Categories

Full-Text AvailableAbstract Only

Show:
Sort By:
       251. Academic Coding Guideline Model OCG - Open Coding Guidelines For Windows (An Organized Code Creation Model)
Hareesh Gu and Sanjay Kumar Dubey
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       252. Automatic Line Scratch Detection and Removal in Digitized Film Sequence
Amit Bankar and B S Borkar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       253. Design of memory controller based on AMBA AHB protocol
Jayapraveen.D and T.Geetha Priya
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       254. Dynamic allocation and parallel optimization theory in Sharon – nephele cloud
D.C. Joy Winnie Wise and T. Shantha Kumar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       255. Remote Learning: Android Operated Educational Robot Arm with 6 DOF
Neerparaj Rai, Bijay Rai and Pooja Rai
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       256. Securing AODV against worm hole attack using token based approach
Rashmi Mishra, Gopal Gupta and Mohit Kumar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       257. A medical image encryption and decryption approach using chaos and LSB
I. Bremnavas, B.Poorna and G.R.Kanagachidambaresan
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       258. Off-line Human Signature Recognition System Based on Histogram Analysis using MATLAB
Liton Devnath and Rafiqul Islam
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       259. Optimizing the QoS evaluation in service based systems
T.Priyaradhikadevi and S. Parvathi
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       260. Secure chaotic modulation schemes using henon map
Dikshith Anchan and K.L.Sudha
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology