August 2013 Volume 2, Issue 4
|
|
|
|
|
A Review on Secured Money Transaction with
Fingerprint Technique in ATM System |
|
|
|
|
|
|
|
|
|
|
Context Specific Event Model For News Articles |
|
Kowcika A |
Uma Maheswari |
Geetha T V |
|
|
|
|
|
|
|
|
|
Cable Fault Monitoring and Indication: A Review |
|
Shweta Gajbhiye |
S. P. Karmore |
|
|
|
|
|
|
|
|
|
Improved Watermarking Scheme Using Discrete Cosine
Transform and Schur Decomposition |
|
Henri Bruno Razafindradina |
Nicolas Raft Razafindrakoto |
Paul Auguste Randriamitantsoa |
|
|
|
|
|
|
|
|
|
Direct Heuristic Algorithm for Linear Programming |
|
N.Nagamalleswara Rao |
Dr. O. Naga Raju |
I. Ramesh Babu |
|
|
|
|
|
|
|
|
|
Maximizing Return on Investment (ROI) of Enterprise
Resource Planning Systems (ERP) for Nonprofit Organizations: Proposed Model |
|
|
|
|
|
|
|
|
|
|
Recognizing Bharatnatyam Mudra Using Principles of
Gesture Recognition |
|
Shweta Mozarkar |
Dr.C.S.Warnekar |
|
|
|
|
|
|
|
|
|
A Group of Token Based Approach for Key-Word
Recommendation |
|
Mona Amarnani |
C.S.Warnekar |
|
|
|
|
|
|
|
|
|
A Dynamic Performance-Based Flow Control Method for High-
Speed Data Transfer |
|
Umme Gousia |
Dr.Mohd.Abdul.Waheed |
Syed Shah Md Saifullah Hussaini |
|
|
|
|
|
|
|
|
|
Performance Evaluation of Routing Protocol for Mobile
Ad-Hoc Network |
|
|
|
|
|
|
|
|
|
|
Automated Traffic Surveillance: Evolution and
Implementation |
|
Kriti Bhandari |
Niranjana Raghavan |
Aditya Iyer |
Niteen Autade |
|
|
|
|
|
|
|
|
|
A Model of Computing Trust in Web Based Social Network Using
New Aggregation and Concatenation Operators |
|
Heisnam Rohen Singh |
Arambam Neelima |
Lourembam Suraj Singh |
Sarangthem Ibotombi Singh |
|
|
|
|
|
|
|
|
|
Machine Learning Techniques for Prediction of Subject Scores:
A Comparative Study |
|
Mamta Singh |
Dr. Jyoti Singh |
|
|
|
|
|
|
|
|
|
Pair Triplet Association Rule Generation in Streams |
|
Manisha Thool |
Preeti Voditel |
|
|
|
|
|
|