View / Download : 32769
S.No. Title Author Pages View Google Scholar
1 The Correlation among Software Complexity Metrics with Case Study Yahya Tashtoush, Mohammed Al-Maolegi, Bassam Arkok 414-419 891 View
2 Performance Analysis of Non- Coherent FSK System with Square Law Combining our Nakagami- m Fading Channel Krishna Chandra Roy , O.P. Roy 420-426 714 View
3 Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System Krishna Chandra Roy, O.P. Roy 427-431 622 View
4 The All Optical New Universal Gate Using TOAD Goutam Kumar Maity, Ashis Kumar Mandal, Supriti Samanta 432-441 1253 View
5 A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment Gaurav, Nitesh Kaushik, Jitender Bhardwaj 442-449 716 View
6 A Study of Cloud Computing in the University Enterprise Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi 450-458 1097 View
7 Deterministic Models for Microarray Gene Expression Profiles V. Bhaskara Murthy, G. Pardha Saradhi Varma 459-468 663 View
8 Study on Physiological Parameter Detection Systems Shruti Madan Kshirsagar, Gyankamal J. Chhajed 469-475 644 View
9 Automatic Reactive Power Control Using FC-TCR Dhruvang R Gayakwad, C. R. Mehta, Samir P. Desai 476-480 638 View
10 An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection Reyadh Naoum, Shatha Aziz, Firas Alabsi 487-493 848 View
11 Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol Sowmya P, V. Anitha 494-501 770 View
12 Combination of Morphological Operations with Structure based Partitioning and grouping for Text String detection from Natural Scenes Vyankatesh V. Rampurkar, Gyankamal J. Chhajed 502-509 1224 View
13 Automatic Ranking of Machine Translation Outputs Using Linguistic Factors Pooja Gupta, Nisheeth Joshi, Iti Mathur 510-517 522 View
14 Technology Implementation in Public Sectors units of Andhra Pradesh Rakesh Phanindra Akula, V. B. Narasimha, M.Chandrashekar 518-523 613 View
15 Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training Mechanism Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami 524-531 927 View
16 Image Processing Algorithms – A Comprehensive Study Mahesh Prasanna K, Shantharama Rai C 532-539 690 View
17 An Efficient Automated English to Bengali Script Conversion Mechanism Enakshi Mukhopadhyay, Priyanka Mazumder, Saberi Goswami, Romit S Beed 540-548 738 View
18 Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region Sonali B. Ulape, Sheetal. A. Takale 549-554 593 View
19 Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium Enterprises Lynnette Magasa, Mphahlele M.I, Awosejo, O.J 555-559 799 View
20 Mining Association Rules to Evade Network Intrusion in Network Audit Data Kamini Nalavade, B.B. Meshram 560-567 618 View
21 Web Search Results Summarization Using Similarity Assessment Sawant V.V. , Takale S.A. 568-574 739 View
22 Preference Based Personalized News Recommender System Mansi Sood, Harmeet Kaur 575-581 514 View
23 A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education S. S. Rai, Anil T. Gaikwad, R.V. Kulkarni 582-587 574 View
24 An Accurate ANFIS-based MPPT for Solar PV System Ahmed Bin-Halabi, Adel Abdennour, Hussein Mashaly 588-595 998 View
25 A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample Kai Li, Lijuan Cui 596-600 1626 View
26 Printed Text Character Analysis Version-II: Optimized optical character recognition for noisy images with the new user training and background detection mechanism Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami 601-610 644 View
27 Design and Modeling of a 3 DOF Machine Marjan Sikandar 611-617 717 View
28 Model Driven Development: Research Issues and Opportunities Mahua Banerjee, Sushil Ranjan Roy, Satya Narayan Singh 618-626 732 View
29 Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet N. Rajesh kumar, P.Mohanapriya, M.Kalaiselvi 627-633 657 View
30 A Survey on Web Spam and Spam 2.0 Ashish Chandra, Mohammad Suaib 634-644 588 View
31 Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption Naida.H.Nazmudeen , Farsana.F.J 645-652 567 View
32 Disease Detection of Cotton Leaves Using Advanced Image Processing Vivek Chaudhari, C. Y. Patil 653-659 623 View
33 Design and Implementation of Image Encryption Algorithm Using Chaos Sandhya Rani M.H., K.L. Sudha 660-664 764 View
34 Conceptual for User Satisfaction with the E-government in North of Jordan Fawzi hasan Altaany, Khalid ahmmad alsoudani 665-672 762 View
35 Curvelet based Image Compression using Support Vector Machine and Core Vector Machine – A Review P. Anandan, R. S. Sabeenian 673-679 771 View
36 ATM, FDDI and Network Intrusion Simulation for Packet Data Networks Shahiruddin, D K Singh, Nidhi Verma, Sugandha Shukla 680-685 658 View
37 Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation S S Riya Rani, I R Anzija, L Shameema Hameed 686-692 715 View
38 Application of High Order X-LMS Filter for Active Noise Control N.V.K.Mahalakshmi, D.Sindhu, B. Ranjith Kumar, N.Santhisri, G. Sowjanya Rao 693-698 595 View
39 Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA Fahad Abdullah Moafa 699-704 682 View
40 Digital Watermarking for Medical Images using Biorthogonal Wavelet Filters and Transformed Watermark Embedding Mahavir Dhoka, Jitendra Kadam 705-712 509 View
41 Low Power State Retention Technique for CMOS VLSI Design K. Mariya Priyadarshini, V. Kailash, M. Abhinaya, K. Prashanthi, Y. Kannaji 713-717 634 View
42 Tessent BSCAN Insertion on 28nm SOC M. A. Wavhal, S. U. Bhandari 718-723 515 View
43 Attack Penetration System for SQL Injection Manju Kaushik, Gazal Ojha 724-732 798 View
44 Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time Urmi Chhajed, Ajay Kumar 733-740 807 View