The Relation between E-Commerce and AIS in Medium Scale Organizations |
Muhannad Akram Ahmad, Farah Hanna Zawaideh, Ahmad Bisher |
Vol 7, No 1 (2014), Pagination: 1-8
|
ABSTRACT |
PDF
|
|
Abstract Views: 232 |
PDF Views: 0
|
Multi-Module Singular Value Decomposition for Face Recognition |
A. Namachivayam, Kaliyaperumal Karthikeyan |
Vol 7, No 1 (2014), Pagination: 9-14
|
ABSTRACT |
PDF
|
|
Abstract Views: 285 |
PDF Views: 0
|
A Novel Approach to Deal with Keyloggers |
Mehdi Dadkhah, Mohammad Davarpanah Jazi |
Vol 7, No 1 (2014), Pagination: 25-28
|
ABSTRACT |
PDF
|
|
Abstract Views: 262 |
PDF Views: 0
|
A Review on Shot Boundary Detection |
H. B. Basanth Kumar |
Vol 7, No 1 (2014), Pagination: 39-44
|
ABSTRACT |
PDF
|
|
Abstract Views: 227 |
PDF Views: 0
|
A Systematic Literature Survey on Various Techniques for Software Fault Proneness |
Prerna Jain, Balraj Singh |
Vol 7, No 1 (2014), Pagination: 61-65
|
ABSTRACT |
PDF
|
|
Abstract Views: 216 |
PDF Views: 0
|
Security Measures of WSN Networks by Avoiding Message Replay Attacks |
Geetanjali Kandhari, Deepak Aggarwal |
Vol 7, No 1 (2014), Pagination: 75-81
|
ABSTRACT |
PDF
|
|
Abstract Views: 223 |
PDF Views: 0
|
Performance Evaluation in Web Architectures |
Rupesh Nagendra |
Vol 7, No 1 (2014), Pagination: 83-90
|
ABSTRACT |
PDF
|
|
Abstract Views: 226 |
PDF Views: 0
|
A Comparison on Different Image Completion Methods |
Merin Varghese, Sherin Chacko Thomas, S. Manimurugan |
Vol 7, No 1 (2014), Pagination: 99-104
|
ABSTRACT |
PDF
|
|
Abstract Views: 329 |
PDF Views: 0
|
Mining Frequent Itemsetset Using Assosiation Rule |
Shrikant Lade, Ashish Pahdey |
Vol 7, No 1 (2014), Pagination: 105-109
|
ABSTRACT |
PDF
|
|
Abstract Views: 220 |
PDF Views: 0
|
Root to Fruit (1):An Evolutionary Study of Sorting Problem |
Pramod Kadam, Sachin Kadam |
Vol 7, No 1 (2014), Pagination: 111-116
|
ABSTRACT |
PDF
|
|
Abstract Views: 213 |
PDF Views: 0
|
Encryption of Images and Signals Using Wavelet Transform and Permutation Algorithm |
Ibtisam A. Aljazaery |
Vol 7, No 1 (2014), Pagination: 125-137
|
ABSTRACT |
PDF
|
|
Abstract Views: 220 |
PDF Views: 0
|
Applications of Graph Labeling in Communication Networks |
N. Lakshmi Prasanna, K. Sravanthi, Nagalla Sudhakar |
Vol 7, No 1 (2014), Pagination: 139-145
|
ABSTRACT |
PDF
|
|
Abstract Views: 244 |
PDF Views: 0
|
Selecting the Optimal Location of Wireless Communication Network Stations |
Saad Talib Hasson, Al-Motairy Jullanar Ali, Luay Habeeb Hashim, Zainab Saad Talib |
Vol 7, No 1 (2014), Pagination: 147-154
|
ABSTRACT |
PDF
|
|
Abstract Views: 188 |
PDF Views: 0
|
Pattern Detection with Improved Preprocessing in Web Log |
Priyanka Dubey, Roshni Dubey |
Vol 7, No 1 (2014), Pagination: 161-165
|
ABSTRACT |
PDF
|
|
Abstract Views: 181 |
PDF Views: 0
|
A Review Study:Automated Risk Identification Tool for Software Development Process |
Omni Thakur, Janpreet Singh |
Vol 7, No 1 (2014), Pagination: 167-172
|
ABSTRACT |
PDF
|
|
Abstract Views: 186 |
PDF Views: 0
|
Fifth Generation Technology (Nano Technology) |
Anil Rajput, Naveen Kumar |
Vol 7, No 1 (2014), Pagination: 173-176
|
ABSTRACT |
PDF
|
|
Abstract Views: 179 |
PDF Views: 0
|
Search Engine Selection Approach in Metasearch Using Past Queries |
Sheo Das, Kuldeep Singh Raghuwanshi |
Vol 7, No 1 (2014), Pagination: 177-183
|
ABSTRACT |
PDF
|
|
Abstract Views: 165 |
PDF Views: 0
|
Survey on Discriminative Least Squares Regression and its Application |
Syed Minhaj Ali |
Vol 7, No 1 (2014), Pagination: 193-198
|
ABSTRACT |
PDF
|
|
Abstract Views: 179 |
PDF Views: 0
|
Implementation of Artificial Neural Network Training Data in Micro-controller Based Embedded System |
Jnana Ranjan Tripathy, Hrudaya Kumar Tripathy, S. S. Nayak |
Vol 7, No 1 (2014), Pagination: 199-206
|
ABSTRACT |
PDF
|
|
Abstract Views: 183 |
PDF Views: 0
|