IJCA
  • Home
  • Archives
  • Register
  • Login
    Flag icon
  1. Home
  2. Archives
  3. Volume 64
  4. Issue 18
i

This site uses cookies. We do not share information about your use of our site with any partners including Google Scholar or Web of Science. Visit our privacy policy for more information.

Issue 18 of Volume 64

Implementation of Black Hole Security Attack using Malicious Node for Enhanced - DSR Routing Protocol of MANET

Authors: Rooshabh Kothari, Deepak Dembla

Fuzzy Weighted Gaussian Mixture Model for Feature Reduction

Authors: Charles. S, L. Arockiam

Facial Expression Recognition by Statistical, Spatial Features and using Decision Tree

Authors: Nazil Perveen, Darshan Kumar, Ishan Bhardwaj

Performance Evaluation of Add-On Security Services Incorporated on Business Services

Authors: Thirumaran. M, Dhavachelvan. P, Aishwarya. D, Shanmugapriya. R

Single Image Super-Resolution via Non Sub-sample Contourlet Transform based Learning and a Gabor Prior

Authors: Amisha J. Shah, Rujul Makwana, Suryakant B. Gupta

Performance Efficiency of Quantization using HSV Colour Space and Vector Cosine Angle Distance in CBIR with Different Image Sizes

Authors: S. Niranjanan, S. P. Raja Gopalan

Finding All Occurrences of a Pattern by a Genetic Algorithm Based Divide-and-Conquer Method

Authors: Sagnik Banerjee, Tamal Chakrabarti, Devadatta Sinha

Meta-Heuristic based Adaptation Engine for Cognitive Radio Systems

Authors: Ramy A. Fathy, Ahmed A. Abdelhafez, Abdelhalim Zekry

Journal platform powered by
PhDFocus®
A to Z of Journal Management
API powered by
Web of Science™
PhDFocus® is compliant with United States Education Policy. A part of Foundation of Computer Science, USA © PhDFocus 2009 - 2026
About PhDFocus®
  • Contact Us
  • FAQ
  • Documentation
  • Privacy
  • Terms
  • Return & Refund