首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Computer Trends and Technology
ISSN Print: 2231-2803
ISSN Online:
主页:
http://www.ijcttjournal.org
分享:
Go
Performance Comparison Of Different Multi-Resolution Transforms For Image Fusion
Bapujee Uppada #1
,
G.Shankara BhaskaraRao
Infallible and upgradable Geo-environment based Multicasting protocol in MANETs
Sheba kunche
,
B. Hanmanthu
Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm
G.Devi
,
M.Pramod Kumar
A Study on Post mining of Association Rules Targeting User Interest
P. Sarala #1
,
S. Jayaprada *2
Evaluation of Teacher’s Performance Using Fuzzylogic Techniques
Sirigiri Pavani
,
P.V.S.S.Gangadhar
,
Kajal Kiran Gulhare
Analysis of VoIP Traffic with Multiple Packet Transfer
Tara Chand
,
Vishal Srivastava
Ray’s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices
Partha Pratim Ray
A Novel Approach for Supply chain In Distributed Networks Using Multi Echelon
SivaPothuRaju. V
,
Nalini. N
Efficient Techniques for Online Record Linkage
M.V.K.Kumar Varma
Dynamic Reconstruct for Network Photograph Exploration
T.Rajesh
,
A.Ravi
A Novel Datamining Based Approach for Remote Intrusion Detection
Renu Deepti.S
,
Loshma.G
RFID-Based Hospital Real Time Patient Management System
Nellipudi.Siva Rama Krishna Prasad 1
,
Arepalli Rajesh 2
Advance approach of solving real coded optimization problem using modified ABC algorithm with crossover operators of GA
Mrs. Shahana Gajala Qureshi
,
Mrs. Uzma Ansari
Monitor For Detection And Prevention Of Fake Agents
Sudheer Kumar Kotha
,
Ch.S.V.V.S.N.Murthy
Performance Analysis of Asynchronous Optical Burst Switching Networks
Nivedha.G
,
Reethi.S
Discovering Conditional Functional Dependencies
Swathi Mutyala
,
Aaluri Seenu
Efficacious Distributed Arbitrary Node Duplication Attacks in Wireless Networks
Sudheesha Cheepi
,
Venkata Sumanth Mareedu
,
Venkata Durga Kiran Kasula
Template Extraction from Heterogeneous Web Pages Using Text Clustering
T.L.N.Divya
,
G.Loshma
,
Dr. Nagaratna P Hegde
The Design Of Speech-Control Power Point Presentation Tool Using Arm7
P.Vishnu Kumar
,
Dr.T.JayaChandra Prasad
Remote Based Intelligent Video Surveillance System
Sahithi
,
Venkat Mutyalu
Nearest Neighbour Based Outlier Detection Techniques
Dr. Shuchita Upadhyaya
,
Karanjit Singh
A Novel SHA-1 approach in Database Security
Aarthi.G
,
Dr. E. Ramaraj
Simulation of File Arrivals and Departures on Buffer sizing in Access Routers
Sivasubramanyam Mopidevi
,
S Narayana
Transmutation of Regular Expression to Source Code Using Code Generators
Rashmi Sinha
,
Ashish Dewangan
New framework in Sensitive Rule Hiding
A.S. Naveenkumar
,
Dr. M. Punithavalli
Behavior Study of Web Users Using Two-Phase Utility Mining and Density Based Clustering Algorithms
K. Sirisha
,
D.N.V.S.L.S.Indira
,
M. V. Chakradhara Rao
A Overview of Point-based Rendering Techniques
Mandakini Kaushik
,
Kapil Kumar Nagwanshi
,
Dr. Lokesh Kumar Sharma
Reducing Network Intrusion Detection using Association rule and Classification algorithms
K.KEERTHI 1
,
P.SREENIVAS
Game Based Analysis of Distributed DoS Attacks Prevention Using Puzzle-Based Defense Strategy
Varsha Vishwanath
,
V.Shankar
Reduction Of Arithmetic Complexity Using Fast Walsh-Hadamard-Fourier Transform Algorithm
Chitra.C
,
Satyanarayana.D
A Survey on Dynamic Job Scheduling in Grid Environment Based on Heuristic Algorithms
D. Thilagavathi
,
Dr. Antony Selvadoss Thanamani
FPGA Based Area And Throughput Implementation of JH And BLAKE Hash Function
Vaibhav Doshi
,
Richa Arya
,
Rajesh Kumar Yadav
Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
Dr.D.Vasumathi
,
M.Surya Prakash Rao
,
M.Upendra Kumar
,
Dr.Y.Ramadevi
,
Dr.R.Rajeswara Rao
Web Mining Privacy using Advanced DSA – Spatial LBS Case Study
Dr.K.Venkateswar Rao
,
Dr.M.Sreenivasa Rao
Feature Extraction from web data using Artificial Neural Networks
1Manoj Kumar Sharma
,
2 Vishal Shrivastav
Estimation of Blocking Probabilities In A Cellular Network Which Is Prone To Dynamic Losses
Anuj Kumar
,
Shilpi Srivastav
,
Narendra Kumar and Alok Agarwal
Neural Network associated with recognition of Facial Expressions of Basic Emotions
Rehmat Khan
,
Rohit Raja
Comparative Study of Data Cluster Analysis for Microarray
Lokesh Kumar Sharma
,
Sourabh Rungta
Cost Estimation Tool for Commercial Software Development Industries
Manisha Arora
,
Richa Arya
,
Dinesh Tagra
,
Anil Saroliya
,
Varun Sharma
Study of Anomaly Identification Techniques in Large scale systems
K.Parvathi Devi
,
Y.A Siva Prasad
Secure Transmission Services in Wireless Networks using Key Trees
Geddam.Kiran Kumar
,
Prof K .V. Mutyalu
A Study on the Architecture for Text Categorization and Summarization
Suvidha
,
Ravikishan
Android Based Mobile Application Development And Its Security
Suhas Holla
,
Mahima M Katti
Secure Client Server Message Integrity Verification Using Robust Encrypted Technique
Madhuri Marey #1
,
Mr.M.Babu Rao #2
Implementation and Comparative Analysis between Different Precision Interval Arithmetic based Multiplication using Modified Array Method
Krutika Ranjankumar Bhagwat
,
Dr. Tejas V. Shah
,
Prof. Deepali H. Shah
Computation of the largest Eigenvalues using Power method and Gerschgorin circles method
T.D.Roopamala
,
S.K.Katti
Automatic Bus Recognition Through Mobile
S.Nagendram
,
Y.Harikrishna
High Utility Mining Algorithm for Preprocessed Web Data
Swapna Mallipeddi
,
D.N.V.S.L.S.Indira
Message Security over Image Communication
Dinesh Goyal
,
Vishal Srivastava
Survey on Computer Crime Scene Investigation Forensic Tools
Dr.A.S.N.Chakravarthy
,
T.V.Sarath Kumar
Go