View / Download : 526421
S.No. Title Author Pages View Google Scholar
1 The Correlation among Software Complexity Metrics with Case Study
Yahya Tashtoush, Mohammed Al-Maolegi, Bassam Arkok 414-419 11770 View
2 Performance Analysis of Non- Coherent FSK System with Square Law Combining our Nakagami- m Fading Channel
Krishna Chandra Roy , O.P. Roy 420-426 11199 View
3 Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System
Krishna Chandra Roy, O.P. Roy 427-431 11913 View
4 The All Optical New Universal Gate Using TOAD
Goutam Kumar Maity, Ashis Kumar Mandal, Supriti Samanta 432-441 11581 View
5 A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment
Gaurav, Nitesh Kaushik, Jitender Bhardwaj 442-449 12664 View
6 A Study of Cloud Computing in the University Enterprise
Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi 450-458 10768 View
7 Deterministic Models for Microarray Gene Expression Profiles
V. Bhaskara Murthy, G. Pardha Saradhi Varma 459-468 12772 View
8 Study on Physiological Parameter Detection Systems
Shruti Madan Kshirsagar, Gyankamal J. Chhajed 469-475 11365 View
9 Automatic Reactive Power Control Using FC-TCR
Dhruvang R Gayakwad, C. R. Mehta, Samir P. Desai 476-480 13064 View
10 An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection
Reyadh Naoum, Shatha Aziz, Firas Alabsi 487-493 11997 View
11 Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol
Sowmya P, V. Anitha 494-501 12771 View
12 Combination of Morphological Operations with Structure based Partitioning and grouping for Text String detection from Natural Scenes
Vyankatesh V. Rampurkar, Gyankamal J. Chhajed 502-509 12575 View
13 Automatic Ranking of Machine Translation Outputs Using Linguistic Factors
Pooja Gupta, Nisheeth Joshi, Iti Mathur 510-517 13366 View
14 Technology Implementation in Public Sectors units of Andhra Pradesh
Rakesh Phanindra Akula, V. B. Narasimha, M.Chandrashekar 518-523 11705 View
15 Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training Mechanism
Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami 524-531 12899 View
16 Image Processing Algorithms – A Comprehensive Study
Mahesh Prasanna K, Shantharama Rai C 532-539 12310 View
17 An Efficient Automated English to Bengali Script Conversion Mechanism
Enakshi Mukhopadhyay, Priyanka Mazumder, Saberi Goswami, Romit S Beed 540-548 12174 View
18 Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region
Sonali B. Ulape, Sheetal. A. Takale 549-554 11451 View
19 Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium Enterprises
Lynnette Magasa, Mphahlele M.I, Awosejo, O.J 555-559 11378 View
20 Mining Association Rules to Evade Network Intrusion in Network Audit Data
Kamini Nalavade, B.B. Meshram 560-567 12812 View
21 Web Search Results Summarization Using Similarity Assessment
Sawant V.V. , Takale S.A. 568-574 12466 View
22 Preference Based Personalized News Recommender System
Mansi Sood, Harmeet Kaur 575-581 11981 View
23 A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education
S. S. Rai, Anil T. Gaikwad, R.V. Kulkarni 582-587 11448 View
24 An Accurate ANFIS-based MPPT for Solar PV System
Ahmed Bin-Halabi, Adel Abdennour, Hussein Mashaly 588-595 11864 View
25 A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample
Kai Li, Lijuan Cui 596-600 11306 View
26 Printed Text Character Analysis Version-II: Optimized optical character recognition for noisy images with the new user training and background detection mechanism
Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami 601-610 11872 View
27 Design and Modeling of a 3 DOF Machine
Marjan Sikandar 611-617 11990 View
28 Model Driven Development: Research Issues and Opportunities
Mahua Banerjee, Sushil Ranjan Roy, Satya Narayan Singh 618-626 12528 View
29 Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet
N. Rajesh kumar, P.Mohanapriya, M.Kalaiselvi 627-633 12101 View
30 A Survey on Web Spam and Spam 2.0
Ashish Chandra, Mohammad Suaib 634-644 11388 View
31 Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption
Naida.H.Nazmudeen , Farsana.F.J 645-652 12629 View
32 Disease Detection of Cotton Leaves Using Advanced Image Processing
Vivek Chaudhari, C. Y. Patil 653-659 11206 View
33 Design and Implementation of Image Encryption Algorithm Using Chaos
Sandhya Rani M.H., K.L. Sudha 660-664 13658 View
34 Conceptual for User Satisfaction with the E-government in North of Jordan
Fawzi hasan Altaany, Khalid ahmmad alsoudani 665-672 12824 View
35 Curvelet based Image Compression using Support Vector Machine and Core Vector Machine – A Review
P. Anandan, R. S. Sabeenian 673-679 11448 View
36 ATM, FDDI and Network Intrusion Simulation for Packet Data Networks
Shahiruddin, D K Singh, Nidhi Verma, Sugandha Shukla 680-685 12220 View
37 Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation
S S Riya Rani, I R Anzija, L Shameema Hameed 686-692 13722 View
38 Application of High Order X-LMS Filter for Active Noise Control
N.V.K.Mahalakshmi, D.Sindhu, B. Ranjith Kumar, N.Santhisri, G. Sowjanya Rao 693-698 11209 View
39 Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA
Fahad Abdullah Moafa 699-704 11164 View
40 Digital Watermarking for Medical Images using Biorthogonal Wavelet Filters and Transformed Watermark Embedding
Mahavir Dhoka, Jitendra Kadam 705-712 10169 View
41 Low Power State Retention Technique for CMOS VLSI Design
K. Mariya Priyadarshini, V. Kailash, M. Abhinaya, K. Prashanthi, Y. Kannaji 713-717 13174 View
42 Tessent BSCAN Insertion on 28nm SOC
M. A. Wavhal, S. U. Bhandari 718-723 10425 View
43 Attack Penetration System for SQL Injection
Manju Kaushik, Gazal Ojha 724-732 10976 View
44 Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time
Urmi Chhajed, Ajay Kumar 733-740 10119 View