International Journal of Computer science and Engineering Survey
December 2012, Volume 3, Number 6 |
A Survey of Wireless Sensor Network Architectures [Pdf] |
Techniques and Methodologies for Recognition of Tamil Typewritten and Handwritten Characters: A Survey [Pdf] |
Challenges and Weaknesses of Agile Method in Enterprise Architecture [Pdf] |
Automatic Facial Expression Analysis A Survey [Pdf] |
Regression Models for 2-Dimensional Cartesian Coordinates Prediction: A Case study at University of Mines and Technology (UMaT), Tarkwa-Ghana. [Pdf] |
LED-ID System: Coverage And Fast Link Recovery Technique [Pdf]
Muhammad Shahin Uddin1, Mst. Nargis Aktar1 and Yeong Min Jang2, 1Mawlana Bhashani Science and Technology University, Bangladesh and 2Kookmin University, South Korea
Assessments Of Different Speeded Up Robust Features (SURF) Algorithm Resolution For Pose Estimation Of UAV [Pdf]
Bassem Sheta1, Mohamed Elhabiby2 and Naser El-Sheimy2, 1University of Calgary, Canada and 1Ain Shams University, Egypt
Survey On Scheduling And Allocation In High Level Synthesis [Pdf]
M. Chinnadurai1 and M. Joseph2, 1EGS Pillay Engineering College, India and 2Mother Teresa College of Engineering & Technology, India
DVR-Based Manet Routing Protocols Taxonomy [Pdf]
Mrinal Kanti Debbarma1, Santanu Kumar Sen2 and Sudipta Roy1, 1Triguna Sen School of Technology, India and 2Guru Nanak Institute of Technology, India
Second Generation Curvelet Transforms Vs Wavelet transforms and Canny Edge Detector for Edge Detection from WorldView-2 data [Pdf]
Mohamed Elhabiby, Ahmed Elsharkawy and Naser El-Sheimy , University of Calgary,Alberta
Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems [Pdf]
Hossein Jadidoleslamy,The University of Guilan, Iran
A Survey On Various Approaches Of Text Extraction In Images [Pdf]
C.P. Sumathi1, T. Santhanam2 and G.Gayathri Devi1, 1SDNB Vaishnav College for Women, India and 2DG Vaishnav College for Men, India
Hybrid Technique For Knowledge Representation & A Comparative Study [Pdf]
Poonam Tanwar1, T. V. Prasad1, Kamlesh Datta2, 1Lingaya's University, India and 2National Institute of Technology, India
A Survey on Terrorist Network Mining: Current Trends and Opportunities [Pdf]
Nisha Chaurasia, Mradul Dhakar, Akhilesh Tiwari and R. K. Gupta, MITS Gwalior, India
Computer-Aided Diagnosis of Thyroid Nodule: A Review [Pdf]
Deepika Koundal, Savita Gupta and Sukhwinder Singh, Panjab University, India
Web Search Result Clustering- A Review [Pdf]
Kishwar Sadaf and Mansaf Alam, Jamia MIllia Islamia, India
A Survey on Target Tracking Techniques in Wireless Sensor Networks [Pdf]
K. Ramya, K. Praveen Kumar, and V. Srinivas Rao,VR Siddhartha Engineering College, India
Security In Wireless Sensor Networks - Improving The LEAP Protocol [Pdf]
Delan Alsoufi, Khaled Elleithy, Tariq Abuzaghleh and Ahmad Nassar, University of Bridgeport, USA
Cross Layer Protocols For Multimedia Transmission In Wireless Networks [Pdf]
Santhosha Rao and Kumara Shama, Manipal University, India
Complete Synchronization Of Hyperchaotic Xu And Hyperchaotic Lu Systems Via Active Control [Pdf]
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India
A Survey Of Dimensionality Reduction And Classification Methods [Pdf]
Nebu Varghese, Vinay Verghese, Gayathri. P and N. Jaisankar, VIT University, India
A Survey Of Sql Injection Countermeasures [Pdf]
R.P.Mahapatra and Subi Khan, SRM University, India
The necessities for building a model to evaluate Business Intelligence projects- Literature Rev [Pdf]
Vahid Farrokhi and Laszlo Pokoradi, University of Debrecen, Hungary
Energy Efficient Recognition Protocol for Ad Hoc Networks [Pdf]
Taresh Singh1 and S Qamar2, 1College of Engineering Roorkee, India and 2SRM University, NCR Campus Modinagar (U. p.)- India
The Study On Load Balancing Strategies In Distributed Computing System [Pdf]
Md. Firoj Ali and Rafiqul Zaman Khan, Aligarh Muslim University, India
The Proposal Of Hybrid Intrusion Detection For Defence Of Sync Flood Attack In Wireless Sensor Network [Pdf]
Ruchi Bhatnagar and Udai Shankar , IIMT Engineering College, India
Error Analysis Of 3d Polygonal Model:A Survey [Pdf]
Devendra Singh Rajput1 and R Rama Kishore2, 1CSC India Pvt. Ltd. , India and 2USIT, GGS Indraprastha University, India
Single Image Improvement using Superresolution [Pdf]
Shwetambari Shinde and Meeta Dewangan, CSIT-Bhilai,India
Nymble Blocking System [Pdf]
Anand Joshi, Arshiya Shaikh, Aruna Kadam and Vasudha Sahu, MAE Alandi (D), India
Inclusion Of Road Network In The Spatial Database For Features Searching Using Dynamic Index [Pdf]
S. Sivasubramanian and M.Samundeeswari, Bharath University , India
Performance analysis of Coiflet-type wavelets for a fingerprint image compression by using wavelet and wavelet packet transform [Pdf]
Md. Rafiqul Islam1, Farhad Bulbul1 and Shewli Shamim Shanta2, 1Khulna University, Khulna and 2Rajshahi University, Rajshahi
Adopting E-Commerce To User's Needs [Pdf]
Mohammad Alshehri1, Hamza Aldabbas1, James Sawle1 and Mai Abu Baqar2, 1De Montfort University, United Kingdom and 2Albalqa Applied University, Jordon
A comparative study analysis of materialized view for selection cost [Pdf]
T.Nalini, A.Kumaravel and K.Rangarajan, Bharath University, India
Energy Saving in Wireless Sensor Networks [Pdf]
Zahra Rezaei and Shima Mobininejad, Islamic Azad University, Iran
Spatiotemporal Data Mining: Issues, Tasks And Applications [Pdf]
K.Venkateswara Rao1, A.Govardhan2 and K.V.Chalapati Rao2, 1CVR College of Engineering, Ibrahimpatnam RR District, India and 2JNTUH, India
Secure And Reliable Routing In Mobile Adhoc Networks [Pdf]
Rachid Haboub and Mohammed Ouzzif, ENSEM - ESTC - UH2C, Casablanca, Morocco
Watermarking Schemes For Copy Protection : A Survey [Pdf]
Dolley Shukla1 and Manisha Sharma2, 1Shri Shankaracharya College of Engineering & Technology, India and 2Bhilai Institute of Technology, India
A Survey On Detect - Discovering And Evaluating Trust Using Efficient Clustering Technique For Manets [Pdf]
K.Sudharson and N.Partheeban, S.A.Engineering College, India
Fault Based Techniques For Testing Boolean Expressions: A Survey [Pdf]
Usha Badhera, Purohit G.N and S.Taruna, Banasthali University, India
Graph Partitioning Advance Clustering Technique [Pdf]
T. Soni Madhulatha, Alluri Institute of Management Sciences, India
Segment Based Visual Cryptography For Key Distribution [Pdf]
Sesha Pallavi Indrakanti1 and Avadhani P S2, 1GVP Degree College, India and 2Andhra University College of Engineering, India
Secure Key Agreement And Authentication Protocols [Pdf]
B.Maheshwari, Alluri Institute of Management Sciences, India
Pattern Association For Character Recognition By Back-Propagation Algorithm Using Neural Network Approach [Pdf]
S.P.Kosbatwar and S.K.Pathan, Smt.Kashibai Navale College of Engineering, India