Security Policy Enforcement in Cloud Infrastructure |
Arijit Ukil1, Ajanta De Sarkar2 and Debasish Jana2, 1Tata Consultancy Services, India and 2Birla Institute of Technology, India |
Volume : 3 volume number : 5 pdf |
A New Paradigm in Fast BCD Division Using Ancient Indian Vedic Mathematics Sutras |
Diganta Sengupta1, Mahamuda Sultana2, Atal Chaudhuri3, 1Future Institute of Engineering and Management, India, 2Swami Vivekananda Institute of Science and Technology, India and 3JadavpurUniversity, India |
Volume : 3 volume number : 5 pdf |
Security Analysis of Generalized Confidential Modulation |
Hidema Tanaka, National Defense Academy, Japan |
Volume : 3 volume number : 5 pdf |
Experimental Study of Minutiae Based Algorithm for Fingerprint Matching |
Cleopas Officer Angaye1, Oluwole Charles Akinyokun2 and Gabriel Babatunde Iwasokun2, 1National Information Technology Development Agency (NITDA), Nigeria and 2Federal University of Technology, Nigeria |
Volume : 3 volume number : 5 pdf |
Automatic Short Mail Construction to Enhance Email Storage |
Nijin.V, Kaushik.Ra, Swathika.R and Mohanavalli.S, SSN College of Engineering, India |
Volume : 3 volume number : 5 pdf |
OpenCL programming using Python syntax |
Massimo Di Pierro, DePaul University, USA |
Volume : 3 volume number : 5 pdf |
Formalization & Data Abstraction During Use Case Modeling in Object Oriented Analysis & Design |
Meena Sharma1 and Rajeev G Vishwakarma2, 1Devi Ahilya University, India and 2Rajiv Gandhi Technical University, India |
Volume : 3 volume number : 5 pdf |
Review of Access Control Models for Cloud Computing |
Natarajan Meghanathan, Jackson State University, USA |
Volume : 3 volume number : 5 pdf |
Automatic Identification of Silence, Unvoiced and Voiced Chunks in Speech |
Poonam Sharma and Abha Kiran Rajpoot, Sharda University, India |
Volume : 3 volume number : 5 pdf |
Performance Analysis of Transmission of 5 Users Based on Model B Using GF (5) with Varying Bit Rates for 3D OCDMA System |
Shilpa Jindal and N Gupta, PEC University of Technology, India |
Volume : 3 volume number : 5 pdf |
A Survey on Dynamic Energy Management at Virtualization Level in Cloud Data Centers |
T.Veni and S. Mary Saira Bhanu, National Institute of Technology - Tiruchirappalli, India |
Volume : 3 volume number : 5 pdf |
Detection of Hard Exudates Using Simulated Annealing Based Thresholding Mechanism in Digital Retinal Fundus Image |
Diptoneel Kayal and Sreeparna Banerjee, West Bengal University of Technology, India |
Volume : 3 volume number : 5 pdf |
Extended Hybrid Region Growing Segmentation of Point Clouds with Different Resolution from Dense Aerial Image Matching |
Mohammad Omidalizarandi1 and Mohammad Saadatseresht2, 1University of Stuttgart, Germany and 2University of Tehran, Iran |
Volume : 3 volume number : 5 pdf |
Computing Semantic Similarity Measure Between Words Using Web Search Engine |
Pushpa C N, Girish S, Nitin S K, Thriveni J, Venugopal K R and L M Patnaik, University Visvesvaraya College of Engineering, India |
Volume : 3 volume number : 5 pdf |
PSO Based Optimized Security Scheme for Image Authentication and Tamper Proofing |
K. Kuppusamy and K. Thamodaran, Alagappa University, India |
Volume : 3 volume number : 5 pdf |
Contourlet-Based Fingerprint Antispoofing |
Shankar Bhausaheb Nikam1 and Suneeta Agarwal2, 1Government Polytechnic - Pune, India and 2Motilal Nehru National Institute of Technology, India |
Volume : 3 volume number : 5 pdf |
Visible Watermarking within the Region of Non-Interest of Medical Images Based on Fuzzy C-Means and Harris Corner Detection |
Debalina Biswas1, Poulami Das1, Prosenjit Maji1, Nilanjan Dey1 and Sheli Sinha Chaudhuri2, 1JIS College of Engineering, India and 2Jadavpur University, India |
Volume : 3 volume number : 5 pdf |
Internal Security on an IDS Based on Agents |
Rafael Paez, Mery Yolima Uribe and Miguel Torres, Pontificia Universidad Javeriana, Colombia |
Volume : 3 volume number : 5 pdf |
USB Based Secure E-Mail |
Rakesh Shukla, Garima Kuchhal, R.Phani Bhushan, S. Venkataraman and Geeta Varadan, ADRIN, India |
Volume : 3 volume number : 5 pdf |
HAQR: The Hierarchical ANT Based QOS Aware On-Demand Routing for MANETS |
Debajit Sensarma and Koushik Majumder, West Bengal University of Technology, India |
Volume : 3 volume number : 5 pdf |
A Novel Cache Resolution Technique for Cooperative Caching in Wireless Mobile Networks |
Preetha Theresa Joy and K. Poulose Jacob, Cochin University of Science and Technology, India |
Volume : 3 volume number : 5 pdf |
Modified Golden Codes for Improved Error Rates Through Low Complex Sphere Decoder |
K.Thilagam and K.Jayanthi, Pondicherry Engineering College, India |
Volume : 3 volume number : 5 pdf |
Optimal Path Identification Using ANT Colony Optimisation in Wireless Sensor Network |
Aniket. A. Gurav and Manisha. J. Nene, Defence Institute of Advance Technology, India |
Volume : 3 volume number : 5 pdf |
A Novel Cluster Based Wormhole Avoidance Algorithm for Mobile Adhoc Networks |
Subhashis Banerjee and Koushik Majumder, West Bengal University of Technology, India |
Volume : 3 volume number : 5 pdf |
A Survey on Trust Based Secure Routing in Manet |
Mousumi Sardar and Koushik Majumder, West Bengal University of Technology, India |
Volume : 3 volume number : 5 pdf |
A Research Survey: RFID Security & Privacy Issue |
Monika Sharma and P. C. Agrawal, Mewar University, India |
Volume : 3 volume number : 5 pdf |
Improving Image Resolution Through the CRA Algorithm Involved Recycling Process to Image Reconstruction |
S. N. Tazi, Deepika Verma, Vinesh Jain, A. K. Dubey and Rakesh Rathi, Govt. Engineering College Ajmer, India |
Volume : 3 volume number : 5 pdf |
Automatic Dominant Region Segmentation for Natural Images |
A.Kalaivani1, S.P.Surender Nath2 and S.Chitrakala2, 1Easwari Engineering College, India and 2 Anna University, India |
Volume : 3 volume number : 5 pdf |
A Comprehensive Study on Classification of Passive Intrusion and Extrusion Detection System |
J.Lekha and G.Padmavathi, Avinashilingam Institute of Home Science and Higher Education for Women, India |
Volume : 3 volume number : 5 pdf |
Apply Hibernate to Model and Persist Associations Mappings in Document Version System |
Neetu Gupta, Amity University, Noida |
Volume : 3 volume number : 5 pdf |
Applications of Spatial Features in CBIR : A Survey |
R. Priyatharshini1 Surendernath S.P2 and S.Chitrakala2, 1Easwari Engineering College, India and 2Anna University, India |
Volume : 3 volume number : 5 pdf |
Heuristic Based Adaptive Step Size CLMS Algorithms for Smart Antennas |
Y Rama Krishna1, PV Subbaiah2 and B Prabhakara Rao3, 1PVP Siddhartha Institute of Technology, India, 2Amrita Sai Institute of Science & Technology, India and 3JNT University Kakinada, India |
Volume : 3 volume number : 5 pdf |
An Adaptive Threshold Segmentation for Detection of Nuclei in Cervical Cells Using Wavelet Shrinkage Algorithms |
B.Savitha and P. Subashini, Avinashilingam Institute for Home Science and Higher Education for Women University, India |
Volume : 3 volume number : 5 pdf |
Neural Network Based Identification of Multimachine Power System |
Sheela Tiwari1, Ram Naresh2 and Rameshwar Jha3, 1Dr. B R Ambedkar National Institute of Technology, India, 2National Institute of Technology, India and 3IET Bhaddal Technical Campus, India |
Volume : 3 volume number : 5 pdf |
Security Issues and Solutions in Vehicular Adhoc Network : A Review Approach |
Ram Shringar Raw, Manish Kumar and Nanhay Singh, Ambedkar Institute of Advanced communication Technologies & Research, India |
Volume : 3 volume number : 5 pdf |
Performance Comparison on Java Technologies - A Practical Approach |
Priyanka Dutta, Vasudha Gupta and Sunit Rana, Centre for development of Advanced Computing, India |
Volume : 3 volume number : 5 pdf |