COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

International Journal of Computer science and Engineering Survey

ISSN : 0976 - 2760[Online]; 0976 - 3252[Print]

December 2012, Volume 3, Number 6

A Survey of Wireless Sensor Network Architectures  [Pdf]
Almir Davis and Hwa Chang,Tufts University, USA

Techniques and Methodologies for Recognition of Tamil Typewritten and Handwritten Characters: A Survey  [Pdf]
C P Sumathi and S Karpagavalli, S. D. N. B Vaishnav College for Women, India

Challenges and Weaknesses of Agile Method in Enterprise Architecture  [Pdf]
Zahra Askarinejad Amiri, Staffordshire University, UK

Automatic Facial Expression Analysis A Survey  [Pdf]
C.P. Sumathi1, T. Santhanam2 and M.Mahadevi1, 1SDNB Vaishnav College for Women, India and 2DG Vaishnav College for Men, India

Regression Models for 2-Dimensional Cartesian Coordinates Prediction: A Case study at University of Mines and Technology (UMaT), Tarkwa-Ghana.   [Pdf]
Yao Yevenyo Ziggah1, Hu Youjian1, Christian Odutola Amans1, Bernard Kumi-Boateng2, 1China University of Geosciences, Wuhan-P.R.China and 2University of Mines and Technology, Ghana

October 2012, Volume 3, Number 5

LED-ID System: Coverage And Fast Link Recovery Technique   [Pdf]
Muhammad Shahin Uddin1, Mst. Nargis Aktar1 and Yeong Min Jang2, 1Mawlana Bhashani Science and Technology University, Bangladesh and 2Kookmin University, South Korea

Assessments Of Different Speeded Up Robust Features (SURF) Algorithm Resolution For Pose Estimation Of UAV   [Pdf]
Bassem Sheta1, Mohamed Elhabiby2 and Naser El-Sheimy2, 1University of Calgary, Canada and 1Ain Shams University, Egypt

Survey On Scheduling And Allocation In High Level Synthesis   [Pdf]
M. Chinnadurai1 and M. Joseph2, 1EGS Pillay Engineering College, India and 2Mother Teresa College of Engineering & Technology, India

DVR-Based Manet Routing Protocols Taxonomy   [Pdf]
Mrinal Kanti Debbarma1, Santanu Kumar Sen2 and Sudipta Roy1, 1Triguna Sen School of Technology, India and 2Guru Nanak Institute of Technology, India

August 2012, Volume 3, Number 4

Second Generation Curvelet Transforms Vs Wavelet transforms and Canny Edge Detector for Edge Detection from WorldView-2 data  [Pdf]
Mohamed Elhabiby, Ahmed Elsharkawy and Naser El-Sheimy , University of Calgary,Alberta

Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems   [Pdf]
Hossein Jadidoleslamy,The University of Guilan, Iran

A Survey On Various Approaches Of Text Extraction In Images   [Pdf]
C.P. Sumathi1, T. Santhanam2 and G.Gayathri Devi11SDNB Vaishnav College for Women, India and 2DG Vaishnav College for Men, India

Hybrid Technique For Knowledge Representation & A Comparative Study   [Pdf]
Poonam Tanwar1, T. V. Prasad1, Kamlesh Datta21Lingaya's University, India and 2National Institute of Technology, India

A Survey on Terrorist Network Mining: Current Trends and Opportunities  [Pdf]
Nisha Chaurasia, Mradul Dhakar, Akhilesh Tiwari and R. K. Gupta, MITS Gwalior, India

Computer-Aided Diagnosis of Thyroid Nodule: A Review  [Pdf]
Deepika Koundal, Savita Gupta and Sukhwinder Singh, Panjab University, India

Web Search Result Clustering- A Review  [Pdf]
Kishwar Sadaf and Mansaf Alam, Jamia MIllia Islamia, India

A Survey on Target Tracking Techniques in Wireless Sensor Networks  [Pdf]
K. Ramya, K. Praveen Kumar, and V. Srinivas Rao,VR Siddhartha Engineering College, India

June 2012, Volume 3, Number 3

Security In Wireless Sensor Networks - Improving The LEAP Protocol   [Pdf]
Delan Alsoufi, Khaled Elleithy, Tariq Abuzaghleh and Ahmad Nassar, University of Bridgeport, USA

Cross Layer Protocols For Multimedia Transmission In Wireless Networks   [Pdf]
Santhosha Rao and Kumara Shama, Manipal University, India

Complete Synchronization Of Hyperchaotic Xu And Hyperchaotic Lu Systems Via Active Control   [Pdf]
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India

A Survey Of Dimensionality Reduction And Classification Methods   [Pdf]
Nebu Varghese, Vinay Verghese, Gayathri. P and N. Jaisankar, VIT University, India

A Survey Of Sql Injection Countermeasures   [Pdf]
R.P.Mahapatra and Subi Khan, SRM University, India

April 2012, Volume 3, Number 2

The necessities for building a model to evaluate Business Intelligence projects- Literature Rev   [Pdf]
Vahid Farrokhi and Laszlo Pokoradi, University of Debrecen, Hungary

Energy Efficient Recognition Protocol for Ad Hoc Networks   [Pdf]
Taresh Singh1 and S Qamar2, 1College of Engineering Roorkee, India and 2SRM University, NCR Campus Modinagar (U. p.)- India

The Study On Load Balancing Strategies In Distributed Computing System   [Pdf]
Md. Firoj Ali and Rafiqul Zaman Khan, Aligarh Muslim University, India

The Proposal Of Hybrid Intrusion Detection For Defence Of Sync Flood Attack In Wireless Sensor Network   [Pdf]
Ruchi Bhatnagar and Udai Shankar , IIMT Engineering College, India

Error Analysis Of 3d Polygonal Model:A Survey   [Pdf]
Devendra Singh Rajput1 and R Rama Kishore21CSC India Pvt. Ltd. , India and 2USIT, GGS Indraprastha University, India

Single Image Improvement using Superresolution   [Pdf]
Shwetambari Shinde and Meeta Dewangan, CSIT-Bhilai,India

Nymble Blocking System   [Pdf]
Anand Joshi, Arshiya Shaikh, Aruna Kadam and Vasudha Sahu, MAE Alandi (D), India

Inclusion Of Road Network In The Spatial Database For Features Searching Using Dynamic Index   [Pdf]
S. Sivasubramanian and M.Samundeeswari, Bharath University , India

Performance analysis of Coiflet-type wavelets for a fingerprint image compression by using wavelet and wavelet packet transform  [Pdf]
Md. Rafiqul Islam1, Farhad Bulbul1 and Shewli Shamim Shanta21Khulna University, Khulna and 2Rajshahi University, Rajshahi

February 2012, Volume 3, Number 1

Adopting E-Commerce To User's Needs   [Pdf]
Mohammad Alshehri1, Hamza Aldabbas1, James Sawle1 and Mai Abu Baqar21De Montfort University, United Kingdom and 2Albalqa Applied University, Jordon

A comparative study analysis of materialized view for selection cost  [Pdf]
T.Nalini, A.Kumaravel and K.Rangarajan, Bharath University, India

Energy Saving in Wireless Sensor Networks  [Pdf]
Zahra Rezaei and Shima Mobininejad, Islamic Azad University, Iran

Spatiotemporal Data Mining: Issues, Tasks And Applications   [Pdf]
K.Venkateswara Rao1, A.Govardhan2 and K.V.Chalapati Rao21CVR College of Engineering, Ibrahimpatnam RR District, India and 2JNTUH, India

Secure And Reliable Routing In Mobile Adhoc Networks  [Pdf]
Rachid Haboub and Mohammed Ouzzif, ENSEM - ESTC - UH2C, Casablanca, Morocco

Watermarking Schemes For Copy Protection : A Survey   [Pdf]
Dolley Shukla1 and Manisha Sharma21Shri Shankaracharya College of Engineering & Technology, India and 2Bhilai Institute of Technology, India

A Survey On Detect - Discovering And Evaluating Trust Using Efficient Clustering Technique For Manets   [Pdf]
K.Sudharson and N.Partheeban, S.A.Engineering College, India

Fault Based Techniques For Testing Boolean Expressions: A Survey   [Pdf]
Usha Badhera, Purohit G.N and S.Taruna, Banasthali University, India

Graph Partitioning Advance Clustering Technique   [Pdf]
T. Soni Madhulatha, Alluri Institute of Management Sciences, India

Segment Based Visual Cryptography For Key Distribution   [Pdf]
Sesha Pallavi Indrakanti1 and Avadhani P S21GVP Degree College, India and 2Andhra University College of Engineering, India

Secure Key Agreement And Authentication Protocols   [Pdf]
B.Maheshwari, Alluri Institute of Management Sciences, India

Pattern Association For Character Recognition By Back-Propagation Algorithm Using Neural Network Approach   [Pdf]
S.P.Kosbatwar and S.K.Pathan, Smt.Kashibai Navale College of Engineering, India

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN