Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
Volume 2, Issue 6, Pages 637 - 774 ( November - December 2013 )
1) |
Classification of The Insured On The Basis Of The Customers Loyalty Through Using Data Mining TechniquesPages 637 - 640Fateme Sadat Mousavi Maryam Khademi Hamid Reza Ahmadifar10.7753/IJCATR0206.1001
|
2) |
Estimation of Beacon Update interval for GPSR Protocol in MANETsPages 641 - 644Archana.S.S Sathaya.B Priyanka.S Soundaryadevi.M 410.7753/IJCATR0206.1002
|
3) |
Effects of using RZ and NRZ modulation formats for TDM-PON system on Transmission Characteristics for Downstream SignalsPages 645 - 649Nimrat Kaur Malti Sarangal10.7753/IJCATR0206.1003
|
4) |
Reviewing Cluster Based Collaborative Filtering ApproachesPages 650 - 659F.Darvishi-mirshekarlou SH.Akbarpour M.Feizi-Derakhshi10.7753/IJCATR0206.1004
|
5) |
Applying Data Mining Techniques on Soil Fertility PredictionPages 660 - 662S.S.Baskar L.Arockiam10.7753/IJCATR0206.1005
|
6) |
Probabilistic Opportunistic Access of Cognitive Radio Network using Partially Observable Markov Decision ProcessPages 663 - 665Atul Singh Jamwal Nidhi Bhalla10.7753/IJCATR0206.1006
|
7) |
Skin Tone Based Secret Data Hiding in Images Using Wavelet TransformPages 666 - 670Vemula Harini Jeevan Kishor G.10.7753/IJCATR0206.1007
|
8) |
Implementation of Mobile-Cloudlet-Cloud Architecture for Face Recognition in Cloud Computing using Android MobilePages 671 - 675Priya Bhatnagar10.7753/IJCATR0206.1008
|
9) |
Implementation of Medical Image Fusion Using DWT Process on FPGAPages 676 - 679D.Khasim Hussain C.Laxmikanth Reddy V.Ashok Kumar10.7753/IJCATR0206.1009
|
10) |
Presenting a New Method for Detection and Prevention of Single Black Holes Attack in AODV Protocol in Wireless Ad Hoc NetworkPages 686 - 689nullIman Zangeneh Sedigheh Navaezadeh Abolfazl Jafari10.7753/IJCATR0206.1011
|
11) |
The proposed System for Indoor Location TrackingPages 690 - 698Ashraf Mohamed Ali Hassen10.7753/IJCATR0206.1012
|
12) |
Real Time Object Identification for Intelligent Video Surveillance ApplicationsPages 699 - 707L.Menaka M.Kalaiselvi Geetha M.Chitra10.7753/IJCATR0206.1013
|
13) |
Occlusion and Abandoned Object Detection for Surveillance ApplicationsPages 708 - 713M. Chitra M.Kalaiselvi Geetha L.Menaka10.7753/IJCATR0206.1014
|
14) |
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSPages 714 - 716P.S.Nivedita Sai T.P.Rani10.7753/IJCATR0206.1015
|
15) |
Gender Specification Using Touch less Fingerprint RecognitionPages 717 - 722Merlyn Francis Oshin Koul Priyanka Rokade10.7753/IJCATR0206.1016
|
16) |
Implementation Of Ontology Matching Using Prot?g?Pages 723 - 725Jayanth Kumar Sujitha Reddy Priya.M Raju.J10.7753/IJCATR0206.1017
|
17) |
Modeling and Analysis of Reliability in Grid using Petri NetsPages 726 - 730MahnooshVahebi Mehdi Sadeghzadeh Reza EbrahimiAtani10.7753/IJCATR0206.1018
|
18) |
Survey on Dynamic Resource Allocation Strategy in Cloud Computing EnvironmentPages 731 - 737N.Krishnaveni G.Sivakumar10.7753/IJCATR0206.1019
|
19) |
Fault Injection Test Bed for Clock ViolationPages 738 - 742E. Kavitha P.S. Indrani M. J. C. Prasad10.7753/IJCATR0206.1020
|
20) |
A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate LogicPages 743 - 747K.Nagarjun S.Srinivas10.7753/IJCATR0206.1021
|
21) |
An Efficient Anonymous Location Service for Geographic Ad Hoc Routing in MANETPages 748 - 751Sathya.B Umarani.S Archana.S.S Rajeshwari.P10.7753/IJCATR0206.1022
|
22) |
Alert Routing In Wireless Video Sensor Networks For Monitoring ApplicationsPages 752 - 758Youssef Benabbassi Hafid Haffaf Congduc Pham10.7753/IJCATR0206.1023
|
23) |
A Hybrid approach for enhancing the capability of Spam FilterPages 759 - 762Amandeep Kaur Malti Sarangal10.7753/IJCATR0206.1024
|
24) |
Semantic Annotation: The Mainstay of Semantic WebPages 763 - 770Thabet Slimani10.7753/IJCATR0206.1025
|
25) |
A Survey on Enhancing the Efficiency of Various Web Structure Mining AlgorithmsPages 771 - 774Arun Kumar Singh Avinav Pathak Dheeraj Sharma10.7753/IJCATR0206.1026
|
26) |
Program designed in Excel for Students Exam Execution and CorrectionPages 680 - 685Prof. Hussein Chible
|