| June 2013 Volume 2, Issue 3 |
| |
|
| |
Digital Data Security and Copyright Protection Using
Cellular Automata |
| |
|
| |
|
| |
|
|
| |
|
| |
Evolution of Gi-Fi Technology over other Technologies |
| |
|
| |
|
| |
|
|
| |
|
| |
Simulation of Un-Symmetrical 2-Phase Induction Motor |
| |
| S. F. Bandhekar |
S. N. Dhurvey |
P. P. Ashtankar |
|
| |
|
| |
|
|
| |
|
| |
Impact of Server Virtualization on Real Business World |
| |
|
| |
|
| |
|
|
| |
|
| |
Artificial Intelligence : Simulated Embodied Agents |
| |
| Astha Jain |
Payal Jain |
Jitendra Singh |
|
| |
|
| |
|
|
| |
|
| |
An Overview of the Research on Texture Based Plant Leaf
Classification |
| |
| Vishakha Metre |
Jayshree Ghorpade |
|
| |
|
| |
|
|
| |
|
| |
Algorithm and Approaches to Handle Large Data - A Survey |
| |
| Chanchal Yadav |
Shuliang Wang |
Manoj Kumar |
|
| |
|
| |
|
|
| |
|
| |
Compensatory Fuzzy Min-Max Neural Network for Object
Recognition |
| |
|
| |
|
| |
|
|
| |
|
| |
An Adaptive Expert System for an Educational Institute |
| |
| Renuka Agrawal |
Jyoti Singh |
|
| |
|
| |
|
|
| |
|
| |
Role of Assembling Invariant Moments and SVM in
Fingerprint Recognition |
| |
| Supriya Wable |
Chaitali Laulkar |
|
| |
|
| |
|
|
| |
|
| |
Performance of IEEE 802.15.4 in WSN for Monitoring
Real Time Air Pollution Parameters |
| |
| Darshana N. Tambe |
Nekita A. Chavhan |
|
| |
|
| |
|
|
| |
|
| |
The Adaptive Optimized Routing Protocol for Vehicular
Ad-hoc Networks |
| |
| Kunal Vikas Patil |
M.R. Dhage |
|
| |
|
| |
|
|
| |
|
| |
Efficient Algorithms for Materialized View Selection in Data
Warehousing Environment |
| |
| Ashish Mohod |
Manoj Chaudhari |
|
| |
|
| |
|
|
| |
|
| |
Contribution to Securing Communications on VOIP |
| |
| Tahina Ezéchiel Rakotondraina |
Ndaohialy Manda-vy Ravonimanantsoa |
Andry Auguste Randriamitantsoa |
|
| |
|
| |
|
|
| |
|
| |
Mining Weather Data Using Rattle |
| |
| Venkata Abhishek Bavirisetty |
Avinash Ankireddy |
Prasad Seemakurthi |
K.V.N. Rajesh |
|
| |
|
| |
|
|
| |
|
| |
An Approach to Develop Embedded System For
Web Based Monitoring & Controlling of Renewable Energy
Sources |
| |
| Akansha S. Fating |
T.H. Nagrare |
|
| |
|
| |
|
|
| |
|
| |
Using Unobtrusive Techniques for Detecting Leakage of
Data |
| |
| Shailaja B. Jadhav |
Prachi Joshi |
|
| |
|
| |
|
|
| |
|
| |
3D Reconstruction of Coronary Arteries from Angiographic
Images: A Survey |
| |
| Mahima Goyal |
Jian Yang |
Arun PrakashAgrawal |
|
| |
|
| |
|
|
| |
|
| |
A New Checkpoint Approach for Fault Tolerance in Grid
Computing |
| |
|
| |
|
| |
|
|
| |
|
| |
Activity Modeling in Smart Home using High Utility Pattern
Mining over Data Streams |
| |
| Menaka Gandhi.J |
Gayathri K.S |
|
| |
|
| |
|
|
| |
|
| |
An Unsupervised Pattern Clustering Approach for
Identifying Abnormal User Behaviors in Smart Home |
| |
|
| |
|
| |
|
|
| |
|
| |
Improved Multimodal Biometric Watermarking in
Authentication Systems Based on DCT and Phase Congruency
Model |
| |
| Bairagi Nath Behera |
V. K. Govindan |
|
| |
|
| |
|
|
| |
|
| |
Performance Improvement Using Contention Window
Adaptation in IEEE 802.11 WLANs |
| |
| Swapnil S Tale |
Jyoti Kulkarni |
|
| |
|
| |
|
|