Archived Papers for Journal
International Journal of Advanced Computer Research (IJACR) >>
Vol.4, No.15
Publisher: ACCENTS
Publishing Date: 2014-06-17
- The Correlation among Software Complexity Metrics with Case StudyAuthors: Yahya Tashtoush; Mohammed Al-Maolegi; Bassam Arkok
- Performance Analysis of Non- Coherent FSK System with Square Law Combining our Nakagami- m Fading ChannelAuthors: Krishna Chandra Roy; O.P. Roy
- Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK SystemAuthors: Krishna Chandra Roy; O.P. Roy
- The All Optical New Universal Gate Using TOADAuthors: Goutam Kumar Maity; Ashis Kumar Mandal; Supriti Samanta
- A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing EnvironmentAuthors: Gaurav; Nitesh Kaushik; Jitender Bhardwaj
- A Study of Cloud Computing in the University EnterpriseAuthors: Adigun A. Adebisi; Adegun A. Adekanmi; Asani E. Oluwatobi
- Deterministic Models for Microarray Gene Expression ProfilesAuthors: V. Bhaskara Murthy; G. Pardha Saradhi Varma
- Study on Physiological Parameter Detection SystemsAuthors: Shruti Madan Kshirsagar; Gyankamal J. Chhajed
- Automatic Reactive Power Control Using FC-TCRAuthors: Dhruvang R Gayakwad; C. R. Mehta; Samir P. Desai
- A Project on Atmospheric Water Generator with the Concept of Peltier EffectAuthors: Aditya Nandy; Sharmi Saha; Souradeep Ganguly; Sharmistha Chattopadhyay
- An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion DetectionAuthors: Reyadh Naoum; Shatha Aziz; Firas Alabsi
- Defence Mechanism for SYBIL Attacks in MANETS using ABR ProtocolAuthors: Sowmya P; V. Anitha
- Combination of Morphological Operations with Structure based Partitioning and grouping for Text String detection from Natural ScenesAuthors: Vyankatesh V. Rampurkar; Gyankamal J. Chhajed
- Automatic Ranking of Machine Translation Outputs Using Linguistic FactorsAuthors: Pooja Gupta; Nisheeth Joshi; Iti Mathur
- Technology Implementation in Public Sectors units of Andhra PradeshAuthors: Rakesh Phanindra Akula; V. B. Narasimha; M.Chandrashekar
- Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training MechanismAuthors: Satyaki Roy; Ayan Chatterjee; Rituparna Pandit; Kaushik Goswami
- Image Processing Algorithms ? A Comprehensive StudyAuthors: Mahesh Prasanna K; Shantharama Rai C
- An Efficient Automated English to Bengali Script Conversion MechanismAuthors: Enakshi Mukhopadhyay; Priyanka Mazumder; Saberi Goswami; Romit S Beed
- Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding RegionAuthors: Sonali B. Ulape; Sheetal. A. Takale
- Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium EnterprisesAuthors: Lynnette Magasa; Mphahlele M.I; Awosejo; O.J
- Mining Association Rules to Evade Network Intrusion in Network Audit DataAuthors: Kamini Nalavade; B.B. Meshram
- Web Search Results Summarization Using Similarity AssessmentAuthors: Sawant V.V.; Takale S.A.
- Preference Based Personalized News Recommender SystemAuthors: Mansi Sood; Harmeet Kaur
- A Research Paper on Simulation Model for Teaching and Learning Process in Higher EducationAuthors: S. S. Rai; Anil T. Gaikwad; R.V. Kulkarni
- An Accurate ANFIS-based MPPT for Solar PV SystemAuthors: Ahmed Bin-Halabi; Adel Abdennour; Hussein Mashaly
- A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted SampleAuthors: Kai Li; Lijuan Cui
- Printed Text Character Analysis Version-II: Optimized optical character recognition for noisy images with the new user training and background detection mechanismAuthors: Satyaki Roy; Ayan Chatterjee; Rituparna Pandit; Kaushik Goswami
- Design and Modeling of a 3 DOF MachineAuthors: Marjan Sikandar
- Model Driven Development: Research Issues and OpportunitiesAuthors: Mahua Banerjee; Sushil Ranjan Roy; Satya Narayan Singh
- Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and InternetAuthors: N. Rajesh kumar; P.Mohanapriya; M.Kalaiselvi
- A Survey on Web Spam and Spam 2.0Authors: Ashish Chandra; Mohammad Suaib
- Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES EncryptionAuthors: Naida.H.Nazmudeen; Farsana.F.J
- Disease Detection of Cotton Leaves Using Advanced Image ProcessingAuthors: Vivek Chaudhari; C. Y. Patil
- Design and Implementation of Image Encryption Algorithm Using ChaosAuthors: Sandhya Rani M.H.; K.L. Sudha
- Conceptual for User Satisfaction with the E-government in North of JordanAuthors: Fawzi hasan Altaany; Khalid ahmmad alsoudani
- Curvelet based Image Compression using Support Vector Machine and Core Vector Machine ? A ReviewAuthors: P. Anandan; R. S. Sabeenian
- ATM, FDDI and Network Intrusion Simulation for Packet Data NetworksAuthors: Shahiruddin; D K Singh; Nidhi Verma; Sugandha Shukla
- Conceptual Study of OFDM-Coding, PAPR Reduction, Channel EstimationAuthors: S S Riya Rani; I R Anzija; L Shameema Hameed
- Application of High Order X-LMS Filter for Active Noise ControlAuthors: N.V.K.Mahalakshmi; D.Sindhu; B. Ranjith Kumar; N.Santhisri; G. Sowjanya Rao
- Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSAAuthors: Fahad Abdullah Moafa
- Digital Watermarking for Medical Images using Biorthogonal Wavelet Filters and Transformed Watermark EmbeddingAuthors: Mahavir Dhoka; Jitendra Kadam
- Low Power State Retention Technique for CMOS VLSI DesignAuthors: K. Mariya Priyadarshini; V. Kailash; M. Abhinaya; K. Prashanthi; Y. Kannaji
- Tessent BSCAN Insertion on 28nm SOCAuthors: M. A. Wavhal; S. U. Bhandari
- Attack Penetration System for SQL InjectionAuthors: Manju Kaushik; Gazal Ojha
- Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-TimeAuthors: Urmi Chhajed; Ajay Kumar