Suche

Wo soll gesucht werden?
Erweiterte Literatursuche

Ariadne Pfad:

Inhalt

Literaturnachweis - Detailanzeige

 
Autor/inDixit, R. K.
TitelGlobal Journal of Computer Science and Technology. Volume 1.2
Quelle(2009), (231 Seiten)
PDF als Volltext kostenfreie Datei Verfügbarkeit 
Spracheenglisch
Dokumenttypgedruckt; online; Monographie
ISSN0975-4350
SchlagwörterKnowledge Management; Photography; Semantics; Computer Software; Computers; Mathematics; Data Processing; Safety; Web Sites; Design; Models; Computation; Benchmarking; Risk; Databases; Clinical Diagnosis; Information Technology; Networks; Measurement Equipment; Coding; Error Correction; Genetics; Computer Networks; Computer Security; Music; Simulation; Speech; Computer Interfaces; Radio; Internet; Biological Sciences; Computer Science
AbstractArticles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study to Identify Qualitative Measures for Website Design (G. Sreedhar and A. A. Chari); (4) Process modeling using ILOG JViews BPMN Modeler Tool to Identify Exceptions (A. Saravanan and B. Rama Sree); (5) A New Approach to: Obstacle-Avoiding Rectilinear Steiner Tree Construction (Animesh Pant); (6) Algorithmic Approach for Creating and Exploiting Flexibility in Steiner Trees (Piyush Singh and Animesh Pant); (7) Initial Hybrid Method for Software Effort Estimation, Benchmarking and Risk Assessment Using Design of Software (J. Frank Vijay and C. Manoharan); (8) Diffie-Hellman Key Exchange: Extended to Multi-Party Key Generation for Dynamic Groups (B. Srinivasa Rao and D. Swapna); (9) A Framework for Systematic Database Denormalization (Yma Pinto); (10) Experiments with Self-Organizing Systems for Texture and Hardness Perception (Magnus Johnson and Christian Balkenius); (11) Diagnosing Parkinson by Using Artificial Neural Networks and Support Vector Machines (David Gil and Magnus Johnson); (12) Secured Data Comparison in Bioinformatics Using Homomorphic Encryption Scheme (Gorti VNKV Subba Rao); (13) Performance Evaluation of Message Encryption Scheme Using Cheating Text (Ch. Rupa and P. S. Avadhani); (14) Finding Error Correction of Bandwidth on Demand Strategy for GPRS Using Constant Modulus Algorithm (K. Ramadevi, K. Nageswara Rao, and J. Ramadevi); (15) An Introduction to DNA Computing (C. Saravanan); (16) Distributed Diagnosis in Dynamic Fault Environments Using HeartBeat Algorithm (K. Nageswara Rao, B. Srinivasa Rao, and Sreenivasa Raju V.); (17) Temperature Variation on Rough Actor-Critic Algorithm (P. K. Pandey and D. Tiwari); (18) Evaluation of Efficient Web Caching and Prefetching Technique for Improving the Proxy Server Performance (G. N. K. Suresh Babu and S. K. Srivatsa); (19) Wireless LAN Security System (Qasim Siddique); (20) A Trust-Based Secured Routing Protocol for Mobile Ad Hoc Networks (K. Seshadri Ramana. A. A. Chari, and N. Kasiviswanath); (21) Generation of Fractal Music with Mandelbrot Set (S. Sukumaran and G. Dheepa); (22) Performance Analysis & QoS Guarantee in ATM Networks (Parag Jain, Sandip Vijay, and S. C. Gupta); (23) Survey of Forest Fire Simulation (Qasim Siddique); (24) Detecting Redundancy in Biological Databases--An Efficient Approach (C. Sumithiradevi and M. Punithavalli); (25) Semantic Search and Retrieval of Stock Photography Based on MPEG-7 Descriptors (R. Balasubramani and V. Kannan); (26) Efficient Use of MPEG-7 Color Layout and Edge Histogram Descriptors in CBIR Systems (R. Balasubramani and V. Kannan); (27) Computation of Merging Points in Skeleton Based Images (J. KomalaLakshmi and M. Punithavalli); (28) Separating Words from ContinuousBangla Speech (Nipa Chowdhury, Md. Abdus Sattar, and Arup Kanti Bishwas); (29) A Survey on User Interface Defect Detection in Object Oriented Design (Vijayakumar Elangovan); (30) A Survey-Object Oriented Quality Metrics (C. Neelamegam and M. Punithavalli); (31) Modeling and Analysis of the Associative Based Routing (ABR) Protocol by Using Coloured Petri Nets (Rahul Bhargava and Rekha Kaushik); (32) A Framework of Distributed Dynamic Multi-Radio Multi-Channel Multi-Path Routing Protocol in Wireless Mesh Networks (K. Thangadurai and Anand Shankar); (33) A Security Analysis Framework for Dynamic Web Applications (R. Selvakumar and S. Mohamed Saleem); and (34) Analysis of Knowledge Management Tools (Muhammad Bilal Qureshi and Muhammad Shuaib Qureshi). (Individual articles contain references, tables, and figures.) ["Global Journal of Computer Science and Technology" is published by Global Journals. Abstract revised to meet ERIC guidelines.] (As Provided).
Erfasst vonERIC (Education Resources Information Center), Washington, DC
Update2017/4/10
Literaturbeschaffung und Bestandsnachweise in Bibliotheken prüfen
 

Standortunabhängige Dienste
Da keine ISBN zur Verfügung steht, konnte leider kein (weiterer) URL generiert werden.
Bitte rufen Sie die Eingabemaske des Karlsruher Virtuellen Katalogs (KVK) auf
Dort haben Sie die Möglichkeit, in zahlreichen Bibliothekskatalogen selbst zu recherchieren.
Tipps zum Auffinden elektronischer Volltexte im Video-Tutorial

Trefferlisten Einstellungen

Permalink als QR-Code

Permalink als QR-Code

Inhalt auf sozialen Plattformen teilen (nur vorhanden, wenn Javascript eingeschaltet ist)

Teile diese Seite: