June 2013 Volume 2, Issue 3 |
|
|
|
Digital Data Security and Copyright Protection Using
Cellular Automata |
|
|
|
|
|
|
|
|
|
|
Evolution of Gi-Fi Technology over other Technologies |
|
|
|
|
|
|
|
|
|
|
Simulation of Un-Symmetrical 2-Phase Induction Motor |
|
S. F. Bandhekar |
S. N. Dhurvey |
P. P. Ashtankar |
|
|
|
|
|
|
|
|
|
Impact of Server Virtualization on Real Business World |
|
|
|
|
|
|
|
|
|
|
Artificial Intelligence : Simulated Embodied Agents |
|
Astha Jain |
Payal Jain |
Jitendra Singh |
|
|
|
|
|
|
|
|
|
An Overview of the Research on Texture Based Plant Leaf
Classification |
|
Vishakha Metre |
Jayshree Ghorpade |
|
|
|
|
|
|
|
|
|
Algorithm and Approaches to Handle Large Data - A Survey |
|
Chanchal Yadav |
Shuliang Wang |
Manoj Kumar |
|
|
|
|
|
|
|
|
|
Compensatory Fuzzy Min-Max Neural Network for Object
Recognition |
|
|
|
|
|
|
|
|
|
|
An Adaptive Expert System for an Educational Institute |
|
Renuka Agrawal |
Jyoti Singh |
|
|
|
|
|
|
|
|
|
Role of Assembling Invariant Moments and SVM in
Fingerprint Recognition |
|
Supriya Wable |
Chaitali Laulkar |
|
|
|
|
|
|
|
|
|
Performance of IEEE 802.15.4 in WSN for Monitoring
Real Time Air Pollution Parameters |
|
Darshana N. Tambe |
Nekita A. Chavhan |
|
|
|
|
|
|
|
|
|
The Adaptive Optimized Routing Protocol for Vehicular
Ad-hoc Networks |
|
Kunal Vikas Patil |
M.R. Dhage |
|
|
|
|
|
|
|
|
|
Efficient Algorithms for Materialized View Selection in Data
Warehousing Environment |
|
Ashish Mohod |
Manoj Chaudhari |
|
|
|
|
|
|
|
|
|
Contribution to Securing Communications on VOIP |
|
Tahina Ezéchiel Rakotondraina |
Ndaohialy Manda-vy Ravonimanantsoa |
Andry Auguste Randriamitantsoa |
|
|
|
|
|
|
|
|
|
Mining Weather Data Using Rattle |
|
Venkata Abhishek Bavirisetty |
Avinash Ankireddy |
Prasad Seemakurthi |
K.V.N. Rajesh |
|
|
|
|
|
|
|
|
|
An Approach to Develop Embedded System For
Web Based Monitoring & Controlling of Renewable Energy
Sources |
|
Akansha S. Fating |
T.H. Nagrare |
|
|
|
|
|
|
|
|
|
Using Unobtrusive Techniques for Detecting Leakage of
Data |
|
Shailaja B. Jadhav |
Prachi Joshi |
|
|
|
|
|
|
|
|
|
3D Reconstruction of Coronary Arteries from Angiographic
Images: A Survey |
|
Mahima Goyal |
Jian Yang |
Arun PrakashAgrawal |
|
|
|
|
|
|
|
|
|
A New Checkpoint Approach for Fault Tolerance in Grid
Computing |
|
|
|
|
|
|
|
|
|
|
Activity Modeling in Smart Home using High Utility Pattern
Mining over Data Streams |
|
Menaka Gandhi.J |
Gayathri K.S |
|
|
|
|
|
|
|
|
|
An Unsupervised Pattern Clustering Approach for
Identifying Abnormal User Behaviors in Smart Home |
|
|
|
|
|
|
|
|
|
|
Improved Multimodal Biometric Watermarking in
Authentication Systems Based on DCT and Phase Congruency
Model |
|
Bairagi Nath Behera |
V. K. Govindan |
|
|
|
|
|
|
|
|
|
Performance Improvement Using Contention Window
Adaptation in IEEE 802.11 WLANs |
|
Swapnil S Tale |
Jyoti Kulkarni |
|
|
|
|
|
|