Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
Volume 2, Issue 6, Pages 637 - 774 ( November - December 2013 )
1) |
Classification of The Insured On The Basis Of The Customers Loyalty Through Using Data Mining TechniquesPages 637 - 640Fateme Sadat Mousavi Maryam Khademi Hamid Reza Ahmadifar
|
|
| |
|
2) |
Estimation of Beacon Update interval for GPSR Protocol in MANETsPages 641 - 644Archana.S.S Sathaya.B Priyanka.S Soundaryadevi.M 4
|
|
| |
|
3) |
Effects of using RZ and NRZ modulation formats for TDM-PON system on Transmission Characteristics for Downstream SignalsPages 645 - 649Nimrat Kaur Malti Sarangal
|
|
| |
|
4) |
Reviewing Cluster Based Collaborative Filtering ApproachesPages 650 - 659F.Darvishi-mirshekarlou SH.Akbarpour M.Feizi-Derakhshi
|
|
| |
|
5) |
Applying Data Mining Techniques on Soil Fertility PredictionPages 660 - 662S.S.Baskar L.Arockiam
|
|
| |
|
6) |
Probabilistic Opportunistic Access of Cognitive Radio Network using Partially Observable Markov Decision ProcessPages 663 - 665Atul Singh Jamwal Nidhi Bhalla
|
|
| |
|
7) |
Skin Tone Based Secret Data Hiding in Images Using Wavelet TransformPages 666 - 670Vemula Harini Jeevan Kishor G.
|
|
| |
|
8) |
Implementation of Mobile-Cloudlet-Cloud Architecture for Face Recognition in Cloud Computing using Android MobilePages 671 - 675Priya Bhatnagar
|
|
| |
|
9) |
Implementation of Medical Image Fusion Using DWT Process on FPGAPages 676 - 679D.Khasim Hussain C.Laxmikanth Reddy V.Ashok Kumar
|
|
| |
|
10) |
Presenting a New Method for Detection and Prevention of Single Black Holes Attack in AODV Protocol in Wireless Ad Hoc NetworkPages 686 - 689nullIman Zangeneh Sedigheh Navaezadeh Abolfazl Jafari
|
|
| |
|
11) |
The proposed System for Indoor Location TrackingPages 690 - 698Ashraf Mohamed Ali Hassen
|
|
| |
|
12) |
Real Time Object Identification for Intelligent Video Surveillance ApplicationsPages 699 - 707L.Menaka M.Kalaiselvi Geetha M.Chitra
|
|
| |
|
13) |
Occlusion and Abandoned Object Detection for Surveillance ApplicationsPages 708 - 713M. Chitra M.Kalaiselvi Geetha L.Menaka
|
|
| |
|
14) |
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSPages 714 - 716P.S.Nivedita Sai T.P.Rani
|
|
| |
|
15) |
Gender Specification Using Touch less Fingerprint RecognitionPages 717 - 722Merlyn Francis Oshin Koul Priyanka Rokade
|
|
| |
|
16) |
Implementation Of Ontology Matching Using Prot?g?Pages 723 - 725Jayanth Kumar Sujitha Reddy Priya.M Raju.J
|
|
| |
|
17) |
Modeling and Analysis of Reliability in Grid using Petri NetsPages 726 - 730MahnooshVahebi Mehdi Sadeghzadeh Reza EbrahimiAtani
|
|
| |
|
18) |
Survey on Dynamic Resource Allocation Strategy in Cloud Computing EnvironmentPages 731 - 737N.Krishnaveni G.Sivakumar
|
|
| |
|
19) |
Fault Injection Test Bed for Clock ViolationPages 738 - 742E. Kavitha P.S. Indrani M. J. C. Prasad
|
|
| |
|
20) |
A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate LogicPages 743 - 747K.Nagarjun S.Srinivas
|
|
| |
|
21) |
An Efficient Anonymous Location Service for Geographic Ad Hoc Routing in MANETPages 748 - 751Sathya.B Umarani.S Archana.S.S Rajeshwari.P
|
|
| |
|
22) |
Alert Routing In Wireless Video Sensor Networks For Monitoring ApplicationsPages 752 - 758Youssef Benabbassi Hafid Haffaf Congduc Pham
|
|
| |
|
23) |
A Hybrid approach for enhancing the capability of Spam FilterPages 759 - 762Amandeep Kaur Malti Sarangal
|
|
| |
|
24) |
Semantic Annotation: The Mainstay of Semantic WebPages 763 - 770Thabet Slimani
|
|
| |
|
25) |
A Survey on Enhancing the Efficiency of Various Web Structure Mining AlgorithmsPages 771 - 774Arun Kumar Singh Avinav Pathak Dheeraj Sharma
|
|
| |
|
26) |
Program designed in Excel for Students Exam Execution and CorrectionPages 680 - 685Prof. Hussein Chible
|