International Journal of Computer Science & Engineering Technology

ISSN : 2229-3345

Open Access
Open Access
July 2013 - IJCSET(ISSN: 2229-3345)
 

VOLUME 4 ISSUE 7

1. A Review of C-TREND Using Complete-Link Clustering for Transactional Data
Arna Prabha Jena, Annan Naidu
Abstract | PDFIconPDF
850-854
2. A Survey on Security Issues and Vulnerabilities on Cloud Computing
K.L.NEELA, Dr.V.KAVITHA
Abstract | PDFIconPDF
855-860
3. Different Algorithms used in Image Encryption: A review
Bharti Ahuja, Rashmi Lodhi
Abstract | PDFIconPDF
861-864
4. Comparative Study of MBEWCM and Google
Neha Gupta
Abstract | PDFIconPDF
865-873
5. A Review of various metrics used in software reliability
Mandeep Kaur, Sukhpreet Singh, Dr. Madhuchanda Rakshit
Abstract | PDFIconPDF
874-876
6. A Review of various Software Project Scheduling techniques
Ramandeep Kaur, Sukhpreet Singh, Dr. Madhuchanda Rakshit
Abstract | PDFIconPDF
877-882
7. A novel Burst assembly architecture for QoS provisioning in Optical Burst Switched multicast communications
Terrance Frederick Fernandez, T. Megala
Abstract | PDFIconPDF
883-889
8. Implementing Phylogenetic Distance Based Methods for Tree Construction Using Hierarchical Clustering
Archi Kataria, Dr.Amardeep Singh
Abstract | PDFIconPDF
890-901
9. Stemmers for Tamil Language: Performance Analysis
M.Thangarasu, Dr.R.Manavalan
Abstract | PDFIconPDF
902-908
10. Identification of Single Nucleotide Polymorphisms and associated Disease Genes using NCBI resources
Navreet Kaur, Dr. Amardeep Singh
Abstract | PDFIconPDF
909-914
11. Hetrocyclization of Acetylenes with nitriles catalyzed by chromium Complex
Sachin Kumar, Chandra Shekher, Manoj Kumar
Abstract | PDFIconPDF
915-917
12. Analysis of Fuzzy Fault Tree using Intuitionstic Fuzzy Numbers
Neeraj Lata
Abstract | PDFIconPDF
918-924
13. TECHNIQUES TO PRESERVE DATA ACCESS PRIVACY OF USERS IN WSN :A SURVEY
Merin Jacob, Sijo Cherian
Abstract | PDFIconPDF
925-928
14. Automata-Based Software Reliability Paradigm for Ubiquitous Systems
Ritika Wason, P. Ahmed, M. Qasim Rafiq
Abstract | PDFIconPDF
929-934
15. Two Stage Robust Filtering Technique to Remove Salt & Pepper Noise in Grayscale Image
N.Naveen Kumar, A.Mallikarjuna, P.Kanimozhi, S.Ramakrishna
Abstract | PDFIconPDF
935-941
16. Operating System Security : Security Policies
Sarika Choudhary
Abstract | PDFIconPDF
942-947
17. An Approach to Minimize Computational and Communicational Overhead in Cloud Computing
Kalpana Batra
Abstract | PDFIconPDF
948-952
18. A Novel Approach to Recognize the off-line Handwritten Numerals using MLP and SVM Classifiers
Mamta Garg, Deepika Ahuja
Abstract | PDFIconPDF
953-958
19. A Review of Various Software Risk Management techniques
Lahkveer Kaur, Er. Sukhpreet Singh, Dr. Madhuchanda Rakshit
Abstract | PDFIconPDF
959-962
20. Study of Mobile Agents as a Tool for Load Balancing in Distributed Environment
Amit Mishra
Abstract | PDFIconPDF
963-965
21. Brain Cancer Classification Using GLCM Based Feature Extraction in Artificial Neural Network
Shweta Jain
Abstract | PDFIconPDF
966-970
22. An Efficient Steganographic Scheme Using Skin Tone Detection and Discrete Wavelet Transformation
Swati Kumravat
Abstract | PDFIconPDF
971-976
23. Abs-Laplacian and Robert's cross operator offers high speed edge detection capabilities with comparable speed-quality tradeoffs
A Ravi Kant
Abstract | PDFIconPDF
977-986
24. Design and Realization of Digital FIR Filter using Dolph-Chebysheb Window
Subhadeep Chakraborty
Abstract | PDFIconPDF
987-996
25. A Study on signcryption Scheme Based on Eliptic Curve
Anjali Pandey, Sumanjit Das
Abstract | PDFIconPDF
997-1003
26. A Survey on Content Based Image Retrieval
Malti Puri
Abstract | PDFIconPDF
1004-1008
27. Data Link Layer-Security Issues
A Annapurna, Sheena Mohammed, D.Madhuri
Abstract | PDFIconPDF
1009-1012
28. DYNAMIC ANALYSIS OF LOCATION TRACKING USING MICROADDRESS RECORDER
Shaveta Bhatia, Dr. SabaHilal
Abstract | PDFIconPDF
1013-1022
29. Modelling and Performance Analysis of Personalized DSR Routing Protocol to discover a selfish and Inimical Node in MANETs Using NS-2
Arjun Saini, Vijander Singh
Abstract | PDFIconPDF
1023-1028
30. A NOVEL HISTOGRAM BASED ROBUST IMAGE REGISTRATION TECHNIQUE
V. Karthikeyan
Abstract | PDFIconPDF
1029-1033
31. Security Issues In Mobile Cloud Computing
JASLEEN
Abstract | PDFIconPDF
1034-1037
32. Social-aware Context Based Approach for Forwarding Data in Wireless Network Comprising of Selfish Individuals
Bency Wilson, Preetha K G
Abstract | PDFIconPDF
1038-1042
33. Encryption/decryption tool with cryptanalysis
Rizwan Ali, Ashish Kumar, Esh Narayan
Abstract | PDFIconPDF
1043-1050
34. Closed Regular Pattern Mining Using Vertical Format
M.Sreedevi, L.S.S.Reddy
Abstract | PDFIconPDF
1051-1056
35. MaRFI: Maximal Regular Frequent Itemset Mining using a pair of Transaction-ids
G. Vijay Kumar, Dr. V. Valli Kumari
Abstract | PDFIconPDF
1057-1064
36. A NOVEL APPROACH TO FIND THE ALTERNATIVE PATH FOR ROUTE MAINTENANCE IN AODV
Priya K G, Mujeebudheen Khan, Preetha K G
Abstract | PDFIconPDF
1065-1069
37. An SMS and USSD Model for Locationbased Mobile Advertising
Moses M. Thiga, Joseph K Siror, Jason Githeko
Abstract | PDFIconPDF
1070-1083
38. Mobile Cloud Computing: A Tool for Future
Dr. Atul Gonsai, Mr. Rushi Raval
Abstract | PDFIconPDF
1084-1090
39. Development and Investigation of Runge-Kutta Coefficients Dependent Stability Polynomial
Salau T.A.O., Ajide O.O.
Abstract | PDFIconPDF
1091-1104
     
Copyright © 2010-2024 IJCSET KEJA Publications