ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Techniques >>

Vol.2, No.1

Publisher: International Research Group

Publishing Date: 2015-01-01

  1. Detection Of Optic Disc In Retina Using Digital Image Processing

    Authors: Vijaya R.Patil; Vaishali Kumbhakarna; Dr.Seema Kawathekar

  2. Review on Speckle Noise Reduction Techniques for Medical Ultrasound Image Processing

    Authors: Vaishali Kumbhakarna; Vijaya R.Patil; Dr.Seema Kawathekar

  3. A Location-Based Personal Task Reminder for Mobile Users In Wireless College Campus Environment(Indoor And Outdoor)

    Authors: Tejaswinee Ugale; Nikhil Patil; Lohit Lende

  4. Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing

    Authors: Sonali V.Satonkar; Dr.seema Kawathekar

  5. Image Resolution Improvement Using DWT & SWT Transform

    Authors: Thorat Ashwini Anil; Katariya S. S

  6. Image Fusion Using Absolute Maximum Fusion Rule Using Biorthogonal Wavelet Transform

    Authors: Kawade Sonam P; Ubale V.S

  7. Fusion of Iris and Palmprint Traits for Human Identification

    Authors: Apurva D. Dhawale; K. V. Kale

  8. Analysis of Crosspoint Cost and Buffer Cost of Omega Network Using MLMIN

    Authors: Smilly Soni; Abhilash Sharma; Ashish Jalota

  9. Vehicle Dynamics Response to Road Hump using a 10 Degrees of Freedom Full-Car Model

    Authors: Galal Ali Hassaan; Nasser Abdul-Azim Mohammed

  10. SECURING A STORAGE AREA NETWORKS

    Authors: R.Sumangali; Dr.B.Srinivasan

  11. Comparative Study of Genetic Operators and Parameters for Multiprocessor Task Scheduling

    Authors: Bhawna Gupta

  12. Image Fusion Based on Medical Images Using DWT and PCA Methods

    Authors: Roshan P. Helonde; Joshi

  13. MODELLING AND SIMULATION OF SUBSEA UMBILICAL DYNAMICS: A NUMERICAL APPROACH

    Authors: O. O. Ajayi; O. O. Aribike

  14. Mining Text using Levenshtein Distance in Hierarchical Clusteing

    Authors: Simranjit Kaur; Kiranjyoti

  15. Survey on Silent Software Installation and LAN control using Android App

    Authors: Prof.S.S.Chaudhari; ChaitaleeAthare; AnushriGaikwad; SnehaShegar; PranaliWakchaure

  16. A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

    Authors: Sejal D Mello; Priyanka B. Patil; Tarannum Parveen S. Shaikh; Heena S. Shaikh; Shahnawaz M. Malik

  17. An Comparative study and evaluation on performance of Intrusion Detection Schemes in MANET

    Authors: Deepika Goyal; Deepak Kumar Xaxa Assistant

  18. A Comparative study of Classification Techniques for Detecting Suspicious Criminal Activities on Emails

    Authors: Hitesh Mahanand; Deepak Kumar Xaxa Assistant

  19. Digital Image Steganography using a Novel Uniform Distortion Function with all Possible DCT Magnitudes

    Authors: N.Jeyakumar; M.Thangasivagamaselvi

  20. DOMI: A Dynamic Ordering Multi-field Index for Data Processing

    Authors: SuraI.Mohammed; Hussien M. Sharaf; Fatma A. Omara

  21. IT Governance Ontology Building Process : Example of developing Audit Ontology

    Authors: Chergui Meriyem; Sayouti Adil; Medromi Hicham

  22. A Novel Classification Algorithm based on Contextual Information using FCM Classifier for Brain Tumor Diagnosis using MR Images

    Authors: Dinesh Babu G L; Hariharan G

  23. Optimal Kinematic Synthesis of Planar Mechanism, Part I: Offset Crank-Slider Mechanism

    Authors: Galal Ali Hassaan

  24. Comprehensive analysis of different clustering algorithm and their impact over time series data

    Authors: Ibrahim K A Abughali; SonajhariaMinz

  25. “SOURCE PRIVACY” THROUGH SELECTION OF SET AND LIVELY ROUTING PATH

    Authors: G.B.Karthik Ragu; K.Supriya