Article # |
Article Title & Authors (Volume 4 Issue 7 July 2013) |
Page |
1. |
A Review of C-TREND Using Complete-Link Clustering for Transactional Data
Arna Prabha Jena, Annan Naidu
Abstract | PDF |
850-854 |
2. |
A Survey on Security Issues and Vulnerabilities on Cloud Computing
K.L.NEELA, Dr.V.KAVITHA
Abstract | PDF |
855-860 |
3. |
Different Algorithms used in Image Encryption: A review
Bharti Ahuja, Rashmi Lodhi
Abstract | PDF |
861-864 |
4. |
Comparative Study of MBEWCM and Google
Neha Gupta
Abstract | PDF |
865-873 |
5. |
A Review of various metrics used in software reliability
Mandeep Kaur, Sukhpreet Singh, Dr. Madhuchanda Rakshit
Abstract | PDF |
874-876 |
6. |
A Review of various Software Project Scheduling techniques
Ramandeep Kaur, Sukhpreet Singh, Dr. Madhuchanda Rakshit
Abstract | PDF |
877-882 |
7. |
A novel Burst assembly architecture for QoS provisioning in Optical Burst Switched multicast communications
Terrance Frederick Fernandez, T. Megala
Abstract | PDF |
883-889 |
8. |
Implementing Phylogenetic Distance Based Methods for Tree Construction Using Hierarchical Clustering
Archi Kataria, Dr.Amardeep Singh
Abstract | PDF |
890-901 |
9. |
Stemmers for Tamil Language: Performance Analysis
M.Thangarasu, Dr.R.Manavalan
Abstract | PDF |
902-908 |
10. |
Identification of Single Nucleotide Polymorphisms and associated Disease Genes using NCBI resources
Navreet Kaur, Dr. Amardeep Singh
Abstract | PDF |
909-914 |
11. |
Hetrocyclization of Acetylenes with nitriles catalyzed by chromium Complex
Sachin Kumar, Chandra Shekher, Manoj Kumar
Abstract | PDF |
915-917 |
12. |
Analysis of Fuzzy Fault Tree using Intuitionstic Fuzzy Numbers
Neeraj Lata
Abstract | PDF |
918-924 |
13. |
TECHNIQUES TO PRESERVE DATA ACCESS PRIVACY OF USERS IN WSN :A SURVEY
Merin Jacob, Sijo Cherian
Abstract | PDF |
925-928 |
14. |
Automata-Based Software Reliability Paradigm for Ubiquitous Systems
Ritika Wason, P. Ahmed, M. Qasim Rafiq
Abstract | PDF |
929-934 |
15. |
Two Stage Robust Filtering Technique to Remove Salt & Pepper Noise in Grayscale Image
N.Naveen Kumar, A.Mallikarjuna, P.Kanimozhi, S.Ramakrishna
Abstract | PDF |
935-941 |
16. |
Operating System Security : Security Policies
Sarika Choudhary
Abstract | PDF |
942-947 |
17. |
An Approach to Minimize Computational and Communicational Overhead in Cloud Computing
Kalpana Batra
Abstract | PDF |
948-952 |
18. |
A Novel Approach to Recognize the off-line Handwritten Numerals using MLP and SVM Classifiers
Mamta Garg, Deepika Ahuja
Abstract | PDF |
953-958 |
19. |
A Review of Various Software Risk Management techniques
Lahkveer Kaur, Er. Sukhpreet Singh, Dr. Madhuchanda Rakshit
Abstract | PDF |
959-962 |
20. |
Study of Mobile Agents as a Tool for Load Balancing in Distributed Environment
Amit Mishra
Abstract | PDF |
963-965 |
21. |
Brain Cancer Classification Using GLCM Based Feature Extraction in Artificial Neural Network
Shweta Jain
Abstract | PDF |
966-970 |
22. |
An Efficient Steganographic Scheme Using Skin Tone Detection and Discrete Wavelet Transformation
Swati Kumravat
Abstract | PDF |
971-976 |
23. |
Abs-Laplacian and Robert's cross operator offers high speed edge detection capabilities with comparable speed-quality tradeoffs
A Ravi Kant
Abstract | PDF |
977-986 |
24. |
Design and Realization of Digital FIR Filter using Dolph-Chebysheb Window
Subhadeep Chakraborty
Abstract | PDF |
987-996 |
25. |
A Study on signcryption Scheme Based on Eliptic Curve
Anjali Pandey, Sumanjit Das
Abstract | PDF |
997-1003 |
26. |
A Survey on Content Based Image Retrieval
Malti Puri
Abstract | PDF |
1004-1008 |
27. |
Data Link Layer-Security Issues
A Annapurna, Sheena Mohammed, D.Madhuri
Abstract | PDF |
1009-1012 |
28. |
DYNAMIC ANALYSIS OF LOCATION TRACKING USING MICROADDRESS
RECORDER
Shaveta Bhatia, Dr. SabaHilal
Abstract | PDF |
1013-1022 |
29. |
Modelling and Performance Analysis of Personalized DSR Routing Protocol to discover a selfish and Inimical Node in MANETs Using NS-2
Arjun Saini, Vijander Singh
Abstract | PDF |
1023-1028 |
30. |
A NOVEL HISTOGRAM BASED ROBUST IMAGE REGISTRATION TECHNIQUE
V. Karthikeyan
Abstract | PDF |
1029-1033 |
31. |
Security Issues In Mobile Cloud Computing
JASLEEN
Abstract | PDF |
1034-1037 |
32. |
Social-aware Context Based Approach for Forwarding Data in Wireless Network Comprising of Selfish Individuals
Bency Wilson, Preetha K G
Abstract | PDF |
1038-1042 |
33. |
Encryption/decryption tool with cryptanalysis
Rizwan Ali, Ashish Kumar, Esh Narayan
Abstract | PDF |
1043-1050 |
34. |
Closed Regular Pattern Mining Using Vertical Format
M.Sreedevi, L.S.S.Reddy
Abstract | PDF |
1051-1056 |
35. |
MaRFI: Maximal Regular Frequent Itemset Mining using a pair of Transaction-ids
G. Vijay Kumar, Dr. V. Valli Kumari
Abstract | PDF |
1057-1064 |
36. |
A NOVEL APPROACH TO FIND THE ALTERNATIVE PATH FOR ROUTE
MAINTENANCE IN AODV
Priya K G, Mujeebudheen Khan, Preetha K G
Abstract | PDF |
1065-1069 |
37. |
An SMS and USSD Model for Locationbased Mobile Advertising
Moses M. Thiga, Joseph K Siror, Jason Githeko
Abstract | PDF |
1070-1083 |
38. |
Mobile Cloud Computing: A Tool for Future
Dr. Atul Gonsai, Mr. Rushi Raval
Abstract | PDF |
1084-1090 |
39. |
Development and Investigation of Runge-Kutta Coefficients Dependent Stability Polynomial
Salau T.A.O., Ajide O.O.
Abstract | PDF |
1091-1104 |
|
|
|