International Journal of Computer Application
ISSN: 2250-1797
Issue 4, Volume 2 (March- April 2014)

 

ANALYSIS OF MX/M/1/MWV WITH FUZZY PARAMETERS

 

Mrs.K.Julia Rose Mary and Ms.T.Gokilavani

 

[FULL TEXT]

-----------------------------------------------------

Contrast Enhancement by Adaptive Histogram Equalization of Wavelet Sub bands

G.Hariharan and Deepthi Rani S.S

[FULL TEXT]

-----------------------------------------------------

Cram on Mobile vigorconcern organism

 

K. Kiran Reddy,P.lalith Samanth Reddy and Dr.P.Bhaskara Reddy

 

[FULL TEXT]

-----------------------------------------------------

Detection and Mitigation of Client Based HTTP Attacks on Web Proxy by Using TSL Behavior

 

Anub.A and P.Murugan

 

[FULL TEXT]

-----------------------------------------------------

Cyber Crime: Prevention, Detection and Prosecution

 

Dr Neelesh Jain and Karishma Jain

 

[FULL TEXT]

-----------------------------------------------------

Detection of Distributed Denial of Service Attacks Using Decision Tree Algorithm


 
Mrs. G. Shoba, Rajeswari. M and Kalaitchelvi. S

[FULL TEXT]
 

-----------------------------------------------------

Data Integrity for Secure Cloud Storage using Cryptographic Techniques: a Survey


P.Selvigrija and D.Sumithra

 

[FULL TEXT]
 
-----------------------------------------------------

How Life Become Artificial when we enter in Computer Zone

Muhammad Mujtaba AND Syeda Binish Zahra
 

[FULL TEXT]
 
-----------------------------------------------------


gs*- Closed Sets in Topological Spaces

Mrs.L.ELVINA MARY AND Miss S.TAMIL SELVI

[FULL TEXT]
 
-----------------------------------------------------


Data Integrity for Secure Cloud Storage using Cryptographic Techniques: a Survey

P.Selvigrija AND D.Sumithra
 

[FULL TEXT]
 
-----------------------------------------------------


MODEL ARCHITECTURE AND MODEL BUILDING

SHIKHA VERMA

[FULL TEXT]
 
-----------------------------------------------------


Resource Scalability for Efficient Parallel Processing in Cloud

Govinda.K, Abirami.M AND Divya Mercy Silva.J

 

[FULL TEXT]
 
-----------------------------------------------------

A BRIEF OVERVIEW ON INFORMATION RETRIEVAL IN SEMANTIC WEB

Vishal Jain


[FULL TEXT]
 
-----------------------------------------------------

Comparison of multilayer DRA with square patch and square ring patch

Uma Shankar Raikwar AND Prof. Kanchan Cecil


[FULL TEXT]
 
-----------------------------------------------------

DOCUMENT IMAGE STRUCTURE BASED RESUME CLASSIFIER USING TEMPLATE MATCHING TECHNIQUE

N.Aravindhu AND A.Anandanayagie

[FULL TEXT]
 
-----------------------------------------------------

 On the Applicability of Neural Networks in Black Box Testing

 

Harsh Bhasin, Esha Khanna AND Sudha

 

[FULL TEXT]
 
-----------------------------------------------------

OPTIMIZATION OF ROUTE QUERY WITH TEMPORAL CONSTRAINTS

 

Ms.NeenuPrasoodanan AND Mrs.K.Sasikalarani

 

[FULL TEXT]
 
-----------------------------------------------------


Internet of Things: A New Paradigm

 

DR.A.Venumadhav

 

[FULL TEXT]
 
-----------------------------------------------------

Energy Efficient Data Collection in Multichannel Communications

Regan.R M. and Ranjani.M


[FULL TEXT]
 
-----------------------------------------------------

Design and Simulation of 3.5 GHz MMIC Power Amplifier Using GaAs Technology

Sharath Babu Kamsali, Student, R V College Of Engineering, Bangalore, and P. Shanthi


[FULL TEXT]
 
-----------------------------------------------------


Ad hoc Multi-hop Wireless Networks : A Survey

Gosai A M, Bajeja S L

 

[FULL TEXT]
 
-----------------------------------------------------

 

Analysis and Detection of Clone Code for Uml Model Using Visual Paradigm: A Review

Amit Bansal,Arzoo Dahiya

 

[FULL TEXT]
 
-----------------------------------------------------


A Review on Analysis for Base Station Control and Power Competent by Wireless Sensor Network

Ashish Kumar Gupta, Arun Rana

 

[FULL TEXT]
 
-----------------------------------------------------


SECURE SHARING OF PERSONAL HEALTH RECORD IN CLOUD COMPUTING

Mr.Prakash. J and Sajan Antony


[FULL TEXT]
 
-----------------------------------------------------

IMPROVING QOS IN ADHOC NETWORK & ROUTE REPAIRING using Genetic Algorithm

Nidhi Bhatia and Mrs. Kiran jain

[FULL TEXT]
 
-----------------------------------------------------

Merkle Hash Tree Reliability for SafeQ Query Processing over Sensor Networks

S.Sundar raj and Dr. Ashish Chaturvedi

[FULL TEXT]
 
-----------------------------------------------------


An Introduction to Image Compression Using Hybrid JPEG 2000 and SPIHT Technique

Preeti Lathwall and Shalu Garg

 

[FULL TEXT]
 
-----------------------------------------------------


DISCOVERING CHARACTARIZATIONS OF THE BEHAVIOR OF ANOMALOUS SUB POPULATIONS

Sreedevi M and Mr. D. Satheesh Kumar


[FULL TEXT]
 
-----------------------------------------------------

 

more to add..............