Archived Papers for Journal
International Journal of Computer Techniques >>
Vol.2, No.1
Publisher: International Research Group
Publishing Date: 2015-01-01
- Detection Of Optic Disc In Retina Using Digital Image ProcessingAuthors: Vijaya R.Patil; Vaishali Kumbhakarna; Dr.Seema Kawathekar
- Review on Speckle Noise Reduction Techniques for Medical Ultrasound Image ProcessingAuthors: Vaishali Kumbhakarna; Vijaya R.Patil; Dr.Seema Kawathekar
- A Location-Based Personal Task Reminder for Mobile Users In Wireless College Campus Environment(Indoor And Outdoor)Authors: Tejaswinee Ugale; Nikhil Patil; Lohit Lende
- Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicingAuthors: Sonali V.Satonkar; Dr.seema Kawathekar
- Image Resolution Improvement Using DWT & SWT TransformAuthors: Thorat Ashwini Anil; Katariya S. S
- Image Fusion Using Absolute Maximum Fusion Rule Using Biorthogonal Wavelet TransformAuthors: Kawade Sonam P; Ubale V.S
- Fusion of Iris and Palmprint Traits for Human IdentificationAuthors: Apurva D. Dhawale; K. V. Kale
- Analysis of Crosspoint Cost and Buffer Cost of Omega Network Using MLMINAuthors: Smilly Soni; Abhilash Sharma; Ashish Jalota
- Vehicle Dynamics Response to Road Hump using a 10 Degrees of Freedom Full-Car ModelAuthors: Galal Ali Hassaan; Nasser Abdul-Azim Mohammed
- SECURING A STORAGE AREA NETWORKSAuthors: R.Sumangali; Dr.B.Srinivasan
- Comparative Study of Genetic Operators and Parameters for Multiprocessor Task SchedulingAuthors: Bhawna Gupta
- Image Fusion Based on Medical Images Using DWT and PCA MethodsAuthors: Roshan P. Helonde; Joshi
- MODELLING AND SIMULATION OF SUBSEA UMBILICAL DYNAMICS: A NUMERICAL APPROACHAuthors: O. O. Ajayi; O. O. Aribike
- Mining Text using Levenshtein Distance in Hierarchical ClusteingAuthors: Simranjit Kaur; Kiranjyoti
- Survey on Silent Software Installation and LAN control using Android AppAuthors: Prof.S.S.Chaudhari; ChaitaleeAthare; AnushriGaikwad; SnehaShegar; PranaliWakchaure
- A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)Authors: Sejal D Mello; Priyanka B. Patil; Tarannum Parveen S. Shaikh; Heena S. Shaikh; Shahnawaz M. Malik
- An Comparative study and evaluation on performance of Intrusion Detection Schemes in MANETAuthors: Deepika Goyal; Deepak Kumar Xaxa Assistant
- A Comparative study of Classification Techniques for Detecting Suspicious Criminal Activities on EmailsAuthors: Hitesh Mahanand; Deepak Kumar Xaxa Assistant
- Digital Image Steganography using a Novel Uniform Distortion Function with all Possible DCT MagnitudesAuthors: N.Jeyakumar; M.Thangasivagamaselvi
- DOMI: A Dynamic Ordering Multi-field Index for Data ProcessingAuthors: SuraI.Mohammed; Hussien M. Sharaf; Fatma A. Omara
- IT Governance Ontology Building Process : Example of developing Audit OntologyAuthors: Chergui Meriyem; Sayouti Adil; Medromi Hicham
- A Novel Classification Algorithm based on Contextual Information using FCM Classifier for Brain Tumor Diagnosis using MR ImagesAuthors: Dinesh Babu G L; Hariharan G
- Optimal Kinematic Synthesis of Planar Mechanism, Part I: Offset Crank-Slider MechanismAuthors: Galal Ali Hassaan
- Comprehensive analysis of different clustering algorithm and their impact over time series dataAuthors: Ibrahim K A Abughali; SonajhariaMinz
- “SOURCE PRIVACY” THROUGH SELECTION OF SET AND LIVELY ROUTING PATHAuthors: G.B.Karthik Ragu; K.Supriya