Volume 2, Problème 6 (2011)

Rapport de cas

3D FACE MODELING: COMPREHENSIVE DESCRIPTION

  • Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr.Rakesh Singh Jadon

Rapport de cas

BMP TO JPEG - THE CONVERSION PROCESS

  • Anjali Anand , Dr. Himanshu Aggarwal

Article de révision

SURVEY ON HANDOFF TECHNIQUES

  • A. Bhuvaneswari, Dr. E. George Dharma Prakash Raj

Article de révision

ASSESSMENT OF SECURITY IN MOBILE AD-HOC NETWORKS (MANET)

  • Deepak Chayal, Dr. Vijay Singh Rathore

Article de révision

HIBERNATE TECHNOLOGY FOR AN EFFICIENT BUSINESS APPLICATION EXTENSION

  • B.Vasavi, Y.V.Sreevani, G.Sindhu Priya

Article de révision

NOVEL GRAY SCALE CONVERSION TECHNIQUES BASED ON PIXEL DEPTH

  • Debasish Biswas, Amitava Nag, Soumadip Ghosh, Arindrajit Pal, Sushanta Biswas, Snehasish Banerjee, Anjan Pal

article de recherche

IMPROVING QUALITY USING TESTING STRATEGIES

  • Sahil Batra, Dr. Rahul Rishi

article de recherche

MODEL TO IMPROVE CORRECTNESS AND QUALITY AND REDUCING TESTING TIME (MCQRTT)

  • Sahil Batra, Dr. Rahul Rishi

article de recherche

SEARCHING IMPROVEMENT IN BLOGS USING DATA MINING TECHNIQUES

  • Robin Singh Bhadoria

article de recherche

A VALIDATION OF SIM-A WITH OVPSIM

  • Gajendra Kumar Ranka, Dr. Manoj Kumar Jain

Rapport de cas

SEMANTIC WEB MINING FOR INTELLIGENT WEB PERSONALIZATION

  • Anil Sharma, Suresh Kumar, Manjeet Singh

article de recherche

MULTI AGENT SYSTEM BASED SCHEME FOR REVISED NATIONAL TUBERCULOSIS CONTROL PROGRAM

  • Shibakali Gupta , Sesa Singha Roy, Indrasish Bannerjee

article de recherche

Q-ROUTING AND INTRUSION DETECTION

  • D.B.Ojha, Sharad Kumar Verma, Bhupendra kumar, Vinod Shukla and Nitin Pandey

article de recherche

FACE RECOGNITION USING DIFFERENT LEVEL OF ALGORITHMS

  • Sushma Jaiswal, Dr. (Smt.) Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon

article de recherche

MORPHOLOGICAL METHOD, PCA AND LDA WITH NEURAL NETWORKSFACE RECOGNITION

  • Sushma Jaiswal, Dr. Sarita Singh Bhadauria, Dr. Rakesh Singh Jadon

article de recherche

PERFORMANCE INVESTIGATION OF ROUTING PROTOCOLS OF MOBILE AD-HOC NETWORKS USING CBR AND TCP TRAFFIC

  • Samayveer Singh, A K Chauhan and Avinash Soam

article de recherche

FEATURE DETECTION APPROACH FROM VIRUSES THROUGH MINING

  • Raviraj Choudhary, Ravi Saharan

article de recherche

ATTACK DESCRIPTION LANGUAGE FOR COLLABORATED ALERTS-USING XML AND UML

  • K.V.S.N. Rama Rao, Manas Ranjan Patra

Article de révision

PREVENTION AND REACTION BASED SECURE ROUTING IN MANETS

  • Ajay Jangra, Shalini, Nitin Goel

article de recherche

SOFTWARE COMPONENT COMPLEXITY MEASUREMENT THROUGH PROPOSED INTEGRATION METRICS

  • Ms. Latika, Dr. Vijay Singh Rathore

article de recherche

ELASTICITY OF INTERNET TRAFFIC DISTRIBUTION IN COMPUTER NETWORK IN TWO MARKET ENVIRONMENT

  • Diwakar Shukla, Sharad Gangele, Kapil Verma and Pankaja Singh

article de recherche

A MARKOV CHAIN MODEL FOR ROUND ROBIN SCHEDULING IN OPERATING SYSTEM

  • Deepak Sisodia, Dr. Sohan Garg

Indexé dans

Google Scholar
Academic Journals Database
Open J Gate
Academic Keys
ResearchBible
CiteFactor
Electronic Journals Library
RefSeek
Hamdard University
Scholarsteer
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

Voir plus