Categories

Full-Text AvailableAbstract Only

Show:
Sort By:
       231. A modified RSA cryptosystem based on ‘n’ prime numbers
B.Persis Urbana Ivy, Purshotam Mandiwal and Mukesh Kumar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       232. Active operation based edit distance for duplicate detection
A.Venkatesh Kumar and G. Rajendran
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       233. Delay Time Analysis and Energy Consumption Issues in Short Range Wireless Transaction System
Kamani Krunal Kumar C and Kathiriya Dhaval R
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       234. Designing web services communities with UML oriented agents
Hela Limam and Jalel Akaichi
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       235. Enforcing socially selfish awareness routing among users
S.Lavanya and R.Ramya
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       236. Face detection and recognition system in bank robbery using CFV modules based on video recordings
C. JayaMohan, M. Saravana Deepak, M.L. Alphin Ezhil Manuel and D.C Joy Winnie Wise
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       237. On the realization of a secure, high capacity data embedding technique using joint top-down and down- top embedding approach
Shabir A. Parah, Javaid A. Sheikh and G.M. Bhat
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       238. Text dependent writer identification using support vector machine
Saranya K and Vijaya MS
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       239. Variation of the Convergence Speed on Basis of the Local Search Method Used in a Memetic Algorithm. Applying to the Scheduling Tasks Problem
B.Selma and S.Chouraqui
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       240. A correlation based fuzzy model for network intrusion detection
E.R.Naganathan and S.Sethuramalingam
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology