VOLUME 1, ISSUE 3, MAY 2012
Two Level Nested Loops Tiled Iteration Space Scheduling By Changing Wave-Front Angles Approach
AliReza Hajieskandar, Shahriar Lotfi, Simin Ghahramanian Department of Electrical and computer engineering, Islamic Azad University, Bonab, Iran Department of Computer Science, University of Tabriz, Tabriz, Iran Sama Technical and Vocational Training College, Islamic Azad University, Bonab, Iran
Vegetation Extraction from Free Google Earth Images of Deserts Using a Robust BPNN Approach in HSV Space
Mohamed H.Almeer Computer Science & Engineering Department, Qatar University, Doha, QATAR
Challenges of Security, Protection and Trust on E-Commerce: A Case of Online Purchasing in LIBYA
Abdulghader.A.Ahmed.Moftah, Siti Norul Huda Sheikh Abdullah, Hadya.S.Hawedi Center of Artificial Intelligence Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia Department of Electronics & communication, Dehradun Institute of Technology, Dehradun, India
Validation of Document Clustering based on Purity and Entropy measures
M.Deepa, P.Revathy PG Student, Dept. of CSE, Rajalakshmi Engineering College, Chennai, India Assistant Professor, Dept. of CSE, Rajalakshmi Engineering College, Chennai, India
A Review Paper: Security on Voice over Internet Protocol from Spoofing attacks
Sanjay Kumar Sonkar, Rahul Singh, Ritu Chauhan, Ajay Pal Singh Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India. Dept. of Computer Science and Engineering, Sharda University, UttarPradesh, India. Dept. of Electronics and Communication Engineering, Sharda University, UttarPradesh, India. Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India.
A Simulated Behavioural Study of Prominent Reactive Routing Protocol AODV of MANET Using NS-2
K.Vanaja, Dr. R.Umarani Assistant Professor, VLB Janakiammal College of Arts and Science, Coimbatore, Tamil Nadu, India Associate Professor, Sri Sarada College for Women, Salem, Tamil Nadu, India
Defect Handling In Software Metrics
Arpita Mittal, Sanjay kumar Dubey Department of Computer Science and Engineering, Amity School of engineering & Technology Amity University, Noida, India
Segmentation and Feature Extraction of Ultrasound Images by Modified Level Set Method and Chain-VESE Methods Using SRAD Filter
Hemanth Kumar, Prathibha AM P, Stafford Michahial Assistant Professor, AMC Engineering College, Bangalore, India Assistant Professor, AMC Engineering College, Bangalore, India PG student, AMC Engineering College, Bangalore, India
3D Scene Recovery from Defocused Video Sequence
Mrs. Preeti N.Baheti, Prof. N.Kasat, Prof. S.Kasturiwala Dept.of EXTC, SIPNA’s COET, Maharashtra, India Dept.of EXTC, SIPNA’s COET. Maharashtra, India Dept.of EXTC, SIPNA’s COET. Maharashtra, India
All Aspects of Database Management Systems and Data Mining
Lijo John Lecturer In Computer Engineering, Thiagarajar Polytechnic College, Alagappanagar, Thrissur, Kerala
Two Level Nested Loops Tiled Iteration Space Scheduling By Changing Wave-Front Angles Approach
AliReza Hajieskandar, Shahriar Lotfi, Simin Ghahramanian Department of Electrical and computer engineering, Islamic Azad University, Bonab, Iran Department of Computer Science, University of Tabriz, Tabriz, Iran Sama Technical and Vocational Training College, Islamic Azad University, Bonab, Iran
Vegetation Extraction from Free Google Earth Images of Deserts Using a Robust BPNN Approach in HSV Space
Mohamed H.Almeer Computer Science & Engineering Department, Qatar University, Doha, QATAR
Challenges of Security, Protection and Trust on E-Commerce: A Case of Online Purchasing in LIBYA
Abdulghader.A.Ahmed.Moftah, Siti Norul Huda Sheikh Abdullah, Hadya.S.Hawedi Center of Artificial Intelligence Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia Department of Electronics & communication, Dehradun Institute of Technology, Dehradun, India
Validation of Document Clustering based on Purity and Entropy measures
M.Deepa, P.Revathy PG Student, Dept. of CSE, Rajalakshmi Engineering College, Chennai, India Assistant Professor, Dept. of CSE, Rajalakshmi Engineering College, Chennai, India
A Review Paper: Security on Voice over Internet Protocol from Spoofing attacks
Sanjay Kumar Sonkar, Rahul Singh, Ritu Chauhan, Ajay Pal Singh Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India. Dept. of Computer Science and Engineering, Sharda University, UttarPradesh, India. Dept. of Electronics and Communication Engineering, Sharda University, UttarPradesh, India. Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India.
A Simulated Behavioural Study of Prominent Reactive Routing Protocol AODV of MANET Using NS-2
K.Vanaja, Dr. R.Umarani Assistant Professor, VLB Janakiammal College of Arts and Science, Coimbatore, Tamil Nadu, India Associate Professor, Sri Sarada College for Women, Salem, Tamil Nadu, India
Defect Handling In Software Metrics
Arpita Mittal, Sanjay kumar Dubey Department of Computer Science and Engineering, Amity School of engineering & Technology Amity University, Noida, India
Segmentation and Feature Extraction of Ultrasound Images by Modified Level Set Method and Chain-VESE Methods Using SRAD Filter
Hemanth Kumar, Prathibha AM P, Stafford Michahial Assistant Professor, AMC Engineering College, Bangalore, India Assistant Professor, AMC Engineering College, Bangalore, India PG student, AMC Engineering College, Bangalore, India
3D Scene Recovery from Defocused Video Sequence
Mrs. Preeti N.Baheti, Prof. N.Kasat, Prof. S.Kasturiwala Dept.of EXTC, SIPNA’s COET, Maharashtra, India Dept.of EXTC, SIPNA’s COET. Maharashtra, India Dept.of EXTC, SIPNA’s COET. Maharashtra, India
All Aspects of Database Management Systems and Data Mining
Lijo John Lecturer In Computer Engineering, Thiagarajar Polytechnic College, Alagappanagar, Thrissur, Kerala
