Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
Volume 4, Issue 4, Pages 214 - 335 ( April - 2015 )
1) |
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM ClusteringPages 214 - 219S.Venkata Lakshmi K.Sathyamoorthy T.K Senthil Kumar10.7753/IJCATR0404.1001
|
2) |
A Case Study upon Non-functional Requirements of Online Banking SystemPages 220 - 225Harmeet Kaur Shahanawaj Ahamad Gurvinder N. Verma10.7753/IJCATR0404.1002
|
3) |
Position Tracking and Fuzzy LogicPages 226 - 228Mohd. Asim Riya Malik Shagun Bhatt10.7753/IJCATR0404.1003
|
4) |
Quest Trail: An Effective Approach for Construction of Personalized Search EnginePages 229 - 234M. Therasa S.M. Poonkuzhali S. Hemamalini10.7753/IJCATR0404.1004
|
5) |
Project Scheduling: Survey and Research PotentialsPages 235 - 239Asmaa Atef Mohamed Abdel-Baset Ibrahim El-henawy10.7753/IJCATR0404.1005
|
6) |
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Owerri Metropolis, NigeriaPages 240 - 245Onyewuchi Chinedu Nkwachukwu Dr. Eke Bartholomew O.10.7753/IJCATR0404.1006
|
7) |
THE CRITICAL ORGANIZATIONAL FACTORS OF E-GOVERNMENT IN KENYAPages 246 - 252Godfrey Kyalo Makau Elijah I. Omwenga Nzomo Daudi N.10.7753/IJCATR0404.1007
|
8) |
Online Signature Authentication by Using Mouse BehaviorPages 253 - 257Jitender Kumar S Goutham Amitabh Kumar10.7753/IJCATR0404.1008
|
9) |
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATIONPages 258 - 261Snigdhamayee Biswal A.Agal Veena Shilpi Kumar G.Michael10.7753/IJCATR0404.1009
|
10) |
Consequences of Road Traffic Accident in Nigeria: Time Series ApproachPages 262 - 273F.B. Adebola Ridwan A Sanusi N.A. Adegoke10.7753/IJCATR0404.1010
|
11) |
Anonymizing and Confidential Databases for Privacy Protection Using Suppression and Generalization Based ProtocolsPages 274 - 279K.Sathyamoorthy S.Venkata Lakshmi Tina Belinda Miranda10.7753/IJCATR0404.1011
|
12) |
Location Provider with Privacy Using Localized Server and GPSPages 280 - 282Pintu.R Rahul Gupta G.Michael10.7753/IJCATR0404.1012
|
13) |
Secure Personal Health Records Using EncryptionPages 283 - 286D. Devikannniga S.N. Gomathi Balan10.7753/IJCATR0404.1013
|
14) |
A Formal Machine Learning or Multi Objective Decision Making System for Determination of WeightsPages 287 - 290Ganesan R Shanmuga Priyan.P Kerana Hanirex.D10.7753/IJCATR0404.1014
|
15) |
Android Application to Predict and Suggest Measures for Diabetes Using DM TechniquesPages 291 - 295V.Krishna Priya A.Monika P.Kavitha10.7753/IJCATR0404.1015
|
16) |
Identity Recognition Using Edge Suppression MethodPages 296 - 299R.Ram kumar V.Sanjeevi K.Sivaraman10.7753/IJCATR0404.1016
|
17) |
Detecting And Resolving Privacy Conflicts in Online Social Networks using AC2P ProtocolPages 300 - 307J.S.Harilakshmanraj N.Rajkumar10.7753/IJCATR0404.1017
|
18) |
A Detailed Study on Prevention of SQLI attacks for Web SecurityPages 308 - 311Navjot Verma Amardeep Kaur10.7753/IJCATR0404.1018
|
19) |
Virtual Organization of Grid ? Pipeline Virtual Organization (PVO) ApproachPages 312 - 317J.Prema Dojohn Loyd B.10.7753/IJCATR0404.1019
|
20) |
|
21) |
Multi Objective Segmentation for Vehicle License Plate Detection with Immune-based Classifier: A General FrameworkPages 322 - 326Musab Mohammed Bagabir Siti Mariyam Shamsuddin Mohammed Elhafiz Ali Ahmed10.7753/IJCATR0404.1021
|
22) |
Preventing Disclosure Attacks by Secured Traffic Aware Protocol in ManetsPages 327 - 330S.Brindha Devi A. Porselvi10.7753/IJCATR0404.1022
|
23) |
Ontology based design for M- learning systemPages 331 - 335M.Thangaraj S.Vanathi10.7753/IJCATR0404.1023
|