首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Computer Technology and Applications
ISSN Print: 2229-6093
ISSN Online:
主页:
http://www.ijcta.com
分享:
Go
Improvement of Performance of Mobile AD HOC Network using K- Path Splittable Traffic flow Scheme
Sushil Chandra Dimri
,
Kamlesh C. Purohit
,
Durgesh Pant
Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks
Hamed Jalali Qomi
,
Mohammad Hesam Tadayon
Survey on Visual backchannel for web events based on cloud computing
Santhosh.kola
,
SanjibkumarNayak
Transform Coefficient Histogram and Edge Preserving Image Enhancement Using Contrast Entropy
K. Sundar Srinivas
,
K. Naga Lakshmi Kalyani
Privacy Enhancing and Breach Reduction
SUSHMA RANI.N
,
TULASI PRASAD
,
PRASAD KAVITI
Fusion of Iris and Retina Using Rank-Level Fusion Approach
A. Kavitha
,
N. Radha
Four Field Motion Adaptive Deinterlacing Algorithm
S.Sreekanth
,
Y.Chakrapani
,
Sandeep Pasala
Trustworthy Computing under Identity-Based Encryption
Shabaaz Shaik
,
M.Srikanth Yadav
Segmentation Technique of SAR Imagery using Entropy
Debabrata Samanta
,
Mousumi Paul
,
,
Goutam Sanyal
Review of Solutions for securing the Vehicular Networks
Upasana Singh
,
Pardeep Singh
Enhanced EFCI Congestion Control Scheme for ATM Networks
M.Sreenivasulu
,
Dr. E.V. Prasad
,
Dr. G.S.S. Raju
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
Rajasekhar Mungara
,
K.VenkateswaraRao
,
VenkataSubbaReddy Pallamreddy
An Efficient Architecture of Residue to Binary Converter for New Four- Moduli Set
Sahel Riazi
,
SOMAYEH HASSANPOUR
,
MEHDI HOSSEINZADEH
A Study and Comparison of Automated Techniques for Exudate Detection Using Digital Fundus Images of Human Eye: A Review for Early Identification of Diabetic Retinopathy
M.Ramaswamy
,
D.Anitha
,
S.Priya Kuppamal
,
R.Sudha
An Appliance Approach: RTST to Reduce Cost & Time
Neeraj Kumar
,
Prof. (Dr.) Ajay Rana
Open source tools: Empowered the e-learning pedagogy in distance education
M. U. Bokhari
,
Iqrar Ahmad
Network Resilience through Multiple Routing Configurations
Naga Raju Pamidi
,
Y.Srinivasa Rao
A New Framework for improving low Quality Fingerprint Images
JitendraChoudhary
,
Dr.Sanjeev Sharma
,
Jitendra Singh Verma
Design of Multiuser CDMA Systems in Fading Channels
J. RAJESH
,
Prof. K ASHOK BABU
Heap Base Coordinator Finding with Fault Tolerant Method in Distributed Systems
Mehdi EffatParvar
,
AmirMasoud Rahmani
,
MohammadReza EffatParvar
,
Mehdi Dehghan
Proactive Secret Sharing Scheme for Mobile Ad-hoc Networks
Chauhan Gargi K
,
H. M. Diwanji
Fuzzy logic for Software Effort Estimation Using Polynomial Regression as Firing Interval
J.N.V.R Swarup Kumar
,
Aravind Mandala
,
M. Vishnu Chaitanya
,
G.V.S.N.R.V Prasad
Improving Quantitative Measurements using Different Segmentation Techniques for Satellite Images
K. Ravi Kumar
,
K. Kavindra Kumar
,
R.S.V.M.Krishna
,
P. K. Bharadwaj
Analysing Cognitive Radio Physical Layer on BER Performance over Rician Fading Channel
Amandeep Kaur Virk
,
Ajay K Sharma
Secure Digital signature scheme for Image authentication over wireless channels
K SriSwathi
,
S.Gopi Krishna
Spatial Intrusion of Mining
SarathChand P.V
,
Bhukya Shankar Nayak
,
Rambabu pemula
,
Nagamani K
Effect of Applied Magnetic Field on Pulsatile Flow of Blood in a Porous Channel
Sarfraz Ahmed
,
Dusmanta Kumar Sut
Analyzing performance of proactive and reactive routing protocols for Manets
Pakanati venkateswarao
,
B. Prasad
,
Dr. S.P.Setty
Gaussian higher Order Derivative based Structural Enhancement of Digital Bone X-Ray Images
Raka Kundu
,
Ratnesh Kumar
,
Biswajit Biswas
,
Amlan Chakrabarti
Non-linear Filter for Digital Image De-Noising
Ranjeet Kaur
,
P.S.Maan
A Review Of Various Attacks On Biometrics System And Their Known Solutions
Kamaldeep
A Proposed method for EDGE Detection of and Image Based on Self-Similarity Parameterisation by Fractal Coding
Sri Shimal Das
,
Dr. Dibyendu Ghoshal
The Partial Fuzzy Set
Dr. Pranita Goswami
Algorithm and Computational Complexity of Insulin-Amina acid Asn
Lutvo Kuric
A Multi-threaded Neural Network approach for Steganography
Srinivasan SP
Analysis of BER Degradation for Transmitted Downlink DSCDMA Signals
Ashok Ch
,
Murali Mohan K V
,
David Solomon Raju Y
Power Aware Live Migration for Data Centers in Cloud using Dynamic Threshold
Richa Sinha
,
Nidhi Purohit
,
Hiteshi Diwanji
A Computational Method for Solving Two Point Boundary Value Problems of Order Four
Yogesh Gupta
,
Pankaj Kumar Srivastava
Analysis of Frequent Item set Mining on Variant Datasets
Robin Singh Bhadoria
,
Rohit Bansal
,
Henry Alexander
Link Adaptation and Recursive Estimation for GPRS Wirless Networks
Swarna Kumari K
,
Prasanna S
,
David Solomon Raju Y
Performance Analysis of DYMO, LANMAR, STAR Routing Protocols for Grid Placement model with varying Network Size
Harish Shakywar
,
Sanjeev Sharma
,
Santoh Sahu
Reliable Software Development with Proposed Quality Oriented Software Testing Metrics
Latika Kharb
,
Dr. Vijay Singh Rathore
Congestion Control Avoidance in ADHOC Network using Queuing Model
G.Vijaya Lakshmi
,
Dr. C.Shoba Bindhu
Role of Metadata in Cyber forensic and status of Indian Cyber Law
Aashish Kumar Purohit
,
Naveen Hemrajani
,
Ruchi Dave
Spatial-Temporal Analysis of Residential Burglary Repeat Victimization: Case Study of Chennai City Promoters Apartments, INDIA
M.Vijaya Kumar
,
Dr .C.Chandrasekar
Information Security Using Blend of Steganography and Cryptography
Rajkumar Yadhav
Methods and Techniques to Protect the Privacy Information in Privacy Preservation Data Mining
N.Punitha
,
R.Amsaveni
Data Access by Data Intrusion
SarathChand P.V
,
VenuMadhav K
,
Mahendra Arya Bhanu
,
Rajalakshmi Selvaraj
Hardware Enhancement Association Rule with Privacy Preservation
Phani Ratna Sri Redipalli
,
G.Srinivasa Rao
Improvement in Software Development Process and Software Product through Knowledge Management
Rituraj Jain
Go