IJCOT - Volume 3 Issue 4 - 2013
S.No
|
Title/Author Name
|
Paper Id
|
1
|
|
IJCOT-V3I7P101
|
2 |
Table Detection and Extraction from Image Document
- Tanushree Dhiran, Rakesh Sharma
|
IJCOT-V3I7P102 |
3 |
Image Steganography Using Dynamic LSB with Blowfish Algorithm
-Aishwary Kulshreshta , Ankur Goyal
|
IJCOT-V3I7P103 |
4 |
The Impact of ICT on Cost Efficiency in Higher Institutions in Nigeria
- Dawodu Bamidele Friday , Osondu Mary C
|
IJCOT-V3I7P104 |
5
|
|
IJCOT-V3I8P101
|
6 |
Role Of Clustering On Gene Data
- Mayilvaganan.M, Hemalatha R
|
IJCOT-V3I8P102 |
7 |
Effective Searching Shortest Path In Graph Using Prim’s Algorithm
- D.Kalpanadevi
|
IJCOT-V3I8P103 |
8 |
Face Recognition using Principle Component Analysis for Biometric Security System
- Raman Kumar, Satnam Singh
|
IJCOT-V3I8P104 |
9 |
Pre-eminent Multi-path routing with maximum resource utilization in traffic engineering approach
- S.Venkata krishna Kumar, T.Sujithra
|
IJCOT-V3I8P107 |
10 |
New Online Modules Model of Software Copy Protection in Serial-Based Method
- Bhawana Parihar , Neha Bora
|
IJCOT-V3I8P108 |
11 |
Breast Cancer Detection In Mammogram Images Using Region-Growing And Contour-Based Segmentation Techniques
- D. Sujitha Priya , Dr. B. Sarojini
|
IJCOT-V3I8P109 |
12 |
Intrusion Detection System Using Fuzzy Inference System
- Harikishan ,P.Srinivasulu
|
IJCOT-V3I8P110 |
13 |
Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems
- P.Vadivelmurugan , K.Alagarsamy
|
IJCOT-V3I8P112 |