Volume 4, Issue 4, Pages 214 - 335 ( April - 2015 )

1)
An Unsupervised Change Detection in Satellite IMAGES Using MRFFCM Clustering
Pages 214 - 219
S.Venkata Lakshmi K.Sathyamoorthy T.K Senthil Kumar

10.7753/IJCATR0404.1001

Show Preview
  |  
Download PDF
2)
A Case Study upon Non-functional Requirements of Online Banking System
Pages 220 - 225
Harmeet Kaur Shahanawaj Ahamad Gurvinder N. Verma

10.7753/IJCATR0404.1002

Show Preview
  |  
Download PDF
3)
Position Tracking and Fuzzy Logic
Pages 226 - 228
Mohd. Asim Riya Malik Shagun Bhatt

10.7753/IJCATR0404.1003

Show Preview
  |  
Download PDF
4)
Quest Trail: An Effective Approach for Construction of Personalized Search Engine
Pages 229 - 234
M. Therasa S.M. Poonkuzhali S. Hemamalini

10.7753/IJCATR0404.1004

Show Preview
  |  
Download PDF
5)
Project Scheduling: Survey and Research Potentials
Pages 235 - 239
Asmaa Atef Mohamed Abdel-Baset Ibrahim El-henawy

10.7753/IJCATR0404.1005

Show Preview
  |  
Download PDF
6)
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Owerri Metropolis, Nigeria
Pages 240 - 245
Onyewuchi Chinedu Nkwachukwu Dr. Eke Bartholomew O.

10.7753/IJCATR0404.1006

Show Preview
  |  
Download PDF
7)
THE CRITICAL ORGANIZATIONAL FACTORS OF E-GOVERNMENT IN KENYA
Pages 246 - 252
Godfrey Kyalo Makau Elijah I. Omwenga Nzomo Daudi N.

10.7753/IJCATR0404.1007

Show Preview
  |  
Download PDF
8)
Online Signature Authentication by Using Mouse Behavior
Pages 253 - 257
Jitender Kumar S Goutham Amitabh Kumar

10.7753/IJCATR0404.1008

Show Preview
  |  
Download PDF
9)
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
Pages 258 - 261
Snigdhamayee Biswal A.Agal Veena Shilpi Kumar G.Michael

10.7753/IJCATR0404.1009

Show Preview
  |  
Download PDF
10)
Consequences of Road Traffic Accident in Nigeria: Time Series Approach
Pages 262 - 273
F.B. Adebola Ridwan A Sanusi N.A. Adegoke

10.7753/IJCATR0404.1010

Show Preview
  |  
Download PDF
11)
Anonymizing and Confidential Databases for Privacy Protection Using Suppression and Generalization Based Protocols
Pages 274 - 279
K.Sathyamoorthy S.Venkata Lakshmi Tina Belinda Miranda

10.7753/IJCATR0404.1011

Show Preview
  |  
Download PDF
12)
Location Provider with Privacy Using Localized Server and GPS
Pages 280 - 282
Pintu.R Rahul Gupta G.Michael

10.7753/IJCATR0404.1012

Show Preview
  |  
Download PDF
13)
Secure Personal Health Records Using Encryption
Pages 283 - 286
D. Devikannniga S.N. Gomathi Balan

10.7753/IJCATR0404.1013

Show Preview
  |  
Download PDF
14)
A Formal Machine Learning or Multi Objective Decision Making System for Determination of Weights
Pages 287 - 290
Ganesan R Shanmuga Priyan.P Kerana Hanirex.D

10.7753/IJCATR0404.1014

Show Preview
  |  
Download PDF
15)
Android Application to Predict and Suggest Measures for Diabetes Using DM Techniques
Pages 291 - 295
V.Krishna Priya A.Monika P.Kavitha

10.7753/IJCATR0404.1015

Show Preview
  |  
Download PDF
16)
Identity Recognition Using Edge Suppression Method
Pages 296 - 299
R.Ram kumar V.Sanjeevi K.Sivaraman

10.7753/IJCATR0404.1016

Show Preview
  |  
Download PDF
17)
Detecting And Resolving Privacy Conflicts in Online Social Networks using AC2P Protocol
Pages 300 - 307
J.S.Harilakshmanraj N.Rajkumar

10.7753/IJCATR0404.1017

Show Preview
  |  
Download PDF
18)
A Detailed Study on Prevention of SQLI attacks for Web Security
Pages 308 - 311
Navjot Verma Amardeep Kaur

10.7753/IJCATR0404.1018

Show Preview
  |  
Download PDF
19)
Virtual Organization of Grid ? Pipeline Virtual Organization (PVO) Approach
Pages 312 - 317
J.Prema Dojohn Loyd B.

10.7753/IJCATR0404.1019

Show Preview
  |  
Download PDF
20)
Data hiding using Pixel Value Differencing
Pages 318 - 321
Shruti

10.7753/IJCATR0404.1020

Show Preview
  |  
Download PDF
21)
Multi Objective Segmentation for Vehicle License Plate Detection with Immune-based Classifier: A General Framework
Pages 322 - 326
Musab Mohammed Bagabir Siti Mariyam Shamsuddin Mohammed Elhafiz Ali Ahmed

10.7753/IJCATR0404.1021

Show Preview
  |  
Download PDF
22)
Preventing Disclosure Attacks by Secured Traffic Aware Protocol in Manets
Pages 327 - 330
S.Brindha Devi A. Porselvi

10.7753/IJCATR0404.1022

Show Preview
  |  
Download PDF
23)
Ontology based design for M- learning system
Pages 331 - 335
M.Thangaraj S.Vanathi

10.7753/IJCATR0404.1023

Show Preview
  |  
Download PDF