Volume 2, Emitir 4 (2011)

Artigo de Pesquisa

Energy-Efficient Target Monitoring Algorithm for Wireless Sensor Networks

  • Samayveer Singh, Ajay K Sharma

Artigo de Pesquisa

A CHALLENGE IN HIDING ENCRYPTED MESSAGE IN LSB AND LSB+1 BIT POSITIONS IN VARIOUS Cover Files

  • Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath

Artigo de Pesquisa

EVENT DRIVEN DATA INTEGRATION AN ANALYSIS

  • Rajeshkumar Myilsamy

Artigo de Pesquisa

HETEROGENEOUS PROTOCOLS FOR INCREASING LIFETIME OF WIRELESS SENSOR NETWORKS

  • Samayveer Singh, A K Chauhan, Sanjeev Raghav, Vikas Tyagi, Sherish Johri

Artigo de Pesquisa

OCULTAÇÃO DE IMAGEM NA SEQUÊNCIA DE ADN USANDO CODIFICAÇÃO ARITMÉTICA

  • Prof. Samir Kumar Bandyopadhyay e Sr.

Artigo de Pesquisa

SEGMENTAÇÃO E QUANTIFICAÇÃO DE TUMOR CEREBRAL POR RM DO CÉREBRO

  • Sudipta Roy, Atanu Saha e Prof.

Artigo de Pesquisa

COSMETIC SURGERY FOR AGING EFFECTS ON FACE IMAGES-A PROPOSED METHOD

  • Prof. Samir K. Bandyopadhyay

Artigo de Pesquisa

METHOD FOR BLOOD CELL SEGMENTATION

  • Prof. Samir K. Bandyopadhyay

Artigo de Pesquisa

AUTONOMOUS MOBILE ROBOTS DESIGNING

  • Dr. V. M. Murthy (Director), Sushil Kumar, Vedpal Singh, Nitin Kumar and Chander Sain

Artigo de Pesquisa

Transmissão de Grande Informação através do KAP Utilizando Grupo Não-Abeliano

  • Abhishek Dwivedi, Deo Brat Ojha, Ajay Sharma, Ramveer Singh e Awakash Mishra

Artigo de Pesquisa

INTERFACE DE LÍNGUA HINDI PARA BASES DE DADOS

  • Himani Jain, Parteek Bhatia

Artigo de Pesquisa

A Modern Advanced Hill Cipher Involving XOR Operation and a Permuted Key

  • V.U.K.Sastry, Aruna Varanasi and S.Udaya Kumar

Artigo de Pesquisa

A Modern Advanced Hill Cipher Involving a Permuted Key and Modular Arithmetic Addition Operation

  • V.U.K.Sastry, Aruna Varanasi and S.Udaya Kumar

Artigo de Pesquisa

SEMANTIC RETRIEVAL FOR HOMONYMS USING RDF AND SPARQL

  • Amrita Bhandari, Shalini Batra

Artigo de Pesquisa

SECURITY THREATS IN PEER TO PEER NETWORKS

  • Chander Diwakar, Sandeep Kumar, Amit Chaudhary

Artigo de Pesquisa

TESTE DE SOFTWARE EFICAZ UTILIZANDO ALGORITMOS GENÉTICOS

  • Kulvinder Singh, Rekha Rani, Seema Rani, Vedpal Singh

Artigo de Pesquisa

Esteganografia de texto utilizando a técnica de mapeamento de artigos (AMT) e SSCE

  • Indradip Banerjee, Souvik Bhattacharyya e Gautam Sanyal

Artigo de Pesquisa

Recuperação de informação usando a Web

  • Anu Kundu, Sona Malhotra

Artigo de Pesquisa

OBJECT ORIENTED DESIGN SECURITY QUANTIFICATION

  • Suhel Ahmad Khan and Raees Ahmad Khan

Artigo de Pesquisa

A MULTI AGENT BASED E-SHOPPING SYSTEM

  • SYSTEMSougata Khatua, Zhang Yuheng , Arijit Das and N.Ch.S.N. Iyengar

Artigo de Pesquisa

AGENT BASED E-HEALTH CARE INFORMATION SYSTEM

  • Arijit Das, Sougata Khatua, Zhang Yuheng and N. Ch. S. N. Iyengar

Artigo de Pesquisa

DEFENDING AGAINST ATTACKS BY ENHANCING SECURITY USING BIOMETRICS IN SEMANTIC WEB

  • Mr. Akhilesh Dwivedi, Mr. Suresh Kumar

Indexado em

Google Scholar
Academic Journals Database
Open J Gate
Academic Keys
ResearchBible
CiteFactor
Electronic Journals Library
RefSeek
Hamdard University
Scholarsteer
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

Veja mais