Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
Volume 2, Issue 3, Pages 214 - 388 ( May - June 2013 )
1) |
A Hybrid Model for Mining Multidimensional Data SetsPages 214 - 217Santhoshkumar E.Ramaraj10.7753/IJCATR0203.1001
|
2) |
Profit Maximization for Service Providers using Hybrid Pricing in Cloud ComputingPages 218 - 223N.Ani Brown Mary10.7753/IJCATR0203.1002
|
3) |
Intuitionistic Fuzzy Semipre Generalized Connected SpacesPages 224 - 228M. Thirumalaiswamy K. M. Arifmohammed10.7753/IJCATR0203.1003
|
4) |
Cognitive Radio: An Emerging trend for better Spectrum UtilizationPages 229 - 231Atul Singh Jamwal Gurpinder Kaur10.7753/IJCATR0203.1004
|
5) |
Non-Blind Deblurring Using Partial Differential Equation MethodPages 232 - 236Devender Sharma Puneet Sharma Ritu Sharma10.7753/IJCATR0203.1005
|
6) |
Risk Prediction for Production of an EnterprisePages 237 - 244Kumar Ravi Sheopujan Singh10.7753/IJCATR0203.1006
|
7) |
Watermarking of JPEG2000 Compressed Images with Improved EncryptionPages 245 - 249Kukoo Anna Mathew10.7753/IJCATR0203.1007
|
8) |
Visual Image Quality Assessment Technique using FSIMPages 250 - 254Rohit Kumar Vishal Moyal10.7753/IJCATR0203.1008
|
9) |
Power Optimization Technique for Sensor NetworkPages 255 - 260M.Nemaraj V.Jayaprakasan V.Senthil Kumar10.7753/IJCATR0203.1009
|
10) |
Random Valued Impulse Noise Elimination using Neural FilterPages 261 - 269R.Pushpavalli G.Sivaradje10.7753/IJCATR0203.1010
|
11) |
Image Segmentation Using Two Weighted Variable Fuzzy K MeansPages 270 - 276S. Suganya Rose Margaret10.7753/IJCATR0203.1011
|
12) |
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksPages 277 - 280K.S.Narmatha E.GeorgeDharmaPrakash Raj10.7753/IJCATR0203.1012
|
13) |
Test Driven Development with Continuous Integration: A Literature ReviewPages 281 - 285Sheikh Fahad Ahmad Mohd. Rizwan Beg Mohd. Haleem10.7753/IJCATR0203.1013
|
14) |
Literature Survey on Image Deblurring TechniquesPages 286 - 288Minu Poulose10.7753/IJCATR0203.1014
|
15) |
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET?s using NS-2Pages 289 - 292Sonal Beniwal Pinki Rashmi Jatain10.7753/IJCATR0203.1015
|
16) |
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS ? A REVIEWPages 293 - 296Sunita Kusum Lata Rashmi Jatain10.7753/IJCATR0203.1016
|
17) |
Enhancing Web-Security with Stronger CaptchasPages 297 - 301Dilip Kumar Kushwaha Harleen Kaur KM Priyanka10.7753/IJCATR0203.1017
|
18) |
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETSPages 302 - 305Sunita Kusum Lata10.7753/IJCATR0203.1018
|
19) |
The Effective QR Code Development using VB.NETPages 306 - 310Neeraj Bhargava Ritu Bhargava Manish Mathuria Khushboo Mantri10.7753/IJCATR0203.1019
|
20) |
Efficient Framework for Predicting & Recommending M-Commerce Patterns Based on Graph Diffusion MethodPages 311 - 314R.Priyadharshini M.Kalimuthu10.7753/IJCATR0203.1020
|
21) |
On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph for Direct Product of FinitePages 315 - 323Kuntala Patra Priyanka Pratim Baruah10.7753/IJCATR0203.1021
|
22) |
Generalized Semipre Regular Closed Sets inIntuitionistic Fuzzy Topological SpacesPages 324 - 328K. Ramesh M. Thirumalaiswamy10.7753/IJCATR0203.1022
|
23) |
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksPages 329 - 334M.Boopathy V.Jayaprakasan Y.J.Nazeer Ahmed10.7753/IJCATR0203.1023
|
24) |
Concept of Automated Machine using MealyPages 335 - 339Ritika Kalihari Toran Verma Alka Jaiswal10.7753/IJCATR0203.1024
|
25) |
|
26) |
Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANETPages 345 - 349Zaiba Ishrat Pankaj singh Rehan Ahmad10.7753/IJCATR0203.1026
|
27) |
Modified Visual Cryptography Scheme for Colored Secret Image SharingPages 350 - 356Joshi Jesalkumari A. R. R. Sedamkar10.7753/IJCATR0203.1027
|
28) |
Survey of Various Protocols in Geographical Based Routing in Vehicular Adhoc NetworksPages 357 - 366Nupur Soni Shikha Tiwari10.7753/IJCATR0203.1028
|
29) |
Knowledge Transfer in a Municipality Study on Baby Boomer Exodus from the WorkforcePages 367 - 373Ivy Cummings-White Ify S. Diala10.7753/IJCATR0203.1029
|
30) |
Comparative Analysis of File Transfer Algorithms to Reduce Average Download Time in Peer to Peer NetworksPages 374 - 377Anjali Malekar Neelabh Sao10.7753/IJCATR0203.1030
|
31) |
A survey of Anomaly Detection using Frequent Item SetsPages 378 - 381Gaurav Shelke Anurag Jain Shubha Dubey10.7753/IJCATR0203.1031
|
32) |
FRAMEWORK FOR MONITORING FIREWALL FUNCTIONALITY USING INTRUSION DETECTION SYSTEMSPages 382 - 388Peter Kiprono Kemei William P.K. Korir Joseph Mbugua Chahira10.7753/IJCATR0203.1032
|