Categories

Full-Text AvailableAbstract Only

Show:
Sort By:
       1. A New Approach for Solving N-Queens Problem with Combination of PMX and OX Crossover Operators
Farhad Soleimanian Gharehchopogh, Isa Maleki and Behnam Zebardast
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       2. A review on software project reliability estimation
Sanjana and P.K. Suri
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       3. Measurement, Modeling and Analysis of Received Signal Strength at 800MHz and 1900MHz in Antenna Beam Tilt Cellular Mobile Environment
Joseph Isabona and Samuel Azi
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       4. Trouble shoot hardware compatibilities of diagnostic card with solution techniques for mother board repair
Umair Ahmed, Adeel Dilshad and M. Sulleman Memon
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       5. A low-cost built-in redundancy-analysis scheme for word-oriented RAMs with 2-D redundancy
Sony Rama, Kishore Kumar and P.Rajesh Kumar
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       6. A new solutions for continuous optimization functions by using bacterial foraging optimization and particle swarm optimization algorithms
Farhad Soleimanian Gharehchopogh, Isa Maleki and Behnam Zebardast
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       7. A systematic approach and model generation for preventing phishing attacks
Jigar Patel
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       8. SLA assurance in cloud computing: a trust issue
S.B. Dash, H. Saini, T.C Panda and A. Mishra
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       9. Traffic density estimation, vehicle classification and stopped vehicle detection for traffic surveillance system using predefined traffic videos
P. Rajesh, M. Kalaiselvi Geetha and R.Ramu
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology
       10. A survey on anomaly and signature based intrusion detection system(IDS)
Roshni Dubey and Pradeep Nandan Pathak
Abstract | Pdf Category : Computing and Informatics    |   Sub Category  : Information Technology