Vol 3, No 5 (2011)

Table of Contents

Vol 3, No 5 (2011)

Open Access Open Access  Restricted Access Subscription Access

Articles

Evolution in the Area of Smart Load Frequency Control Using Passino Technique
Sushil Prashar, Gagandeep Sharma
DOI:10.36039/ciitaas/3/5/2011/106952.220-225 ,  Vol 3, No 5 (2011), Pagination: 220-225
ABSTRACT |  PDF     Abstract Views: 230  |  PDF Views: 1
Non Stop Automatic Toll Collection System
S. Joshi, P. Pardeshi, S. Meshram, P. Kengale, D. Patil
DOI:10.36039/ciitaas/3/5/2011/106957.226-230 ,  Vol 3, No 5 (2011), Pagination: 226-230
ABSTRACT |  PDF     Abstract Views: 213  |  PDF Views: 1
Computation of Posterior Mode for Location Parameter and Conditional Expectation for Scale Parameter of Normal Sequence
G. Venkatesan, E. Nathiya
DOI:10.36039/ciitaas/3/5/2011/106960.231-237 ,  Vol 3, No 5 (2011), Pagination: 231-237
ABSTRACT |  PDF     Abstract Views: 214  |  PDF Views: 1
A Novel Approach Based On Pattern Discovery and Supervised Learning to Identify Comparative Sentences
T. Viveka
DOI:10.36039/ciitaas/3/5/2011/106964.238-246 ,  Vol 3, No 5 (2011), Pagination: 238-246
ABSTRACT |  PDF     Abstract Views: 390  |  PDF Views: 4
Super Resolution of the Image by Sparse Bayesion Method
B. Bharathikannan, S. Nithyanandam
DOI:10.36039/ciitaas/3/5/2011/106973.247-251 ,  Vol 3, No 5 (2011), Pagination: 247-251
ABSTRACT |  PDF     Abstract Views: 195  |  PDF Views: 1
Check Pointing Arrangement in Mobile Grid Computing
M. B. Bose, K. Ganagavalli, P. Gitanjali, S. Rajasree
DOI:10.36039/ciitaas/3/5/2011/106974.252-254 ,  Vol 3, No 5 (2011), Pagination: 252-254
ABSTRACT |  PDF     Abstract Views: 207  |  PDF Views: 1
Computing the Activity of Connecting Computers in Network Security
K. Sekar, K. Thangadurai
DOI:10.36039/ciitaas/3/5/2011/106975.255-259 ,  Vol 3, No 5 (2011), Pagination: 255-259
ABSTRACT |  PDF     Abstract Views: 203  |  PDF Views: 3