COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

December 2012, Volume 2, Number 6

Study on Reconstruction Accuracy using shapiness index of morphological transformations [Pdf]
P.Radhakrishnan,King Khalid University, Kingdom of Saudi Arabia.

Efficient Schema Based Keyword Search in Relational Databases [Pdf]
Myint Myint Thein and Mie Mie Su Thwin,University of Computer Studies, Myanmar

A Strategic Hybrid Technique to Develop a Game Player [Pdf]
Randle O.A, Tshwane University of Technology, South Africa

Identification and Investigation of the User Session for Lan Connectivity Via Enhanced Partition Approach of Clustering Techniques [Pdf]
K.Gunasekaran, Pavendar Bharathidasan College of Engineering & Technology, India.

Measurement of Semantic Similarity Between Words: A Survey [Pdf]
Ankush Maind, Anil Deorankar and Prashant Chatur,Government College of Engineering, Amravati, India

October 2012, Volume 2, Number 5

Design and Implementation of Multistage Interconnection Networks for SoC Networks [Pdf]
Mahsa Moazez1, Farshad Safaei2 and Majid Rezazadeh2, 1QIAU, Iran and 2Shahid Beheshti University G.C., Iran

August 2012, Volume 2, Number 4

Distributed Coverage and Connectivity Preserving Algorithm with Support of Different Sensing Coverage Degrees in 3D Mobile Sensor Actor Networks [Pdf]
Mohammad Javad Heydari and Saeid Pashazadeh ,University of Tabriz, Iran

Meta Data Quality Control Architecture in Data Warehousing [Pdf]
Ramesh Babu Palepu1 and K V Sambasiva Rao21Amrita Sai Institute of Science & Technology,India and 2MVR College of Engineering,India

June 2012, Volume 2, Number 3

Adaptable Fingerprint Minutiae Extraction Algorithm Based-on Crossing Number Method for Hardware Implementation using FPGA Device [Pdf]
Sunny Arief Sudiro1 and Rudi Trisno Yuwono21STMIK Jakarta STI&K, Indonesia, 2Gunadarma University, Indonesia.

A General Session Based Bit Level Block Encoding Technique using Symmetric Key Cryptography to Enhance the Security of Network Based Transmission [Pdf]
Manas Paul1 and Jyotsna Kumar Mandal21JIS College of Engineering, India, 2Kalyani University, India.

The Survey of Data Mining Applications and Feature Scope [Pdf]
Neelamadhab Padhy, Pragnyaban Mishra and Rasmita Panigrahi,GIET, India.

Energy Efficient Multicast Routing in Manet [Pdf]
Sankar M S, and Suganthi B,Dhanalakshmi Srinivasan Engineering College, India.

Talash: A Semantic and Context Based Optimized Hindi Search Engine [Pdf]
Nandkishor Vasnik, Shriya Sahu, and Devshri Roy,MANIT, India.

Anti-Synchronization of Hyperchaotic Bao and Hyperchaotic Xu Systems via Active Control [Pdf]
Sundarapandian Vaidyanathan,Vel Tech Dr. RR & Dr. SR Technical University, India.

An Optimal Solution for Image Edge Detection Problem using Simplified Gabor Wavelet [Pdf]
C.Sujatha1 and D. Selvathi2, 1Sethu Institute of Technology, India , 2Mepco Schlenk Engineering College, India.

A Review on Blind Still Image Steganalysis Techniques Using Features Extraction and Pattern Classification Method [Pdf]
Monisha Sharma and Swagota Bera, CSVT University,India.

April 2012, Volume 2, Number 2

The Reduction in Computation Time in the Color Image Decomposition with the Bidimensional Empirical Mode Decomposition Approach [Pdf]
Faten Ben Arfia1, Abdelouahed Sabri2, Mohamed Ben Messaoud1 and Mohamed Abid1, 1National Engineering School of Sfax, Tunisia and 2Dhar El mahraz FES. Morocco.

Security Vigilance System through Level Driven Security Maturity Model [Pdf]
S. K. Pandey, The Institute of Chartered Accountants of India, India.

Algorithmic and Architectural Optimization of a 3D Reconstruction Medical Images Algorithm for a Hardware Implementation [Pdf]
Mili Manel1, Mahmoud Bouraoui2, Boubaker Mohamed1, Ben Abdallah Asma1, Bedoui Mohamed Hedi1 and Akil Mohamed31University of Monastir, Tunisia , 2University of Sousse, Tunisia and 3University of Paris, France.

Probabilistic Interpretation of Complex Fuzzy Set [Pdf]
Nilambar Sethi1, S. K. Das2 and D.C. Panda3, 1Gandhi Institute of Engineering & Technology, India, 2Berhampur University,India and 3Jagannath Institute of Technology & Management, India.

Factors Affecting Acceptance of Web-Based Training System: Using Extended Utaut and Structural Equation Modeling  [Pdf]
Thamer A. Alrawashdeh, Mohammad I. Muhairat and Sokyna M. Alqatawnah,Alzaytoonah, University of Jordan, Jordan.

Using Data Mining Techniques for Diagnosis and Prognosis of Cancer Disease [Pdf]
Shweta Kharya, Bhilai Institute of Technology, India.

An Efficient Implementation of Tracking Using Kalman Filter for Underwater Robot Application [Pdf]
Nagamani Modalavalasa1, G SasiBhushana Rao2 and K. Satya Prasad31SBTET, India, 2Andhra University, India and 3Jawaharlal Nehru Technological University Kakinada, India.

CSHURI - Modified HURI Algorithm for Customer Segmentation and Transaction Profitability [Pdf]
Jyothi Pillai1 and O.P.Vyas21Bhilai Institute Of Technology, India and 2Indian Institute of Information Technology Allahabad, India.

A Novel Window Function Yielding Suppressed Mainlobe Width and Minimum Sidelobe Peak [Pdf]
Md Abdus Samad, International Islamic University Chittagong,Bangladesh.

M-Fish Karyotyping - A New Approach Based on Watershed Transform [Pdf]
Sreejini K S, Lijiya A and V K Govindan, National Institute of Technology-Calicut, India.

Error Performance Analysis Using Cooperative Contention-Based Routing in Wireless Adhoc Networks [Pdf]
G.Srimathy, S.A Engineering College, India .

Page Number Problem: An Evaluation of Heuristics and its Solution Using a Hybrid Evolutionary Algorithm [Pdf]
Dharna Satsangi, Kamal Srivastava and Gursaran, Dayalbagh Educational Institute, India.

Grey Level Co-Occurrence Matrices: Generalisation and Some New Features [Pdf]
Bino Sebastian V1, A.Unnikrishnan2 and Kannan Balakrishnan1, 1Cochin University of Science and Technology, India and 2Naval Physical and Oceanographic Laboratory, India.

Automatic Identification of Cloud Cover Regions Using Surf [Pdf]
Mohamed Mansoor Roomi, R.Bhargavi and T.M.Hajira Rahima Banu, Thiagarajar College of Engineering, India.

Meta-Heuristics Based Arf Optimization for Image Retrieval [Pdf]
Darsana B1 and Rajan Chattamvelli21The Oxford College of Engineering-Bangalore, India and 2Periyar Maniammai University, India.

Detection of Concealed Weapons in X-Ray Images Using Fuzzy K-NN [Pdf]
Mohamed Mansoor Roomi and R.Rajashankari,Thiagarajar College of Engineering,India.

February 2012, Volume 2, Number 1

Gender Recognition System Using Speech Signal [Pdf]
Md. Sadek Ali, Md. Shariful Islam and Md. Alamgir Hossain, Islamic University, Bangladesh

Fuzzy Weighted Associative Classifier : A Predictive Technique for Health Care Data Mining [Pdf]
Sunita Soni1 and O.P.Vyas2, 1Bhilai Institute of Technology, India and 2Indian Institute of Information Technology - Allahabad, India

Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti STBC in Different Modulation Schemes [Pdf]
Rifat Ara Shams, M. Hasnat Kabir and Sheikh Enayet Ullah, University of Rajshahi, Bangladesh

A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms [Pdf]
T. Vijayakumar1, V.Nivedhitha2, K.Deeba2 and M. Sathya Bama2, 1Dr.N.G.P College of Engineering & Technology, India and 2Akshaya College of Engineering & Technology, India

Performance Analysis of Fingerprinting Extraction Algorithm in Video Copy Detection System [Pdf]
R.Gnana Rubini, P.Tamije Selvy and P.Anantha Prabha, Sri Krishna College of Technology, India

Biometrics Authentication Technique for Intrusion Detection Systems Using Fingerprint Recognition [Pdf]
Smita S. Mudholkar, Pradnya M. Shende and Milind V. Sarode, Amravati University, India

Face Recognition Using Different Local Features with Different Distance Techniques [Pdf]
M.Koteswara Rao1, K.Veera Swamy1, K.Anithasheela2 and B.Chandra Mohan3, 1QIS College of Engineering & Technology, India, 2JNTUH, India and 3Bapatla Engineering College, India

Biometric Application of Intelligent Agents in Fake Document Detection of Job Applicants [Pdf]
Salathiel Bogle and Suresh Sankaranarayanan, University of West Indies, Jamaica

A Model for Remote Access and Protection of Smartphones Using Short Message Service [Pdf]
K.S. Kuppusamy, Senthilraja.R and G. Aghila, Pondicherry University, India

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN