International Journal of Advanced Computer Research ISSN (Print): 2249-7277    ISSN (Online): 2277-7970 Volume-4 Issue-15 June-2014
  1. 5979
    Citations

S.No. Title Author Pages View Google Scholar
1

The Correlation among Software Complexity Metrics with Case Study

Yahya Tashtoush, Mohammed Al-Maolegi, Bassam Arkok

414 -419

13883

View
2

Performance Analysis of Non- Coherent FSK System with Square Law Combining our Nakagami- m Fading Channel

Krishna Chandra Roy , O.P. Roy

420 -426

13086

View
3

Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System

Krishna Chandra Roy, O.P. Roy

427 -431

14140

View
4

The All Optical New Universal Gate Using TOAD

Goutam Kumar Maity, Ashis Kumar Mandal, Supriti Samanta

432 -441

13377

View
5

A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment

Gaurav, Nitesh Kaushik, Jitender Bhardwaj

442 -449

15072

View
6

A Study of Cloud Computing in the University Enterprise

Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi

450 -458

12753

View
7

Deterministic Models for Microarray Gene Expression Profiles

V. Bhaskara Murthy, G. Pardha Saradhi Varma

459 -468

15376

View
8

Study on Physiological Parameter Detection Systems

Shruti Madan Kshirsagar, Gyankamal J. Chhajed

469 -475

13546

View
9

Automatic Reactive Power Control Using FC-TCR

Dhruvang R Gayakwad, C. R. Mehta, Samir P. Desai

476 -480

15339

View
10

An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection

Reyadh Naoum, Shatha Aziz, Firas Alabsi

487 -493

14267

View
11

Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol

Sowmya P, V. Anitha

494 -501

15010

View
12

Combination of Morphological Operations with Structure based Partitioning and grouping for Text String detection from Natural Scenes

Vyankatesh V. Rampurkar, Gyankamal J. Chhajed

502 -509

15003

View
13

Automatic Ranking of Machine Translation Outputs Using Linguistic Factors

Pooja Gupta, Nisheeth Joshi, Iti Mathur

510 -517

16427

View
14

Technology Implementation in Public Sectors units of Andhra Pradesh

Rakesh Phanindra Akula, V. B. Narasimha, M.Chandrashekar

518 -523

14035

View
15

Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training Mechanism

Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami

524 -531

15415

View
16

Image Processing Algorithms – A Comprehensive Study

Mahesh Prasanna K, Shantharama Rai C

532 -539

14649

View
17

An Efficient Automated English to Bengali Script Conversion Mechanism

Enakshi Mukhopadhyay, Priyanka Mazumder, Saberi Goswami, Romit S Beed

540 -548

14294

View
18

Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region

Sonali B. Ulape, Sheetal. A. Takale

549 -554

13435

View
19

Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium Enterprises

Lynnette Magasa, Mphahlele M.I, Awosejo, O.J

555 -559

13223

View
20

Mining Association Rules to Evade Network Intrusion in Network Audit Data

Kamini Nalavade, B.B. Meshram

560 -567

15155

View
21

Web Search Results Summarization Using Similarity Assessment

Sawant V.V. , Takale S.A.

568 -574

14679

View
22

Preference Based Personalized News Recommender System

Mansi Sood, Harmeet Kaur

575 -581

14666

View
23

A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education

S. S. Rai, Anil T. Gaikwad, R.V. Kulkarni

582 -587

13460

View
24

An Accurate ANFIS-based MPPT for Solar PV System

Ahmed Bin-Halabi, Adel Abdennour, Hussein Mashaly

588 -595

14026

View
25

A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample

Kai Li, Lijuan Cui

596 -600

12937

View
26

Printed Text Character Analysis Version-II: Optimized optical character recognition for noisy images with the new user training and background detection mechanism

Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami

601 -610

14206

View
27

Design and Modeling of a 3 DOF Machine

Marjan Sikandar

611 -617

14433

View
28

Model Driven Development: Research Issues and Opportunities

Mahua Banerjee, Sushil Ranjan Roy, Satya Narayan Singh

618 -626

14708

View
29

Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet

N. Rajesh kumar, P.Mohanapriya, M.Kalaiselvi

627 -633

14233

View
30

A Survey on Web Spam and Spam 2.0

Ashish Chandra, Mohammad Suaib

634 -644

13403

View
31

Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption

Naida.H.Nazmudeen , Farsana.F.J

645 -652

15191

View
32

Disease Detection of Cotton Leaves Using Advanced Image Processing

Vivek Chaudhari, C. Y. Patil

653 -659

13257

View
33

Design and Implementation of Image Encryption Algorithm Using Chaos

Sandhya Rani M.H., K.L. Sudha

660 -664

16324

View
34

Conceptual for User Satisfaction with the E-government in North of Jordan

Fawzi hasan Altaany, Khalid ahmmad alsoudani

665 -672

15196

View
35

Curvelet based Image Compression using Support Vector Machine and Core Vector Machine – A Review

P. Anandan, R. S. Sabeenian

673 -679

13531

View
36

ATM, FDDI and Network Intrusion Simulation for Packet Data Networks

Shahiruddin, D K Singh, Nidhi Verma, Sugandha Shukla

680 -685

14992

View
37

Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation

S S Riya Rani, I R Anzija, L Shameema Hameed

686 -692

16430

View
38

Application of High Order X-LMS Filter for Active Noise Control

N.V.K.Mahalakshmi, D.Sindhu, B. Ranjith Kumar, N.Santhisri, G. Sowjanya Rao

693 -698

13289

View
39

Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA

Fahad Abdullah Moafa

699 -704

13439

View
40

Digital Watermarking for Medical Images using Biorthogonal Wavelet Filters and Transformed Watermark Embedding

Mahavir Dhoka, Jitendra Kadam

705 -712

12109

View
41

Low Power State Retention Technique for CMOS VLSI Design

K. Mariya Priyadarshini, V. Kailash, M. Abhinaya, K. Prashanthi, Y. Kannaji

713 -717

15742

View
42

Tessent BSCAN Insertion on 28nm SOC

M. A. Wavhal, S. U. Bhandari

718 -723

12262

View
43

Attack Penetration System for SQL Injection

Manju Kaushik, Gazal Ojha

724 -732

13028

View
44

Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time

Urmi Chhajed, Ajay Kumar

733 -740

12076

View
Jangan Ragukan Kegacoran Mahjong Ways 2Fitur Luar Biasa Yang Mengubah Nasib Dalam 7 MenitLedakan Cuan Mahjong Ways 2 Adalah SeniMahjong Ways Emang Gak Ada LawanPola Spiral Di Mahjong Wins 3 Mancing Perkalian Gila-Gilaan