International Journal of Computer Science & Engineering Technology

ISSN : 2229-3345

Open Access
Open Access
June 2013 - IJCSET(ISSN: 2229-3345)
 

VOLUME 4 ISSUE 6

1. Effect of Morphological Filters on Medical Image Segmentation using Improved Watershed Segmentation
Usha Mittal, Sanyam Anand
Abstract | PDFIconPDF
631-638
2. BLOCKING ARTIFACT DETECTION METHOD FOR HIGHLY COMPRESSED IMAGES
Jagroop Singh
Abstract | PDFIconPDF
639-648
3. Warning System for Landslides through Modified Particle Filtering Algorithm
Shruti Gupta, S.P. Mishra
Abstract | PDFIconPDF
649-653
4. Fault Tolerance in Wireless Sensor Networks using Stiffed Delaunay Triangulation
Abhinandan Gupta, Rinkle Aggarwal
Abstract | PDFIconPDF
654-662
5. Energy Cost and QoS based management of Data Centers Resources in Cloud Computing
Sahil Vashist, Rajwinder Singh
Abstract | PDFIconPDF
663-669
6. The Moderating Factors of 3G User Acceptance Technology in Shimla (India) Using UTAUT Model
Mr. Sandeep Kumar
Abstract | PDFIconPDF
670-674
7. Spontaneous identification of individual nick name from web
Prof. Ajanthaa Lakkshmanan
Abstract | PDFIconPDF
675-679
8. Cephalometric analysis for finding facial growth abnormalities
Prof. Ajanthaa Lakkshmanan
Abstract | PDFIconPDF
680-684
9. A Cooperative Approach for Opportunistic Routing In Mobile Ad Hoc Networks
S.Selvakanmani, A.V. Kalpana, S. Nalini, P. Chitra
Abstract | PDFIconPDF
685-689
10. Deblocking Filtering Method Based on Separate Modes
Jagroop Singh
Abstract | PDFIconPDF
690-695
11. IMPLEMENTATION OF IMAGE PROCESSING ALGORITHMS ON THE PARALLEL PLATFORM USING MATLAB
Preeti kaur
Abstract | PDFIconPDF
696-706
12. TDB Based Optimistic RSUs Deployment in VANETs
Ramneek kaur
Abstract | PDFIconPDF
707-712
13. A SURVEY ON ANT COLONY OPTIMIZATION
Jaskiran kaur, Inderpal Singh
Abstract | PDFIconPDF
713-718
14. Performance Evaluation of AQM Algorithms for PGM based group communication in PIM-DM Multicasting Network
Shaveta, Harsh Verma, Ashish kumar
Abstract | PDFIconPDF
719-726
15. IP Network Recovery Based on Security Managements
Mahboobeh Zangiabady
Abstract | PDFIconPDF
727-731
16. Genetic Approach to Find Optimal Moves for Prisoner Dilemma Game
Navdeep Kaur Dhillon, Navdeep Kaur Maan
Abstract | PDFIconPDF
732-739
17. BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR
Anjaly Joy, Sijo Cherian
Abstract | PDFIconPDF
740-745
18. Enhanced Double Layer Security using RSA over DNA based Data Encryption System
Meettu Skariya, Mariam Varghese
Abstract | PDFIconPDF
746-750
19. Merge Technique for Automated Reconstruction of Large Image
Santanu Santra, Madhsudan Maiti
Abstract | PDFIconPDF
751-757
20. Secure Image Steganography Algorithm using RGB Image Format and Encryption Technique
Babita, Mrs. Ayushi
Abstract | PDFIconPDF
758-762
21. A Novel Technique for Image Compression in Hand Written Recognition using Back Propagation in Neural Network
P.Padmasree, Maheswari.R
Abstract | PDFIconPDF
763-768
22. Automatic Segmentation of Punjabi Speech into Syllable-Like Units using Group Delay A Review
Anupriya Sharma, Amanpreet Kaur
Abstract | PDFIconPDF
769-771
23. Scale Development for Improving Education Quality: A Survey of Private Institutions Affiliated to U.P.T.U.
Tanmay Kulshrestha, A Ravi Kant
Abstract | PDFIconPDF
772-778
24. BRAIN TUMOR DETECTION using OTSU for DICOM images, using WATERSHED and ACTIVE CONTOURS for multi-parameter MRI Images.
Poojya P M, Mrs. V. Hemalatha, Prof. Shivakumar K.M
Abstract | PDFIconPDF
779-785
25. Standalone Command Processor - Onchip Peripheral control and arbiteration
Dr. S. R. Ganorkar, Amol Bharat Ranadive
Abstract | PDFIconPDF
786-790
26. Cloud Computing and its challenges: A Review
Malti Puri
Abstract | PDFIconPDF
791-793
27. Study Of Multidomain Query Optimization And Answering
Heena Agrawal, A.M.Karandikar
Abstract | PDFIconPDF
794-798
28. Design of 2.4 GHz Oscillators In CMOS Technology
Mr. Pravin Bodade, Ms. Divya Meshram
Abstract | PDFIconPDF
799-807
29. A Comparative Study on ATM Security with Multimodal Biometric System
K.Lavanya, C.Naga Raju
Abstract | PDFIconPDF
808-812
30. Design and Implementation of an Active RFID Tag
Ms. Rajeshri P. Mane
Abstract | PDFIconPDF
813-817
31. Offline Handwritten & Typewritten Character Recognition using Template Matching
Sunny Kumar, Pratibha Sharma
Abstract | PDFIconPDF
818-825
32. Discrete & Continuous Mouse Motion Using Vocal & Non Vocal Characteristics of Human Voice.
Vipul Sharma, Pratibha Sharma
Abstract | PDFIconPDF
826-837
33. Real Time Object Identification Using fast Figure-Ground Separation
Priyadarsini.S, Dhanya Raveendran
Abstract | PDFIconPDF
838-842
34. A COMPARATIVE STUDY OF CLOUDS IN CLOUD COMPUTING
Kimmy
Abstract | PDFIconPDF
843-849
Copyright © 2010-2024 IJCSET KEJA Publications