Cloned Agent based data computed in Homogeneous sensor networks
Author(s): S. Karthikeyan | S.Jayashri
Volume: 10
Issue: 9
Year: 2012




Hybrid Model of Rough Sets & Neural Network for Classifying Renal stones Patient
Author(s): Shahinda Mohamed Al Kholy | Ahmed Abo Al Fetoh Saleh | Aziza Asem | Khaled Z. Sheir
Volume: 10
Issue: 9
Year: 2012




Identifying Critical Features For Network Forensics Investigation Perspectives
Author(s): Ikuesan R. Adeyemi | Shukor Abd Razak | Nor Amira Nor Azhan
Volume: 10
Issue: 9
Year: 2012




Face Recognition By Fusing Subband Images And PCA
Author(s): T. Mohandoss | R. Thiyagarajan | S. Arulselvi
Volume: 10
Issue: 9
Year: 2012




Towards an Ontology based integrated Framework for Semantic Web
Author(s): Nora Y. Ibrahim | Sahar A. Mokhtar | Hany M. Harb
Volume: 10
Issue: 9
Year: 2012




Enhanced techniques for PDF Image Segmentation and Text Extraction
Author(s): D. Sasirekha | E. Chandra
Volume: 10
Issue: 9
Year: 2012




Comprehensive Analysis of π Base Exponential Functions as a Window
Author(s): Mahdi Nouri | Sepideh Lahooti | Sepideh Vatanpour | Negar Besharatmehr
Volume: 10
Issue: 9
Year: 2012




Performance Evaluation of Some Grid Programming Models
Author(s): W. A. Awad
Volume: 10
Issue: 9
Year: 2012




Web Test Integration and Performance Evaluation of E-Commerce web sites
Author(s): Md. Safaet Hossain | Md. Shazzad Hosain
Volume: 10
Issue: 9
Year: 2012




Creation of Digital Test Form for Prepress Department
Author(s): Jaswinder Singh Dilawari | Ravinder Khanna
Volume: 10
Issue: 9
Year: 2012




Comparison of Supervised Learning Techniques for Binary Text Classification
Author(s): Hetal Doshi | Maruti Zalte
Volume: 10
Issue: 9
Year: 2012




Contextual Ontology for Delivering Learning Material in an Adaptive E-learning System
Author(s): Kalla. Madhu Sudhana | V. Cyril Raj
Volume: 10
Issue: 9
Year: 2012




Quality of Service Support on High Level Petri-Net Based Model for Dynamic Configuration of Web Service Composition
Author(s): Sabri MTIBAA | Moncef TAGINA
Volume: 10
Issue: 9
Year: 2012




A Fast Accurate Network Intrusion Detection System
Author(s): Ahmed A. Elngar | Dowlat A. El A. Mohamed | Fayed F. M. Ghaleb
Volume: 10
Issue: 9
Year: 2012




Underwater Acoustic Channel Modeling: A Simulation Study
Author(s): Pallavi Kamal | Taussif Khanna
Volume: 10
Issue: 9
Year: 2012




Investigation of Hill Cipher Modifications Based on Permutation and Iteration
Author(s): Mina Farmanbar | Alexander G. Chefranov
Volume: 10
Issue: 9
Year: 2012




QoS Adoption And Protect It Against DoS Attack
Author(s): Manar Y. Kashmola | Rasha Saadallah Gargees
Volume: 10
Issue: 9
Year: 2012




Additive Update Algorithm for Nonnegative Matrix Factorization
Author(s): Tran Dang Hien | Do Van Tuan | Pham Van At
Volume: 10
Issue: 9
Year: 2012




Critical Analysis of Design Criteria and Reliability Of Safety Instrumented System (Sis) For Offshore Oil & Gas Production Platforms In India
Author(s): Rakesh Sethi | Manjeet Patterh
Volume: 9
Issue: 9
Year: 2011




Securing the Multilevel Information System
Author(s): Mohan H.S. | A. Raji Reddy
Volume: 9
Issue: 9
Year: 2011




A New Efficient Symbol Timing Synchronization Scheme for MB-OFDM UWB Systems
Author(s): Reza Shahbazian | Bahman Abolhassani
Volume: 9
Issue: 9
Year: 2011




Multithreaded Image Processing
Author(s): Jamil A. M. Saif | Hamid S. S. Alraimi
Volume: 9
Issue: 9
Year: 2011




Study of Neural Network Algorithm for Straight-Line Drawings of Planar Graphs
Author(s): Mohamed A. El-Sayed | S. Abdel-Khalek | Hanan H. Amin
Volume: 9
Issue: 9
Year: 2011




Virtual Education and its Importance as a New Method in Educational System
Author(s): Mohammad Behrouzian Nejad | Ebrahim Behrouzian Nejad
Volume: 9
Issue: 9
Year: 2011




Using Image Steganography to Establish Covert Communication Channels
Author(s): Keith L Haynes
Volume: 9
Issue: 9
Year: 2011




Identifying Harmonics By Empirical Mode Decomposition For Effective Control Of Active Filters During Electric Vehicle Charging
Author(s): B.V. Dhananjay | T. Senthil kumar
Volume: 9
Issue: 9
Year: 2011




Towards Discriminant Analysis Modeling of Web 3.0 Design and Development for Students, Faculty and IT Professionals
Author(s): S. Padma | Ananthi Seshasaayee
Volume: 9
Issue: 9
Year: 2011




Real Time Transmission Protocol (RTP) and Real Time Transmission Control Protocol (RTCP) Library Implementation
Author(s): Mohammad Monirul Islam
Volume: 9
Issue: 9
Year: 2011




A Decision Tree Based Model to Identify the Career Focus of Computer Stream Students in ITES Industry
Author(s): T. Hemalatha | Ananthi Sheshasaayee
Volume: 9
Issue: 9
Year: 2011




Customer Relationship Management and its Implementation in E-Commerce
Author(s): Mohammad Behrouzian Nejad
Volume: 9
Issue: 9
Year: 2011




A Hierarchical View for Level Set Method Based on Segmentation of Non-Constant Intensity Objects
Author(s): M. Janani | D. Kavitha Devi
Volume: 9
Issue: 9
Year: 2011




Parallel Edge Projection and Pruning (PEPP) Based Sequence Graph protrude approach for Closed Itemset Mining
Author(s): kalli Srinivasa Nageswara Prasad | S. Ramakrishna
Volume: 9
Issue: 9
Year: 2011




Role Based Authentication Schemes to Support Multiple Realms for Security Automation
Author(s): Rajasekhar B. M | G. A. Ramachandra
Volume: 9
Issue: 9
Year: 2011




Empirical Study of Evolution of Decision making Factors from 1990-2010
Author(s): Mohammed Suliman Al-Shakkah | Wan Rozaini Sheik Osman
Volume: 9
Issue: 9
Year: 2011




A Method for Fingerprint Authentication for ATM Based Banking Application
Author(s): S. Koteswari | P. John Paul | V. Pradeep kumar | A.B.S.R. Manohar
Volume: 9
Issue: 9
Year: 2011




GPS L2C Signal Acquisition Algorithms for Resource-Limited Applications in Challenging Environments
Author(s): Nesreen I Ziedan
Volume: 9
Issue: 9
Year: 2011




Streamed Coefficients Approach for Quantization Table Estimation in JPEG Images
Author(s): Salma Hamdy
Volume: 9
Issue: 9
Year: 2011




Lossless Image Compression for Transmitting Over Low Bandwidth Line
Author(s): G. Murugan | E. Kannan | S. Arun
Volume: 9
Issue: 9
Year: 2011




PAPR Reduction of OFDM Signal Using Error Correcting Code and Selective Mapping
Author(s): Anshu | Himanshu Sharma
Volume: 9
Issue: 9
Year: 2011




Performance of Input and Output Selection Techniques on Routing Efficiency in Network-On-Chip: A Review
Author(s): Mohammad Behrouzian Nejad | Amin Mehranzadeh | Mehdi Hoodgar
Volume: 9
Issue: 9
Year: 2011




Application of Honeypots to Study Character of Attackers Based on their Accountability in the Network
Author(s): Tushar Kanti | Vineet Richhariya
Volume: 9
Issue: 9
Year: 2011




A Multilevel Representation of Repository for Software Reuse
Author(s): C. V. Guru Rao | P. Niranjan
Volume: 9
Issue: 9
Year: 2011




System Integration for Smart Paperless Ship
Author(s): O. Sulaiman | A.H. Saharuddin | A.B.S. Kader
Volume: 8
Issue: 9
Year: 2010




A Survey on Minimizing Energy Consumption of VLSI Processors Using Multiple Supply Voltages
Author(s): B. Sathiyabama | S. Malarkkan
Volume: 8
Issue: 9
Year: 2010




A Survey on Static Power Optimization in VLSI
Author(s): A. Janaki Rani | S. Malarkkan
Volume: 8
Issue: 9
Year: 2010




Enhancing K-Means Algorithm with Semi-Unsupervised Centroid Selection Method
Author(s): R. Shanmugasundaram | S. Sukumaran
Volume: 8
Issue: 9
Year: 2010




Extracting Membership Functions Using ACS Method via Multiple Minimum Supports
Author(s): Ehsan Vejdani Mahmoudi | Masood Niazi Torshiz | Mehrdad Jalali
Volume: 8
Issue: 9
Year: 2010




An Innovated Server-Based Desktop Sharing Platform
Author(s): Ayad H. Abdulqader | Salah Noori Saleh | Omar Amer Abouabdalla | Sureswaran Ramadas | Hasan S. M. Al-Khaffaf
Volume: 8
Issue: 9
Year: 2010




Adaptive E-Learning System based on Semantic Web and Fuzzy Clustering
Author(s): Khaled M. Fouad | Mofreh A. Hogo | Shehab Gamalel-Din | Nagdy M. Nagdy
Volume: 8
Issue: 9
Year: 2010




Development of a Project-Based Learning Approach in Requirement Engineering
Author(s): Nor Azliana Akmal Jamaludin | Shamsul Sahibuddin | Kamaruzaman Jusoff | Nur Hafizah Hidayat
Volume: 8
Issue: 9
Year: 2010




Performance Comparison of Block Truncation Coding based Image Retrieval Techniques using Assorted Color Spaces
Author(s): H.B. Kekre | Sudeep D.Thepade | Varun Lodha | Pooja Luthra | Ajoy Joseph | Chitrangada Nemani
Volume: 8
Issue: 9
Year: 2010




Network Anomaly Detection and Visualization using Combined PCA and Adaptive Filtering
Author(s): Altyeb Altaher | Sureswaran Ramadass | Noureldien Abdelrahman | Ahmed Khalid
Volume: 8
Issue: 9
Year: 2010




Implementation of a new Fuzzy Based Load Balancing Algorithm for Hypercubes
Author(s): Sameena Naaz | Afshar Alam | Ranjit Biswas
Volume: 8
Issue: 9
Year: 2010




Building an Energy-Efficient Prediction S-MAC Protocol for Wireless Networks
Author(s): Mahmoud Abdel-Aziz El-Sakhawy Othman | Imane Aly Saroit Ismail
Volume: 8
Issue: 9
Year: 2010




Constructing Models For MicroArray Data with Swarm Algorithm
Author(s): Aruchamy Rajini | Vasantha Kalyani David
Volume: 8
Issue: 9
Year: 2010




Enchancing And Deriving Actionable Knowledge From Decision Trees
Author(s): P. Senthil Vadivu | Vasantha Kalyani David
Volume: 8
Issue: 9
Year: 2010




Descriptive System For Creating Awareness In The Electoral Process In Nigeria Using Information Technology
Author(s): B. A. Onyekwelu | D.T. Akomolafe
Volume: 8
Issue: 9
Year: 2010




Multiplayer Enhanced Make Square Game in the Net
Author(s): Md. Ekramul Hamid | Sudip Saha | Mohammed Qayyum
Volume: 8
Issue: 9
Year: 2010




Distributed Task Allocation in Multi-Agent System Based on Decision Support Module
Author(s): Sally M. El-Ghamrawy | Ali I. El-Desouky | Ahmed I. Saleh
Volume: 8
Issue: 9
Year: 2010




A Proposed Ontology Based Architecture to enrich the data semantics syndicated by RSS techniques in Egyptian Tax Authority
Author(s): Ibrahim M El-Henawy | Mahmoud M Abd El-latif | Tamer E Amer
Volume: 8
Issue: 9
Year: 2010




Performance Comparison Of Multicast Routing Protocols In Ad-Hoc Wireless Networks
Author(s): N. Veena | A. VinayaBabu | K. Madhukar | B. Sujatha | B. Anandkumar | S. Nagaprasad
Volume: 8
Issue: 9
Year: 2010




Generation of Mutation Operators for AOP
Author(s): Mayank Singh | Shailendra Mishra
Volume: 8
Issue: 9
Year: 2010




Parcel Management System using GPS Tracking Unit
Author(s): Tahmina Khatoon | Md. Musfique Anwar | Nasrin Sultana Shume | Md. Mizanur Rahman
Volume: 8
Issue: 9
Year: 2010




Using RFID to Enhance Mobile Banking Security
Author(s): Zakaria Saleh | Izzat Alsmadi
Volume: 8
Issue: 9
Year: 2010




Tracking The Face Movement Of Perceptual User Interface Using CAMSHIFT Algorithm
Author(s): B. Muthukumar | S. Ravi
Volume: 8
Issue: 9
Year: 2010




A Design and Execution Of Activity Based Applications In Distributed Environments Using Hermes Software Architecture
Author(s): B. Muthukumar | P. Banumathi | T.K.P. Rajagopal | R.Vidhya
Volume: 8
Issue: 9
Year: 2010




Use of Computerized Web-Based Information System For Determining Losses in 15-6.6 KV Feeders in Traditional Electrical Network Managemment: Case Study Goma Distribution Electrical Network
Author(s): Ezekiel U. Okike | Bakunzi G. Joseph
Volume: 8
Issue: 9
Year: 2010




Hybrid Technique for Self Tuning PI Controller Parameters in HVDC Systems
Author(s): A.Srujana | S.V.Jayaram Kumar
Volume: 8
Issue: 9
Year: 2010




Realization and Study of High Performance Voltage Mode Oscillator based on CCCCTA: A Building Block for Analog Signal Processing
Author(s): Deependra Pandey | L.K. Singh
Volume: 8
Issue: 9
Year: 2010




Hybrid Compression of Color Images with Larger Trivial Background by Histogram Segmentation
Author(s): M. Mohamed Sathik | K. Senthamarai Kannan | Y. Jacob Vetha Raj
Volume: 8
Issue: 9
Year: 2010




Improving Client-Server Response Time Using IPv6 Header Suppresion Over MPLS
Author(s): Imad J. Mohamad | Yung-Wey Chong | Tat-Chee Wan | Putra Sumari
Volume: 8
Issue: 9
Year: 2010




Pair Wise Sorting: A New Way of Sorting
Author(s): Md. Jahangir Alam | Muhammad Monsur Uddin | Mohammad Shabbir Hasan
Volume: 8
Issue: 9
Year: 2010




An Evaluation of Software Requirement Prioritization Techniques
Author(s): Mohammad Shabbir Hasan | Abdullah Al Mahmood | Md. Jahangir Alam | Sk. Md. Nahid Hasan | Farin Rahman
Volume: 8
Issue: 9
Year: 2010




Image Retrieval using Shape Texture Patterns generated from Walsh-Hadamard Transform and Gradient Image Bitmap
Author(s): H.B.Kekre | Sudeep D. Thepade | Varun K. Banura
Volume: 8
Issue: 9
Year: 2010




Structural Analysis of Bangla Sentences of Different Tenses for Automatic Bangla Machine Translator
Author(s): Md. Musfique Anwar | Nasrin Sultana Shume | Md. Al-Amin Bhuiyan
Volume: 8
Issue: 9
Year: 2010




The Innovative Application of Multiple Correlation Plane
Author(s): Julaluk Watthananon | Sageemas Na Wichian | Anirach Mingkhwan
Volume: 8
Issue: 9
Year: 2010




Design of Novel Usability Driven Software Process Model
Author(s): Hina Gull | Farooque Azam | Sardar Zafar Iqbal
Volume: 8
Issue: 9
Year: 2010




Impact of Guard Interval in Proposed MIMO-OFDM System for wireless communication
Author(s): M. P. Chitra | S. K. Srivatsa
Volume: 8
Issue: 9
Year: 2010




Fragmentation Investigation And Evaluation In Distributed DBMS Using JDBC and OGSA-DAI
Author(s): Ahmed Almadi | Ahmed Manasrah | Omer Abouabdalla | Homam El-Taj
Volume: 8
Issue: 9
Year: 2010




Reconfigurable Hardware Intelligent Memory Controller for H.264/AVC Encoders
Author(s): Kamel Messaoudi | El-Bay Bourennane | Salah Toumi
Volume: 8
Issue: 9
Year: 2010




Concept Measure Supported Aesthetics Ontology Construction for Videos
Author(s): Sunitha Abburu
Volume: 8
Issue: 9
Year: 2010




Design of Hybrid Ontologies for Mediation System Applied to the E-learning Platform
Author(s): Otman ABDOUN | Jaber EL BOUHDIDI | Mohamed GHAILANI | Abdelhadi FENNAN
Volume: 8
Issue: 9
Year: 2010




Adaptation of GQM Method for Evaluating the Performance of Software Project Manager
Author(s): Nagy Ramadan Darwish | Mahmoud M. Abd Ellatif
Volume: 8
Issue: 9
Year: 2010




A Two Dimensional Approach to Back and Forth Software Process Model
Author(s): Sameera Amjad | Wasi Haider Butt | Farooque Azam
Volume: 8
Issue: 9
Year: 2010




Towards a better assessment of the durations in PERT Method
Author(s): Nasser Eddine MOUHOUB | Hocine BELOUADAH | Abdelhak BOUBETRA
Volume: 8
Issue: 9
Year: 2010




Simulation of Grover’s Algorithm Quantum Search in a Classical Computer
Author(s): A.B. Mutiara | R. Refianti
Volume: 8
Issue: 9
Year: 2010




Improved Content Based Image Retrieval Using Color Histogram And Self Organizing Maps
Author(s): R. Priya | Vasantha Kalyani David
Volume: 8
Issue: 9
Year: 2010




Modelling Data Transmission through a Channel Based on Huffman Coding and Encryption Methods
Author(s): Eugène C. Ezin
Volume: 8
Issue: 9
Year: 2010




Gaussian Process Model for Uncertain Data Classification
Author(s): G.V. Suresh | Shabbeer Shaik | E.V.Reddy | Usman Ali Shaik
Volume: 8
Issue: 9
Year: 2010




Nano-particle Characterization Using a Fast Hybrid Clustering Technique for TEM Images
Author(s): M.A. Abdou | Bayumy B.A. Youssef | W.M. Sheta
Volume: 8
Issue: 9
Year: 2010




Routing Fairness in Mobile Ad-Hoc Networks: Analysis and Enhancement
Author(s): M. Shiraz Ahmed | Haji Moinuddin | Fazeelatunnisa
Volume: 8
Issue: 9
Year: 2010




Chaotic Hash Function Based on MD5 and SHA-1 Hash Algorithm
Author(s): Mouad HAMRI | Jilali Mikram | Fouad Zinoun
Volume: 8
Issue: 9
Year: 2010




Power-Based Key Hopping (PBKH) and Associated Hardware Implementation
Author(s): Rabie A. Mahmoud | Magdy Saeb
Volume: 8
Issue: 9
Year: 2010




Runtime Monitoring and Controlling Of Information Flow
Author(s): Mohamed Sarrab | Helge Janicke
Volume: 8
Issue: 9
Year: 2010




Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network
Author(s): Virendra Singh Kushwah | Gaurav Sharma
Volume: 8
Issue: 9
Year: 2010




Elimination of Weak Elliptic Curve Using Order of Points
Author(s): Nishant Sinha | Aakash Bansal
Volume: 10
Issue: 8
Year: 2012




Classification and Importance of Intrusion Detection System
Author(s): Rajasekaran K | Nirmala K
Volume: 10
Issue: 8
Year: 2012




Survey on Using GIS in Evacuation Planning Process
Author(s): Sara Shaker Abed El-Hamied | Ahmed Abou El-Fotouh Saleh | Aziza Asem
Volume: 10
Issue: 8
Year: 2012




Phases vs. Levels using Decision Trees for Intrusion Detection Systems
Author(s): Heba Ezzat Ibrahim | Sherif M. Badr | Mohamed A. Shaheen
Volume: 10
Issue: 8
Year: 2012




Network Intrusion Detection Using Improved Decision Tree Algorithm
Author(s): K. V. R. Swamy | K. S. Vijaya Lakshmi
Volume: 10
Issue: 8
Year: 2012




Fingerprint Hiding in True Color Image
Author(s): Shahd Abdul-Rhman Hasso | Maha Abdul-Rhman Hasso | Omar Saad
Volume: 10
Issue: 8
Year: 2012




Rule Based Hindi to English Transliteration System for Proper Names
Author(s): Monika Bhargava | M.Kumar | Sujoy Das
Volume: 10
Issue: 8
Year: 2012




Effect of AWGN & Fading (Raleigh & Rician) channels on BER performance of a WiMAX communication System
Author(s): Nuzhat Tasneem Awon | Md. Ashraful Islam | Md. Mizanur Rahman | A.Z.M. Touhidul Islam
Volume: 10
Issue: 8
Year: 2012




Virtual Investigation of Patients for Medical E-Learning
Author(s): A. M. Riad | Hazem M. El-Bakry | Samir M. Abd El-razek
Volume: 10
Issue: 8
Year: 2012




A Novel Data Hiding Scheme for Binary Images
Author(s): Do Van Tuan | Tran Dang Hien | Pham Van At
Volume: 10
Issue: 8
Year: 2012




Analysis of Examination Results Data Using Various Mining Techniques
Author(s): Devendra Singh Rajpoot | Kanak Saxena | Anubhuti Khare
Volume: 10
Issue: 8
Year: 2012




Text Hiding Based on True Color Image Classification
Author(s): Shahd Abdul-Rhman Hasso
Volume: 10
Issue: 8
Year: 2012




Decreasing defect rate of test cases by designing and analysis for recursive modules of a program structure: Improvement in test cases
Author(s): Muhammad Javed, Bashir Ahmad | Zaffar Abbas | Allah Nawaz | Muhammad Ali Abid | Ihsan Ullah
Volume: 10
Issue: 8
Year: 2012




Recent Advance in Multi-Carrier Underwater Acoustic Communications
Author(s): G. P. Harish
Volume: 10
Issue: 8
Year: 2012




Working in an Inter-Organisational Context: The Relevance of IT Governance and Business-IT Alignment
Author(s): Carl Stolze | Novica Zarvić | Oliver Thomas
Volume: 9
Issue: 8
Year: 2011




Protecting the Content - Using Digest Authentication System and Other Techniques
Author(s): Raman Kumar | Naman Kumar | Neetika Vats
Volume: 9
Issue: 8
Year: 2011




A System for Social Network Extraction of Web Complex Structures
Author(s): Amir Ansari | Mehrdad Jalali
Volume: 9
Issue: 8
Year: 2011




Performances Evaluation of Enhanced Basic Time Space Priority combined with an AQM
Author(s): Said El Kafhali | Mohamed Hanini | Abdelali El Bouchti | Abdelkrim Haqiq
Volume: 9
Issue: 8
Year: 2011




A General Architecture For Decision Making During Sports
Author(s): Mohammed Y Aalsalem | Wazir Zada Khan
Volume: 9
Issue: 8
Year: 2011




Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments
Author(s): Turki Alghamdi | Hussien Zedan | Ali Alzahrani
Volume: 9
Issue: 8
Year: 2011




Secure Data Aggregation in Wireless Sensor Networks: State of the art and future works
Author(s): Merad Boudia Omar Rafik | Feham Mohammed
Volume: 9
Issue: 8
Year: 2011




Effects and Evaluation of a Pre-School Education Program Using an E-learning System
Author(s): Keiichi Shounai | Masahiko Sugimoto | Hidetaka Kobayashi | Mamoru Fujita | Satoshi Kotaki | Manabu Ishihara
Volume: 9
Issue: 8
Year: 2011




Constructivist-Based Framework for Teaching Computer Science
Author(s): Anuja Meetoo-Appavoo
Volume: 9
Issue: 8
Year: 2011




“Chain of Digital Evidence” Based Model of Digital Forensic Investigation Process
Author(s): Jasmin Ćosić | Zoran Ćosić | Miroslav Bača
Volume: 9
Issue: 8
Year: 2011




A New Expert System for Pediatric Respiratory Diseases by Using Neural Network
Author(s): A. A. Radwan | H. M. El Bakry | H. M. El Hadad
Volume: 9
Issue: 8
Year: 2011




Efficient Cryptographic Technique for Securing and Accessing Outsourced Data
Author(s): Hasan Omar Al-Sakran | Fahad Bin Muhaya | Irina Serguievskaia
Volume: 9
Issue: 8
Year: 2011




Implementation of Image processing techniques in the automatic meter reading employed in critical & hazardous processes
Author(s): S. Arun | VenuGopla Rao.M
Volume: 9
Issue: 8
Year: 2011




Comparision Analysis of Contrast Restoration of Weather Degraded Images using Histogram and MSRCR algorithm
Author(s): Charanpreet Kaur | Danvir Mandal
Volume: 9
Issue: 8
Year: 2011




Experimental Study of Various Data Masking Techniques with Random Replacement using Data Volume
Author(s): Ravikumar G K | B. Justus Rabi | Ravindra S. Hegadi | Manjunath T.N | Archana R A
Volume: 9
Issue: 8
Year: 2011




Neighbor Based Text Document Clustering
Author(s): Y. Sri Lalitha | N. Sandhya | K. Anuradha | A. Govardhan
Volume: 9
Issue: 8
Year: 2011




Data Mining and its Application in Banking Industry: A Survey
Author(s): Mohammad Behrouzian Nejad | Ebrahim Behrouzian Nejad | Mehdi Sadeghzadeh
Volume: 9
Issue: 8
Year: 2011




A Study about Developing Trends in Information Retrieval from Google to Swoogle
Author(s): S. Kalarani | G. V. Uma
Volume: 9
Issue: 8
Year: 2011




Implementation of Dynamic Time Warping for Video Indexing
Author(s): S. Prasanna | S. Purushothaman | A. Jothi
Volume: 9
Issue: 8
Year: 2011




Green Computing Approach to Improve Algorithmic Efficiency through Associating Rule Mining
Author(s): Latika Mehrotra
Volume: 9
Issue: 8
Year: 2011




Tag Recommendation System for Social Annotation System
Author(s): Ali Kohi | Mehrdad Jalali | Seyed Javad Ebrahimi
Volume: 9
Issue: 8
Year: 2011




Software Requirement Analysis Enhancements by Prioritizing Requirement Attributes Using Rank Based Agents
Author(s): Ashok Kumar | Vinay Goyal
Volume: 9
Issue: 8
Year: 2011




Predictive Analytical Model for Requirement Volatility in ICT Projects
Author(s): Malaya Kumar Nayak | Sanghamitra Mohanty
Volume: 9
Issue: 8
Year: 2011




Electronic-City and its Importance to Achieve the Information Society
Author(s): Mohammad Behrouzian Nejad | Ebrahim Behrouzian Nejad
Volume: 9
Issue: 8
Year: 2011




Model Based Cancer Data Classification using Advanced ART Neural Network based Technique
Author(s): Sandhia Valsala | Dr. Sayed Sayeed Ahmed
Volume: 9
Issue: 8
Year: 2011




QoS enabled Cluster Based Routing Protocols in MANETs
Author(s): Narendar Reddy Mandhadi | Lakshmi Rajamani
Volume: 9
Issue: 8
Year: 2011




Design and Implementation of Extendable Media Streaming Application: Case Study of Windows 2003 Voice Recorder
Author(s): Ezekiel U. Okike | Ayorinde Afolayan
Volume: 9
Issue: 8
Year: 2011




Aspect-Oriented Approach for the Improvement of the Reliability and Time Performance of a Fault-Tolerant System
Author(s): Khalid Bouragba | Hicham Belhadaoui | Mohammed Ouzzif | Mounir Rifi
Volume: 9
Issue: 8
Year: 2011




Analysis of a Novel Hash Function Based upon Chaotic Nonlinear Map with Variable Parameter
Author(s): M. Nouri | S. Abazari Aghdam | P. Pourmahdi | M. Safarinia
Volume: 9
Issue: 8
Year: 2011




T-Fuzzy Subsemiautomata with Thresholds
Author(s): M. Basheer Ahamed | J. Michael Anna Spinneli
Volume: 9
Issue: 8
Year: 2011




Noise Reduction in Fast Fading Channel Using OFDM/TDM
Author(s): A. Sagaya selvaraj | R.S.D. Wahidabanu
Volume: 9
Issue: 8
Year: 2011




Simulation based review for analyzing the performance of routing protocols for MANETs
Author(s): Sonika Kandari | M.K. Pandey
Volume: 9
Issue: 8
Year: 2011




Facial Tracking Using Echostate Neural Network
Author(s): P. Mayilvahanan | S. Purushothaman | A. Jothi
Volume: 9
Issue: 8
Year: 2011




3D Parity Bit Structure: A novel technique to correct maximal number of bits in a simpler way
Author(s): Pushpa R. Suri | Sukhvinder Singh Deora
Volume: 9
Issue: 8
Year: 2011




Review of e-Government Policy and Outcomes in the kingdom of Saudi Arabia
Author(s): Mohammed Ateeq Alanezi | Ahmad Kamil Mahmood | Shuib Basri
Volume: 9
Issue: 8
Year: 2011




Biometrics In Fingerprint Recognition Using Distance Vector Method
Author(s): Sumeet Dhawan | Amit Makkar
Volume: 9
Issue: 8
Year: 2011




Hybrid JPEG Compression Using Histogram Based Segmentation
Author(s): M.Mohamed Sathik | K.Senthamarai Kannan | Y.Jacob Vetha Raj
Volume: 8
Issue: 8
Year: 2010




A Novel Hybridization of ABC with CBR for Pseudoknotted RNA Structure
Author(s): Ra’ed M. Al-Khatib | Nur’Aini Abdul Rashid | Rosni Abdullah
Volume: 8
Issue: 8
Year: 2010




Localization Accuracy Improved Methods Based on Adaptive Weighted Centroid Localization Algorithm in Wireless Sensor Networks
Author(s): Chang-Woo Song | Jun-Ling Ma | Jung-Hyun Lee | Kyung-Yong Chung | Kee-Wook Rim
Volume: 8
Issue: 8
Year: 2010




GCC license plates detection and recognition using morphological filtering and neural networks
Author(s): Mohammed Deriche
Volume: 8
Issue: 8
Year: 2010




Evaluation of Vision based Surface Roughness using Wavelet Transforms with Neural Network Approach
Author(s): T.K. Thivakaran | RM. Chandrasekaran
Volume: 8
Issue: 8
Year: 2010




Aggregating Intrusion Detection System Alerts Based on Row Echelon Form Concept
Author(s): Homam El-Taj | Omar Abouabdalla, | Ahmed Manasrah | Moein Mayeh, | Mohammed Elhalabi
Volume: 8
Issue: 8
Year: 2010




Multidimensionality in Agile Software Development
Author(s): Ashima | Himanshu Aggarwal
Volume: 8
Issue: 8
Year: 2010




The Impact of Speed on the Performance of Dynamic Source Routing in Mobile Ad-Hoc Networks
Author(s): Naseer Ali Husieen | Osman B Ghazali | Suhaidi Hassan | Mohammed M. Kadhum
Volume: 8
Issue: 8
Year: 2010




3D Protein Structure Comparison and Retrieval Methods : Investigation Study
Author(s): Muhannad A. Abu-Hashem | Nur’Aini Abdul Rashid | Rosni Abdullah | Hesham A. Bahamish
Volume: 8
Issue: 8
Year: 2010




Optimization of work flow execution in ETL using Secure Genetic Algorithm
Author(s): Raman Kumar | Saumya Singla | Sagar Bhalla | Harshit Arora
Volume: 8
Issue: 8
Year: 2010




An Efficient Vector Quantization Method for Image Compression with Codebook generation using Modified K-Means
Author(s): S. Sathappan
Volume: 8
Issue: 8
Year: 2010




An Anomaly-Based Network Intrusion Detection System Using Fuzzy Logic
Author(s): R. Shanmugavadivu | N. Nagarajan
Volume: 8
Issue: 8
Year: 2010




A Survey on Designing Metrics suite to Asses the Quality of Ontology
Author(s): K. R. Uthayan | G. S. Anandha Mala
Volume: 8
Issue: 8
Year: 2010




A Survey on Digital Image Enhancement Techniques
Author(s): V. Saradhadevi | V. Sundaram
Volume: 8
Issue: 8
Year: 2010




Efficient Probabilistic Classification Methods for NIDS
Author(s): S.M. Aqil Burney | M. Sadiq Ali Khan | Jawed Naseem
Volume: 8
Issue: 8
Year: 2010




Implementation of Polynimial Neural Network in Web Usage Mining
Author(s): S. Santhi | S. Purushothaman
Volume: 8
Issue: 8
Year: 2010




A Generalization of the PVD Steganographic Method
Author(s): M. B. Ould MEDENI | El Mamoun SOUIDI
Volume: 8
Issue: 8
Year: 2010




A Comparative Study on Kakkot Sort and Other Sorting Methods
Author(s): Rajesh Ramachandran | E. Kirubakaran
Volume: 8
Issue: 8
Year: 2010




Steganography and Error-Correcting Codes
Author(s): M.B. Ould MEDENI | El Mamoun SOUIDI
Volume: 8
Issue: 8
Year: 2010




Retrieval of Bitmap Compression History
Author(s): Salma Hamdy | Haytham El-Messiry | Mohamed Roushdy | Essam Kahlifa
Volume: 8
Issue: 8
Year: 2010




A Novel LTCC Bandpass Filter for UWB Applications
Author(s): Thirumalaivasan K | Nakkeeran R.
Volume: 8
Issue: 8
Year: 2010




Intelligent Controller for Networked DC Motor Control
Author(s): B. Sharmila | N. Devarajan
Volume: 8
Issue: 8
Year: 2010




Fuzzy expert system for evaluation of students and online exams
Author(s): Mohammed E. Abd-Alazeem | Sherief I. Barakat
Volume: 8
Issue: 8
Year: 2010




A role oriented requirements analysis for ERP implementation in health care Organizations
Author(s): Kirti Pancholi | Durgesh Kumar Mishra
Volume: 8
Issue: 8
Year: 2010




SIP and RSW: A Comparative Evaluation Study
Author(s): Mahmoud Baklizi | Nibras Abdullah | Omar Abouabdalla | Sima Ahmadpour
Volume: 8
Issue: 8
Year: 2010




GA-ANN based Dominant Gene Prediction in Microarray Dataset
Author(s): Manaswini Pradhan | Sabyasachi Pattnaik | B. Mittra | Ranjit Kumar Sahu
Volume: 8
Issue: 8
Year: 2010




Performance Analysis Of Nonlinear Distortions For Downlink MC-CDMA Systems
Author(s): Labib Francis Gergis
Volume: 8
Issue: 8
Year: 2010




Low Complexity MMSE Based Channel Estimation Technique for LTE OFDMA Systems
Author(s): Md. Masud Rana | Abbas Z. Kouzani
Volume: 8
Issue: 8
Year: 2010




Off-Line Handwritten Signature Retrieval using Curvelet Transforms
Author(s): M. S. Shirdhonkar | Manesh Kokare
Volume: 8
Issue: 8
Year: 2010




A New Noise Estimation Technique of Speech Signal by Degree of Noise Refinement
Author(s): Md. Ekramul Hamid | Md. Zashim Uddin | Md. Humayun Kabir Biswas | Somlal Das
Volume: 8
Issue: 8
Year: 2010




The 2D Image-Based Anthropologic Measurement By Using Chinese Medical Acupuncture And Human Body Slice Model
Author(s): Sheng-Fuu Lin | Shih-Che Chien | Kuo-Yu Chiu
Volume: 8
Issue: 8
Year: 2010




An In-Depth Study on Requirement Engineering
Author(s): Mohammad Shabbir Hasan | Abdullah Al Mahmood | Farin Rahman | Sk. Md. Nahid Hasan
Volume: 8
Issue: 8
Year: 2010




Feed Forward Neural Network Algorithm for Frequent Patterns Mining
Author(s): Amit Bhagat | Sanjay Sharma | Dr. K.R.Pardasani
Volume: 8
Issue: 8
Year: 2010




Blemish Tolerance in Cellular Automata And Evaluation Reliability
Author(s): Rogheye parikhani | Mohmad teshnelab | Shahram babaye
Volume: 8
Issue: 8
Year: 2010




Improve the Test Case Design of Object Oriented Software by Refactoring
Author(s): Divya Prakash Shrivastava | R.C. Jain
Volume: 8
Issue: 8
Year: 2010




Implementation Of Wavelet And RBF For Power Quality Disturbance Classification
Author(s): Pramila P | Puttamadappa C | S. Purushothaman
Volume: 8
Issue: 8
Year: 2010




Survey: RTCP Feedback In A Large Streaming Sessions
Author(s): Adel Nadhem Naeem | Ali Abdulqader Bin Salem | Mohammed Faiz Aboalmaaly | Sureswaran Ramadass
Volume: 8
Issue: 8
Year: 2010




Scalable Video Coding in Online Video transmission with Bandwidth Limitation
Author(s): Sima Ahmadpour | Salah Noori Saleh | Omar Amer Abouabdalla | Mahmoud Baklizi | Nibras Abdullah
Volume: 8
Issue: 8
Year: 2010




A Fast Fractal Image Encoding Based On Haar Wavelet Transform
Author(s): Sofia Douda | Abdallah Bagri | Abdelhakim El Imrani
Volume: 8
Issue: 8
Year: 2010




An Improved Fuzzy Time Series Model For Forecasting
Author(s): Ashraf K. Abd-Elaal | Hesham A. Hefny | Ashraf H. Abd-Elwahab
Volume: 8
Issue: 8
Year: 2010




A Brief Survey on RFID Security and Privacy Issues
Author(s): Mohammad Tauhidul Islam
Volume: 8
Issue: 8
Year: 2010




Extraction of Information from Images using Dewrapping Techniques
Author(s): Khalid Nazim S. A. | M.B. Sanjay Pande
Volume: 8
Issue: 8
Year: 2010




Therapeutic Diet Prediction for Integrated Mining of Anemia Human Subjects using Statistical Techniques
Author(s): Sanjay Choudhary | Abha Wadhwa | Kamal Wadhwa | Anjana Mishra
Volume: 8
Issue: 8
Year: 2010




Channel Estimation Algorithms, Complexities and LTE Implementation Challenges
Author(s): Md. Masud Rana
Volume: 8
Issue: 8
Year: 2010




Secured Authentication Protocol System Using Images
Author(s): G. Arumugam | R. Sujatha
Volume: 8
Issue: 8
Year: 2010




ARP Cache Poisoning Attack and Detection
Author(s): Fatimah mohammed Al-Qarni
Volume: 10
Issue: 7
Year: 2012




Bio-thentic Card: Authentication Concept For RFID Card
Author(s): Ikuesan Richard Adeyemi | Norafida Bt, Ithnin
Volume: 10
Issue: 7
Year: 2012




Analytical study to Measure Employee satisfaction in Jordan e-government applications E- Diwan Project- in prime minister office in Jordan
Author(s): Bashar H. Sarayreh | Mohamad M. Al-Laham
Volume: 10
Issue: 7
Year: 2012




The Agents scrutiny at Protocol Stack in NIDS
Author(s): M. Shiva Kumar | K. Krishnamoorthy
Volume: 10
Issue: 7
Year: 2012




Visualization for levels of animal diseases by integrating OLAP and GIS
Author(s): Hesham Ahmed Hassan | Hazem El-Bakry | Hamada Gaber Abd Allah
Volume: 10
Issue: 7
Year: 2012




Modeling and Control of CSTR using Model based Neural Network Predictive Control
Author(s): Piyush Shrivastava
Volume: 10
Issue: 7
Year: 2012




A Comparative Study between Using OWL Technology and Jess Rule Based For Applying Knowledge to Agent Based System
Author(s): Najla Badie Aldabagh | Ban Sharief Mustafa
Volume: 10
Issue: 7
Year: 2012




Log Analysis Techniques using Clustering in Network Forensics
Author(s): Imam Riadi | Jazi Eko Istiyanto | Ahmad Ashari
Volume: 10
Issue: 7
Year: 2012




Analysis & Selection of Requirements Elicitation Techniques for OSSD
Author(s): Munazza Ishtiaq | Fareeha Choudhry | Fahim Ashraf Awan | Aasia Khanum
Volume: 10
Issue: 7
Year: 2012




An Approach be Operational Security in 3 and 4 Phases of Developing Software Systems
Author(s): Saman Aleshi | Nasser Modiri | Hossein Fruzi
Volume: 10
Issue: 7
Year: 2012




A Low Cost PC-Controlled Electronic-Display Board
Author(s): M. G. Golam Faruque | Shamim Ahmad
Volume: 10
Issue: 7
Year: 2012




Analysis of Mobile Traffic based on Fixed Line Tele-Traffic Models
Author(s): Abhishek Gupta | Bhavana Jharia | Gopal Chandra Manna
Volume: 9
Issue: 7
Year: 2011




A New Image Compression framework: DWT Optimization using LS-SVM regression under IWP-QPSO based hyper parameter optimization
Author(s): S. Nagaraja Rao | M.N.Giri Prasad
Volume: 9
Issue: 7
Year: 2011




A Framework for Measuring External Quality of Web-sites
Author(s): Ritu Shrivastava | R. K. Pandey | M. Kumar
Volume: 9
Issue: 7
Year: 2011




Mitigating App-DDoS Attacks on Web Servers
Author(s): Manisha M. Patil | U. L. Kulkarni
Volume: 9
Issue: 7
Year: 2011




Decreasing Control Overhead of ODMRP by Using Passive Data Acknowledgement
Author(s): Robabeh Ghafouri
Volume: 9
Issue: 7
Year: 2011




Performance Comparison of Image Classifier Using DCT, Walsh, Haar and Kekre’s Transform
Author(s): H. B. Kekre | Tanuja K. Sarode | Meena S. Ugale
Volume: 9
Issue: 7
Year: 2011




Colorization of Gray Level Images by Using Optimization
Author(s): Hossein Ghayoumi Zadeh | Hojat Jafari | Alireza malvandi | Javad haddadnia
Volume: 9
Issue: 7
Year: 2011




A Combined Method for Finger Vein Authentication System
Author(s): Azadeh Noori Hoshyar | Ir.Riza Sulaiman | Afsaneh Noori Hoshyar
Volume: 9
Issue: 7
Year: 2011




Human Iris Recognition in Unconstrained Environments
Author(s): Mohammad Ali Azimi Kashani | Mohammad Reza Ramezanpoor Fini | Mahdi Mollaei Arani
Volume: 9
Issue: 7
Year: 2011




Contour Based Algorithm for Object Tracking
Author(s): A. M. Sallam | O. M. Elmouafy | R. A. Elbardany | A. M. Fahmy
Volume: 9
Issue: 7
Year: 2011




Recovery function of Components of Additive Model of Biometric System Reliability in UML
Author(s): Zoran Ćosić | Jasmin Ćosić | Miroslav Bača
Volume: 9
Issue: 7
Year: 2011




An Improvement Study Report of Face Detection Techniques using Adaboost and SVM
Author(s): Rajeev Kumar Singh | Alka Gulati | Anubhav Sharma | Harsh Vazirani
Volume: 9
Issue: 7
Year: 2011




Comparison study on AAMRP and IODMRP in MANETS
Author(s): Tanvir Kahlon | Sukesha Sharma
Volume: 9
Issue: 7
Year: 2011




Effective Classification Algorithms to Predict the Accuracy of Tuberculosis - A Machine Learning Approach
Author(s): Asha. T | S. Natarajan | K.N.B. Murthy
Volume: 9
Issue: 7
Year: 2011




Enhanced Fast and Secure Hybrid Encryption Algorithm for Message Communication
Author(s): Shaik Rasool | Md Ateeq ur Rahman | G. Sridhar | K. Hemanth Kunar
Volume: 9
Issue: 7
Year: 2011




2D Image Morphing With Wrapping Using Vector Quantization Based Colour Transition
Author(s): H. B. Kekre | Tanuja K. Sarode | Suchitra M. Patil
Volume: 9
Issue: 7
Year: 2011




An Analysis of GSM Handover based On Real Data
Author(s): Isha Thakur | Bhavana Jharia | Gopal Chandra Manna
Volume: 9
Issue: 7
Year: 2011




Development of Enhanced Token using Picture Password and Public Key Infrastructure Mechanism for Digital Signature
Author(s): Oghenerukevwe E. Oyinloye | Ayodeji .I. Fasiku | Boniface K.Alese | Akinbohun Folake
Volume: 9
Issue: 7
Year: 2011




Even Harmonious Graphs with Applications
Author(s): P.B. Sarasija | R. Binthiya
Volume: 9
Issue: 7
Year: 2011




A Security Generated Approach towards Mass Elections using Voting Software
Author(s): Aradhana Goutam | Ankit Kandi | Manish Wagh | Kashyap Shah | Prathamesh Tarkar
Volume: 9
Issue: 7
Year: 2011




Design of a Secure Information Sharing System for E-policing in Nigeria
Author(s): Alese B.K | Iyare O.M | Falaki S.O
Volume: 9
Issue: 7
Year: 2011




Design and Implementation of Internet Protocol Security Filtering Rules in a Network Environment
Author(s): Alese B.K. | Adetunmbi O.A. | Gabriel A.J.
Volume: 9
Issue: 7
Year: 2011




Advanced Routing Technology For Fast Internet Protocol Network Recovery
Author(s): S. Rajan | Althaf Hussain H.B. | K. Jagannath | G. Surendar Reddy | K.N.Dharanidhar
Volume: 9
Issue: 7
Year: 2011




Analysis of Educational Web Pattern Using Adaptive Markov Chain For Next Page Access Prediction
Author(s): Harish Kumar | Anil Kumar Solanki
Volume: 9
Issue: 7
Year: 2011




ERP-Communication Framework: Aerospace Smart factory & Smart R&D Campus
Author(s): M. Asif Rashid | Erol Sayin | Hammad Qureshi | Muiz-ud-Din Shami | Nawar Khan | Ibrahim H. Seyrek
Volume: 9
Issue: 7
Year: 2011




Clustering of Concept Drift Categorical Data using POur-NIR Method
Author(s): N. Sudhakar Reddy | K.V.N. Sunitha
Volume: 9
Issue: 7
Year: 2011




A Dynamic Approach To Defend Against Anonymous DDoS Flooding Attacks
Author(s): R. Anurekha | K. Duraiswamy | A.Viswanathan | V. P. Arunachalam | A. Rajiv Kannan | K. Ganesh Kumar
Volume: 8
Issue: 7
Year: 2010




Reliable and Energy Aware QoS Routing Protocol for Mobile Ad hoc Networks
Author(s): V. Thilagavathe | K. Duraiswamy
Volume: 8
Issue: 7
Year: 2010




Media changing the Youth Culture: An Indian Perspective
Author(s): Dr. Ritu Soni | Bharati Kamboj
Volume: 8
Issue: 7
Year: 2010




Simulation Modeling of Reactive Protocols for Adhoc Wireless Network
Author(s): Sunil Taneja | Ashwani Kush | Amandeep Makkar
Volume: 8
Issue: 7
Year: 2010




Vectorization Algorithm for Line Drawing and Gap filling of Maps
Author(s): Neeti Daryal | Vinod Kumar
Volume: 8
Issue: 7
Year: 2010




Self-Healing In Wireless Routing Using Backbone Nodes
Author(s): Urvi Sagar | Ashwani Kush
Volume: 8
Issue: 7
Year: 2010




Context Based Personalized Search Engine For Online Learning
Author(s): Ritu Soni | Preeti Bakshi
Volume: 8
Issue: 7
Year: 2010




A Computational Model for Bharata Natyam Choreography
Author(s): Sangeeta Jadhav | Sasikumar
Volume: 8
Issue: 7
Year: 2010




Automating the fault tolerance process in Grid Environment
Author(s): Inderpreet Chopra | Maninder Singh
Volume: 8
Issue: 7
Year: 2010




Mobile Embedded Real Time System (RTTCS) for Monitoring and Controlling in Telemedicine
Author(s): Dhuha Basheer Abdullah | Muddather Abdul-Alaziz | Basim Mohammed
Volume: 8
Issue: 7
Year: 2010




Improved Computer Networks resilience Using Social Behavior
Author(s): Yehia H. Khalil | Walaa M. Sheta | Adel S. Elmaghraby
Volume: 8
Issue: 7
Year: 2010




An approach to a pseudo real-time image processing engine for hyperspectral imaging
Author(s): Sahar Sabbaghi Mahmouei | Dr. Shattri Mansor | Abed Abedniya
Volume: 8
Issue: 7
Year: 2010




An Enhanced LEACH Protocol using Fuzzy Logic for Wireless Sensor Networks
Author(s): J. Rathi | G. Rajendran
Volume: 8
Issue: 7
Year: 2010




Blind Robust Transparent DCT-Based Digital Image Watermarking for Copyright Protection
Author(s): Hanan Elazhary | Sawsan Morkos
Volume: 8
Issue: 7
Year: 2010




Sector Mean with Individual Cal and Sal Components in Walsh Transform Sectors as Feature Vectors for CBIR
Author(s): H. B. Kekre | Dhirendra Mishra
Volume: 8
Issue: 7
Year: 2010




False Positive Reduction using IDS Alert Correlation Method based on the Apriori Algorithm
Author(s): Homam El-Taj | Omar Abouabdalla | Ahmed Manasrah | Mohammed Anbar | Ahmed Al-Madi
Volume: 8
Issue: 7
Year: 2010




Preventing Attacks on Fingerprint Identification System by Using Level-3 Features
Author(s): R. Seshadri | Yaswanth Kumar.Avulapati
Volume: 8
Issue: 7
Year: 2010




Combining Level- 1 ,2 & 3 Classifiers For Fingerprint Recognition System
Author(s): R. Seshadri | Yaswanth Kumar.Avulapati
Volume: 8
Issue: 7
Year: 2010




An Efficient Decision Algorithm For Vertical Handoff Across 4G Heterogeneous Wireless Networks
Author(s): S. Aghalya | P. Seethalakshmi
Volume: 8
Issue: 7
Year: 2010




Towards a More Mobile KMS
Author(s): Julius Olatunji Okesola | Oluwafemi Shawn Ogunseye | Kazeem Idowu Rufai
Volume: 8
Issue: 7
Year: 2010




The Evolution Of Chip Multi-Processors And Its Role In High Performance And Parallel Computing
Author(s): A. Neela madheswari | R.S.D. Wahida banu
Volume: 8
Issue: 7
Year: 2010




A multicast Framework for the Multimedia Conferencing System (MCS) based on IPv6 Multicast Capability
Author(s): Hala A. Albaroodi | Omar Amer Abouabdalla | Mohammed Faiz Aboalmaaly | Ahmed M. Manasrah
Volume: 8
Issue: 7
Year: 2010




An Extensive Survey on Gene Prediction Methodologies
Author(s): Manaswini Pradhan | Ranjit Kumar Sahu
Volume: 8
Issue: 7
Year: 2010




Point-to-Point IM Interworking session Between SIP and MFTS
Author(s): Mohammed Faiz Aboalmaaly | Omar Amer Abouabdalla | Hala A. Albaroodi | Ahmed M. Manasrah
Volume: 8
Issue: 7
Year: 2010




A Survey on Session Hijacking
Author(s): P. Ramesh Babu | D. Lalitha Bhaskari | CPVNJ Mohan Rao
Volume: 8
Issue: 7
Year: 2010




Machine Learning Approach for Object Detection - A Survey Approach
Author(s): N.V. Balaji | M. Punithavalli
Volume: 8
Issue: 7
Year: 2010




Trust challenges and issues of E-Government: E-Tax prospective
Author(s): Dinara Berdykhanova | Ali Dehghantanha | Andy Seddon
Volume: 8
Issue: 7
Year: 2010




RACHSU Algorithm based Handwritten Tamil Script Recognition
Author(s): C. Sureshkumar | T. Ravichandran
Volume: 8
Issue: 7
Year: 2010




On the Performance of Symmetrical and Asymmetrical Encryption for Real-Time Video Conferencing System
Author(s): Maryam Feily | Salah Noori | Sureswaran Ramadass
Volume: 8
Issue: 7
Year: 2010




Enterprise Crypto method for Enhanced Security over semantic web
Author(s): Talal Talib Jameel
Volume: 8
Issue: 7
Year: 2010




Combinatory CPU Scheduling Algorithm
Author(s): Saeeda Bibi | Farooque Azam | Yasir Chaudhry
Volume: 8
Issue: 7
Year: 2010




S-CAN: Spatial Content Addressable Network for Networked Virtual Environments
Author(s): Amira Soliman | Walaa Sheta
Volume: 8
Issue: 7
Year: 2010




Development of Cinema Ontology: A Conceptual and Context Approach
Author(s): Sunitha Abburu | Jinesh V N
Volume: 8
Issue: 7
Year: 2010




Minimizing the number of retry attempts in keystroke dynamics through inclusion of error correcting schemes
Author(s): Pavaday Narainsamy | K.M.S.Soyjaudah
Volume: 8
Issue: 7
Year: 2010




A Role-Oriented Content-based Filtering Approach: Personalized Enterprise Architecture Management Perspective
Author(s): Imran GHANI | Choon Yeul LEE | Seung Ryul JEONG | Sung Hyun JUHN | Mohammad Shafie Bin Abd Latiff
Volume: 8
Issue: 7
Year: 2010




Haploid vs Diploid Genome in Genetic Algorithms for TSP
Author(s): Rakesh Kumar | Jyotishree
Volume: 8
Issue: 7
Year: 2010




A Novel Approach for Hiding Text Using Image Steganography
Author(s): Sukhpreet Kaur | Sumeet Kaur
Volume: 8
Issue: 7
Year: 2010




Categories Of Unstructured Data Processing And Their Enhancement
Author(s): Vinodani Katiyar | Hemant Kumar Singh
Volume: 8
Issue: 7
Year: 2010




Using Fuzzy Support Vector Machine in Text Categorization Base on Reduced Matrices
Author(s): Vu Thanh Nguyen
Volume: 8
Issue: 7
Year: 2010




Data Group Anonymity: General Approach
Author(s): Oleg Chertov | Dan Tavrov
Volume: 8
Issue: 7
Year: 2010




Multicast Routing and Wavelength Assignment for Capacity Improvement in Wavelength Division Multiplexing Networks
Author(s): N. Kaliammal | G. Gurusamy
Volume: 8
Issue: 7
Year: 2010




Approximate String Search for Bangla: Phonetic and Semantic Standpoint
Author(s): Adeeb Ahmed | Abdullah Al Helal
Volume: 8
Issue: 7
Year: 2010




Supervised Learning approach for Predicting the Presence of Seizure in Human Brain
Author(s): Sivagami P | Sujitha V | Vijaya MS
Volume: 8
Issue: 7
Year: 2010




Performance comparison of SONET, OBS on the basis of Network Throughput and Protection in Metropolitan Networks
Author(s): Bhupesh Bhatia | R.K.Singh
Volume: 8
Issue: 7
Year: 2010




Source Initiated Energy Efficient Scheme for Mobile Ad Hoc Networks
Author(s): R. Bhuvaneswari | M. Viswanathan
Volume: 10
Issue: 6
Year: 2012




False Colour Composite Combination Based on the Determinant of Eigen Matrix
Author(s): Maha Abdul-Rhman Hasso
Volume: 10
Issue: 6
Year: 2012




The Evaluation of Performance in Flow Label and Non Flow Label Approach based on IPv6 technology
Author(s): Nevila Xoxa Resulaj | Nevila Baçi Kadzadej | Igli Tafa
Volume: 10
Issue: 6
Year: 2012




Non-Linear Attitude Simulator of LEO Spacecraft and Large Angle Attitude Maneuvers
Author(s): Azza El-S. Ibrahim | Ahamed M. Tobal | Mohammad A. Sultan
Volume: 10
Issue: 6
Year: 2012




Secure And Context-Aware Routing In Mobile Ad-Hoc Networks
Author(s): R. Haboub | M. Ouzzif
Volume: 10
Issue: 6
Year: 2012




Advanced Security-Based Data Sharing Model for the Cloud Service Providers
Author(s): Mohamed Meky | Amjad Ali
Volume: 10
Issue: 6
Year: 2012




Comparison of Data Mining Techniques Used To Predict Cancer Survivability
Author(s): Charles Edeki | Shardul Pandya
Volume: 10
Issue: 6
Year: 2012




A Web-Based System To Enchance The Management Of Acquired Immunodeficiency Syndrome (AIDS)/ Human Immunodeficiency Virus (HIV) In Nigeria
Author(s): Agbelusi Olutola | Makinde O.E | Aladesote O. Isaiah | Aliu, A. Hassan
Volume: 10
Issue: 6
Year: 2012




V-Diagnostic: A Data Mining System For Human Immuno- Deficiency Virus Diagnosis
Author(s): Omowunmi O. Adeyemo | Adenike O. Osofisan
Volume: 10
Issue: 6
Year: 2012




Integration of Floating Point Arithmetic User Library to Resource Library of the CAD Tool for Customization
Author(s): R. Prakash Rao | B. K. Madhavi
Volume: 10
Issue: 6
Year: 2012




Design of 16 bit Low Power Processor
Author(s): Khaja Mujeebuddin Quadry | Syed Abdul Sattar
Volume: 10
Issue: 6
Year: 2012




Extended Sakai-Kasahara Identity-Based Encryption Scheme to Signcryption Scheme
Author(s): Hussein Khalid Abd-Alrazzaq
Volume: 10
Issue: 6
Year: 2012




Intrusion Detection and Prevention Response based on Signature-Based and Anomaly-Based: Investigation Study
Author(s): Homam El_Taj | Firas Najjar | Hiba Alsenawi | Mohannad Najjar
Volume: 10
Issue: 6
Year: 2012




Assesment of Cobit Maturity Level With Existing Conditions From Auditor
Author(s): I Made Sukarsa | Maria Yulita Putu Dita | I Ketut Adi Purnawan
Volume: 10
Issue: 6
Year: 2012




Data Mining System For Quality Prediction Of Petrol Using Artificial Neural Network
Author(s): Omowumi O. Adeyemo | Adenike O. Osofisan | Ebunoluwa P. Fashina | Kayode Otubu
Volume: 10
Issue: 6
Year: 2012




Visualization of Fluid Flow Patterns in Horizontal Circular Pipe Ducts
Author(s): Olagunju, Mukaila | Taiwo, O. A
Volume: 9
Issue: 6
Year: 2011




A Novel Approach for Intranet Mailing For Providing User Authentication
Author(s): ASN Chakravarthy | A.S.S.D. Toyaza
Volume: 9
Issue: 6
Year: 2011




An Integrated Framework for Content Based Image Retrieval
Author(s): Ritika Hirwane | Nishchol Mishra
Volume: 9
Issue: 6
Year: 2011




A Low-Power CMOS Implementation of a Cellular Neural Network for Connected Component Detection
Author(s): S. El-Din | A.K. Abol El-Seoud | A. El-Fahar | M. El-Sayed Ragab
Volume: 9
Issue: 6
Year: 2011




Evolving Fuzzy Classification Systems from Numerical Data
Author(s): Pardeep Sandhu | Shakti Kumar | Himanshu Sharma | Parvinder Bhalla
Volume: 9
Issue: 6
Year: 2011




Analysing Assorted Window Sizes with LBG and KPE Codebook Generation Techniques for Grayscale Image Colorization
Author(s): H. B. Kekre | Tanuja K. Sarode | Sudeep D. Thepade | Supriya Kamoji
Volume: 9
Issue: 6
Year: 2011




Instigation of Orthogonal Wavelet Transforms using Walsh, Cosine, Hartley, Kekre Transforms and their use in Image Compression
Author(s): H. B.Kekre | Tanuja K. Sarode | Sudeep D. Thepade | Sonal Shroff
Volume: 9
Issue: 6
Year: 2011




Modeling and Analyze the Deep Web: Surfacing Hidden Value
Author(s): Suneet Kumar | Anuj Kumar Yadav | Rakesh Bharati | Rani Choudhary
Volume: 9
Issue: 6
Year: 2011




Abrupt Change Detection of Fault in Power System Using Independent Component Analysis
Author(s): Satyabrata Das | Soumya Ranjan Mohanty | Sabyasachi Pattnaik
Volume: 9
Issue: 6
Year: 2011




A Proposal for Common Vulnerability Classification Scheme Based on Analysis of Taxonomic Features in Vulnerability Databases
Author(s): Anshu Tripathi | Umesh Kumar Singh
Volume: 9
Issue: 6
Year: 2011




Evaluation of CPU Consuming, Memory Utilization and Time Transfering Between Virtual Machines in Network by using HTTP and FTP techniques
Author(s): Igli TAFA | Elinda KAJO | Elma ZANAJ | Ariana BEJLERI | Aleksandër XHUVANI
Volume: 9
Issue: 6
Year: 2011




A Hierarchical Overlay Design for Peer to Peer and SIP Integration
Author(s): Md. Safiqul Islam | Syed Ashiqur Rahman | Rezwan Ahmed | Mahmudul Hasan
Volume: 9
Issue: 6
Year: 2011




A Model for the Controlled Development of Software Complexity Impacts
Author(s): Ghazal Keshavarz | Nasser Modiri | Mirmohsen Pedram
Volume: 9
Issue: 6
Year: 2011



