Category Archives: NCICCT – 2014 (Volume 2 – Issue 05)

🔒
Global Knowledge Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Speech Separation from Noises by using Deep Neural Network

View Abstract & full text pdf of Speech Separation from Noises by using Deep Neural Network

🏆
Quality Assured Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Video Forgery Recognition Using SIFT, SVD and DWT

View Abstract & full text pdf of Video Forgery Recognition Using SIFT, SVD and DWT

🌏
International Engineering Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Double Guard:securing Cloud Data By Intrusion Detection System

View Abstract & full text pdf of Double Guard:securing Cloud Data By Intrusion Detection System

🌏
Premier International Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Salt and Pepper Noise Removal in Digital Images Using Modified Decision Based Filter

View Abstract & full text pdf of Salt and Pepper Noise Removal in Digital Images Using Modified Decision Based Filter

Global Research Authority
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Efficient Implementation of Acoustic Echo Cancellation by Adaptive Neuro Fuzzy Inference System

View Abstract & full text pdf of Efficient Implementation of Acoustic Echo Cancellation by Adaptive Neuro Fuzzy Inference System

🔒
Global Engineering Publisher
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

A 3D Graphical Based Password Security

View Abstract & full text pdf of A 3D Graphical Based Password Security

Global Research Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Recursive Product Catalog Pattern Matching and Learning for Categorization of Products in Commercial Portal

View Abstract & full text pdf of Recursive Product Catalog Pattern Matching and Learning for Categorization of Products in Commercial Portal

Peer-Reviewed Excellence Hub
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Anti-Hacking Mechanism for Keylogger using Blackbox Detection

View Abstract & full text pdf of Anti-Hacking Mechanism for Keylogger using Blackbox Detection

🔒
International Knowledge Platform
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Secure Packet Transfer in a Network Using Hierarchical Scheduler with Crypto-Algorithm

View Abstract & full text pdf of Secure Packet Transfer in a Network Using Hierarchical Scheduler with Crypto-Algorithm

🔒
Global Research Authority
Serving Researchers Since 2012
IJERT-MRP IJERT-MRP

Energy Utilization and Data Gathering In Wireless Sensor Networks Using Mobile Sink

View Abstract & full text pdf of Energy Utilization and Data Gathering In Wireless Sensor Networks Using Mobile Sink