S.No. |
Title |
Author |
Pages |
View |
Google Scholar |
1 |
The Correlation among Software Complexity Metrics with Case Study
|
Yahya Tashtoush, Mohammed Al-Maolegi, Bassam Arkok |
414-419 |
12862 |
View |
2 |
Performance Analysis of Non- Coherent FSK System with Square Law Combining our Nakagami- m Fading Channel
|
Krishna Chandra Roy , O.P. Roy |
420-426 |
12169 |
View |
3 |
Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System
|
Krishna Chandra Roy, O.P. Roy |
427-431 |
13152 |
View |
4 |
The All Optical New Universal Gate Using TOAD
|
Goutam Kumar Maity, Ashis Kumar Mandal, Supriti Samanta |
432-441 |
12451 |
View |
5 |
A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment
|
Gaurav, Nitesh Kaushik, Jitender Bhardwaj |
442-449 |
14078 |
View |
6 |
A Study of Cloud Computing in the University Enterprise
|
Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi |
450-458 |
11716 |
View |
7 |
Deterministic Models for Microarray Gene Expression Profiles
|
V. Bhaskara Murthy, G. Pardha Saradhi Varma |
459-468 |
14360 |
View |
8 |
Study on Physiological Parameter Detection Systems
|
Shruti Madan Kshirsagar, Gyankamal J. Chhajed |
469-475 |
12604 |
View |
9 |
Automatic Reactive Power Control Using FC-TCR
|
Dhruvang R Gayakwad, C. R. Mehta, Samir P. Desai |
476-480 |
14383 |
View |
10 |
An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection
|
Reyadh Naoum, Shatha Aziz, Firas Alabsi |
487-493 |
13248 |
View |
11 |
Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol
|
Sowmya P, V. Anitha |
494-501 |
13922 |
View |
12 |
Combination of Morphological Operations with Structure based Partitioning and grouping for Text String detection from Natural Scenes
|
Vyankatesh V. Rampurkar, Gyankamal J. Chhajed |
502-509 |
14121 |
View |
13 |
Automatic Ranking of Machine Translation Outputs Using Linguistic Factors
|
Pooja Gupta, Nisheeth Joshi, Iti Mathur |
510-517 |
15237 |
View |
14 |
Technology Implementation in Public Sectors units of Andhra Pradesh
|
Rakesh Phanindra Akula, V. B. Narasimha, M.Chandrashekar |
518-523 |
13068 |
View |
15 |
Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training Mechanism
|
Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami |
524-531 |
14338 |
View |
16 |
Image Processing Algorithms – A Comprehensive Study
|
Mahesh Prasanna K, Shantharama Rai C |
532-539 |
13678 |
View |
17 |
An Efficient Automated English to Bengali Script Conversion Mechanism
|
Enakshi Mukhopadhyay, Priyanka Mazumder, Saberi Goswami, Romit S Beed |
540-548 |
13277 |
View |
18 |
Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region
|
Sonali B. Ulape, Sheetal. A. Takale |
549-554 |
12436 |
View |
19 |
Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium Enterprises
|
Lynnette Magasa, Mphahlele M.I, Awosejo, O.J |
555-559 |
12249 |
View |
20 |
Mining Association Rules to Evade Network Intrusion in Network Audit Data
|
Kamini Nalavade, B.B. Meshram |
560-567 |
14096 |
View |
21 |
Web Search Results Summarization Using Similarity Assessment
|
Sawant V.V. , Takale S.A. |
568-574 |
13592 |
View |
22 |
Preference Based Personalized News Recommender System
|
Mansi Sood, Harmeet Kaur |
575-581 |
13611 |
View |
23 |
A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education
|
S. S. Rai, Anil T. Gaikwad, R.V. Kulkarni |
582-587 |
12486 |
View |
24 |
An Accurate ANFIS-based MPPT for Solar PV System
|
Ahmed Bin-Halabi, Adel Abdennour, Hussein Mashaly |
588-595 |
13005 |
View |
25 |
A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample
|
Kai Li, Lijuan Cui |
596-600 |
12078 |
View |
26 |
Printed Text Character Analysis Version-II: Optimized optical character recognition for noisy images with the new user training and background detection mechanism
|
Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami |
601-610 |
13118 |
View |
27 |
Design and Modeling of a 3 DOF Machine
|
Marjan Sikandar |
611-617 |
13377 |
View |
28 |
Model Driven Development: Research Issues and Opportunities
|
Mahua Banerjee, Sushil Ranjan Roy, Satya Narayan Singh |
618-626 |
13679 |
View |
29 |
Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet
|
N. Rajesh kumar, P.Mohanapriya, M.Kalaiselvi |
627-633 |
13206 |
View |
30 |
A Survey on Web Spam and Spam 2.0
|
Ashish Chandra, Mohammad Suaib |
634-644 |
12430 |
View |
31 |
Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption
|
Naida.H.Nazmudeen , Farsana.F.J |
645-652 |
14118 |
View |
32 |
Disease Detection of Cotton Leaves Using Advanced Image Processing
|
Vivek Chaudhari, C. Y. Patil |
653-659 |
12290 |
View |
33 |
Design and Implementation of Image Encryption Algorithm Using Chaos
|
Sandhya Rani M.H., K.L. Sudha |
660-664 |
15325 |
View |
34 |
Conceptual for User Satisfaction with the E-government in North of Jordan
|
Fawzi hasan Altaany, Khalid ahmmad alsoudani |
665-672 |
14202 |
View |
35 |
Curvelet based Image Compression using Support Vector Machine and Core Vector Machine – A Review
|
P. Anandan, R. S. Sabeenian |
673-679 |
12637 |
View |
36 |
ATM, FDDI and Network Intrusion Simulation for Packet Data Networks
|
Shahiruddin, D K Singh, Nidhi Verma, Sugandha Shukla |
680-685 |
13986 |
View |
37 |
Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation
|
S S Riya Rani, I R Anzija, L Shameema Hameed |
686-692 |
15435 |
View |
38 |
Application of High Order X-LMS Filter for Active Noise Control
|
N.V.K.Mahalakshmi, D.Sindhu, B. Ranjith Kumar, N.Santhisri, G. Sowjanya Rao |
693-698 |
12277 |
View |
39 |
Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA
|
Fahad Abdullah Moafa |
699-704 |
12485 |
View |
40 |
Digital Watermarking for Medical Images using Biorthogonal Wavelet Filters and Transformed Watermark Embedding
|
Mahavir Dhoka, Jitendra Kadam |
705-712 |
11083 |
View |
41 |
Low Power State Retention Technique for CMOS VLSI Design
|
K. Mariya Priyadarshini, V. Kailash, M. Abhinaya, K. Prashanthi, Y. Kannaji |
713-717 |
14737 |
View |
42 |
Tessent BSCAN Insertion on 28nm SOC
|
M. A. Wavhal, S. U. Bhandari |
718-723 |
11349 |
View |
43 |
Attack Penetration System for SQL Injection
|
Manju Kaushik, Gazal Ojha |
724-732 |
12123 |
View |
44 |
Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time
|
Urmi Chhajed, Ajay Kumar |
733-740 |
11038 |
View |