| Detecting Faces According to their Pose |
|
Mohammad Mojtaba Keikhayfarzaneh, Javad Khalatbari, B. Somayeh Mousavi, Saeedeh Motamed |
|
Vol 4, No 1 (2011), Pagination: 1-9
|
ABSTRACT |
PDF
|
|
Abstract Views: 405 |
PDF Views: 4
|
| Different Methods for Statistical Face Representation-Review |
|
T. Syed Akheel, S. A. K. Jilani, K. Kanthamma |
|
Vol 4, No 1 (2011), Pagination: 11-28
|
ABSTRACT |
PDF
|
|
Abstract Views: 376 |
PDF Views: 2
|
| CIODD:Cluster Identification and Outlier Detection in Distributed Data |
|
Eena Gilhotra, Saroj Hiranwal |
|
Vol 4, No 1 (2011), Pagination: 29-39
|
ABSTRACT |
PDF
|
|
Abstract Views: 361 |
PDF Views: 0
|
| Basic Graphs Terminologies, Their Representation and Applications |
|
Vaibhav Shukla, Somnath Ghosh |
|
Vol 4, No 1 (2011), Pagination: 41-49
|
ABSTRACT |
PDF
|
|
Abstract Views: 389 |
PDF Views: 2
|
| Advanced Algorithmic Approach for IP Lookup (Ipv6) |
|
Pankaj Gupta, Deepak Jain, Nikhil Anthony, Pranav Gupta, Harsh Bhojwani, Uma Nagaraj |
|
Vol 4, No 1 (2011), Pagination: 51-58
|
ABSTRACT |
PDF
|
|
Abstract Views: 397 |
PDF Views: 4
|
| Implementing Power Saving Strategies in Wireless Sensor Networks Using IEEE 802.16e |
|
Pranali D. Tembhurne, R. K. Krishna, Ashish Jaiswal |
|
Vol 4, No 1 (2011), Pagination: 59-66
|
ABSTRACT |
PDF
|
|
Abstract Views: 399 |
PDF Views: 0
|
| Construction of High Performance Stream Ciphers for Text Web Browsers Using Adders |
|
Raj Kumar, V. K. Saraswat |
|
Vol 4, No 1 (2011), Pagination: 67-74
|
ABSTRACT |
PDF
|
|
Abstract Views: 387 |
PDF Views: 0
|
| Amalgam Version of Itinerant Augmented Reality |
|
Akhil Khare, Shashank Sharma, Sonali Goyal |
|
Vol 4, No 1 (2011), Pagination: 91-98
|
ABSTRACT |
PDF
|
|
Abstract Views: 375 |
PDF Views: 1
|
| A Hybrid Multi-Agent Routing Algorithm Based on Ant Colony Optimization for MANET |
|
V. K. Saraswat, Amit Singhal |
|
Vol 4, No 1 (2011), Pagination: 107-113
|
ABSTRACT |
PDF
|
|
Abstract Views: 470 |
PDF Views: 0
|
| A Comprehensive Study of Technologies and Trends Used in Latest Mobile Computing Environment |
|
Vaibhav Shukla, Som Nath Ghosh |
|
Vol 4, No 1 (2011), Pagination: 115-121
|
ABSTRACT |
PDF
|
|
Abstract Views: 503 |
PDF Views: 0
|
| Wireless Sensor Network for Monitoring a Patient having Hole in the Heart Continuously Using Zigbee |
|
P. Ramanathan, Pradip Manjrekar |
|
Vol 4, No 1 (2011), Pagination: 123-128
|
ABSTRACT |
PDF
|
|
Abstract Views: 376 |
PDF Views: 2
|
| A Concept of File Deletion and Restoration as A Threat to Commit Cyber Crime |
|
Anisha Kumar |
|
Vol 4, No 1 (2011), Pagination: 129-134
|
ABSTRACT |
PDF
|
|
Abstract Views: 480 |
PDF Views: 0
|
| Reliability Through Simulation:Goals and Limitations |
|
S. M. K. Quadri, Aasia Quyoum |
|
Vol 4, No 1 (2011), Pagination: 135-140
|
ABSTRACT |
PDF
|
|
Abstract Views: 347 |
PDF Views: 2
|
| Secure Watermarking Technique for Emerging Clouds |
|
R. Vinoth, S. Sivasankar |
|
Vol 4, No 1 (2011), Pagination: 141-146
|
ABSTRACT |
PDF
|
|
Abstract Views: 391 |
PDF Views: 8
|
| Using TINI Point-to-Point Protocol (PPP) |
|
Sagar Shankarrao Shillewar |
|
Vol 4, No 1 (2011), Pagination: 153-158
|
ABSTRACT |
PDF
|
|
Abstract Views: 376 |
PDF Views: 2
|
| A Compression Method for PML Document Based on Internet of Things |
|
Jamal Mohammad Aqib |
|
Vol 4, No 1 (2011), Pagination: 159-164
|
ABSTRACT |
PDF
|
|
Abstract Views: 484 |
PDF Views: 0
|
| Speech Enhancement Using Neural Network |
|
Syed Minhaj Ali, Bhavna Gupta |
|
Vol 4, No 1 (2011), Pagination: 165-169
|
ABSTRACT |
PDF
|
|
Abstract Views: 363 |
PDF Views: 1
|
| Consumer Awareness to Protect Internet Users-A Scenario |
|
P. Srinivas |
|
Vol 4, No 1 (2011), Pagination: 171-175
|
ABSTRACT |
PDF
|
|
Abstract Views: 377 |
PDF Views: 2
|
| A Comprehensive Study to Reduce Traffic Accidents Using Fuzzy Logic Approach |
|
Somnath Ghosh |
|
Vol 4, No 1 (2011), Pagination: 177-181
|
ABSTRACT |
PDF
|
|
Abstract Views: 511 |
PDF Views: 2
|
| Software Evaluation for Developing Software Reliability and Metrics |
|
Sri Pammi Srinivas |
|
Vol 4, No 1 (2011), Pagination: 183-187
|
ABSTRACT |
PDF
|
|
Abstract Views: 349 |
PDF Views: 0
|
| Enhancing Data Security by Using Crypto-Steganography in Image |
|
Ajay Gadicha, V. T. Ingole, Amit Manikrao |
|
Vol 4, No 1 (2011), Pagination: 189-193
|
ABSTRACT |
PDF
|
|
Abstract Views: 327 |
PDF Views: 2
|
| Hybrid Multi Resolution Method of Image Fusion for Medical Image Processing |
|
P. Selvaperumal |
|
Vol 4, No 1 (2011), Pagination: 195-199
|
ABSTRACT |
PDF
|
|
Abstract Views: 348 |
PDF Views: 4
|
| Design and Analysis of New Software Conformance Testing:NA Mutation Testing |
|
Naveen Tyagi, Ashish Chaturvedi |
|
Vol 4, No 1 (2011), Pagination: 201-204
|
ABSTRACT |
PDF
|
|
Abstract Views: 362 |
PDF Views: 0
|
| Feasibility and Importance of Wireless Intelligent Network (WIN) |
|
Tariq Ahamad |
|
Vol 4, No 1 (2011), Pagination: 205-208
|
ABSTRACT |
PDF
|
|
Abstract Views: 339 |
PDF Views: 0
|
| Cyber Crime Effecting E-Commerce Technology |
|
N. Leena |
|
Vol 4, No 1 (2011), Pagination: 209-212
|
ABSTRACT |
PDF
|
|
Abstract Views: 356 |
PDF Views: 0
|
| The Influence of Pseudorandom Communication on Complexity Theory |
|
Roohi Ali, Sana Iqbal |
|
Vol 4, No 1 (2011), Pagination: 213-216
|
ABSTRACT |
PDF
|
|
Abstract Views: 312 |
PDF Views: 2
|
| Reconstruction of A Binary Search Tree from Its Preorder Tree Traversal With The Unique Non-Recursive Approach |
|
Manoj C. Lohani, Upendra S. Aswal, Ramesh S. Rawat |
|
Vol 4, No 1 (2011), Pagination: 217-219
|
ABSTRACT |
PDF
|
|
Abstract Views: 315 |
PDF Views: 0
|
| Fixed Point Theorems for Multivalued Mappings Satisfying Functional Inequality |
|
Hema Yadav, Shoyeb Ali Sayyed, V. H. Badshah |
|
Vol 4, No 1 (2011), Pagination: 221-223
|
ABSTRACT |
PDF
|
|
Abstract Views: 326 |
PDF Views: 2
|
| An Initiation of Dynamic Programming to Solve the Graphical As Well As Network Problems for the Minimum Path Between Nodes |
|
Manish Jain, Adarsh Srivastava, Anand Kumar Dixit, Somnath Ghosh |
|
Vol 4, No 1 (2011), Pagination: 225-227
|
ABSTRACT |
PDF
|
|
Abstract Views: 310 |
PDF Views: 2
|