International Journal of Computer Science & Engineering Technology

ISSN : 2229-3345

Open Access
Open Access
March 2013 - IJCSET(ISSN: 2229-3345)
 

VOLUME 4 ISSUE 3

1. Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions
Ashish Patel, Rutvij Jhaveri
Abstract | PDFIconPDF
173-177
2. INTRUSION AWARE GROUP MANAGEMENT SCHEME FOR MANET
P.Sumathi
Abstract | PDFIconPDF
178-184
3. A SURVEY OF DESKTOP GRID SYSTEM SCHEDULING
G Mahesh Kumar
Abstract | PDFIconPDF
185-189
4. A novel high-speed image processing technique for detecting edges using abs- Laplacian kernel
A Ravi Kant
Abstract | PDFIconPDF
190-196
5. Krill Herd Clustering Algorithm using DBSCAN Technique
Varinder Singh, Mrs. Monica Sood
Abstract | PDFIconPDF
197-201
6. A Cluster Based Optimization Technique with Adoptive Framework for ZigBee WSN
S. Balasubramani, Dr. A. Sabari
Abstract | PDFIconPDF
202-207
7. Dynamic Time Quantum in Shortest Job First Scheduling Algorithm (DTQSJF) for Unpredictable Burst Time of Processes
Dibyendu Barman, Iti Sarkar
Abstract | PDFIconPDF
208-212
8. Design of Web Access Interface Design for People with Neuromotor Disorders
Debashis Mandal
Abstract | PDFIconPDF
213-217
9. A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network
Satyam Shrivastava, Sonali Jain
Abstract | PDFIconPDF
218-222
10. A novel approach for image classification in Content based image retrieval using support vector machine
Sonali Jain, Satyam Shrivastava
Abstract | PDFIconPDF
223-227
11. Efficient Speech Recognition System for Isolated Digits
Santosh V. Chapaneri, Dr. Deepak J. Jayaswal
Abstract | PDFIconPDF
228-236
12. Analysis of Degenerated Tissue in Temporal Lobe of Human Brain using image segmentation Techniques
Mahima jain
Abstract | PDFIconPDF
237-242
13. A GENERIC APPROACH TO USER INTERFACE CODE CONVERSION
Arjun Chiddarwar, Kamini Kadhane, Rishi Parmar, Sudhanshu Sane
Abstract | PDFIconPDF
243-248
14. COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS
Chintan B. Desai, Mr. Vyomal N. Pandya, Dr. Prashant M. Dolia
Abstract | PDFIconPDF
249-253
15. Usage of Honeypot to Secure datacenter in Infrastructure as a Service data
Ms. Priyanka Paliwal, Mrs. Prakriti Trivedi
Abstract | PDFIconPDF
254-259
16. PERFORMANCE, ANALYSIS OF H.264/AVC LOSELESS VIDEO CODING USING HADAMARD TRANSFORM
M.Anto bennet, Dr.I. Jacob Raglend
Abstract | PDFIconPDF
260-267
17. Hilditch’s Algorithm Based Tamil Character Recognition
V. Karthikeyan
Abstract | PDFIconPDF
268-273
18. DETECTION OF VISUAL IMPAIRMENTS USING BACK PROPAGATION NEURAL NETWORKS
Anwar Basha.H, S.Udhayakumar, E.Sujatha
Abstract | PDFIconPDF
274-278
19. A Clustering approach in Mobile Ad-hoc Networks Routing
Ipsita Panda
Abstract | PDFIconPDF
279-284
20. Mining Full Functional Dependency to Answer Null Queries and Reduce Imprecise Information Based on Fuzzy Object Oriented Databases
Sujoy Dutta, Dr. Laxman Sahoo, Debasis Dwibedy
Abstract | PDFIconPDF
285-293
Copyright © 2010-2017 IJCSET KEJA Publications