International Journal of Advanced Computer Research ISSN (Print): 2249-7277    ISSN (Online): 2277-7970 Volume-3 Issue-13 December-2013

  1. Citations

S.No. Title Author Pages View Google Scholar
1

A Selective Fuzzy Clustering Ensemble Algorithm

Kai Li, Peng Li

1 -6

20134

View
2

A Review: Multi-Dimensional Space-Time Multilevel Codes using Rician Fading

Karanvir Sidhu, Gagandeep Singh

7 -10

21587

View
3

Designs and Implementation of Learning Application of Fourier Series on Mobile Phones

Moechammad Sarosa, Kristina Widjajanti, Deddy Bagus S., Tri Kencana Galaxy

11 -15

21971

View
4

SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel

Dnyaneshwar.K, CH.Suneetha

16 -21

21604

View
5

A Comparison between E-Government Ranks in Jordan and Malaysian

Fawzi Altaany, Mohammad Issa Al-Zoubi

22 -27

21233

View
6

Multi Way Feedback Encryption Standard Ver-2(MWFES-2)

Asoke Nath, Debdeep Basu, Surajit Bhowmik, Ankita Bose, Saptarshi Chatterjee

28 -34

21259

View
7

Root Cause Analysis and New Practical Schemes for better Accessing and Establishing of Dedicated Control Channel in Cellular Networks

Mohammad Rasoul Tanhatalab, Ali Azarshad, Mehrzad Olfat, Mojtaba Shakerifard

35 -46

22569

View
8

Performance Analysis of Various Filters for Image Noise Removal in Different Noise Environment

R. Srinivas, Satarupa Panda

47 -52

18964

View
9

Smartgrid: An Introduction

Abhas Kumar Singh, Y R Sood, Harmendra Singh, Sanjeev Kumar Gagrai

53 -57

24540

View
10

Test case generation for On Board Computer Software Major Components

Dinesha H A, V.K Agrawal

58 -62

20039

View
11

Predicting E-Business Adoption through Integrating the Constructs of the Rogers’s Diffusion of Innovation Theory Combined with Technology-Organization-Environment Model

Mohammad Issa Al-Zoubi

63 -73

18950

View
12

Estimation of Variance of the time to recruitment under two sources of depletion

S.Dhivya, A.Srinivasan

74 -78

18498

View
13

Mathematical model of various statements of C-type Language

Manoj Kumar Srivastav, Asoke Nath

79 -87

19554

View
14

Generating Trust Based Recommendations for Multiple Independent Domains

Harmeet Kaur, Deepali Jain

88 -97

19610

View
15

Low Power Implementation of Fast Fourier Transform Processor on FPGA

Shashank Gupta

98 -105

21609

View
16

Image Classification by Combining Wavelet Transform and Neural Network

Dharmendra Patidar, Nitin Jain, Baluram Nagariya, Manoj Mishra

106 -110

21717

View
17

Assembly of an Experimental Quad-Rotor Type UAV for Testing a Novel Autonomous Flight Control Strategy

Shahida Khatoon, Dhiraj Gupta, Ahmad Saad Khan

111 -120

17537

View
18

Multi-dimensional Affinity Aware VM Placement Algorithm in Cloud Computing

Nilesh Pachorkar, Rajesh Ingle

121 -125

17100

View
19

Prediction of Performance Degradation in Cloud Computing

Pritam Fulsoundar, Rajesh Ingle

126 -129

21667

View
20

General Fault Admittance Method Solution of a Line-to-Line Fault

J.D. Sakala, J.S.J. Daka

130 -138

20250

View
21

Sentiment Analysis of Movie Reviews using Hybrid Method of Naive Bayes and Genetic Algorithm

M.Govindarajan

139 -145

19384

View
22

Framework for Efficient Secure Steganographic Communication over Network Protocols

Jasbir Singh, Lalitsen Sharma

146 -150

16619

View
23

An Optimized Multikeying Chaotic Encryption for Real Time Applications

R. Tamijetchelvy, P. Sankaranarayanan

151 -159

21203

View
24

Inverse Kinematics Using Neuro-Fuzzy Intelligent Technique for Robotic Manipulator

Shiv Manjaree, Vijyant Agarwal, B C Nakra

160 -165

21712

View
25

Network routing problem-A simulation environment using Intelligent technique

Vijayalaxmi, Chandrashekara S.Adiga, H.G.Joshi, Harish S.V

166 -171

16501

View
26

Instrument Cluster Driver Information Display Database and Viewer Tool

Adnan Shaout, Dominic Colella

172 -183

21876

View
27

Search the Set of Shorter Paths Using Graph Reduction Technique

Tarak Nath Paul, Abhoy Chand Mondal

184 -192

15648

View
28

Novel Method for Edge Detection for Gray Scale Images using VC++ Environment

Harsimran Singh, Tajinder kaur

193 -197

20646

View
29

THD Reduction in Performance of Cascaded Multi-Level Inverter Fed Induction Motor Drive

Naveen Kumar Verma, Preeti Gupta, Amit Shrivastava

198 -203

20977

View
30

FPGA - Based Evaluation of Power Analysis Attacks and Its Countermeasures on Asynchronous S-Box

G. Gokulashree, R. Ramya

204 -210

18661

View
31

Interactive Image Segmentation and Edge Detection of Medical Images

Sameena Banu, Apparao Giduturi, Syed Abdul Sattar

211 -215

16758

View
32

Exploring Security Mechanisms to Android Device

Chetan C.Kotkar, Pravin Game

216 -221

17496

View
33

Generation of Branch Coverage Test Data for Simulink/Stateflow Models Using Crest Tool

Sangharatna Godboley, Adepu Sridhar,Bhupendra kharpuse , Durga Prasad Mohapatra, Banshidhar Majhi

222 -229

20377

View
34

One Twenty Phase Code Design for Radar

E.N.V. Purna Chandra Rao, S.P Singh

230 -235

17056

View
35

Semantic Web Approach towards E-Commerce

V.Kiran Kumar, S.Murali Mohan

236 -241

17278

View
36

The EDL Effect in Microchannel Flow: A Critical Review

S. Kumar

242 -250

16009

View
37

Content Based Image Retrieval by Multi Features using Image Blocks

Arpita Mathur, Rajeev Mathur

251 -255

15916

View
38

An Overview on Data Mining Approach on Breast Cancer data

Shiv Shakti Shrivastava, Anjali Sant, Ramesh Prasad Aharwal

256 -262

17482

View
39

Secure and Automated Communication in Client and Server Environment

Saket Gupta

263 -271

19095

View
40

Fault Detection of Induction Motor Using Current and Vibration Monitoring

Sumit Narwade, Prasad Kulkarni, C.Y.Patil

272 -279

18778

View
41

Deployment Techniques of Nodes in WSN for Multi-Domain Applications A Survey on their performance analysis

Mamatha G, B G Premasudha

280 -288

21114

View
42

Segmentation and Canny Edge Method in MRI Brain Cyst Detection

Vrushali D. Dharmale, P. A. Tijare

289 -293

15428

View
43

A new Approach for Averting Jamming Invasion with Packet Hiding Methods

M.Ramabai, E.Komalavalli

294 -297

18236

View
44

Assessment of Predictive Object Points (POP) Values for Java Projects

Shubha Jain, Vijay Yadav, Raghuraj Singh

298 -301

19695

View
45

Automatic Identification of Modal, Breathy and Creaky Voices

Poonam Sharma, Ajay Sharma

302 -306

16854

View
46

Automatic Question Generation Using Software Agents for Technical Institutions

Shivank Pandey, K.C. Rajeswari

307 -311

21226

View
47

Speed control of PMSM system using improved reaching law based sliding mode control and disturbance observer technique

Shital M.Wasu , U. B. Sarode , M. P. Bhavalkar

312 -318

15270

View
48

Hybrid Cryptographic Processor for Secure Communication Using FPGA

Savitha Raj.S, Merlin Sharmila.A, Poorinima Beneta.P

319 -324

16589

View
49

Smart System to Recognize EEG Signal for Finding Brain Diseases Using K-Means Clustering

K.Gomathi, D.Leela, S.Prasad

325 -329

19768

View
50

Survey on Digital Watermarking on Medical Images

Kavitha K J, Reshma M

330 -335

19500

View
51

Image Segmentation Using Two Step Splitting Function

Gopal Kumar Jha, Bhagwan Swaroop Sharma, Tribodh Tripathi

336 -343

13076

View
52

Modified Multi Way Feedback Encryption Standard (MWFES) Ver-I

Prabal Banerjee, Purnendu Mukherjee, Asoke Nath

344 -351

11438

View