International Journal of Computer Science & Engineering Technology

ISSN : 2229-3345

Open Access
Open Access
September 2014 - IJCSET(ISSN: 2229-3345)
 

VOLUME 5 ISSUE 9

1. CONTENT WRITING IN THE 21ST CENTURY -INFORMATION NEEDS, CHALLENGES AND OPPORTUNITIES: AN OVERVIEW
Jomy Jose, Jismy Vakkachan
Abstract | PDFIconPDF
848-853
2. SURVEY ON BIG DATA MINING PLATFORMS, ALGORITHMS AND CHALLENGES
SHERIN A, Dr S UMA, SARANYA K, SARANYA VANI M
Abstract | PDFIconPDF
854-862
3. Concerto of Remedy Network Dais on Side Effects amongst Claim for Remedy Entrust
C. BALA SARAVANAN, R.S. SAN MATHI PRIYA, T.V.RAMYA, L.SUCITRA
Abstract | PDFIconPDF
863-867
4. How Accountability Improves Software Reliability?
Pawan Kumar Chaurasia
Abstract | PDFIconPDF
868-871
5. An Incremental Sanitization Approach in Dynamic Databases
Cynthia Selvi P, Mohamed Shanavas A.R
Abstract | PDFIconPDF
872-876
6. SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW
P. KIRUTHIKA DEVI, Dr. R. MANAVALAN
Abstract | PDFIconPDF
877-886
7. Outdoor Dynamic Scene Video Object Segmentation Using SRM Algorithm
A.Niranjil Kumar, Dr.C.Sureshkumar
Abstract | PDFIconPDF
887-893
8. One Dominant Graph Topology for Heterogeneous Wireless Sensor Networks
Jasmine Norman
Abstract | PDFIconPDF
894-900
9. A Similarity Function with Pruning Strategy for Tree Structured Data
SIMILA.K, SRIVIDHYA.R
Abstract | PDFIconPDF
901-903
10. A Review on the Factors that have Driven E-Commerce in Modern Day Business
Prof. R.H.Vijaylaxmi
Abstract | PDFIconPDF
904-908
11. A New Multi-hop approach for sensing coverage in wireless sensor network
Er. AMLAN JYOTI BARUAH
Abstract | PDFIconPDF
909-914
12. A SURVEY ON CYBER TERRORISM
SHIVA KUMAR K
Abstract | PDFIconPDF
915-917
13. Forming Packages of the Services as a Way for Keeping Existing Users and for Increasing ARPU
Zvezdan Stojanovic
Abstract | PDFIconPDF
918-923
14. Automatic System For Brain Tumor Detection And Classification Using Level Set And ANN
Nisha Babu A, Agoma Martin
Abstract | PDFIconPDF
924-934
15. Prime Generating Algorithms by Skipping Composite Divisors
Neeraj Anant Pande
Abstract | PDFIconPDF
935-940
16. Image Encryption and Decryption Using Selective Block Encryption Technique
Megha Seth, Kaminee Salam
Abstract | PDFIconPDF
941-946
17. A comparative study of fuzzy logic and weighted Association rule mining in frequent datasets
K. Rubia, S. Sasikala
Abstract | PDFIconPDF
947-951
Copyright © 2010-2024 IJCSET KEJA Publications