Объем 2, Проблема 6 (2011)

История болезни

3D FACE MODELING: COMPREHENSIVE DESCRIPTION

  • Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr.Rakesh Singh Jadon

История болезни

BMP TO JPEG - THE CONVERSION PROCESS

  • Anjali Anand , Dr. Himanshu Aggarwal

Обзорная статья

SURVEY ON HANDOFF TECHNIQUES

  • A. Bhuvaneswari, Dr. E. George Dharma Prakash Raj

Обзорная статья

ASSESSMENT OF SECURITY IN MOBILE AD-HOC NETWORKS (MANET)

  • Deepak Chayal, Dr. Vijay Singh Rathore

Обзорная статья

HIBERNATE TECHNOLOGY FOR AN EFFICIENT BUSINESS APPLICATION EXTENSION

  • B.Vasavi, Y.V.Sreevani, G.Sindhu Priya

Обзорная статья

NOVEL GRAY SCALE CONVERSION TECHNIQUES BASED ON PIXEL DEPTH

  • Debasish Biswas, Amitava Nag, Soumadip Ghosh, Arindrajit Pal, Sushanta Biswas, Snehasish Banerjee, Anjan Pal

исследовательская статья

IMPROVING QUALITY USING TESTING STRATEGIES

  • Sahil Batra, Dr. Rahul Rishi

исследовательская статья

MODEL TO IMPROVE CORRECTNESS AND QUALITY AND REDUCING TESTING TIME (MCQRTT)

  • Sahil Batra, Dr. Rahul Rishi

исследовательская статья

SEARCHING IMPROVEMENT IN BLOGS USING DATA MINING TECHNIQUES

  • Robin Singh Bhadoria

исследовательская статья

EVALUATING THE PERFORMANCE OF ASSOCIATION RULE MINING ALGORITHMS

  • K.Vanitha, R.Santhi

исследовательская статья

A VALIDATION OF SIM-A WITH OVPSIM

  • Gajendra Kumar Ranka, Dr. Manoj Kumar Jain

История болезни

SEMANTIC WEB MINING FOR INTELLIGENT WEB PERSONALIZATION

  • Anil Sharma, Suresh Kumar, Manjeet Singh

исследовательская статья

MULTI AGENT SYSTEM BASED SCHEME FOR REVISED NATIONAL TUBERCULOSIS CONTROL PROGRAM

  • Shibakali Gupta , Sesa Singha Roy, Indrasish Bannerjee

исследовательская статья

MULTILAYER SECURITY BASED ROBUST WATERMARKING TECHNIQUE FOR MEDICAL IMAGES IN DWT-DCT DOMAIN

  • Baisa L. Gunjal, Suresh N. Mali

исследовательская статья

Q-ROUTING AND INTRUSION DETECTION

  • D.B.Ojha, Sharad Kumar Verma, Bhupendra kumar, Vinod Shukla and Nitin Pandey

исследовательская статья

KEY BASED STEGANOGRAPHY IN A GRAY LEVEL IMAGE INVOLVING PERMUTATION AND MODULAR ARITHMETIC ADDITION

  • V.U.K.Sastry, Ch.Samson

исследовательская статья

KEY BASED STEGANOGRAPHY IN A GRAY LEVEL IMAGE INVOLVING PERMUTATION AND XOR OPERATION

  • V.U.K.Sastry, Ch.Samson

исследовательская статья

FACE RECOGNITION USING DIFFERENT LEVEL OF ALGORITHMS

  • Sushma Jaiswal, Dr. (Smt.) Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon

исследовательская статья

MORPHOLOGICAL METHOD, PCA AND LDA WITH NEURAL NETWORKSFACE RECOGNITION

  • Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon

исследовательская статья

PERFORMANCE INVESTIGATION OF ROUTING PROTOCOLS OF MOBILE AD-HOC NETWORKS USING CBR AND TCP TRAFFIC

  • Samayveer Singh, A K Chauhan and Avinash Soam

исследовательская статья

FEATURE DETECTION APPROACH FROM VIRUSES THROUGH MINING

  • Raviraj Choudhary, Ravi Saharan

исследовательская статья

ATTACK DESCRIPTION LANGUAGE FOR COLLABORATED ALERTS-USING XML AND UML

  • K.V.S.N. Rama Rao, Manas Ranjan Patra

Обзорная статья

PREVENTION AND REACTION BASED SECURE ROUTING IN MANETS

  • Ajay Jangra, Shalini, Nitin Goel

исследовательская статья

SOFTWARE COMPONENT COMPLEXITY MEASUREMENT THROUGH PROPOSED INTEGRATION METRICS

  • Ms. Latika, Dr. Vijay Singh Rathore

исследовательская статья

ELASTICITY OF INTERNET TRAFFIC DISTRIBUTION IN COMPUTER NETWORK IN TWO MARKET ENVIRONMENT

  • Diwakar Shukla, Sharad Gangele, Kapil Verma and Pankaja Singh

исследовательская статья

A MARKOV CHAIN MODEL FOR ROUND ROBIN SCHEDULING IN OPERATING SYSTEM

  • Deepak Sisodia, Dr. Sohan Garg

Индексировано в

Google Scholar
База данных академических журналов
Открыть J-ворота
Академические ключи
ResearchBible
CiteFactor
Библиотека электронных журналов
РефСик
Университет Хамдарда
научный руководитель
Импакт-фактор Международного инновационного журнала (IIJIF)
Международный институт организованных исследований (I2OR)
Cosmos

Посмотреть больше