ICAIT-2013

Home >> Special Issue

International Conference on Advancement in Information Technology(ICAIT-2013)

S.No. Title & Authors Page Downloads
1. Computational Prediction of MicroRNAs from Chromosome no. 3 & 4 of Plasmodium vivax
Ranojit Sarker, Ujjwal Maulik
01-06 pdf
2. Proposing an Idea for Multi-Way Data Replication Using a Swarm Intelligence in Current Data Centre Practices
Mandeep Dhalor, Ekta Arora, Mudit Khaneja
07-10 pdf
3. Influence Quantification of Online Review Comments
Debanjan Banerjee, BikromadittyaMondal
11-14 pdf
4. Data Mining: An analysis to predict academic performance of students based on varying factors
Shruti Bijawat, Deepak Moud
15-19 pdf
5. Grouping-Based Job Scheduling in Cloud computing using Ant Colony Framework
Madhusree Kuanr, Prithviraj Mohanty, Suresh Chandra Moharana
20-25 pdf
6. Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation
Paramvir Kaur, Sukhwinder Sharma
26-30 pdf
7. An Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data
Sanjay Tiwari, Chandresh Bakliwal, Chitra Garg
31-36 pdf
8. Word Proximity Integration in Word Cloud
Ansuya Ahluwalia, Chaitanya, Shailendra Singh
37-41 pdf
9. Comparison of Bit Error Rate Performance Measure of Robust
Watermarking Scheme Based On Self-Fractional Fourier Functions, Empirical Mode Decomposition and Cyclic Encoding
J. B. Sharma, K.K. Sharma, Vineet Sahula
42-47 pdf
10. Automatic Extraction of Human Gait Feature for Recognition
Sonia Das, Sukadev Meher
48-54 pdf
11. Feature Extraction in Content Based Image Retrieval: A Review
Ajay Kumar Bansal, Swati Mathur
55-61 pdf
12. Face Recognition Techniques: A Review
Ajay Kumar Bansal, Pankaj Chawla
62-69 pdf
13. A Novel Economic Barrier Coverage Using Wireless Networks
AbdelRahman A. Eldosouky, Ahmed Abdul-Monem Ahmed, Ibrahim E. Ziedan
70-75 pdf
14. An Approach to Attain Reliable Query Processing by Obstructing SQL Injection Attack
Pradeep Natani, Dolly Chandani, Kishor Kumar Mali, Meenakshi Kothari, Shweta Agrawal
76-79 pdf
15. A Proposed Alternative Approach for Intrusion Detection System for AD-Hoc Networks using Decision Trees and Binomial Heap
Srivastava Sumit(Dr.), Maheshwari Shashikant
80-82 pdf
Top