X

ICAC 2016 Track 2

Saturday, 22 October 2016 by

DN Searching Technique for Social Media Sites Review of Power Consumption for ADHOC Network WINDOW 10 ISSUE Nvidia Tegra 250 Devlopment Kit Iris Scanning: A Comprehensive Review of Identification and Verification Voice Sensing Technology Neural Interfacing Google Wave Smartphone Photography

Read more...

ICAC 2016 Track 1

Saturday, 22 October 2016 by

Cyber World-Digital Extension of Computer Loggers Content Based Image Retrieval Xbox 360system Wearable Gadgets Google Project Tango A Comparative Study of Various Security and Issues in Steganography Techniques Analysis Of Imbalanced Datasets Using Classification Based Techniques Different Aspects of Security:

Read more...

ICAC 2015 Track 4

Saturday, 22 October 2016 by

Analysis of Pollution of Ram Ganga River by Physicochemical Water Parameters Using Regression Analysis Revolution in the Educational Systems by Adopting Cloud Computing in Academic Environment An Approach for Modeling and Analysis of Mobile Agent-Based Software Systems Using UML Statecharts

Read more...

ICAC 2015 Track 3

Saturday, 22 October 2016 by

Multilevel Marketing Pyramid Selling Classification of search engine optimization techniques: A data mining approach Back Propagation Method for Comparing Face Entity with Database Human Errors finding methods using geneteic algoritms Software testing phases Impact on Security issues of Cloud Robots

Read more...

ICAC 2015 Track 2

Saturday, 22 October 2016 by

HIGH LEVEL SYNTHESIS OF A 2D-DWT SYSTEM ARCHITECTURE FOR JPEG 2000 USING FPGAs Analyzing online banking from banker’s perspective Selection of Robust Topology Design in Constrained Environment for Wireless Sensor Network A New LCTnMOS Technique for reduced the Leakage Power

Read more...

ICAC 2015 Track 1

Saturday, 22 October 2016 by

PEER – PEER PACKET PACKET AUTHENTICATION WITH DIGITAL SIGNATURE IN MOBILE ADHOC NETWORK Analysis and mining in social data using neighbors document clustering approach Network Lifetime Optimization Using ACO in Wireless Sensor Network Internet of Life (IoL) Android Based Application:

Read more...

ICAC 2014 Track 4

Saturday, 22 October 2016 by

Difficulty in Handling High Dimensional Data-Please Stand up Evaluate the Contents of Data Warehouse through Tool Causes of Human Errors in Information Security Information and Communication Technology:Booster Dose for Teaching and Learning Skills A Survey on Human Interaction in Meetings

Read more...

ICAC 2014 Track 3

Saturday, 22 October 2016 by

Automatic Ontology Acquisition and Learning A Survey of Fault Tolerance Techniques in Mobile Agents and Mobile Agent System An Elliptic Curve Based Lightweight Signcryption Scheme Using External Protocol Analysis of Big Data security and privacy SMART MEETING SYSTEM: AN APPROACH

Read more...

ICAC 2014 Track 2

Saturday, 22 October 2016 by

A Survey on Liquid Content Aware Image Resizing Technique Sign Language Problem And Solutions For Deaf And Dumb People A review to assess opportunities and security risk challenges in Cloud Computing Remote Sensed Image Analysis for feature extraction using Color

Read more...

ICAC 2014 Track 1

Saturday, 22 October 2016 by

A Study on Role of Smart Phone Applications in Implementing E-Health Services in Uttarakhand Crime Records Management System Cloud Computing Security: Issues And Challenges AN ANALYTICAL STUDY OF ARTIFICIAL NEURAL NETWORK APPLICATION IN MEDICINAL FIELD Review Paper on analysing the

Read more...

Get Social:

TOP