| The necessities for building a model to evaluate Business Intelligence projects- Literature Rev |
| Vahid Farrokhi and Laszlo Pokoradi, University of Debrecen, Hungary |
| Volume : 3 volume number : 2 pdf |
| Energy Efficient Recognition Protocol for Ad Hoc Networks |
| Taresh Singh1 and S Qamar2,1 College of Engineering Roorkee, India and 2 SRM University, NCR Campus Modinagar (U. p.)- India |
| Volume : 3 volume number : 2 pdf |
| The Study On Load Balancing Strategies In Distributed Computing System |
| Md. Firoj Ali and Rafiqul Zaman Khan, Aligarh Muslim University, India |
| Volume : 3 volume number : 2 pdf |
| The Proposal Of Hybrid Intrusion Detection For Defence Of Sync Flood Attack In Wireless Sensor Network |
| Ruchi Bhatnagar and Udai Shankar , IIMT Engineering College, India |
| Volume : 3 volume number : 2 pdf |
| Error Analysis Of 3d Polygonal Model:A Survey |
| Devendra Singh Rajput1 and R Rama Kishore2, 1CSC India Pvt. Ltd. , India and 2 USIT, GGS Indraprastha University, India |
| Volume : 3 volume number : 2 pdf |
| Single Image Improvement using Superresolution |
| Shwetambari Shinde and Meeta Dewangan, CSIT-Bhilai,India |
| Volume : 3 volume number : 2 pdf |
| Nymble Blocking System |
| Anand Joshi, Arshiya Shaikh, Aruna Kadam and Vasudha Sahu, MAE Alandi (D), India |
| Volume : 3 volume number : 2 pdf |
| Inclusion Of Road Network In The Spatial Database For Features Searching Using Dynamic Index |
| S. Sivasubramanian and M.Samundeeswari, Bharath University , India |
| Volume : 3 volume number : 2 pdf |
| Performance analysis of Coiflet-type wavelets for a fingerprint image compression by using wavelet and wavelet packet transform |
| Md. Rafiqul Islam1, Farhad Bulbul1 and Shewli Shamim Shanta2, 1Khulna University, Khulna and 2Rajshahi University, Rajshahi |
| Volume : 3 volume number : 2 pdf |