International Journal of Advanced Computer Research ISSN (Print): 2249-7277    ISSN (Online): 2277-7970 Volume-4 Issue-15 June-2014

  1. Citations

S.No. Title Author Pages View Google Scholar
1

The Correlation among Software Complexity Metrics with Case Study

Yahya Tashtoush, Mohammed Al-Maolegi, Bassam Arkok

414 -419

12791

View
2

Performance Analysis of Non- Coherent FSK System with Square Law Combining our Nakagami- m Fading Channel

Krishna Chandra Roy , O.P. Roy

420 -426

12111

View
3

Performance Analysis of Optimum Receiver of Nakagami fading Channel for Non-coherent FSK System

Krishna Chandra Roy, O.P. Roy

427 -431

13091

View
4

The All Optical New Universal Gate Using TOAD

Goutam Kumar Maity, Ashis Kumar Mandal, Supriti Samanta

432 -441

12389

View
5

A Computation Offloading Framework to Optimize Makespan in Mobile Cloud Computing Environment

Gaurav, Nitesh Kaushik, Jitender Bhardwaj

442 -449

14021

View
6

A Study of Cloud Computing in the University Enterprise

Adigun A. Adebisi, Adegun A. Adekanmi, Asani E. Oluwatobi

450 -458

11654

View
7

Deterministic Models for Microarray Gene Expression Profiles

V. Bhaskara Murthy, G. Pardha Saradhi Varma

459 -468

14299

View
8

Study on Physiological Parameter Detection Systems

Shruti Madan Kshirsagar, Gyankamal J. Chhajed

469 -475

12561

View
9

Automatic Reactive Power Control Using FC-TCR

Dhruvang R Gayakwad, C. R. Mehta, Samir P. Desai

476 -480

14338

View
10

An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection

Reyadh Naoum, Shatha Aziz, Firas Alabsi

487 -493

13199

View
11

Defence Mechanism for SYBIL Attacks in MANETS using ABR Protocol

Sowmya P, V. Anitha

494 -501

13859

View
12

Combination of Morphological Operations with Structure based Partitioning and grouping for Text String detection from Natural Scenes

Vyankatesh V. Rampurkar, Gyankamal J. Chhajed

502 -509

14065

View
13

Automatic Ranking of Machine Translation Outputs Using Linguistic Factors

Pooja Gupta, Nisheeth Joshi, Iti Mathur

510 -517

15175

View
14

Technology Implementation in Public Sectors units of Andhra Pradesh

Rakesh Phanindra Akula, V. B. Narasimha, M.Chandrashekar

518 -523

13010

View
15

Printed Text Character Analysis Version-I: Optical Character Recognition with the new User Training Mechanism

Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami

524 -531

14280

View
16

Image Processing Algorithms – A Comprehensive Study

Mahesh Prasanna K, Shantharama Rai C

532 -539

13629

View
17

An Efficient Automated English to Bengali Script Conversion Mechanism

Enakshi Mukhopadhyay, Priyanka Mazumder, Saberi Goswami, Romit S Beed

540 -548

13217

View
18

Representative and Diverse Image Set Gathering for Geographic Area and its Surrounding Region

Sonali B. Ulape, Sheetal. A. Takale

549 -554

12385

View
19

Utilization of Competitive Intelligence to Enhance Firm Performance: A Case of South African Small and Medium Enterprises

Lynnette Magasa, Mphahlele M.I, Awosejo, O.J

555 -559

12188

View
20

Mining Association Rules to Evade Network Intrusion in Network Audit Data

Kamini Nalavade, B.B. Meshram

560 -567

14042

View
21

Web Search Results Summarization Using Similarity Assessment

Sawant V.V. , Takale S.A.

568 -574

13526

View
22

Preference Based Personalized News Recommender System

Mansi Sood, Harmeet Kaur

575 -581

13554

View
23

A Research Paper on Simulation Model for Teaching and Learning Process in Higher Education

S. S. Rai, Anil T. Gaikwad, R.V. Kulkarni

582 -587

12426

View
24

An Accurate ANFIS-based MPPT for Solar PV System

Ahmed Bin-Halabi, Adel Abdennour, Hussein Mashaly

588 -595

12949

View
25

A Kernel Fuzzy Clustering Algorithm with Generalized Entropy Based on Weighted Sample

Kai Li, Lijuan Cui

596 -600

12040

View
26

Printed Text Character Analysis Version-II: Optimized optical character recognition for noisy images with the new user training and background detection mechanism

Satyaki Roy, Ayan Chatterjee, Rituparna Pandit, Kaushik Goswami

601 -610

13058

View
27

Design and Modeling of a 3 DOF Machine

Marjan Sikandar

611 -617

13316

View
28

Model Driven Development: Research Issues and Opportunities

Mahua Banerjee, Sushil Ranjan Roy, Satya Narayan Singh

618 -626

13623

View
29

Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet

N. Rajesh kumar, P.Mohanapriya, M.Kalaiselvi

627 -633

13153

View
30

A Survey on Web Spam and Spam 2.0

Ashish Chandra, Mohammad Suaib

634 -644

12374

View
31

Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption

Naida.H.Nazmudeen , Farsana.F.J

645 -652

14051

View
32

Disease Detection of Cotton Leaves Using Advanced Image Processing

Vivek Chaudhari, C. Y. Patil

653 -659

12234

View
33

Design and Implementation of Image Encryption Algorithm Using Chaos

Sandhya Rani M.H., K.L. Sudha

660 -664

15262

View
34

Conceptual for User Satisfaction with the E-government in North of Jordan

Fawzi hasan Altaany, Khalid ahmmad alsoudani

665 -672

14139

View
35

Curvelet based Image Compression using Support Vector Machine and Core Vector Machine – A Review

P. Anandan, R. S. Sabeenian

673 -679

12587

View
36

ATM, FDDI and Network Intrusion Simulation for Packet Data Networks

Shahiruddin, D K Singh, Nidhi Verma, Sugandha Shukla

680 -685

13915

View
37

Conceptual Study of OFDM-Coding, PAPR Reduction, Channel Estimation

S S Riya Rani, I R Anzija, L Shameema Hameed

686 -692

15378

View
38

Application of High Order X-LMS Filter for Active Noise Control

N.V.K.Mahalakshmi, D.Sindhu, B. Ranjith Kumar, N.Santhisri, G. Sowjanya Rao

693 -698

12219

View
39

Classifications of Cybercrimes-Based Legislations: A Comparative Research between the UK and KSA

Fahad Abdullah Moafa

699 -704

12419

View
40

Digital Watermarking for Medical Images using Biorthogonal Wavelet Filters and Transformed Watermark Embedding

Mahavir Dhoka, Jitendra Kadam

705 -712

11037

View
41

Low Power State Retention Technique for CMOS VLSI Design

K. Mariya Priyadarshini, V. Kailash, M. Abhinaya, K. Prashanthi, Y. Kannaji

713 -717

14676

View
42

Tessent BSCAN Insertion on 28nm SOC

M. A. Wavhal, S. U. Bhandari

718 -723

11286

View
43

Attack Penetration System for SQL Injection

Manju Kaushik, Gazal Ojha

724 -732

12061

View
44

Detecting Cross-Site Scripting Vulnerability and performance comparison using C-Time and E-Time

Urmi Chhajed, Ajay Kumar

733 -740

10976

View