IJCOT - Volume 3 Issue 4 - 2013

S.No
Title/Author Name
Paper Id
1
IJCOT-V3I7P101
 2

Table Detection and Extraction from Image Document

Tanushree Dhiran, Rakesh Sharma

IJCOT-V3I7P102
 3

Image Steganography Using Dynamic LSB with Blowfish Algorithm

-Aishwary Kulshreshta , Ankur Goyal

 IJCOT-V3I7P103
 4

The Impact of ICT on Cost Efficiency in Higher Institutions in Nigeria 

- Dawodu Bamidele Friday , Osondu Mary C  

 IJCOT-V3I7P104
5
IJCOT-V3I8P101
 6

Role Of Clustering On Gene Data

 Mayilvaganan.M, Hemalatha R

IJCOT-V3I8P102
 7

Effective Searching Shortest Path In Graph Using Prim’s Algorithm  

D.Kalpanadevi    

 IJCOT-V3I8P103
 8

Face Recognition using Principle Component Analysis for Biometric Security System

Raman Kumar, Satnam Singh

 IJCOT-V3I8P104
 9

Pre-eminent Multi-path routing with maximum resource utilization in traffic engineering approach

- S.Venkata krishna Kumar, T.Sujithra 

 IJCOT-V3I8P107
 10

New Online Modules Model of Software Copy Protection in Serial-Based Method

- Bhawana Parihar , Neha Bora  

 IJCOT-V3I8P108
 11

Breast Cancer Detection In Mammogram Images Using Region-Growing And Contour-Based Segmentation Techniques 

- D. Sujitha Priya , Dr. B. Sarojini 

 IJCOT-V3I8P109
 12

Intrusion Detection System Using Fuzzy Inference System

- Harikishan ,P.Srinivasulu

 IJCOT-V3I8P110
 13

Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems

- P.Vadivelmurugan , K.Alagarsamy  

 IJCOT-V3I8P112