Vol. 4 No. 04 (2015)
Published:
2017-12-29
Articles
-
-
-
-
Articles
Retinal Images Classification using Graph-Based approach for Disease Identification
213 222 -
Articles
Improving Accessing Efficiency of Cloud Storage Using DeDuplication and Feedback Schemes
271 274 -
Articles
Experimental Implementation Of Image Restoration Schema Using Inverse Filter Processing Techniques
169 238 -
-
-
-
-
-
-
-
Articles
Implementation of Desktop Control and Information Retrieval from the Internet Using Augmented Reality
223 231 -
-
-
-
-
-
-
Articles
Two Phase Secured Multiparty Sum Computation Protocol (2PSMC) for Privacy preserving data mining
142 209 -
-
-
-
Articles
Automated Identification of Diabetic Retinopathy Stages in Digital Fundus Image using CDR and Micro aneurysms
247 231 -
-
-
Articles
Comparative Performance Analysis of Removal of Impulse Noise using Different Methods
180 205 -
-
-
-
-
-
-
Articles
Application of Multi-agent system in College Searching for Fresher’s Recruitment System
181 251 -
Articles
Towards an understanding of Li-Fi: Next generation Visible Light Communication Technology
169 253 -
-
Articles
Detection of Nutrients and chemicals in food products using sensors in smart phones
264 325 -
Articles
Comparative Seismic Analysis Of An Irregular Building With A Shear Wall And Frame Tube System Of Various Sizes
172 206 -
-
-
-
-
-
-
Articles
Designing Of Novel Low Power Signed And Unsigned Multiplier Using 180nm CMOS Technology In CADENCE
167 207 -
-
-
-
-
Articles
A Scalable Two-Phase Bottom-Up Specialization Prospective For Data Anonymization Using Map Reduce On Cloud
147 182 -
-
-
-
Articles
A Comparative Analysis of Traditional RDBMS with MapReduce and Hive for E-Governance system
141 264 -
-
-
Articles
Design and Analysis of Square and Circular type fractal Shapes Microstrip Patch Antenna
144 197 -
-
-
Articles
Survey Of Electronic Countermeasures Attacks And Techniques In Wireless Detector Networks
144 189 -
-
Articles
Mechanism for secure Big data stored within cloud storage by using cloud computing (Secure cloud storage)
106 203 -
-
-
-
-
Articles
Performance evaluation of Energy-aware routing algorithm for wireless sensor networks.
148 225 -
Articles
Color Edge Detection Based On The Fusion Of Hue Component And Principal Component Analysis
129 195 -
-
-
-
-
-
-
Articles
Experimental Investigations on Flexural Strength and Durability Properties of Mortars Containing Cement Replacement Materials
139 202 -
-
-
Articles
Achieving Multi Layered security, Flexibility, Scalability, Access Control in Cloud Computing Using Hierarchical Attribute Set Based Encryption (HASBE)
100 195 -
Articles
Analysis of Characteristics of 2G/3G Cellular Networks in rural and urban areas of Delhi
128 204 -
-
Articles
Enhancement of the IEEE 802.15.4 Cluster-Tree Network with Energy Efficient Cluster Scheduling
151 194 -
-
-
-
Articles
Unwanted Message Filtering From Osn User Walls And Implementation Of Blacklist (Implementation Paper)
121 189 -
-
-
-
-
-
-
-
Articles
Organizational Mail Tracking With Security Using 3d Password And Database Encryption
121 186 -
-
-
-
-
Articles
Effective Website Accessibility Through Optimization Using Knapsack Programming Model
133 214 -
-
-
Articles
Comparative Analysis Between Prophet, Spray &Wait And Spray & Focus Protocol Of Wireless Opportunistic Networks
138 219 -
-
-
-
-
-
Articles
A Comparative Analysis of Detecting the Moving Object with Principal Component Pursuit for Surveillance Application
154 179 -
-
-
Articles
FPGA Implementation Of Invisible Watermarking Algorithm Using LSB And DWT Technique
125 193 -
-