| S.No. | Title | Author | Pages | View | Google Scholar |
|---|---|---|---|---|---|
| 1 |
The Correlation among Software Complexity Metrics with Case Study |
Yahya Tashtoush, Mohammed Al-Maolegi, Bassam Arkok |
414 -419 |
13885 |
View |
| 2 |
Krishna Chandra Roy , O.P. Roy |
420 -426 |
13103 |
View | |
| 3 |
Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System |
Krishna Chandra Roy, O.P. Roy |
427 -431 |
14157 |
View |
| 4 |
Goutam Kumar Maity, Ashis Kumar Mandal, Supriti Samanta |
432 -441 |
13381 |
View | |
| 5 |
A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment |
Gaurav, Nitesh Kaushik, Jitender Bhardwaj |
442 -449 |
15096 |
View |
| 6 |
Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi |
450 -458 |
12778 |
View | |
| 7 |
Deterministic Models for Microarray Gene Expression Profiles |
V. Bhaskara Murthy, G. Pardha Saradhi Varma |
459 -468 |
15389 |
View |
| 8 |
Shruti Madan Kshirsagar, Gyankamal J. Chhajed |
469 -475 |
13558 |
View | |
| 9 |
Dhruvang R Gayakwad, C. R. Mehta, Samir P. Desai |
476 -480 |
15344 |
View | |
| 10 |
An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection |
Reyadh Naoum, Shatha Aziz, Firas Alabsi |
487 -493 |
14277 |
View |
| 11 |
Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol |
Sowmya P, V. Anitha |
494 -501 |
15016 |
View |
| 12 |
Vyankatesh V. Rampurkar, Gyankamal J. Chhajed |
502 -509 |
15010 |
View | |
| 13 |
Automatic Ranking of Machine Translation Outputs Using Linguistic Factors |
Pooja Gupta, Nisheeth Joshi, Iti Mathur |
510 -517 |
16443 |
View |
| 14 |
Technology Implementation in Public Sectors units of Andhra Pradesh |
Rakesh Phanindra Akula, V. B. Narasimha, M.Chandrashekar |
518 -523 |
14059 |
View |
| 15 |
Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami |
524 -531 |
15432 |
View | |
| 16 |
Mahesh Prasanna K, Shantharama Rai C |
532 -539 |
14651 |
View | |
| 17 |
An Efficient Automated English to Bengali Script Conversion Mechanism |
Enakshi Mukhopadhyay, Priyanka Mazumder, Saberi Goswami, Romit S Beed |
540 -548 |
14307 |
View |
| 18 |
Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region |
Sonali B. Ulape, Sheetal. A. Takale |
549 -554 |
13442 |
View |
| 19 |
Lynnette Magasa, Mphahlele M.I, Awosejo, O.J |
555 -559 |
13237 |
View | |
| 20 |
Mining Association Rules to Evade Network Intrusion in Network Audit Data |
Kamini Nalavade, B.B. Meshram |
560 -567 |
15169 |
View |
| 21 |
Web Search Results Summarization Using Similarity Assessment |
Sawant V.V. , Takale S.A. |
568 -574 |
14715 |
View |
| 22 |
Mansi Sood, Harmeet Kaur |
575 -581 |
14680 |
View | |
| 23 |
A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education |
S. S. Rai, Anil T. Gaikwad, R.V. Kulkarni |
582 -587 |
13469 |
View |
| 24 |
Ahmed Bin-Halabi, Adel Abdennour, Hussein Mashaly |
588 -595 |
14042 |
View | |
| 25 |
A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample |
Kai Li, Lijuan Cui |
596 -600 |
12952 |
View |
| 26 |
Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami |
601 -610 |
14211 |
View | |
| 27 |
Marjan Sikandar |
611 -617 |
14448 |
View | |
| 28 |
Mahua Banerjee, Sushil Ranjan Roy, Satya Narayan Singh |
618 -626 |
14713 |
View | |
| 29 |
Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet |
N. Rajesh kumar, P.Mohanapriya, M.Kalaiselvi |
627 -633 |
14248 |
View |
| 30 |
Ashish Chandra, Mohammad Suaib |
634 -644 |
13419 |
View | |
| 31 |
Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption |
Naida.H.Nazmudeen , Farsana.F.J |
645 -652 |
15194 |
View |
| 32 |
Disease Detection of Cotton Leaves Using Advanced Image Processing |
Vivek Chaudhari, C. Y. Patil |
653 -659 |
13265 |
View |
| 33 |
Design and Implementation of Image Encryption Algorithm Using Chaos |
Sandhya Rani M.H., K.L. Sudha |
660 -664 |
16331 |
View |
| 34 |
Conceptual for User Satisfaction with the E-government in North of Jordan |
Fawzi hasan Altaany, Khalid ahmmad alsoudani |
665 -672 |
15216 |
View |
| 35 |
Curvelet based Image Compression using Support Vector Machine and Core Vector Machine – A Review |
P. Anandan, R. S. Sabeenian |
673 -679 |
13540 |
View |
| 36 |
ATM, FDDI and Network Intrusion Simulation for Packet Data Networks |
Shahiruddin, D K Singh, Nidhi Verma, Sugandha Shukla |
680 -685 |
15004 |
View |
| 37 |
Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation |
S S Riya Rani, I R Anzija, L Shameema Hameed |
686 -692 |
16440 |
View |
| 38 |
Application of High Order X-LMS Filter for Active Noise Control |
N.V.K.Mahalakshmi, D.Sindhu, B. Ranjith Kumar, N.Santhisri, G. Sowjanya Rao |
693 -698 |
13300 |
View |
| 39 |
Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA |
Fahad Abdullah Moafa |
699 -704 |
13458 |
View |
| 40 |
Mahavir Dhoka, Jitendra Kadam |
705 -712 |
12121 |
View | |
| 41 |
K. Mariya Priyadarshini, V. Kailash, M. Abhinaya, K. Prashanthi, Y. Kannaji |
713 -717 |
15755 |
View | |
| 42 |
M. A. Wavhal, S. U. Bhandari |
718 -723 |
12269 |
View | |
| 43 |
Manju Kaushik, Gazal Ojha |
724 -732 |
13039 |
View | |
| 44 |
Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time |
Urmi Chhajed, Ajay Kumar |
733 -740 |
12090 |
View |
