Fallbericht
3D FACE MODELING: COMPREHENSIVE DESCRIPTION
BMP TO JPEG - THE CONVERSION PROCESS
Rezensionsartikel
SURVEY ON HANDOFF TECHNIQUES
ASSESSMENT OF SECURITY IN MOBILE AD-HOC NETWORKS (MANET)
A PROPORTIONAL ANALYSIS ON CRYPTOGRAPHY TECHNIQUES, FUNCTIONS AND RELATIVE PERFORMANCE ISSUES
HIBERNATE TECHNOLOGY FOR AN EFFICIENT BUSINESS APPLICATION EXTENSION
NOVEL GRAY SCALE CONVERSION TECHNIQUES BASED ON PIXEL DEPTH
Forschungsartikel
IMPROVING QUALITY USING TESTING STRATEGIES
MODEL TO IMPROVE CORRECTNESS AND QUALITY AND REDUCING TESTING TIME (MCQRTT)
SEARCHING IMPROVEMENT IN BLOGS USING DATA MINING TECHNIQUES
EVALUATING THE PERFORMANCE OF ASSOCIATION RULE MINING ALGORITHMS
A VALIDATION OF SIM-A WITH OVPSIM
SEMANTIC WEB MINING FOR INTELLIGENT WEB PERSONALIZATION
MULTI AGENT SYSTEM BASED SCHEME FOR REVISED NATIONAL TUBERCULOSIS CONTROL PROGRAM
MULTILAYER SECURITY BASED ROBUST WATERMARKING TECHNIQUE FOR MEDICAL IMAGES IN DWT-DCT DOMAIN
Q-ROUTING AND INTRUSION DETECTION
KEY BASED STEGANOGRAPHY IN A GRAY LEVEL IMAGE INVOLVING PERMUTATION AND MODULAR ARITHMETIC ADDITION
KEY BASED STEGANOGRAPHY IN A GRAY LEVEL IMAGE INVOLVING PERMUTATION AND XOR OPERATION
FACE RECOGNITION USING DIFFERENT LEVEL OF ALGORITHMS
MORPHOLOGICAL METHOD, PCA AND LDA WITH NEURAL NETWORKSFACE RECOGNITION
PERFORMANCE INVESTIGATION OF ROUTING PROTOCOLS OF MOBILE AD-HOC NETWORKS USING CBR AND TCP TRAFFIC
FEATURE DETECTION APPROACH FROM VIRUSES THROUGH MINING
ATTACK DESCRIPTION LANGUAGE FOR COLLABORATED ALERTS-USING XML AND UML
PREVENTION AND REACTION BASED SECURE ROUTING IN MANETS
SOFTWARE COMPONENT COMPLEXITY MEASUREMENT THROUGH PROPOSED INTEGRATION METRICS
ELASTICITY OF INTERNET TRAFFIC DISTRIBUTION IN COMPUTER NETWORK IN TWO MARKET ENVIRONMENT
A MARKOV CHAIN MODEL FOR ROUND ROBIN SCHEDULING IN OPERATING SYSTEM
Mehr sehen