Volume 2, Emitir 6 (2011)

Relato de caso

3D FACE MODELING: COMPREHENSIVE DESCRIPTION

  • Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr.Rakesh Singh Jadon

Relato de caso

BMP TO JPEG - THE CONVERSION PROCESS

  • Anjali Anand , Dr. Himanshu Aggarwal

Artigo de Revisão

SURVEY ON HANDOFF TECHNIQUES

  • A. Bhuvaneswari, Dr. E. George Dharma Prakash Raj

Artigo de Revisão

ASSESSMENT OF SECURITY IN MOBILE AD-HOC NETWORKS (MANET)

  • Deepak Chayal, Dr. Vijay Singh Rathore

Artigo de Revisão

HIBERNATE TECHNOLOGY FOR AN EFFICIENT BUSINESS APPLICATION EXTENSION

  • B.Vasavi, Y.V.Sreevani, G.Sindhu Priya

Artigo de Revisão

NOVEL GRAY SCALE CONVERSION TECHNIQUES BASED ON PIXEL DEPTH

  • Debasish Biswas, Amitava Nag, Soumadip Ghosh, Arindrajit Pal, Sushanta Biswas, Snehasish Banerjee, Anjan Pal

Artigo de Pesquisa

IMPROVING QUALITY USING TESTING STRATEGIES

  • Sahil Batra, Dr. Rahul Rishi

Artigo de Pesquisa

SEARCHING IMPROVEMENT IN BLOGS USING DATA MINING TECHNIQUES

  • Robin Singh Bhadoria

Artigo de Pesquisa

A VALIDATION OF SIM-A WITH OVPSIM

  • Gajendra Kumar Ranka, Dr. Manoj Kumar Jain

Relato de caso

SEMANTIC WEB MINING FOR INTELLIGENT WEB PERSONALIZATION

  • Anil Sharma, Suresh Kumar, Manjeet Singh

Artigo de Pesquisa

MULTI AGENT SYSTEM BASED SCHEME FOR REVISED NATIONAL TUBERCULOSIS CONTROL PROGRAM

  • Shibakali Gupta , Sesa Singha Roy, Indrasish Bannerjee

Artigo de Pesquisa

Q-ROUTING AND INTRUSION DETECTION

  • D.B.Ojha, Sharad Kumar Verma, Bhupendra kumar, Vinod Shukla and Nitin Pandey

Artigo de Pesquisa

FACE RECOGNITION USING DIFFERENT LEVEL OF ALGORITHMS

  • Sushma Jaiswal, Dr. (Smt.) Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon

Artigo de Pesquisa

MORPHOLOGICAL METHOD, PCA AND LDA WITH NEURAL NETWORKSFACE RECOGNITION

  • Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon

Artigo de Pesquisa

PERFORMANCE INVESTIGATION OF ROUTING PROTOCOLS OF MOBILE AD-HOC NETWORKS USING CBR AND TCP TRAFFIC

  • Samayveer Singh, A K Chauhan and Avinash Soam

Artigo de Pesquisa

FEATURE DETECTION APPROACH FROM VIRUSES THROUGH MINING

  • Raviraj Choudhary, Ravi Saharan

Artigo de Pesquisa

ATTACK DESCRIPTION LANGUAGE FOR COLLABORATED ALERTS-USING XML AND UML

  • K.V.S.N. Rama Rao, Manas Ranjan Patra

Artigo de Revisão

PREVENTION AND REACTION BASED SECURE ROUTING IN MANETS

  • Ajay Jangra, Shalini, Nitin Goel

Artigo de Pesquisa

SOFTWARE COMPONENT COMPLEXITY MEASUREMENT THROUGH PROPOSED INTEGRATION METRICS

  • Ms. Latika, Dr. Vijay Singh Rathore

Artigo de Pesquisa

ELASTICITY OF INTERNET TRAFFIC DISTRIBUTION IN COMPUTER NETWORK IN TWO MARKET ENVIRONMENT

  • Diwakar Shukla, Sharad Gangele, Kapil Verma and Pankaja Singh

Artigo de Pesquisa

A MARKOV CHAIN MODEL FOR ROUND ROBIN SCHEDULING IN OPERATING SYSTEM

  • Deepak Sisodia, Dr. Sohan Garg

Indexado em

Google Scholar
Academic Journals Database
Open J Gate
Academic Keys
ResearchBible
CiteFactor
Electronic Journals Library
RefSeek
Hamdard University
Scholarsteer
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

Veja mais