Purchase Decision for ATUR Broadband Network

Author(s): Chung Yeh | Wen-Chin Liu | Rang-Shing Ting
Volume: 5
Issue: 9
Year: 2013





Mathematical Formula Recognition and Transformation to a Linear Format Suitable for Vocalization

Author(s): Azadeh Nazemi | Iain Murray
Volume: 5
Issue: 9
Year: 2013





Observer Design for Simultaneous State and Faults Estimation

Author(s): Wafa JAMEL | Atef KHEDHER | Nasreddine BOUGUILA | Kamel BEN OTHMAN
Volume: 5
Issue: 9
Year: 2013





An Efficient Autoadaptive Edge Detection Approach for Flame and Fire Images

Author(s): D. Baswaraj | D. Swarna Sree | Dr. A. Govardhan | Dr. P. Premchand
Volume: 5
Issue: 9
Year: 2013





USER INTEREST LEVEL BASED PREPROCESSING ALGORITHMS USING WEB USAGE MINING

Author(s): R. Suguna | Dr. D. Sharmila
Volume: 5
Issue: 9
Year: 2013





SEGMENTATION OF CT SCAN LUMBAR SPINE IMAGE USING MEDIAN FILTER AND CANNY EDGE DETECTION ALGORITHM

Author(s): E.Punarselvam | Dr.P.Suresh | R.Parthasarathy
Volume: 5
Issue: 9
Year: 2013





INTERNAL COMPACT PRINTED LOOP ANTENNA WITH MATCHING ELEMENT FOR LAPTOP APPLICATIONS

Author(s): Shakti S Chauhan | R.P.S. Gangwar | Abhay Sharma
Volume: 5
Issue: 9
Year: 2013





Improvised Interpolation of Contour Lines Using Spider Weaving Approach

Author(s): Mohan P Pradhan | M K Ghose
Volume: 5
Issue: 9
Year: 2013





A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms

Author(s): Akanksha Mathur
Volume: 4
Issue: 9
Year: 2012





SURVEY OF DIGITAL WATERMARKING USING DCT

Author(s): Usha Pal | Dinesh Chandra
Volume: 4
Issue: 9
Year: 2012





Prediction of Association among Numerical Aptitude, Programming Skills, Trait Emotional Intelligence on Students Performance

Author(s): V. Maria Antoniate Martin | T.Lucia Agnes Beena
Volume: 4
Issue: 9
Year: 2012





An Enhanced Active contour based Segmentation for Fingerprint Extraction

Author(s): S.Uma maheswari | Dr.E.Chandra
Volume: 4
Issue: 9
Year: 2012





Design of Anomaly Detection System for Outlier Detection in Hardware Profile Using PCA

Author(s): Hari Om | Tanmoy Hazra
Volume: 4
Issue: 9
Year: 2012





A Survey paper: Data Security in Local Networks Using Distributed Firewalls

Author(s): Sneha Sahare | Mamta Joshi | Manish Gehlot
Volume: 4
Issue: 9
Year: 2012





Energy-Balanced Transmission Policies for Wireless Sensor Networks

Author(s): Y.Aswini | S.P.Anandaraj | V. Ramana | S.P.Poornima
Volume: 4
Issue: 9
Year: 2012





E-Cash Payment Protocols

Author(s): Shweta Srivastava | Vandana Saraswat
Volume: 4
Issue: 9
Year: 2012





Frequent Pattern Mining using CATSIM Tree

Author(s): Ketan Modi | B.L.Pal
Volume: 4
Issue: 9
Year: 2012





Localization of Mobile Nodes in Wireless Networks with Correlated in Time Measurement Noise

Author(s): K.Anusha | Manohar Gosul | G. Dileep Kumar
Volume: 4
Issue: 9
Year: 2012





Optimization of ETL Work Flow in Data Warehouse

Author(s): Kommineni Sivaganesh | P Srinivasu | Dr Suresh Chandra Satapathy
Volume: 4
Issue: 9
Year: 2012





Approaches for Intelligent Traffic System: A Survey

Author(s): Pratishtha Gupta | G.N Purohit | Amrita Dadhich
Volume: 4
Issue: 9
Year: 2012





Optimization Technique for Maximization Problem in Evolutionary Programming of Genetic Algorithm in Data Mining

Author(s): R. Karthick | S.Saravanan | M.VetriSelvan
Volume: 4
Issue: 9
Year: 2012





An Efficient Method for Digital Image Watermarking Based on PN Sequences

Author(s): Shivani Garg | Ranjit Singh
Volume: 4
Issue: 9
Year: 2012





Noise Control in Industries by Adaptive MDCT Method

Author(s): G.Suresh
Volume: 4
Issue: 9
Year: 2012





A note on Quantum Cryptography

Author(s): G. Ananda Rao | Muduganti Rathan Reddy | Y.Srinivas | J.Vijayasekhar | N.Vamsi Krishna | Ramakrishna Jaliparthi | V Manoj Shekhar | Venu Saggurthi | S. Usha Rani
Volume: 4
Issue: 9
Year: 2012





A Classification Technique for Microarray Gene Expression Data using PSO-FLANN

Author(s): Jayashree Dev | Sanjit Kumar Dash | Sweta Dash | Madhusmita Swain
Volume: 4
Issue: 9
Year: 2012





Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs

Author(s): Poonam Pahuja | Sanjay Pahuja | Dr. Tarun Shrimali
Volume: 4
Issue: 9
Year: 2012





A NEW PROCESS MODEL FOR EMBEDDED SYSTEMS CONTROL FOR TELECOM INDUSTRY

Author(s): Sanjai Gupta | Mohammed Hussain
Volume: 4
Issue: 9
Year: 2012





MINING THE INVESTOR’S PERCEPTION ABOUT DIFFERENT INVESTMENT OPTIONS USING CLUSTERING ANALYSIS

Author(s): Gunjan Batra | Vijaylaxmi | Anisha Gupta
Volume: 4
Issue: 9
Year: 2012





K-Partition Model for Mining Frequent Patterns in Large Databases

Author(s): Nidhi Sharma | Anju Singh
Volume: 4
Issue: 9
Year: 2012





EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT

Author(s): Jasmin James | Dr. Bhupendra Verma
Volume: 4
Issue: 9
Year: 2012





Audio Watermarking Based On The PSK Modulation

Author(s): Wahid Barkouti | Sihem Nasri | Adnane Cherif
Volume: 3
Issue: 9
Year: 2011





Development of Behavioral Based System from Sports Video

Author(s): S.Muthu lakshmi | N. Akila Banu | Dr G.V.Uma
Volume: 3
Issue: 9
Year: 2011





Optimization of fuzzy multi-company workers assignment problem with penalty using genetic algorithm

Author(s): M. Esmaieli | N. Shahsavari Pour | R. Esmaieli
Volume: 3
Issue: 9
Year: 2011





Demographic Data Assessment using Novel 3DCCOM Spatial Hierarchical Clustering: A Case Study of Sonipat Block, Haryana

Author(s): Mamta Malik | Dr. Parvinder Singh | Dr. A. K. Sharma
Volume: 3
Issue: 9
Year: 2011





Study of Efficient Technique Based On 2D Tsallis Entropy For Image Thresholding

Author(s): Mohamed. A. El-Sayed | S. Abdel-Khalek | Eman Abdel-Aziz
Volume: 3
Issue: 9
Year: 2011





DISCOVERING AND VALIDATING MISSING LINKS IN THE INTERNET TOPOLOGY

Author(s): S. Ravichandran | A.Vijayaraj
Volume: 3
Issue: 9
Year: 2011





Abstract Model of Fault Tolerance Algorithm in Cloud Computing Communication Networks

Author(s): Pardeep Kumar | Shiv Kumar Gupta
Volume: 3
Issue: 9
Year: 2011





Search Engine Optimization through Spanning Forest Generation Algorithm

Author(s): SANTOSH KUMAR GANTA | SATYA PAVAN KUMAR SOMAYAJULA
Volume: 3
Issue: 9
Year: 2011





GA Based Test Case Generation Approach for Formation of Efficient Set of Dynamic Slices

Author(s): Debasis Mohapatra
Volume: 3
Issue: 9
Year: 2011





ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION

Author(s): Meenu | Prabhat Kumar Pankaj | Tarkeshwar Nath
Volume: 3
Issue: 9
Year: 2011





Efficient Implementation of Data Aggregation in WSNs by Mobile Agent Paradigm

Author(s): N.Sandhya rani | O. Srinivasa Rao | Dr MHM Krishna Prasad
Volume: 3
Issue: 9
Year: 2011





Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks

Author(s): S. P. Manikandan | Dr. R. Manimegalai
Volume: 3
Issue: 9
Year: 2011





A Quantitative Measure for Object Oriented Design Approach for Large-Scale Systems

Author(s): Ms. Poornima U S
Volume: 3
Issue: 9
Year: 2011





An Exact Algorithm for Multi – Product Bulk Transportation Problem

Author(s): Purusotham, S | Sundara Murthy, M
Volume: 3
Issue: 9
Year: 2011





AN ADIABATIC APPROACH FOR LOW POWER FULL ADDER DESIGN

Author(s): Praveer Saxena | Prof. Dinesh Chandra | Sampath Kumar V
Volume: 3
Issue: 9
Year: 2011





Processor-Directed Cache Coherence Mechanism – A Performance Study

Author(s): H. Sarojadevi | S. K. Nandy
Volume: 3
Issue: 9
Year: 2011





Research on Compound Display Connections to ARM Based Processors

Author(s): Deepak Chamarthi | T J V Subrahmanyeswara Rao
Volume: 3
Issue: 9
Year: 2011





S-boxes generated using Affine Transformation giving Maximum Avalanche Effect

Author(s): Chandrasekharappa T.G.S. | Prema K.V. | Kumara Shama
Volume: 3
Issue: 9
Year: 2011





SSM-DBSCANand SSM-OPTICS : Incorporating a new similarity measure for Density based Clustering of Web usage data.

Author(s): Ms K.Santhisree | Dr. A Damodaram
Volume: 3
Issue: 9
Year: 2011





Correlating Dimensions of Inheritance Hierarchy with Complexity & Reuse

Author(s): Nasib S. Gill | Sunil Sikka
Volume: 3
Issue: 9
Year: 2011





IMPROVING SECURITY IN INITIAL NETWORK ENTRY PROCESS OF IEEE 802.16

Author(s): Prof. Pranita K. Gandhewar | Prof. Prasad P. Lokulwar
Volume: 3
Issue: 9
Year: 2011





SCARP: Secure Congestion Aware Routing Protocol for Wireless Sensor Networks

Author(s): Ch.Radhika Rani | S.Nagendram | Subba Reddy Oota
Volume: 3
Issue: 9
Year: 2011





PRE-DIAGNOSIS OF LUNG CANCER USING FEED FORWARD NEURAL NETWORK AND BACK PROPAGATION ALGORITHM

Author(s): Mr. Abhinav Vishwa | Ms. Alka Vishwa | Prof. Archana Sharma
Volume: 3
Issue: 9
Year: 2011





An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks

Author(s): P.Sivanesan | Dr.S.Thangavel
Volume: 3
Issue: 9
Year: 2011





Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Author(s): Dr.S.Senthil Kumar | V.Ponniyin Selvan
Volume: 3
Issue: 9
Year: 2011





Email Spam Filtering using Supervised Machine Learning Techniques

Author(s): V.Christina, | S.Karpagavalli | G.Suganya
Volume: 2
Issue: 9
Year: 2010





Automated Transformation of Distributed Software Architectural Models to Finite State Process

Author(s): Omid Bushehrian, | Hassan Ghaedi | Reza Ghanbari Baghnavi
Volume: 2
Issue: 9
Year: 2010





Study on Identification of Harmonic Contributions Between Utility and Customer

Author(s): SVD Anil Kumar | Dr.K.Ramesh Reddy
Volume: 2
Issue: 9
Year: 2010





Clustering Mixed Data Points Using Fuzzy C-Means Clustering Algorithm for Performance Analysis

Author(s): T.Velmurugan, | T.Santhanam
Volume: 2
Issue: 9
Year: 2010





Integrations of Remote Sensing and GIS to Land Use and Land Cover Change Detection of Coimbatore District

Author(s): Dr.S. Santhosh Baboo | M.Renuka Devi
Volume: 2
Issue: 9
Year: 2010





Product Assembly Sequence Optimization Based on Genetic Algorithm

Author(s): Azman Yasin, | Nurnasran Puteh, | Ruslizam Daud, | Mazni Omar | Sharifah Lailee Syed-Abdullah
Volume: 2
Issue: 9
Year: 2010





College of Computers and Information Technology Taif University, Taif, Saudi Arabia

Author(s): Zhamri Che Ani | Azman Yasin | Mohd Zabidin Husin, | Zauridah Abdul Hamid
Volume: 2
Issue: 9
Year: 2010





Relational Peer Data Sharing Settings and Consistent Query Answers

Author(s): Mehedi Masud | Sultan Aljahdali
Volume: 2
Issue: 9
Year: 2010





Automatic Recommendation of Web Pages in Web Usage Mining

Author(s): C.P. Sumathi | R. Padmaja Valli, | T. Santhanam
Volume: 2
Issue: 9
Year: 2010





Efficiency of K-Means Clustering Algorithm in Mining Outliers from Large Data Sets

Author(s): Sridhar. A | Sowndarya. S
Volume: 2
Issue: 9
Year: 2010





Wavelet Features Based War Scene Classification using Artificial Neural Networks

Author(s): S.Daniel Madan Raja, | Dr.A.Shanmugam
Volume: 2
Issue: 9
Year: 2010





A SURVEY OF CALL MARKET (DISCRETE) AGENT BASED ARTIFICIAL STOCK MARKETS

Author(s): PN Kumar, | Ashutosh Jha | Gautham TK, | Jitesh Mohan | Rama Subramanian AJ | VP Mohandas
Volume: 2
Issue: 9
Year: 2010





Scalability Performance of MANET Routing Protocols with Reference to Variable Pause Time

Author(s): Asha Ambhaikar | H.R. Sharma | V.K.Mohabey
Volume: 2
Issue: 9
Year: 2010





A Context-Dependent Trust Model for the MAC Layer in LR-WPANs Bernardo M. David, Beatriz Santana, Laerte Peotta, Marcelo D. Holtz,

Author(s): Rafael Timóteo de Sousa Jr | Bernardo M. David, | Beatriz Santana | Laerte Peotta, | Marcelo D. Holtz,
Volume: 2
Issue: 9
Year: 2010





Sports Video Summarization using Priority Curve Algorithm

Author(s): K Susheel Kumar, | Shitala Prasad | Santosh Banwral, | Vijay Bhaskar Semwa
Volume: 2
Issue: 9
Year: 2010





Multiframe Image Super-resolution – A Comparison

Author(s): Vishal R. Jaiswal, | Suhas H. Patil | Girish P. Potdar | Shrishail T. Patil
Volume: 2
Issue: 9
Year: 2010





A Genetic Algorithm Optimized Decision Tree-SVM based Stock Market Trend Prediction System

Author(s): Binoy B. Nair | V.P Mohandas | N.R. Sakthivel
Volume: 2
Issue: 9
Year: 2010





Clustered Chain based Power Aware Routing (CCPAR) Scheme for Wireless Sensor Networks

Author(s): Koushik Majumder | Subir Kumar Sarkar
Volume: 2
Issue: 9
Year: 2010





Overload Identification for Multiprocessor in Real Time System

Author(s): JESTIN RAJAMONY, | Dr. K.RAMAR | K.P.AJITHA GLADIS
Volume: 2
Issue: 9
Year: 2010





Classification of Indian Stock Market Data Using Machine Learning Algorithms

Author(s): Sneha Soni, | Shailendra Shrivastava
Volume: 2
Issue: 9
Year: 2010





Differential Evolution and Dynamic Differential Evolution Variants for High Dimensional Function Optimization : An Empirical Scalability Study

Author(s): G.Jeyakumar, | C.Shunmuga Velayutham
Volume: 2
Issue: 9
Year: 2010





Reducing Dataset Size in Frequency Domain for Brain Computer Interface Motor Imagery Classification

Author(s): Ch.Aparna | Dr J.V.R.Murthy, | Dr.B.Raveendra Babu, | M.V.P.Chandra Sekhara Rao
Volume: 2
Issue: 9
Year: 2010





Technical challenges and Constraints for Spectrum Planning in GSM networks

Author(s): Gaurav Kumar Nigam
Volume: 2
Issue: 9
Year: 2010





Unsupervised Hybrid Classification for Texture Analysis Using Fixed and Optimal Window Size

Author(s): S.S SREEJA MOLE | Dr.L.GANESAN
Volume: 2
Issue: 9
Year: 2010





DYNAMIC WAVELENGTH ALLOCATION IN WDM OPTICAL NETWORKS

Author(s): E. Kavitha | Dr.D.Sreenivasa Rao
Volume: 2
Issue: 9
Year: 2010





Business Process Requirement Engineering

Author(s): Atsa Etoundi Roger, | Fouda Ndjodo Marcel | Atouba Christian Lopez
Volume: 2
Issue: 9
Year: 2010





Query Optimization on Compressed and Decompressed Object-Oriented Database Using Operators

Author(s): Abhijit Banubakode, | Haridasa Acharya
Volume: 2
Issue: 9
Year: 2010





A FRAMEWORK-BASED APPROACH FOR RELIABILITY & QUALITY ASSURANCE OF SAFETY-CRITICAL SOFTWARE

Author(s): Ankur Pandit
Volume: 2
Issue: 9
Year: 2010





DATA WAREHOUSING, DATA MINING, OLAP AND OLTP TECHNOLOGIES ARE ESSENTIAL ELEMENTS TO SUPPORT DECISION-MAKING PROCESS IN INDUSTRIES

Author(s): G.SATYANARAYANA REDDY, | RALLABANDI SRINIVASU, | M. POORNA CHANDER RAO | SRIKANTH REDDY RIKKULA
Volume: 2
Issue: 9
Year: 2010





Service Composition in Service Oriented Product Line

Author(s): Fatemeh Mafi | Shahriar Mafi, | Mehran Mohsenzadeh
Volume: 2
Issue: 9
Year: 2010





Comparative Analysis of CBRP, DSR, AODV Routing Protocol in MANET

Author(s): Mukesh Kumar, | Rahul Rishi, | D.K. Madan
Volume: 2
Issue: 9
Year: 2010





A New Effective System for Filtering Pornography Videos

Author(s): Tarek Abd El-Hafeez
Volume: 2
Issue: 9
Year: 2010





A New System for Extracting and Detecting Skin Color Regions from PDF Documents

Author(s): arek Abd El-Hafeez
Volume: 2
Issue: 9
Year: 2010





Position-Based Clustering: An Energy-Efficient Clustering Hierarchy for Heterogeneous Wireless Sensor Networks

Author(s): Abderrahim BENI HSSANE | Moulay Lahcen HASNAOUI, | Mostafa SAADI | Said BENKIRANE
Volume: 2
Issue: 9
Year: 2010





A Framework for the View Selection Problem in Data Warehousing Environment

Author(s): B. Ashadevi, | Dr. P.Navaneetham, | Dr. R.Balasubramanian
Volume: 2
Issue: 9
Year: 2010





Image Mining Using Texture and Shape Feature

Author(s): Prof.Rupali Sawant
Volume: 2
Issue: 9
Year: 2010





Adjoint LMS (ALMS) Algorithm Based Active Noise Control with Feedback Path Modeling

Author(s): U Ramachandraiah, | M Singaperumal, | B Purniah
Volume: 2
Issue: 9
Year: 2010





Supervised Learning Approach for Spam Classification Analysis using Data Mining Tools

Author(s): R.Deepa Lakshmi | N.Radha
Volume: 2
Issue: 9
Year: 2010





A Survey of Energy Efficient Routing Protocols for Mobile Ad-hoc Networks

Author(s): Ajit Singh, Harshit Tiwari, | Alok Vajpayee, | Shiva Prakash
Volume: 2
Issue: 9
Year: 2010





Authenticated Routing Protocol Based on Reputation System For Adhoc Networks

Author(s): Preeti Nagrath, | Ashish kumar, | Shikha Bhardwaj
Volume: 2
Issue: 9
Year: 2010





Wireless Sensor Network (WSN): Architectural Design issues and Challenges

Author(s): Ajay Jangra | Swati | Richa, | Priyanka
Volume: 2
Issue: 9
Year: 2010





Person Identification Using Fingerprint by Hybridizing Core Point and Minutiae Features

Author(s): M. Ezhilarasan | D. Suresh Kumar, | S. Santhanakrishnan | S. Dhanabalan | A.Vinod
Volume: 2
Issue: 9
Year: 2010





Iris Recognition Based On Its Texture Patterns

Author(s): M. Ezhilarasan, | R. Jacthish | K.S. Ganabathy Subramanian, | R. Umapathy
Volume: 2
Issue: 9
Year: 2010





A Survey on Recent Security Trends using Quantum Cryptography

Author(s): T. Rubya | N. Prema Latha, | B. Sangeetha
Volume: 2
Issue: 9
Year: 2010





Medical Image Compression Using Biorthogonal Spline Wavelet With Different Decomposition

Author(s): Loganathan R | Dr.Y.S.Kumaraswamy
Volume: 2
Issue: 9
Year: 2010





Implementation of Featureset Reduced Symmetric Transform in Image Retrieval Optimized for FPGA

Author(s): C.Sriramakrishnan, | Dr. A. Shanmugam
Volume: 2
Issue: 9
Year: 2010





Chairperson and Secretarius Meeting Guides for Electronic Meeting Direction

Author(s): Gitesh K. Raikundalia
Volume: 2
Issue: 9
Year: 2010





A Novel approach for identifying greedy nodes in wireless sensor network by using EEGN algorithm

Author(s): S.Manju Priya | K.Thilagam, | K.Rama, | A.Jeevarathinam, | K.Lakshmi
Volume: 2
Issue: 9
Year: 2010





Symmetric-key Inter-domain end-to-end Authentication Protocols for Mobile System

Author(s): Rajarshi Roy Chowdhury, | Subramanian Azhaguvel
Volume: 2
Issue: 9
Year: 2010





A Survey on clustering Current status and challenging issues

Author(s): Rama.B, | Jayashree.P | Salim Jiwani
Volume: 2
Issue: 9
Year: 2010





MINING POSITIVE AND NEGATIVE ASSOCIATION RULES

Author(s): R.SUMALATHA | B. RAMASUBBAREDDY
Volume: 2
Issue: 9
Year: 2010





Medical Image Matching and Retrieval using Discrete Sine Transform

Author(s): SASI KUMAR.M | Dr.Y.S.KUMARSWAMY
Volume: 2
Issue: 9
Year: 2010





Stream Ciphers Encript Transformation

Author(s): Md Tanwir Uddin Haider, | Rajesh Kumar Sinha
Volume: 2
Issue: 9
Year: 2010





Association Analaysis in Wireless Network using Trace data

Author(s): L.Velmurugan, | Dr.P.Thangaraj
Volume: 2
Issue: 9
Year: 2010





A New Encryption Method for Secure Transmission of Images

Author(s): B.V.Rama Devi, | P.Prapoorna Roja | D.Lalitha Bhaskari | P.S.Avadhani
Volume: 2
Issue: 9
Year: 2010





Performance Analysis of Fault-Tolerant Irregular Baseline Multistage Interconnection Network

Author(s): Mamta Ghai, | Vinay Chopra, | Karamjit Kaur Cheema
Volume: 2
Issue: 9
Year: 2010





Autonomous Home Automated Hexapod Robot

Author(s): Addanki Purna Ramesh, | Ch Sesha Kiran Kumar
Volume: 2
Issue: 9
Year: 2010





Comparison of Digital Water Marking methods

Author(s): Darshana Mistry
Volume: 2
Issue: 9
Year: 2010





An Algorithm for Better Decision Tree

Author(s): T.Jyothirmayi, | Suresh Reddy
Volume: 2
Issue: 9
Year: 2010





Optimization of Composite Plates Based on Imperialist Competitive Algorithm

Author(s): Hamid Mozafari | Behzad Abdi, | Amran Ayob
Volume: 2
Issue: 9
Year: 2010





The Imperative Information Security Management System Measures In the Public Sectors of Ghana. A Case Study of the Ghana Audit Service

Author(s): Dr Ing Edward Opoku-Mensah | Christopher A Abilimi | Linda Amoako
Volume: 5
Issue: 8
Year: 2013





Locating ATMs in Urban Areas

Author(s): Mehdi MoradiTabar | Omid Bushehrian | Reza Askari Moghadam
Volume: 5
Issue: 8
Year: 2013





A Novel Biometric system for Person Recognition Using Palm vein Images

Author(s): S.Manikanda prabu | S.N.Sivanandam
Volume: 5
Issue: 8
Year: 2013





Analysis on Image Processing of Human Hip Joints during Lifting Using MAT Lab and ANSYS

Author(s): N. Sundaram | Dr. P. Suresh
Volume: 5
Issue: 8
Year: 2013





Cloud Computing: Securing Client Data Storage

Author(s): Mrs.Ashwini Prakash Sawant | Prof. Sandeep Vanjale | Mrs. Mousami Vanjale
Volume: 5
Issue: 8
Year: 2013





A Survey on Service Oriented Architecture and Metrics to Measure Coupling

Author(s): D. Vinay Babu | Manoj Prabhakar Darsi
Volume: 5
Issue: 8
Year: 2013





WebParF:A Web Partitioning Framework for Parallel Crawler

Author(s): Sonali Gupta | Komal Bhatia | Pikakshi Manchanda
Volume: 5
Issue: 8
Year: 2013





Modelisation of the maintenanceproduction couple by a graph of scheduling

Author(s): IDRISSI BADR | EL KIHEL BACHIR | Mohammed BADAOUI
Volume: 5
Issue: 8
Year: 2013





A Framework For An E-Learning System Based on Semantic Web

Author(s): Tarek M. Mahmoud | Tarek Abd-El-Hafeez | Ahmed Badawy
Volume: 5
Issue: 8
Year: 2013





Resource Scheduling in Hybrid Grid Environment

Author(s): Dr. N. Malarvizhi | Dr. N. Sankar Ram | Dr. V. Rhymend Uthariaraj
Volume: 4
Issue: 8
Year: 2012





Entropy Based Lossless Fractal Image Compression using Irregular Rectangular Partitions

Author(s): Jeet Kumar | Manish Kumar
Volume: 4
Issue: 8
Year: 2012





Security Enhancement of Dynamic System Using PID Controller and Optimization Algorithm

Author(s): Parul Dewangan | Somesh Kumar Dewangan | Jyotiprakash Patra
Volume: 4
Issue: 8
Year: 2012





Canonical Correlated Kernel PCA Method for Face Recognition

Author(s): N.NagaMounica | Ch.Ganapathy Reddy
Volume: 4
Issue: 8
Year: 2012





An Adaptive filter as Noise Cancellation by using LMS /Newton Algorithm

Author(s): Jaijit Singh Changotra | Ramanand Harijan
Volume: 4
Issue: 8
Year: 2012





Genetic Algorithms Based Solution To Maximum Clique Problem

Author(s): Harsh Bhasin | Rohan Mahajan
Volume: 4
Issue: 8
Year: 2012





Modeling a production system based on flow-shop electrical system

Author(s): H.SARIR | H.FARID | B.BENSASSI
Volume: 4
Issue: 8
Year: 2012





Effect of Obstacles in the formation of FoV based Clusters in Wireless Multimedia Sensor Network

Author(s): Dipika Gupta | Sneh Lata Aswal | Sandip K Chaurasiya
Volume: 4
Issue: 8
Year: 2012





Comparison of Pre-fetched Pages Before and After Path Completion

Author(s): Priyanka Makkar | Seema | Kirti Aggarwal
Volume: 4
Issue: 8
Year: 2012





Common Framework For Unix Scripting Languages

Author(s): Sumit Dubey | Kanchan Lata
Volume: 4
Issue: 8
Year: 2012





HSV Color Histogram and Directional Binary Wavelet Patterns for Content Based Image Retrieval

Author(s): P.Vijaya Bhaskar Reddy | Dr.A.Rama Mohan Reddy | K.Guru Jyotsna Devi
Volume: 4
Issue: 8
Year: 2012





Enhanced Component Retrieval Scheme Using Suffix Tree in Object Oriented Paradigm

Author(s): Karambir | Nisha
Volume: 4
Issue: 8
Year: 2012





A Modified Robust Queue Management with Feedback Compensation Technique to Manage the Congestion Control in Wireless Communication Networks

Author(s): V.SAVITHA | G.MARIA PRISCILLA
Volume: 4
Issue: 8
Year: 2012





A Note on Linear based Set Associative Cache address System

Author(s): Chandramowliswaran N | Srinivasan.S | Chandra Segar.T
Volume: 4
Issue: 8
Year: 2012





WWDC SERVER SOFTWARE INVENTORY MANAGEMENT AND AUTOMATION

Author(s): M . THANJAIVADIVEL | K. JOHN SINGH
Volume: 4
Issue: 8
Year: 2012





Effect of Modulation Schemes on Performance of OFDM based Wireless Network using Smart Antenna

Author(s): Mr.Balaji G.Hogade | Dr Shrikant K Bodhe | Mrs.Vrishali M Patil
Volume: 4
Issue: 8
Year: 2012





Clustering of Sedimentary Basins Using Associative Neural memories (ART2)

Author(s): LAKSHMIPRASAD BOPPANA | B.POORNA SATYANARAYANA
Volume: 3
Issue: 8
Year: 2011





Nodes distribution and selection of accurate mobility Framework to systematically analyze its impact for improving performance of routing protocols for mobile ad hoc networks through Simulations

Author(s): Sonika Kandari | Dr. M.K. Pandey
Volume: 3
Issue: 8
Year: 2011





SSM-DBSCANand SSM-OPTICS : Incorporating a new similarity measure for Density based Clustering of Web usage data.

Author(s): Ms K.Santhisree | Dr. A Damodaram
Volume: 3
Issue: 8
Year: 2011





Cluster Analysis Research Design model, problems, issues, challenges, trends and tools

Author(s): V.Ilango | Dr.R.Subramanian | Dr.V.Vasudevan
Volume: 3
Issue: 8
Year: 2011





PERFORMANCE ANALYSIS OF ADHOC ROUTING PROTOCOLS USING RANDOM WAYPOINT MOBILITY MODEL IN WIRELESS SENSOR NETWORKS

Author(s): Vivek Thaper | Bindyia Jain | Varsha Sahni
Volume: 3
Issue: 8
Year: 2011





Hidden Web Data Extraction Using Dynamic Rule Generation

Author(s): Anuradha | A.K Sharma
Volume: 3
Issue: 8
Year: 2011





A Survey on the Applications of Bee Colony Optimization Techniques

Author(s): Dr. Arvinder Kaur | Shivangi Goyal
Volume: 3
Issue: 8
Year: 2011





Estimation of Solar Radiation at a Particular Place: Comparative study between Soft Computing and Statistical Approach

Author(s): Bimal Datta | Srimanta Pal | Rohit Roy Chowdhury | Swagata Sarkar | Abhiroop Datta
Volume: 3
Issue: 8
Year: 2011





Software Reliability Growth Models for the Safety Critical Software with Imperfect Debugging

Author(s): O.Naga Raju
Volume: 3
Issue: 8
Year: 2011





Load Balanced Routing using OSPF

Author(s): Mr. Ritesh Dayama | Mr. S. P. Pingat
Volume: 3
Issue: 8
Year: 2011





Virtual Energy-Efficient Encryption and Keying (VEEEK) for Wireless Sensor Networks

Author(s): K. Ravi Chythanya | S.P.Anandaraj. | S. Padmaja
Volume: 3
Issue: 8
Year: 2011





A Novel Search Engine to trace Medical Information Needs using Medical Domain Ontology

Author(s): M.Revati | K.Nageswara Rao | M.N.V.Kiran Babu | Kolikipogu Ramakrishna | Ch.Raja Jacob
Volume: 3
Issue: 8
Year: 2011





Performance Evaluation of Requirements Engineering Methodology for Automated Detection of Non Functional Requirements

Author(s): J.Selvakumar | Dr. M. Rajaram
Volume: 3
Issue: 8
Year: 2011





FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN

Author(s): S.Manikandaprabu | P.Kalaiyarasi
Volume: 3
Issue: 8
Year: 2011





Simulation of Urban Traffic Flow Using Personal Experience of Drivers

Author(s): Kosar Mohammadzade | Mohammad-Reza Feizi-Derakhshi
Volume: 3
Issue: 8
Year: 2011





ICS: An Interactive Control System for Simulating the Probability of Car Accidents with Object Oriented Paradigm and Cellular Automaton

Author(s): A. Madani | N. Moussa
Volume: 3
Issue: 8
Year: 2011





M-Band Graphic Equalizer

Author(s): Prof. Ch.Srinivasa Kumar | Dr. P. Mallikarjuna Rao
Volume: 3
Issue: 8
Year: 2011





UEP based on Proximity Pilot Subcarriers with QAM in OFDM

Author(s): Tony Gladvin George | Dr.N.Malmurugan
Volume: 3
Issue: 8
Year: 2011





A Novel Benchmark K-Means Clustering on Continuous Data

Author(s): K. Prasanna | M. Sankara Prasanna Kumar | G. Surya Narayana
Volume: 3
Issue: 8
Year: 2011





Design Of An Automatic Speaker Recognition System Using MFCC, Vector Quantization And LBG Algorithm

Author(s): Prof. Ch.Srinivasa Kumar | Dr. P. Mallikarjuna Rao
Volume: 3
Issue: 8
Year: 2011





Supply and demand vs. price driven graphs financial data visualization

Author(s): M Siluvairajah
Volume: 3
Issue: 8
Year: 2011





Wireless Control LEGO NXT robot using voice commands

Author(s): David Be | Cinhtia González | Manuel Escalante | Michel García | Carlos Miranda | Sergio Gonzalez
Volume: 3
Issue: 8
Year: 2011





DIGITAL IMAGE PROCESSING TECHNIQUES FOR DETECTION AND REMOVAL OF NOISE IN IMAGES IMPLEMENTING BLIND SOURCE SEPARATION

Author(s): K Devaki Devi | Dr GN Swamy
Volume: 3
Issue: 8
Year: 2011





Migrations amid Generations of Wireless networks

Author(s): Harpreet kaur | Harsimarjeet Khurana
Volume: 3
Issue: 8
Year: 2011





Centroid-Point of Ranking Fuzzy Numbers and Its Application to Health Related Quality of Life Indicators

Author(s): Lazim Abdullah, | Nor Jamalina Jamal
Volume: 2
Issue: 8
Year: 2010





Supervised Learning Approach for Spam Classification Analysis using Data Mining Tools

Author(s): R.Deepa Lakshmi | N.Radha
Volume: 2
Issue: 8
Year: 2010





A Novel Approach for English to South Dravidian Language Statistical Machine Translation System

Author(s): Unnikrishnan P | Antony P J, | Dr. Soman K P
Volume: 2
Issue: 8
Year: 2010





Multicast Routing Protocols in Adhoc Mobile networks

Author(s): S.Nagaprasad, | A.VinayaBabu, | K.Madhukar, | B.Sujatha, | B.AnandKumar, | N.Veena | J.Sunitha
Volume: 2
Issue: 8
Year: 2010





Performance Evaluation of Ad Hoc On Demand Distance Vector in MANETs with varying Network Size using NS-2 Simulation

Author(s): Nilesh P. Bobade, | Nitiket N. Mhala
Volume: 2
Issue: 8
Year: 2010





Generating Membership Values And Fuzzy Association Rules From Numerical Data

Author(s): Dr.R.Radha, | Dr.S.P.Rajagopalan
Volume: 2
Issue: 8
Year: 2010





Novel Pattern Matching Algorithm for Single Pattern Matching

Author(s): Devaki Pendlimarri, | Paul Bharath Bhushan Petlu
Volume: 2
Issue: 8
Year: 2010





Analysis of Dependencies of Checkpoint Cost and Checkpoint Interval of Fault Tolerant MPI Applications

Author(s): Mallikarjuna Shastry P.M | K. Venkatesh
Volume: 2
Issue: 8
Year: 2010





A Simplified Methodology for Random Topology Generator builds in Ad Hoc Network Test Bed

Author(s): Nitiket N. Mhala | N. K. Choudhari
Volume: 2
Issue: 8
Year: 2010





A Comparative Analysis of Web Page Ranking Algorithms

Author(s): Dilip Kumar Sharma, | A. K. Sharma
Volume: 2
Issue: 8
Year: 2010





A Study on Similarity Computations in Template Matching Technique for Identity Verification

Author(s): Lam, S. K., | Yeong, | C. Y., | Yew, | C. T., | Chai | W. S. | Suandi, | S. A.
Volume: 2
Issue: 8
Year: 2010





MULTIMODAL BIOMETRICS BASED AUTHENTICATION AGAINST DICTIONARY ATTACKS

Author(s): P.Tamil Selvi | N.Radha
Volume: 2
Issue: 8
Year: 2010





Improved and Balanced LEACH for heterogeneous wireless sensor networks

Author(s): BEN ALLA Said | EZZATI abdellah, | Abderrahim BENI HSSANE, | Moulay Lahcen
Volume: 2
Issue: 8
Year: 2010





Regression and ARIMA hybrid model for new bug prediction

Author(s): Madhur Srivastava | Dr.Dharmendra Badal | Ratnesh Kumar Jain
Volume: 2
Issue: 8
Year: 2010





Design of a Hospital-Based Database System (A Case Study of BIRDEM)

Author(s): Rosina Surovi Khan, | Mohammad Saber
Volume: 2
Issue: 8
Year: 2010





Web Services Security Architectures Composition and Contract Design using RBAC

Author(s): D.Shravani | Dr.P.Suresh Varma | Dr.B.Padmaja Rani, | , Dr.D.Sravan Kumar, | M.Upendra Kumar
Volume: 2
Issue: 8
Year: 2010





Fuzzy Group Decision Making Using Surrogate Worth Trade-Off Method

Author(s): Iman Ghaleh Khondabi | Alireza Fallah Tafti
Volume: 2
Issue: 8
Year: 2010





Frequent Itemset mining over transactional data streams using Item-Order-Tree

Author(s): Pramod S., | O.P. Vyas
Volume: 2
Issue: 8
Year: 2010





Context Ontology Construction For Cricket Video

Author(s): Dr. Sunitha Abburu
Volume: 2
Issue: 8
Year: 2010





Improving Ad Hoc Network Performances by Estimating Available Bandwidth

Author(s): K. Mohideen Vahitha Banu
Volume: 2
Issue: 8
Year: 2010





Shodhika Bhashini Multilingual Search and TTS System

Author(s): Dr.K.V.N.Sunitha | M.Charan Teja
Volume: 2
Issue: 8
Year: 2010





An Useful Information Extraction using Image Mining Techniques from Remotely Sensed Image (RSI)

Author(s): Dr. C. Jothi Venkateswaran, | S. Murugan | Dr. N. Radhakrishnan
Volume: 2
Issue: 8
Year: 2010





Soil Classification by Generating Fuzzy rules

Author(s): P.Bhargavi | Dr. S. Jyothi
Volume: 2
Issue: 8
Year: 2010





Image Retrieval using DWT on Row and Column Pixel Distribution of BMP Image and Row Mean and Column Mean

Author(s): N S T Sai, | R C Patil
Volume: 2
Issue: 8
Year: 2010





A NEW PRUNING APPROACH FOR BETTER AND COMPACT DECISION TREES

Author(s): Ali Mirza Mahmood, | Pavani Kapavarapu | Venu Gopal Kavuluru, | Mrithyumjaya Rao Kuppa
Volume: 2
Issue: 8
Year: 2010





Augmentation of Block Truncation Coding based Image Retrieval by using Even and Odd Images with Sundry Colour Spaces

Author(s): Dr. H.B.Kekre | Sudeep D.Thepade | Varun Lodha, | Pooja Luthra, | Ajoy Joseph | Chitrangada Nemani
Volume: 2
Issue: 8
Year: 2010





Human Talent Prediction in HRM using C4.5 Classification Algorithm

Author(s): Hamidah Jantan, | Abdul Razak Hamdan | Zulaiha Ali Othman
Volume: 2
Issue: 8
Year: 2010





Frequent Item set Mining Using Global Profit Weight Algorithm

Author(s): ASHA RAJKUMAR, | G.SOPHIA REENA
Volume: 2
Issue: 8
Year: 2010





A Perspective Analysis of routing protocols in wireless sensor network

Author(s): V.Vasanthi, | P.Nagarajan | B.Bharathi, | Dr.M.Hemalatha
Volume: 2
Issue: 8
Year: 2010





Synergy between Object Recognition and Image Segmentation

Author(s): Y.Ramadevi, | B.Kalyani | T.Sridevi
Volume: 2
Issue: 8
Year: 2010





Concealing the Level-3 features of Fingerprint in a Facial Image

Author(s): Dr.R.Seshadri, | Yaswanth Kumar.Avulapati
Volume: 2
Issue: 8
Year: 2010





Strong Password Based EAP-TLS Authentication Protocol for WiMAX

Author(s): Anjani K.Rai, | Shivendu Mishra | Vimal Kumar
Volume: 2
Issue: 8
Year: 2010





A Comprehensive Assessment of Object-Oriented Software Systems Using Metrics Approach

Author(s): Sanjay Kumar Dubey | Prof. (Dr.) Ajay Rana
Volume: 2
Issue: 8
Year: 2010





BIOLOGICAL EARLY BRAIN CANCER DETECTION USING ARTIFICIAL NEURAL NETWORK

Author(s): G Vijay Kumar | Dr GV Raju
Volume: 2
Issue: 8
Year: 2010





Discovering suffixes: A Case Study for Marathi Language

Author(s): Mudassar M. Majgaonker | Tanveer J Siddiqui
Volume: 2
Issue: 8
Year: 2010





Compact Dual Polarization Lidar System description and data processing

Author(s): Y.Bhavani Kumar
Volume: 2
Issue: 8
Year: 2010





Identification and Removal of Impulsive noise using Hypergraph Model

Author(s): Karibasappa K.G, | K. Karibasappa
Volume: 2
Issue: 8
Year: 2010





An Automated Microcontroller Based Liquid Mixing System

Author(s): Dr.A.S.C.S.Sastry | K.N.H.Srinivas | Ch V S R G Krishna, | Ch.Sesha KiranKumar
Volume: 2
Issue: 8
Year: 2010





HUNTING DOWN UNDO ISSUES WITH ORACLE: A PRACTICAL APPROACH

Author(s): Kamili Srinivas | Tanweer Khan | Ganti Siva
Volume: 2
Issue: 8
Year: 2010





AN IMPROVED DESIGN OF A MULTIPLIER USING REVERSIBLE LOGIC GATES

Author(s): H.R.BHAGYALAKSHMI | M.K.VENKATESHA
Volume: 2
Issue: 8
Year: 2010





Design and Implementation of a Three Dimensional CNC Machine

Author(s): Venkata Krishna Pabolu | Prof. Sri K.N.H. Srinivas
Volume: 2
Issue: 8
Year: 2010





SIMULATION BASED PLANNING FOR DESIGN OF WASHING MACHINE USING H/W & S/W CO DESIGN

Author(s): Rajesh Kumar Garg | Vikram Singh
Volume: 2
Issue: 8
Year: 2010





Fingerprint Verification System Using Support Vector Machine

Author(s): S. Adebayo Daramola | Tola Sokunbi | A.U Adoghe
Volume: 5
Issue: 7
Year: 2013





AN ARTIFICIAL FISH SWARM OPTIMIZED FUZZY MRI IMAGE SEGMENTATION APPROACH FOR IMPROVING IDENTIFICATION OF BRAIN TUMOUR

Author(s): R.Jagadeesan | S. N. Sivanandam
Volume: 5
Issue: 7
Year: 2013





NODE ADDRESSING SCHEMES FOR SCALABLE ROUTING IN HIERARCHICAL WSN

Author(s): Mr.GANESH.S.PISE | Mr. VINOD. V.KIMBAHUNE
Volume: 5
Issue: 7
Year: 2013





Study of Speaker’s Emotion Identification for Hindi Speech

Author(s): Sushma Bahuguna | Y.P Raiwani
Volume: 5
Issue: 7
Year: 2013





Relaxed Median Filter: A Better Noise Removal Filter for Compound Images

Author(s): Zinat Afrose
Volume: 4
Issue: 7
Year: 2012





Provide a method to Prediction of nodes movement to optimize Routing Algorithms in Ad Hoc Networks

Author(s): Jahani Ebrahim | KHorshidi Sadegh
Volume: 4
Issue: 7
Year: 2012





Improvement in Word Sense Disambiguation by introducing enhancements in English WordNet Structure

Author(s): Deepesh Kumar Kimtani | Jyotirmayee Choudhury | Alok Chakrabarty
Volume: 4
Issue: 7
Year: 2012





Performance Comparison of Common Table Expressions and Cursors

Author(s): Sowndarya. S | Sridhar. A
Volume: 4
Issue: 7
Year: 2012





AN EFFECTIVE RETRIVAL SCHEME FOR SOFTWARE COMPONENT REUSE

Author(s): Vishal | Subhash Chander | Jasmer Kundu
Volume: 4
Issue: 7
Year: 2012





A Novel Approach for Compact Document Clustering

Author(s): Rachitha Sony Krotha | Madhavi Dabbiru
Volume: 4
Issue: 7
Year: 2012





Overview of techniques used for image resolution enhancement

Author(s): Mayuri D Patil | Prof. Surbhi Khare
Volume: 4
Issue: 7
Year: 2012





Dorsal Hand Vein Biometry by Independent Component Analysis

Author(s): V.H.Yadav | Prof.S.O.Rajankar
Volume: 4
Issue: 7
Year: 2012





Interference Reduction Technique in WCDMA using Cell Resizing

Author(s): N.Mohan | Dr. T. Ravichandran
Volume: 4
Issue: 7
Year: 2012





Visual Data Mining in Indian Election System

Author(s): Prof. T. M. Kodinariya | Mr. Ravi Seta
Volume: 4
Issue: 7
Year: 2012





FACE RECOGNITION FROM LOWER JAW OR MANDIBLE OF A HUMAN

Author(s): SOURAV GANGULY | SUBHAYAN ROY MOULICK
Volume: 4
Issue: 7
Year: 2012





Solving Travelling Salesman Problem using Clustering Genetic Algorithm

Author(s): R.SIVARAJ | Dr.T.RAVICHANDRAN | R.DEVI PRIYA
Volume: 4
Issue: 7
Year: 2012





Survey on FPGA Routing Techniques

Author(s): Ms. Nagalakshmi Venugopal | R. Manimegalai
Volume: 4
Issue: 7
Year: 2012





Gradual Evolution of Sequential Sequence Mining for Customer relation database

Author(s): Kiran Amin | J. S. Shah
Volume: 4
Issue: 7
Year: 2012





PALM: Preprocessed Apriori For Logical Matching Using Map Reduce Algorithm

Author(s): Narayan Gowraj | Srinivas Avireddy | Sruthi Prabhu
Volume: 4
Issue: 7
Year: 2012





Comparative Analysis of Reactive and Proactive Protocol of Mobile Ad-Hoc Network

Author(s): PUNEET KUMAR BHARDWAJ | SHIPRA SHARMA | VANDANA DUBEY
Volume: 4
Issue: 7
Year: 2012





Overview Of Various Overlapping Community Detection Approaches

Author(s): Pooja Chaturvedi
Volume: 4
Issue: 7
Year: 2012





A New Method for Finding an Optimal Solution for Transportation Problems

Author(s): Abdul Quddoos | Shakeel Javaid | M. M. Khalid
Volume: 4
Issue: 7
Year: 2012





An Efficient Agent-Based AODV Routing Protocol in MANET

Author(s): Preeti Bhati, | Rinki Chauhan, | R K Rathy, | Ritu Khurana
Volume: 3
Issue: 7
Year: 2011





ENERGY EFFICIENT DATA GATHERING SCHEME USING CROSS LAYER CLUSTER APPROACH FOR WIRELESS SENSOR NETWORKS

Author(s): NANDINI PRASAD K S, | G R VEERENDRA, | PUTTAMADAPPA C
Volume: 3
Issue: 7
Year: 2011





Betel Leaf Area Measurement Using Image Processing
Author(s): Sanjay B. Patil, | Dr. Shrikant K. Bodhe
Volume: 3
Issue: 7
Year: 2011




Various Schemes to Speed up the PC during Virus Scan

Author(s): Neha Bishnoi, | Prof. S.S Tyagi
Volume: 3
Issue: 7
Year: 2011





Semantic Web Services and Its Approaches

Author(s): Tauqeer Ahmad Usmani, | Prof. Durgesh Pant, | Prof. Kunwar Singh Vaisla
Volume: 3
Issue: 7
Year: 2011





Intelligent Public Transport Information System

Author(s): Mrs. Uma Nagaraj, | Mr. Rahul Wakade | Mr. Rahul Gaware, | Mr. Ranjit Dhame, | Mr. Dinesh Alhat
Volume: 3
Issue: 7
Year: 2011





An Evaluative Model for Information Retrieval System Evaluation: A Usercentered Approach

Author(s): Bernard I. Akhigbe, | Babajide S. Afolabi, | James I. Udo, | Emmanuel R. Adagunodo
Volume: 3
Issue: 7
Year: 2011





Effect of Quality Parameters on Energy Efficient Routing Protocols in MANETs

Author(s): Dr. R.K Singh | Tanu Preet Singh, | Jayant Vats
Volume: 3
Issue: 7
Year: 2011





IMPROVED HYBRID MODEL FOR DENOISING POISSON CORRUPTED XRAY IMAGESks

Author(s): N. Umadevi, | Dr. S.N.Geethalakshmi
Volume: 3
Issue: 7
Year: 2011





Trust Worthy Architecture Implementation for Mobile Ad hoc Networks

Author(s): D.Saravanan, | R.M.Chandrasekaran, | B.Vishnu Prabha, | V.R.Sarma Dhulipala
Volume: 3
Issue: 7
Year: 2011





SUPPORT VECTOR MACHINE BASED GUJARATI NUMERAL RECOGNITION

Author(s): Mamta Maloo | K.V. Kale
Volume: 3
Issue: 7
Year: 2011





Road Recognition for Vision Navigation of Robot by Using Computer Vision

Author(s): Jagadeesh Thati, | Fazal Noorbasha, | Syam Babu Vadlamudi
Volume: 3
Issue: 7
Year: 2011





Efficient Lossless Colour Image Compression Using Run Length Encoding and Special Character Replacement

Author(s): Debashis Chakraborty, | Soumik Banerjee
Volume: 3
Issue: 7
Year: 2011





Comparision Of Traditional Method of Histogram Equalisation with HSV and Kekre Transform for Content Based Image Retrieval

Author(s): Ms. Venu Shah, | Ms. Archana Choudhary, | Prof. Kavita Tewari
Volume: 3
Issue: 7
Year: 2011





Recoverable Timestamping Approach For Concurrency Control In Distributed Database

Author(s): Rinki chauhan, | Suman Malik, | R K Rathy, | Preeti Bhati
Volume: 3
Issue: 7
Year: 2011





Simulation and Analysis of Digital Video Watermarking Using MPEG-2

Author(s): Dr. Anil Kumar Sharma, | Mr. Yunus Mohammed Pervej
Volume: 3
Issue: 7
Year: 2011





FP-Tree Based Algorithms Analysis: FPGrowth, COFI-Tree and CT-PRO

Author(s): Bharat Gupta | Dr. Deepak Garg
Volume: 3
Issue: 7
Year: 2011





A New Image Steganography Approach for Information Security Using Gray Level Images in Spatial Domain

Author(s): Rajkumar Yadav, | Ravi Saini | Kamaldeep
Volume: 3
Issue: 7
Year: 2011





TEMPORAL SEQUENTIAL PATTERN IN DATA MINING TASKS

Author(s): DR. NAVEETA MEHTA, | MS. SHILPA DANG
Volume: 3
Issue: 7
Year: 2011





A Review of Heuristics for Optimal Page Access Sequence with a Model for Spatial Queries

Author(s): Dr.Chandra.E, | Anuradha.V.P
Volume: 3
Issue: 7
Year: 2011





Achieving Improved Performance at Access Point in WLAN Infrastructure Mode

Author(s): Irfan Siddavatam
Volume: 3
Issue: 7
Year: 2011





DCF Improvement for Satisfactory Throughput of 802.11 WLAN

Author(s): Ashwini Dalvi, | Pamukumar Swamy, | B B Meshram
Volume: 3
Issue: 7
Year: 2011





Ant Colony Optimization approach for Solving FPGA routing with minimum Channel Width

Author(s): Vinay Chopra, | Amardeep Singh
Volume: 3
Issue: 7
Year: 2011





A Novel Approach for Text Categorization of Unorganized data based with Information Extraction

Author(s): Suneetha Manne, | Dr. S. sameen Fatima
Volume: 3
Issue: 7
Year: 2011





Accident Emergency Response And Routing Software (AERARS) using Genetic Algorithm

Author(s): Naveen Ramachandran, | G.Devi
Volume: 3
Issue: 7
Year: 2011





Iterative Enhanced Directional Based Demosaicking Algorithm

Author(s): A.Jayachandran , | Dr.R.Dhanasekaran, | Prof P. Rajan
Volume: 3
Issue: 7
Year: 2011





Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology

Author(s): B. Ravi Kumar, | Dr.P.R.K.Murti
Volume: 3
Issue: 7
Year: 2011





Molecular Database Generation for Type 2 Diabetes using Computational Science-Bioinformatics' Tools

Author(s): Gagandeep Kaur Grewal, | Dr. Amardeep Singh
Volume: 3
Issue: 7
Year: 2011





Simulator for Software Project Reliability Estimation

Author(s): Sanjana, | Dr. P.K. Suri
Volume: 3
Issue: 7
Year: 2011





An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

Author(s): Yogendra Kumar Jain, | Vinod Kumar Yadav, | Geetika S. Panday
Volume: 3
Issue: 7
Year: 2011





SEGMENTATION OF OIL SPILL IMAGES USING IMPROVED FCM AND LEVEL SET METHODS.

Author(s): V.RADHIKA, | DR. G. PADMAVATHI
Volume: 3
Issue: 7
Year: 2011





A Comparative Study of Location Management Schemes: Challenges and Guidelines

Author(s): Vijendra Singh Bhadauria, | Sanjeev Sharma, | Ravindra Patel
Volume: 3
Issue: 7
Year: 2011





Flood Frequency Analysis Using the Gumbel Distribution

Author(s): Never Mujere
Volume: 3
Issue: 7
Year: 2011





Multi-agent Collaboration Engine for Supply Chain Management

Author(s): Sandeep Garg, | Dr. S.Srinivasan, | Vivek Jaglan
Volume: 3
Issue: 7
Year: 2011





Distinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules

Author(s): Sridevi.Ravada, | Vani prasanna.Kanakala, | Ramya.Koilada
Volume: 3
Issue: 7
Year: 2011





Problem Analysis of Routing Protocols in MANET in Constrained Situation

Author(s): Manish Bhardwaj, | Sachi Pandey, | R.P Mahapatra
Volume: 3
Issue: 7
Year: 2011





Comparison of Optimal Homotopy Asymptotic Method with Homotopy Perturbation Method of Twelfth Order Boundary Value Problems

Author(s): MukeshGrover
Volume: 3
Issue: 7
Year: 2011





Linear Network Fractional Routing

Author(s): S.ASOKAN, | Dr.V.PALANISAMY
Volume: 3
Issue: 7
Year: 2011





DATA STREAM MINING ALGORITHMS – A REVIEW OF ISSUES AND EXISTING APPROACHES

Author(s): A.Mala, | F.Ramesh Dhanaseelan
Volume: 3
Issue: 7
Year: 2011





DESIGN OF PARAMETER EXTRACTOR IN LOW POWER PRECOMPUTATION BASED CONTENT ADDRESSABLE MEMORY

Author(s): Saroja pasumarti, | Lakshmi Kadali, | Swathi.Bankapalli
Volume: 3
Issue: 7
Year: 2011





Web Log Clustering Approaches – A Survey

Author(s): G. Sudhamathy, | Dr. C. Jothi Venkateswaran
Volume: 3
Issue: 7
Year: 2011





Performance Analysis of AODV-UI Routing Protocol With Energy Consumption Improvement Under Mobility Models in Hybrid Ad hoc Network

Author(s): Abdusy Syarif, | Riri Fitri Sari
Volume: 3
Issue: 7
Year: 2011





A Novel Method for Brain MRI Super-resolution by Wavelet-based POCS and Adaptive Edge Zoom

Author(s): N. Hema Rajini, | R.Bhavani
Volume: 2
Issue: 7
Year: 2010





Considerable Issues to detect Topical-Relevance Upon Free Texts

Author(s): Arpana Rawal, | M K Kowar, | Sanjay Sharma | H R Sharma
Volume: 2
Issue: 7
Year: 2010





Advanced Low Energy Adaptive Clustering Hierarchy

Author(s): Ezzati Abdellah, | Said Benalla, | Abderrahim BENI HSSANE | Moulay Lahcen HASNAOUI
Volume: 2
Issue: 7
Year: 2010





Study on the Customer targeting using Association Rule Mining

Author(s): Surendiran.R | Rajan.K.P | Sathish Kumar.M
Volume: 2
Issue: 7
Year: 2010





SELECT OF OPTIMAL SLEEP STATE IN ADAPTIVE SMAC USING DPM

Author(s): Elham Hajian, | Kamal Jamshidi, | Ali Bohlooli
Volume: 2
Issue: 7
Year: 2010





Improved CBIR using Multileveled Block Truncation Coding

Author(s): Dr.H.B.Kekre, | Sudeep D. Thepade | Shrikant P. Sanas
Volume: 2
Issue: 7
Year: 2010





Signature Analysis of UDP Streams for Intrusion Detection using Data Mining Algorithms

Author(s): R.Sridevi | Dr.K.Lakshmi
Volume: 2
Issue: 7
Year: 2010





Design and Development of Wireless Sensor Node

Author(s): Dipanjan Bhattacharjee, | Sourabh Kumar, | Akash Kumar, | Sushabhan Choudhury
Volume: 2
Issue: 7
Year: 2010





Use of Splines in Handwritten Character Recognition

Author(s): Sunil Kumar | Gopinath S, | Satish Kumar | Rajesh Chhikara
Volume: 2
Issue: 7
Year: 2010





The Efficient Ant Routing Protocol for MANET

Author(s): Srinivas Sethi | Siba K.Udgata
Volume: 2
Issue: 7
Year: 2010





An Enhanced k-means algorithm to improve the Efficiency Using Normal Distribution Data Points

Author(s): D.Napoleon, | P.Ganga Lakshmi
Volume: 2
Issue: 7
Year: 2010





Mobile Wireless Enhanced Routing Protocol in Adhoc Networks

Author(s): A.Sreelatha | Dr.A.VinayaBabu, | K.Madhukar, | S.Nagaprasad, | D.Marlene Grace Verghese | V.Mallaiah | A.Pratima
Volume: 2
Issue: 7
Year: 2010





Adaptation of Optimal Methods In Resource Utilization, Job Scheduling In Grids

Author(s): Jhansi Lakshmi Vaddelle, | Y.Surekha, | D.Sree Lakshmi
Volume: 2
Issue: 7
Year: 2010





Drag and Drop: Influences on the Design of Reusable Software Components

Author(s): B.Jalender, | Dr A.Govardhan, | Dr P.Premchand, | Dr C.Kiranmai, | G.Suresh Reddy
Volume: 2
Issue: 7
Year: 2010





An Optimized Round Robin Scheduling Algorithm for CPU Scheduling

Author(s): Ajit Singh | Priyanka Goyal, | Sahil Batra
Volume: 2
Issue: 7
Year: 2010





Power Control Algorithm for Wireless Sensor Networks using N-Policy M/M/1 Queueing Model

Author(s): R. Maheswar, | Dr. R. Jayaparvathy
Volume: 2
Issue: 7
Year: 2010





An Algorithmic Approach for Efficient Image Compression using Neuro-Wavelet Model and Fuzzy Vector Quantization Technique

Author(s): Vipula Singh, | Navin Rajpal, | K. Srikanta Murthy
Volume: 2
Issue: 7
Year: 2010





e-Governance Applications for citizens - Issues and Framework

Author(s): S. Prem Kumar, | J. Keziya rani | Dr. C. Umashankar | Dr. V.V.Venkata Ramana
Volume: 2
Issue: 7
Year: 2010





Simulation Based Design of Retention Tank of Modular Controller Discharge System (MCDS) for Train Coaches

Author(s): Rajesh Kumar Garg | Vikram Singh
Volume: 2
Issue: 7
Year: 2010





mage Mining using Content Based Image Retrieval System

Author(s): Rajshree S. Dubey | Niket Bhargava | Rajnish Choubey
Volume: 2
Issue: 7
Year: 2010





Comparative study of various PKINIT methods used in Advanced Kerberos

Author(s): Shital S. Thorat, | H. K. Sawant, | Sarita S. Gaikwad, | G. T. Chavan
Volume: 2
Issue: 7
Year: 2010





A Survey on Early Determination of Zero Quantized Coefficients in Video Coding

Author(s): S. Immanuel Alex Pandian | Dr. G. Josemin Bala, | A. Anci Manon Mary
Volume: 2
Issue: 7
Year: 2010





Grid Scheduling using Differential Evolution (DE) for solving multi-objective optimization parameters

Author(s): A.R. Jayasudha, | Dr. T. Purusothaman
Volume: 2
Issue: 7
Year: 2010





An Effective Stereo Visualization System Implementation for Virtual Prototyping

Author(s): R.S. Kamath | Dr. R.K. Kamat
Volume: 2
Issue: 7
Year: 2010





Cluster Based Packet Loss Prediction using TCP ACK packets in Wireless Network

Author(s): BALAJI V, | DURAISAMY V
Volume: 2
Issue: 7
Year: 2010





Building Classification System to Predict Risk factors of Diabetic Retinopathy Using Text mining

Author(s): T.Sudha, | S.Sagar Imambi
Volume: 2
Issue: 7
Year: 2010




