A Survey of Wireless Sensor Network Architectures Almir Davis and Hwa Chang,Tufts University, USA
Techniques and Methodologies for Recognition of Tamil Typewritten and Handwritten Characters: A Survey C P Sumathi and S Karpagavalli, S. D. N. B Vaishnav College for Women, India
Challenges and Weaknesses of Agile Method in Enterprise Architecture Zahra Askarinejad Amiri, Staffordshire University, UK
Automatic Facial Expression Analysis A Survey C. P. Sumathi1, T. Santhanam2 and M. Mahadevi1, 1SDNB Vaishnav College for Women, India and 2DG Vaishnav College for Men, India
Regression Models for 2-Dimensional Cartesian Coordinates Prediction: A Case study at University of Mines and Technology (UMaT), Tarkwa-Ghana. Yao Yevenyo Ziggah1, Hu Youjian1, Christian Odutola Amans1, Bernard Kumi-Boateng2, 1China University of Geosciences,
Wuhan-P.R.China and 2University of Mines and Technology, Ghana
LED-ID System: Coverage And Fast Link Recovery Technique
Muhammad Shahin Uddin1, Mst. Nargis Aktar1 and Yeong Min Jang2, 1Mawlana Bhashani Science and Technology University, Bangladesh and 2Kookmin University, South Korea
Assessments Of Different Speeded Up Robust Features (SURF) Algorithm Resolution For Pose Estimation Of UAV
Bassem Sheta1, Mohamed Elhabiby2 and Naser El-Sheimy21University of Calgary, Canada and 2Ain Shams University, Egypt
Survey On Scheduling And Allocation In High Level Synthesis
M. Chinnadurai1 and M. Joseph2,1EGS Pillay Engineering College, India and 2Mother Teresa College of Engineering & Technology, India
DVR-Based Manet Routing Protocols Taxonomy
Mrinal Kanti Debbarma1, Santanu Kumar Sen2 and Sudipta Roy1, 1Triguna Sen School of Technology, India and 2Guru Nanak Institute of Technology, India
Second Generation Curvelet Transforms Vs Wavelet transforms and Canny Edge Detector for Edge Detection from WorldView-2 data
Mohamed Elhabiby, Ahmed Elsharkawy and Naser El-Sheimy , University of Calgary,Alberta
Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems
Hossein Jadidoleslamy,The University of Guilan, Iran
A Survey On Various Approaches of Text Extraction in Images
C. P. Sumathi1, T. Santhanam2 and G. Gayathri Devi1, 1SDNB Vaishnav College for Women, India and 2DG Vaishnav College for Men, India
Hybrid Technique For Knowledge Representation & A Comparative Study
Poonam Tanwar 1, T. V. Prasad1, Kamlesh Datta2, 1 Lingaya's University, India and 2National Institute of Technology, India
A Survey on Terrorist Network Mining: Current Trends and Opportunities Nisha Chaurasia, Mradul Dhakar, Akhilesh Tiwari and R. K. Gupta, MITS Gwalior, India
Computer-Aided Diagnosis of Thyroid Nodule: A Review Deepika Koundal, Savita Gupta and Sukhwinder Singh, Panjab University, India
Web Search Result Clustering- A Review Kishwar Sadaf and Mansaf Alam, Jamia MIllia Islamia, India
A Survey on Target Tracking Techniques in Wireless Sensor Networks K. Ramya, K. Praveen Kumar, and V. Srinivas Rao,VR Siddhartha Engineering College, India
Security In Wireless Sensor Networks - Improving The LEAP Protocol
Delan Alsoufi, Khaled Elleithy, Tariq Abuzaghleh and Ahmad Nassar, University of Bridgeport, USA
Cross Layer Protocols For Multimedia Transmission In Wireless Networks
Santhosha Rao and Kumara Shama, Manipal University, India
Complete Synchronization Of Hyperchaotic Xu And Hyperchaotic Lu Systems Via Active Control
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India
A Survey Of Dimensionality Reduction And Classification Methods
Nebu Varghese, Vinay Verghese, Gayathri. P and N. Jaisankar, VIT University, India
A Survey Of Sql Injection Countermeasures
R.P.Mahapatra and Subi Khan, SRM University, India
The necessities for building a model to evaluate Business Intelligence projects- Literature Rev
Vahid Farrokhi and Laszlo Pokoradi, University of Debrecen, Hungary
Energy Efficient Recognition Protocol for Ad Hoc Networks
Taresh Singh1 and S Qamar2,1 College of Engineering Roorkee, India and 2 SRM University, NCR Campus Modinagar (U. p.)- India
The Study On Load Balancing Strategies In Distributed Computing System
Md. Firoj Ali and Rafiqul Zaman Khan, Aligarh Muslim University, India
The Proposal Of Hybrid Intrusion Detection For Defence Of Sync Flood Attack In Wireless Sensor Network
Ruchi Bhatnagar and Udai Shankar , IIMT Engineering College, India
Error Analysis of 3D Polygonal Model:A Survey
Devendra Singh Rajput1 and R Rama Kishore2, 1CSC India Pvt. Ltd. , India and 2 USIT, GGS Indraprastha University, India
Single Image Improvement using Superresolution
Shwetambari Shinde and Meeta Dewangan, CSIT-Bhilai,India
Nymble Blocking System
Anand Joshi, Arshiya Shaikh, Aruna Kadam and Vasudha Sahu, MAE Alandi (D), India
Inclusion Of Road Network In The Spatial Database For Features Searching Using Dynamic Index
S. Sivasubramanian and M.Samundeeswari, Bharath University , India
Performance Analysis of Coiflet-type Wavelets for a Fingerprint Image Compression by Using Wavelet and Wavelet Packet Transform
Md. Rafiqul Islam1, Farhad Bulbul1 and Shewli Shamim Shanta2, 1Khulna University, Bangladesh and 2Rajshahi University, Bangladesh
Adopting E-Commerce To User's Needs
Mohammad Alshehri1, Hamza Aldabbas1, James Sawle1 and Mai Abu Baqar 2, 1De Montfort University, United Kingdom and 2Albalqa Applied University, Jordon
A comparative study analysis of materialized view
for selection cost T.Nalini, A.Kumaravel and K.Rangarajan, Bharath University, India
Energy Saving in Wireless Sensor Networks Zahra Rezaei and Shima Mobininejad, Islamic Azad University, Iran
Spatiotemporal Data Mining: Issues, Tasks
And Applications
K.Venkateswara Rao1, A.Govardhan2 and K.V.Chalapati Rao2, 1CVR College of Engineering,
Ibrahimpatnam RR District, India and 2JNTUH, India
Secure And Reliable Routing In Mobile Adhoc
Networks Rachid Haboub and Mohammed Ouzzif, ENSEM - ESTC - UH2C, Casablanca, Morocco
Watermarking Schemes For Copy
Protection : A Survey
Dolley Shukla1 and Manisha Sharma2, 1 Shri Shankaracharya College of Engineering & Technology, India and 2Bhilai Institute of Technology, India
A Survey On Detect - Discovering And
Evaluating Trust Using Efficient
Clustering Technique For Manets
K.Sudharson and N.Partheeban, S.A.Engineering College, India
Fault Based Techniques For Testing
Boolean Expressions: A Survey
Usha Badhera, Purohit G.N and S.Taruna, Banasthali University, India
Graph Partitioning
Advance Clustering Technique
T. Soni Madhulatha, Alluri Institute of Management Sciences, India
Segment Based Visual Cryptography For Key
Distribution
Sesha Pallavi Indrakanti1 and Avadhani P S2, 1 GVP Degree College, India and 2 Andhra University College of Engineering, India
Secure Key Agreement And Authentication
Protocols
B.Maheshwari, Alluri Institute of Management Sciences, India
Pattern Association For Character Recognition By
Back-Propagation Algorithm Using Neural
Network Approach
S.P.Kosbatwar and S.K.Pathan, Smt.Kashibai Navale College of Engineering, India