JPEG Compression Steganography |
Akhil Khare, Meenu Kumari, Pallavi Khare |
Vol 3, No 1 (2010), Pagination: 1-4
|
ABSTRACT |
PDF
|
|
Abstract Views: 221 |
PDF Views: 0
|
Software Quality Measurement:A Revisit |
Mazhar Khaliq, Riyaz A. Khan, M. H. Khan |
Vol 3, No 1 (2010), Pagination: 5-11
|
ABSTRACT |
PDF
|
|
Abstract Views: 233 |
PDF Views: 2
|
Implementation of VRML, STL File Parser with Passive Stereo Vision |
R. S. Kamath, R. K. Kamat |
Vol 3, No 1 (2010), Pagination: 21-29
|
ABSTRACT |
PDF
|
|
Abstract Views: 257 |
PDF Views: 0
|
Leaf Recognition for Plant Classification Using GLCM and PCA Methods |
Abdolvahab Ehsanirad, Y. H. Sharath Kumar |
Vol 3, No 1 (2010), Pagination: 31-36
|
ABSTRACT |
PDF
|
|
Abstract Views: 255 |
PDF Views: 0
|
Issues of Service Oriented Architecture – A Survey |
Himanshu Agarwal, Ashish Seth, Ashim Raj Singla |
Vol 3, No 1 (2010), Pagination: 37-43
|
ABSTRACT |
PDF
|
|
Abstract Views: 215 |
PDF Views: 0
|
Software Prefetching Using Jump Pointers in Linked Data Structures |
Arushi Arora, Swati Priya, Akhil Khare |
Vol 3, No 1 (2010), Pagination: 45-52
|
ABSTRACT |
PDF
|
|
Abstract Views: 226 |
PDF Views: 0
|
Soft Computing in Bioinformatics:Methodologies and Applications |
Kiran Kumar Reddi, M. V. Basaveswara Rao |
Vol 3, No 1 (2010), Pagination: 53-59
|
ABSTRACT |
PDF
|
|
Abstract Views: 224 |
PDF Views: 4
|
A Metrics Suite for Measuring Class Interaction at Run Time through DCM |
Akhil Khare, Harsh Lohani, Pallavi Khare |
Vol 3, No 1 (2010), Pagination: 75-82
|
ABSTRACT |
PDF
|
|
Abstract Views: 228 |
PDF Views: 0
|
Analysis of AES Hardware and Software Implementation |
R. Velayutham, D. Manimegalai |
Vol 3, No 1 (2010), Pagination: 83-88
|
ABSTRACT |
PDF
|
|
Abstract Views: 225 |
PDF Views: 0
|
Subanta pada Analyzer for Sanskrit |
Smita Selot, A. S. Zadgaonkar, Neeta Tripathi |
Vol 3, No 1 (2010), Pagination: 89-93
|
ABSTRACT |
PDF
|
|
Abstract Views: 377 |
PDF Views: 2
|
Packet Loss Detection Using CPR and WCPR in Diverse Platforms |
Anurag Lal, Vivek Dubey |
Vol 3, No 1 (2010), Pagination: 95-102
|
ABSTRACT |
PDF
|
|
Abstract Views: 216 |
PDF Views: 0
|
Fiber Bragg Grating (FBG) is Used as Modeling and Simulation for Temperature Sensor |
Manish Saxena, Anubhuti Khare |
Vol 3, No 1 (2010), Pagination: 103-107
|
ABSTRACT |
PDF
|
|
Abstract Views: 227 |
PDF Views: 0
|
Effectiveness of Software Testing Techniques on a Measurement Scale |
Sheikh Umar Farooq, S. M. K. Quadri |
Vol 3, No 1 (2010), Pagination: 109-113
|
ABSTRACT |
PDF
|
|
Abstract Views: 222 |
PDF Views: 5
|
Handwritten Libretto Recognition Using Multilayer and Cluster Neural Network |
Anurag Lal |
Vol 3, No 1 (2010), Pagination: 115-120
|
ABSTRACT |
PDF
|
|
Abstract Views: 235 |
PDF Views: 0
|
VPN and IPSEC Server With IDS |
Anil Rajput, Manmohan Singh, Naveen Kher, Shumali Kankane, Pawan Meena |
Vol 3, No 1 (2010), Pagination: 121-124
|
ABSTRACT |
PDF
|
|
Abstract Views: 247 |
PDF Views: 2
|
Video Indexing and Retrieval – Applications and Challenges |
M. Ravinder, T. Venu Gopal, T. Venkat Narayana Rao |
Vol 3, No 1 (2010), Pagination: 125-137
|
ABSTRACT |
PDF
|
|
Abstract Views: 220 |
PDF Views: 1
|
Static Analysis and Run-Time Coupling Metrics |
Mandeep Kaur, Parul Batra, Akhil Khare |
Vol 3, No 1 (2010), Pagination: 139-144
|
ABSTRACT |
PDF
|
|
Abstract Views: 220 |
PDF Views: 1
|
Secure Data Aggregation Using Mobile Agents in Wireless Sensor Networks |
Bhavna Arora Makin, Devanand Padha |
Vol 3, No 1 (2010), Pagination: 149-153
|
ABSTRACT |
PDF
|
|
Abstract Views: 211 |
PDF Views: 0
|
Review of FAT Data Structure of FAT32 File System |
Wasim Ahmad Bhat, S. M. K. Quadri |
Vol 3, No 1 (2010), Pagination: 161-164
|
ABSTRACT |
PDF
|
|
Abstract Views: 229 |
PDF Views: 4
|
Appraise the Recitation of Intrusion Detection System at Training Time |
Anurag Lal |
Vol 3, No 1 (2010), Pagination: 165-170
|
ABSTRACT |
PDF
|
|
Abstract Views: 213 |
PDF Views: 0
|
SOA-RTDBS:A Service Oriented Architecture (SOA) Supporting Real Time Database Systems |
Olusegun Folorunso, Lateef O. Yusuf, Julius O. Okesola |
Vol 3, No 1 (2010), Pagination: 171-184
|
ABSTRACT |
PDF
|
|
Abstract Views: 202 |
PDF Views: 0
|
Network Intrusion Detection Using Correlation Functional Dependency |
Nitin D. Shelokar, S. A. Ladhake |
Vol 3, No 1 (2010), Pagination: 185-188
|
ABSTRACT |
PDF
|
|
Abstract Views: 173 |
PDF Views: 0
|
Use of XML in HL7 |
K. S. Mann, Preeti Saini |
Vol 3, No 1 (2010), Pagination: 189-191
|
ABSTRACT |
PDF
|
|
Abstract Views: 159 |
PDF Views: 0
|
A Knowledge-Based Visual Analytics Query System |
Olusegun Folorunso, Adesina Temitayo Bello, Adesina S. Sodiya, Lateef O. Yusuf |
Vol 3, No 1 (2010), Pagination: 193-206
|
ABSTRACT |
PDF
|
|
Abstract Views: 267 |
PDF Views: 1
|
Detection and Classification of EEG Waves |
Hemant K. Sawant, Zahra Jalali |
Vol 3, No 1 (2010), Pagination: 207-213
|
ABSTRACT |
PDF
|
|
Abstract Views: 189 |
PDF Views: 1
|
Distributed Remote Architectures CORBA |
Hasrat Jahan, Manmohan Singh |
Vol 3, No 1 (2010), Pagination: 215-217
|
ABSTRACT |
PDF
|
|
Abstract Views: 200 |
PDF Views: 6
|