Advanced Computing: An International Journal
|
|||||||||||
Image Content in Location-Based Shopping Recommender Systems For Mobile Users [ pdf ] |
|||||||||||
Study and Implementation of Advanced Neuroergonomic Techniques [ pdf ] |
|||||||||||
'CodeAliker' - Plagiarism Detection on the Cloud [ pdf ] |
|||||||||||
A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks [ pdf ] |
|||||||||||
Analyzing the Efficient Test Order for Integration Testing [ pdf ] |
|||||||||||
Named Entity Recognition in Turkish Using Association Measures [ pdf ] |
|||||||||||
Freeman Code Based Online Handwritten Character Recognition for Malayalam using Backpropagation Neural Networks [ pdf ] |
|||||||||||
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Based Healthcare Applications [ pdf ] |
|||||||||||
A Novel Method for Obtaining a Better Quality Speech Signal for Cochlear Implants using Kalman with DRNL and SSB Technique [pdf ] |
|||||||||||
Implementation of AES as a Custom Hardware using NIOS II Processor [ pdf ] |
|||||||||||
A New Approach to Theftware-Efficient Solution [ pdf ] |
|||||||||||
Privacy Preserving through Segment-Based Visual Cryptography [ pdf ] |
|||||||||||
May 2012, Volume 3, Number 3 | |||||||||||
Improvement Of Loadability In Distribution System Using Genetic Algorithm [ pdf ] |
|||||||||||
Availability Of JobTracker Machine In Hadoop/MapReduce Zookeeper Coordinated Clusters [ pdf ] |
|||||||||||
New Approch For Wireless Communication Security Protocol By Using Mutual Authentication [ pdf ] |
|||||||||||
Distance Transform Based Hand Gestures Recognition For Powerpoint Presentation Navigation [ pdf ] |
|||||||||||
Development Of Growth Models For Electronics Hardware And Software Components [ pdf ] |
|||||||||||
Semantic Plagiarism Detection System Using Ontology Mapping [ pdf ] |
|||||||||||
Data Security by Preprocessing the Text with Secret Hiding [ pdf ] |
|||||||||||
A New Approach To Enhance Security In Mpls Network [ pdf ] |
|||||||||||
Detecting Phishing Attacks In Purchasing Process Through Proactive Approach [ pdf ] |
|||||||||||
Dispelling Classes Gradually to Improve Quality of Feature Reduction Approaches [ pdf ] |
|||||||||||
Alpha-Qwerty Cipher: An Extended Vigenere Cipher [ pdf ] |
|||||||||||
Security Implementation through PCRE Signature over Cloud Network [ pdf ] |
Quantum parity algorithms as oracle calls, and application in Grover Database search [ pdf ]
M. Z. Rashad, Mansoura University, Egypt
Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol[ pdf ]
M. W. Youssef1 and Hazem El-Gendy2, 1The SHOURA Assembly Cairo, Egypt and 2Ahram Canadian University in Egypt, Egypt
How To Improve Software Quality Assurance In Developing Countries [ pdf ]
Ali Javed , Muazzam Maqsood KhurramAshfaqQazi and Khurram Ali Shah , University of Engineering and Technology Taxila, Pakistan
Controlled Multimedia Cloud Architecture And Advantages [ pdf ]
Selvaraj Kesavan1, Jerome Anand2 and J.Jayakumar1, 1Karunya University, India and 2Embedded Software Architect, India
Construction of Community Web Directories based on Web usage Data [ pdf ]
Ramancha Sandhyarani, Bodakuntla Rajkumar and Jayadev Gyani, Jayamukhi Institute of Technological Sciences Narsampet, India
Edge Preserving Image Coding For High Resolution Image Representation [ pdf ]
M. Nagaraju Naik1, K. Kumar Naik2 and P. Rajesh Kumar3, 1MIST, India, 2ANITS, India and 3A.U. College of Engineering, India
Neighbor Attack And Detection Mechanism In Mobile Ad-Hoc Networks [ pdf ]
S. Parthiban1, A. Amuthan2, N.Shanmugam3, K.Suresh Joseph1, 1Pondicherry University, India, 2Pondicherry Engineering College, India and 3Kanchi Pallavan Engineering College, India
Role Of Context In Usability Evaluations: A Review [ pdf ]
Munesh Chandra Trivedi1 and Mohammadi Akheela Khanum2, 1Greater Noida, India and 2PAHER University, India
Data Load Manifestation In Process Chains In SAP Business Ware House [ pdf ]
M. Victoria Hebseeba1, T. Bhasakara Reddy2, B. Lakshma Reddy3 and T. Venkateswarulu4, 1Rayalaseema University, India, 2S.K University, India, 3Garden City College, India and 4Gate College, India
A Novel Framework using Elliptic Curve Cryptography for Extremely Secure Transmission in Distributed Privacy Preserving Data Mining [ pdf ]
Kiran P, S Sathish Kumar and Dr Kavya N P, RNS Instituite of Technology, India
Analysis of Various Symbol Detection Techniques in Multiple-Input Multiple-Output System (MIMO) [ pdf ]
Shuchi Jani1, Shrikrishan Yadav2 and B. L. Pal3, 1SITE, India, 2PAHER University, India and 3MEWAR University, India
Aspect-Oriented Software Quality Model: The AOSQ Model [ pdf ]
Pankaj Kumar, Noida Institute of Engineering & Technology, India
A Survey for Load Balancing in Mobile WiMAX Networks [ pdf ]
Camellia Askarian and Hamid Beigy, Sharif University of Technology, Iran
Physical Unclonable Function (PUF) Based Random Number Generator [ pdf ]
Ali Sadr and Mostafa Zolfaghari-Nejad, Iran University of Science and Technology Tehran, Iran
Feature Extraction Methods For Color Image Similarity [ pdf ]
R.Venkata Ramana Chary1,D.Rajya Lakshmi2 and K.V.N Sunitha3, 1Padmasri Dr.B.V Raju Institute of Technology, India, 2GITAM Institute of Technology, India and 3G. Narayanamma Institute of Technology and Science Hyderabad, India
Cloud Computing And Privacy Regulations: An Exploratory Study On Issues And Implications [ pdf ]
Mohammed A. T. AlSudiari and TGK Vasista, King Saud University, KSA
Survey And Taxonomy Of Key Management Protocols For Wired And Wireless Networks [ pdf ]
Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and Technology,India
Anonymity And Accountability In Web Based Transactions [ pdf ]
H.Jayasree and A.Damodaram, ATRI, India and JNTUH, India
Breaking A Feistel-Type Block Cipher by Bacteria Engineering[ pdf ]
Arash Karimi and Hadi Shahriar Shahhoseini, Iran University of Science and Technology-Tehran, Iran
Multi-Agents Simulation of Human Behavior in a Situation of Emergency[ pdf ]
Benkhedda Samira and Bendella Fatima, University of Science and Technology of Oran-USTO, Algeria
Presenting a hybrid method in order to predict the2009 pandemic influenza A (H1N1)[ pdf ]
Reza Boostani, Mojtaba Rismanchi,Abbas Khosravani, Lida Rashidi, Samaneh Kouchaki,Payam Peymani, Seyed Taghi Heydari, B. Sabayan and K. B.Lankarani, Shiraz University, Iran
Embedded pH Data Acquisition and Logging[ pdf ]
V.Ramya and B.Palaniappan, Annamalai University, India
Collaboration for Enhancing the System Development Process in Open Source Diligence[ pdf ]
Murtaza Hussain Shaikh, Norwegian University of Science and Technology (NTNU), Trondheim - Norway
A Novel Image Retrieval Method Using Segmentation and Color Moments[ pdf ]
T.V. Saikrishna1, A.Yesubabu2, A.Anandarao3 and T.Sudha Rani4, 1QIS College of Engineering & Technology, India, 2SIR C R Reddy College of Engineering, India, 3JNTU College of Engineering, India and 4Aditya Engineering College, India
A New Trend for E-Learning in KSA Using Educational Clouds[ pdf ]
Abdullah Alshwaier, Ahmed Youssef and Ahmed Emam, King Saud University-Riyadh, KSA
Exploiting Logical Structures to Reduce Quorum Sizes of Replicated Databases[ pdf ]
Parul Pandey and Maheshwari Tripathi, Jain University, IET, Lucknow
GPGPU Processing in CUDA Architecture[ pdf ]
Jayshree Ghorpade1, Jitendra Parande2, Madhura Kulkarni1 and Amit Bawaskar1, 1MITCOE, Pune University, India and 2SunGard Global Technologies, India
Multiclass Classifier Designed Using Stepwise Crossover and Special Mutation Technique[ pdf ]
Pankaj Patidar1, Bhupendra Verma1 and Arpit Bhardwaj2, 1TIT- Bhopal, India and 2SDITS-Khandwa, India
Modeling of Packet Switched Network over TCP Veno: TCP Improvement for Transmission over Wireless Access Networks[ pdf ]
Baswaraj1, D.C. Tomar2 and K.Prasad Rao1, 1CMR Institute of Technology, India and 2MNM Jain Engineering College, India
Effect of Symlet Filter Order on Denoising of Still Images[ pdf ]
S. Kumari and R. Vijay, Banasthali University, India