Volumen 2, Ausgabe 4 (2011)

Forschungsartikel

A CHALLENGE IN HIDING ENCRYPTED MESSAGE IN LSB AND LSB+1 BIT POSITIONS IN VARIOUS Cover Files

  • Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath

Forschungsartikel

EVENT DRIVEN DATA INTEGRATION AN ANALYSIS

  • Rajeshkumar Myilsamy

Forschungsartikel

HETEROGENEOUS PROTOCOLS FOR INCREASING LIFETIME OF WIRELESS SENSOR NETWORKS

  • Samayveer Singh, A K Chauhan, Sanjeev Raghav, Vikas Tyagi, Sherish Johri

Forschungsartikel

IMAGE HIDING IN DNA SEQUENCE USING ARITHMETIC ENCODING

  • Prof. Samir Kumar Bandyopadhyay and Mr. Suman Chakraborty

Forschungsartikel

IMPACT OF IMAGE RESIZING FACTOR IN FACE RECOGNITION SYSTEM USING PCA

  • Y. Vijaya lata and dr. A. Govardhan

Forschungsartikel

BRAIN TUMOR SEGMENTATION AND QUANTIFICATION FROM MRI OF BRAIN

  • Sudipta Roy,Atanu Saha and Prof. Samir K. Bandyopadhyay

Forschungsartikel

MODEL BASED TESTING CONSIDERING STEPS, LEVELS, TOOLS & STANDARDS OF SOFTWARE QUALITY

  • Sanjeev Dhawan, Nirmal Kumar and Shiva Saini

Forschungsartikel

COSMETIC SURGERY FOR AGING EFFECTS ON FACE IMAGES-A PROPOSED METHOD

  • Prof. Samir K. Bandyopadhyay

Forschungsartikel

METHOD FOR BLOOD CELL SEGMENTATION

  • Prof. Samir K. Bandyopadhyay

Forschungsartikel

AUTONOMOUS MOBILE ROBOTS DESIGNING

  • Dr. V. M. Murthy (Director), Sushil Kumar, Vedpal Singh, Nitin Kumar and Chander Sain

Forschungsartikel

Transmission of Large Information through KAP Using Non-Abelian Group

  • Abhishek Dwivedi, Deo Brat Ojha, Ajay Sharma, Ramveer Singh and Awakash Mishra

Forschungsartikel

HINDI LANGUAGE INTERFACE TO DATABASES

  • Himani Jain, Parteek Bhatia

Forschungsartikel

An Edge Detection Algorithm for Human Knee Osteoarthritis Images

  • Prof. Samir K. Bandyopadhyay

Forschungsartikel

A Modern Advanced Hill Cipher Involving XOR Operation and a Permuted Key

  • V.U.K.Sastry, Aruna Varanasi and S.Udaya Kumar

Forschungsartikel

SEMANTIC RETRIEVAL FOR HOMONYMS USING RDF AND SPARQL

  • Amrita Bhandari, Shalini Batra

Forschungsartikel

SECURITY THREATS IN PEER TO PEER NETWORKS

  • Chander Diwakar, Sandeep Kumar, Amit Chaudhary

Forschungsartikel

A New Proposed Two Processor Based CPU Scheduling Algorithm with Varying Time quantum for Real Time Systems

  • H.S. Behera, Jajnaseni Panda, Dipanwita Thakur and Subasini Sahoo

Forschungsartikel

EFFECTIVE SOFTWARE TESTING USING GENETIC ALGORITHMS

  • Kulvinder Singh, Rekha Rani, Seema Rani, Vedpal singh

Forschungsartikel

Text Steganography using Article Mapping Technique(AMT) and SSCE

  • Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal

Forschungsartikel

Information Retrieval using Web

  • Anu Kundu, Sona Malhotra

Forschungsartikel

OBJECT ORIENTED DESIGN SECURITY QUANTIFICATION

  • Suhel Ahmad Khan and Raees Ahmad Khan

Forschungsartikel

A MULTI AGENT BASED E-SHOPPING SYSTEM

  • SYSTEMSougata Khatua, Zhang Yuheng , Arijit Das and N.Ch.S.N. Iyengar

Forschungsartikel

AGENT BASED E-HEALTH CARE INFORMATION SYSTEM

  • Arijit Das, Sougata Khatua, Zhang Yuheng and N. Ch. S. N. Iyengar

Forschungsartikel

DEFENDING AGAINST ATTACKS BY ENHANCING SECURITY USING BIOMETRICS IN SEMANTIC WEB

  • Mr. Akhilesh Dwivedi, Mr. Suresh Kumar

Rezensionsartikel

A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier

  • Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal

Indiziert in

Google Scholar
Academic Journals Database
Open J Gate
Academic Keys
ResearchBible
CiteFactor
Elektronische Zeitschriftenbibliothek
RefSeek
Hamdard-Universität
Gelehrter
International Innovative Journal Impact Factor (IIJIF)
Internationales Institut für organisierte Forschung (I2OR)
Kosmos

Mehr sehen