Article # |
Article Title & Authors (Volume 4 Issue 3 March 2013) |
Page |
1. |
Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions
Ashish Patel, Rutvij Jhaveri
Abstract | PDF |
173-177 |
2. |
INTRUSION AWARE GROUP MANAGEMENT SCHEME FOR MANET
P.Sumathi
Abstract | PDF |
178-184 |
3. |
A SURVEY OF DESKTOP GRID SYSTEM SCHEDULING
G Mahesh Kumar
Abstract | PDF |
185-189 |
4. |
A novel high-speed image processing technique for detecting edges using abs- Laplacian kernel
A Ravi Kant
Abstract | PDF |
190-196 |
5. |
Krill Herd Clustering Algorithm using DBSCAN Technique
Varinder Singh, Mrs. Monica Sood
Abstract | PDF |
197-201 |
6. |
A Cluster Based Optimization Technique with Adoptive Framework for ZigBee WSN
S. Balasubramani, Dr. A. Sabari
Abstract | PDF |
202-207 |
7. |
Dynamic Time Quantum in Shortest Job First Scheduling Algorithm (DTQSJF) for Unpredictable Burst Time of Processes
Dibyendu Barman, Iti Sarkar
Abstract | PDF |
208-212 |
8. |
Design of Web Access Interface Design for People with Neuromotor Disorders
Debashis Mandal
Abstract | PDF |
213-217 |
9. |
A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network
Satyam Shrivastava, Sonali Jain
Abstract | PDF |
218-222 |
10. |
A novel approach for image classification in Content based image retrieval using support vector machine
Sonali Jain, Satyam Shrivastava
Abstract | PDF |
223-227 |
11. |
Efficient Speech Recognition System for Isolated Digits
Santosh V. Chapaneri, Dr. Deepak J. Jayaswal
Abstract | PDF |
228-236 |
12. |
Analysis of Degenerated Tissue in Temporal Lobe of Human Brain using image segmentation Techniques
Mahima jain
Abstract | PDF |
237-242 |
13. |
A GENERIC APPROACH TO USER INTERFACE CODE CONVERSION
Arjun Chiddarwar, Kamini Kadhane, Rishi Parmar, Sudhanshu Sane
Abstract | PDF |
243-248 |
14. |
COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS
Chintan B. Desai, Mr. Vyomal N. Pandya, Dr. Prashant M. Dolia
Abstract | PDF |
249-253 |
15. |
Usage of Honeypot to Secure datacenter in Infrastructure as a Service data
Ms. Priyanka Paliwal, Mrs. Prakriti Trivedi
Abstract | PDF |
254-259 |
16. |
PERFORMANCE, ANALYSIS OF H.264/AVC LOSELESS VIDEO CODING USING HADAMARD TRANSFORM
M.Anto bennet, Dr.I. Jacob Raglend
Abstract | PDF |
260-267 |
17. |
Hilditch’s Algorithm Based Tamil Character Recognition
V. Karthikeyan
Abstract | PDF |
268-273 |
18. |
DETECTION OF VISUAL IMPAIRMENTS USING BACK PROPAGATION NEURAL NETWORKS
Anwar Basha.H, S.Udhayakumar, E.Sujatha
Abstract | PDF |
274-278 |
19. |
A Clustering approach in Mobile Ad-hoc Networks Routing
Ipsita Panda
Abstract | PDF |
279-284 |
20. |
Mining Full Functional Dependency to Answer Null Queries and Reduce Imprecise Information Based on Fuzzy Object Oriented Databases
Sujoy Dutta, Dr. Laxman Sahoo, Debasis Dwibedy
Abstract | PDF |
285-293 |