificial Neural Network PDF available

Author(s): Er. Amandeep Kaur | Dr. Sandeep Singh Gill | Prof. Baljeet Kaur
Volume: 03
Issue: 04
Year: 2012
A Review: Applying Genetic Algorithms for Motif Discovery PDF available

Author(s): Rahul Chauhan | Dr. Pankaj Agarwal
Volume: 03
Issue: 04
Year: 2012
Controller Design using Pade approximation and mixed methods PDF available

Author(s): Parvendra Kumar | Rajendra Prasad
Volume: 03
Issue: 04
Year: 2012
Speech compression and decompression using DWT and DCT PDF available

Author(s): Harmanpreet kaur
Volume: 03
Issue: 04
Year: 2012
Design of Low Power CMOS Circuits using Leakage Control Transistor and Multi-Threshold CMOS Techniques PDF available

Author(s): U. Supriya | K. Ramana Rao
Volume: 03
Issue: 04
Year: 2012
Energy Efficient Routing Protocols in Mobile Ad hoc Networks PDF available

Author(s): Ajay Shah | Hitesh Gupta | Mukesh Baghel
Volume: 03
Issue: 04
Year: 2012
An Improved Feature Based Approach to perform Face and Eye Recognition PDF available

Author(s): Heena Dhawan
Volume: 03
Issue: 04
Year: 2012
A Survey and Evaluation of Edge Detection Operators: Application to Text Recognition PDF available

Author(s): Manoj T H | A Santha Rubia
Volume: 03
Issue: 04
Year: 2012
A Study and Detection of TCP SYN Flood Attacks with IP spoofing and its Mitigations PDF available

Author(s): Deepak Singh Rana | Naveen Garg | Sushil Kumar Chamoli
Volume: 03
Issue: 04
Year: 2012
Measurement of real time Information using GPU PDF available

Author(s): Pooja Sharma | Rajni Billa | Javed Ashraf
Volume: 03
Issue: 04
Year: 2012
A Survey: On Generation of Wireless Telephony Technology PDF available

Author(s): Vimalanathan P | R SriVidya
Volume: 03
Issue: 04
Year: 2012
Secured Way of Encrypted Message Transmission using Audio File PDF available

Author(s): Manoj .T.H | Vimalanathan P | A Santha Rubia | R SriVidya
Volume: 03
Issue: 04
Year: 2012
Energy-Efficient Cooperative Protocol for Wireless Networks PDF available

Author(s): Sagiraju Srinadh Raju | K.Ramesh
Volume: 03
Issue: 04
Year: 2012
Effect of Nanotechnology PDF available

Author(s): D.Baswaraj | Vasanthi, | Sareddy Deepthi | Mohammad Zainuddin
Volume: 03
Issue: 04
Year: 2012
Efficient Routing Strategy for Prioritized Messages in Mobile WSN using Geographic Forwarding Protocol PDF available

Author(s): Manjula.T | Dr.Jitendranath Mungara | Sagarika Behera
Volume: 03
Issue: 04
Year: 2012
Multimedia and Hypermedia: Communication Issues in Open Document Environment PDF available

Author(s): R. N. Jugele | V. N. Chavan
Volume: 03
Issue: 04
Year: 2012
SVM Based Navigation Patterns for Efficient Relevance Feedback in Content Based Image Retrieval PDF available

Author(s): Vaishali Meshram | Prof. Nishchol Mishra | Prof. Sanjeev Sharma
Volume: 03
Issue: 04
Year: 2012
Comparative Analysis of Proposed POBBx-Index Structure PDF available

Author(s): K. Appathurai | Dr. S. Karthikeyan
Volume: 03
Issue: 04
Year: 2012
Grid Computing for Different Applications PDF available

Author(s): Sanjeev Narayan Bal
Volume: 03
Issue: 04
Year: 2012
Advance Source Coding Techniquesfor Audio/Speech Signal: A Survey PDF available

Author(s): Sheetal D. Gunjal | Dr. Rajeshree D. Raut
Volume: 03
Issue: 04
Year: 2012
Terminology-Based Approach: Knowledge Acquisition and Integration in Healthcare PDF available

Author(s): Subiksha.K.P | K.Alagarsamy
Volume: 03
Issue: 04
Year: 2012
Improved Diffie-Hellman Algorithm for Network Security Enhancement PDF available

Author(s): Vishal Garg1 | Rishu
Volume: 03
Issue: 04
Year: 2012
Simulation and Analysis of Reciever-Receiver Time Synchronization in Wireless Sensor Networks PDF available

Author(s): Shashank Bholane | Devendrasingh Thakore
Volume: 03
Issue: 04
Year: 2012
Implementation of New Cell Site in Telecom Sector PDF available

Author(s): Amita Sharma | Monish Gupta
Volume: 03
Issue: 04
Year: 2012
Analysis of Relay Stations in WiMAX Networks PDF available

Author(s): Khan Mubeen Ahmed | Karada Om Prakash
Volume: 03
Issue: 04
Year: 2012
An Overview of Speech Recognition and Speech Synthesis Algorithms PDF available

Author(s): Dr.E.Chandra | A.Akila
Volume: 03
Issue: 04
Year: 2012
Emerging Trends in Quantum Cryptography – A Survey PDF available

Author(s): Vivek.R | Dr.J.Roopchand
Volume: 03
Issue: 04
Year: 2012
A Strategy for Package Transformation for LINUX Environment PDF available

Author(s): Smita Parte
Volume: 03
Issue: 04
Year: 2012
Optimizing and Enhancing Parallel Multi Storage Backup Compression for real Time Database Systems PDF available

Author(s): M. Muthukumar | Dr.T.Ravichandran
Volume: 03
Issue: 04
Year: 2012
A Surbey on Cloud Computing Architecture PDF available

Author(s): Rajpal Choudhary
Volume: 03
Issue: 04
Year: 2012
Performance of AODV against Black Hole Attacks in Mobile ad-hoc Networks PDF available

Author(s): SUSHIL KUMAR CHAMOLI | SANTOSH KUMAR | DEEPAK SINGH RANA
Volume: 03
Issue: 04
Year: 2012
Power-Area trade-off for Different CMOS Design Technologies PDF available

Author(s): Priyadarshini.V | Prof.G.R.L.V.N.Srinivasa Raju
Volume: 03
Issue: 04
Year: 2012
A noval Approach of LSB Steganography for Retreiving text from Audio PDF available

Author(s): G. Bindu | K. Srilakshmi
Volume: 03
Issue: 04
Year: 2012
Agile Plus – Comprehensive model for Software Development PDF available

Author(s): Amit Juyal | Umesh Kumar Tiwari | Lata Nautiyal | Shashidhar G. Koolagudi
Volume: 03
Issue: 04
Year: 2012
Method Designing for Multimedia and Hypermedia Application PDF available

Author(s): R. N. Jugele | Dr. V. N. Chavan
Volume: 03
Issue: 04
Year: 2012
Congestion Control Avoidance in ADHOC Network using Queuing Model PDF available

Author(s): G.Vijaya Lakshmi | Dr. C.Shoba Bindhu
Volume: 02
Issue: 04
Year: 2011
Intelligent Evaluation of Fabrics’ Elastic Properties from Simulated Drape Test PDF available

Author(s): Hassen Hedfi | Adel Ghith | Hédi Bel Hadj Salah
Volume: 02
Issue: 04
Year: 2011
Reletive Distance Mobile AD HOC Networks (RDMAR) PDF available

Author(s): Deepak Kumar | Dr. P.K. Jakhar
Volume: 02
Issue: 04
Year: 2011
An Indexed based Congestion Aware Routing Protocol for Wireless Sensor Networks PDF available

Author(s): S.Janarathanan | M.Kumaran | V.Seedha Devi, | V.Balaji Vijayan
Volume: 02
Issue: 04
Year: 2011
The Role of Quality Assurance in Software Development Projects: Project Failures and Business Performance PDF available

Author(s): Dr. Emmanuel Ichu | Dr. Rao Nemani
Volume: 02
Issue: 04
Year: 2011
An Efficient Architecture of Residue to Binary Converter for New Four- Moduli Set PDF available

Author(s): Sahel Riazi | SOMAYEH HASSANPOUR | MEHDI HOSSEINZADEH
Volume: 02
Issue: 04
Year: 2011
Job Satisfaction: Key Factors Influencing Information Technology (IT) Professionals in Washington DC PDF available

Author(s): Dr. Ify Diala | Dr. Rao Nemani
Volume: 02
Issue: 04
Year: 2011
An Heuristic Approach To Object Oriented Paradigm PDF available

Author(s): Deepali Gupta | Rakesh Kumar
Volume: 02
Issue: 04
Year: 2011
An Implementation of BLOWFISH Encryption Algorithm using KERBEROS Authentication Mechanism PDF available

Author(s): Ch Panchamukesh | Prof.T.Venkat Narayana Rao | A.Vijay Kumar
Volume: 02
Issue: 04
Year: 2011
The Fuzzy Set by Fuzzy Interval PDF available

Author(s): Dr.Pranita Goswami
Volume: 02
Issue: 04
Year: 2011
An Efficient Method for Content Aware Image Resizing Using PSC PDF available

Author(s): K. Thilagam | Dr. S. Karthikeyan
Volume: 02
Issue: 04
Year: 2011
Security Enhancement in MANET with 4G PDF available

Author(s): Deepak Chayal | Dr. Vijay Singh Rathore
Volume: 02
Issue: 04
Year: 2011
Reliable Software Development with Proposed Quality Oriented Software Testing Metrics PDF available

Author(s): Latika Kharb | Dr. Vijay Singh Rathore
Volume: 02
Issue: 04
Year: 2011
A Review of Various Security Protocols in Wireless Sensor Network PDF available

Author(s): Anupma Sangwan | Deepti Sindhu | Kulbir Singh
Volume: 02
Issue: 04
Year: 2011
Unification of Subspace Clustering and Outliers Detection On High Dimensional Data PDF available

Author(s): Sarala.R | Prakruthi.V | Prathibha Annapurna.P | Saranya.S
Volume: 02
Issue: 04
Year: 2011
Shark Fish Classification through Image Processing using Wavelet Transformation and Enhanced Edge Detection Technology PDF available

Author(s): G.T.Shrivakshan | Dr.C. Chandrasekar
Volume: 02
Issue: 04
Year: 2011
A Genetic Optimization approach for finding common Motif in Biological Sequences PDF available

Author(s): Vishal | Shailendra Singh
Volume: 02
Issue: 04
Year: 2011
Heap Base Coordinator Finding with Fault Tolerant Method in Distributed Systems PDF available

Author(s): Mehdi EffatParvar | AmirMasoud Rahmani | MohammadReza EffatParvar | Mehdi Dehghan
Volume: 02
Issue: 04
Year: 2011
PCA based Iris Recognition using DWT PDF available

Author(s): Shashi Kumar D R | K B Raja | R. K Chhootaray | Sabyasachi Pattnaik
Volume: 02
Issue: 04
Year: 2011
Implementation of Data Mining Techniques for Strategic CRM Issues PDF available

Author(s): Babita Chopra | Vivek Bhambri | Balram Krishan
Volume: 02
Issue: 04
Year: 2011
Sec.AODV for MANETs using MD5 with Cryptography PDF available

Author(s): Suketu D. Nayak | Ravindra K. Gupta
Volume: 02
Issue: 04
Year: 2011
Site Content Analyzer in Context of Keyword density and Key Phrase PDF available

Author(s): Yogesh Yadav | Dr. P. K. Yadav
Volume: 02
Issue: 04
Year: 2011
A Texture based Tumor detection and automatic Segmentation using Seeded Region Growing Method PDF available

Author(s): Mukesh Kumar | Kamal K.Mehta
Volume: 02
Issue: 04
Year: 2011
M2S and CAIR Web based Photo Management Solution in Mobile Environment PDF available

Author(s): KIRTI RAHEJA
Volume: 02
Issue: 04
Year: 2011
Implementation of Data Integration using Distributed Systems: A Review PDF available

Author(s): Rakesh Jaitly
Volume: 02
Issue: 04
Year: 2011
Image Enhancement Based on Color Histogram and DCT Approach PDF available

Author(s): Pharindra kumar Sharma | Shalabh Agarwal | Piyush Shrivastava
Volume: 02
Issue: 04
Year: 2011
Image Retrieval Based on Combined features of DCT and Shape Descriptor PDF available

Author(s): Arvind Sharma | Dr.Sanjeev sharma | Nishchol Mishra
Volume: 02
Issue: 04
Year: 2011
An Efficient Method for Landscape Image Classification and Matching Based on MPEG-7 Descriptors PDF available

Author(s): Arvind Sharma | Dr.Sanjeev sharma | Nishchol Mishra
Volume: 02
Issue: 04
Year: 2011
Performance Evaluation of EFCI and ERICA Schemes for ATM Networks PDF available

Author(s): M.Sreenivasulu | Dr. E.V. Prasad | Dr. G.S.S. Raju
Volume: 02
Issue: 04
Year: 2011
Concept of Privacy protection in Data Mining PDF available

Author(s): Vikram Singh | Dr. P.K. Yadav
Volume: 02
Issue: 04
Year: 2011
Classification Techniques used in Speech Recognition Applications: A Review PDF available

Author(s): M.A.Anusuya | S.K.Katti
Volume: 02
Issue: 04
Year: 2011
Improving the Erroe Resilience of region of interest Based Video Coding Schemes PDF available

Author(s): P Subramanian | Dr N R Alamelu | Dr M Aramudhan
Volume: 02
Issue: 04
Year: 2011
A Conceptual Usability Framework for Mobile Service Consumers PDF available

Author(s): Behrouz Sefid Dashti | Jafar Habibi
Volume: 02
Issue: 04
Year: 2011
A New Approach to Mine Frequent Pattern in Spatial Database using TFP-Tree PDF available

Author(s): Kedar Nath Singh | Jitendra Agrawal | Sanjeev Sharma
Volume: 02
Issue: 04
Year: 2011
Protection of Web User’s Privacy by Securing Browser from Web Privacy Attacks PDF available

Author(s): Sanket Baviskar | Dr. P. Santhi Thilagam
Volume: 02
Issue: 04
Year: 2011
A Review on Cryptography Mechanisms PDF available

Author(s): Prof ML Sharma | Er. Sheetal Atri
Volume: 02
Issue: 04
Year: 2011
Performance Comparison of Robust Steganography Based on Multiple Transformation Techniques PDF available

Author(s): K B Shiva Kumar | K B Raja | R K Chhotaray | Sabyasachi Pattnaik
Volume: 02
Issue: 04
Year: 2011
A Signcryption Scheme based on Elliptic Curve Cryptography PDF available

Author(s): R. K. Pateriya | Shreeja Vasudevan
Volume: 02
Issue: 04
Year: 2011
     Think You Can Teach Abroad