Home
Call for Papers
Editorial Board
Reviewer Board
Guidelines for Authors
Paper Submission
Registration
Publications
Indexing
About Journal
Contact Us
All Publications
Volume 1, Issue 1 - Feb 2014
Volume 1, Issue 2 - March 2014
Volume 1, Issue 3 - April 2014
IJCAT Paper Publications
March 2014
Volume 1, Issue 2
Implementing Deletion Recovery on Android
Akhil C Joy
Arjun V
Mithun K
Shebix Xavier
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
01-07
Secure Sharing of Data over Cloud Computing using Different Encryption Schemes An Overview
Raseena M
Harikrishnan G R
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
08-11
Securing Images using Encryption Techniques A Survey
Vrinda A
Mr. Arun Anoop M
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
12-16
Clustering Methods of Web Pages: A Survey
Aliya Edathadathil
Syed Farook.K
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
17-20
Location Update Schemes in Mobile Ad Hoc Networks
Aqeela S Ummer
Sreekanth E S
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
21-23
Relative Study on Malayalam-English Translation using Transfer Based Approach
Shahana.I.L
Sharafudheen.K.A
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
24-29
Parallel Workload Scheduling in Cloud: A Survey
Shahabanath K K
Sreekesh Namboodiri T
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
30-33
Study on Security Breaches in Php Applications
Santosh Naidu P
Amulya Patcha
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
34-38
A Survey on Trust Management in Peer to Peer Systems
Manju John
Govindaraj.E
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
39-42
DDoS: Attack Analysis and Countermeasures
Sujina mol M S
Aneesh M Haneef
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
43-46
Cement Mill Feeder Control System
Mr.Ratnan P
Jithin Jose
Mohammed Rafi K.T
Yoosaf Nisar K
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
47-52
Self-Improved ODMP Protocol (ODMP-E)
Mr.Prashant B Kumbharkar
Dr. T R Sontakke
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
53-58
Securing Websites through Multi-CAPTCHA
Mr. Shaik Muhammed Manzoor
Mrs. Kumari R Soumya
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
59-62
A New Topology for Power Quality Improvement for Hybrid Wind, Solar and Diesel Generator Energy System using D-STATCOM
Umamaheswari.S
VigayaGowri.G
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
63-71
Modelling and Simulation of Pressure Sensitivity of Bragg Grating Sensor for Structural Health Monitoring Application
Bilkish Mondal
Dr. Preeta Sharan
Zakir Hussain
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
73-77
Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect
Aumreesh Saxena
Sourabh Singh
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
78-82
User Deadline Based Job Scheduling in Grid Computing
S.Gokul Dev
R.Lalith Kumar
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
83-90
Two Ways Security on Cloud Computing using Cryptography and Intrusion Detection: A Review
Tony Durgadas Jagyasi
Tony Durgadas Jagyasi
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
91-93
Modeling of Sigma-Delta Modulator Non- Idealities with Two Step Quantization in MATLAB/SIMULINK
Shashant Jaykar
Kuldeep Pande
Atish Peshattiwar
Abhinav Parkhi
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
94-99
A Distributed Method to Protect Disruption Tolerant Networks from the Effects of Packet Overflow
Shwetha T J
Resmi S
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
100-105
Electronic Toll Collection System for Efficient Traffic Control System using ANPR
Dr.M.Gomathi
V.Megala
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
106-113
Energy Economization using Multimedia Cloud Computing
Swati Tiwari
Praveen Sen
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
114-116
Fuzzy Logic Based Control of Wind Turbine Driven Squirrel Cage Induction Generator Connected to Grid
Vinayak Gaikwad
Harshit Dalvi
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
117-120
Towards A Statistical Context for Source Obscurity in Sensor Network
Lilavati Samant
Shrikanth N. G.
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
121-124
Design of 512 bitKeccak Hash Function Encryption for High Throughput Core
Ms. Sheetal C. Deshmukh
Ms.ApekshaV. Sakhare
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
125-128
Performance Analysis of Tree Classifiers using on Engineering Students Recruitment Dataset
Samrat Singh
Dr. Vikesh Kumar
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
129-137
Implementation of Least-Latency Routing over Time-Dependent Wireless Sensor Networks
Manju Priya G
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
138-144
Recognizing Character using Bayesian Network in Data Mining
Anver Muhammed.K.M
Radhakrishnan B
Shine Raj G
Jayakrishnan R
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
145-149
Rejection of Harmonics in LNA for Broadband Application
Saurabh Nimkar
Bhushan Vidhale
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
150-512
Emergency App using Voice Recognition
Tejas Panchbhai
Sonali Warhade
Vaishali Choudhary
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
153-157
Identification of Diabetic Retinopathy in Retinal Images using Support Vector Machine
Sneha Purusharthi
Bhakti Kurhade
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
158-167
Improvement of Transient Stability using Fuzzy Logic Controller for Permanent Magnet Wind Generator Connected to the Grid
H.S.Dalvi
Bushra Khan
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
168-172
Real-Time Eye Tracking System for People with Several Disabilities using Single Web Cam
Payal Ghude
Anushree Tembe
Shubhangi Patil
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
173-176
Design of Human Emotion Recognition System from Speech using Particle Swarm Optimization
Anjali Shelke
Sonali Joshi
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
177-182
Graphical Password Authentication
Ishwar Padade
Manoj Parate
Sanket Gharde
Mithil Wasnik
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
183-185
Analysis of Noise Exposure from Different Machines by Graph-Based Clustering Method
Amitava Kar
Pintu Pal
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
186-191
Preserving Source Location Privacy in Wireless Sensor Network
Lilavati Samant
Shrikanth N.G
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
192-195
Concealing Information using Image Steganography
Akanksha Pawar
Kunali Kharbikar
Gaurav Chaudhari
Amruta Belkhede
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
196-199
Private NUBE (Private Cloud for Particular Organization)
Sagar Bhandari
Arif Sheikh
Sunny Yadav
Ganesh Padole
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
200-204
Implementation of Modified RSA Cryptosystem Based on Offline Storage and Prime Number
Ms. Ritu Patidar
Mrs. Rupali Bhartiya
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
205-209
A Technique for Offline Handwritten Character Recognition
Shilpy Bansal
Mamta Garg
Munish Kumar
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
210-215
Android Help Alert System using Speech Recognition
Mohit Thulkar
Snehal Kardale
Rahul Sathawane
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
216-220
Power Quality Monitoring of Induction Motor using Lab VIEW
B. Ravi Teja
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
221-228
Implement a Mining Web Document through New Data Clustering Algorithm
Najim Sheikh
Kasim Ali Saiyed
Ajeet Malviya
Swapnil Sharma Dikshit
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
229-235
Selection of Accurate & Robust Model for Binary Classification Problems
Manu Banga
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
236-239
Feature Subset Selection Algorithm for High Dimensional Data using Fast Clustering Method
A.GowriDurga
A.Gowri Priya
Full Text Paper
| Year: March 2014
| Volume 1
Issue 2
| Pages
240-242
Contact
| Terms of Use
| Site Map
| Nondiscrimination Policy
| Help
IJCAT
Copyright © 2013 IJCAT - All rights reserved. Use of this website signifies your agreement to the terms and conditions