Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Global Journal of Computer Science and Technology. Volume 1.2

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • المؤلفون: Dixit, R. K.
  • اللغة:
    English
  • المصدر:
    Online Submission. 2009.
  • الوصف المادي :
    PDF
  • الموضوع:
    2009
  • نوع التسجيلة:
    Collected Works - Serial
  • معلومة اضافية
    • Peer Reviewed:
      N
    • المصدر:
      231
    • الموضوع:
    • ISSN:
      0975-4350
    • نبذة مختصرة :
      Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study to Identify Qualitative Measures for Website Design (G. Sreedhar and A. A. Chari); (4) Process modeling using ILOG JViews BPMN Modeler Tool to Identify Exceptions (A. Saravanan and B. Rama Sree); (5) A New Approach to: Obstacle-Avoiding Rectilinear Steiner Tree Construction (Animesh Pant); (6) Algorithmic Approach for Creating and Exploiting Flexibility in Steiner Trees (Piyush Singh and Animesh Pant); (7) Initial Hybrid Method for Software Effort Estimation, Benchmarking and Risk Assessment Using Design of Software (J. Frank Vijay and C. Manoharan); (8) Diffie-Hellman Key Exchange: Extended to Multi-Party Key Generation for Dynamic Groups (B. Srinivasa Rao and D. Swapna); (9) A Framework for Systematic Database Denormalization (Yma Pinto); (10) Experiments with Self-Organizing Systems for Texture and Hardness Perception (Magnus Johnson and Christian Balkenius); (11) Diagnosing Parkinson by Using Artificial Neural Networks and Support Vector Machines (David Gil and Magnus Johnson); (12) Secured Data Comparison in Bioinformatics Using Homomorphic Encryption Scheme (Gorti VNKV Subba Rao); (13) Performance Evaluation of Message Encryption Scheme Using Cheating Text (Ch. Rupa and P. S. Avadhani); (14) Finding Error Correction of Bandwidth on Demand Strategy for GPRS Using Constant Modulus Algorithm (K. Ramadevi, K. Nageswara Rao, and J. Ramadevi); (15) An Introduction to DNA Computing (C. Saravanan); (16) Distributed Diagnosis in Dynamic Fault Environments Using HeartBeat Algorithm (K. Nageswara Rao, B. Srinivasa Rao, and Sreenivasa Raju V.); (17) Temperature Variation on Rough Actor-Critic Algorithm (P. K. Pandey and D. Tiwari); (18) Evaluation of Efficient Web Caching and Prefetching Technique for Improving the Proxy Server Performance (G. N. K. Suresh Babu and S. K. Srivatsa); (19) Wireless LAN Security System (Qasim Siddique); (20) A Trust-Based Secured Routing Protocol for Mobile Ad Hoc Networks (K. Seshadri Ramana. A. A. Chari, and N. Kasiviswanath); (21) Generation of Fractal Music with Mandelbrot Set (S. Sukumaran and G. Dheepa); (22) Performance Analysis & QoS Guarantee in ATM Networks (Parag Jain, Sandip Vijay, and S. C. Gupta); (23) Survey of Forest Fire Simulation (Qasim Siddique); (24) Detecting Redundancy in Biological Databases--An Efficient Approach (C. Sumithiradevi and M. Punithavalli); (25) Semantic Search and Retrieval of Stock Photography Based on MPEG-7 Descriptors (R. Balasubramani and V. Kannan); (26) Efficient Use of MPEG-7 Color Layout and Edge Histogram Descriptors in CBIR Systems (R. Balasubramani and V. Kannan); (27) Computation of Merging Points in Skeleton Based Images (J. KomalaLakshmi and M. Punithavalli); (28) Separating Words from ContinuousBangla Speech (Nipa Chowdhury, Md. Abdus Sattar, and Arup Kanti Bishwas); (29) A Survey on User Interface Defect Detection in Object Oriented Design (Vijayakumar Elangovan); (30) A Survey-Object Oriented Quality Metrics (C. Neelamegam and M. Punithavalli); (31) Modeling and Analysis of the Associative Based Routing (ABR) Protocol by Using Coloured Petri Nets (Rahul Bhargava and Rekha Kaushik); (32) A Framework of Distributed Dynamic Multi-Radio Multi-Channel Multi-Path Routing Protocol in Wireless Mesh Networks (K. Thangadurai and Anand Shankar); (33) A Security Analysis Framework for Dynamic Web Applications (R. Selvakumar and S. Mohamed Saleem); and (34) Analysis of Knowledge Management Tools (Muhammad Bilal Qureshi and Muhammad Shuaib Qureshi). (Individual articles contain references, tables, and figures.) ["Global Journal of Computer Science and Technology" is published by Global Journals. Abstract revised to meet ERIC guidelines.]
    • نبذة مختصرة :
      As Provided
    • الموضوع:
      2010
    • الرقم المعرف:
      ED508256