Article The Correlation among Software Complexity Metrics with Case Study Authors :Yahya Tashtoush, Mohammed Al-Maolegi, Bassam Arkok DOI : View Full Article
Article Performance Analysis of Non- Coherent FSK System with Square Law Combining our Nakagami- m Fading Channel Authors :Krishna Chandra Roy , O.P. Roy DOI : View Full Article
Article Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System Authors :Krishna Chandra Roy, O.P. Roy DOI : View Full Article
Article The All Optical New Universal Gate Using TOAD Authors :Goutam Kumar Maity, Ashis Kumar Mandal, Supriti Samanta DOI : View Full Article
Article A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment Authors :Gaurav, Nitesh Kaushik, Jitender Bhardwaj DOI : View Full Article
Article A Study of Cloud Computing in the University Enterprise Authors :Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi DOI : View Full Article
Article Deterministic Models for Microarray Gene Expression Profiles Authors :V. Bhaskara Murthy, G. Pardha Saradhi Varma DOI : View Full Article
Article Study on Physiological Parameter Detection Systems Authors :Shruti Madan Kshirsagar, Gyankamal J. Chhajed DOI : View Full Article
Article Automatic Reactive Power Control Using FC-TCR Authors : Dhruvang R Gayakwad, C. R. Mehta, Samir P. Desai DOI : View Full Article
Article An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection Authors :Reyadh Naoum, Shatha Aziz, Firas Alabsi DOI : View Full Article
Article Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol Authors :Sowmya P, V. Anitha DOI : View Full Article
Article Combination of Morphological Operations with Structure based Partitioning and grouping for Text String detection from Natural Scenes Authors :Vyankatesh V. Rampurkar, Gyankamal J. Chhajed DOI : View Full Article
Article Automatic Ranking of Machine Translation Outputs Using Linguistic Factors Authors :Pooja Gupta, Nisheeth Joshi, Iti Mathur DOI : View Full Article
Article Technology Implementation in Public Sectors units of Andhra Pradesh Authors :Rakesh Phanindra Akula, V. B. Narasimha, M.Chandrashekar DOI : View Full Article
Article Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training Mechanism Authors :Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami DOI : View Full Article
Article Image Processing Algorithms – A Comprehensive Study Authors :Mahesh Prasanna K, Shantharama Rai C DOI : View Full Article
Article An Efficient Automated English to Bengali Script Conversion Mechanism Authors :Enakshi Mukhopadhyay, Priyanka Mazumder, Saberi Goswami, Romit S Beed DOI : View Full Article
Article Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region Authors :Sonali B. Ulape, Sheetal. A. Takale DOI : View Full Article
Article Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium Enterprises Authors :Lynnette Magasa, Mphahlele M.I, Awosejo, O.J DOI : View Full Article
Article Mining Association Rules to Evade Network Intrusion in Network Audit Data Authors :Kamini Nalavade, B.B. Meshram DOI : View Full Article
Article Web Search Results Summarization Using Similarity Assessment Authors :Sawant V.V. , Takale S.A. DOI : View Full Article
Article Preference Based Personalized News Recommender System Authors :Mansi Sood, Harmeet Kaur DOI : View Full Article
Article A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education Authors :S. S. Rai, Anil T. Gaikwad, R.V. Kulkarni DOI : View Full Article
Article An Accurate ANFIS-based MPPT for Solar PV System Authors :Ahmed Bin-Halabi, Adel Abdennour, Hussein Mashaly DOI : View Full Article
Article A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample Authors :Kai Li, Lijuan Cui DOI : View Full Article
Article Printed Text Character Analysis Version-II: Optimized optical character recognition for noisy images with the new user training and background detection mechanism Authors :Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami DOI : View Full Article
Article Model Driven Development: Research Issues and Opportunities Authors :Mahua Banerjee, Sushil Ranjan Roy, Satya Narayan Singh DOI : View Full Article
Article Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet Authors :N. Rajesh kumar, P.Mohanapriya, M.Kalaiselvi DOI : View Full Article
Article A Survey on Web Spam and Spam 2.0 Authors :Ashish Chandra, Mohammad Suaib DOI : View Full Article
Article Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption Authors :Naida.H.Nazmudeen , Farsana.F.J DOI : View Full Article
Article Disease Detection of Cotton Leaves Using Advanced Image Processing Authors :Vivek Chaudhari, C. Y. Patil DOI : View Full Article
Article Design and Implementation of Image Encryption Algorithm Using Chaos Authors :Sandhya Rani M.H., K.L. Sudha DOI : View Full Article
Article Conceptual for User Satisfaction with the E-government in North of Jordan Authors :Fawzi hasan Altaany, Khalid ahmmad alsoudani DOI : View Full Article
Article Curvelet based Image Compression using Support Vector Machine and Core Vector Machine – A Review Authors :P. Anandan, R. S. Sabeenian DOI : View Full Article
Article ATM, FDDI and Network Intrusion Simulation for Packet Data Networks Authors :Shahiruddin, D K Singh, Nidhi Verma, Sugandha Shukla DOI : View Full Article
Article Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation Authors :S S Riya Rani, I R Anzija, L Shameema Hameed DOI : View Full Article
Article Application of High Order X-LMS Filter for Active Noise Control Authors :N.V.K.Mahalakshmi, D.Sindhu, B. Ranjith Kumar, N.Santhisri, G. Sowjanya Rao DOI : View Full Article
Article Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA Authors :Fahad Abdullah Moafa DOI : View Full Article
Article Digital Watermarking for Medical Images using Biorthogonal Wavelet Filters and Transformed Watermark Embedding Authors :Mahavir Dhoka, Jitendra Kadam DOI : View Full Article
Article Low Power State Retention Technique for CMOS VLSI Design Authors :K. Mariya Priyadarshini, V. Kailash, M. Abhinaya, K. Prashanthi, Y. Kannaji DOI : View Full Article
Article Tessent BSCAN Insertion on 28nm SOC Authors :M. A. Wavhal, S. U. Bhandari DOI : View Full Article
Article Attack Penetration System for SQL Injection Authors :Manju Kaushik, Gazal Ojha DOI : View Full Article
Article Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time Authors :Urmi Chhajed, Ajay Kumar DOI : View Full Article