International Journal of Computer Science and Informatics
Volume 3, Issue 2 (2013)
Articles
Image Edge Detection
K. Vikram
DOI: 10.47893/IJCSI.2013.1121
Face Recognition Based on PCA Algorithm
Taranpreet Singh Ruprah
DOI: 10.47893/IJCSI.2013.1122
Model Based Software Development: Issues & Challenges
N Md Jubair Basha, Salman Abdul Moiz, and Mohammed Rizwanullah
DOI: 10.47893/IJCSI.2013.1123
WEB GRAPH BASED SEARCH BY USING DENSITY OF KEYWORD AND AGE FACTOR
GAURAV AGARWAL, SACHI GUPTA, and SAURABH MUKHERJEE
DOI: 10.47893/IJCSI.2013.1124
GRAPHICAL AUTHENTICATION USING REGION BASED GRAPHICAL PASSWORD
G. NIRANJANA and KUNAL DAWN
DOI: 10.47893/IJCSI.2013.1125
TESTING PROCESS OVERVIEW EXPLORATION FOR A SOFTWARE PRODUCT IN A LARGE SOFTWARE DEVELOPMENT PROJECT
SRIHARSHA G and NARESH E
DOI: 10.47893/IJCSI.2013.1126
SECURE FRAMEWORK IN DATA PROCESSING FOR MOBILE CLOUD COMPUTING
MR.ANAND SURENDRA SHIMPI
DOI: 10.47893/IJCSI.2013.1127
A VELOUR PLEBISCITE TRACING FOR HARDWARE AND SOFTWARE MISCUE REMEDIAL SYSTEMS
B.V.V.S. PRASAD, V. BALAJI, and M.MADHAVA RAO
DOI: 10.47893/IJCSI.2013.1128
ULTRASOUND LUNG IMAGES AUTOMATIC ANNOTATION
V. RAMACHANDRAN and E.SRINIVASA REDDY
DOI: 10.47893/IJCSI.2013.1129
REAL-TIME SCHEDULING POLICY IN EMBEDDED SYSTEM DOMAIN: A FRAME WORK
ASHIS KUMAR MISHRA and ZULFIKHAR AHMAD
DOI: 10.47893/IJCSI.2013.1130
BOOLEAN XOR BASED (K,N) THRESHOLD VISUAL CRYPTOGRAPHY FOR GRAYSCALE IMAGES
RAM KRISHNA JHA and ABHIJIT MUSTAFI
DOI: 10.47893/IJCSI.2013.1131
A FUZZY BASED DIVIDE AND CONQUER ALGORITHM FOR FEATURE SELECTION IN KDD INTRUSION DETECTION DATASET
ANISH DAS and S. SIVA SATHYA
DOI: 10.47893/IJCSI.2013.1132
ASSOCIATION RULE MINING FOR KDD INTRUSION DETECTION DATA SET
ASIM DAS and S. SIVA SATHYA
DOI: 10.47893/IJCSI.2013.1133
IMPROVED ARCHITECTURE FOR MAXIMIZING SYSTEM LIFETIME OF WIRELESS SENSOR NETWORK USING CLUSTERING ALGORITHM
KANT KUMAR ADLAK and MANISH PANDEY
DOI: 10.47893/IJCSI.2013.1134
EFFICIENT ALLOCATION OF VIRTUAL MACHINE IN CLOUD COMPUTING ENVIRONMENT
SONAM RATHORE
DOI: 10.47893/IJCSI.2013.1135
