International Journal of Advanced Computer Research ISSN (Print): 2249-7277    ISSN (Online): 2277-7970 Volume-4 Issue-15 June-2014
  1. 6035
    Citations

S.No. Title Author Pages View Google Scholar
1

The Correlation among Software Complexity Metrics with Case Study

Yahya Tashtoush, Mohammed Al-Maolegi, Bassam Arkok

414 -419

13884

View
2

Performance Analysis of Non- Coherent FSK System with Square Law Combining our Nakagami- m Fading Channel

Krishna Chandra Roy , O.P. Roy

420 -426

13103

View
3

Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System

Krishna Chandra Roy, O.P. Roy

427 -431

14156

View
4

The All Optical New Universal Gate Using TOAD

Goutam Kumar Maity, Ashis Kumar Mandal, Supriti Samanta

432 -441

13380

View
5

A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment

Gaurav, Nitesh Kaushik, Jitender Bhardwaj

442 -449

15095

View
6

A Study of Cloud Computing in the University Enterprise

Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi

450 -458

12775

View
7

Deterministic Models for Microarray Gene Expression Profiles

V. Bhaskara Murthy, G. Pardha Saradhi Varma

459 -468

15388

View
8

Study on Physiological Parameter Detection Systems

Shruti Madan Kshirsagar, Gyankamal J. Chhajed

469 -475

13557

View
9

Automatic Reactive Power Control Using FC-TCR

Dhruvang R Gayakwad, C. R. Mehta, Samir P. Desai

476 -480

15342

View
10

An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection

Reyadh Naoum, Shatha Aziz, Firas Alabsi

487 -493

14276

View
11

Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol

Sowmya P, V. Anitha

494 -501

15013

View
12

Combination of Morphological Operations with Structure based Partitioning and grouping for Text String detection from Natural Scenes

Vyankatesh V. Rampurkar, Gyankamal J. Chhajed

502 -509

15009

View
13

Automatic Ranking of Machine Translation Outputs Using Linguistic Factors

Pooja Gupta, Nisheeth Joshi, Iti Mathur

510 -517

16439

View
14

Technology Implementation in Public Sectors units of Andhra Pradesh

Rakesh Phanindra Akula, V. B. Narasimha, M.Chandrashekar

518 -523

14056

View
15

Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training Mechanism

Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami

524 -531

15430

View
16

Image Processing Algorithms – A Comprehensive Study

Mahesh Prasanna K, Shantharama Rai C

532 -539

14650

View
17

An Efficient Automated English to Bengali Script Conversion Mechanism

Enakshi Mukhopadhyay, Priyanka Mazumder, Saberi Goswami, Romit S Beed

540 -548

14306

View
18

Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region

Sonali B. Ulape, Sheetal. A. Takale

549 -554

13439

View
19

Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium Enterprises

Lynnette Magasa, Mphahlele M.I, Awosejo, O.J

555 -559

13236

View
20

Mining Association Rules to Evade Network Intrusion in Network Audit Data

Kamini Nalavade, B.B. Meshram

560 -567

15166

View
21

Web Search Results Summarization Using Similarity Assessment

Sawant V.V. , Takale S.A.

568 -574

14707

View
22

Preference Based Personalized News Recommender System

Mansi Sood, Harmeet Kaur

575 -581

14678

View
23

A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education

S. S. Rai, Anil T. Gaikwad, R.V. Kulkarni

582 -587

13467

View
24

An Accurate ANFIS-based MPPT for Solar PV System

Ahmed Bin-Halabi, Adel Abdennour, Hussein Mashaly

588 -595

14041

View
25

A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample

Kai Li, Lijuan Cui

596 -600

12951

View
26

Printed Text Character Analysis Version-II: Optimized optical character recognition for noisy images with the new user training and background detection mechanism

Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami

601 -610

14207

View
27

Design and Modeling of a 3 DOF Machine

Marjan Sikandar

611 -617

14447

View
28

Model Driven Development: Research Issues and Opportunities

Mahua Banerjee, Sushil Ranjan Roy, Satya Narayan Singh

618 -626

14712

View
29

Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet

N. Rajesh kumar, P.Mohanapriya, M.Kalaiselvi

627 -633

14248

View
30

A Survey on Web Spam and Spam 2.0

Ashish Chandra, Mohammad Suaib

634 -644

13418

View
31

Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption

Naida.H.Nazmudeen , Farsana.F.J

645 -652

15193

View
32

Disease Detection of Cotton Leaves Using Advanced Image Processing

Vivek Chaudhari, C. Y. Patil

653 -659

13264

View
33

Design and Implementation of Image Encryption Algorithm Using Chaos

Sandhya Rani M.H., K.L. Sudha

660 -664

16330

View
34

Conceptual for User Satisfaction with the E-government in North of Jordan

Fawzi hasan Altaany, Khalid ahmmad alsoudani

665 -672

15215

View
35

Curvelet based Image Compression using Support Vector Machine and Core Vector Machine – A Review

P. Anandan, R. S. Sabeenian

673 -679

13539

View
36

ATM, FDDI and Network Intrusion Simulation for Packet Data Networks

Shahiruddin, D K Singh, Nidhi Verma, Sugandha Shukla

680 -685

15004

View
37

Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation

S S Riya Rani, I R Anzija, L Shameema Hameed

686 -692

16437

View
38

Application of High Order X-LMS Filter for Active Noise Control

N.V.K.Mahalakshmi, D.Sindhu, B. Ranjith Kumar, N.Santhisri, G. Sowjanya Rao

693 -698

13297

View
39

Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA

Fahad Abdullah Moafa

699 -704

13452

View
40

Digital Watermarking for Medical Images using Biorthogonal Wavelet Filters and Transformed Watermark Embedding

Mahavir Dhoka, Jitendra Kadam

705 -712

12120

View
41

Low Power State Retention Technique for CMOS VLSI Design

K. Mariya Priyadarshini, V. Kailash, M. Abhinaya, K. Prashanthi, Y. Kannaji

713 -717

15754

View
42

Tessent BSCAN Insertion on 28nm SOC

M. A. Wavhal, S. U. Bhandari

718 -723

12268

View
43

Attack Penetration System for SQL Injection

Manju Kaushik, Gazal Ojha

724 -732

13038

View
44

Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time

Urmi Chhajed, Ajay Kumar

733 -740

12088

View
TamuBetTAMUBETMPOATMbongkar taktik world class dan pola rtp terbaik pragmatic pgsoft mengubah strategi andarahasia terbongkar visualisasi pola rtp pgsoft menunjang kemenangan andapahami pola rtp rahasia kunci utama untuk kemenangan besar di mahjong waysDi Mahjong Ways 2 Pola Jadi Strategi Paling MantapHabis 7 Spin Keluarlah Maxwin Mahjong Wins 3Putaran Cuan Di Game Mahjong Ways 15 Hal yang Membuat Mahjong Wins Sering Jadi Bahan Bincangrahasia memanfaatkan rtp mahjong gelombang pola lurus baccarat menuju titik terangraih kemenangan maksimal dengan strategi matematis meningkatkan rtp mahjong waysstrategi rahasia menang besar dengan rtp analisis digital mengubah permainan anda