S.No. | Title | Author | Pages | View | Google Scholar |
---|---|---|---|---|---|
1 |
The Correlation among Software Complexity Metrics with Case Study |
Yahya Tashtoush, Mohammed Al-Maolegi, Bassam Arkok |
414 -419 |
12791 |
View |
2 |
Krishna Chandra Roy , O.P. Roy |
420 -426 |
12111 |
View | |
3 |
Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System |
Krishna Chandra Roy, O.P. Roy |
427 -431 |
13091 |
View |
4 |
Goutam Kumar Maity, Ashis Kumar Mandal, Supriti Samanta |
432 -441 |
12389 |
View | |
5 |
A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment |
Gaurav, Nitesh Kaushik, Jitender Bhardwaj |
442 -449 |
14021 |
View |
6 |
Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi |
450 -458 |
11654 |
View | |
7 |
Deterministic Models for Microarray Gene Expression Profiles |
V. Bhaskara Murthy, G. Pardha Saradhi Varma |
459 -468 |
14299 |
View |
8 |
Shruti Madan Kshirsagar, Gyankamal J. Chhajed |
469 -475 |
12561 |
View | |
9 |
Dhruvang R Gayakwad, C. R. Mehta, Samir P. Desai |
476 -480 |
14338 |
View | |
10 |
An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection |
Reyadh Naoum, Shatha Aziz, Firas Alabsi |
487 -493 |
13199 |
View |
11 |
Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol |
Sowmya P, V. Anitha |
494 -501 |
13859 |
View |
12 |
Vyankatesh V. Rampurkar, Gyankamal J. Chhajed |
502 -509 |
14065 |
View | |
13 |
Automatic Ranking of Machine Translation Outputs Using Linguistic Factors |
Pooja Gupta, Nisheeth Joshi, Iti Mathur |
510 -517 |
15175 |
View |
14 |
Technology Implementation in Public Sectors units of Andhra Pradesh |
Rakesh Phanindra Akula, V. B. Narasimha, M.Chandrashekar |
518 -523 |
13010 |
View |
15 |
Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami |
524 -531 |
14280 |
View | |
16 |
Mahesh Prasanna K, Shantharama Rai C |
532 -539 |
13629 |
View | |
17 |
An Efficient Automated English to Bengali Script Conversion Mechanism |
Enakshi Mukhopadhyay, Priyanka Mazumder, Saberi Goswami, Romit S Beed |
540 -548 |
13217 |
View |
18 |
Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region |
Sonali B. Ulape, Sheetal. A. Takale |
549 -554 |
12385 |
View |
19 |
Lynnette Magasa, Mphahlele M.I, Awosejo, O.J |
555 -559 |
12188 |
View | |
20 |
Mining Association Rules to Evade Network Intrusion in Network Audit Data |
Kamini Nalavade, B.B. Meshram |
560 -567 |
14042 |
View |
21 |
Web Search Results Summarization Using Similarity Assessment |
Sawant V.V. , Takale S.A. |
568 -574 |
13526 |
View |
22 |
Mansi Sood, Harmeet Kaur |
575 -581 |
13554 |
View | |
23 |
A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education |
S. S. Rai, Anil T. Gaikwad, R.V. Kulkarni |
582 -587 |
12426 |
View |
24 |
Ahmed Bin-Halabi, Adel Abdennour, Hussein Mashaly |
588 -595 |
12949 |
View | |
25 |
A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample |
Kai Li, Lijuan Cui |
596 -600 |
12040 |
View |
26 |
Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami |
601 -610 |
13058 |
View | |
27 |
Marjan Sikandar |
611 -617 |
13316 |
View | |
28 |
Mahua Banerjee, Sushil Ranjan Roy, Satya Narayan Singh |
618 -626 |
13623 |
View | |
29 |
Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet |
N. Rajesh kumar, P.Mohanapriya, M.Kalaiselvi |
627 -633 |
13153 |
View |
30 |
Ashish Chandra, Mohammad Suaib |
634 -644 |
12374 |
View | |
31 |
Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption |
Naida.H.Nazmudeen , Farsana.F.J |
645 -652 |
14051 |
View |
32 |
Disease Detection of Cotton Leaves Using Advanced Image Processing |
Vivek Chaudhari, C. Y. Patil |
653 -659 |
12234 |
View |
33 |
Design and Implementation of Image Encryption Algorithm Using Chaos |
Sandhya Rani M.H., K.L. Sudha |
660 -664 |
15262 |
View |
34 |
Conceptual for User Satisfaction with the E-government in North of Jordan |
Fawzi hasan Altaany, Khalid ahmmad alsoudani |
665 -672 |
14139 |
View |
35 |
Curvelet based Image Compression using Support Vector Machine and Core Vector Machine – A Review |
P. Anandan, R. S. Sabeenian |
673 -679 |
12587 |
View |
36 |
ATM, FDDI and Network Intrusion Simulation for Packet Data Networks |
Shahiruddin, D K Singh, Nidhi Verma, Sugandha Shukla |
680 -685 |
13915 |
View |
37 |
Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation |
S S Riya Rani, I R Anzija, L Shameema Hameed |
686 -692 |
15378 |
View |
38 |
Application of High Order X-LMS Filter for Active Noise Control |
N.V.K.Mahalakshmi, D.Sindhu, B. Ranjith Kumar, N.Santhisri, G. Sowjanya Rao |
693 -698 |
12219 |
View |
39 |
Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA |
Fahad Abdullah Moafa |
699 -704 |
12419 |
View |
40 |
Mahavir Dhoka, Jitendra Kadam |
705 -712 |
11037 |
View | |
41 |
K. Mariya Priyadarshini, V. Kailash, M. Abhinaya, K. Prashanthi, Y. Kannaji |
713 -717 |
14676 |
View | |
42 |
M. A. Wavhal, S. U. Bhandari |
718 -723 |
11286 |
View | |
43 |
Manju Kaushik, Gazal Ojha |
724 -732 |
12061 |
View | |
44 |
Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time |
Urmi Chhajed, Ajay Kumar |
733 -740 |
10976 |
View |