ISSN : 2319-7323




INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ENGINEERING


Open Access

Issue

March 2014 - IJCSE(ISSN: 2319-7323)
 

VOLUME 3 ISSUE 2

Article #
Article Title & Authors (Volume 3 Issue 2 March 2014)
Page
1. DESIGN AND IMPLEMENTATION OF A VIRTUAL COMPUTING ENVIRONMENT IN SCHOOLS AND OFFICES
AlatisheAdeyemi, OwoadeOluwatobilobaObiajulu, Prof.AtayeroAderemi
Abstract | PDFIconPDF
57-59
2. Ranking DMUs with Fuzzy Data Using MAJ model
Mehrdad Nabahat
Abstract | PDFIconPDF
60-65
3. ROBOTIC ARM BASED LIBRARY AUTOMATION USING HAPTIC TECHNOLOGY
M. Elango, N.Arun Ram Kumar, C.Kalyana Sundaram
Abstract | PDFIconPDF
66-70
4. PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERBASED ROUTING PROTOCOL IN WIRELESS SENSOR NETWORKS
Hla Yin Min, Win Zaw
Abstract | PDFIconPDF
71-76
5. A new low-power 1-Bit CMOS full-adder cell based on multiplexer
Mohsen SADEGHI, Jamal RAJABI, Abbas GOLMAKANI
Abstract | PDFIconPDF
77-80
6. Design of Stuck at Fault Testable Conservative Logic based Flip-Flops and its Application Circuits
M.K.Nigesh praveen kumar, A.Arul Rex
Abstract | PDFIconPDF
81-87
7. A Framework for Software Reengineering Using Set of Software Metrics
Dr. Sumesh Sood
Abstract | PDFIconPDF
88-94
8. EPICS based monitoring and control in data acquisition system
Ramesh Joshi, Manoj Singh, Kiran Trivedi
Abstract | PDFIconPDF
95-100
9. Image Denoising Based on Non-Local means Algorithm
N.Hemalatha, D.Ganesh Kumar
Abstract | PDFIconPDF
101-106
10. Analysis of Different Clustering Techniques in Data and Text Mining
Ms.S.Prabha, Dr.K.Duraiswamy, Ms.M.Sharmila
Abstract | PDFIconPDF
107-116
11. Enhanced Chaotic Block Cipher Algorithm for Image Cryptosystems
Vishnu G. Kamat, Madhu Sharma
Abstract | PDFIconPDF
117-124
12. SIMULATION OF RADIX-2 FAST FOURIER TRANSFORM USING XILINX
Remya Ramachandran, Vanmathi.k
Abstract | PDFIconPDF
125-130
13. A Method of DWT with Bicubic Interpolation for Image Scaling
Remimol.A.M, Sekar.K
Abstract | PDFIconPDF
131-135
14. A Self Adaptive Penalty Function Based Genetic Algorithm for value-Bilevel Programming Problem
Danping Wang, Gang Du
Abstract | PDFIconPDF
136-146
15. An Analogous Study of Fault Tolerance Techniques in Mobile Agents
Preeti, Praveena Chaturvedi
Abstract | PDFIconPDF
147-151
16. A security system for paper or plastic-based items using chipless RFID
Anwar Shahadat Shatil
Abstract | PDFIconPDF
152-154
Use Adobe Acrobat 6.0 or more to view the PDF files.