Archived Papers for Journal
International Journal of Advanced Computer Research (IJACR) >>
Vol.3, No.9
Publisher: ACCENTS
Publishing Date: 2013-04-16
- Block Based Information Hiding using Cosine, Hartley, Walsh and Haar WaveletsAuthors: H. B. Kekre; Sudeep D. Thepade; Ratnesh N. Chaturvedi
- Robust LQR Control Design of GyroscopeAuthors: Ashok S. Chandak; Anil J. Patil
- Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc NetworkAuthors: Neha Gupta; Manish Shrivastava
- Result Analysis of Proposed Image Enhancement Algorithm Based on a Self Organizing Map Network and Wavelet TransformAuthors: Shobhit Verma; Hitesh Gupta
- Extracting Person Name, Date and Place from Text Documents Using LEX ToolAuthors: Roohi Sharma
- A Secure Mechanism to Supervise Automotive Sensor Network by Client on Smart PhoneAuthors: T R Yashavanth; Ravi S Malashetty; V R Udupi
- Multi-Level Security for Automotive ? RFID Based Technology with Lab VIEW ImplementationAuthors: Priya Darshini .V; Prakash.R; Prasannabalaje.S.M; Sangeetha Monica.T
- Attack Detection in Watermarked Images with PSNR and RGB IntensityAuthors: Neha Chauhan; Akhilesh A. Waoo; P. S. Patheja
- Speech parameterization based on AM-FM model and its application in speaker identification using AANNAuthors: D. Giften Francis Samuel; D. Synthiya Vinothini
- Credential Clustering in Parallel Comparability Frequency AmplitudeAuthors: Ameela.T; Kaleeswaran.D
- A Review of Protein-DNA Binding Motif using Association Rule MiningAuthors: Virendra Kumar Tripathi; Hitesh Gupta
- A Survey of latest Algorithms for Frequent Itemset Mining in Data StreamAuthors: U.Chandrasekhar; Sandeep Kumar. K; Yakkala Uma Mahesh
- Adaptive job Scheduling for Computational Grid based on Ant Colony Optimization with Genetic Parameter SelectionAuthors: Saurabh Mandloi; Hitesh Gupta
- A Survey of Middleware in different languages for Ubiquitous ServicesAuthors: Neha Sharma; Usha Batra; Saurabh Mukherjee
- An Ensemble Method based on Particle of Swarm for the Reduction of Noise, Outlier and Core PointAuthors: Satish Dehariya; Divakar Singh
- A Bandwidth-Efficient Cooperative Authentication and an En-route Filtering Scheme for Filtering Injected False Data in Wireless Sensor NetworksAuthors: T.R. Yashavanth; Ravi S Malashetty; Rashmi C.R
- Image Denoising based on Fourth-Order Partial Differential Equations: A SurveyAuthors: Anand Swaroop Khare; Ravi Mohan; Sumit Sharma
- Plasmonics based VLSI processesAuthors: Shreya Bhattacharya
- Implement Security using smart card on CloudAuthors: Amish Kumar Aman; Vijay Prakash
- Association Rules Optimization: A SurveyAuthors: Anshuman Singh Sadh; Nitin Shukla
- Review of Information Authentication in Mobile Cloud over SaaS & PaaS LayersAuthors: Vineet Guha; Manish Shrivastava
- Reactive Power Compensation in Transmission Line using Fuzzy Control Method: A SurveyAuthors: Yojna Saratkar; Arun Pachori
- An Efficient Image Denoising Method based on Fourth-Order Partial Differential EquationsAuthors: Anand Swaroop Khare; Ravi Mohan; Sumit Sharma
- Reactive Power Compensation on 132 KV Substation Using Soft Computing Techniques (Fuzzy Logic)Authors: Yojna Saratkar; Arun Pachori
- An Efficient Partition Technique to reduce the Attack Detection Time with Web based Text and PDF filesAuthors: Animesh Dubey; Ravindra Gupta; Gajendra Singh Chandel