Vol 8, No 2 (2015)

Table of Contents

Vol 8, No 2 (2015)

Articles

A Flexible Conceptual Framework for Supporting Collaborative Work
Aiman Turani
 Vol 8, No 2 (2015), Pagination: 92-98
ABSTRACT |  PDF Abstract Views: 238  |  PDF Views: 0
Empirically Implementation Adaboost to Solve Ambiguity
Boshra F. Zopon AL Bayaty, Shashank Joshi
 Vol 8, No 2 (2015), Pagination: 99-102
ABSTRACT |  PDF Abstract Views: 162  |  PDF Views: 3
Enabling New Generation Security Paradigm With Quantum Cryptography
T. Venkat Narayana Rao, Maithreyi Simhachalam, Smitha Bandyala, B. Vasundara Devi
 Vol 8, No 2 (2015), Pagination: 103-109
ABSTRACT |  PDF Abstract Views: 166  |  PDF Views: 1
Various Techniques of DDoS Attacks Detection and Prevention at Cloud: A Survey
Dalima Parwani, Amit Dutta, Piyush Kumar Shukla, Meenu Tahiliyani
 Vol 8, No 2 (2015), Pagination: 110-120
ABSTRACT |  PDF Abstract Views: 145  |  PDF Views: 0
New Era of Effective Web Designing Technology using HTML 5
Chetan R. Dudhagara, Ashish P. Joshi, Hasamukh B. Patel
 Vol 8, No 2 (2015), Pagination: 121-123
ABSTRACT |  PDF Abstract Views: 165  |  PDF Views: 19
Website Injection for Fraudulent Activities and Ways to Combat
T. Venkat Narayana Rao, Jella Shruthi, Thakkallapally Sneha
 Vol 8, No 2 (2015), Pagination: 124-130
ABSTRACT |  PDF Abstract Views: 166  |  PDF Views: 0
Computational Approach in Complex Structure Prediction for Drug Design Activity
Chetan R. Dudhagara, Ashish P. Joshi, Mayur Patel
 Vol 8, No 2 (2015), Pagination: 131-136
ABSTRACT |  PDF Abstract Views: 173  |  PDF Views: 0
Traffic Sign Symbol Recognition Using Single Dimension PCA
Shashidhar T. Halakatti, Shambulinga T. Halakatti
 Vol 8, No 2 (2015), Pagination: 137-141
ABSTRACT |  PDF Abstract Views: 161  |  PDF Views: 1
A Novel Approach To Group Research Proposal and Allocate the Research Reviewer by Using Text-Mining and Clustering
Geeta Dangar, Vipul Vekariya, Daxa Vekariya
 Vol 8, No 2 (2015), Pagination: 142-145
ABSTRACT |  PDF Abstract Views: 174  |  PDF Views: 4
A Robust DCT Based Digital Image Watermarking Using Fusion of Computational Intelligence Techniques
Monika Patel, Priti Srinivas Sajja
 Vol 8, No 2 (2015), Pagination: 146-153
ABSTRACT |  PDF Abstract Views: 152  |  PDF Views: 3
Traceability of Implementation to Design and Requirements Specifications: A Formal Technical Review Method (Reverse Engineering Tool)
Rashmi Yadav, Ravindra Patel, Abhay Kothari
 Vol 8, No 2 (2015), Pagination: 154-163
ABSTRACT |  PDF Abstract Views: 139  |  PDF Views: 4
An Emerging Trend of Big data for High Volume and Varieties of Data to Search of Agricultural Data
Parag Shukla, Bankim Radadiya, Kishor Atkotiya
 Vol 8, No 2 (2015), Pagination: 164-169
ABSTRACT |  PDF Abstract Views: 150  |  PDF Views: 1
Root to Fruit (3): A Framework to Manage Knowledge about Sorting Algorithms
Pramod Kadam, Sachin Kadam
 Vol 8, No 2 (2015), Pagination: 170-175
ABSTRACT |  PDF Abstract Views: 156  |  PDF Views: 2