Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Advanced Research in Computer Science

ISSN: 0976--5697
Publisher: International Journal of Advanced Research in Computer Science


ADD TO MY LIST
 
Optimal View Selection by View Relevance Driven Selection Algorithm

Author(s): Chaitali R. Chaudhari | R. M. Tugnayat | Ganesh B. Regulwar
Volume: 1
Issue: 3
Year: 2010
A Novel Hybrid Structure of SVC and IPFC for Static Voltage Stability Margin Improvement

Author(s): Reza Sedaghati | Ahmad Rohani
Volume: 04
Issue: 09
Year: 2013
A Survey on Preprocessing in Text Mining

Author(s): Dr. Anadakumar. K | Ms. Padmavathy. V
Volume: 04
Issue: 09
Year: 2013
A Study of the Challenges and Security Aspects of Migration from Ipv4 to Ipv6

Author(s): Azka Wani | Javed Parvez
Volume: 04
Issue: 09
Year: 2013
VLSI Implementation of Neural Network for Signal Compression & Decompression

Author(s): S.R.Kshirsagar | Prof. A.O.Vyas | Prof. A.D.Raut
Volume: 04
Issue: 09
Year: 2013
Detecting Botnets in View of an Efficient Method

Author(s): Narges Arastouie | Naeemeh Arastooie | Elham Salimi | Saeed Soltanali
Volume: 04
Issue: 09
Year: 2013
A Novel Method for Classification of Bank Customers Based on the Rough Set and Rules Extraction

Author(s): Ali Reza Taleghani | Mohammad Saniee Abadeh
Volume: 04
Issue: 09
Year: 2013
Energy Consumption in Peer-Assisted CDN

Author(s): Mohamad Dikshie Fauzie | Achmad Husni Thamrin | Jun Murai
Volume: 04
Issue: 09
Year: 2013
Selection Search on Meta Search Engine

Author(s): Mr. Biraj Patel | Dr. Dipti Shah
Volume: 04
Issue: 09
Year: 2013
Clustering algorithm optimized for Cell Broadband Engine Architecture

Author(s): Ioan Ungurean
Volume: 04
Issue: 09
Year: 2013
Influences Combination of Multi-Sensor Images on Classification Accuracy

Author(s): Firouz Abdullah Al-Wassai | N.V. Kalyankar
Volume: 04
Issue: 09
Year: 2013
A Critical Review of K Means Text Clustering Algorithms

Author(s): Francis Musembi Kwale
Volume: 04
Issue: 09
Year: 2013
Auto-Regressive based Feature Extraction and Classification of Epileptic EEG using Artificial Neural Network

Author(s): Ashish Raj | Manoj Kumar Bandil | D B V Singh | Dr.A.K Wadhwani
Volume: 04
Issue: 09
Year: 2013
Techniques for Recognition of Handwritten Devanagari Numeral

Author(s): Madhav Goyal | Naresh Kumar Garg
Volume: 04
Issue: 09
Year: 2013
An Optimization Approach to IT System Development and Change Control Methodologies in Business Process Reengineering

Author(s): Bechoo Lal | Dr. Chandrahauns R. Chavan
Volume: 04
Issue: 09
Year: 2013
Deployment models of Cloud Computing: Challenges

Author(s): M. Srilakshmi | CH. Lakshmi Veenadhari | I.Kali Pradeep
Volume: 04
Issue: 09
Year: 2013
Support Vector Machines for Odiya Handwritten Numeral Recognition

Author(s): Rasmi Ranjan Das | Swati Sucharita Das | Shom Prasad Das
Volume: 04
Issue: 09
Year: 2013
A Review on Detection of Session Hijacking and Ip Spoofing

Author(s): Abhishek Kumar Bharti | Maggi Goyal
Volume: 04
Issue: 09
Year: 2013
Design and Implementation of Testing Tool for Code Smell Rectification Using C-Mean Algorithm

Author(s): Gurpreet Singh | Vinay Chopra
Volume: 04
Issue: 09
Year: 2013
Green Computing: Eco-Friendly Computing Resources

Author(s): Kowsalyadevi Prakash
Volume: 04
Issue: 09
Year: 2013
Image Retrieval Comparisons Using Color Models

Author(s): E.Sirisha | B.Uma Shravani | J.Kanaka Priya
Volume: 04
Issue: 09
Year: 2013
A Survey of Routing Protocols for Opportunistic Mobile Adhoc Networks

Author(s): Er.Maggi Goyal | Er.Manoj Chaudhary | Er.Abhishek Bharti
Volume: 04
Issue: 09
Year: 2013
Energy Efficient Ad-Hoc On-Demand Distance Vector (Ee-Aodv) Routing Protocol For Mobile Ad Hoc Networks

Author(s): B.Narasimhan | R. Balakrishnan
Volume: 04
Issue: 09
Year: 2013
Space time Block Coding for MIMO systems over a Raleigh fading Channels with Low Decoding Complexity

Author(s): Shriddha Shrivastava | Jaikaran Singh | MukeshTiwari
Volume: 04
Issue: 09
Year: 2013
Performance Comparison of Transform Techniques for Hand Gesture Recognition

Author(s): Dr. Tanuja K. Sarode | Vaishali Sakpal
Volume: 04
Issue: 09
Year: 2013
A secure approach for storing and using health data in a Private cloud environment

Author(s): K.Pullarao | K.Thirupathirao
Volume: 04
Issue: 09
Year: 2013
A Comparative Study of Image Restoration Algorithms using Images from different areas of imaging

Author(s): Sruti Sruba Bharali | Daisy Das
Volume: 04
Issue: 09
Year: 2013
Implementation of FMFRS (Fault Tolerant Most fitting Resource Scheduling) algorithm in Real time system

Author(s): Harkiran Kaur | Er. Deepankar Verma
Volume: 04
Issue: 09
Year: 2013
Assessment of Data Warehouse Model Quality

Author(s): Hunny Gaur | Rakhee
Volume: 04
Issue: 09
Year: 2013
HPAARM: Hybrid Parallel Algorithm for Association Rule Mining

Author(s): Prathyusha Kanakam | S Radha Krishna
Volume: 04
Issue: 09
Year: 2013
An Efficient and Secure Searching Model for Outsourced Cloud Data

Author(s): Shynu P.G | Meena Jose | Merris Mary Chacko
Volume: 04
Issue: 09
Year: 2013
Implementation of GCM for Mobile Cloud Computing in Android Devices

Author(s): Sundeep Kumar | Manoj Kumar
Volume: 04
Issue: 09
Year: 2013
An Affix Based Word Classification Method of Assamese Text

Author(s): Bhairab Sarma | Bipul Shyam Purkayastha
Volume: 04
Issue: 09
Year: 2013
Approach for Labeling the Class of Credit card Customers via Clustering Method in Data Mining

Author(s): Mizanur Rahman | Sujit Kumar Mondal
Volume: 04
Issue: 09
Year: 2013
Making Mutation Adaptive in Genetic Algorithm

Author(s): Suyash Raghava
Volume: 04
Issue: 09
Year: 2013
Approximate Nearest Neighbour Using Data Mining

Author(s): Deepika Verma | Namita Kakkar
Volume: 04
Issue: 09
Year: 2013
A Review of AODV Based Routing Protocols for Mobile Ad-hoc Network

Author(s): Ashwini Pansare
Volume: 04
Issue: 09
Year: 2013
Multi-Level Steganographic Algorithm for Audio Steganography using LSB, Parity Encoding and Advanced LSB Technique

Author(s): Kamalpreet Kaur | Er. Deepankar Verma
Volume: 04
Issue: 09
Year: 2013
Evaluation and Comparison among Scheduling Algorithms in WiMAX

Author(s): Ramanpreet Kaur | Amardeep Kaur
Volume: 04
Issue: 09
Year: 2013
Classification of Epileptic EEG Using Wavelet Transform & Artificial Neural Network

Author(s): Ashish Raj | Manoj Kumar Bandil | D B V Singh | Dr. A.K Wadhwani
Volume: 04
Issue: 09
Year: 2013
Robust Hybrid Feedback Control Design for Ramp Metering using Sliding Mode Control

Author(s): Bhawna Sharma | Devanand | Pushkin Kachroo
Volume: 04
Issue: 09
Year: 2013
Development of Semantic Analyzer for Audio Steganography Using Spread Spectrum Technique

Author(s): Anamika Sharma | Pushpinder Singh
Volume: 04
Issue: 09
Year: 2013
Genuine Character Foundation of Scheduling and its Challenges in Grid Computing

Author(s): Anil Kumar | Ajay Jangra
Volume: 04
Issue: 09
Year: 2013
Analysis of Texture Classification By Wavelet Transform And Curvelet Transform

Author(s): M.Santhanalakshmi | Dr.K. Nirmala
Volume: 04
Issue: 09
Year: 2013
A Comparative Study of Audio and Video Query Retrieval Approaches in Multimedia Databases

Author(s): Sneha U.Bohra | Prof.Satish Alaspurkar
Volume: 04
Issue: 06
Year: 2013
Review Paper on Sentiment Analysis Using Web 2.0 by Classification Method

Author(s): Miss. Siddhi Patni | Prof. Avinash Wadhe
Volume: 04
Issue: 06
Year: 2013
Enhanced Ant Colony Based Algorithm for Routing in Mobile Ad Hoc Network

Author(s): Ms. Sneha R. Kaware | Prof .K.G. Bagde
Volume: 04
Issue: 06
Year: 2013
“The Routing of an Autonomous System with C-Border Gateway Protocol in Network”

Author(s): Miss. Snehal D. Nanhore | Mr. Mahip M. Bartere
Volume: 04
Issue: 06
Year: 2013
A Review Paper on Cloud Computing Security

Author(s): Miss. Trupti S. Lokhande | Prof. Rajeshri R. Shelke
Volume: 04
Issue: 06
Year: 2013
Optical Burst Switching

Author(s): Miss. Vaishali K.Bhusari | Mr. Amit M.Sahu
Volume: 04
Issue: 06
Year: 2013
Faster Retrival Of Webpages Using Memory Caching Technique

Author(s): Miss. Afroz K.. Khan | Miss. Urmila S. Gavali | Mr. Rajshekhar Yadav | Prof. S. P. Aware
Volume: 04
Issue: 06
Year: 2013
Digital Image Processing

Author(s): Harshada M. Kariya | Anushree Wasu
Volume: 04
Issue: 06
Year: 2013
Cloud Management with Open Source Tools

Author(s): Manish S. Thakare | Akash T. Kuratkar
Volume: 04
Issue: 06
Year: 2013
GSM/GPRS Based Vehicle Tracking System and Speed Detection with Toll Collection

Author(s): Pratik Prakash Thakare | Vrushali Prakash Thakare | Mayuri Avdhutrao Joshi
Volume: 04
Issue: 06
Year: 2013
Cloud based Implicit Password Authentication System

Author(s): Ms. Chaitali B. Khodani | Ms. Namrata A. Khodke | Prof. Aditya Bakshi
Volume: 04
Issue: 06
Year: 2013
Single Sign On Certificate Based Authentication for WS-Security

Author(s): Miss. Prachi M. Kharat | Miss. Prachi A. Deshpande | Prof. Aaditya P. Bakshi
Volume: 04
Issue: 06
Year: 2013
Fraud Detection with the Help of Hidden Markov Model and Neural Network

Author(s): Sagar P. Jumde | Radha W.Nalamwar | Prof. Sunita P.Aware
Volume: 04
Issue: 06
Year: 2013
History and Features of a developer tool in iOS: XCODE

Author(s): Miss Priyanka V. Kanoi | Miss Payal N. ingole
Volume: 04
Issue: 06
Year: 2013
An Task and Time Scheduler System Based on Rich Internet Applications

Author(s): Miss. Rupali R. Waghmare | Miss. Reshma R. Gatade | Miss. Rashmi R. Rajurkar
Volume: 04
Issue: 06
Year: 2013
A Survey - Different Models in Cloud Computing

Author(s): Dharti S. Kute | Ankita S. Patil | Nilima V. Pardakhe
Volume: 04
Issue: 06
Year: 2013
Clustering Techniques

Author(s): Swapnil R. Isod | Amit M. Sahu
Volume: 04
Issue: 06
Year: 2013
Intrusion Detection for eliminating Security Issues in Wireless Mobile Ad Hoc Networks

Author(s): P. R Ubhale | A. M. Sahu
Volume: 04
Issue: 06
Year: 2013
License Plate Recognition System

Author(s): Miss. Jayshri V.Choudhary | Mr. Amit M. sahu
Volume: 04
Issue: 06
Year: 2013
Developing Linux Device Drivers For Audio Codec

Author(s): Miss.Sapana S. Kukade
Volume: 04
Issue: 06
Year: 2013
Survey on Face Recognition Under Variable Illuminations and Poses

Author(s): Ms. Khushboo | B.Trivedi | Prof.V.T.Gaikwad
Volume: 04
Issue: 06
Year: 2013
Survey on Data Mining Technique Using Decision tree For Hepatitis virus

Author(s): Miss K. P. Lokhande | Prof. Avinash. P. Wadhe
Volume: 04
Issue: 06
Year: 2013
Energy Efficient Networks : A Survey

Author(s): Hemant P. Moodliar | Dr. Raju. M. Tugnayat
Volume: 04
Issue: 06
Year: 2013
Analysis of Various Topology Based Routing Protocols in VANET

Author(s): Ms. N. V. Pardakhe | Prof. R. R Keole
Volume: 04
Issue: 06
Year: 2013
Infrastructure of Authentication and Authorization for Mobile Users Using Pervasive- PKI

Author(s): Ms. Poonam | A. Manjare | Prof. R. R Keole
Volume: 04
Issue: 06
Year: 2013
Misuse Detection System Using Various Techniques: A Review

Author(s): Ms.R.S.Landge | Mr.A.P.Wadhe
Volume: 04
Issue: 06
Year: 2013
Review Paper on Artificial Neural Networks

Author(s): Rani Pagariya | Mahip Bartere
Volume: 04
Issue: 06
Year: 2013
A Secure Authentication Using Graphical Password Authentication System: GPAS

Author(s): Nikhil Arun Pogale | Deepak Ganpatrao Rasekar | Prof. Aditya P. Bakshi
Volume: 04
Issue: 06
Year: 2013
A Review: Oracle Big Data Aplliance

Author(s): Vivek D. Honule | Mrunali G. Bukkawar
Volume: 04
Issue: 06
Year: 2013
An Effective mechanism for Ensuring Security of QR Code

Author(s): Ashish R. Wane | Siddharth P. Jamankar | Onkar V. Chandure
Volume: 04
Issue: 06
Year: 2013
Challenges and Future Directions in Ad Hoc Networking-Review

Author(s): K. S. Tayde | A. M. Sahu
Volume: 04
Issue: 06
Year: 2013
Implementation of Elliptic Curve Cryptography in Primary Field

Author(s): Miss. Namrata Sable | Mr. Avinash P. Wadhe
Volume: 04
Issue: 06
Year: 2013
GSM mobile phone based LED scrolling message display system

Author(s): Priyanka A. Borkar | Ashish K. Muley | Niraj B.Masram | Dr. R.M. Tugnayat
Volume: 04
Issue: 06
Year: 2013
Traffic Square Management System

Author(s): Sujata V. Padole
Volume: 04
Issue: 06
Year: 2013
ASL Based Hand Gesture Recognition System

Author(s): Mr. Swapnil A. Bobade | Prof. Vijaya K. Shandilya
Volume: 04
Issue: 06
Year: 2013
ARM Based Remote control Toy Car

Author(s): Harish G Langar | Atul P Shinghade | Pavan V Sukode
Volume: 04
Issue: 06
Year: 2013
WAVE: Wireless Access for Vehicular Environment

Author(s): Miss Bhagyashri S.Kharate | Prof. Sandip T. Dhagdi
Volume: 04
Issue: 06
Year: 2013
Network Traffic Monitoring with IDS

Author(s): Ms. P. A. Patil | Prof. R. R Keole
Volume: 04
Issue: 06
Year: 2013
Wireless Network Security for IEEE 802.1 1A/B/G and Bluetooth

Author(s): Mr.Rahul S. Joshi | Mr.Chandrakant A. Atram | Prof.Dr.R.M.Tugnayat
Volume: 04
Issue: 06
Year: 2013
Botnet Analysis and Detection

Author(s): Prof Amit sahu | B. G. Dalvi
Volume: 04
Issue: 06
Year: 2013
QR Codes and Security Mechanism Using Mobile Phones

Author(s): Mr. Sarang A. Kotalwar | Prof. Onkar V. Chandure
Volume: 04
Issue: 06
Year: 2013
A Survey paper on Comparative Analysis on Routing Protocol for Energy Efficiency in MANET

Author(s): Miss. Namrata R. Borkar | Prof. S.J. Alasapurkar
Volume: 04
Issue: 06
Year: 2013
Design of Game Application using Android Architecture

Author(s): Miss. Shital V. Narlawar | Miss. Sonal G. Chopade | Miss. Vaishnavi C. Vikhore | Mr. Sandip A. Kahate
Volume: 04
Issue: 06
Year: 2013
Vehicular Mobility Simulation For VANET

Author(s): Miss.Shruti S.Khope | Miss. Swati V.Gayakwad | Prof.Sandip T. Dhagdi
Volume: 04
Issue: 06
Year: 2013
Grid Operating System: Making Dynamic Virtual Services in Organizations

Author(s): Miss.Snehal S. Dhole | Prof. M. R. Shahade
Volume: 04
Issue: 06
Year: 2013
Virtual Machine and Network-Performance,Study,Advantages And Virtualisation Option

Author(s): Miss. Snehal R.Dive | Mr. Amit D.Ingale | Mr.M.R.Shahade
Volume: 04
Issue: 06
Year: 2013
An Effective Technique For Generation And detection Of QR code

Author(s): Miss. Usha R. pardhi | Prof. Onkar V. Chandure | Miss. Priyanka S. Atal
Volume: 04
Issue: 06
Year: 2013
Mobile Telephony Over Wi-Fi Using VOIP

Author(s): Ms. Vaishali R. Mhatarmare | Prof. A. D. Raut
Volume: 04
Issue: 06
Year: 2013
A Survey On New Approach For Detecting Blackhole Attack

Author(s): Ankush D. Patil | Jyoti B. Rathi | Yogadhar Pandey
Volume: 04
Issue: 06
Year: 2013
Methodological Advances in Remote Sensing Image Processing

Author(s): Amruta G.Chakkarwar
Volume: 04
Issue: 06
Year: 2013
Detection Of Duplicate Code

Author(s): Ms. Kanchan A. Jadhao | Mr. Shubhendra R.Puri | Ms.Nikita S.Varhade | Prof. Ganesh B.Regulwar
Volume: 04
Issue: 06
Year: 2013
Script Identification of Text Words from Indian Document through Discriminating Features

Author(s): Miss. Priyanka P. Yeotikar | Prof. P. R. Deshmukh
Volume: 04
Issue: 06
Year: 2013
Design of Electricity Theft Monitoring System in Customer Consumptions

Author(s): Saurabh Manohar Hadge | Sarang Giridhar Kamble | Prof. A. D. Raut
Volume: 04
Issue: 06
Year: 2013
Nymble: Blocking Misbehaving Users inAnonymizing Networks

Author(s): Dipali V. Yelane | Navita Nagdive | Prof. Dr. R. M. Tugnayat
Volume: 04
Issue: 06
Year: 2013
Sharing Backup and Restoring Data Using Android Based Server

Author(s): Ms.Dhanashri R. Karanjkar | Mr.Gopal P. Dhole | Prof.Sunita P. Aware
Volume: 04
Issue: 06
Year: 2013
A Novel Implementation of Video Display and Different Application Online Using Html5

Author(s): Mr Rupal B. Jaiswal | Mr. Sanket N Jadhav | Prof Sandip Dhagdi
Volume: 04
Issue: 06
Year: 2013
Advancement in Image processing using Android

Author(s): Mr. Sadanand S. Muktawar | Miss.Juhi R. Bobade | Prof.S.A. Kahate
Volume: 04
Issue: 06
Year: 2013
An Efficient Sic Detection Algorithm for 64-Qam Mimo Systems

Author(s): Panchumarthi V Bhargavi | Prof.K.V.S.N.Raju | Buddaraju Revathi
Volume: 04
Issue: 05
Year: 2013
Comparative Study of Denoising Methods for Satellite Image Restoration Using Matlab

Author(s): Ganesan P | Dr V.Rajini
Volume: 04
Issue: 05
Year: 2013
Privacy - Preserving Audit of Secure Data Storage Services in Cloud Computing

Author(s): M.Kanchana | M. Kiran Kumar | Sk. Nazar hussain | C. Praveen
Volume: 04
Issue: 05
Year: 2013
Association Rule Mining among web pages for Discovering Usage Patterns in Web Log Data

Author(s): L.Mohan | T.Venu Gopal
Volume: 04
Issue: 05
Year: 2013
Genetic Algorithm – A Case Study in Gene Identification

Author(s): V. Bhaskara Murthy | Dr. G. Pardha Saradhi Varma
Volume: 04
Issue: 05
Year: 2013
Cross Layer Based Security in MANET

Author(s): K.Suresh Babu | K.Chandrasekharaiah
Volume: 04
Issue: 05
Year: 2013
Stable and Secure AODV protocol for MANET

Author(s): A.Ravali | K. Suresh Babu
Volume: 04
Issue: 05
Year: 2013
A Secure DSDV Protocol for Manets

Author(s): M.Kalavathi | K. Suresh Babu
Volume: 04
Issue: 05
Year: 2013
An Efficient Approach for Mining Web Links Based on Priority

Author(s): K.Swathi | M.Meghana | T.Subba Reddy
Volume: 04
Issue: 05
Year: 2013
Spatial Domain Image Enhancement using Cloud Model for Suppressing Impulse Noise

Author(s): M. Jagannadha Rao | I . Suneetha
Volume: 04
Issue: 05
Year: 2013
Number Plate Recognition Based on Multi Feature and Character Recognition

Author(s): S. Thanojkumar | I. Suneetha
Volume: 04
Issue: 05
Year: 2013
A Semi Automated Method for Identification of Arthritis Using Statistical Features

Author(s): Mr.M.Subramoniam | Dr.V.Rajini
Volume: 04
Issue: 05
Year: 2013
Implementation of PID and Fuzzy PID controllers for Temperature control in CSTR

Author(s): S. Srinivasulu Raju | T.K.S. Ravi Kiran | K.M.N. Chaitanya Kumar Reddy | M. Viswanath
Volume: 04
Issue: 05
Year: 2013
Application of Bone Fracture Evaluation Using A-Mode Ultrasound System

Author(s): G Vijay Kumar | Dr. G.V Raju | P NarendraBabu | G V GeethaMadhavi
Volume: 04
Issue: 05
Year: 2013
Comparison of Controller Performance of Fuzzy with PID for a Level Control of Conical Tank System

Author(s): A.Srividya | M. Viswanath | T.K.S.Ravi Kiran | M.Ayeesha siddiqa
Volume: 04
Issue: 05
Year: 2013
Intrusion Detection for TCP-SYNC Flood Attack

Author(s): Mohnish Awade
Volume: 04
Issue: 05
Year: 2013
A Review of Computer Vision based Algorithms for accurate and efficient Object Detection

Author(s): Aneissha Chebolu | Manvi Malik
Volume: 04
Issue: 05
Year: 2013
Iris Recognition Algorithm Using Effective Localized Fuzzy Features

Author(s): Ankarao Ittadi | Manoj Jain
Volume: 04
Issue: 05
Year: 2013
Denoising of Image and Audio by using Wavelet Transform

Author(s): T.V.hyma lakshmi | Ramesh Nayak.D
Volume: 04
Issue: 05
Year: 2013
Design of Grassmannian Weightbooks and Binary weightbooks for MIMO Beamforming Systems

Author(s): Siva Kiran Varma V | G.V.S.Padma Rao | Buddaraju Revathi
Volume: 04
Issue: 05
Year: 2013
Analysis on Cloud Computing

Author(s): S.PATHRO | D.VENKATESH | K.J.SRIHARSHA
Volume: 04
Issue: 05
Year: 2013
VCCM – Virtual Conference Content Mapping

Author(s): I. Sai Krishna | Venkatrama Phani Kumar S | K.V.Krishna Kishore
Volume: 04
Issue: 05
Year: 2013
A Novel Secure Routing Protocol for Wireless Sensor Networks Using Binary Authentication Tree

Author(s): B. Ganga Bhavani | G L N V S Kumar | R.V. Satyanarayan
Volume: 04
Issue: 05
Year: 2013
Soft Computing Techniques in Wind Electric Generation

Author(s): G.D.Anbarasi Jebaselvi | S.Paramasivam
Volume: 04
Issue: 05
Year: 2013
Ownership authentication by using the combination of Arnold transformation and wavelet transformation in semi fragile watermarking

Author(s): Seetaiah Kilaru | Yojana Kanukuntla | Ramesh Garla
Volume: 04
Issue: 05
Year: 2013
An Efficient Bayesian Classifier in SQL with PCA

Author(s): DS.Bhupal Naik | S.Deva kumar | G Sridhar Reddy
Volume: 04
Issue: 05
Year: 2013
An Analysis of Applications to Nonstandard Problems in ACO

Author(s): H.Vignesh Ramamoorthy | B.Sabarigiri
Volume: 04
Issue: 04
Year: 2013
“Various Approaches of Requirement Engineering and Comparisons among These Approaches

Author(s): Anandi Mahajan | Dr. Anurag Dixit
Volume: 04
Issue: 04
Year: 2013
J1 Accumulator-Based Processor for Educational Purposes

Author(s): Askari Yadollahpour Mansour | Ahmad Habibizad Navin | Amir Masoud Rahmani
Volume: 04
Issue: 04
Year: 2013
Routing and Reducing Perturbation in Mobile ad Hoc Networks (Manets) for Efficient Communication

Author(s): Kebande Rigworo Victor
Volume: 04
Issue: 04
Year: 2013
Simulation based study of common issues in Flooding over Mobile ad hoc networks

Author(s): Ramandeep kaur | Parminder singh
Volume: 04
Issue: 04
Year: 2013
A Modified Low Power FFT/IFFT Processor for OFDM Applications

Author(s): S.Lavanya | Ms.M.Jasmin
Volume: 04
Issue: 04
Year: 2013
Gas Level Monitoring and Detection using RFID Technique

Author(s): I. Juvanna | N. Meenakshi
Volume: 04
Issue: 04
Year: 2013
Coevolution Evolutionary Algorithm: A Survey

Author(s): Jeniefer Kavetha. M
Volume: 04
Issue: 04
Year: 2013
Matching of Fingerprint Geometry by Advanced Divide and Conquer Technique

Author(s): Sanjukta Pal | Sucharita pal | Prof.(Dr) Pranam Paul
Volume: 04
Issue: 04
Year: 2013
PG-RM: Prognostic Approach for optimizing Grid computation using Risk Management Methodology

Author(s): Rahul Bose | Prabhat Kumar Singh | Sunil Kumar Singh | S Venkatesan
Volume: 04
Issue: 04
Year: 2013
Constructive Review of Transaction Models in Database Systems

Author(s): S.Meenakshi | Dr.V.Thiagarasu
Volume: 04
Issue: 04
Year: 2013
High Capacity Image Steganography Using Curvelet Transform and Bit Plane Slicing

Author(s): Sheshang D. Degadwala | Amit R. Thakkar | Rikin J. Nayak
Volume: 04
Issue: 04
Year: 2013
E-Commerce on Cloud: Issues, Attacks & Security

Author(s): P. S. Lokhande | B. B. Meshram
Volume: 04
Issue: 04
Year: 2013
Analysis of Enterprise Material Procurement Leadtime using Techniques of Data Mining

Author(s): S. Hanumanth Sastry | Prof. M. S. Prasada Babu
Volume: 04
Issue: 04
Year: 2013
Mining of Different Types of Hidden Knowledge from Log Files

Author(s): Wajih Abdul Ghani Abdul Hussain | Dr. Hussain k. Al_khafaji
Volume: 04
Issue: 04
Year: 2013
Caste Shadow Removal in Vehicle Detection using Mixture of Gaussian for Traffic Surveillance System

Author(s): Vanraj Dangar | Amit Thakkar
Volume: 04
Issue: 04
Year: 2013
A Model for Inferring Trust for an Unknown User on Social Networking Sites

Author(s): Amrita Srivastava | Ruchi Verma | Ram Chandra Yadav | S. Venkatesan
Volume: 04
Issue: 04
Year: 2013
A Novel Architecture for Personalized Image Retrieval from Social Websites

Author(s): M. Kameswara Rao | Pujari NagaLakshmi | Priyanka Mondal | M. Sarath Chandra | G. Sai Kiran
Volume: 04
Issue: 04
Year: 2013
Visual role mining to avoid text complexity using fuzzy logic decision system

Author(s): G. Narmada | M.K.Shanmathi | Ms.N.D.Thamarai selvi
Volume: 04
Issue: 04
Year: 2013
Security Concerns In the World of Cloud Computing

Author(s): Kashish Goyal | Supriya
Volume: 04
Issue: 04
Year: 2013
A Comparative Evaluation of Remote Administration Tools

Author(s): Rupal D. Bhatt | Dr. D.B.Choksi
Volume: 04
Issue: 04
Year: 2013
Join Queries Translation from SQL to XML

Author(s): Bhargavi K. | Chaithra H. S.
Volume: 04
Issue: 04
Year: 2013
Enhanced Database Migration Technique Using XML

Author(s): V.Hemalatha | Alok Ranjan
Volume: 04
Issue: 04
Year: 2013
A Survey on Modeling and Simulation of Cloud Computing Environments

Author(s): Garima Gupta | Arunadha Chug
Volume: 04
Issue: 04
Year: 2013
Real Time Static Hand Gesture Recognition System Using Hci For Recognition Of Numbers

Author(s): Prof J.R.Pansare | Jay Shrotriya | Rahul Durrani | Sonam Jaisinghani | Ziyaan Dadachanji
Volume: 04
Issue: 04
Year: 2013
Security Issues in Mobile Ad-hoc Networks Routing

Author(s): Ipsita Panda
Volume: 04
Issue: 04
Year: 2013
A Framework for Accessing Remote Machine Configuration using Mobile Agents

Author(s): Pravada S. Bharatkar
Volume: 04
Issue: 04
Year: 2013
Functional Magnetic Resonance Imaging and Schizophrenia as Disconnection Disorder

Author(s): Pritesh G. Shah | Bharti W. Gawali
Volume: 04
Issue: 04
Year: 2013
An Efficient IT-QMWFM Tier Architecture for Work Flow Management through Queue Management in an IT Infrastructure

Author(s): V. R. Elangovan | Dr. E. Ramaraj
Volume: 04
Issue: 04
Year: 2013
High Power Factor Interleaved Boost AC-DC Converter with ZVS for Charging Battery Operated Vehicles

Author(s): K. SivaRaman | B.Vaidiyanathan
Volume: 04
Issue: 04
Year: 2013
A Review On A Mechanism Of Ensuring Data Storage Security In Cloud Computing

Author(s): Gayatri V. Shastri | Charul D.Akhade | Dnyaneshwar P.Shirame | Prof.Sandip T.Dhagdi
Volume: 04
Issue: 04
Year: 2013
Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme

Author(s): Sarita Motghare | P.S.Mohod | S.P.Khandait | Anil Jaiswal
Volume: 04
Issue: 04
Year: 2013
Survey of Traffic Classification using Machine Learning

Author(s): Jamuna .A | Vinoth Ewards S.E
Volume: 04
Issue: 04
Year: 2013
Novel Method of Color Image Enhancement Based on Daubechies D4 Wavelet Analysis

Author(s): Murtaza Saadique Basha | Dr.M.Ramakrishnan
Volume: 04
Issue: 04
Year: 2013
Private Cloud Implementation at Enterprise with IBM Workload Deployer

Author(s): Prashant A. Gadling | Prof. A.V. Deorankar | Dr.P. N. Chatur
Volume: 04
Issue: 04
Year: 2013
Privacy Issues and Measurement in Cloud Computing: A Review

Author(s): Ishan Rastogi | Adesh Chandra | Vivek Kumar Gupta | Dr. Abhishek Vaish
Volume: 04
Issue: 04
Year: 2013
Artificial Neural Network Based Adaptive Chess Playing Machine

Author(s): Diwas Sharma | Udit Kr. Chakraborty
Volume: 04
Issue: 04
Year: 2013
Secure Energy Aware Multi-hop Routing Protocol for Wireless Sensor Networks

Author(s): V.Chandrasekaran | K.Lalitha | S.Anitha
Volume: 04
Issue: 04
Year: 2013
A Survey on Elliptical Curve Cryptography in Different Methods

Author(s): Kanaklata Verma | Himani Agrawal
Volume: 04
Issue: 04
Year: 2013
Online Video Streaming System

Author(s): Ms. Supriya Thombre | Gaurav Diyewar | Samruddha Barai | Pranay Tiwari
Volume: 04
Issue: 04
Year: 2013
The Research Roadmap of Requirement Validation

Author(s): Dhirendra Pandey
Volume: 04
Issue: 04
Year: 2013
Power Harvesting and Area Efficient Clock Gating Method for a De-Composed MUX Controller

Author(s): R.G.Venkatesan | S.Vijayakumar | P.Yesodha
Volume: 04
Issue: 04
Year: 2013
E-commerce In Enterprise Marketing Management Environment

Author(s): Mangesh S. Dabhade | Dr. P. N. Chatur | Prof. R. V. Mante
Volume: 04
Issue: 04
Year: 2013
A Survey on Signature Generation Methods for Network Traffic Classification

Author(s): Vinoth George C | Vinodh Ewards
Volume: 04
Issue: 04
Year: 2013
Improved techniques for Image Retrieval

Author(s): Priyanka Gupta | Mr. Umesh Kumar
Volume: 04
Issue: 04
Year: 2013
High Step Up Dc-Dc Converter For Non-Conventional Energy Source

Author(s): K. Kuralanban | Mrs. K. Muthulakshmi
Volume: 04
Issue: 04
Year: 2013
Soil Testing Reports Extracted Using Combined Mining Patterns

Author(s): Mathavi parvathi | pandimurugan | Dr.Paul rodrigues
Volume: 04
Issue: 04
Year: 2013
De-noising of Functional Magnetic Resonance Imaging (fMRI) data using Nonlinear Anisotropic 1D and 2D filters

Author(s): Amir.A.Khaliq | Jawad.A.Shah | Suheel A Malik
Volume: 04
Issue: 04
Year: 2013
Noise Cancellation and Speech Enhancement for Hearing Impaired Person

Author(s): M.A.Raja | Dr.A.Shanmugam
Volume: 04
Issue: 04
Year: 2013
Self-Organizing-Healing Paradigm for Mobile Networks

Author(s): Okon S. C. | Asagba P. O. | Aloysius Akpanobong
Volume: 04
Issue: 04
Year: 2013
Attacks on Digital Watermarked Images in the Internet Environment and Their Counter Measures

Author(s): Tapas Bandyopadhyay | B Bandyopadhyay | B N Chatterji
Volume: 04
Issue: 04
Year: 2013
Decision Trees For Training Data Sets Containing Numerical Attributes With Measurement Errors

Author(s): C. Sudarsana Reddy | Dr. V. VASU | B. Kumara Swamy Achari
Volume: 04
Issue: 04
Year: 2013
Information Hiding - Steganography & Watermarking: A Comparative Study

Author(s): Gunjan Chugh
Volume: 04
Issue: 04
Year: 2013
The use of data Mining Techniques for Improving Software Reliability

Author(s): Nadhem Sultan Ali | Dr. V.P. Pawar
Volume: 04
Issue: 04
Year: 2013
Fingerprint Geometry matching by Divide and Conquer Strategy

Author(s): Sanjukta Pal | Sucharita pal | Prof. (Dr) Pranam Paul
Volume: 04
Issue: 04
Year: 2013
Low Power Compressed Context Architecture Based Processor Design

Author(s): P.Sathiya | Ms.M.Jasmin
Volume: 04
Issue: 04
Year: 2013
An Approach to Merging of connected network topologies for Improving Ultimate Connectivity in Grid Backdrop

Author(s): P.Priyanga | R.G.Gopeeka | S.Lakshmi Prabha
Volume: 04
Issue: 04
Year: 2013
Encryption and Decryption Technique in Wireless Sensor Networks

Author(s): S.Kannadhasan | P.Suresh | M.Rajesh Baba
Volume: 04
Issue: 04
Year: 2013
A formation to recover Software Process Improvement Model for small Organization

Author(s): Shalu Chauhan | Dadan kumar Jha
Volume: 04
Issue: 04
Year: 2013
Various Edge Detection Techniques: Survey, Implementation and Comparison

Author(s): Krupa Shah | Khushbu Patel | Ghanshyam I Prajapati
Volume: 04
Issue: 04
Year: 2013
Incremental Schema Upgrade Methodology for Microsoft SQL Database

Author(s): Yogesh S Patil | Priti Subramanium
Volume: 04
Issue: 04
Year: 2013
Optical Watermark Based On Digital Printing

Author(s): Pise Anil Audumbar | Gupta Hitesh | Chabukswar Hrishikesh
Volume: 04
Issue: 04
Year: 2013
SOA Appliances: An Embedded System Perspective

Author(s): Deepali Tripathi | Yogita Punjabi
Volume: 04
Issue: 04
Year: 2013
Governance Through Cloud in India (GCI)

Author(s): Anurag Singh | Kumar Anurupam | Rajnish Sagar | Shashikant Rai
Volume: 04
Issue: 04
Year: 2013
Advanced Hill Cipher Handling the Entire Plaintext as a Single Block

Author(s): V.U.K.Sastry | Aruna Varanasi | S.Udaya Kumar
Volume: 01
Issue: 04
Year: 2010
Prediction of Stroke Risk through Stacked Topology of ANN Model

Author(s): Sabibullah M | Kasmir Raja S.V
Volume: 01
Issue: 04
Year: 2010
Rising Standards for Data Mining

Author(s): N.V. Kalyankar
Volume: 01
Issue: 04
Year: 2010
A Survey on DoS Attacks and Countermeasures in Mobile Ad Hoc Networks

Author(s): M. Gunasekaran | K. Premalatha | B. Gopalakrishnan
Volume: 01
Issue: 04
Year: 2010
Output Regulation of the Chen Chaotic System

Author(s): Dr. V. Sundarapandian
Volume: 01
Issue: 04
Year: 2010
Raaga Recognition System using Gaussian Mixture Model for Gender Dependence and Independence: Melakartha Raagas

Author(s): Tarakeswara Rao B | Dr. Prasad Reddy P.V.G.D
Volume: 01
Issue: 04
Year: 2010
Advanced Hill Cipher Involving Permutation and Iteration

Author(s): V.U.K.Sastry | Aruna Varanasi | S.Udaya Kumar
Volume: 01
Issue: 04
Year: 2010
Nonlinear Observer Design for the Undamped Oscillator

Author(s): Dr. V. Sundarapandian
Volume: 01
Issue: 04
Year: 2010
Global Chaos Synchronization of Hyperchaotic Liu and Cai Systems by Active Nonlinear Control

Author(s): Dr. V. Sundarapandian | R. Suresh
Volume: 01
Issue: 04
Year: 2010
The Next Generation Computing Brainwave-Quantum Computing

Author(s): T. Venkat Narayana Rao | Shirish Pathania
Volume: 01
Issue: 04
Year: 2010
A Partitioning Clustering Approach to Dynamically Cluster Materialized View

Author(s): Manoj Chaudhari | Dr. C.A. Dhote
Volume: 01
Issue: 04
Year: 2010
ID-based Directed Serial Multisignature Scheme from Bilinear Pairings

Author(s): Dr.P.Vasudeva Reddy | B.Umaprasada Rao
Volume: 01
Issue: 04
Year: 2010
Analysis of Classification and Clustering Algorithms using Weka For Banking Data

Author(s): G.Roch Libia Rani | K.Vanitha
Volume: 01
Issue: 04
Year: 2010
Nonlinear Observer Design for the Lienard System

Author(s): Dr. V. Sundarapandian
Volume: 01
Issue: 04
Year: 2010
Secured Authentication for Online Banking using Mobile Phones

Author(s): S Sumathy | R Hemalatha | V Jayashree
Volume: 01
Issue: 04
Year: 2010
Classification of Breast Cancer Using SVM Classifier Technique

Author(s): B.Senthil Murugan | S.Srirambabu | Santhosh Kumar. V
Volume: 01
Issue: 04
Year: 2010
Experimenting Oriya Text Chunking with Divide-Conquer Strategy

Author(s): Rakesh Chandra Balabantaray | Manoj kumar Jena
Volume: 01
Issue: 04
Year: 2010
“GRAB A JOB” Messenger Implementation for Making the Job Search Easier using the Secured XML Technologies

Author(s): Pamini Priya Chandra | Balamurugan Balusamy | Venkatakrishna.P
Volume: 01
Issue: 04
Year: 2010
Energy Efficient Optimized Hybrid Approach for Time Synchronization in Wireless Sensor Networks

Author(s): Neeta S. Bosamiya | Devesh C. Jinwala
Volume: 01
Issue: 04
Year: 2010
A Large Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side as Multiplicants

Author(s): Dr. V. Umakanta Sastry | D. S. R. Murthy | Dr. S. Durga Bhavani
Volume: 01
Issue: 04
Year: 2010
A Modus to Secure Data with Authentication & Integrity using EHDES

Author(s): Ramveer Singh | Sanjive Tyagi | Ajay Agarwal | Deo Brat Ojha
Volume: 01
Issue: 04
Year: 2010
Remote Desktop Access using Mobile Phones and an Enhancement for Intra-Mobile Search

Author(s): N.Ch.S.N.Iyengar | H.Mohamed Ameer Irshad | R.Padma Priya | V.Vijayasherly
Volume: 01
Issue: 04
Year: 2010
Clustering Techniques in Web Content Mining

Author(s): Ranjit R.Keole | G.R.Bamnote
Volume: 01
Issue: 04
Year: 2010
Some Advantages on Monte Carlo Integration using Variance Reduction Procedures

Author(s): Behrouz Fathi Vajargah | Farshid Mehrdoust | Ahmad Pourdarvish | Forough Norouzi Saziroud
Volume: 01
Issue: 04
Year: 2010
Output Regulation of the Lü Chaotic System

Author(s): Dr. V. Sundarapandian
Volume: 01
Issue: 04
Year: 2010
A Competent Approach for Protected Communication with Double EHDES (ACAPCD-E)

Author(s): Ramveer Singh | Awakash Mishra | Deo Brat Ojha
Volume: 01
Issue: 04
Year: 2010
Evaluating Effectiveness of “Internet Marketing” Techniques with special refrence to Viral Marketing

Author(s): Avadhesh kumar Gupta | Pankaj Nagar | V.P.Gupta
Volume: 01
Issue: 04
Year: 2010
Semantic Web–A Conceptual Model for Heterogeneous Ontology Environment

Author(s): Vasavi Bande | Keerthi Manchikanti | M.V.N Bhargava
Volume: 01
Issue: 04
Year: 2010
Distributed Learning Predictors through Web Log Mining using Bayesian Networks

Author(s): Sujni Paul | Suresh | Beulah Christalin Latha
Volume: 01
Issue: 04
Year: 2010
Fuzzy Clustering in Web Content Mining

Author(s): Ranjit R.Keole | Dr. G.R.Bamnote
Volume: 01
Issue: 04
Year: 2010
Service Discovery Protocols For Infra-Structureless Networks- A Survey

Author(s): S. Thangam | Dr.E.Kirubhakaran
Volume: 01
Issue: 04
Year: 2010
Design and Development of Data Mining on Computational Grids in Grid Miner

Author(s): T. Gopalakrishnan | P. Sengottuvelan
Volume: 01
Issue: 04
Year: 2010
Handoff Implementation through WAP

Author(s): Jayant N. Patil | Sagar Jambhorkar
Volume: 01
Issue: 04
Year: 2010
Attacks on Computer Network and Corresponding Security Measures

Author(s): Gajanan D. Kurundkar | Quadri M.N | Dr.Santosh D. Khamitkar
Volume: 01
Issue: 04
Year: 2010
A Novel Approach for Identifying Intruder based on Multiple Approaches

Author(s): Amit Kumar Sharma | Naveen Hemrajani
Volume: 01
Issue: 04
Year: 2010
An Automated Consent for Privacy Preservation in Peer to Peer Networks using Agent Technology

Author(s): S.Prasanna | K.Govinda | R.Sujatha
Volume: 01
Issue: 04
Year: 2010
Output Regulation of the Liu-Chen-Liu Chaotic System

Author(s): Dr. V. Sundarapandian
Volume: 01
Issue: 04
Year: 2010
An Empirical Study on Performance Evaluation in Automatic Image Annotation and Retrieval

Author(s): T.Sumathi | M. Hemalatha
Volume: 01
Issue: 04
Year: 2010
Hybrid Events Joint Entropy and Conditional Entropy Based on Chance Measure

Author(s): Lianlong Gao | Liang Lin | Dawang Wang
Volume: 01
Issue: 04
Year: 2010
Enhancement of Medical Repositories System: Using Clustering, Classical Genetic Algorithm and Fuzzy logic Approaches

Author(s): Muhammad Shahid | Noriah Bidin | Yacoob mat Daud | M.Inayat Ullah | Muhammad Talha
Volume: 01
Issue: 04
Year: 2010
Hierarchical Clustering of Music towards Human Mood

Author(s): D. Rajesh | Karpagalakshmi R. C.
Volume: 01
Issue: 04
Year: 2010
Protocal Usage Model & An Architecture Design for Bluetooth – A Short Range Transaction System

Author(s): Virparia Paresh V | Kamani Krunalkumar C | Kathiriya Dhaval R | Ghodasara Yogesh R
Volume: 01
Issue: 04
Year: 2010
An analytical study of image compression algorithms for Stereoscopic images in Non Immersive virtual reality world

Author(s): T. Ramaprabha | M.Mohamed Sathik
Volume: 01
Issue: 04
Year: 2010
A Review on Relation Between Operation Research and Different Field of Sciences

Author(s): Sawan Kumar Dubey
Volume: 01
Issue: 04
Year: 2010
Speech Recognition Technology: Applications & Future

Author(s): Pankaj Pathak
Volume: 01
Issue: 04
Year: 2010
Image Encryption using the Standard Hill Cipher

Author(s): Gaurav Agarwal | Saurabh Singh | Meeta Chaudhary
Volume: 01
Issue: 04
Year: 2010
A Comparative Study using Wavelet and SVM for Devanagri Characters Recognition

Author(s): Anil Kumar N. Holambe | Ravinder C. Thool | Sushil Kumar N.Holambe | Ganesh K. Pakle
Volume: 01
Issue: 04
Year: 2010
Resolution of Heart Disease Prevision System

Author(s): D .Rajesh | E. Nalini | T.Elavarasi | C. Ezhil Kumaran
Volume: 01
Issue: 04
Year: 2010
The Process of Innovation and Implement Based on Diffusion of Innovation and Innovation Radar

Author(s): Ming-Chang Lee | To Chang | Wen-Tien Chang Chien
Volume: 01
Issue: 04
Year: 2010
Identifying Grades of Glioma using Support Vector Machine Recursive Feature Elimination

Author(s): N.Suresh Kumar | S.Margret Anouncia
Volume: 01
Issue: 04
Year: 2010
Prediction of Middle Finger Features from its Width: A Novel Approach

Author(s): Manimala S. | C.N. Ravi Kumar
Volume: 01
Issue: 04
Year: 2010
A Messaging Software using Bluetooth & 802.11 WLAN

Author(s): Samia Rehman | Wafa unab | M. Fahad Khan
Volume: 01
Issue: 03
Year: 2010
Frequent Term Based Clustering of Stories with Semantic Analysis for Searching and Retrieval

Author(s): Amrut Nagasunder | Bharath Boregowda | Madhu Venkatesha | Ananthanarayana V. S.
Volume: 01
Issue: 03
Year: 2010
An Efficient Algorithm for Multimodal Biometric Face Recognition using Speech Signal

Author(s): Nageshkuymar M. | Shanmukha swamyM. N.
Volume: 01
Issue: 03
Year: 2010
Business Intelligence using Semantic Web

Author(s): S. Yasodha | S.S. Dhenakaran
Volume: 01
Issue: 03
Year: 2010
Artificial Intelligence and Neural Network

Author(s): Anjali Kalra | Sarbjeet Singh | Sukhbeer singh | Sukhvinder Singh | Gurpreet singh | Manjit Thappa
Volume: 01
Issue: 03
Year: 2010
Role of IT in Facilitating Quality Education to the Young Learners of Rajasthan (A Study on Selected Higher Educational Institutions)

Author(s): Naveen K Mehta | Ranjan Upadhyaya | D. Mehta
Volume: 01
Issue: 03
Year: 2010
Crosstalk: A Scalable Crossprotocol Monitoring System For Anomaly Detection

Author(s): Jeyanthi. N. | Iamuna S, Hari Kishore
Volume: 01
Issue: 03
Year: 2010
A Modified Grayhole Attack Detection Technique in Mobile Ad-hoc Networks

Author(s): Mangesh M. Ghonge | Pradeep M. Jawandhiya
Volume: 01
Issue: 03
Year: 2010
Selecting IT Enabled Accounting Software: Present Practices and Challenges

Author(s): Sukriti Arora
Volume: 01
Issue: 03
Year: 2010
Global Chaos Synchronization of T and Cai Systems by Nonlinear Control

Author(s): V. Sundarapandian | R. Suresh
Volume: 01
Issue: 03
Year: 2010
A New Security Architecture for TCP/IP Protocol Suite

Author(s): M. Anand Kumar | S. Karthikeyan
Volume: 01
Issue: 03
Year: 2010
A Simplified Network manager for Grid and Presenting the Grid as a Computation Providing Cloud

Author(s): M.Sudha | M.Monica
Volume: 01
Issue: 03
Year: 2010
A Lexi-Search Approach for Variant Mutiple Travelling Salesmen Problem

Author(s): K.Sobhan Babu | Chandra Kala.K | B. Naganna | Sundara Murthy. M
Volume: 01
Issue: 03
Year: 2010
Effect of White Noise for Online Secondary Path Modeling and Noise Reduction in Multichannel ANC System

Author(s): Sekineh Gholinezhad | Mohammad Reza Karami
Volume: 01
Issue: 03
Year: 2010
Bloom Filters: A Review

Author(s): K. Premalatha | Arulanand Natarajan | S. Subramanian
Volume: 01
Issue: 03
Year: 2010
Coupling Metrics for Aspect Oriented Programming -A Systematic Review

Author(s): Kotrappa Sirbi | Prakash Jayanth Kulkarni
Volume: 01
Issue: 03
Year: 2010
IPV6 Address and Quality of Services

Author(s): Srinivasan nagaraj | G. Narasinga rao | M. Ramachandra
Volume: 01
Issue: 03
Year: 2010
Integrating Enterprise Portals with Service Oriented Architecture

Author(s): Andrej Kocbek | Matjaz B. Juric
Volume: 01
Issue: 03
Year: 2010
Nonlinear Observer Design for Nonlinear Pendulum Systems

Author(s): Dr. V. Sundarapandian
Volume: 01
Issue: 03
Year: 2010
A Web-Based Egg-Quality Expert Advisory System using Rule Based and Ant Colony (ACO) Optimization Algorithms

Author(s): J. Anitha | M.S.Prasad.Babu | N.Thirupathi Rao | Ch. Chandra Sekhar
Volume: 01
Issue: 03
Year: 2010
Evaluation of Energy Efficient Protocol for Object Tracking WSN using OMNet++

Author(s): Yash Pal | A. J. Singh
Volume: 01
Issue: 03
Year: 2010
Development of Information Model Containing Specialized Information

Author(s): Dr. Lyazat Naizabayeva | JelinaChadiarova
Volume: 01
Issue: 03
Year: 2010
The Application of Wireless Sensor Network in Ground Water Table Monitoring in the Placer Mineral Mining Areas

Author(s): Divya chandrasekar | Y.Srinivas | N. Chandrasekar
Volume: 01
Issue: 03
Year: 2010
A Proactive QoS Routing Protocol for wireless Ad Hoc Networks

Author(s): Vandana khare | Y. Madhavee Latha
Volume: 01
Issue: 03
Year: 2010
Integrated Model-based Test Case Generation

Author(s): Yujian Fu | Shal Li | Sudip Bhattacharjee | Zhijiang Dong
Volume: 01
Issue: 03
Year: 2010
Simplified AES for Low Memory Embedded Processors

Author(s): Suhas J Manangi | Parul Chaurasia | Mahendra Pratap Singh
Volume: 01
Issue: 03
Year: 2010
A novel method for semantic web services discovery

Author(s): Kambiz Fakhr | Saeid Parsa
Volume: 01
Issue: 03
Year: 2010
Extraction of object from the video

Author(s): M. Mohamed Sathik | M. Parveen | P. Peer Fatima
Volume: 01
Issue: 03
Year: 2010
Agro Meteorological Weather Forecasting system using Soft Computing

Author(s): Priti Singla | Sanjay Singla
Volume: 01
Issue: 03
Year: 2010
Paving the Way for the Successful Development of Mobile Phone Games using Java ME

Author(s): Sameerchand Pudaruth | Rudy Khoobeelass
Volume: 01
Issue: 03
Year: 2010
Application of 45 nm VLSI Technology to Design Layout of Static RAM Memory

Author(s): Ujwala A. Belorkar | S. A. Ladhake
Volume: 01
Issue: 03
Year: 2010
Efficient Algorithm for Multi-Dimensional Matrix Multiplication Operations Representation

Author(s): Satya Prakash | Anil K Ahlawat
Volume: 01
Issue: 03
Year: 2010
DIDW: An Approach for Dynamic Updating in Intelligent Data Warehouse

Author(s): Abhay kumar agarwal | N.Badal
Volume: 01
Issue: 03
Year: 2010
A Distributed System for a Multi-Agent Systems Building

Author(s): R. El Bejjet | H. Medromi
Volume: 01
Issue: 03
Year: 2010
A High-speed Residue Number Comparator for the 3-Moduli Set {2n-1, 2 n, 2 n+1}

Author(s): Bafrin Zarei | Majid Askarzadeh | Nahideh Derakhshanfard | Gisou Bakhshzadeh | Mehdi Hosseinzadeh
Volume: 01
Issue: 03
Year: 2010
Innovative Technique for Character Recognition

Author(s): Sumant Raj Chauhan | Punit Soni
Volume: 01
Issue: 03
Year: 2010
Recognition of Melakartha Raagas with the Help of Gaussian Mixture Model

Author(s): Tarakeswara Rao B | Dr. Prasad Reddy P.V.G.D | Prasad A
Volume: 01
Issue: 03
Year: 2010
An Analysis on QoS of Network Mobility

Author(s): Dinakaran M | Dr. P. Balasubramanie
Volume: 01
Issue: 03
Year: 2010
Creation of Gene Database and Implementation of Transaction Processing

Author(s): Muhammad Rukunuddin Ghalib | Kauser Ahmed P | Jaigam Dilshad
Volume: 01
Issue: 03
Year: 2010
Risk Assessment Framework (RAF)

Author(s): S. K. Pandey | Mustafa K.
Volume: 01
Issue: 03
Year: 2010
Real Implementation of Loadable Kernel Module Build on Precompiled Kernel Ported to New Existing 2.6 Kernel

Author(s): Nitiket N Mhala | N K Choudhari
Volume: 01
Issue: 03
Year: 2010
Crime Hotspot detection using spatial Clustering : A literature review of related work

Author(s): M. Vijay Kumar | C.Chandrasekar
Volume: 01
Issue: 03
Year: 2010
Non Oscillation of Second Order Non Linear Neutral Delay Difference Equations

Author(s): A. George Maria Selvam | S. Lourdu Marian | M. Reni Sagaya Raj
Volume: 01
Issue: 03
Year: 2010
An Effective Scheme to Transmit Medical Image with Double EHDES

Author(s): Deo Brat Ojha | Ramveer Singh | Awakash Mishra
Volume: 01
Issue: 03
Year: 2010
Software Testing

Author(s): Sarbjeet Singh | Sukhvinder singh | Gurpreet Singh
Volume: 01
Issue: 03
Year: 2010
Fuzzy classification model assisted by intensity based approach and segmentation for breast cancer detection and diagnosis

Author(s): M. A Saleem Durai | N.Ch.Sriman.Narayana.Iyengar | A.Kannan
Volume: 01
Issue: 03
Year: 2010
Improved Suffix Tree Clustering for Efficient Document Clustering

Author(s): Sonia Bansal | Niranjan Kumar
Volume: 01
Issue: 03
Year: 2010
Web Based Land Information System of Tuticorin(LIST), Tamilnadu, India.

Author(s): John Prince Soundranayagam | Chandrasekar N. | Sivasubramanian P. | Divya C.
Volume: 01
Issue: 03
Year: 2010
Affiliate Program      Why do you need a reservation system?