Works matching IS 09765697 AND DT 2014 AND VI 5 AND IP 8
Results: 39
An Approach towards Image Forgery Detection.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 205
- By:
- Publication type:
- Article
Shoulder Surfing and Keylogger Resistant using Graphical Password Scheme.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 201
- By:
- Publication type:
- Article
Low Power Mac Protocol in Wban for E-Heath Application.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 196
- By:
- Publication type:
- Article
User Authentication in LabVIEW Platform.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 191
- By:
- Publication type:
- Article
An Advanced Motion Detection Algorithm with Video Quality Analysis for Video Surveillance Systems.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 186
- By:
- Publication type:
- Article
Analysis of Flagellar Movements of Bacterial Cells using Digital Image Processing Techniques.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 181
- By:
- Publication type:
- Article
Robust Algorithm to Design Host, watermark Image using Visual Cryptography on Color Image.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 175
- By:
- Publication type:
- Article
Overview on Performance Testing Approach in Big Data.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 165
- By:
- Publication type:
- Article
Lip Motion based Alphabet Recognition using Neural Network.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 160
- By:
- Publication type:
- Article
An Efficiency Analysis for Detection of Exudates in Color Images using Clustering Algorithms.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 158
- By:
- Publication type:
- Article
5 Pen PC : Battle between functionality and portability.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 152
- By:
- Publication type:
- Article
Tools for Creating Constructivist Learning Environment and Assessing Knowledge Development using Concept Maps.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 143
- By:
- Publication type:
- Article
Survey on Improved Security in Public Cloud.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 140
- By:
- Publication type:
- Article
Improved Trilateral Filter Based Dark Channel Prior For Haze Removal.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 134
- By:
- Publication type:
- Article
Overview on Data Mining Schemes to Design Business Intelligence Framework for Mobile Technology.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 128
- By:
- Publication type:
- Article
Gray Scale Image Denoising using PCA-SPT.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 119
- By:
- Publication type:
- Article
Two-stage Nonlocal Means Denoising of ECG Signals.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 114
- By:
- Publication type:
- Article
Bursting the Cloud: Security threats & Preventions.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 112
- By:
- Publication type:
- Article
Survey on an Approach to Enhance QoS and QoE by Migrating Services in Cloud Based Mobile Environments.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 106
- By:
- Publication type:
- Article
Role of Technology Audit in IT projects.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 101
- By:
- Publication type:
- Article
Cyber Stalking: A Nuisance to the Information Technology.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 98
- By:
- Publication type:
- Article
Automatic Segmentation of Satellite Image using Self Organizing Feature Map (SOFM)An Artificial Neural Network (ANN) Approach.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 92
- By:
- Publication type:
- Article
The Threat of Advancing Cyber Crimes in Organizations: Awareness and Preventions.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 84
- By:
- Publication type:
- Article
Securing Health Care Records over Cloud using PSZ Method.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 80
- By:
- Publication type:
- Article
Web Technology: Http, Web Server & Web Services.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 76
- By:
- Publication type:
- Article
Factverifier: Search Engine Based Question/Answering System to Verify Facts towards identifying and answering polar questions authoritatively by using pattern matching for web search engine.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 69
- By:
- Publication type:
- Article
A Review on Tracking of Moving Object.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 66
- By:
- Publication type:
- Article
eHealth Model for Early Detection of Breast Cancer.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 62
- By:
- Publication type:
- Article
Identification of Cotton Crop Diseases and Provide their Remedies using Kmeans Clustering.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 58
- By:
- Publication type:
- Article
Return on Invested Capital as a Determinant for Future Investment [a Case Study of Three Subsidiaries of Dangote Group.].
- Published in:
- 2014
- By:
- Publication type:
- Case Study
Estimation of Effect of using ACO in Dynamic Routing on a Communication Network.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 49
- By:
- Publication type:
- Article
The Determinant of use and impact Assessment of ICT as an Enhancing Tool in Small and Medium Scale Enterprises (SMEs) in Nigeria.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 45
- By:
- Publication type:
- Article
Replica Location Cost Estimation for Replica Performance in Grid Systems.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 38
- By:
- Publication type:
- Article
A Summarization on Preserving Privacy Techniques in Data Mining.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 33
- By:
- Publication type:
- Article
Efficient Certificate Validation in Hybrid Mobile Ad Hoc Networks.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 27
- By:
- Publication type:
- Article
A Comparative Study of Face Recognition Techniques: ASurvey.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 23
- By:
- Publication type:
- Article
Performance Improvement for Fingerprint Recognition System using Shape and Orientation Descriptors.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 9
- By:
- Publication type:
- Article
Validation of a Neural Network Based Leaf Classification Algorithm.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 5
- By:
- Publication type:
- Article
Analysis Of Bonus On Share As A Determinant For Portfolio Selection Of Bank Shares [A Case Studies Of Three Most Viable Bank In Nigeria Namely Zenith Bank Plc, Guaranty Trust Bank Plc And First Bank Nigeria Plc.].
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 8, p. 1
- By:
- Publication type:
- Article