Archived Papers for Journal
International Journal of Advanced Computer Research (IJACR) >>
Vol.3, No.8
Publisher: ACCENTS
Publishing Date: 2013-03-25
- A Multi Maximal Length Multi Time Period Pseudorandom Bit Sequence (PRBS) GeneratorAuthors: Aritra Sinha, Sunit Kumar Sen
- Study on key Issues and Critical Success Factors of e-Supply Chain Management in Health Care ServicesAuthors: Debashri Dey, Asoke Nath
- Performance Evaluation Using J2ME with Android over Cloud Services: A Simulation ApproachAuthors: Bharat Prajapat and Manish Shrivastava
- Steganography in MPEG Video Files using MACROBLOCKSAuthors: Lathikanandini. M, Suresh. J
- Implementation of ON/OFF and PID controller using TCP Protocol Based on Virtual InstrumentationAuthors: Abhyarthana Bisoyi, Umesh Chandra Pati
- A Technique for Image Search Using Fractal Quadtree Partitioned Iterated Function System-A SurveyAuthors: Shraddha Viraj Pandit , Manish Shr ee vastava
- Analysis on Photovoltaic Assisted Three Phase five level Unipolar PWM Inverter for Induction Motor Driven Water Pumping SystemAuthors: Ajay Kumar Maurya, Kishore Chahar, Y. K. Chauhan
- SEPIC Based PFC Converter for PMBLDCM Drive in Air Conditioning SystemAuthors: Amit Kumar Sinha, Gandhi. R
- A study on implementing Green IT in Enterprise 2.0Authors: Shalabh Agarwal, Asoke Nath
- Switching of Picosecond Pulses under Third Order Dispersion Effects in a Non Linear Fiber CouplerAuthors: Rekha S, James Raja S
- A linear Fuzzy Goal Programming Method for Solving Optimal Power Generation and Dispatch ProblemAuthors: Bijay Baran Pal, Mousumi Kumar
- An Unsupervised approach for augmentation of Protein StructureAuthors: Geetika S. Pandey, R.C Jain
- Content Base Image Retrieval using Combination of Color, Shape and Texture FeaturesAuthors: Neha Jain, Sumit Sharma, Ravi Mohan Sairam
- A Comprehensive study on Cloud Green Computing: To Reduce Carbon Footprints Using CloudsAuthors: Chiranjeeb Roy Chowdhury, Arindam Chatterjee, Alap Sardar, Shalabh Agarwal, Asoke Nath
- Approaches for Disambiguation in Hindi LanguageAuthors: Pankaj Kumar, Atul Vishwakarma and Ashwani Kr. Verma
- Modeling For Runtime Locality Optimizations of Distributed Java Applications Using Dynamic Localization AlgorithmAuthors: Daya Shankar Verma , Abhay Kumar , Amarto Chakrabarty , Haider Banka , Amrita Priyam
- MRI Brain Image Segmentation based on ThresholdingAuthors: G. Evelin Sujji, Y.V.S. Lakshmi, G. Wiselin Jiji
- Verification of Data Reliability and Secure Service for Dynamic Data in Cloud StorageAuthors: Nithiavathy.R, Suresh.J
- Pair Programming “Potential Benefits and Threats”Authors: Supriya Gupta , Vandana Bhattacharya, Madhumita Singha
- Microstrip Antenna with Centrally Loaded Inductive Discontinuity for Dual Band OperationAuthors: A. Raaz, S. Chattopadhyay
- Application of Green computing in Framing Energy Efficient Software EngineeringAuthors: Aritra Mitra, Riya Basu, Avik Guha, Shalabh Agarwal, Asoke Nath
- Ethics of E-Commerce in Information and Communications TechnologiesAuthors: Santosh Kumar Das, Abhishek Kumar, Bappaditya Das, A.P.Burnwal
- Genetic Algorithm Based Goal Programming Procedure for Solving Interval-Valued Multilevel Programming ProblemsAuthors: Papun Biswas, Bijay Baran Pal, Anirban Mukhopadhyay, Debjani Chakraborti
- A Novel Approach for Improving the Performance of TCP by TCP Reno and SACK Acknowledgement in high traffic density conditions with cognitive radiosAuthors: Reena rai and Maneesh Shreevastava
- Cross Dumbbell Periodic Defected Ground Structure CharacteristicsAuthors: Prakash K Kuravatti, T. S. Rukmini
- ECG signal analysis for detection of Heart Rate and Ischemic EpisodesAuthors: Goutam Kumar Sahoo, Samit Ari, Sarat Kumar Patra
- A Comprehensive Study on Animal miRNAs: A Computational approach to explore its implications in Biological and Chemical environmentsAuthors: Joyshree Nath
- Selection of suitable Topology and Switching Technique of ZSI for wind power applicationAuthors: Tanmoy Maity, Santosh Sonar
- An Evaluation of MANET Routing ProtocolAuthors: Neha Gupta, Manish Shrivastava
- DEDD Symmetric-Key CryptosystemAuthors: Praloy Shankar De, Prasenjit Maiti
- Efficient Frequent Pattern Mining Techniques of Semi Structured data: a SurveyAuthors: Leena A Deshpande, R.S. Prasad
- Numerical Analysis of Free Surface in Water Model for Design of Submerged Entry NozzleAuthors: Rajat Kumar Das, Sukanta Kumar Dash
- Monitoring and Analysis of Vibration Signal Based On Virtual InstrumentationAuthors: Sunita Mohanta, Umesh Chandra Pati
- Fuzzy Goal Programming Approach to Chance Constrained Multilevel Programming ProblemsAuthors: Mousumi Kumar, Bijay Baran Pal
- Modeling and Simulation on Double Delta WingAuthors: Sukanta Saha, Bireswar Majumdar
- Renovated Cluster Based Routing Protocol for MANETAuthors: Yuvraj Kumbharey, Suwesh Shukla, Sushil Chaturvedi
- Design of Rectangular Stepped DRA for Wireless Local Area Network (Wlan) ApplicationsAuthors: Chinmaya Sahoo, P. K. Sahu, S. K. Behera
- Design of Ultrasonic Transducer MEMS Model for Distance Measurement using MultiphysicsAuthors: Priyabrata Pattnaik, Jhansirani Jena, S.K.Pradhan, S. K. Kamilla, Mihir Narayan Mohanty
- ANFIS Prediction Model of a Modified Greenhouse Dryer under Active Mode in No-Load conditions in Winter SeasonAuthors: Om Prakash, Anil Kumar
- A Survey on Different Approaches for Energy Conservation in Wireless Sensor NetworksAuthors: Rumpa Mukherjee,Arindom Mukherjee
- A Piecewise Linear Approximation Method to Solve Fuzzy Separable Quadratic Programming ProblemAuthors: Shyamal Sen, Bijay Baran Pal
- Effect of Blur and Noise on Image Denoising based on PDEAuthors: Meenal Jain , Sumit Sharma, Ravi Mohan Sairam
- Research on Qualitative Analysis of LEACH with Wormhole attack in Wireless Sensor NetworkAuthors: Priya Maidamwar and Nekita Chavhan
- Semi-Automatic Mapping Generation for the DBpedia Information Extraction FrameworkAuthors: Arup Sarkar, Ujjal Marjit, Utpal Biswas
- Implementing Log Based Security in Data WarehouseAuthors: Amritpal Singh, Nitin Umesh
- Effective Performance Evaluation of On-Demand Routing Protocol for Cognitive Radio Ad Hoc NetworkAuthors: Srinivas Sethi, Sangita Pal, Ashima Rout
- A Robust Technique for Feature-based Image Mosaicing using Image FusionAuthors: Vimal Singh Bind, Priya Ranjan Muduli, Umesh Chandra Pati
- New Lightweight Security Protocol for VANET by Using Registration Identity and Group CertificateAuthors: Aditi Garg, Ankita Agrawal, Niharika Chaudhary, Shivanshu Gupta, Devesh Pandey, Tumpa Roy
- Study on Testing as a Service on CloudAuthors: Shruti N. Pardeshi
- PLST: Point Location Using Search Technique AlgorithmsAuthors: Syed Jaffar Abbas ,Raju Manjhi
- Mechanical usage for Unused Mineral Insulating Oils for Transformers and SwitchgearAuthors: L.D.N. Sahdeo, Arvind Kumar
- An effective algorithm for Image security based on Compression and Decomposition methodAuthors: Seetaiah Kilaru, Yojana Kanukuntla, K B S Chary
- Spintronics: A New Nanoelectronics AdventureAuthors: Rohit Apurva, Sonia Chandan, Abhilash Katkar, Prashant Shinde
- Ethics of Reducing Power Consumption in Wireless Sensor Networks using Soft Computing TechniquesAuthors: Santosh Kumar Das, Abhishek Kumar, Bappaditya Das and A.P.Burnwal
- Shaft MisalignmentDetectionusing Stator Current MonitoringAuthors: Alok Kumar Verma, Somnath Sarangi and M.H. Kolekar
- Privacy and Security: Online Social NetworkingAuthors: Akriti Verma, Deepak Kshirsagar, Sana Khan
- Performance Comparison of AODV & DSR Routing Protocol in a Fading EnvironmenAuthors: D.D.Seth, Harpreet Jolly, Dipti Divya, Garima Aastha, Jewsree Brahma