Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
Volume 2, Issue 3, Pages 214 - 388 ( May - June 2013 )
1) |
A Hybrid Model for Mining Multidimensional Data SetsPages 214 - 217Santhoshkumar E.Ramaraj
|
|
| |
|
2) |
Profit Maximization for Service Providers using Hybrid Pricing in Cloud ComputingPages 218 - 223N.Ani Brown Mary
|
|
| |
|
3) |
Intuitionistic Fuzzy Semipre Generalized Connected SpacesPages 224 - 228M. Thirumalaiswamy K. M. Arifmohammed
|
|
| |
|
4) |
Cognitive Radio: An Emerging trend for better Spectrum UtilizationPages 229 - 231Atul Singh Jamwal Gurpinder Kaur
|
|
| |
|
5) |
Non-Blind Deblurring Using Partial Differential Equation MethodPages 232 - 236Devender Sharma Puneet Sharma Ritu Sharma
|
|
| |
|
6) |
Risk Prediction for Production of an EnterprisePages 237 - 244Kumar Ravi Sheopujan Singh
|
|
| |
|
7) |
Watermarking of JPEG2000 Compressed Images with Improved EncryptionPages 245 - 249Kukoo Anna Mathew
|
|
| |
|
8) |
Visual Image Quality Assessment Technique using FSIMPages 250 - 254Rohit Kumar Vishal Moyal
|
|
| |
|
9) |
Power Optimization Technique for Sensor NetworkPages 255 - 260M.Nemaraj V.Jayaprakasan V.Senthil Kumar
|
|
| |
|
10) |
Random Valued Impulse Noise Elimination using Neural FilterPages 261 - 269R.Pushpavalli G.Sivaradje
|
|
| |
|
11) |
Image Segmentation Using Two Weighted Variable Fuzzy K MeansPages 270 - 276S. Suganya Rose Margaret
|
|
| |
|
12) |
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksPages 277 - 280K.S.Narmatha E.GeorgeDharmaPrakash Raj
|
|
| |
|
13) |
Test Driven Development with Continuous Integration: A Literature ReviewPages 281 - 285Sheikh Fahad Ahmad Mohd. Rizwan Beg Mohd. Haleem
|
|
| |
|
14) |
Literature Survey on Image Deblurring TechniquesPages 286 - 288Minu Poulose
|
|
| |
|
15) |
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET?s using NS-2Pages 289 - 292Sonal Beniwal Pinki Rashmi Jatain
|
|
| |
|
16) |
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS ? A REVIEWPages 293 - 296Sunita Kusum Lata Rashmi Jatain
|
|
| |
|
17) |
Enhancing Web-Security with Stronger CaptchasPages 297 - 301Dilip Kumar Kushwaha Harleen Kaur KM Priyanka
|
|
| |
|
18) |
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETSPages 302 - 305Sunita Kusum Lata
|
|
| |
|
19) |
The Effective QR Code Development using VB.NETPages 306 - 310Neeraj Bhargava Ritu Bhargava Manish Mathuria Khushboo Mantri
|
|
| |
|
20) |
Efficient Framework for Predicting & Recommending M-Commerce Patterns Based on Graph Diffusion MethodPages 311 - 314R.Priyadharshini M.Kalimuthu
|
|
| |
|
21) |
On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph for Direct Product of FinitePages 315 - 323Kuntala Patra Priyanka Pratim Baruah
|
|
| |
|
22) |
Generalized Semipre Regular Closed Sets inIntuitionistic Fuzzy Topological SpacesPages 324 - 328K. Ramesh M. Thirumalaiswamy
|
|
| |
|
23) |
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksPages 329 - 334M.Boopathy V.Jayaprakasan Y.J.Nazeer Ahmed
|
|
| |
|
24) |
Concept of Automated Machine using MealyPages 335 - 339Ritika Kalihari Toran Verma Alka Jaiswal
|
|
| |
|
25) |
|
26) |
Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANETPages 345 - 349Zaiba Ishrat Pankaj singh Rehan Ahmad
|
|
| |
|
27) |
Modified Visual Cryptography Scheme for Colored Secret Image SharingPages 350 - 356Joshi Jesalkumari A. R. R. Sedamkar
|
|
| |
|
28) |
Survey of Various Protocols in Geographical Based Routing in Vehicular Adhoc NetworksPages 357 - 366Nupur Soni Shikha Tiwari
|
|
| |
|
29) |
Knowledge Transfer in a Municipality Study on Baby Boomer Exodus from the WorkforcePages 367 - 373Ivy Cummings-White Ify S. Diala
|
|
| |
|
30) |
Comparative Analysis of File Transfer Algorithms to Reduce Average Download Time in Peer to Peer NetworksPages 374 - 377Anjali Malekar Neelabh Sao
|
|
| |
|
31) |
A survey of Anomaly Detection using Frequent Item SetsPages 378 - 381Gaurav Shelke Anurag Jain Shubha Dubey
|
|
| |
|
32) |
FRAMEWORK FOR MONITORING FIREWALL FUNCTIONALITY USING INTRUSION DETECTION SYSTEMSPages 382 - 388Peter Kiprono Kemei William P.K. Korir Joseph Mbugua Chahira
|
|
| |
|