Categories

Full-Text AvailableAbstract Only

Show:
Sort By:
       241. Enforcing socially selfish awareness routing among users
S.Lavanya and R.Ramya
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       242. Face detection and recognition system in bank robbery using CFV modules based on video recordings
C. JayaMohan, M. Saravana Deepak, M.L. Alphin Ezhil Manuel and D.C Joy Winnie Wise
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       243. On the realization of a secure, high capacity data embedding technique using joint top-down and down- top embedding approach
Shabir A. Parah, Javaid A. Sheikh and G.M. Bhat
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       244. Text dependent writer identification using support vector machine
Saranya K and Vijaya MS
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       245. Variation of the Convergence Speed on Basis of the Local Search Method Used in a Memetic Algorithm. Applying to the Scheduling Tasks Problem
B.Selma and S.Chouraqui
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       246. A correlation based fuzzy model for network intrusion detection
E.R.Naganathan and S.Sethuramalingam
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       247. Learning-based compiler level optimization of branching statement layout using execution patterns and dynamic code reordering
Sarath Chandran, K.R., Tesslyn Antony, Sruti and S.Mathuri, G
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       248. Singular Value Decomposition (SVD) Before Covariance Based PCA for Image De-noising
Md. Mosaddik Hasan, Md.Shakhawat Hossain and Biswajit Bala
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       249. An approach to Handle Man in Middle Attack in Cluster based Architecture
Avinash Jethi and Seema
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       250. Effect of investment in information technology system on providing desired services of accounting information system
Hassan Mohammadzadeh Moghadam, Mustafa Akhavansaffar, Zohreh Bakhshaei and Seyed Valiollah MirHosseini
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology