IJCATR provides e-certificate of publication to authors.      IJCATR invites reserach articles/thesis for publication from reserchers/authors/students.       Submit your reserach articles/thesis to editor@ijcat.com

Volume 3, Issue 2, Pages 88 - 135 ( February - 2014 )

1)
A New Approach to Segmentation of On-Line Persian Cursive Words
Pages 88 - 92
Golestani M.R Khademi M Moeini A

10.7753/IJCATR0302.1001

Show Preview
  |  
Download PDF
2)
Impact of Bio-inspired metaheuristics in the data clustering problem
Pages 93 - 99
K. Sumangala K.Papitha

10.7753/IJCATR0302.1002

Show Preview
  |  
Download PDF
3)
Insuring Security forOutsourced Data Stored in Cloud Environment
Pages 100 - 104
DurgaPriya. G Soma Prathibha

10.7753/IJCATR0302.1003

Show Preview
  |  
Download PDF
4)
A Review of Detection and Reduction of Noise in Degraded Images by Efficient Noise Detection Algorithm
Pages 105 - 108
Gayatri P. Bhelke V. S. Gulhane N. D. Shelokar

10.7753/IJCATR0302.1004

Show Preview
  |  
Download PDF
5)
A New Method for Reducing Energy Consumption in Wireless Sensor Networks using Fuzzy Clustering and
Pages 109 - 113
Vahab ashrafian Ali Harounabadi Mehdi Sadeghzadeh

10.7753/IJCATR0302.1005

Show Preview
  |  
Download PDF
6)
An Efficient Discovery of High Utility Item Setsfrom Large Database
Pages 114 - 118
Santhamani. V Premkumar. M Gayathri. A Gokulavani. M

10.7753/IJCATR0302.1006

Show Preview
  |  
Download PDF
7)
Swarm Intelligence Based Optimization for Web Usage Mining in Recommender System
Pages 119 - 124
Manisha Sajwan Kritika Acharya Sanjay Bhargava

10.7753/IJCATR0302.1007

Show Preview
  |  
Download PDF
8)
Inferring UserGoalsUsing CustomerFeedback andAnalyzingCustomer Behavior
Pages 125 - 129
Gayathri A. Nandhakumar C Gokulavani M. Santhamani V.

10.7753/IJCATR0302.1008

Show Preview
  |  
Download PDF
9)
Analysis of Cryptographic Algorithms for Network Security
Pages 130 - 135
Kritika Acharya Manisha Sajwan Sanjay Bhargava

10.7753/IJCATR0302.1009

Show Preview
  |  
Download PDF