Volume & Issue no: Volume 4, Issue 5(1), September - October 2015
____________________________________________________________________________________________________
S.No. | Title | Page No |
---|---|---|
1
|
Title: 802.11B Considered Harmful Authors: Justin Sophia. I, Dr. N. Rama DOI:https://doi.org/10.2749/IJETTCS.344.901 Full Text [PDF]| Abstract ![]() |
001-004
|
2
|
Title: Authentication Playground for SaaS Connection Authors: Prakash Hiremath, Dr P Jayarekha DOI:https://doi.org/10.2749/IJETTCS.345.902 Full Text [PDF]| Abstract ![]() |
005-008
|
3
|
Title: Spatial domain image fusion using adaptive cross filtering Authors: Snehal Sakharam Sanap , Lohiya Govindkumar Balkisan DOI:https://doi.org/10.2749/IJETTCS.346.906 Full Text [PDF]| Abstract ![]() |
009-011
|
4
|
Title: Analytical Approach for Mosaic Frames Creation in Video for Hiding Multiple Secret Images for Secure Image Transmission Authors: Archana S. Jagtap, Prashant S. Malge DOI:https://doi.org/10.2749/IJETTCS.347.909 Full Text [PDF]| Abstract ![]() |
012-021
|
5
|
Title: A survey of open source workflow Management
system Authors: Caione Adriana, Guido Anna Lisa, Paiano Roberto, Pandurino Andrea DOI:https://doi.org/10.2749/IJETTCS.348.910 Full Text [PDF]| Abstract ![]() |
022-026
|
6
|
Title: Evaluating m-learning in Saudi Arabian higher education: a case study Authors: Salem Alkhalaf DOI:https://doi.org/10.2749/IJETTCS.349.918 Full Text [PDF]| Abstract ![]() |
027-035
|
7
|
Title: Feature Extraction of Build-up area using Morphological Image Processing Authors: Karuna Sitaram Kirwale, Dr.Seema S. Kawathekar DOI:https://doi.org/10.2749/IJETTCS.350.924 Full Text [PDF]| Abstract ![]() |
036-039
|
8
|
Title: A Optimized Analysis of Different Edge
Detection methods in Image Restoration with
Neuro-Fuzzy Technique Authors: Ritika Dahri , Parvinder Yadav DOI:https://doi.org/10.2749/IJETTCS.351.925 Full Text [PDF]| Abstract ![]() |
040-043
|
9
|
Title: Text Mining – A Requisite for Developing Business Intelligence Authors: Jitendra Singh Tomar DOI:https://doi.org/10.2749/IJETTCS.352.930 Full Text [PDF]| Abstract ![]() |
044-047
|
10
|
Title: Privacy Preserving Data Search Using Third Party in Cloud Computing Authors: Ruturaj Desai, Prof. Nitin R. Talhar DOI:https://doi.org/10.2749/IJETTCS.353.932 Full Text [PDF]| Abstract ![]() |
048-050
|
11
|
Title: Diagnosis of Breast Cancer using SOM Neural Network Authors: Praveen C. Shetiye, Ashok A. Ghatol, Vilas N. Ghate DOI:https://doi.org/10.2749/IJETTCS.354.934 Full Text [PDF]| Abstract ![]() |
051-055
|
12
|
Title: An Inventory Model For Deteriorating Items With An Exponentially Demand With Time Authors: Preeti patel, S.K. Malhotra DOI:https://doi.org/10.2749/IJETTCS.355.919 Full Text [PDF]| Abstract ![]() |
056-058
|