International Journal of Computer Application
ISSN: 2250-1797
Issue 5, Volume  ( nov-dec 2015)

HOME EDITORIAL BOARD CALL FOR PAPER AUTHOR GUIDELINE ARCHIVE

 

 new now you can share your paper and improve your citation  by one click

g* α**- CLOSED SETS AND ITS SEPARATION AXIOMS IN BITOPOLOGICAL SPACES

Stella Irene Mary. J and Vinodhini. R

 

[FULL TEXT]
 
-----------------------------------------------------


Cloud Security Framework using AES-128 bit key and Counting Bloom Filter Algorithm.

Anandteerth Onkar and Prof. Satish .R. Todmal

 

[FULL TEXT]
 
-----------------------------------------------------


Semi-Fragile Digital Watermarking using Two-Level Discrete Wavelet Transformation and Two-Dimensional Fast Fourier Transformation

Mr. Dayanand.G.Savakar and Mr. Anand Ghuli

 

[FULL TEXT]
 
-----------------------------------------------------

Modeling and Control of Renewable Source Boost Converter using Model Predictive Controller

G.C.Sowparnika, A.Sivalingam and M.Thirumarimurugan

 

[FULL TEXT]
 
-----------------------------------------------------

Survey of Components Used in Crowd Analysis

Bhagyashree W. Sorte, Prof. Mamta Bhamare and Prof. Shilpa Paygude

 

[FULL TEXT]
 
-----------------------------------------------------

 

WEB PAGE CHANGE DETECTION THROUGH MACHINE LEARNING ALGORITHMS

R.Kousalya and J.Rubana Priyanga

 

[FULL TEXT]
 
-----------------------------------------------------


ANN classifier for human identification using PCA Feature and Gait Energy image

Nishashroti and Prof. Anil Khandekar

 

[FULL TEXT]
 
-----------------------------------------------------

 

AUTOMATED SOFTWARE TESTING USING SYMBOLIC EXECUTION

Faisal Anwer and Mohd. Nazir

 

[FULL TEXT]
 
-----------------------------------------------------


User's Navigational Pattern Extraction from Web Logs Using Artificial Bee Colony Optimization Algorithm in Web Usage Mining

Siva Jyothi Barla, Mrs. Hima Bindu and Ramesh Challagundla

 

[FULL TEXT]
 
-----------------------------------------------------


ASEC: Anonym Signcryption Scheme Based on EC operations

A. Braeken and P. Porambage

 

[FULL TEXT]
 
-----------------------------------------------------

 

Analysis of Various Attacks on WSN for a Secure and Efficient Data Transfer

Mohammad Saleha, G.M.Padmaja and Ramesh Challagundla

 

[FULL TEXT]
 
-----------------------------------------------------

Evaluation the Performance of Feeble Labelled Images by using Face Annotation Technique.

Vinay Sagar , K. Sravanthi and Ramesh Challagundla

 

[FULL TEXT]
 
-----------------------------------------------------



A Novel Technique for Achieving Quality of Service Routing In Adhoc Networks by Using TTS

Nallana Bhagyasri , Saran Kumar Kuchibhatla and Ramesh Challagundla

 

[FULL TEXT]
 
-----------------------------------------------------



ONTOLOGY BASED CONGENITAL HEART DISEASE DIAGNOSIS USING NEURAL NETWORKS

Mrs.A.Nirmala and Mrs.Abinaya Sambath Kumar

 

[FULL TEXT]
 
-----------------------------------------------------

 

Minimizing the Optimal Path of a Missing Mobile Client Autonomously by Using MANETS

Ommi Anil, A.V.D.N.Murthy and Ramesh Challagundla

 

[FULL TEXT]
 
-----------------------------------------------------

 

Contrast Enhancement in Mammogram forEarly Diagnosis of Breast Cancer based onFuzzy Rule

S.K.Sajan, Dr.M. Germanus Alex and V. Ramalakshmi(A) Kanthimathi

 

[FULL TEXT]
 
-----------------------------------------------------

A Review of Expert System for Assessment and Evaluation of Post Graduate Courses

Mr. A. A. Govande and Dr. R. V. Kulkarni


[FULL TEXT]
 
-----------------------------------------------------

A Novel Approach to Optimize the Routing Delay in Disruption Tolerant Networks

Bheemavarpu. Sravani, V.Srikanth and Ramesh Challagundla

 

[FULL TEXT]
 
-----------------------------------------------------


 


more to add..............