International Journal of Computer Application
ISSN: 2250-1797
Issue 4, Volume 4 (July- AUGUST 2014)

HOME EDITORIAL BOARD CALL FOR PAPER AUTHOR GUIDELINE ARCHIVE

 

 new now you can share your paper and improve your citation  by one click

 

 

PERFORMANCE EVALUATION OF FEATURE EXTRACTION FROM A NOISY DISTORTED IMAGE

Jaspreet Kaur and Er.Jagroop Kaur


[FULL TEXT]
 
-----------------------------------------------------

Review on Botnets: The Biggest Threat to the Cyber-Security

Navjot Kaur

[FULL TEXT]
 
-----------------------------------------------------

An Approach For Image Segmentation with Region Growing Method using Masking Operations

Rupinder Kaur and Dr. Yogeshwar Singh Randhawa

[FULL TEXT]
 
-----------------------------------------------------

E-Learning Implementation of higher Education

Dr.Zuhair Dhamed shabeeb ,Ahmed Jwad Kadhum Al Mershady and Haider Jwad Kadhum Al mershady


[FULL TEXT]
 
-----------------------------------------------------

Scheduler and Power Control Performance in a Data Mining Using Rule Generation Algorithm

R.Kalidasa Krishnaswami and Dr. Ashish Chaturvedi

[FULL TEXT]
 
-----------------------------------------------------

Analysis of Adaptive Protocols for Data Aggregation in Wireless Sensor Networks

U.S. Paul Russel and Dr. Ashish Chaturvedi

[FULL TEXT]
 
-----------------------------------------------------

Bayesian Neural Networks with Confidence Estimations in Data Mining Approach Based On Support Vector Machines

G.Sankara Subramaniam and Dr. Ashish Chaturvedi

[FULL TEXT]
 
-----------------------------------------------------

 

Detection and Prevention of Flooding Attack in Manets using a hybrid approach

Lakshmi R Nair and Vinodh P Vijayan

[FULL TEXT]
 
-----------------------------------------------------

Image Denoising using DWT Hybrid Thresholding and Intensity Transform

Manika Chhabra and Sarita Bajaj

[FULL TEXT]
 
-----------------------------------------------------

Exploring Classical Security Techniques for Cloud Computing Environment

Dr. Savita Kumari

[FULL TEXT]
 
-----------------------------------------------------

Optimization of Power Consumption in MIMO Cellular Networks Using Dynamic Semi-definite Relaxation

Jaspreet kaur and Ruchi Aggarwal

[FULL TEXT]
 
-----------------------------------------------------

EFFECTIVE RIVAL MINER USING CO-MINER ALGORITHM

K. Devika Rani Dhivya

[FULL TEXT]
 
-----------------------------------------------------

Early Detection of Diabetic Retinopathy Analysis Using Computer Aided Diagnosis System

S. Praveen Kumar and Dr. Ashish Chaturvedi


[FULL TEXT]
 
-----------------------------------------------------

 

INFORMATION LITERACY SKILLS AND INFORMATION UTILIZATION BY STUDENTS IN TWO NIGERIAN UNIVERSITY LIBRARIES

Michael E. okon and Elijah P. Etuk

[FULL TEXT]
 
-----------------------------------------------------


Improvement in the Performance of DSR protocol Using AntHocNet

Ashish Sharma and Vinay Bhatia

 

[FULL TEXT]
 
-----------------------------------------------------

A statistical approach for miracles through Holy Bible using Triangular Fuzzy Cognitive Maps(STrFCMs)

A.Rajkumar, A.Victor Devadoss

[FULL TEXT]
 
-----------------------------------------------------


A Study on Miracles through the Holy Bible using New Triangular Neutrosophic Cognitive Maps(TrNCMs).

A.Rajkumar, A.Victor Devadoss

 

[FULL TEXT]
 
-----------------------------------------------------


IMAGE ENHANCEMENT USING HYPOTHESIS SELECTION FILTER WITH GLOBAL MEAN AND VARIANCE

POONAM and ER.RAJIV KAMBOJ
[FULL TEXT]
 
-----------------------------------------------------

Data mining Classification Methods and Different Techniques

Ms. Aruna J. Chamatkar and Dr. P.K. Butey


[FULL TEXT]
 
-----------------------------------------------------

A Deterministic and Scalable Key Distribution scheme for Wireless Sensor Networks

Merin C Moncey and Merlin Mary James


[FULL TEXT]
 
-----------------------------------------------------

Efficient & Effective Method to Solve Traditional SUDOKU Puzzle

Samayita Bhattacharya and Kalyani Mali


[FULL TEXT]
 
-----------------------------------------------------

Study paper on process mining techniques in software engineering

V.Priyadharshini and Dr. A. Malathi


[FULL TEXT]
 
-----------------------------------------------------

Public key Cryptography Based on Chaotic Neural Network

Adel A. El-Zoghabi, Amr H. Yassin and Hany H. Hamdy

[FULL TEXT]
 
-----------------------------------------------------

Inverse Roman Domination in Some Classes of Graphs

M. Kamal Kumar and R. Murali


[FULL TEXT]
 
-----------------------------------------------------

ON HARMONIOUS COLORING OF M(S
n) AND M (D3m)

Mary .U and Jothilakshmi . G


[FULL TEXT]
 
-----------------------------------------------------

SECURE DATA TRANSFER THROUGH INSECURE NETWORK BY HIDING DATA USING IMAGE STEGANOGRAPHY

K. Devika Rani Dhivya and C.Gomathi

 


[FULL TEXT]
 
-----------------------------------------------------

Rainbow Critical Graphs

K.Srinivasa Rao and R.Murali

 
[FULL TEXT]
 
-----------------------------------------------------

A Study on Intrusion Detection Mechanism in MANET

R.M.Chamundeeswari and Dr P Sumathi


[FULL TEXT]
 
-----------------------------------------------------

Energy Efficiency of Wireless Network Using Clustering Techniques

Mrs. J.M.Bhattad and Dr. S. D.Chede


[FULL TEXT]
 
-----------------------------------------------------

 

more to add..............