Scope & Topics      Editorial Board      Current Issue      Archives      Paper Submission      Indexing      Special Issue      Contact Us      AIRCC




Journal Home

AIRCC





November 2011, Volume 2, Number 6

Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development[ pdf ]
Ava Clare Marie O. Robles, Mindanao State University, Philippines

A New Algorithm For Cell Tracking Technique [ pdf ]
Ashraf A. Aly1, Safaai Bin Deris1 and Nazar Zaki2, 1Universiti Teknologi, Malaysia and 2UAE University, UAE

Improving Text Categorization By Using A Topic Model [ pdf ]
Wongkot Sriurai, Ubon Ratchathani University, Thailand

Cyclic Combination Method For Digital Image Steganography With Uniform Distribution Of Message [ pdf ]
Rajkumar Yadav, Ravi Saini and Kamaldeep, Maharshi Dayanand University, India

Design, Implementation And Characterization Of Xor Phase Detector For Dpll In 45 Nm Cmos Technology [ pdf ]
Delvadiya Harikrushna I, Mukesh Tiwari, Jay Karan Singh and Anubhuti Khare, Sri Satya Sai Institute of Science & Technology, India

Controlling The Problem Of Bloating Using Stepwise Crossover And Double Mutation Technique[ pdf ]
Arpit Bhardwaj, Aditi Sakalle, Harshita Chouhan and Harshit Bhardwaj, RGPV India

The Expert System Designed To Improve Customer Satisfaction[ pdf ]
P.Isakki alias Devi1 and S.P.Rajagopalan2, 1Vels University, India and 2GKM College of Engineering & Technology, India

Optimized Performance With Process Chains[ pdf ]
M. Victoria Hebseeba1 and Dr. T. Bhaskara Reddy2, 1 Rayalaseema University, India and 2 S.K. University, India

Computation Of Transformer Losses Under The Effects Of Non-Sinusoidal Currents[ pdf ]
Amit Gupta and Ranjana Singh, Jabalpur Engineering College, India

Prospective benefits and criticalities of applying Semantic Web techniques in Software Engineering[ pdf ]
Harvinder, Galgotias College of Engineering and Technology, India

Multi-Touch Screen Interfaces And Gesture Analysis: A Study[ pdf ]
Mrudula Nimbarte, B. D. C. O. E. Sevagram, India

A Novel Approach For Pass Word Authentication Using Bidirectional Associative Memory[ pdf ]
A S N Chakravarthy1 , Penmetsa V Krishna Raja 2 , and P S Avadhani3, 1 Sri Aditya Engineering College, India , 2 JNTUK,India and 1 Andhra University, India

Using Triangular Function To Improve Size Of Population In Quantum Evolution Algorithm For Fractal Image Compression[ pdf ]
Amin Qorbani1, Ali Nodehi1 and Saeed Nodehi2, 1 Islamic Azad University and 2 Mirdamad University

Overview Of Streaming-Data Algorithms[ pdf ]
T. Soni Madhulatha, Alluri Institute of Management Sciences, India

Empirical Studies On Machine Learning Based Text Classification Algorithms[ pdf ]
Shweta C. Dharmadhikari1, Maya Ingle2 and Parag Kulkarni1, 1 EkLat Solutions Pune,India and 2 IIST,India

Fingerprint Image Enhancement By Develop Mehtre Technique[ pdf ]
Mustafa Salah Khalefa1, Zaid Amin Abduljabar1 and Huda Ameer Zeki2, 1Basra University, Iraq and 2 Shatt Al-arab University College, Iraq

Neural networks approach v/s Algorithmic approach : A study through pattern recognition[ pdf ]
Namrata Aneja, Dyal Singh College, India

September 2011, Volume 2, Number 5

Adaptive Data Stream Management System Using Learning Automata[ pdf ]
Shirin Mohammadi1, Ali A. Safaei1, Fatemeh Abdi2 and Mostafa S. Haghjoo4, 1Iran University of Science and Technology, Tehran, Iran and 2Islamic Azad University, Babol, Iran

Pre-Processing Of Medical Documents And Reducing Dimensionality[ pdf ]
S.Sagar Imambi1 and T.Sudha2, 1TJPS college , India and 2Vikram Simhapuri University , India

Analysis Of Spiht Algorithm For Satellite Image Compression[ pdf ]
K Nagamani and AG Ananth, R V College of Engineering, India

Cross Lingual Information Retrieval With SMT And Query Mining[ pdf ]
Suneet Kumar Gupta , Amit Sinha and Mradul Jain, ABES Engineering College, India

Enterprise Integration Using Service Oriented Architecture[ pdf ]
Oldooz karimi and Nasser modiri, Azad University,Branch Sofiyian sofiyian, Iran

July 2011, Volume 2, Number 4

The Effects on Cells Mobility Due to Exposure to EMF Radiation[ pdf ]
Ashraf A. Aly1, Safaai Bin Deris1 and Nazar Zaki2, 1Universiti Teknologi Malaysia, Malaysia and 2UAE University, UAE

Transport Layer Protocols Taxonomy From Voice Over Ip Perspective [ pdf ]
Mosleh M. Abu-Alhaj, Ahmed Manasrah, Mahmoud Baklizi and Nibras, Universiti Sains Malaysia, Malaysia

Time complexity analysis of genetic- fuzzy system for disease diagnosis.[ pdf ]
Ephzibah.E.P, VIT University, India.

A Novel Approach For Authenticating Textual Or Graphical Passwords Using Hopfield Neural Network [ pdf ]
ASN Chakravarthy, P S Avadhani, P. E. S. N Krishna Prasad, N.Rajeev and D.Rajasekhar reddy, Sri Sai Aditya Institute of Science and Technology, Surampalem, India

Security Model For Service-Oriented Architecture [ pdf ]
Oldooz Karimi, sofiyan Azad University, Iran,

May 2011, Volume 2, Number 3

A Novel Image Segmentation Enhancement Technique Based on Active Contour and Topological Alignments [ pdf ]
Ashraf A. Aly1, Safaai Bin Deris1 and Nazar Zaki2, 1Universiti Teknologi, Malaysia and 2UAE University, UAE

Power Management During Scan Based Sequential Circuit Testing [ pdf ]
Reshma.P and M.Geetha Priya, Amrita Vishwa Vidyapeetham University, India

Development of Mechanism for Enhancing Data Security in Quantum Cryptography [ pdf ]
Ajit Singh and Nidhi Sharma, BPS Mahila Vishwavidyalaya, India

March 2011, Volume 2, Number 2

Insider Threat Analysis of Case Based System Dynamics [ pdf ]
Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China

New Results on the Output Regulation of the Modified Arneodo Chaotic System by State Feedback Control [ pdf ]
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India

Spam Detection By Stackelberg Game [ pdf ]
Alireza Naeimi Sadigh, Sattar Hashemi and Ali Hamzeh, Shiraz University, Iran

Energy Efficient Coverage Problems in Wireless Ad Hoc Sensor Networks [ pdf ]
D.G.Anand1, H.G.Chandrakanth1 and M.N.Giriprasad2, 1Sri Krishna Institute of Technology, India and 2Jawaharlal Nehru Technological University College of Engineering, India

Medical Image Denoising Using Adaptive Threshold Based on Contourlet Transform [ pdf ]
S.Satheesh1 and KVSVR Prasad2, 1G.Narayanamma Institute of Technology and Science, India and 2D.M.S.S.V.H. College of Engineering, India

Application of Threshold Techniques for Readability Improvement of Jawi Historical Manuscript Images [ pdf ]
Hafizan Mat Som1, Jasni Mohamad Zain2 and Amzari Jihadi Ghazali3, 1IKIP International College Taman Gelora, Malaysia, 2University Malaysia Pahang, Malaysia and 3Kolej Profesional Mara Indera Mahkota, Malaysia

Computerized Shape Analysis of Erythrocytes and Their Formed Aggregates in Patients Infected With P.Vivax Malaria [ pdf ]
R.Renuka Devi1, V.Rajagopal2, M.Senthil kumar1 and G.Magesh1, 1VIT University, India and 2Zonal Entomological Team - Vellore, India

Employing Reverse Polish Notation in Encryption [ pdf ]
S.S. Dhenakaran, Alagappa University, India

January 2011, Volume 2, Number 1

Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms [ pdf ]
Xu-Ren Luo1, Chen-Hui Jerry Lin1 and Te-Lung Yi2, 1National Defense University, Republic of China and
2China University of Technology, Republic of China


QoS Based User Driven Scheduler for Grid Environment [ pdf ]
Sanjay Patel1 and Madhuri Bhavsar2, 1SVBIT - Gandhinagar, India and 2Nirma University, India

     




Home
Forth Coming papers
Archives
2011 volume 2, Number 6
2011 volume 2, Number 5
2011 volume 2, Number 4
2011 volume 2, Number 3
2011 volume 2, Number 2
2011 volume 2, Number 1
2010 volume 1

® 2013 AIRCC Publishing Corporation