International Journal of Advanced Computer Research ISSN (Print): 2249-7277    ISSN (Online): 2277-7970 Volume-4 Issue-15 June-2014
  1. 6136
    Citations

S.No. Title Author Pages View Google Scholar
1

The Correlation among Software Complexity Metrics with Case Study

Yahya Tashtoush, Mohammed Al-Maolegi, Bassam Arkok

414 -419

13884

View
2

Performance Analysis of Non- Coherent FSK System with Square Law Combining our Nakagami- m Fading Channel

Krishna Chandra Roy , O.P. Roy

420 -426

13103

View
3

Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System

Krishna Chandra Roy, O.P. Roy

427 -431

14157

View
4

The All Optical New Universal Gate Using TOAD

Goutam Kumar Maity, Ashis Kumar Mandal, Supriti Samanta

432 -441

13380

View
5

A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment

Gaurav, Nitesh Kaushik, Jitender Bhardwaj

442 -449

15096

View
6

A Study of Cloud Computing in the University Enterprise

Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi

450 -458

12777

View
7

Deterministic Models for Microarray Gene Expression Profiles

V. Bhaskara Murthy, G. Pardha Saradhi Varma

459 -468

15389

View
8

Study on Physiological Parameter Detection Systems

Shruti Madan Kshirsagar, Gyankamal J. Chhajed

469 -475

13557

View
9

Automatic Reactive Power Control Using FC-TCR

Dhruvang R Gayakwad, C. R. Mehta, Samir P. Desai

476 -480

15342

View
10

An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection

Reyadh Naoum, Shatha Aziz, Firas Alabsi

487 -493

14276

View
11

Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol

Sowmya P, V. Anitha

494 -501

15015

View
12

Combination of Morphological Operations with Structure based Partitioning and grouping for Text String detection from Natural Scenes

Vyankatesh V. Rampurkar, Gyankamal J. Chhajed

502 -509

15009

View
13

Automatic Ranking of Machine Translation Outputs Using Linguistic Factors

Pooja Gupta, Nisheeth Joshi, Iti Mathur

510 -517

16439

View
14

Technology Implementation in Public Sectors units of Andhra Pradesh

Rakesh Phanindra Akula, V. B. Narasimha, M.Chandrashekar

518 -523

14058

View
15

Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training Mechanism

Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami

524 -531

15431

View
16

Image Processing Algorithms – A Comprehensive Study

Mahesh Prasanna K, Shantharama Rai C

532 -539

14650

View
17

An Efficient Automated English to Bengali Script Conversion Mechanism

Enakshi Mukhopadhyay, Priyanka Mazumder, Saberi Goswami, Romit S Beed

540 -548

14306

View
18

Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region

Sonali B. Ulape, Sheetal. A. Takale

549 -554

13440

View
19

Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium Enterprises

Lynnette Magasa, Mphahlele M.I, Awosejo, O.J

555 -559

13236

View
20

Mining Association Rules to Evade Network Intrusion in Network Audit Data

Kamini Nalavade, B.B. Meshram

560 -567

15168

View
21

Web Search Results Summarization Using Similarity Assessment

Sawant V.V. , Takale S.A.

568 -574

14711

View
22

Preference Based Personalized News Recommender System

Mansi Sood, Harmeet Kaur

575 -581

14678

View
23

A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education

S. S. Rai, Anil T. Gaikwad, R.V. Kulkarni

582 -587

13468

View
24

An Accurate ANFIS-based MPPT for Solar PV System

Ahmed Bin-Halabi, Adel Abdennour, Hussein Mashaly

588 -595

14041

View
25

A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample

Kai Li, Lijuan Cui

596 -600

12951

View
26

Printed Text Character Analysis Version-II: Optimized optical character recognition for noisy images with the new user training and background detection mechanism

Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami

601 -610

14209

View
27

Design and Modeling of a 3 DOF Machine

Marjan Sikandar

611 -617

14448

View
28

Model Driven Development: Research Issues and Opportunities

Mahua Banerjee, Sushil Ranjan Roy, Satya Narayan Singh

618 -626

14712

View
29

Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet

N. Rajesh kumar, P.Mohanapriya, M.Kalaiselvi

627 -633

14248

View
30

A Survey on Web Spam and Spam 2.0

Ashish Chandra, Mohammad Suaib

634 -644

13418

View
31

Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption

Naida.H.Nazmudeen , Farsana.F.J

645 -652

15193

View
32

Disease Detection of Cotton Leaves Using Advanced Image Processing

Vivek Chaudhari, C. Y. Patil

653 -659

13264

View
33

Design and Implementation of Image Encryption Algorithm Using Chaos

Sandhya Rani M.H., K.L. Sudha

660 -664

16330

View
34

Conceptual for User Satisfaction with the E-government in North of Jordan

Fawzi hasan Altaany, Khalid ahmmad alsoudani

665 -672

15215

View
35

Curvelet based Image Compression using Support Vector Machine and Core Vector Machine – A Review

P. Anandan, R. S. Sabeenian

673 -679

13539

View
36

ATM, FDDI and Network Intrusion Simulation for Packet Data Networks

Shahiruddin, D K Singh, Nidhi Verma, Sugandha Shukla

680 -685

15004

View
37

Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation

S S Riya Rani, I R Anzija, L Shameema Hameed

686 -692

16439

View
38

Application of High Order X-LMS Filter for Active Noise Control

N.V.K.Mahalakshmi, D.Sindhu, B. Ranjith Kumar, N.Santhisri, G. Sowjanya Rao

693 -698

13297

View
39

Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA

Fahad Abdullah Moafa

699 -704

13457

View
40

Digital Watermarking for Medical Images using Biorthogonal Wavelet Filters and Transformed Watermark Embedding

Mahavir Dhoka, Jitendra Kadam

705 -712

12120

View
41

Low Power State Retention Technique for CMOS VLSI Design

K. Mariya Priyadarshini, V. Kailash, M. Abhinaya, K. Prashanthi, Y. Kannaji

713 -717

15754

View
42

Tessent BSCAN Insertion on 28nm SOC

M. A. Wavhal, S. U. Bhandari

718 -723

12268

View
43

Attack Penetration System for SQL Injection

Manju Kaushik, Gazal Ojha

724 -732

13038

View
44

Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time

Urmi Chhajed, Ajay Kumar

733 -740

12089

View
TamuBetMPOATMPengembang Mahjong Ways 2 Menambahkan Fitur CuanPola Repetitif Mahjong Ways 1Pergerakan RTP Mahjong WinsRumus Pola Khusus Pancingan Scatter HitamAkun Cuan Mahjong Jadi Variasi Terbaru