Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
Volume 2, Issue 2, Pages 86 - 213 ( March - April 2013 )
1) |
Evolving CSP Algorithm in Predicting the Path Loss of Indoor Propagation ModelsPages 86 - 90Anuj Agrawal
|
|
| |
|
2) |
RW-Closed Maps and RW-Open Maps in Topological SpacesPages 91 - 93M. Karpagadevi A. Pushpalatha
|
|
| |
|
3) |
A Trusted Integrity verification Architecture for Commodity ComputersPages 94 - 98Angela Francis Renu Mary Daniel Vinodh Ewards S.E.
|
|
| |
|
4) |
On Some New Continuous Mappings in Intuitionistic Fuzzy Topological SpacesPages 99 - 108M. Thirumalaiswamy K. Ramesh
|
|
| |
|
5) |
On Some New Contra Continuous and Contra Open Mappings in Intuitionistic Fuzzy Topological SpacesPages 109 - 116M. Thirumalaiswamy K. M. Arifmohammed
|
|
| |
|
6) |
Design of an Intelligent and Efficient Light Control SystemPages 117 - 120Arun Radhakrishnan Vuttaradi Anand
|
|
| |
|
7) |
Bragged Regression Tree Algorithm for Dynamic Distribution and Scheduling of JobsPages 121 - 125Navneet Randhawa Davinder Singh Gill Parneet Kaur
|
|
| |
|
8) |
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPages 126 - 130Namita Chandrakar Jaspal Bagga
|
|
| |
|
9) |
Challenges, Issues and Research directions in Optical Burst SwitchingPages 131 - 136Terrance Frederick Fernandez Megala.T Sreenath.N
|
|
| |
|
10) |
Deep Packet Inspection with Regular Expression MatchingPages 137 - 140T. Nalini M. Padmavathy
|
|
| |
|
11) |
A Review on Wireless Sensor Network Protocol for Disaster ManagementPages 141 - 146M. Sheik Dawood J. Suganya R. Karthika Devi G. Athisha
|
|
| |
|
12) |
A New Architecture for Group Replication in Data GridPages 147 - 151Leila Azari Mashalla Abbasi Dezfouli
|
|
| |
|
13) |
A Novel Method for Encoding Data Firmness in VLSI CircuitsPages 152 - 154V. Karthikeyan V. J. Vijayalakshmi P. Jeyakumar
|
|
| |
|
14) |
A Novel Color Image Fusion for Multi Sensor Night Vision ImagesPages 155 - 159J.Jenitha Christinal T. Jemima Jebaseeli
|
|
| |
|
15) |
A new Approach towards Cost and Benefit Enterprise Architecture AnalysisPages 160 - 165Ali Abediniyan Mehran Mohsenzadeh Mashalla Abbasi Dezfouli
|
|
| |
|
16) |
An improvised tree algorithm for association rule mining using transaction reductionPages 166 - 169Krishna Balan Karthiga Sakthi Priya
|
|
| |
|
17) |
Advanced Authentication Scheme using Multimodal Biometric SchemePages 170 - 175Shreya Mohan Ephin M
|
|
| |
|
18) |
Spatial Keyword Ranking (SKR) based Dominated Location with Safe ZonePages 176 - 179Krishna Balan Karthiga Sakthi Priya
|
|
| |
|
19) |
Survey on Service Oriented Architecture to Support the Deployment of Web Services on Sensor NodesPages 180 - 184Vinodhini.J Vasantha.R Dhivya.M W.Mercy
|
|
| |
|
20) |
A Review of Machine Learning based Anomaly Detection TechniquesPages 185 - 187Harjinder Kaur Gurpreet Singh Jaspreet Minhas
|
|
| |
|
21) |
Ensuring Privacy and Security in Data Sharing under Cloud EnvironmentPages 188 - 194Shilpa Elsa Abraham R. Gokulavanan
|
|
| |
|
22) |
Cooperative Demonstrable Data Retention for Integrity Verification in Multi-Cloud StoragePages 195 - 207Krishna Kumar Singh Rajkumar Gaura Sudhir Kumar Singh
|
|
| |
|
23) |
Automatic Seed Classification by Shape and Color Features using Machine Vision TechnologyPages 208 - 213Naveen Pandey Satyanarayan Krishna Shanu Sharma
|
|
| |
|