IJCAIT

Vol 1, No 2 (2012): IJCAIT


Table of Contents

Articles

E-Mail discussion Forums in Library and Information Services (LIS): A Study PDF
S. Dhanvandan and M. Tamizhchelvan 1-4
A Survey of Association Rule Mining Using Genetic Algorithm PDF
Anubha Sharma and Nirupma Tivari 5-11
Analysis and Design of Cyrptography System PDF
Pratik A. Vanjara 12-15
Effective Analysis of Cloud Based Intrusion Detection System PDF
Sanjay Ram M., Velmurugan N and Thirukumaran S 16-22
Analysis of an ETF Task Scheduling Algorithm PDF
Navpreet Singh and Komal Sharma 23-25
Extraction of Circle from Digital Images PDF
Nitasha Singla 26-29
An Optimized Technique of Increasing the Performance of Network Adapter on EML Layer PDF
Prashant L. and Shantharam Nayak 30-33
Denoising Of Ultrasonographic Images Using DTCWT PDF
Anil Dudy and Kanwaljit Singh 34-36
An Effective Security Management of Database through DNA Fingerprinting Recognition using Geometric Parameters PDF
Radha Krishna Rambol 37-38
JUXT A Position of Two Standard Network Topology for a Genus Progeny PDF
Sounak Sadhukhan and Samar Sen Sharma 39-44
Ellipse Detection using Canny Edge Detection Algorithm PDF
Nitasha Singla, Shami Sharma and Usha Rani 45-47
Experimental Study of Fractal Image Compression Algorithm PDF
Chetan Dudhagara and Kishor atkotiya 48-51
On Consturction of Binary Higher Order Nueral Network and Realiztaion of Boolean Functions PDF
Poorva Aggarwal 52-55
Blind Image Deconvulation Techniques for Image Restoration using Ant Colony Optimization PDF
Aman Kokhar 56-60
Designing Clock System Using Power Optimization Techniques in Flipflop PDF
P.Akila 60-64
Designing Clock System Using Power Optimization Techniques in Flipflop PDF
Ranbeer Tyagi and D. K. Sharma 65-71
Genetic Algorithm for Parallel Process Scheduling PDF
Rachhpal Singh 72-75
VANET Based Proficient Collision Detection and Avoidance Strategy for Cars using DOUBLE-C Curve Movement Algorithm PDF
V.Ramya Krishnan, T Rajesh 81-84
Performance Analysis of a Network using GriFT Monitoring Technique PDF
Priya Kundal, Raj Kumari Bhatia 85-91
Aggregate Malanobis Distance Function Approach to Evolve a HYBRID AWALE Player PDF
Randle O. A., Keneilwe Zuva, Queen Miriam Sello 92-95

Review Papers

Elaborated Phases of Software Development Life Cycle PDF
Radhika D Amlani 1-4
Protect the Internet Consumer’s Identity against Attacks by Phishers PDF
Chiragjagani, Jignesh hirapara and Haresh Khachariya 10-15
Classification of Watermarking Based upon Various Parameters PDF
Gaurav Chawla 16-19
A Review of Algebraic Link Analysis Algorithms PDF
Mini Singh Ahuja and Sumit Chabbra 20-23
Bandwidth Utilization and Efficiency in MACA and MACA-BI: A Study PDF
Biswaraj Sen 24-27
Performance Comparison of Secure Routing Protocols in Mobile Ad-Hoc Networks PDF
Ashwani Garg and Vikas Beniwal 28-31
Review Paper On To Study and Enhance Coastal Security System Using GIS/GPS Tool PDF
Pradip Vanparia and Y. R. Ghodasara 32-36
An Introduction to Botnet Attacks and it’s Solutions PDF
Kalpna Midha 37-41
Discovering Topology of MultiSubnet LAN using MIB PDF
Sapna Angel 42-44
Techniques of Millimeter-wave Signal Generation in ROF Systems: A Review PDF
Preeti Singh and Davinder Singh 45-49
Video Compression using Nueral Network PDF
Sangeeta Mishra 50-54

Tutorial Papers

“4G” – The Advanced Technology of 3G PDF
Pradip Vaishnav, Chirag Jagani and Haresh Khachariya 1-4


©2012 onwards International Journal of Computer Applications & Information Technology

International Journal of Computer Applications & Information Technology
All rights reserved are reserved to Chief Editor IJCAIT.

For any Technical Support editorijcait@gmail.com