Volume 3, Issue 3, March, 2015
ISSN: 2321-5992, Journal IMPACT Factor: 8.98
Volume 3, Issue 3, March, 2015
Authors: Muhammad. R .Harb; Sadiq. J. Kadhim; Hassan. A. Yasser
Volume 3, Issue 5, May, 2015
TEMPERATURE CONTROLLER AND COMPARISION OF DIFFERENT TEMPERATURE SENSORS TYPE
Authors: Ajay Kumar Dagar; Siddharth Kumar Mishra; Lalit Sharma
LEACH-ENL: LEACH Protocol with Enhanced Network Lifetime in Wireless Sensor Network
Authors: Divyani Garg; Kanak Soni; Vatika Goswami; Rajeshwari Porwal; K.Anil Kumar
NEW COMPACT DESIGN OF RECTANGULAR SLOTTED HEXAGONAL MICROSTRIP PATCH ANTENNA
Authors: Prakalp Mishra; Prashant Yadav; Pankaj Gupta; Shushant Jain
DIVIDEND ON SHARE AS A POLICY FOR PORTFOLIO SELECTION OF BANK SHARE [A CASE STUDIES OF ZENITH BANK PLC, GUARANTY TRUST BANK PLC AND FIRST BANK NIGERIA PLC.]
Authors: Emiola; Olawale. K. Steve; Alayemi; S. A; Igbinehi E.M
A Comparison among Support Vector Machine and other Machine Learning Classification Algorithms
Authors: Motaz M. H. Khorshid; Tarek H. M. Abou-El-Enien; Ghada M. A. Soliman
Video Segmentation for Moving Object Detection & Tracking- a Review
Authors: Anuradha.S.G; Dr.K.Karibasappa; Dr.B.Eswar Reddy
A Review on Hybrid Intrusion Detection System using TAN & SVM
Authors: Sumalatha Potteti; Namita Parati
An Enhanced Symmetric-key block cipher algorithm to manage network security
Authors: Swati Kashyap; Er. Richa
An advancement to the security level through the Galois field in the existing password based approach of hiding classified information in images
Authors: Mita Kosode; Suresh Gawande; Sunil Kumar Soni
A Model For Secure Data Sharing Using Attribute Based Encryption
Authors: Priti D. Wanmali; D. G. Harkut
An Encapsulated Approach for Microarray Sample Classification using Supervised Attribute clustering and Fuzzy Classification Algorithm
Authors: Gowthami S
Predicting Protein-Protein Interactions through Associative Classification Technique
Authors: Lakshmi Priya; Dr.Shomona Gracia Jacob
Volume 3, Issue 6, June, 2015
Effects of Graded Order on the Characteristics of the Fundamental Mode in Optical Fibers
Authors: Muhammad. R .Harb; Sadiq. J. Kadhim; Hassan. A. Yasser
Effect of Twist on Polarization Mode Dispersion
Authors: Noor Ali Nasi; Hassan Abid Yasser
Design Improvement in 2-6GHz Switch Filter Bank of Quad Super heterodyne receiver
Authors: G Rajeshwari; Parijadhana; Vijay P Sompur
Person Identification using MFCC and Vector Quantization
Authors: Anu L B; Dr Suresh D; Sanjeev kubakaddi
Volume 3, Issue 7, July, 2015
Enriched Iterative Block Level Principal Component Averaging based fusion using DCT
Authors: Er.PrabhDeepKaur; Er.MandeepKaur
Current/Voltage Measurement Scheme Using a Flexible Coil/Electrode Power Sensor to Monitor the Power of Two-Wired Household Appliances
Authors: Shih-Hsien Cheng; Sheng-Fuu Lin
Increasing the Efficiency of Customer Relationship Management Process Using Data Mining Techniques
Authors: P.V.D PRASAD
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Authors: Deepthi Hudedagaddi; Pallavi Ravishankar; Rakesh T M; Shashikanth Dengi
Volume 3, Issue 8, Aug, 2015
CTAB capped Ag-NPs incorporated with TiO2 for Plasmonic DSSC
Authors: Odai N. Salman; Ibrahim R. Agool; Mohammed O. Dawood
A study of Software Prevention technique based on mutation testing
Authors: Deepak Dubey
Importance of Search Engine Optimization in online business growth
Authors: S .k. Sharma
Case study of routing protocol in MANET
Authors: Poonam Sagar
Volume 3, Issue 9, Sep, 2015
Appetite for Hybrid Cloud Adoption Approach - A Bluemix container
Authors: Debasis Roychoudhuri; Biswajit Mohapatra
Fuzzy twin support vector machine based on iterative method
Authors: Kai Li; Shaofang Hu
Hadoop2 Yarn
Authors: Asso.Ashish Sharma; Snehlata Vyas
DEVELOPMENT OF COMPUTER SOFTWARE FOR SUN ALTITUDE AND AZIMUTH ORIENTATION
Authors: Ejiko; S.O.; Oke P. K.; Titiladunayo I. F.; Ogedengbe T. I.
Volume 3, Issue 10, Oct, 2015
Visual Cryptography in Internet Voting System
Authors: Prasad Pawar; Teju Pansare; Jyoti Shinde; Sachin Shinde; Prashant Suryavanshi
DISTRIBUTED EVENT-TRIGGERED AVERAGE CONSENSUS OF MULTI-AGENT SYSTEMS
Authors: Jie Cao; Zhihai Wu; Li Peng
Adaptive High Intensity Interval Training Application using Android (HIIT)
Authors: Ankit Singhaniya; Aditya Khursale; Shubham Saykhedkar
Volume 3, Issue 11, Nov, 2015
Numerical simulation of some macroscopic mathematical models of traffic flow Comparative study
Authors: A. Lakhouili; El. Essoufi; H. Medromi; M. Mansouri
INTERACTIVE SEGMENTATION WITH ADAPTIVE OPTIMAL SHAPE PRIOR
Authors: Sameena Banu; Apparao Giduturi; Syed Abdul Sattar
An Empirical Study of Computer Applications in Library Automation with reference to Kolhapur City
Authors: Susanta Kumar Nayak; Ravindra A. Marathe
AN ONTOLOGY BASED DEEP ? MINING METHOD TO CLUSTER THE CONTENT BASED ON WEBLOG
Authors: S. BABU; N. R. ANANTHANARAYANAN; P. BHUVANESWARI
Volume 3, Issue 12, Dec, 2015
SILICON SOLAR CELL CAPACITANCE: INFLUENCE OF BOTH TEMPERATURE AND WAVELENGTH
Authors: Ibrahima Diatta; Issa Diagne; Cheikh Sarr; Khady Faye; Mor Ndiaye; Grégoire Sissoko
Cloud Based Model e-Governance
Authors: R N Panda; Sabyasachi Pattnaik