ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY >>

Vol.4, No.2

Publisher: CIRWORLD

Publishing Date: 2013-01-01

  1. A framework for a multi-tier Internet Service architecture for doctors’ directory

    Authors: B. O. Oguntunde;M. O. Odim

  2. A Methodology for Enhancing Template Extraction accuracy Of Heterogeneous Web Pages

    Authors: Vidya Kadam;Prof. Prakash R. Devale

  3. Enhanced System to Secure Summative E-Assessment

    Authors: Hiba Husseiny;Ashraf Qaddoumi;Walid Salameh

  4. Electronic Student Attendance Recording System

    Authors: Dr. AkramAbedelKarim Ahmad AbdelQader;Dr. Mohammed Al-Husainy

  5. Feature Level Fusion of Multimodal Biometrics for Personal Authentication: A Review

    Authors: Dapinder Kaur;Gaganpreet Kaur

  6. Bacterial Cell Growth Analysis and Cell Division Time Determination using Fuzzy Inference System

    Authors: Parashuram Bannigidad;P.S. Hiremath

  7. Arabic Race Classification of Face Images

    Authors: Ahmad Awwad;Ashraf Ahmad;Walid a. Salameh

  8. Enhanced discussion on different techniques of spam detection

    Authors: Gurmeet Maan;Gaurav Tak

  9. Round-Robin Data Center Selection in Single Region for Service Proximity Service Broker in CloudAnalyst

    Authors: Vaishali Sharma;Dr. Rakesh Rathi;Sumit Bola

  10. RSFTS: RULE-BASED SEMANTIC FAULT TOLERANT SCHEDULING FOR CLOUD ENVIRONMENT

    Authors: Pandeeswari R;Mohamadi Begum. Y

  11. OPEN SOURCE SIMULATOR FOR NETWORK ON CHIP

    Authors: Monika Gupta;S. R. Biradar;B. P. Singh

  12. Survey on Decision Tree Classification algorithms for the Evaluation of Student Performance

    Authors: Anju Rathee;Robin Mathur

  13. Major Energy Efficient Routing Schemes in Wireless Sensor Networks: Survey and Idea

    Authors: Jahangeer Ali;Gulshan Kumar;Dr. Mritunjay Kumar Rai

  14. IDARP: ID-based Address Resolution Protocol

    Authors: Imtiyaz Lone;Jahangeer Ali;Kalimullah Lone

  15. Maximizing Network Lifetime Operator for Wireless Sensor Networks

    Authors: Dr. Deepali Virmani

  16. HIGH SPEED CARRY SAVE MULTIPLIER BASED LINEAR CONVOLUTION USING VEDIC MATHAMATICS

    Authors: Bharathi Reddy;D. Leela Rani;Prof. S. Varadarajan

  17. Given a raga recording, can we scientifically verify which school of Vadi-Samvadi selection is supported by the artist?

    Authors: Soubhik Chakraborty;Rayalla Ranganayakulu;Shivee Chauhan;Sandeep Solanki;Kartik Mahto

  18. Realization of different diversity technique for mimo based mobile ad-hoc network using space time block codes

    Authors: Swati Chowdhuri;Nilanjan Byabartal;Dr. S.S. Choudhury;Dr. P.K. Banerjee

  19. Business Intelligence framework to support Chronic Liver Disease Treatment

    Authors: Ayman Khedr

  20. Change Detection on SAR data using PCA Algorithm

    Authors: Saurabh Srivastava;Vijay Kumar;Rahul Gupta;Supreet Kaur

  21. Conceptual Overlapping Clustering for Effective Selection of Parental Rice Varieties

    Authors: Madhavi Dabbiru;Shashi Mogalla;PRM Rao

  22. DESIGN OF CMOS LOW DROP-OUT REGULATORS: A COMPARATIVE STUDY

    Authors: Ashvani Mishra;Rishikesh Pandey

  23. Evaluating the Effectiveness of Self and Peer Assessment using PBL on Student Performance and Preference: Malaysian’s Experience

    Authors: CHE KU NURAINI CHE KU MOHD;Faaizah Shahbodin

  24. Analysis of MAC Protocol for Reliable Broadcast

    Authors: Savita Savita;Anjali Anjali;Gurpal Singh

  25. ANALYSIS OF SOM & SOFM TECHNIQUES USED IN SATELLITE IMAGERY

    Authors: Rachita Sharma;Sanjay Dubey

  26. An UML Approach to Overcome Issues of Concurrency in Distributed Systems

    Authors: Om Kumar;Peyakunta Reddy

  27. Determination of Optimal Number of Relays Using a New Energy Model for WSN

    Authors: Partha Bhattacharya;Shilpi Gupta;Nupur Pal

  28. TAXONOMY FOR WSN SECURITY-A SURVEY

    Authors: Kshitija Chaple

  29. Composite Lowpass Filter Realized by Image Parameter method and Integrated with Defected Ground Structures

    Authors: Chandan Ghosh;Arabinda Roy;Susanta Parui

  30. CONCEPTUAL THREE PHASE KDD MODEL AND FINANCIAL RESEARCH

    Authors: Dr. Simmi Bagga

  31. Robust Singular Value Decomposition Algorithm for Unique Faces

    Authors: Ibrahim Patel;Raghavendra Kulkarni;Dr.P. Nageswar Rao

  32. An Adaptive and Interactive Agent Based ITS for Cognitive Skill Prediction and Improvement

    Authors: Mrs. R. Gowri;Dr. S. Kanmani;M. Santhosh;S. Naresh

  33. Segmentation of Palmprint into Region of Interest (ROI): A Survey

    Authors: Sneha M. Ramteke;Prof. S. S. Hatkar

  34. Energy Efficient Wireless Sensor Network Protocols for Node Cluster Analysis

    Authors: Harkeerat Kaur;Himanshu Sharma

  35. Comparative Study of Web application under Data Reverse Engineering

    Authors: Pooja Bakshi;Dr. Dheerendra Singh

  36. Cloud Computing Issues

    Authors: Rini Mahajan;Dr. Dheerendra Singh

  37. Hybrid ANFIS Controller for 6-DOF Manipulator with 3D Model

    Authors: Yousif Al Mashhadany

  38. Performance Evaluation of Log-normal And Negative Exponential Channel Modeling Using Various Modulation Techniques in OFDM-FSO Communication

    Authors: Nitin Singh;Gurpartap Singh

  39. Analysing The Quality Attributes of AOP using CYVIS Tool

    Authors: Hinam Garg;Mohit Garg

  40. Evaluation of Operation of Lake Tana Reservoir Future Water Use under Emerging Scenario with and without climate Change Impacts, Upper Blue Nile

    Authors: Getachew Tegegne;Dr. Ing. Dereje Hailu;Prof. Dr. S. Moses Aranganathan

  41. Online Signature Verification: State of the art

    Authors: Ibrahim El-Henawy;Magdy Rashad;Omima Nomir;Kareem Ahmed

  42. ANALYSIS AND COMPARISION OF SRG AND DFIG FOR WIND GENERATION APPLICATION

    Authors: Dr. N. C. Lenin;K. Prathap

  43. Fuzzy Weighted Ordered Weighted Average-Gaussian Mixture Model for Feature Reduction

    Authors: Charles. S;Dr. L. Arockiam

  44. HEAP: Hybrid Energy-efficient Aggregation Protocol for Large Scale Wireless Sensor Networks

    Authors: Santhosh Simon;K Paulose Jacob

  45. Artificial Neural Network Based Method for Classification of Gene Expression Data of Human Diseases along with Privacy Preserving

    Authors: Sathish Subramanian;Duraipandian N

  46. Incremental Frequent Pattern Mining using Graph based approach

    Authors: Sanjay Patel;Dr. Ketan Kotecha

  47. Analysis of Load Balancing Techniques in Cloud Computing

    Authors: Amandeep Sidhu;Supriya Kinger

  48. A Graphical Tool Designed to Deploy Wireless Sensors in Homogeneous Grid Selected from Irregular Polygon

    Authors: DR. Nitin

  49. Investigations into Hybrid Magneto-hydrodynamic (MHD) Antenna

    Authors: Sunil Bist;Dr. Rajveer Yaduvanshi

  50. Rejuvenating Public-Private Partnerships (PPPs) in Asia

    Authors: Dr. (Mrs) Satinder Bhatia

  51. ENLIGHTENING THE CLOUD COMPUTING DOMAIN

    Authors: AmanPreet Kaur;Dr. Dheerendra Singh

  52. Enhancing the performance of web Focused CRAWLer Using Ontology

    Authors: Prasant Yadav;Mrs Mala Kalra;Dr. K.P Yadav

  53. A Simulated Novel Approach for Identifying Black Hole Attack in AODV based MANET

    Authors: Kanika Lakhani

  54. RE-MAC: A Reliable Energy Efficient MAC Protocol For Wireless Sensor Networks

    Authors: Santhosh Simon;K Paulose Jacob

  55. Using 3GPP- A Secure IDS for MANETs

    Authors: Monika Garg;Karanvir Kaur;Simerpreet Kaur

  56. Optimal Tasks Assignment for Multiple Heterogeneous Processors with Dynamic Re-assignment

    Authors: Harendra Kumar;M. P. Singh;Pradeep Yadav

  57. Analysis and Comparison of Color Features for Content Based Image Retrieval

    Authors: Milind Lande;Prof. PraveenBhanodiya;Mr. Pritesh Jain

  58. A Review Of Internet Gateway Discovery Approaches For Mobile Adhoc Networks

    Authors: Deepak Patel;Rakesh Kumar

  59. A REVIEW OF NEW ABOUT CLOUD COMPUTING SECURITY

    Authors: Bohar Singh;Mandeep Kaur;Chetan Batra

  60. Web Client and Web Server approaches to Prevent XSS Attacks

    Authors: Jyoti Snehi;Dr. Renu Dhir

  61. A Soft- Computing Approach for Multi Criteria Project Selection Problem with Grey Number

    Authors: TULI BAKSHI;BIJAN SARKAR;SUBIR SANYAL

  62. RELATIVE STUDY OF SOLVERS FOR FINITE ELEMENT ANALYSIS

    Authors: Harpal Singh

  63. A Statistical Analysis of Bhairav-The first morning Raga

    Authors: Soubhik Chakraborty;Swarima Tewari

  64. A View of Cloud Computing

    Authors: Bhagwan Singh;Sumeet Dhawan;Anish Arora;Abhishek Patail

  65. Security Test by using F T M and Data Allocation Strategies on Leakage Detection

    Authors: Pallavali Radha;G. Sireesha

  66. Web Service Negotiation Using AHP for Business Oriented Design of Service Level Agreements

    Authors: Mr. R. Raju;Ms. D. Dhivya;Ms. R. Saranya;Ms. S. I. Abbinaya

  67. AN APPROACH TO GENERATE MST WITHOUT CHECKING CYCLE

    Authors: Sharadindu Roy;Prof. Samar Sarma

  68. Security from Denial of Sleep Attack in Wireless Sensor Network

    Authors: Simerpreet Kaur;Md. Ataullah;Monika Garg

  69. THE IMPROVEMENT OF THE STABILITY PROBLEM OF RESHA GENERATION PLANT IN JORDAN

    Authors: Anwar Almofleh;Mahmoud Awad

  70. Providing security for Web Service Composition using Finite State Machine

    Authors: Priya Sundar;R Raju;P Mahalakshmi;G Lalitha