International Journal of Computer Science & Engineering Technology

ISSN : 2229-3345

Open Access
Open Access
February 2014 - IJCSET(ISSN: 2229-3345)
 

VOLUME 5 ISSUE 2

1. Major Technical Concerns in the Practical Realization of FO-OCDMA Networks
Laxman Verma, P.S. Mundra, Indu Bala
Abstract | PDFIconPDF
63-66
2. A Scenario of Brain Computer Interaction with Different types of Face Recognition Techniques
Dr. Dinesh Chandra Jain
Abstract | PDFIconPDF
67-70
3. Design and Comparative Analysis of CMOS Full Adder Cells Using Tanner EDA Tool
JATINDER KUMAR
Abstract | PDFIconPDF
71-79
4. Comparative evaluation of Recursive Dimensional Cutting Packet Classification, DimCut, with Analysis
Hediyeh AmirJahanshahi Sistani, Haridas Acharya
Abstract | PDFIconPDF
80-91
5. Ad hoc Network and its Security Essentials
Monika Kohli
Abstract | PDFIconPDF
92-96
6. Improved UP Growth Algorithm for Mining of High Utility Itemsets from Transactional Databases Based on Mapreduce Framework on Hadoop.
Vivek Jethe, Prof. Sachin Chavan, Prof. Manoj Patil
Abstract | PDFIconPDF
97-103
7. A Survey on Trust Management in Wireless Sensor Networks
Reshmi.V, Sajitha.M
Abstract | PDFIconPDF
104-109
8. Survey on Traffic Redundancy and Elimination Approach for Reducing Cloud Bandwidth and Costs
Suresh Chougala, Sharavana K
Abstract | PDFIconPDF
110-114
9. A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks
Swarupkumar S. Suradkar, Anil R.Surve
Abstract | PDFIconPDF
115-117
10. Network Forensics an emerging approach to an network analysis.
Abhishek Srivastav, Irman Ali
Abstract | PDFIconPDF
118-123
11. Development of energy efficient routing protocol using Hop PEGASIS in Wireless Sensor Networks
Md Arif Ali, Abha Kiran Rajpoot
Abstract | PDFIconPDF
124-131
12. PEER TO PEER ASSOCIATION IN CONTENT DISTRIBUTION NETWORK
D.Amrita, A.Aruna
Abstract | PDFIconPDF
132-136
13. A Review of various statestical methods for Outlier Detection
Dhwani Dave, Tanvi Varma
Abstract | PDFIconPDF
137-140
14. Classification of Escherichia Coli Bacteria using Meta-Cognitive Neural Network
Padma.S, Arun Kumar.M
Abstract | PDFIconPDF
141-149
15. 3D Password: A novel approach for more secure authentication
Ms.Swati Bilapatte, Prof. Sumit Bhattacharjee
Abstract | PDFIconPDF
150-156
16. Movement Evaluation Algorithm for video coding in Video Compression
G.Shoba, S.Kalaitchelvi, M.Rajeswari
Abstract | PDFIconPDF
157-159
17. COMPARATIVE ANALYSIS OF IMAGE DENOISING TECHNIQUES
Monika Pathak, Sukhdev Singh
Abstract | PDFIconPDF
160-167
18. Fusion of MRI and CT Images with Double Density Dual Tree Discrete Wavelet Transform
Dr.Latha Parthiban
Abstract | PDFIconPDF
168-172
Copyright © 2010-2024 IJCSET KEJA Publications