ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Advanced Computer Research (IJACR) >>

Vol.4, No.15

Publisher: ACCENTS

Publishing Date: 2014-06-17

  1. The Correlation among Software Complexity Metrics with Case Study

    Authors: Yahya Tashtoush; Mohammed Al-Maolegi; Bassam Arkok

  2. Performance Analysis of Non- Coherent FSK System with Square Law Combining our Nakagami- m Fading Channel

    Authors: Krishna Chandra Roy; O.P. Roy

  3. Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System

    Authors: Krishna Chandra Roy; O.P. Roy

  4. The All Optical New Universal Gate Using TOAD

    Authors: Goutam Kumar Maity; Ashis Kumar Mandal; Supriti Samanta

  5. A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment

    Authors: Gaurav; Nitesh Kaushik; Jitender Bhardwaj

  6. A Study of Cloud Computing in the University Enterprise

    Authors: Adigun A. Adebisi; Adegun A. Adekanmi; Asani E. Oluwatobi

  7. Deterministic Models for Microarray Gene Expression Profiles

    Authors: V. Bhaskara Murthy; G. Pardha Saradhi Varma

  8. Study on Physiological Parameter Detection Systems

    Authors: Shruti Madan Kshirsagar; Gyankamal J. Chhajed

  9. Automatic Reactive Power Control Using FC-TCR

    Authors: Dhruvang R Gayakwad; C. R. Mehta; Samir P. Desai

  10. A Project on Atmospheric Water Generator with the Concept of Peltier Effect

    Authors: Aditya Nandy; Sharmi Saha; Souradeep Ganguly; Sharmistha Chattopadhyay

  11. An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection

    Authors: Reyadh Naoum; Shatha Aziz; Firas Alabsi

  12. Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol

    Authors: Sowmya P; V. Anitha

  13. Combination of Morphological Operations with Structure based Partitioning and grouping for Text String detection from Natural Scenes

    Authors: Vyankatesh V. Rampurkar; Gyankamal J. Chhajed

  14. Automatic Ranking of Machine Translation Outputs Using Linguistic Factors

    Authors: Pooja Gupta; Nisheeth Joshi; Iti Mathur

  15. Technology Implementation in Public Sectors units of Andhra Pradesh

    Authors: Rakesh Phanindra Akula; V. B. Narasimha; M.Chandrashekar

  16. Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training Mechanism

    Authors: Satyaki Roy; Ayan Chatterjee; Rituparna Pandit; Kaushik Goswami

  17. Image Processing Algorithms ? A Comprehensive Study

    Authors: Mahesh Prasanna K; Shantharama Rai C

  18. An Efficient Automated English to Bengali Script Conversion Mechanism

    Authors: Enakshi Mukhopadhyay; Priyanka Mazumder; Saberi Goswami; Romit S Beed

  19. Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region

    Authors: Sonali B. Ulape; Sheetal. A. Takale

  20. Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium Enterprises

    Authors: Lynnette Magasa; Mphahlele M.I; Awosejo; O.J

  21. Mining Association Rules to Evade Network Intrusion in Network Audit Data

    Authors: Kamini Nalavade; B.B. Meshram

  22. Web Search Results Summarization Using Similarity Assessment

    Authors: Sawant V.V.; Takale S.A.

  23. Preference Based Personalized News Recommender System

    Authors: Mansi Sood; Harmeet Kaur

  24. A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education

    Authors: S. S. Rai; Anil T. Gaikwad; R.V. Kulkarni

  25. An Accurate ANFIS-based MPPT for Solar PV System

    Authors: Ahmed Bin-Halabi; Adel Abdennour; Hussein Mashaly

  26. A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample

    Authors: Kai Li; Lijuan Cui

  27. Printed Text Character Analysis Version-II: Optimized optical character recognition for noisy images with the new user training and background detection mechanism

    Authors: Satyaki Roy; Ayan Chatterjee; Rituparna Pandit; Kaushik Goswami

  28. Design and Modeling of a 3 DOF Machine

    Authors: Marjan Sikandar

  29. Model Driven Development: Research Issues and Opportunities

    Authors: Mahua Banerjee; Sushil Ranjan Roy; Satya Narayan Singh

  30. Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet

    Authors: N. Rajesh kumar; P.Mohanapriya; M.Kalaiselvi

  31. A Survey on Web Spam and Spam 2.0

    Authors: Ashish Chandra; Mohammad Suaib

  32. Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption

    Authors: Naida.H.Nazmudeen; Farsana.F.J

  33. Disease Detection of Cotton Leaves Using Advanced Image Processing

    Authors: Vivek Chaudhari; C. Y. Patil

  34. Design and Implementation of Image Encryption Algorithm Using Chaos

    Authors: Sandhya Rani M.H.; K.L. Sudha

  35. Conceptual for User Satisfaction with the E-government in North of Jordan

    Authors: Fawzi hasan Altaany; Khalid ahmmad alsoudani

  36. Curvelet based Image Compression using Support Vector Machine and Core Vector Machine ? A Review

    Authors: P. Anandan; R. S. Sabeenian

  37. ATM, FDDI and Network Intrusion Simulation for Packet Data Networks

    Authors: Shahiruddin; D K Singh; Nidhi Verma; Sugandha Shukla

  38. Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation

    Authors: S S Riya Rani; I R Anzija; L Shameema Hameed

  39. Application of High Order X-LMS Filter for Active Noise Control

    Authors: N.V.K.Mahalakshmi; D.Sindhu; B. Ranjith Kumar; N.Santhisri; G. Sowjanya Rao

  40. Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA

    Authors: Fahad Abdullah Moafa

  41. Digital Watermarking for Medical Images using Biorthogonal Wavelet Filters and Transformed Watermark Embedding

    Authors: Mahavir Dhoka; Jitendra Kadam

  42. Low Power State Retention Technique for CMOS VLSI Design

    Authors: K. Mariya Priyadarshini; V. Kailash; M. Abhinaya; K. Prashanthi; Y. Kannaji

  43. Tessent BSCAN Insertion on 28nm SOC

    Authors: M. A. Wavhal; S. U. Bhandari

  44. Attack Penetration System for SQL Injection

    Authors: Manju Kaushik; Gazal Ojha

  45. Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time

    Authors: Urmi Chhajed; Ajay Kumar