The EVAS Model:Solving E-Voting Problems in Nigeria |
O. S. Ogunseye, O. Folorunso, J. O. Okesola, J. R. Woodward |
Vol 3, No 2 (2010), Pagination: 219-226
|
ABSTRACT |
PDF
|
|
Abstract Views: 223 |
PDF Views: 0
|
Mining Intelligent e-Voting Data:A Framework |
Julius O. Okesola, Oluwafemi S. Ogunseye, Kazeem I. Rufai, Olusegun Folorunso |
Vol 3, No 2 (2010), Pagination: 227-231
|
ABSTRACT |
PDF
|
|
Abstract Views: 228 |
PDF Views: 0
|
Living of Student in the Internet Age |
K. K. Dwivedi, Mayaram Atal, Ashish Rastogi, H. C. Katariya, R. K. Shrivastava |
Vol 3, No 2 (2010), Pagination: 233-244
|
ABSTRACT |
PDF
|
|
Abstract Views: 241 |
PDF Views: 0
|
Study of Assembly Line Scheduling, an Application of Dynamic Programming |
Sanjukta Mohanty, Prafulla K. Behera |
Vol 3, No 2 (2010), Pagination: 245-254
|
ABSTRACT |
PDF
|
|
Abstract Views: 259 |
PDF Views: 0
|
Logical Study of Passwords |
Mushtaq Ahmad Rather, Tariq Ahamad Ahanger |
Vol 3, No 2 (2010), Pagination: 255-259
|
ABSTRACT |
PDF
|
|
Abstract Views: 248 |
PDF Views: 0
|
Comparative Analysis on Speckle Noise Reduction Techniques on Computed Tomographic Images |
Hitesh H. Vandra, H. N. Pandya |
Vol 3, No 2 (2010), Pagination: 261-264
|
ABSTRACT |
PDF
|
|
Abstract Views: 226 |
PDF Views: 0
|
Identifying Some Problems with Selection of Software Testing Techniques |
Sheikh Umar Farooq, S. M. K. Quadri |
Vol 3, No 2 (2010), Pagination: 265-268
|
ABSTRACT |
PDF
|
|
Abstract Views: 275 |
PDF Views: 0
|
Some Notable Reliability Techniques for Disk File Systems |
Wasim Ahmad Bhat, S. M. K. Quadri |
Vol 3, No 2 (2010), Pagination: 269-271
|
ABSTRACT |
PDF
|
|
Abstract Views: 224 |
PDF Views: 1
|
IRIS Template Classification Using Selective Sub Bands of Wavelets |
V. Narayana, P. S. R. Chandra Murty, E. Sreenivasa Reddy |
Vol 3, No 2 (2010), Pagination: 273-282
|
ABSTRACT |
PDF
|
|
Abstract Views: 243 |
PDF Views: 4
|
A New Intelligent Predictive Caching Algorithm for Internet Web Servers |
B. V. Pawar, J. B. Patil |
Vol 3, No 2 (2010), Pagination: 283-290
|
ABSTRACT |
PDF
|
|
Abstract Views: 225 |
PDF Views: 0
|
Secure and Auditable Agent-Based Communication Protocol for e-Health System Framework |
M. Aramudhan, K. Mohan |
Vol 3, No 2 (2010), Pagination: 291-298
|
ABSTRACT |
PDF
|
|
Abstract Views: 244 |
PDF Views: 0
|
Key Management with Cryptography |
Syed Minhaj Ali, Satish V. Reve, Roohi Ali, Sana Iqbal |
Vol 3, No 2 (2010), Pagination: 299-304
|
ABSTRACT |
PDF
|
|
Abstract Views: 206 |
PDF Views: 2
|
A Novel Approach to Construct Decision Tree Using Quick C4.5 Algorithm |
Deepti Juneja, Sachin Sharma, Anupriya Jain, Seema Sharma |
Vol 3, No 2 (2010), Pagination: 305-310
|
ABSTRACT |
PDF
|
|
Abstract Views: 236 |
PDF Views: 2
|
Multiple Classifiers System for Medical Diagnosis |
M. Solomon Pushparaj, P. J. Kulkarni |
Vol 3, No 2 (2010), Pagination: 311-316
|
ABSTRACT |
PDF
|
|
Abstract Views: 205 |
PDF Views: 0
|
Rule Based Approach for English to Sanskrit Machine Translation and Synthesizer System |
D. T. Mane, P. R. Devale, S. D. Suryawanshi |
Vol 3, No 2 (2010), Pagination: 317-322
|
ABSTRACT |
PDF
|
|
Abstract Views: 238 |
PDF Views: 0
|
Boundary Value Analysis for Non-Numerical Variables:Strings |
Anupriya Jain, Sachin Sharma, Seema Sharma, Deepti Juneja |
Vol 3, No 2 (2010), Pagination: 323-330
|
ABSTRACT |
PDF
|
|
Abstract Views: 225 |
PDF Views: 0
|
Detecting Terror-Related Activities on the Web Using Neural Network |
Deepak Tinguriya, Binod Kumar |
Vol 3, No 2 (2010), Pagination: 331-336
|
ABSTRACT |
PDF
|
|
Abstract Views: 211 |
PDF Views: 4
|
Establishment of Evaluation Scheme of Model Driven Architecture |
R. Vinodani Katiyar, Rohit Chandra |
Vol 3, No 2 (2010), Pagination: 337-341
|
ABSTRACT |
PDF
|
|
Abstract Views: 210 |
PDF Views: 0
|
Application of Cloud Computing for the Better E-Governance in Developing Countries |
Ashish Rastogi |
Vol 3, No 2 (2010), Pagination: 343-348
|
ABSTRACT |
PDF
|
|
Abstract Views: 232 |
PDF Views: 2
|
Analysis of Routing Attacks in Peer to Peer overlay Networks |
Anil Saroliya, Vishal Shrivastava |
Vol 3, No 2 (2010), Pagination: 349-353
|
ABSTRACT |
PDF
|
|
Abstract Views: 226 |
PDF Views: 3
|
Common Fixed Point Theorems for the Pair of Mappings in Hilbert Space |
Durdana Lateef, A. Bhattacharya |
Vol 3, No 2 (2010), Pagination: 355-357
|
ABSTRACT |
PDF
|
|
Abstract Views: 197 |
PDF Views: 4
|
Security Management System for Oilfield Based on Embedded Wireless Communications:A Design Approach |
Syed Minhaj Ali, Satish V. Reve, Roohi Ali, Sana Iqbal |
Vol 3, No 2 (2010), Pagination: 359-363
|
ABSTRACT |
PDF
|
|
Abstract Views: 230 |
PDF Views: 3
|
User Interface Modeling |
Ravinder G. Reddy |
Vol 3, No 2 (2010), Pagination: 365-368
|
ABSTRACT |
PDF
|
|
Abstract Views: 193 |
PDF Views: 3
|