Volume-2 , Issue-3 , Mar - 2014 Go Back

Open Access   Article

Implementation of an Improved ID3 Decision Tree Algorithm in Data Mining System

M. Jayakameswaraiah, S. Ramakrishna
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.51-54, Mar-2014
Open Access   Article

IRIS Recognition and Authentication System for Enhancing Data Security

Y. Badhe, H. Balbatti, N. Kaladagi, K. Kumar
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.55-59, Mar-2014
Open Access   Article

An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis

N.K. Pandey, A.K. Mishra
Technical Paper | Journal Paper
Vol.2 , Issue.3 , pp.60-63, Mar-2014
Open Access   Article

Market Analysis and Review Synthesis

S. R. Gosavi, P.R. Gohad, P.P. Sandanshi, S.T. Mahajan, N.R. Wankhade
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.64-66, Mar-2014
Open Access   Article

Image Steganography for Message Hiding Using Genetic Algorithm

C.R. Gaidhani, V.M. Deshpande, V.N. Bora
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.67-70, Mar-2014
Open Access   Article

A Survey on Security Issue in Mobile AD-HOC Network and Solutions

M. Kumar, T. Singh
Survey Paper | Journal Paper
Vol.2 , Issue.3 , pp.71-75, Mar-2014
Open Access   Article

Tsunami Detection and forewarning system using Wireless Sensor Network - a Survey

N. Meenaksi, P. Rodrigues
Survey Paper | Journal Paper
Vol.2 , Issue.3 , pp.76-79, Mar-2014
Open Access   Article

A Study on Architectures for Embedded Devices

A. Radhakrishnan, T. Muralikrishna
Review Paper | Journal Paper
Vol.2 , Issue.3 , pp.80-83, Mar-2014
Open Access   Article

Intrusion Detection and Violation of Compliance by Monitoring the Network

R.S. Priya, V. Anusha, N. Kumar
Research Paper | Journal Paper
Vol.2 , Issue.3 , pp.84-91, Mar-2014
Open Access   Article

Multicore Heterogeneous Computing with OpenACC

N.R. Chauhan, M.S. Burange
Technical Paper | Journal Paper
Vol.2 , Issue.3 , pp.92-97, Mar-2014
First    Previous    Next    Last