ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Advanced Computer Research (IJACR) >>

Vol.3, No.9

Publisher: ACCENTS

Publishing Date: 2013-04-16

  1. Block Based Information Hiding using Cosine, Hartley, Walsh and Haar Wavelets

    Authors: H. B. Kekre; Sudeep D. Thepade; Ratnesh N. Chaturvedi

  2. Robust LQR Control Design of Gyroscope

    Authors: Ashok S. Chandak; Anil J. Patil

  3. Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network

    Authors: Neha Gupta; Manish Shrivastava

  4. Result Analysis of Proposed Image Enhancement Algorithm Based on a Self Organizing Map Network and Wavelet Transform

    Authors: Shobhit Verma; Hitesh Gupta

  5. Extracting Person Name, Date and Place from Text Documents Using LEX Tool

    Authors: Roohi Sharma

  6. A Secure Mechanism to Supervise Automotive Sensor Network by Client on Smart Phone

    Authors: T R Yashavanth; Ravi S Malashetty; V R Udupi

  7. Multi-Level Security for Automotive ? RFID Based Technology with Lab VIEW Implementation

    Authors: Priya Darshini .V; Prakash.R; Prasannabalaje.S.M; Sangeetha Monica.T

  8. Attack Detection in Watermarked Images with PSNR and RGB Intensity

    Authors: Neha Chauhan; Akhilesh A. Waoo; P. S. Patheja

  9. Speech parameterization based on AM-FM model and its application in speaker identification using AANN

    Authors: D. Giften Francis Samuel; D. Synthiya Vinothini

  10. Credential Clustering in Parallel Comparability Frequency Amplitude

    Authors: Ameela.T; Kaleeswaran.D

  11. A Review of Protein-DNA Binding Motif using Association Rule Mining

    Authors: Virendra Kumar Tripathi; Hitesh Gupta

  12. A Survey of latest Algorithms for Frequent Itemset Mining in Data Stream

    Authors: U.Chandrasekhar; Sandeep Kumar. K; Yakkala Uma Mahesh

  13. Adaptive job Scheduling for Computational Grid based on Ant Colony Optimization with Genetic Parameter Selection

    Authors: Saurabh Mandloi; Hitesh Gupta

  14. A Survey of Middleware in different languages for Ubiquitous Services

    Authors: Neha Sharma; Usha Batra; Saurabh Mukherjee

  15. An Ensemble Method based on Particle of Swarm for the Reduction of Noise, Outlier and Core Point

    Authors: Satish Dehariya; Divakar Singh

  16. A Bandwidth-Efficient Cooperative Authentication and an En-route Filtering Scheme for Filtering Injected False Data in Wireless Sensor Networks

    Authors: T.R. Yashavanth; Ravi S Malashetty; Rashmi C.R

  17. Image Denoising based on Fourth-Order Partial Differential Equations: A Survey

    Authors: Anand Swaroop Khare; Ravi Mohan; Sumit Sharma

  18. Plasmonics based VLSI processes

    Authors: Shreya Bhattacharya

  19. Implement Security using smart card on Cloud

    Authors: Amish Kumar Aman; Vijay Prakash

  20. Association Rules Optimization: A Survey

    Authors: Anshuman Singh Sadh; Nitin Shukla

  21. Review of Information Authentication in Mobile Cloud over SaaS & PaaS Layers

    Authors: Vineet Guha; Manish Shrivastava

  22. Reactive Power Compensation in Transmission Line using Fuzzy Control Method: A Survey

    Authors: Yojna Saratkar; Arun Pachori

  23. An Efficient Image Denoising Method based on Fourth-Order Partial Differential Equations

    Authors: Anand Swaroop Khare; Ravi Mohan; Sumit Sharma

  24. Reactive Power Compensation on 132 KV Substation Using Soft Computing Techniques (Fuzzy Logic)

    Authors: Yojna Saratkar; Arun Pachori

  25. An Efficient Partition Technique to reduce the Attack Detection Time with Web based Text and PDF files

    Authors: Animesh Dubey; Ravindra Gupta; Gajendra Singh Chandel