Vol 2, No 1 (2014)

Table of Contents

Vol 2, No 1 (2014)

Open Access Open Access  Restricted Access Subscription Access

Articles

A Method for Derivating an Algorithm of Power Computation of Cyclic Permutation
Bo Yang
 Vol 2, No 1 (2014), Pagination: 1-6
ABSTRACT |  PDF     Abstract Views: 475  |  PDF Views: 0
Enhanced Caeser Cipher to Exclude Repetition and Withstand Frequency Cryptanalysis
Abdulkadir H. Disina, Zahraddeen A. Pindar, Sapiee Bin Hj. Jamel
 Vol 2, No 1 (2014), Pagination: 7-13
ABSTRACT |  PDF     Abstract Views: 421  |  PDF Views: 0
Modified PSOLA-Genetic Algorithm Based Approach for Voice Re-Construction
Partha Sarthy Banerjee, Uttam Kumar Roy
 Vol 2, No 1 (2014), Pagination: 14-21
ABSTRACT |  PDF     Abstract Views: 452  |  PDF Views: 0
Clone Detection in Manet Using Routing Information Protocol
Sakthivel Munuswamy, Anand Joseph Daniel Chinnaiyan, Karnavel Kuppuswamy
 Vol 2, No 1 (2014), Pagination: 22-28
ABSTRACT |  PDF     Abstract Views: 417  |  PDF Views: 0
Combining Bilateral Filtering and Fusion of Visual and IR Images
Shanmugasundaram Marappan
 Vol 2, No 1 (2014), Pagination: 29-38
ABSTRACT |  PDF     Abstract Views: 402  |  PDF Views: 0
An Enhanced UPC Mod 10 Check Digit Method
Zahraddeen A. Pindar, Sapiee Jamel, Abdulkadir H. Disina
 Vol 2, No 1 (2014), Pagination: 39-44
ABSTRACT |  PDF     Abstract Views: 428  |  PDF Views: 0