ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 5 Number 06 June 2013) |
Page |
1. |
A Survey on Cloud Computing
Poulami dalapati, G. Sahoo
Abstract | PDF |
435-441 |
2. |
SIGNATURE VERIFICATION
Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia
Abstract | PDF |
442-447 |
3. |
Performance of machine learning methods for classification tasks
B. Krithika, Dr. V. Ramalingam, K. Rajan
Abstract | PDF |
448-454 |
4. |
Visual Cryptographic Applications
Anushree Suklabaidya, G. Sahoo
Abstract | PDF |
455-464 |
5. |
Recognition of Isolated Handwritten Kannada Numerals based on Decision Fusion Approach
Mamatha.H.R, Sucharitha Srirangaprasad, Srikantamurthy K
Abstract | PDF |
465-473 |
6. |
Prediction and Analysis of students Behavior using BARC Algorithm
M.Sindhuja, Dr.S.Rajalakshmi, S.M.Nandagopal
Abstract | PDF |
474-480 |
7. |
AGE CLASSIFICATIONS BASED ON SECOND ORDER IMAGE COMPRESSED AND FUZZY REDUCED GREY LEVEL (SICFRG) MODEL
Jangala. Sasi Kiran, Dr. V. Vijaya Kumar, Dr. B. Eswara Reddy
Abstract | PDF |
481-492 |
8. |
Efficient use of available network in mobile for executing mobile application with real time constraints.
A.D.Saraf, Prof Uma Thakur, Prof L.H.Patil
Abstract | PDF |
493-496 |
9. |
THE DESIGN OF A RIG FOR THE DIECASTING OF AL-SI PISTON
P.A.O ADEGBUYI, M.N.HOUNKONNOU, D.BANYAI
Abstract | PDF |
497-507 |
10. |
Advance Technique for Online Payment Security in E-Commerce : “Double Verification”
Shilpa, Parveen Sharma
Abstract | PDF |
508-513 |
11. |
CONTEXT INDEXING IN SEARCH ENGINE USING BINARY SEARCH TREE
Charu Kathuria, Goutam Datta, Vanditaa Kaul
Abstract | PDF |
514-521 |
12. |
COCOMO model for software based on Open Source: Application to the adaptation of TRIADE to the university system
Moulla Donatien Koulla, Kolyang
Abstract | PDF |
522-527 |
13. |
AN INTELLIGENT SEGMENTATION ALGORITHM FOR MICROARRAY IMAGE PROCESSING
P.Rajkumar, Dr.Ila.Vennila, K.Nirmalakumari
Abstract | PDF |
528-537 |
14. |
Segmentation of Telugu Touching Conjunct Consonants Using Overlapping Bounding Boxes
J. Bharathi, Dr. P. Chandrasekar Reddy
Abstract | PDF |
538-546 |
15. |
An Application of time stamped proxy blind signature in e-voting
Suryakanta Panda, Santosh Kumar Sahu, Jagannath Mohapatra, Ramesh Kumar Mohapatra
Abstract | PDF |
547-552 |
16. |
PDPKDES ( Pre Distributed Powerful Key for Data Encryption Standard)
Prerna Mittal, Bhawna Chauhan
Abstract | PDF |
553-560 |
17. |
New Design of Crypto-Based Pseudo random number generator (CBPRNG) using BLOW FISH cipher
T.Chalama Reddy, Dr.R.Seshadri
Abstract | PDF |
561-566 |
18. |
Conditional Random Fields based Pronominal Resolution in Tamil
A.Akilandeswari, Sobha Lalitha Devi
Abstract | PDF |
567-577 |
19. |
Development of a vibration monitoring system for optimization of the electrical energy production
Hassane ELMAATI, Abdelkader BENBOUAZA, Bachir ELKIHEL, Fabienne DELAUNOIS
Abstract | PDF |
578-589 |
20. |
On The Application Of Artificial Life Based Test Data Generation
Harsh Bhasin, Shewani, Deepika Goyal
Abstract | PDF |
590-595 |
To view the PDF use Adobe Acrobat 6.0 or more |