Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal on Computer Science and Engineering

ISSN: 0975--3397
Publisher: Engg Journals Publications


ADD TO MY LIST
 
Purchase Decision for ATUR Broadband Network PDF available

Author(s): Chung Yeh | Wen-Chin Liu | Rang-Shing Ting
Volume: 5
Issue: 9
Year: 2013
Mathematical Formula Recognition and Transformation to a Linear Format Suitable for Vocalization PDF available

Author(s): Azadeh Nazemi | Iain Murray
Volume: 5
Issue: 9
Year: 2013
Observer Design for Simultaneous State and Faults Estimation PDF available

Author(s): Wafa JAMEL | Atef KHEDHER | Nasreddine BOUGUILA | Kamel BEN OTHMAN
Volume: 5
Issue: 9
Year: 2013
An Efficient Autoadaptive Edge Detection Approach for Flame and Fire Images PDF available

Author(s): D. Baswaraj | D. Swarna Sree | Dr. A. Govardhan | Dr. P. Premchand
Volume: 5
Issue: 9
Year: 2013
USER INTEREST LEVEL BASED PREPROCESSING ALGORITHMS USING WEB USAGE MINING PDF available

Author(s): R. Suguna | Dr. D. Sharmila
Volume: 5
Issue: 9
Year: 2013
SEGMENTATION OF CT SCAN LUMBAR SPINE IMAGE USING MEDIAN FILTER AND CANNY EDGE DETECTION ALGORITHM PDF available

Author(s): E.Punarselvam | Dr.P.Suresh | R.Parthasarathy
Volume: 5
Issue: 9
Year: 2013
INTERNAL COMPACT PRINTED LOOP ANTENNA WITH MATCHING ELEMENT FOR LAPTOP APPLICATIONS PDF available

Author(s): Shakti S Chauhan | R.P.S. Gangwar | Abhay Sharma
Volume: 5
Issue: 9
Year: 2013
Improvised Interpolation of Contour Lines Using Spider Weaving Approach PDF available

Author(s): Mohan P Pradhan | M K Ghose
Volume: 5
Issue: 9
Year: 2013
SURVEY OF DIGITAL WATERMARKING USING DCT PDF available

Author(s): Usha Pal | Dinesh Chandra
Volume: 4
Issue: 9
Year: 2012
Prediction of Association among Numerical Aptitude, Programming Skills, Trait Emotional Intelligence on Students Performance PDF available

Author(s): V. Maria Antoniate Martin | T.Lucia Agnes Beena
Volume: 4
Issue: 9
Year: 2012
An Enhanced Active contour based Segmentation for Fingerprint Extraction PDF available

Author(s): S.Uma maheswari | Dr.E.Chandra
Volume: 4
Issue: 9
Year: 2012
Design of Anomaly Detection System for Outlier Detection in Hardware Profile Using PCA PDF available

Author(s): Hari Om | Tanmoy Hazra
Volume: 4
Issue: 9
Year: 2012
A Survey paper: Data Security in Local Networks Using Distributed Firewalls PDF available

Author(s): Sneha Sahare | Mamta Joshi | Manish Gehlot
Volume: 4
Issue: 9
Year: 2012
Energy-Balanced Transmission Policies for Wireless Sensor Networks PDF available

Author(s): Y.Aswini | S.P.Anandaraj | V. Ramana | S.P.Poornima
Volume: 4
Issue: 9
Year: 2012
E-Cash Payment Protocols PDF available

Author(s): Shweta Srivastava | Vandana Saraswat
Volume: 4
Issue: 9
Year: 2012
Frequent Pattern Mining using CATSIM Tree PDF available

Author(s): Ketan Modi | B.L.Pal
Volume: 4
Issue: 9
Year: 2012
Localization of Mobile Nodes in Wireless Networks with Correlated in Time Measurement Noise PDF available

Author(s): K.Anusha | Manohar Gosul | G. Dileep Kumar
Volume: 4
Issue: 9
Year: 2012
Optimization of ETL Work Flow in Data Warehouse PDF available

Author(s): Kommineni Sivaganesh | P Srinivasu | Dr Suresh Chandra Satapathy
Volume: 4
Issue: 9
Year: 2012
Approaches for Intelligent Traffic System: A Survey PDF available

Author(s): Pratishtha Gupta | G.N Purohit | Amrita Dadhich
Volume: 4
Issue: 9
Year: 2012
Optimization Technique for Maximization Problem in Evolutionary Programming of Genetic Algorithm in Data Mining PDF available

Author(s): R. Karthick | S.Saravanan | M.VetriSelvan
Volume: 4
Issue: 9
Year: 2012
An Efficient Method for Digital Image Watermarking Based on PN Sequences PDF available

Author(s): Shivani Garg | Ranjit Singh
Volume: 4
Issue: 9
Year: 2012
Noise Control in Industries by Adaptive MDCT Method PDF available

Author(s): G.Suresh
Volume: 4
Issue: 9
Year: 2012
A note on Quantum Cryptography PDF available

Author(s): G. Ananda Rao | Muduganti Rathan Reddy | Y.Srinivas | J.Vijayasekhar | N.Vamsi Krishna | Ramakrishna Jaliparthi | V Manoj Shekhar | Venu Saggurthi | S. Usha Rani
Volume: 4
Issue: 9
Year: 2012
A Classification Technique for Microarray Gene Expression Data using PSO-FLANN PDF available

Author(s): Jayashree Dev | Sanjit Kumar Dash | Sweta Dash | Madhusmita Swain
Volume: 4
Issue: 9
Year: 2012
Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs PDF available

Author(s): Poonam Pahuja | Sanjay Pahuja | Dr. Tarun Shrimali
Volume: 4
Issue: 9
Year: 2012
A NEW PROCESS MODEL FOR EMBEDDED SYSTEMS CONTROL FOR TELECOM INDUSTRY PDF available

Author(s): Sanjai Gupta | Mohammed Hussain
Volume: 4
Issue: 9
Year: 2012
MINING THE INVESTOR’S PERCEPTION ABOUT DIFFERENT INVESTMENT OPTIONS USING CLUSTERING ANALYSIS PDF available

Author(s): Gunjan Batra | Vijaylaxmi | Anisha Gupta
Volume: 4
Issue: 9
Year: 2012
K-Partition Model for Mining Frequent Patterns in Large Databases PDF available

Author(s): Nidhi Sharma | Anju Singh
Volume: 4
Issue: 9
Year: 2012
Signature Verification Using Neural Network PDF available

Author(s): Manoj Kumar
Volume: 4
Issue: 9
Year: 2012
EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT PDF available

Author(s): Jasmin James | Dr. Bhupendra Verma
Volume: 4
Issue: 9
Year: 2012
Audio Watermarking Based On The PSK Modulation PDF available

Author(s): Wahid Barkouti | Sihem Nasri | Adnane Cherif
Volume: 3
Issue: 9
Year: 2011
Development of Behavioral Based System from Sports Video PDF available

Author(s): S.Muthu lakshmi | N. Akila Banu | Dr G.V.Uma
Volume: 3
Issue: 9
Year: 2011
Optimization of fuzzy multi-company workers assignment problem with penalty using genetic algorithm PDF available

Author(s): M. Esmaieli | N. Shahsavari Pour | R. Esmaieli
Volume: 3
Issue: 9
Year: 2011
Demographic Data Assessment using Novel 3DCCOM Spatial Hierarchical Clustering: A Case Study of Sonipat Block, Haryana PDF available

Author(s): Mamta Malik | Dr. Parvinder Singh | Dr. A. K. Sharma
Volume: 3
Issue: 9
Year: 2011
Study of Efficient Technique Based On 2D Tsallis Entropy For Image Thresholding PDF available

Author(s): Mohamed. A. El-Sayed | S. Abdel-Khalek | Eman Abdel-Aziz
Volume: 3
Issue: 9
Year: 2011
DISCOVERING AND VALIDATING MISSING LINKS IN THE INTERNET TOPOLOGY PDF available

Author(s): S. Ravichandran | A.Vijayaraj
Volume: 3
Issue: 9
Year: 2011
Abstract Model of Fault Tolerance Algorithm in Cloud Computing Communication Networks PDF available

Author(s): Pardeep Kumar | Shiv Kumar Gupta
Volume: 3
Issue: 9
Year: 2011
Search Engine Optimization through Spanning Forest Generation Algorithm PDF available

Author(s): SANTOSH KUMAR GANTA | SATYA PAVAN KUMAR SOMAYAJULA
Volume: 3
Issue: 9
Year: 2011
GA Based Test Case Generation Approach for Formation of Efficient Set of Dynamic Slices PDF available

Author(s): Debasis Mohapatra
Volume: 3
Issue: 9
Year: 2011
ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION PDF available

Author(s): Meenu | Prabhat Kumar Pankaj | Tarkeshwar Nath
Volume: 3
Issue: 9
Year: 2011
Efficient Implementation of Data Aggregation in WSNs by Mobile Agent Paradigm PDF available

Author(s): N.Sandhya rani | O. Srinivasa Rao | Dr MHM Krishna Prasad
Volume: 3
Issue: 9
Year: 2011
Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks PDF available

Author(s): S. P. Manikandan | Dr. R. Manimegalai
Volume: 3
Issue: 9
Year: 2011
A Quantitative Measure for Object Oriented Design Approach for Large-Scale Systems PDF available

Author(s): Ms. Poornima U S
Volume: 3
Issue: 9
Year: 2011
An Exact Algorithm for Multi – Product Bulk Transportation Problem PDF available

Author(s): Purusotham, S | Sundara Murthy, M
Volume: 3
Issue: 9
Year: 2011
AN ADIABATIC APPROACH FOR LOW POWER FULL ADDER DESIGN PDF available

Author(s): Praveer Saxena | Prof. Dinesh Chandra | Sampath Kumar V
Volume: 3
Issue: 9
Year: 2011
Processor-Directed Cache Coherence Mechanism – A Performance Study PDF available

Author(s): H. Sarojadevi | S. K. Nandy
Volume: 3
Issue: 9
Year: 2011
Research on Compound Display Connections to ARM Based Processors PDF available

Author(s): Deepak Chamarthi | T J V Subrahmanyeswara Rao
Volume: 3
Issue: 9
Year: 2011
S-boxes generated using Affine Transformation giving Maximum Avalanche Effect PDF available

Author(s): Chandrasekharappa T.G.S. | Prema K.V. | Kumara Shama
Volume: 3
Issue: 9
Year: 2011
SSM-DBSCANand SSM-OPTICS : Incorporating a new similarity measure for Density based Clustering of Web usage data. PDF available

Author(s): Ms K.Santhisree | Dr. A Damodaram
Volume: 3
Issue: 9
Year: 2011
Correlating Dimensions of Inheritance Hierarchy with Complexity & Reuse PDF available

Author(s): Nasib S. Gill | Sunil Sikka
Volume: 3
Issue: 9
Year: 2011
IMPROVING SECURITY IN INITIAL NETWORK ENTRY PROCESS OF IEEE 802.16 PDF available

Author(s): Prof. Pranita K. Gandhewar | Prof. Prasad P. Lokulwar
Volume: 3
Issue: 9
Year: 2011
SCARP: Secure Congestion Aware Routing Protocol for Wireless Sensor Networks PDF available

Author(s): Ch.Radhika Rani | S.Nagendram | Subba Reddy Oota
Volume: 3
Issue: 9
Year: 2011
PRE-DIAGNOSIS OF LUNG CANCER USING FEED FORWARD NEURAL NETWORK AND BACK PROPAGATION ALGORITHM PDF available

Author(s): Mr. Abhinav Vishwa | Ms. Alka Vishwa | Prof. Archana Sharma
Volume: 3
Issue: 9
Year: 2011
An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks PDF available

Author(s): P.Sivanesan | Dr.S.Thangavel
Volume: 3
Issue: 9
Year: 2011
Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network PDF available

Author(s): Dr.S.Senthil Kumar | V.Ponniyin Selvan
Volume: 3
Issue: 9
Year: 2011
Email Spam Filtering using Supervised Machine Learning Techniques PDF available

Author(s): V.Christina, | S.Karpagavalli | G.Suganya
Volume: 2
Issue: 9
Year: 2010
Automated Transformation of Distributed Software Architectural Models to Finite State Process PDF available

Author(s): Omid Bushehrian, | Hassan Ghaedi | Reza Ghanbari Baghnavi
Volume: 2
Issue: 9
Year: 2010
Study on Identification of Harmonic Contributions Between Utility and Customer PDF available

Author(s): SVD Anil Kumar | Dr.K.Ramesh Reddy
Volume: 2
Issue: 9
Year: 2010
Clustering Mixed Data Points Using Fuzzy C-Means Clustering Algorithm for Performance Analysis PDF available

Author(s): T.Velmurugan, | T.Santhanam
Volume: 2
Issue: 9
Year: 2010
Integrations of Remote Sensing and GIS to Land Use and Land Cover Change Detection of Coimbatore District PDF available

Author(s): Dr.S. Santhosh Baboo | M.Renuka Devi
Volume: 2
Issue: 9
Year: 2010
Product Assembly Sequence Optimization Based on Genetic Algorithm PDF available

Author(s): Azman Yasin, | Nurnasran Puteh, | Ruslizam Daud, | Mazni Omar | Sharifah Lailee Syed-Abdullah
Volume: 2
Issue: 9
Year: 2010
College of Computers and Information Technology Taif University, Taif, Saudi Arabia PDF available

Author(s): Zhamri Che Ani | Azman Yasin | Mohd Zabidin Husin, | Zauridah Abdul Hamid
Volume: 2
Issue: 9
Year: 2010
Relational Peer Data Sharing Settings and Consistent Query Answers PDF available

Author(s): Mehedi Masud | Sultan Aljahdali
Volume: 2
Issue: 9
Year: 2010
Automatic Recommendation of Web Pages in Web Usage Mining PDF available

Author(s): C.P. Sumathi | R. Padmaja Valli, | T. Santhanam
Volume: 2
Issue: 9
Year: 2010
Efficiency of K-Means Clustering Algorithm in Mining Outliers from Large Data Sets PDF available

Author(s): Sridhar. A | Sowndarya. S
Volume: 2
Issue: 9
Year: 2010
Wavelet Features Based War Scene Classification using Artificial Neural Networks PDF available

Author(s): S.Daniel Madan Raja, | Dr.A.Shanmugam
Volume: 2
Issue: 9
Year: 2010
A SURVEY OF CALL MARKET (DISCRETE) AGENT BASED ARTIFICIAL STOCK MARKETS PDF available

Author(s): PN Kumar, | Ashutosh Jha | Gautham TK, | Jitesh Mohan | Rama Subramanian AJ | VP Mohandas
Volume: 2
Issue: 9
Year: 2010
Scalability Performance of MANET Routing Protocols with Reference to Variable Pause Time PDF available

Author(s): Asha Ambhaikar | H.R. Sharma | V.K.Mohabey
Volume: 2
Issue: 9
Year: 2010
A Context-Dependent Trust Model for the MAC Layer in LR-WPANs Bernardo M. David, Beatriz Santana, Laerte Peotta, Marcelo D. Holtz, PDF available

Author(s): Rafael Timóteo de Sousa Jr | Bernardo M. David, | Beatriz Santana | Laerte Peotta, | Marcelo D. Holtz,
Volume: 2
Issue: 9
Year: 2010
Sports Video Summarization using Priority Curve Algorithm PDF available

Author(s): K Susheel Kumar, | Shitala Prasad | Santosh Banwral, | Vijay Bhaskar Semwa
Volume: 2
Issue: 9
Year: 2010
Multiframe Image Super-resolution – A Comparison PDF available

Author(s): Vishal R. Jaiswal, | Suhas H. Patil | Girish P. Potdar | Shrishail T. Patil
Volume: 2
Issue: 9
Year: 2010
A Genetic Algorithm Optimized Decision Tree-SVM based Stock Market Trend Prediction System PDF available

Author(s): Binoy B. Nair | V.P Mohandas | N.R. Sakthivel
Volume: 2
Issue: 9
Year: 2010
Clustered Chain based Power Aware Routing (CCPAR) Scheme for Wireless Sensor Networks PDF available

Author(s): Koushik Majumder | Subir Kumar Sarkar
Volume: 2
Issue: 9
Year: 2010
Overload Identification for Multiprocessor in Real Time System PDF available

Author(s): JESTIN RAJAMONY, | Dr. K.RAMAR | K.P.AJITHA GLADIS
Volume: 2
Issue: 9
Year: 2010
Classification of Indian Stock Market Data Using Machine Learning Algorithms PDF available

Author(s): Sneha Soni, | Shailendra Shrivastava
Volume: 2
Issue: 9
Year: 2010
Reducing Dataset Size in Frequency Domain for Brain Computer Interface Motor Imagery Classification PDF available

Author(s): Ch.Aparna | Dr J.V.R.Murthy, | Dr.B.Raveendra Babu, | M.V.P.Chandra Sekhara Rao
Volume: 2
Issue: 9
Year: 2010
Technical challenges and Constraints for Spectrum Planning in GSM networks PDF available

Author(s): Gaurav Kumar Nigam
Volume: 2
Issue: 9
Year: 2010
Unsupervised Hybrid Classification for Texture Analysis Using Fixed and Optimal Window Size PDF available

Author(s): S.S SREEJA MOLE | Dr.L.GANESAN
Volume: 2
Issue: 9
Year: 2010
DYNAMIC WAVELENGTH ALLOCATION IN WDM OPTICAL NETWORKS PDF available

Author(s): E. Kavitha | Dr.D.Sreenivasa Rao
Volume: 2
Issue: 9
Year: 2010
Business Process Requirement Engineering PDF available

Author(s): Atsa Etoundi Roger, | Fouda Ndjodo Marcel | Atouba Christian Lopez
Volume: 2
Issue: 9
Year: 2010
Query Optimization on Compressed and Decompressed Object-Oriented Database Using Operators PDF available

Author(s): Abhijit Banubakode, | Haridasa Acharya
Volume: 2
Issue: 9
Year: 2010
DATA WAREHOUSING, DATA MINING, OLAP AND OLTP TECHNOLOGIES ARE ESSENTIAL ELEMENTS TO SUPPORT DECISION-MAKING PROCESS IN INDUSTRIES PDF available

Author(s): G.SATYANARAYANA REDDY, | RALLABANDI SRINIVASU, | M. POORNA CHANDER RAO | SRIKANTH REDDY RIKKULA
Volume: 2
Issue: 9
Year: 2010
Service Composition in Service Oriented Product Line PDF available

Author(s): Fatemeh Mafi | Shahriar Mafi, | Mehran Mohsenzadeh
Volume: 2
Issue: 9
Year: 2010
Comparative Analysis of CBRP, DSR, AODV Routing Protocol in MANET PDF available

Author(s): Mukesh Kumar, | Rahul Rishi, | D.K. Madan
Volume: 2
Issue: 9
Year: 2010
A New Effective System for Filtering Pornography Videos PDF available

Author(s): Tarek Abd El-Hafeez
Volume: 2
Issue: 9
Year: 2010
A New System for Extracting and Detecting Skin Color Regions from PDF Documents PDF available

Author(s): arek Abd El-Hafeez
Volume: 2
Issue: 9
Year: 2010
Position-Based Clustering: An Energy-Efficient Clustering Hierarchy for Heterogeneous Wireless Sensor Networks PDF available

Author(s): Abderrahim BENI HSSANE | Moulay Lahcen HASNAOUI, | Mostafa SAADI | Said BENKIRANE
Volume: 2
Issue: 9
Year: 2010
A Framework for the View Selection Problem in Data Warehousing Environment PDF available

Author(s): B. Ashadevi, | Dr. P.Navaneetham, | Dr. R.Balasubramanian
Volume: 2
Issue: 9
Year: 2010
Image Mining Using Texture and Shape Feature PDF available

Author(s): Prof.Rupali Sawant
Volume: 2
Issue: 9
Year: 2010
Adjoint LMS (ALMS) Algorithm Based Active Noise Control with Feedback Path Modeling PDF available

Author(s): U Ramachandraiah, | M Singaperumal, | B Purniah
Volume: 2
Issue: 9
Year: 2010
Supervised Learning Approach for Spam Classification Analysis using Data Mining Tools PDF available

Author(s): R.Deepa Lakshmi | N.Radha
Volume: 2
Issue: 9
Year: 2010
A Survey of Energy Efficient Routing Protocols for Mobile Ad-hoc Networks PDF available

Author(s): Ajit Singh, Harshit Tiwari, | Alok Vajpayee, | Shiva Prakash
Volume: 2
Issue: 9
Year: 2010
Authenticated Routing Protocol Based on Reputation System For Adhoc Networks PDF available

Author(s): Preeti Nagrath, | Ashish kumar, | Shikha Bhardwaj
Volume: 2
Issue: 9
Year: 2010
Wireless Sensor Network (WSN): Architectural Design issues and Challenges PDF available

Author(s): Ajay Jangra | Swati | Richa, | Priyanka
Volume: 2
Issue: 9
Year: 2010
Person Identification Using Fingerprint by Hybridizing Core Point and Minutiae Features PDF available

Author(s): M. Ezhilarasan | D. Suresh Kumar, | S. Santhanakrishnan | S. Dhanabalan | A.Vinod
Volume: 2
Issue: 9
Year: 2010
Iris Recognition Based On Its Texture Patterns PDF available

Author(s): M. Ezhilarasan, | R. Jacthish | K.S. Ganabathy Subramanian, | R. Umapathy
Volume: 2
Issue: 9
Year: 2010
A Survey on Recent Security Trends using Quantum Cryptography PDF available

Author(s): T. Rubya | N. Prema Latha, | B. Sangeetha
Volume: 2
Issue: 9
Year: 2010
Medical Image Compression Using Biorthogonal Spline Wavelet With Different Decomposition PDF available

Author(s): Loganathan R | Dr.Y.S.Kumaraswamy
Volume: 2
Issue: 9
Year: 2010
Implementation of Featureset Reduced Symmetric Transform in Image Retrieval Optimized for FPGA PDF available

Author(s): C.Sriramakrishnan, | Dr. A. Shanmugam
Volume: 2
Issue: 9
Year: 2010
Chairperson and Secretarius Meeting Guides for Electronic Meeting Direction PDF available

Author(s): Gitesh K. Raikundalia
Volume: 2
Issue: 9
Year: 2010
A Novel approach for identifying greedy nodes in wireless sensor network by using EEGN algorithm PDF available

Author(s): S.Manju Priya | K.Thilagam, | K.Rama, | A.Jeevarathinam, | K.Lakshmi
Volume: 2
Issue: 9
Year: 2010
Symmetric-key Inter-domain end-to-end Authentication Protocols for Mobile System PDF available

Author(s): Rajarshi Roy Chowdhury, | Subramanian Azhaguvel
Volume: 2
Issue: 9
Year: 2010
A Survey on clustering Current status and challenging issues PDF available

Author(s): Rama.B, | Jayashree.P | Salim Jiwani
Volume: 2
Issue: 9
Year: 2010
MINING POSITIVE AND NEGATIVE ASSOCIATION RULES PDF available

Author(s): R.SUMALATHA | B. RAMASUBBAREDDY
Volume: 2
Issue: 9
Year: 2010
Medical Image Matching and Retrieval using Discrete Sine Transform PDF available

Author(s): SASI KUMAR.M | Dr.Y.S.KUMARSWAMY
Volume: 2
Issue: 9
Year: 2010
Stream Ciphers Encript Transformation PDF available

Author(s): Md Tanwir Uddin Haider, | Rajesh Kumar Sinha
Volume: 2
Issue: 9
Year: 2010
Association Analaysis in Wireless Network using Trace data PDF available

Author(s): L.Velmurugan, | Dr.P.Thangaraj
Volume: 2
Issue: 9
Year: 2010
A New Encryption Method for Secure Transmission of Images PDF available

Author(s): B.V.Rama Devi, | P.Prapoorna Roja | D.Lalitha Bhaskari | P.S.Avadhani
Volume: 2
Issue: 9
Year: 2010
Optimal Solution Strategy for Games PDF available

Author(s): Aman Pratap Singh
Volume: 2
Issue: 9
Year: 2010
Performance Analysis of Fault-Tolerant Irregular Baseline Multistage Interconnection Network PDF available

Author(s): Mamta Ghai, | Vinay Chopra, | Karamjit Kaur Cheema
Volume: 2
Issue: 9
Year: 2010
Autonomous Home Automated Hexapod Robot PDF available

Author(s): Addanki Purna Ramesh, | Ch Sesha Kiran Kumar
Volume: 2
Issue: 9
Year: 2010
Comparison of Digital Water Marking methods PDF available

Author(s): Darshana Mistry
Volume: 2
Issue: 9
Year: 2010
An Algorithm for Better Decision Tree PDF available

Author(s): T.Jyothirmayi, | Suresh Reddy
Volume: 2
Issue: 9
Year: 2010
Optimization of Composite Plates Based on Imperialist Competitive Algorithm PDF available

Author(s): Hamid Mozafari | Behzad Abdi, | Amran Ayob
Volume: 2
Issue: 9
Year: 2010
The Imperative Information Security Management System Measures In the Public Sectors of Ghana. A Case Study of the Ghana Audit Service PDF available

Author(s): Dr Ing Edward Opoku-Mensah | Christopher A Abilimi | Linda Amoako
Volume: 5
Issue: 8
Year: 2013
Locating ATMs in Urban Areas PDF available

Author(s): Mehdi MoradiTabar | Omid Bushehrian | Reza Askari Moghadam
Volume: 5
Issue: 8
Year: 2013
A Novel Biometric system for Person Recognition Using Palm vein Images PDF available

Author(s): S.Manikanda prabu | S.N.Sivanandam
Volume: 5
Issue: 8
Year: 2013
Analysis on Image Processing of Human Hip Joints during Lifting Using MAT Lab and ANSYS PDF available

Author(s): N. Sundaram | Dr. P. Suresh
Volume: 5
Issue: 8
Year: 2013
Mining Weighted Association Rule using FP – tree PDF available

Author(s): V.Vidya
Volume: 5
Issue: 8
Year: 2013
Cloud Computing: Securing Client Data Storage PDF available

Author(s): Mrs.Ashwini Prakash Sawant | Prof. Sandeep Vanjale | Mrs. Mousami Vanjale
Volume: 5
Issue: 8
Year: 2013
A Survey on Service Oriented Architecture and Metrics to Measure Coupling PDF available

Author(s): D. Vinay Babu | Manoj Prabhakar Darsi
Volume: 5
Issue: 8
Year: 2013
WebParF:A Web Partitioning Framework for Parallel Crawler PDF available

Author(s): Sonali Gupta | Komal Bhatia | Pikakshi Manchanda
Volume: 5
Issue: 8
Year: 2013
Modelisation of the maintenanceproduction couple by a graph of scheduling PDF available

Author(s): IDRISSI BADR | EL KIHEL BACHIR | Mohammed BADAOUI
Volume: 5
Issue: 8
Year: 2013
A Framework For An E-Learning System Based on Semantic Web PDF available

Author(s): Tarek M. Mahmoud | Tarek Abd-El-Hafeez | Ahmed Badawy
Volume: 5
Issue: 8
Year: 2013
Resource Scheduling in Hybrid Grid Environment PDF available

Author(s): Dr. N. Malarvizhi | Dr. N. Sankar Ram | Dr. V. Rhymend Uthariaraj
Volume: 4
Issue: 8
Year: 2012
Entropy Based Lossless Fractal Image Compression using Irregular Rectangular Partitions PDF available

Author(s): Jeet Kumar | Manish Kumar
Volume: 4
Issue: 8
Year: 2012
Security Enhancement of Dynamic System Using PID Controller and Optimization Algorithm PDF available

Author(s): Parul Dewangan | Somesh Kumar Dewangan | Jyotiprakash Patra
Volume: 4
Issue: 8
Year: 2012
Canonical Correlated Kernel PCA Method for Face Recognition PDF available

Author(s): N.NagaMounica | Ch.Ganapathy Reddy
Volume: 4
Issue: 8
Year: 2012
An Adaptive filter as Noise Cancellation by using LMS /Newton Algorithm PDF available

Author(s): Jaijit Singh Changotra | Ramanand Harijan
Volume: 4
Issue: 8
Year: 2012
Genetic Algorithms Based Solution To Maximum Clique Problem PDF available

Author(s): Harsh Bhasin | Rohan Mahajan
Volume: 4
Issue: 8
Year: 2012
Modeling a production system based on flow-shop electrical system PDF available

Author(s): H.SARIR | H.FARID | B.BENSASSI
Volume: 4
Issue: 8
Year: 2012
Effect of Obstacles in the formation of FoV based Clusters in Wireless Multimedia Sensor Network PDF available

Author(s): Dipika Gupta | Sneh Lata Aswal | Sandip K Chaurasiya
Volume: 4
Issue: 8
Year: 2012
Comparison of Pre-fetched Pages Before and After Path Completion PDF available

Author(s): Priyanka Makkar | Seema | Kirti Aggarwal
Volume: 4
Issue: 8
Year: 2012
Common Framework For Unix Scripting Languages PDF available

Author(s): Sumit Dubey | Kanchan Lata
Volume: 4
Issue: 8
Year: 2012
HSV Color Histogram and Directional Binary Wavelet Patterns for Content Based Image Retrieval PDF available

Author(s): P.Vijaya Bhaskar Reddy | Dr.A.Rama Mohan Reddy | K.Guru Jyotsna Devi
Volume: 4
Issue: 8
Year: 2012
Enhanced Component Retrieval Scheme Using Suffix Tree in Object Oriented Paradigm PDF available

Author(s): Karambir | Nisha
Volume: 4
Issue: 8
Year: 2012
A Note on Linear based Set Associative Cache address System PDF available

Author(s): Chandramowliswaran N | Srinivasan.S | Chandra Segar.T
Volume: 4
Issue: 8
Year: 2012
WWDC SERVER SOFTWARE INVENTORY MANAGEMENT AND AUTOMATION PDF available

Author(s): M . THANJAIVADIVEL | K. JOHN SINGH
Volume: 4
Issue: 8
Year: 2012
Effect of Modulation Schemes on Performance of OFDM based Wireless Network using Smart Antenna PDF available

Author(s): Mr.Balaji G.Hogade | Dr Shrikant K Bodhe | Mrs.Vrishali M Patil
Volume: 4
Issue: 8
Year: 2012
Clustering of Sedimentary Basins Using Associative Neural memories (ART2) PDF available

Author(s): LAKSHMIPRASAD BOPPANA | B.POORNA SATYANARAYANA
Volume: 3
Issue: 8
Year: 2011
SSM-DBSCANand SSM-OPTICS : Incorporating a new similarity measure for Density based Clustering of Web usage data. PDF available

Author(s): Ms K.Santhisree | Dr. A Damodaram
Volume: 3
Issue: 8
Year: 2011
Cluster Analysis Research Design model, problems, issues, challenges, trends and tools PDF available

Author(s): V.Ilango | Dr.R.Subramanian | Dr.V.Vasudevan
Volume: 3
Issue: 8
Year: 2011
PERFORMANCE ANALYSIS OF ADHOC ROUTING PROTOCOLS USING RANDOM WAYPOINT MOBILITY MODEL IN WIRELESS SENSOR NETWORKS PDF available

Author(s): Vivek Thaper | Bindyia Jain | Varsha Sahni
Volume: 3
Issue: 8
Year: 2011
Hidden Web Data Extraction Using Dynamic Rule Generation PDF available

Author(s): Anuradha | A.K Sharma
Volume: 3
Issue: 8
Year: 2011
A Survey on the Applications of Bee Colony Optimization Techniques PDF available

Author(s): Dr. Arvinder Kaur | Shivangi Goyal
Volume: 3
Issue: 8
Year: 2011
Estimation of Solar Radiation at a Particular Place: Comparative study between Soft Computing and Statistical Approach PDF available

Author(s): Bimal Datta | Srimanta Pal | Rohit Roy Chowdhury | Swagata Sarkar | Abhiroop Datta
Volume: 3
Issue: 8
Year: 2011
Load Balanced Routing using OSPF PDF available

Author(s): Mr. Ritesh Dayama | Mr. S. P. Pingat
Volume: 3
Issue: 8
Year: 2011
Virtual Energy-Efficient Encryption and Keying (VEEEK) for Wireless Sensor Networks PDF available

Author(s): K. Ravi Chythanya | S.P.Anandaraj. | S. Padmaja
Volume: 3
Issue: 8
Year: 2011
A Novel Search Engine to trace Medical Information Needs using Medical Domain Ontology PDF available

Author(s): M.Revati | K.Nageswara Rao | M.N.V.Kiran Babu | Kolikipogu Ramakrishna | Ch.Raja Jacob
Volume: 3
Issue: 8
Year: 2011
FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN PDF available

Author(s): S.Manikandaprabu | P.Kalaiyarasi
Volume: 3
Issue: 8
Year: 2011
Simulation of Urban Traffic Flow Using Personal Experience of Drivers PDF available

Author(s): Kosar Mohammadzade | Mohammad-Reza Feizi-Derakhshi
Volume: 3
Issue: 8
Year: 2011
M-Band Graphic Equalizer PDF available

Author(s): Prof. Ch.Srinivasa Kumar | Dr. P. Mallikarjuna Rao
Volume: 3
Issue: 8
Year: 2011
UEP based on Proximity Pilot Subcarriers with QAM in OFDM PDF available

Author(s): Tony Gladvin George | Dr.N.Malmurugan
Volume: 3
Issue: 8
Year: 2011
A Novel Benchmark K-Means Clustering on Continuous Data PDF available

Author(s): K. Prasanna | M. Sankara Prasanna Kumar | G. Surya Narayana
Volume: 3
Issue: 8
Year: 2011
Design Of An Automatic Speaker Recognition System Using MFCC, Vector Quantization And LBG Algorithm PDF available

Author(s): Prof. Ch.Srinivasa Kumar | Dr. P. Mallikarjuna Rao
Volume: 3
Issue: 8
Year: 2011
Supply and demand vs. price driven graphs financial data visualization PDF available

Author(s): M Siluvairajah
Volume: 3
Issue: 8
Year: 2011
Wireless Control LEGO NXT robot using voice commands PDF available

Author(s): David Be | Cinhtia González | Manuel Escalante | Michel García | Carlos Miranda | Sergio Gonzalez
Volume: 3
Issue: 8
Year: 2011
Migrations amid Generations of Wireless networks PDF available

Author(s): Harpreet kaur | Harsimarjeet Khurana
Volume: 3
Issue: 8
Year: 2011
Centroid-Point of Ranking Fuzzy Numbers and Its Application to Health Related Quality of Life Indicators PDF available

Author(s): Lazim Abdullah, | Nor Jamalina Jamal
Volume: 2
Issue: 8
Year: 2010
Supervised Learning Approach for Spam Classification Analysis using Data Mining Tools PDF available

Author(s): R.Deepa Lakshmi | N.Radha
Volume: 2
Issue: 8
Year: 2010
A Novel Approach for English to South Dravidian Language Statistical Machine Translation System PDF available

Author(s): Unnikrishnan P | Antony P J, | Dr. Soman K P
Volume: 2
Issue: 8
Year: 2010
Multicast Routing Protocols in Adhoc Mobile networks PDF available

Author(s): S.Nagaprasad, | A.VinayaBabu, | K.Madhukar, | B.Sujatha, | B.AnandKumar, | N.Veena | J.Sunitha
Volume: 2
Issue: 8
Year: 2010
Performance Evaluation of Ad Hoc On Demand Distance Vector in MANETs with varying Network Size using NS-2 Simulation PDF available

Author(s): Nilesh P. Bobade, | Nitiket N. Mhala
Volume: 2
Issue: 8
Year: 2010
Generating Membership Values And Fuzzy Association Rules From Numerical Data PDF available

Author(s): Dr.R.Radha, | Dr.S.P.Rajagopalan
Volume: 2
Issue: 8
Year: 2010
Novel Pattern Matching Algorithm for Single Pattern Matching PDF available

Author(s): Devaki Pendlimarri, | Paul Bharath Bhushan Petlu
Volume: 2
Issue: 8
Year: 2010
Analysis of Dependencies of Checkpoint Cost and Checkpoint Interval of Fault Tolerant MPI Applications PDF available

Author(s): Mallikarjuna Shastry P.M | K. Venkatesh
Volume: 2
Issue: 8
Year: 2010
A Simplified Methodology for Random Topology Generator builds in Ad Hoc Network Test Bed PDF available

Author(s): Nitiket N. Mhala | N. K. Choudhari
Volume: 2
Issue: 8
Year: 2010
A Comparative Analysis of Web Page Ranking Algorithms PDF available

Author(s): Dilip Kumar Sharma, | A. K. Sharma
Volume: 2
Issue: 8
Year: 2010
A Study on Similarity Computations in Template Matching Technique for Identity Verification PDF available

Author(s): Lam, S. K., | Yeong, | C. Y., | Yew, | C. T., | Chai | W. S. | Suandi, | S. A.
Volume: 2
Issue: 8
Year: 2010
MULTIMODAL BIOMETRICS BASED AUTHENTICATION AGAINST DICTIONARY ATTACKS PDF available

Author(s): P.Tamil Selvi | N.Radha
Volume: 2
Issue: 8
Year: 2010
Improved and Balanced LEACH for heterogeneous wireless sensor networks PDF available

Author(s): BEN ALLA Said | EZZATI abdellah, | Abderrahim BENI HSSANE, | Moulay Lahcen
Volume: 2
Issue: 8
Year: 2010
Regression and ARIMA hybrid model for new bug prediction PDF available

Author(s): Madhur Srivastava | Dr.Dharmendra Badal | Ratnesh Kumar Jain
Volume: 2
Issue: 8
Year: 2010
Design of a Hospital-Based Database System (A Case Study of BIRDEM) PDF available

Author(s): Rosina Surovi Khan, | Mohammad Saber
Volume: 2
Issue: 8
Year: 2010
Web Services Security Architectures Composition and Contract Design using RBAC PDF available

Author(s): D.Shravani | Dr.P.Suresh Varma | Dr.B.Padmaja Rani, | , Dr.D.Sravan Kumar, | M.Upendra Kumar
Volume: 2
Issue: 8
Year: 2010
Fuzzy Group Decision Making Using Surrogate Worth Trade-Off Method PDF available

Author(s): Iman Ghaleh Khondabi | Alireza Fallah Tafti
Volume: 2
Issue: 8
Year: 2010
Frequent Itemset mining over transactional data streams using Item-Order-Tree PDF available

Author(s): Pramod S., | O.P. Vyas
Volume: 2
Issue: 8
Year: 2010
Context Ontology Construction For Cricket Video PDF available

Author(s): Dr. Sunitha Abburu
Volume: 2
Issue: 8
Year: 2010
Improving Ad Hoc Network Performances by Estimating Available Bandwidth PDF available

Author(s): K. Mohideen Vahitha Banu
Volume: 2
Issue: 8
Year: 2010
Shodhika Bhashini Multilingual Search and TTS System PDF available

Author(s): Dr.K.V.N.Sunitha | M.Charan Teja
Volume: 2
Issue: 8
Year: 2010
An Useful Information Extraction using Image Mining Techniques from Remotely Sensed Image (RSI) PDF available

Author(s): Dr. C. Jothi Venkateswaran, | S. Murugan | Dr. N. Radhakrishnan
Volume: 2
Issue: 8
Year: 2010
Soil Classification by Generating Fuzzy rules PDF available

Author(s): P.Bhargavi | Dr. S. Jyothi
Volume: 2
Issue: 8
Year: 2010
A NEW PRUNING APPROACH FOR BETTER AND COMPACT DECISION TREES PDF available

Author(s): Ali Mirza Mahmood, | Pavani Kapavarapu | Venu Gopal Kavuluru, | Mrithyumjaya Rao Kuppa
Volume: 2
Issue: 8
Year: 2010
Augmentation of Block Truncation Coding based Image Retrieval by using Even and Odd Images with Sundry Colour Spaces PDF available

Author(s): Dr. H.B.Kekre | Sudeep D.Thepade | Varun Lodha, | Pooja Luthra, | Ajoy Joseph | Chitrangada Nemani
Volume: 2
Issue: 8
Year: 2010
Human Talent Prediction in HRM using C4.5 Classification Algorithm PDF available

Author(s): Hamidah Jantan, | Abdul Razak Hamdan | Zulaiha Ali Othman
Volume: 2
Issue: 8
Year: 2010
Frequent Item set Mining Using Global Profit Weight Algorithm PDF available

Author(s): ASHA RAJKUMAR, | G.SOPHIA REENA
Volume: 2
Issue: 8
Year: 2010
A Perspective Analysis of routing protocols in wireless sensor network PDF available

Author(s): V.Vasanthi, | P.Nagarajan | B.Bharathi, | Dr.M.Hemalatha
Volume: 2
Issue: 8
Year: 2010
Synergy between Object Recognition and Image Segmentation PDF available

Author(s): Y.Ramadevi, | B.Kalyani | T.Sridevi
Volume: 2
Issue: 8
Year: 2010
Concealing the Level-3 features of Fingerprint in a Facial Image PDF available

Author(s): Dr.R.Seshadri, | Yaswanth Kumar.Avulapati
Volume: 2
Issue: 8
Year: 2010
Strong Password Based EAP-TLS Authentication Protocol for WiMAX PDF available

Author(s): Anjani K.Rai, | Shivendu Mishra | Vimal Kumar
Volume: 2
Issue: 8
Year: 2010
A Comprehensive Assessment of Object-Oriented Software Systems Using Metrics Approach PDF available

Author(s): Sanjay Kumar Dubey | Prof. (Dr.) Ajay Rana
Volume: 2
Issue: 8
Year: 2010
BIOLOGICAL EARLY BRAIN CANCER DETECTION USING ARTIFICIAL NEURAL NETWORK PDF available

Author(s): G Vijay Kumar | Dr GV Raju
Volume: 2
Issue: 8
Year: 2010
Discovering suffixes: A Case Study for Marathi Language PDF available

Author(s): Mudassar M. Majgaonker | Tanveer J Siddiqui
Volume: 2
Issue: 8
Year: 2010
Compact Dual Polarization Lidar System description and data processing PDF available

Author(s): Y.Bhavani Kumar
Volume: 2
Issue: 8
Year: 2010
Identification and Removal of Impulsive noise using Hypergraph Model PDF available

Author(s): Karibasappa K.G, | K. Karibasappa
Volume: 2
Issue: 8
Year: 2010
An Automated Microcontroller Based Liquid Mixing System PDF available

Author(s): Dr.A.S.C.S.Sastry | K.N.H.Srinivas | Ch V S R G Krishna, | Ch.Sesha KiranKumar
Volume: 2
Issue: 8
Year: 2010
COMPARITIVE ANALYSIS OF FLLT AND JSEG PDF available

Author(s): Akila Victor
Volume: 2
Issue: 8
Year: 2010
HUNTING DOWN UNDO ISSUES WITH ORACLE: A PRACTICAL APPROACH PDF available

Author(s): Kamili Srinivas | Tanweer Khan | Ganti Siva
Volume: 2
Issue: 8
Year: 2010
AN IMPROVED DESIGN OF A MULTIPLIER USING REVERSIBLE LOGIC GATES PDF available

Author(s): H.R.BHAGYALAKSHMI | M.K.VENKATESHA
Volume: 2
Issue: 8
Year: 2010
Design and Implementation of a Three Dimensional CNC Machine PDF available

Author(s): Venkata Krishna Pabolu | Prof. Sri K.N.H. Srinivas
Volume: 2
Issue: 8
Year: 2010
SIMULATION BASED PLANNING FOR DESIGN OF WASHING MACHINE USING H/W & S/W CO DESIGN PDF available

Author(s): Rajesh Kumar Garg | Vikram Singh
Volume: 2
Issue: 8
Year: 2010
Fingerprint Verification System Using Support Vector Machine PDF available

Author(s): S. Adebayo Daramola | Tola Sokunbi | A.U Adoghe
Volume: 5
Issue: 7
Year: 2013
NODE ADDRESSING SCHEMES FOR SCALABLE ROUTING IN HIERARCHICAL WSN PDF available

Author(s): Mr.GANESH.S.PISE | Mr. VINOD. V.KIMBAHUNE
Volume: 5
Issue: 7
Year: 2013
Study of Speaker’s Emotion Identification for Hindi Speech PDF available

Author(s): Sushma Bahuguna | Y.P Raiwani
Volume: 5
Issue: 7
Year: 2013
Relaxed Median Filter: A Better Noise Removal Filter for Compound Images PDF available

Author(s): Zinat Afrose
Volume: 4
Issue: 7
Year: 2012
Provide a method to Prediction of nodes movement to optimize Routing Algorithms in Ad Hoc Networks PDF available

Author(s): Jahani Ebrahim | KHorshidi Sadegh
Volume: 4
Issue: 7
Year: 2012
Improvement in Word Sense Disambiguation by introducing enhancements in English WordNet Structure PDF available

Author(s): Deepesh Kumar Kimtani | Jyotirmayee Choudhury | Alok Chakrabarty
Volume: 4
Issue: 7
Year: 2012
Performance Comparison of Common Table Expressions and Cursors PDF available

Author(s): Sowndarya. S | Sridhar. A
Volume: 4
Issue: 7
Year: 2012
AN EFFECTIVE RETRIVAL SCHEME FOR SOFTWARE COMPONENT REUSE PDF available

Author(s): Vishal | Subhash Chander | Jasmer Kundu
Volume: 4
Issue: 7
Year: 2012
A Novel Approach for Compact Document Clustering PDF available

Author(s): Rachitha Sony Krotha | Madhavi Dabbiru
Volume: 4
Issue: 7
Year: 2012
Overview of techniques used for image resolution enhancement PDF available

Author(s): Mayuri D Patil | Prof. Surbhi Khare
Volume: 4
Issue: 7
Year: 2012
Dorsal Hand Vein Biometry by Independent Component Analysis PDF available

Author(s): V.H.Yadav | Prof.S.O.Rajankar
Volume: 4
Issue: 7
Year: 2012
Interference Reduction Technique in WCDMA using Cell Resizing PDF available

Author(s): N.Mohan | Dr. T. Ravichandran
Volume: 4
Issue: 7
Year: 2012
Visual Data Mining in Indian Election System PDF available

Author(s): Prof. T. M. Kodinariya | Mr. Ravi Seta
Volume: 4
Issue: 7
Year: 2012
FACE RECOGNITION FROM LOWER JAW OR MANDIBLE OF A HUMAN PDF available

Author(s): SOURAV GANGULY | SUBHAYAN ROY MOULICK
Volume: 4
Issue: 7
Year: 2012
Solving Travelling Salesman Problem using Clustering Genetic Algorithm PDF available

Author(s): R.SIVARAJ | Dr.T.RAVICHANDRAN | R.DEVI PRIYA
Volume: 4
Issue: 7
Year: 2012
Survey on FPGA Routing Techniques PDF available

Author(s): Ms. Nagalakshmi Venugopal | R. Manimegalai
Volume: 4
Issue: 7
Year: 2012
Gradual Evolution of Sequential Sequence Mining for Customer relation database PDF available

Author(s): Kiran Amin | J. S. Shah
Volume: 4
Issue: 7
Year: 2012
PALM: Preprocessed Apriori For Logical Matching Using Map Reduce Algorithm PDF available

Author(s): Narayan Gowraj | Srinivas Avireddy | Sruthi Prabhu
Volume: 4
Issue: 7
Year: 2012
Comparative Analysis of Reactive and Proactive Protocol of Mobile Ad-Hoc Network PDF available

Author(s): PUNEET KUMAR BHARDWAJ | SHIPRA SHARMA | VANDANA DUBEY
Volume: 4
Issue: 7
Year: 2012
Overview Of Various Overlapping Community Detection Approaches PDF available

Author(s): Pooja Chaturvedi
Volume: 4
Issue: 7
Year: 2012
A New Method for Finding an Optimal Solution for Transportation Problems PDF available

Author(s): Abdul Quddoos | Shakeel Javaid | M. M. Khalid
Volume: 4
Issue: 7
Year: 2012
An Efficient Agent-Based AODV Routing Protocol in MANET PDF available

Author(s): Preeti Bhati, | Rinki Chauhan, | R K Rathy, | Ritu Khurana
Volume: 3
Issue: 7
Year: 2011
ENERGY EFFICIENT DATA GATHERING SCHEME USING CROSS LAYER CLUSTER APPROACH FOR WIRELESS SENSOR NETWORKS PDF available

Author(s): NANDINI PRASAD K S, | G R VEERENDRA, | PUTTAMADAPPA C
Volume: 3
Issue: 7
Year: 2011
Betel Leaf Area Measurement Using Image Processing

Author(s): Sanjay B. Patil, | Dr. Shrikant K. Bodhe
Volume: 3
Issue: 7
Year: 2011
Various Schemes to Speed up the PC during Virus Scan PDF available

Author(s): Neha Bishnoi, | Prof. S.S Tyagi
Volume: 3
Issue: 7
Year: 2011
Semantic Web Services and Its Approaches PDF available

Author(s): Tauqeer Ahmad Usmani, | Prof. Durgesh Pant, | Prof. Kunwar Singh Vaisla
Volume: 3
Issue: 7
Year: 2011
Intelligent Public Transport Information System PDF available

Author(s): Mrs. Uma Nagaraj, | Mr. Rahul Wakade | Mr. Rahul Gaware, | Mr. Ranjit Dhame, | Mr. Dinesh Alhat
Volume: 3
Issue: 7
Year: 2011
An Evaluative Model for Information Retrieval System Evaluation: A Usercentered Approach PDF available

Author(s): Bernard I. Akhigbe, | Babajide S. Afolabi, | James I. Udo, | Emmanuel R. Adagunodo
Volume: 3
Issue: 7
Year: 2011
Effect of Quality Parameters on Energy Efficient Routing Protocols in MANETs PDF available

Author(s): Dr. R.K Singh | Tanu Preet Singh, | Jayant Vats
Volume: 3
Issue: 7
Year: 2011
IMPROVED HYBRID MODEL FOR DENOISING POISSON CORRUPTED XRAY IMAGESks PDF available

Author(s): N. Umadevi, | Dr. S.N.Geethalakshmi
Volume: 3
Issue: 7
Year: 2011
Trust Worthy Architecture Implementation for Mobile Ad hoc Networks PDF available

Author(s): D.Saravanan, | R.M.Chandrasekaran, | B.Vishnu Prabha, | V.R.Sarma Dhulipala
Volume: 3
Issue: 7
Year: 2011
SUPPORT VECTOR MACHINE BASED GUJARATI NUMERAL RECOGNITION PDF available

Author(s): Mamta Maloo | K.V. Kale
Volume: 3
Issue: 7
Year: 2011
Road Recognition for Vision Navigation of Robot by Using Computer Vision PDF available

Author(s): Jagadeesh Thati, | Fazal Noorbasha, | Syam Babu Vadlamudi
Volume: 3
Issue: 7
Year: 2011
Efficient Lossless Colour Image Compression Using Run Length Encoding and Special Character Replacement PDF available

Author(s): Debashis Chakraborty, | Soumik Banerjee
Volume: 3
Issue: 7
Year: 2011
Comparision Of Traditional Method of Histogram Equalisation with HSV and Kekre Transform for Content Based Image Retrieval PDF available

Author(s): Ms. Venu Shah, | Ms. Archana Choudhary, | Prof. Kavita Tewari
Volume: 3
Issue: 7
Year: 2011
Recoverable Timestamping Approach For Concurrency Control In Distributed Database PDF available

Author(s): Rinki chauhan, | Suman Malik, | R K Rathy, | Preeti Bhati
Volume: 3
Issue: 7
Year: 2011
Simulation and Analysis of Digital Video Watermarking Using MPEG-2 PDF available

Author(s): Dr. Anil Kumar Sharma, | Mr. Yunus Mohammed Pervej
Volume: 3
Issue: 7
Year: 2011
FP-Tree Based Algorithms Analysis: FPGrowth, COFI-Tree and CT-PRO PDF available

Author(s): Bharat Gupta | Dr. Deepak Garg
Volume: 3
Issue: 7
Year: 2011
A New Image Steganography Approach for Information Security Using Gray Level Images in Spatial Domain PDF available

Author(s): Rajkumar Yadav, | Ravi Saini | Kamaldeep
Volume: 3
Issue: 7
Year: 2011
TEMPORAL SEQUENTIAL PATTERN IN DATA MINING TASKS PDF available

Author(s): DR. NAVEETA MEHTA, | MS. SHILPA DANG
Volume: 3
Issue: 7
Year: 2011
A Review of Heuristics for Optimal Page Access Sequence with a Model for Spatial Queries PDF available

Author(s): Dr.Chandra.E, | Anuradha.V.P
Volume: 3
Issue: 7
Year: 2011
Achieving Improved Performance at Access Point in WLAN Infrastructure Mode PDF available

Author(s): Irfan Siddavatam
Volume: 3
Issue: 7
Year: 2011
DCF Improvement for Satisfactory Throughput of 802.11 WLAN PDF available

Author(s): Ashwini Dalvi, | Pamukumar Swamy, | B B Meshram
Volume: 3
Issue: 7
Year: 2011
Ant Colony Optimization approach for Solving FPGA routing with minimum Channel Width PDF available

Author(s): Vinay Chopra, | Amardeep Singh
Volume: 3
Issue: 7
Year: 2011
A Novel Approach for Text Categorization of Unorganized data based with Information Extraction PDF available

Author(s): Suneetha Manne, | Dr. S. sameen Fatima
Volume: 3
Issue: 7
Year: 2011
Accident Emergency Response And Routing Software (AERARS) using Genetic Algorithm PDF available

Author(s): Naveen Ramachandran, | G.Devi
Volume: 3
Issue: 7
Year: 2011
Iterative Enhanced Directional Based Demosaicking Algorithm PDF available

Author(s): A.Jayachandran , | Dr.R.Dhanasekaran, | Prof P. Rajan
Volume: 3
Issue: 7
Year: 2011
Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology PDF available

Author(s): B. Ravi Kumar, | Dr.P.R.K.Murti
Volume: 3
Issue: 7
Year: 2011
Molecular Database Generation for Type 2 Diabetes using Computational Science-Bioinformatics' Tools PDF available

Author(s): Gagandeep Kaur Grewal, | Dr. Amardeep Singh
Volume: 3
Issue: 7
Year: 2011
Simulator for Software Project Reliability Estimation PDF available

Author(s): Sanjana, | Dr. P.K. Suri
Volume: 3
Issue: 7
Year: 2011
An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining PDF available

Author(s): Yogendra Kumar Jain, | Vinod Kumar Yadav, | Geetika S. Panday
Volume: 3
Issue: 7
Year: 2011
SEGMENTATION OF OIL SPILL IMAGES USING IMPROVED FCM AND LEVEL SET METHODS. PDF available

Author(s): V.RADHIKA, | DR. G. PADMAVATHI
Volume: 3
Issue: 7
Year: 2011
A Comparative Study of Location Management Schemes: Challenges and Guidelines PDF available

Author(s): Vijendra Singh Bhadauria, | Sanjeev Sharma, | Ravindra Patel
Volume: 3
Issue: 7
Year: 2011
Flood Frequency Analysis Using the Gumbel Distribution PDF available

Author(s): Never Mujere
Volume: 3
Issue: 7
Year: 2011
Multi-agent Collaboration Engine for Supply Chain Management PDF available

Author(s): Sandeep Garg, | Dr. S.Srinivasan, | Vivek Jaglan
Volume: 3
Issue: 7
Year: 2011
Distinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules PDF available

Author(s): Sridevi.Ravada, | Vani prasanna.Kanakala, | Ramya.Koilada
Volume: 3
Issue: 7
Year: 2011
Problem Analysis of Routing Protocols in MANET in Constrained Situation PDF available

Author(s): Manish Bhardwaj, | Sachi Pandey, | R.P Mahapatra
Volume: 3
Issue: 7
Year: 2011
Linear Network Fractional Routing PDF available

Author(s): S.ASOKAN, | Dr.V.PALANISAMY
Volume: 3
Issue: 7
Year: 2011
DATA STREAM MINING ALGORITHMS – A REVIEW OF ISSUES AND EXISTING APPROACHES PDF available

Author(s): A.Mala, | F.Ramesh Dhanaseelan
Volume: 3
Issue: 7
Year: 2011
DESIGN OF PARAMETER EXTRACTOR IN LOW POWER PRECOMPUTATION BASED CONTENT ADDRESSABLE MEMORY PDF available

Author(s): Saroja pasumarti, | Lakshmi Kadali, | Swathi.Bankapalli
Volume: 3
Issue: 7
Year: 2011
Web Log Clustering Approaches – A Survey PDF available

Author(s): G. Sudhamathy, | Dr. C. Jothi Venkateswaran
Volume: 3
Issue: 7
Year: 2011
A Novel Method for Brain MRI Super-resolution by Wavelet-based POCS and Adaptive Edge Zoom PDF available

Author(s): N. Hema Rajini, | R.Bhavani
Volume: 2
Issue: 7
Year: 2010
Considerable Issues to detect Topical-Relevance Upon Free Texts PDF available

Author(s): Arpana Rawal, | M K Kowar, | Sanjay Sharma | H R Sharma
Volume: 2
Issue: 7
Year: 2010
Advanced Low Energy Adaptive Clustering Hierarchy PDF available

Author(s): Ezzati Abdellah, | Said Benalla, | Abderrahim BENI HSSANE | Moulay Lahcen HASNAOUI
Volume: 2
Issue: 7
Year: 2010
Study on the Customer targeting using Association Rule Mining PDF available

Author(s): Surendiran.R | Rajan.K.P | Sathish Kumar.M
Volume: 2
Issue: 7
Year: 2010
SELECT OF OPTIMAL SLEEP STATE IN ADAPTIVE SMAC USING DPM PDF available

Author(s): Elham Hajian, | Kamal Jamshidi, | Ali Bohlooli
Volume: 2
Issue: 7
Year: 2010
Improved CBIR using Multileveled Block Truncation Coding PDF available

Author(s): Dr.H.B.Kekre, | Sudeep D. Thepade | Shrikant P. Sanas
Volume: 2
Issue: 7
Year: 2010
Signature Analysis of UDP Streams for Intrusion Detection using Data Mining Algorithms PDF available

Author(s): R.Sridevi | Dr.K.Lakshmi
Volume: 2
Issue: 7
Year: 2010
Design and Development of Wireless Sensor Node PDF available

Author(s): Dipanjan Bhattacharjee, | Sourabh Kumar, | Akash Kumar, | Sushabhan Choudhury
Volume: 2
Issue: 7
Year: 2010
Use of Splines in Handwritten Character Recognition PDF available

Author(s): Sunil Kumar | Gopinath S, | Satish Kumar | Rajesh Chhikara
Volume: 2
Issue: 7
Year: 2010
The Efficient Ant Routing Protocol for MANET PDF available

Author(s): Srinivas Sethi | Siba K.Udgata
Volume: 2
Issue: 7
Year: 2010
An Enhanced k-means algorithm to improve the Efficiency Using Normal Distribution Data Points PDF available

Author(s): D.Napoleon, | P.Ganga Lakshmi
Volume: 2
Issue: 7
Year: 2010
Mobile Wireless Enhanced Routing Protocol in Adhoc Networks PDF available

Author(s): A.Sreelatha | Dr.A.VinayaBabu, | K.Madhukar, | S.Nagaprasad, | D.Marlene Grace Verghese | V.Mallaiah | A.Pratima
Volume: 2
Issue: 7
Year: 2010
Adaptation of Optimal Methods In Resource Utilization, Job Scheduling In Grids PDF available

Author(s): Jhansi Lakshmi Vaddelle, | Y.Surekha, | D.Sree Lakshmi
Volume: 2
Issue: 7
Year: 2010
Drag and Drop: Influences on the Design of Reusable Software Components PDF available

Author(s): B.Jalender, | Dr A.Govardhan, | Dr P.Premchand, | Dr C.Kiranmai, | G.Suresh Reddy
Volume: 2
Issue: 7
Year: 2010
An Optimized Round Robin Scheduling Algorithm for CPU Scheduling PDF available

Author(s): Ajit Singh | Priyanka Goyal, | Sahil Batra
Volume: 2
Issue: 7
Year: 2010
Power Control Algorithm for Wireless Sensor Networks using N-Policy M/M/1 Queueing Model PDF available

Author(s): R. Maheswar, | Dr. R. Jayaparvathy
Volume: 2
Issue: 7
Year: 2010
An Algorithmic Approach for Efficient Image Compression using Neuro-Wavelet Model and Fuzzy Vector Quantization Technique PDF available

Author(s): Vipula Singh, | Navin Rajpal, | K. Srikanta Murthy
Volume: 2
Issue: 7
Year: 2010
e-Governance Applications for citizens - Issues and Framework PDF available

Author(s): S. Prem Kumar, | J. Keziya rani | Dr. C. Umashankar | Dr. V.V.Venkata Ramana
Volume: 2
Issue: 7
Year: 2010
Simulation Based Design of Retention Tank of Modular Controller Discharge System (MCDS) for Train Coaches PDF available

Author(s): Rajesh Kumar Garg | Vikram Singh
Volume: 2
Issue: 7
Year: 2010
mage Mining using Content Based Image Retrieval System PDF available

Author(s): Rajshree S. Dubey | Niket Bhargava | Rajnish Choubey
Volume: 2
Issue: 7
Year: 2010
Comparative study of various PKINIT methods used in Advanced Kerberos PDF available

Author(s): Shital S. Thorat, | H. K. Sawant, | Sarita S. Gaikwad, | G. T. Chavan
Volume: 2
Issue: 7
Year: 2010
A Survey on Early Determination of Zero Quantized Coefficients in Video Coding PDF available

Author(s): S. Immanuel Alex Pandian | Dr. G. Josemin Bala, | A. Anci Manon Mary
Volume: 2
Issue: 7
Year: 2010
Grid Scheduling using Differential Evolution (DE) for solving multi-objective optimization parameters PDF available

Author(s): A.R. Jayasudha, | Dr. T. Purusothaman
Volume: 2
Issue: 7
Year: 2010
An Effective Stereo Visualization System Implementation for Virtual Prototyping PDF available

Author(s): R.S. Kamath | Dr. R.K. Kamat
Volume: 2
Issue: 7
Year: 2010
Cluster Based Packet Loss Prediction using TCP ACK packets in Wireless Network PDF available

Author(s): BALAJI V, | DURAISAMY V
Volume: 2
Issue: 7
Year: 2010
Building Classification System to Predict Risk factors of Diabetic Retinopathy Using Text mining PDF available

Author(s): T.Sudha, | S.Sagar Imambi
Volume: 2
Issue: 7
Year: 2010
Save time & money - Smart Internet Solutions      Why do you need a reservation system?