IJCA
  • Home
  • Archives
  • Register
  • Login
    Flag icon
  1. Home
  2. Archives
  3. Volume 28
  4. Issue 5
i

This site uses cookies. We do not share information about your use of our site with any partners including Google Scholar or Web of Science. Visit our privacy policy for more information.

Issue 5 of Volume 28

Performance Evaluation of Bypassing Array Multiplier with Optimized Design

Authors: N.Ravi, Dr.T.S.Rao, Dr.T.J.Prasad

Investigation of Probabilistic Graphical Model Algorithms for Palm print Verification

Authors: K.Krishneswari, S.Arumugam

A Performance Study of Proactive, Reactive and Hybrid Routing Protocols using Qualnet Simulator

Authors: Subramanya Bhat.M, Shwetha.D, Devaraju.J.T

Implementation of Agent-Based Simulation for Database Security

Authors: Rashmi M Jogdand, Swapna S Banasode

A Quantitative Survey of various Fingerprint Enhancement techniques

Authors: Kumud Arora, Dr.Poonam Garg

Alternate Approach for Implementation of SHA-2 Algorithm using Feed forward Neural Network

Authors: Prof.V R Kulkarni, Dr. S S Apte

A Comprehensive Study of the Behavior of Different TCP Variants using Multistate Error Model in Cellular Mobile Environment

Authors: S. M. Hasan Sazzad Iqbal, Md. Amran Siddiqui, Shaiful Alam Chowdhury, Md. Rounok Salehin

Design of Homogeneous Multi-Core based Vehicular Embedded Controller

Authors: Rahul K. Hiware, Abhijit S. Titarmare, Dr. Dinesh Padole, Dr. Preeti Bajaj

Journal platform powered by
PhDFocus®
A to Z of Journal Management
API powered by
Web of Science™
PhDFocus® is compliant with United States Education Policy. A part of Foundation of Computer Science, USA © PhDFocus 2009 - 2026
About PhDFocus®
  • Contact Us
  • FAQ
  • Documentation
  • Privacy
  • Terms
  • Return & Refund