ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 5 Number 05 May 2013) |
Page |
1. |
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Dr.G.Mary Jansi Rani, Dr. S. Arumugam
Abstract | PDF |
275-279 |
2. |
Performance Evaluation of CPU-GPU communication Depending on the Characteristic of Co-Located Workloads
Dongyou Seo, Shin-gyu Kim, Hyeonsang Eom, Heon Y. Yeom
Abstract | PDF |
280-285 |
3. |
Web Miner: A Tool for Discovery of Usage Patterns From Web Data
Roop Ranjan, Sameena Naaz, Neeraj Kaushik
Abstract | PDF |
286-293 |
4. |
A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection
Sukhpreet Kaur, Geetanjali babbar
Abstract | PDF |
294-301 |
5. |
An Analysis and Knowledge Representation System to attain the genuine web user usage behavior
V.V.R. Maheswara Rao, Dr. V. Valli Kumari
Abstract | PDF |
302-316 |
6. |
DESIGN AND SIMULATION OF MULTIBAND PLANAR INVERTED-F ANTENNA FOR MOBILE PHONE APPLICATIONS
Abhay Sharma, R.P.S. Gangwar, Shakti S Chauhan
Abstract | PDF |
317-322 |
7. |
Massive Open Online Courses : A New Dawn for Higher Education?
Sara Ibn El Ahrache, Hassan Badir
Abstract | PDF |
323-327 |
8. |
A Survey : Code Optimization using Refactoring
Piyush Chandi
Abstract | PDF |
328-333 |
9. |
A Bee-Hive Optimization Approach to Improve the Network Lifetime in Wireless Sensor Networks
S. Bhuvaneshwari, P.S. Balamurugan
Abstract | PDF |
334-337 |
10. |
Efficient Parallel Data Processing in the Cloud
THANAPAL.P, NISHANTHI.S.P
Abstract | PDF |
338-342 |
11. |
Implementation of Neural Network with a variant of Turing Machine for Traffic Flow Control
Rashmi Sehrawat, Honey Malviya, Vanditaa Kaul
Abstract | PDF |
343-348 |
12. |
Principles of Video Segmentation Scenarios
M. R. KHAMMAR, YUNUSA ALI SAI’D, M. H. MARHABAN, F. ZOLFAGHARI
Abstract | PDF |
349-356 |
13. |
Human Age Prediction and Classification Using Facial Image
Sithu Ubaid, Dr. Shyama Das, Imthiyas M.P.
Abstract | PDF |
357-361 |
14. |
Cryptography on Android Message Applications – A Review
Nishika, Rahul Kumar Yadav
Abstract | PDF |
362-367 |
15. |
Distance Based Fault detection in wireless sensor network
Ayasha Siddiqua, Shikha Swaroop, Prashant Krishan, Sandip Mandal
Abstract | PDF |
368-375 |
16. |
Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network
Shikha Swaroop, Ashish Kumar
Abstract | PDF |
376-380 |
17. |
A Model Driven approach for Applicationspecific Mismatch Detection
Amit Raj
Abstract | PDF |
381-392 |
18. |
Application of fuzzy-AHP extent analysis to determine the relative importance of risk factors in operative mortality after Coronary Artery Bypass surgery
Mahyar Taghizadeh Nouei, Ali Vahidian Kamyad, Somayeh Ghazalbash, MahmoodReza Sarzaeem
Abstract | PDF |
393-401 |
19. |
Hierarchical classification of web content using Naïve Bayes approach
Neetu
Abstract | PDF |
402-408 |
20. |
FRAUDULENT ACTIVITIES USING VIRTUAL MEETINGS
Aamo Iorliam, Anne James
Abstract | PDF |
409-421 |
21. |
Cryptanalysis of Vigenere Cipher using Particle Swarm Optimization with Markov chain random walk
Aditi Bhateja, Shailender Kumar, Ashok K. Bhateja
Abstract | PDF |
422-429 |
22. |
Novel Time Aware Regression Testing Technique
Harsh Bhasin, Praveen, Anju Gera
Abstract | PDF |
430-434 |
To view the PDF use Adobe Acrobat 6.0 or more |