Overview of Detecting Stego-Content in Corporate Emails : a Web Based Steganalysis
Author(s): Ms. P. T. Anitha and Dr. M. Rajaram
Volume: 2
Issue: 9
Year: 2010




Efficient Buffer management Policy DLA for DTN Routing Protocols under Congestion
Author(s): Sulma Rashid, Qaisar Ayub
Volume: 2
Issue: 9
Year: 2010




Evaluation of Intrusion Detection Techniques for Enterprise Information Security
Author(s): Kanwarpreet Singh, Yogesh Chaba and Amritpal
Volume: 2
Issue: 9
Year: 2010




A Visual Grammar Approach for TV Program Identification
Author(s): Tarek ZLITNI and Walid MAHDI
Volume: 2
Issue: 9
Year: 2010




The Performance Analysis for MAP Selection Scheme of Hierarchical Mobile IP Networks
Author(s): Shan Zhong, Jin-yi CHANG, Dan Zhao and Hong Zhao
Volume: 2
Issue: 9
Year: 2010




Cloth Deformation Simulation Based on a simplified mass-spring model
Author(s): Yao yu-feng, Xia kai-jian and Zhou jin-cheng
Volume: 2
Issue: 9
Year: 2010




Data Aggregation Trees based Algorithm using Genetic Algorithm in Wireless Sensor Networks
Author(s): Mehdi Dabbaghian, Abolfazl Kalanaki, Hamed Taghvaei, Faezeh Sadat Babamir and Seyed Mehrdad Babamir
Volume: 2
Issue: 9
Year: 2010




Performance Evaluation of Peer–to-Peer system in Video on Demand with Load Sharing Scheduling Algorithm
Author(s): S.Nagaprasad, A.VinayaBabu, K.Madhukar, D.Marlene G Verghese, V.Mallaiah1and A.Sreelatha
Volume: 2
Issue: 9
Year: 2010




A Graph-based Testing of UML2 Sequence Diagram
Author(s): Yujian Fu and Sha Li
Volume: 2
Issue: 9
Year: 2010




A Novel design of High Speed Adders Using Quaternary Signed Digit Number System
Author(s): Reena Rani, L.K. Singh and Neelam Sharma
Volume: 2
Issue: 9
Year: 2010




Knowledge Based Computing Using Semantic Web for Grid Applications
Author(s): Dr. M. Rajaram, Mrs. S. Latha Shanmuga Vadivu
Volume: 2
Issue: 9
Year: 2010




Generating the New S-box and Analyzing the Diffusion Strength to Improve the Security of AES Algorithm
Author(s): Mohan H. S. and A Raji Reddy
Volume: 2
Issue: 9
Year: 2010




Factors that Influence Learner-Content Interaction in the Online Top-Down Modeling Model Environment
Author(s): Sha Li, Shirley King, Yujian Fu
Volume: 2
Issue: 9
Year: 2010




A Mechanism for detecting Wormhole Attacks on Wireless Ad Hoc Network
Author(s): Ajit Singh, Kunwar Singh Vaisla
Volume: 2
Issue: 9
Year: 2010




A 1.2V Fourth Order Low Pass Filter for UMTS Receivers
Author(s): Sandeep Garg, D.S. Ajnar, P.K. Jain
Volume: 2
Issue: 9
Year: 2010




Shadow Honeypots
Author(s): Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Michalis Polychronakis,Angelos D. Keromytis, Evangelos P. Markatos
Volume: 2
Issue: 9
Year: 2010




Evaluation of Destructive and Negative Effects of using Computers, the Internet and Computer Games on Students
Author(s): Mehdi Soltani
Volume: 2
Issue: 9
Year: 2010




A Modified Hill Cipher Involving a Pair of Keys and a Permutation
Author(s): V.U.K.Sastry, Aruna Varanasi and S.Udaya Kumar
Volume: 2
Issue: 9
Year: 2010




A Modified Feistel Cipher Involving Modular Arithmetic and Interlacing
Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Volume: 2
Issue: 9
Year: 2010




Video Streamed Acces and Use Control Using Digital Rights Management
Author(s): Morad Rafi and Mohsine Eleuldj
Volume: 2
Issue: 9
Year: 2010




Detection of Selective Forward Attack in Mobile Wireless Sensor Networks
Author(s): S.Sharmila, and G.Umamaheswari
Volume: 2
Issue: 9
Year: 2010




Evaluating Learning Objects for Students: An adaptive model
Author(s): Sonal Chawla and Dr. R.K. Singla
Volume: 2
Issue: 9
Year: 2010




A Low Power High Gain Folded-Cascode CMOS Op-Amp with Slew Rate Enhancement Circuit for 100mW 10-bit 50MS/s High Speed ADC Designed in 0.18um CMOS Technology
Author(s): Bhanu pratap singh dohare, D.S.Ajnar and P.K.Jain
Volume: 2
Issue: 8
Year: 2010




Mathematical Models on Interaction between Computer Virus and Antivirus Software inside a Computer System
Author(s): Bimal Kumar Mishra and Gholam Mursalin Ansari
Volume: 2
Issue: 8
Year: 2010




Performance Evaluation of MANET Routing Protocols Under Black Hole Attack
Author(s): M.Umaparvathi and Dr. Dharmishtan K Varughese
Volume: 2
Issue: 8
Year: 2010




Pairwise Key Establishment in Hierarchical WSN Cluster Network
Author(s): G.N.Purohit, Asmita Singh Rawat
Volume: 2
Issue: 8
Year: 2010




The Electronic Intermediary and the Effect on this For Developing E-Commerce
Author(s): Sahar Kosari, Mohammadreza Banan, Hadi Fanaee Tork and Ali Broumandnia
Volume: 2
Issue: 8
Year: 2010




The Effect of Image Compression on Face Recognition Algorithms
Author(s): Qeethara Kadhim Al-Shayea, Muzhir Shaban Al-Ani and Muna Suliman Abu Teamah
Volume: 2
Issue: 8
Year: 2010




Stock Market Forecasting using Artificial Neural Network and Statistical Technique: A Comparison Report
Author(s): K S Vaisla and Dr. Ashutosh Kumar Bhatt, Dr. Shishir Kumar
Volume: 2
Issue: 8
Year: 2010




Adaptive Dual Threshold Multi-Class Scheduling for Packet Switch
Author(s): A. A. Abdul Rahman, K. Seman, K. Saadan and A. Azreen
Volume: 2
Issue: 8
Year: 2010




Students’ Perspectives on their Preferences in the Networked Learning Environment
Author(s): Sha Li
Volume: 2
Issue: 8
Year: 2010




A Survey and Comparison of Various Routing Protocols of Wireless Sensor Network (WSN) and a Proposed New TTDD Protocol Based on LEACH
Author(s): Md. Habibe Azam, Abdullah-Al-Nahid, Md. Abdul Alim3, Md. Ziaul Amin
Volume: 2
Issue: 8
Year: 2010




Improved User-Centric ID Management Model for Privacy Protection in Cloud Computing
Author(s): Moonyoung Hwang, Jin Kwak
Volume: 2
Issue: 8
Year: 2010




A New Approach to Measure Quality of Image Encryption
Author(s): Alireza Jolfaei and Abdolrasoul Mirghadri
Volume: 2
Issue: 8
Year: 2010




Spatial Cluster Coverage of Sensor Networks
Author(s): G.N. Purohit , Megha Sharma
Volume: 2
Issue: 8
Year: 2010




Low Budget Honeynet Creation and Implementation for Nids and Nips
Author(s): Aathira K. S, Hiran V. Nath, Thulasi N. Kutty, Gireesh Kumar T
Volume: 2
Issue: 8
Year: 2010




An Adoptive Algorithm for Mining Time-Interval Sequential Patterns
Author(s): Hao-En Chueh and Yo-Hsien Lin
Volume: 2
Issue: 8
Year: 2010




An Exploration of Ad-hoc Network in a Real World builds in a Laboratory Environment
Author(s): Nitiket N Mhala and N K Choudhari
Volume: 2
Issue: 8
Year: 2010




A Novel Session Based Bit Level Text Encryption and Hiding Technique Using Cross Fold Transposition and Palette Based Steganography
Author(s): Tanmay Bhattacharya, Annwesha Banerjee and S. R. Bhadra Chaudhuri
Volume: 2
Issue: 7
Year: 2010




High Performance Certificate Authority Scheme in Manet
Author(s): A.Rajaram and Dr.S.Palaniswami
Volume: 2
Issue: 7
Year: 2010




A Large Capacity Steganography Using Bit Plane Complexity Segmentation (BPCS) algorithm for MPEG-4 Video
Author(s): M.Anandkumar, K. Appathurai, P. Nagarajan and Dr.M. Hemalatha
Volume: 2
Issue: 7
Year: 2010




Algorithmic Comparison between Polynomial Base and Matrix Base NTRU Cryptosystem
Author(s): Rakesh Nayak, Dr. C.V Sastri and Dr. Jayaram Pradhan
Volume: 2
Issue: 7
Year: 2010




Novel Design of Fast RBSD Adder with Reduced NOR-NOR Logic
Author(s): Rakesh Kumar Saxena, Neelam Sharma and A. K. Wadhwani
Volume: 2
Issue: 7
Year: 2010




Effects of Nonlinear Phenomena in Performance of Wavelength Division Multiplexing (WDM) Network for Fiber to the Home Applications
Author(s): S.Sugumaran, Lakshmi Narayana K, Dr.S.K.Sudheer, Dr. P.Arulmozhi varman
Volume: 2
Issue: 7
Year: 2010




Performance of Cluster-Based Multi-Source Multicasting in Mobile Ad hoc Networks
Author(s): R. Pandi Selvam and V.Palanisamy
Volume: 2
Issue: 7
Year: 2010




An Adaptive Power Resourceful and Energy Conscious Protocol for Multi channel Medium Access Control Layer in Wireless Sensor Networks
Author(s): M. Senthil Kumaran; Dr. R. Rangarajan
Volume: 2
Issue: 7
Year: 2010




Comparative Analysis for IPv4 and IPv6 Protocol to Evaluate Performance
Author(s): M.Anandkumar, K. Appathurai, P. Nagarajan and Dr.M. Hemalatha
Volume: 2
Issue: 7
Year: 2010




An Enhancement of AODV Routing Protocol for More Robust Wireless Sensor Network
Author(s): Zamree Che-aron, Wajdi Al-Khateeb and Farhat Anwar
Volume: 2
Issue: 7
Year: 2010




An Image Segmentation Based on Clustering of Spatial Patterns and Watershed Algorithm
Author(s): Kai-jian XIA, Jin-yi CHANG, Jin-cheng ZHOU
Volume: 2
Issue: 7
Year: 2010




Impedance-Based Image Reconstruction of the Field Distribution inside the Closed Phantom Using Finite Element Method
Author(s): Sarwan Kumar, Sneh Anand, Amit Sengupta
Volume: 2
Issue: 7
Year: 2010




GA based-Software Test Data Generator, Using Dynamic Repetition Frequency
Author(s): Maziyar Karbalaee Shabani, Mansour Ahmadi, Siroos Keshavarz, Faezeh Sadat Babamir and Seyed Mehrdad Babamir
Volume: 2
Issue: 7
Year: 2010




An Improved Method for Fuzzy Congestion Control in IEEE 802.11 Wireless Local Area Networks
Author(s): Arash Mohammadzadeh Gharehbaghi, M.A. Badamchizadeh
Volume: 2
Issue: 7
Year: 2010




Design and Implementation of a Hybrid Compression Technique for Ultrasound Images in Telemedicine
Author(s): Divya Mohandass, Dr.J.Janet
Volume: 2
Issue: 7
Year: 2010




Speech Compression: A Comparative Study between Discreet Wavelet and Wavelet Packet Decomposition
Author(s): Shijo M Joseph, Firoz Shah A and Babu Anto P
Volume: 2
Issue: 7
Year: 2010




Secure Source Routing Protocol for Mobile Adhoc Networks
Author(s): M.Rajesh Babu, Dr.S.Selvan
Volume: 2
Issue: 7
Year: 2010




A Performance Comparison of Multicast Routing Protocols in Ad hoc Networks
Author(s): Preeti Arora, Prof G N Purohit
Volume: 2
Issue: 7
Year: 2010




A Novel Approach for Lossy Compression using Modified Gray Scale Quantization
Author(s): V. U. K. Sastry and Ch. Samson
Volume: 2
Issue: 7
Year: 2010




A Protocol for Secret Key Infusion from Satellite Transmissions
Author(s): Mohamed Ridza Wahiddin, Noor Shamila Shanaz Noor Sham
Volume: 2
Issue: 7
Year: 2010




A Reliable Attack-Resistant Authenticated Routing Protocol for Mobile Adhoc Networks
Author(s): M.Rajesh Babu, Dr.S.Selvan
Volume: 2
Issue: 7
Year: 2010




Secured Interworking and Roaming between 3GPP LTE and Wireless Local Mesh Networks
Author(s): Faouzi Zarai, Ikbel Daly and Lotfi Kamoun
Volume: 2
Issue: 7
Year: 2010




Performance of Different Techniques for Text-Independent Speaker Identification in Noisy Environment
Author(s): Dr.S.T.Gandhe and Mr.J.H.Nirmal
Volume: 2
Issue: 7
Year: 2010




Session Based Load Optimization Techniques to Enhance Security & Efficiency of E-commerce Transactions
Author(s): R.K. Pateriya, J.L. Rana and S.C. Shrivastava
Volume: 2
Issue: 6
Year: 2010




Segmentation of MR Brain tumor using Parallel ACO
Author(s): J.Jaya and K.Thanushkodi
Volume: 2
Issue: 6
Year: 2010




An Optimization Problem for Evaluation of Image Segmentation Methods
Author(s): Javad Alikhani koupaei, Marjan Abdechiri
Volume: 2
Issue: 6
Year: 2010




Design of Scheduling Algorithm for Ad hoc Networks with Capability of Differential Service
Author(s): Seyed Hossein Hosseini Nazhad Ghazani, Jalil Jabari Lotf ,Mahsa Khayyatzadeh, R.M. Alguliev
Volume: 2
Issue: 6
Year: 2010




A New Cluster-based Routing Protocol with Maximum Lifetime for Wireless Sensor Networks
Author(s): Jalil Jabari Lotf, seyed hossein hosseini nazhad ghazani, Rasim M. Alguliev
Volume: 2
Issue: 6
Year: 2010




Experimental Comparison of Fiber Optic Link Impact on Shift Keying Modulations
Author(s): Dr. Mohammad Samir Modabbes
Volume: 2
Issue: 6
Year: 2010




Using Word Distance Based Measurement for Cross-lingual Plagiarism Detection
Author(s): Moslem mohammadi, Morteza analouei
Volume: 2
Issue: 6
Year: 2010




ICAR: Intelligent Congestion Avoidance Routing for Open Networks
Author(s): Dr. P.K.Suri, Kavita Taneja
Volume: 2
Issue: 6
Year: 2010




Study the Effect of Node Distribution on QoS Multicast
Author(s): Mohammed Saghir
Volume: 2
Issue: 6
Year: 2010




Scalable ACC-DCT Based Video Compression Using Up/Down Sampling Method
Author(s): G.Suresh, P.Epsiba, Dr.M.Rajaram, Dr.S.N.Sivanandam
Volume: 2
Issue: 6
Year: 2010




Comparative Study of Continuous Density Hidden Markov Models (CDHMM) and Artificial Neural Network (ANN) In Infant’s Cry Classification System
Author(s): Yousra Abdulaziz Mohammed, Sharifah Mumtazah Syed Ahmad
Volume: 2
Issue: 6
Year: 2010




Reliable Soft-Checkpoint Based Fault Tolerance Approach for Mobile Distributed Systems
Author(s): Surender Kumar, R.K. Chauhan and Parveen Kumar
Volume: 2
Issue: 6
Year: 2010




A Specific Replication Strategy of Middleware Resources in Dense MANETs
Author(s): Anil Kumar, Parveen Gupta, Pankaj Verma & Vijay Lamba
Volume: 2
Issue: 6
Year: 2010




Clustering Based Machine Learning Approach for Detecting Database Intrusions in RBAC Enabled Databases
Author(s): Udai Pratap Rao,G. J. Sahani, Dhiren R. Patel
Volume: 2
Issue: 6
Year: 2010




Automated Detection and Recognition of Face in a Crowded Scene
Author(s): Chandrappa D N, M Ravishankar, D R RameshBabu
Volume: 2
Issue: 6
Year: 2010




Solution for Green Computing
Author(s): Rajguru P.V., Nayak S.K. More D.S.
Volume: 2
Issue: 6
Year: 2010




Power Management in Wireless ad-hoc Networks with Directional Antennas
Author(s): Mahasweta Sarkar, Ankur Gupta
Volume: 2
Issue: 6
Year: 2010




Formal Specification for Implementing Atomic Read/Write Shared Memory in Mobile Ad Hoc Networks Using the Mobile Unity
Author(s): Fatma.A.Omara, Said El Zoghdy, Reham.A.Shihata
Volume: 2
Issue: 6
Year: 2010




Universal Tool for University Course Schedule Using Genetic Algorithm
Author(s): Mohamed Tahar Ben Othman
Volume: 2
Issue: 6
Year: 2010




Proxy Blind Signature based on ECDLP
Author(s): Asis Kumar Tripathy, Ipsita Patra and Debasish Jena
Volume: 2
Issue: 6
Year: 2010




Cryptography of a Gray Level Image Using a Modified Hill Cipher
Author(s): . U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Volume: 2
Issue: 6
Year: 2010




Secure Password Authenticated Three Party Key Agreement Protocol
Author(s): Pritiranjan Bijayasingh, Debasish Jena
Volume: 2
Issue: 6
Year: 2010




The Use of Mobile Technology In Delivering E-Learning Contents: UNITEN experience
Author(s): Mohd Hazli.M.Z, Mohd Zaliman Mohd Yusoff, Azlan Yusof
Volume: 2
Issue: 6
Year: 2010




BER Analysis of BPSK Signal in AWGN Channel
Author(s): Dr. Mohammad Samir Modabbes
Volume: 2
Issue: 6
Year: 2010




Relative Performance of Scheduling Heuristics in Heterogeneous Computing Environment
Author(s): Ehsan Ullah Munir, Shengfei Shi, Zhaonian Zou, Muhammad Wasif Nisar, Kashif Ayyub, Muhammad Waqas Anwar
Volume: 2
Issue: 6
Year: 2010




A Bidding based Resource Allocation Scheme in WiMAX
Author(s): Mahasweta Sarkar, Padmasini Chandramouli
Volume: 2
Issue: 6
Year: 2010




Effect of Community Based Mobility Model and SMS Mobility Model on the Performance of AOMDV, DYMO, FSR, LAR, OLSR and TORA Routing Protocols in MANET Under Diversified Scenarios
Author(s): Gowrishankar.S, T.G.Basavaraju and SubirKumarSarkar
Volume: 2
Issue: 5
Year: 2010




Phase Information Extraction of Atrial Fibrillation Using Wavelets
Author(s): V.Bindhu, G.Ranganathan, Dr.R.Rangarajan
Volume: 2
Issue: 5
Year: 2010




Color Image Segmentation Using Double Markov Random Field (DMRF) Model with Edge Penalty Function
Author(s): Sami M. Halawani, Ibrahim A. Albidewi, M. M. Sani, M. Z. Khan
Volume: 2
Issue: 5
Year: 2010




Probability of Inquiry Interference in Bluetooth Discovery: Mathematical Analysis and Modeling
Author(s): Khaled Morsi, Gao Qiang and Xiong Huagang
Volume: 2
Issue: 5
Year: 2010




Graph Matching Measure for Document Retrieval
Author(s): Amina Ghardallou Lasmar, Anis Kricha and Najoua Essoukri Ben Amara
Volume: 2
Issue: 5
Year: 2010




An improved low voltage, low power class AB operational transconductance amplifier for mobile Applications
Author(s): M.SanthanaLakshmi, Dr. P.T. Vanathi
Volume: 2
Issue: 5
Year: 2010




Analysis of Subband Speech Enhancement Technique for Digital Hearing Aids
Author(s): D. Deepa, Dr. A. Shanmugam
Volume: 2
Issue: 5
Year: 2010




Cluster Based Hierarchical Routing Protocol For Wireless Sensor Network
Author(s): Md. Golam Rashed, M. Hasnat Kabir, Muhammad Sajjadur Rahim, Shaikh Enayet Ullah
Volume: 2
Issue: 5
Year: 2010




A Critical Evaluation of Relational Database Systems for OLAP Applications
Author(s): Sami M. Halawani, Ibrahim A. Albidewi, Jahangir Alam and Zubair Khan
Volume: 2
Issue: 5
Year: 2010




A Novel Architecture for QoS Management in MANET using Mobile Agent
Author(s): A.K.Vatsa, Gaurav Kumar
Volume: 2
Issue: 5
Year: 2010




CAN Bus, an Efficient Approach for Monitoring and Controlling
Author(s): Rashmi Jain, N. G. Bawne
Volume: 2
Issue: 5
Year: 2010




An Efficient Key Management Scheme for Mobile Ad hoc Networks with Authentication
Author(s): N.Suganthi, Dr. V.Sumathy
Volume: 2
Issue: 5
Year: 2010




Factors Identification of Software Process Model – Using a Questionnaire
Author(s): Abdur Rahshid Khan, Zia Ur Rehman
Volume: 2
Issue: 5
Year: 2010




MOBINA: A Novel DBA Method Based on Second Price Auction in Ethernet Passive Optical Network
Author(s): AR. Hedayati, M.N Feshaaraki,K. Badie, A. Khademzadeh and M. Davari
Volume: 2
Issue: 5
Year: 2010




An Efficient Solution for Privacy Preserving Association Rule Mining
Author(s): Chirag N. Modi, Udai Pratap Rao and Dhiren R. Patel
Volume: 2
Issue: 5
Year: 2010




Coloring of Triangle Free Girth Graphs with Minimal k-Colors
Author(s): Dr. Mohammad Malkawi , Dr. Mohammad Al-Hajj Hasan
Volume: 2
Issue: 5
Year: 2010




An Improved Proxy Ring Signature Scheme with Revocable Anonymity
Author(s): Binayak Kar, Pritam Prava Sahoo and Ashok Kumar Das
Volume: 2
Issue: 5
Year: 2010




Route Information Update in Mobile Ad Hoc Networks
Author(s): Seungjin Park, Seong-Moo Yoo
Volume: 2
Issue: 5
Year: 2010




Performance of DSR Protocol over Sensor Networks
Author(s): Khushboo Tripathi, Tulika Agarwal and S. D. Dixit
Volume: 2
Issue: 5
Year: 2010




A Novel Run-Time Memory Leak Detection and Recovery (MLDR) Using Aging in Physical Memory Space
Author(s): Ahmed Otoom, Mohammad Malkawi and Mohammad Alweh
Volume: 2
Issue: 5
Year: 2010




Security Issues for Voice over IP Systems
Author(s): Ali Tahir, Asim Shahzad
Volume: 2
Issue: 5
Year: 2010




Travelling Salesman’s Problem: A Petri net Approach
Author(s): Sunita Kumawat, G.N.Purohit
Volume: 2
Issue: 5
Year: 2010




Face Recognition Using Subspace LDA
Author(s): Sheifali Gupta, O.P.Sahoo, Ajay Goel and Rupesh Gupta
Volume: 2
Issue: 5
Year: 2010




Principle Component Analysis From Multiple Data Representation
Author(s): Rakesh Kumar yadav, Abhishek K Mishra, Navin Prakash and Himanshu Sharma
Volume: 2
Issue: 5
Year: 2010




Energy-efficient Algorithm for a novel clustering approach in w/s networks
Author(s): S. Sarah, P. Kumaran, Dr. A. Arul Lawrence Selvakumar
Volume: 2
Issue: 5
Year: 2010




Centralized Framework for Real Time Traffic in Vehicular Ad hoc Networks
Author(s): Nazish Khan, Dr. Anjali Mahajan
Volume: 2
Issue: 5
Year: 2010




Energy efficient wireless networks
Author(s): Dr. Neeraj Tyagi, Awadhesh Kumar, Ajit Kumar, Er. Rati Agarwal
Volume: 2
Issue: 5
Year: 2010




Performance Evaluation of a Reed-Solomon Encoded Multi-user Direct Sequence Code Division Multiple Access (DS-CDMA) Communication System
Author(s): Nargis Parvin, Farhana Enam, Shaikh Enayet Ullah, Md. Saifur Rahman
Volume: 2
Issue: 5
Year: 2010




Information System with Interlacing, key dependent Permutation and rotation
Author(s): Prasad Reddy. P.V.G.D, K.R.Sudha, P Sanyasi Naidu
Volume: 2
Issue: 5
Year: 2010




Adaptive Modulation Techniquesfor WIMAX
Author(s): B.Chaitanya, T.Sai Ram Prasad, K.Sruthi and T.Tejaswi
Volume: 2
Issue: 5
Year: 2010




PET/CT and MR Image Registration using Normalized Cross Correlation Algorithm and Spatial Transformation Techniques
Author(s): B.Balasubramanian Dr. K. Porkumaran
Volume: 2
Issue: 5
Year: 2010




Performance Evaluation of MPEG-4 Video Transmission over IEEE802.11e
Author(s): Abdirisaq Mohammed Jama, Sinzobakwira Issa and Othman O. Khalifa
Volume: 2
Issue: 5
Year: 2010




A Model-driven Approach for Runtime Assurance of Software Architecture Model
Author(s): Yujian Fu, Xudong He, Sha Li, Zhijiang Dong and Phil Bording
Volume: 2
Issue: 5
Year: 2010




Analysis of Three Phase Four Wire Inverter for UPS Fed Unbalanced Star Connected Load
Author(s): R.Senthil Kumar, Dr. Jovitha Jerome, S.NithyaBhama
Volume: 2
Issue: 4
Year: 2010




Biometrics Based File Transmission Using RSA Cryptosystem
Author(s): Cryptography, Biometrics, RSA, DSS, KDC
Volume: 2
Issue: 4
Year: 2010




An ASes stable solution in I-Domain
Author(s): G. Mohammed Nazer, Dr.A.Arul Lawrence Selvakumar
Volume: 2
Issue: 4
Year: 2010




A Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm
Author(s): Abdullah Sharaf Alghamdi, Hanif Ullah
Volume: 2
Issue: 4
Year: 2010




Routing protocols in wireless networks
Author(s): Vineet Agrawal, Dr Yashpal Singh, Manish Varshney, Vidushi Gupta
Volume: 2
Issue: 4
Year: 2010




Analysis and Proposal of a Geocast Routing Algorithm Intended For Street Lighting System Based On Wireless Sensor Networks
Author(s): Rodrigo Palucci Pantoni , Dennis Brandão
Volume: 2
Issue: 4
Year: 2010




A Method of Access in a Dynamic Context Aware Role Based Access Control Model for Wireless Networks
Author(s): Dr. A.K. Santra, Nagarajan S
Volume: 2
Issue: 4
Year: 2010




New Power Aware Energy Adaptive protocol with Hierarchical Clustering for WSN
Author(s): Mehdi Golsorkhtabar, Mehdi Hosinzadeh, Mir Javad Heydari, Saeed Rasouli
Volume: 2
Issue: 4
Year: 2010




Design and Implementation of A GUI Based on Neural Networks for the Currency Verification
Author(s): Ajay Goel, O.P.Sahu, Rupesh Gupta, Sheifali Gupta
Volume: 2
Issue: 4
Year: 2010




Analysis of Searching Techniques and Design of Improved Search Algorithm for Unstructured Peer – to – Peer Networks
Author(s): Dr. Yash Pal Singh, Rakesh Rathi, Jyoti Gajrani, Vinesh Jain
Volume: 2
Issue: 4
Year: 2010




RD-Optimisation analysis for H.264/AVC scalable video coding
Author(s): Sinzobakwira Issa, Abdi Risaq M. Jama, Othman Omar Khalifa
Volume: 2
Issue: 4
Year: 2010




Artifact Extraction and Removal from EEG Data Using ICA
Author(s): Ashish Sasankar, Dr. N.G Bawane, Sonali Bodkhe, M.N.Bawane
Volume: 2
Issue: 4
Year: 2010




Design of a Novel Cryptographic Algorithm using Genetic Functions
Author(s): Praneeth Kumar G and Vishnu Murthy G
Volume: 2
Issue: 4
Year: 2010




Steganography Security for Copyright Protection of Digital Images Using DWT
Author(s): K.T.Talele, Dr.S.T.Gandhe, Dr.A.G.Keskar
Volume: 2
Issue: 4
Year: 2010




Self Encrypting Data Streams for Digital Signals
Author(s): A.Chandra Sekhar, Ch.Suneetha, G.Naga Lakshmi
Volume: 2
Issue: 4
Year: 2010




Cluster Management using Cluster Size Ratio in Ad Hoc Networks
Author(s): D K L V Chandra Mouly, Ch D V Subba Rao, M M Naidu
Volume: 2
Issue: 4
Year: 2010




Powers of a Graph and Associated Graph Labeling
Author(s): G. N. Purohit, Seema Verma and Usha Sharma
Volume: 2
Issue: 4
Year: 2010




Hexagonal Coverage by Mobile Sensor Nodes
Author(s): G.N. Purohit, Seema Verma, Megha Sharma
Volume: 2
Issue: 4
Year: 2010




An Approach to Protection at Peer-To-Peer Networks
Author(s): Dr.G.Srinivasa Rao, Dr.G. Appa Rao, S. Venkata Lakshmi, D. Veerabhadra Rao, B. Venkateswar Reddy, P. Venkateswara Rao, K. Sanjeevulu.
Volume: 2
Issue: 4
Year: 2010




Redevelopment of Graphical User Interface for IPMS Web Portal
Author(s): Hao Shi
Volume: 2
Issue: 4
Year: 2010




Markov Based Mathematical Model of Blood Flow Pattern in Fetal Circulatory System
Author(s): Sarwan Kumar, Sneh Anand , Amit Sengupta
Volume: 2
Issue: 4
Year: 2010




Progressive Image Compression with Ridgelets and Vector Quantization
Author(s): A.Vasuki, P.T.Vanathi
Volume: 1
Issue: 3
Year: 2009




Identifying, Measuring, and Implementing Cultural Difference in Cross-Cultural User Interface Design
Author(s): Jasem M. Alostath, Laila R. Abdulhadi Abdullah
Volume: 1
Issue: 3
Year: 2009




Performance Analysis of Diversity Schemes in Multi hop Ad hoc Networks
Author(s): Meenu Khurana and C. Rama Krishna
Volume: 1
Issue: 3
Year: 2009




Optimal Channel Allocation in Wireless Sensor Network using OFDMA
Author(s): Mohd. Sabir, Rakesh Kumawat and Dr. V.S.Chouhan
Volume: 1
Issue: 3
Year: 2009




Design and Experimental Analysis of High Performance Microstrip Antenna
Author(s): Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen , K. Shehzad, S. Muzahir Abbas, K.S.Alimgeer
Volume: 1
Issue: 3
Year: 2009




Exploring spatial information in spectral features for Texture image retrieval
Author(s): Renuka Methre and M. Ravindranath
Volume: 1
Issue: 3
Year: 2009




MOSAODV: Solution to Secure AODV against Blackhole Attack
Author(s): N. H. Mistry, D. C. Jinwala and M. A. Zaveri
Volume: 1
Issue: 3
Year: 2009




Handwritten Tamil Character Recognition Using SVM
Author(s): Prof. Dr.J.Venkatesh, C. Sureshkumar
Volume: 1
Issue: 3
Year: 2009




Choase Based Image Encryption Using Block-Based Transformation Algorithm
Author(s): Kamlesh Gupta, Sanjay Silakari
Volume: 1
Issue: 3
Year: 2009




Design of a 2.2-4.0 GHz Low Phase Noise and Low Power LC VCO
Author(s): Namrata Prasad, R. S. Gamad and C. B. Kushwah
Volume: 1
Issue: 3
Year: 2009




Statistical Analysis of Defect Amplification Index in Domain Variant Commercial Software Application Development through Fault Injection Patterns
Author(s): Mr. P Mohammed Shareef, Dr. M V Srinath and Dr.S.Balasubramanian
Volume: 1
Issue: 3
Year: 2009




Suggestion of New Core Point of Attacks on IEEE 802.16e Networks: A Survey
Author(s): Adnan Khan Akhunzada, Saeed Murtaza, Ahmad Raza Cheema and Arif Wahla
Volume: 1
Issue: 3
Year: 2009




Comprehensive Analysis and Enhancement of Steganographic Strategies for Multimedia Data Hiding and Authentication
Author(s): Ali Javed, Asim Shahzad, Romana shahzadi, Fahad Khan
Volume: 2
Issue: 3
Year: 2010




Capacity Enhancement of 3G Cellular System using Switched Beam Smart Antenna with Windowed Beam former
Author(s): Prof. T. B. Lavate, Prof. V. K. Kokate, Prof. Dr A. M. Sapkal
Volume: 2
Issue: 3
Year: 2010




A Hierarchical Genetic Algorithm for Topology Optimization and Traffic Management in ATM Networks Utilizing Bandwidth and Throughput
Author(s): Alaa Sheta, Malik Braik, Mohammad Salamah
Volume: 2
Issue: 3
Year: 2010




Implementation of Watermarking for a Blind Image using Wavelet Tree Quantization
Author(s): S.M.Ramesh, Dr.A.Shanmugam, B.Gomathy
Volume: 2
Issue: 3
Year: 2010




Data Encryption technique using Location based key dependent Permutation and circular rotation
Author(s): Prasad Reddy. P.V.G.D, K.R.Sudha , S.Krishna Rao
Volume: 2
Issue: 3
Year: 2010




Comparative Analysis of Wireless MAC Protocol for Collision Detection and Collision Avoidance in Mobile Ad Hoc Networks
Author(s): D.Sivaganesan, Dr.R.Venkatesan
Volume: 2
Issue: 3
Year: 2010




Resource Allocation in Wireless Networks
Author(s): Manish Varshney, Dr Yashpal Singh, Vidushi Gupta
Volume: 2
Issue: 3
Year: 2010




Remote Laboratory for Teaching Mobile Systems
Author(s): Adil SAYOUTI, Adil LEBBAT, Hicham MEDROMI, Fatima QRICHI ANIBA
Volume: 2
Issue: 3
Year: 2010




An Integrated Approach for Legacy Information System Evolution
Author(s): Dr. Shahanawaj Ahamad
Volume: 2
Issue: 3
Year: 2010




Towards In-Car Ad Hoc Network for Pervasive Multimedia Services
Author(s): Kamal Sharma, Hemant Sharma, Dr. A K Ramani
Volume: 2
Issue: 3
Year: 2010




New Illumination Compensation Method for Face Recognition
Author(s): Heng Fui Liau, Dino Isa
Volume: 2
Issue: 3
Year: 2010




Use of CASE-technology and provision of SQL-data security for special transportation management
Author(s): Lyazat Naizabayeva
Volume: 1
Issue: 3
Year: 2009




Modeling and Simulation of Synchronous Buck Converter for PMG in Low Power Applications
Author(s): R. Bharanikumar, A. Nirmal Kumar and K.T. Maheswari.
Volume: 2
Issue: 3
Year: 2010




DDOM: The Dynamic Data Oriented Model for Image Using Binary Tree
Author(s): A.Shahrzad Khashandarag, A.Mousavi, R.Aliabadian, D. Kheirandish, A.Ranjide Rezai
Volume: 2
Issue: 3
Year: 2010




Improving Information Accessibility In Maintenance Using Wearable Computers
Author(s): Lt.Dr.S Santhosh Baboo, Nikhil Lobo
Volume: 2
Issue: 3
Year: 2010




Cryptanalysis of an efficient biometrics-based remote user authentication scheme using smart cards
Author(s): Fuw-Yi Yang, Jian-Sen Wang
Volume: 2
Issue: 3
Year: 2010




Design and VLSI implementation of Fuzzy Logic Controller
Author(s): Balwinder Singh , Rajneesh Goyal , Rakesh Kumar and R.P.P Singh
Volume: 1
Issue: 3
Year: 2009




An Approach to Apply Fuzzy Set in Classical Database
Author(s): Sadia Husain, Afshar Alam and Yasir Ahmad
Volume: 1
Issue: 3
Year: 2009




Enhancement in the Identities-Exchange Process during the Authentication Process
Author(s): Amr M. Kisk, Nagy W. Messiha, Nabil M. A. Ayad , Nawal A. Elfeshawy and Fathi E. Abdel-Samie
Volume: 1
Issue: 3
Year: 2009




Integrated Intrusion Detection using SCT
Author(s): Selvakani Kandeeban and R. S. Rajesh
Volume: 1
Issue: 2
Year: 2009




Low Memory Strip Based Visual Saliency Algorithm for Hardware Constrained Environment
Author(s): Christopher Wing Hong Ngau, Li-Minn Ang, and Kah Phooi Seng
Volume: 1
Issue: 2
Year: 2009




Lips Detection using Closed Boundary Watershed and Improved H∞ Lips Tracking System
Author(s): Siew Wen Chin, Kah Phooi Seng, Li-Minn Ang and King Hann Lim
Volume: 1
Issue: 2
Year: 2009




3D Face Recognition using Combination Rule for Horizontal and Vertical Face Contour
Author(s): Wei Jen Chew, Kah Phooi Seng and Li-Minn Ang
Volume: 1
Issue: 2
Year: 2009




A modular network interface adapter design for OCP compatibles NoCs
Author(s): Brahim Attia, Abdelkrim Zitouni, Noureddine Abid and Rached Tourki
Volume: 1
Issue: 2
Year: 2009




An Efficient Adaptation Aware Caching Architecture for Multimedia Content Proxies
Author(s): B.L. Velammal and P. Anandha Kumar
Volume: 1
Issue: 2
Year: 2009




A Comprehensive Analysis of Voice Activity Detection Algorithms for Robust Speech Recognition System under Different Noisy Environment
Author(s): C.Ganesh Babu , Dr.P.T.Vanathi, R.Ramachandran, M.Senthil Rajaa and R.Vengatesh
Volume: 1
Issue: 2
Year: 2009




Mining Fuzzy Multidimensional Association Rules Using Fuzzy Decision Tree Induction Approach
Author(s): Rolly Intan, Oviliani Yenty Yuliana and Andreas Handojo
Volume: 1
Issue: 2
Year: 2009




A Proposed SAFER Plus Security algorithm using Fast Psuedo Hadamard Transform (FPHT) with Maximum Distance Separable code for Bluetooth Technology
Author(s): D.Sharmila, R.Neelaveni
Volume: 1
Issue: 2
Year: 2009




Selection of Proper Activation Functions in Back-propagation neural networks algorithm for Transformer Internal Fault Locations
Author(s): A. Ngaopitakkul, A. Kunakorn
Volume: 1
Issue: 2
Year: 2009




An Effective Localized Route Repair Algorithm for Use with Unicast Routing Protocols for Mobile Ad hoc Networks
Author(s): Natarajan Meghanathan
Volume: 1
Issue: 2
Year: 2009




An Assimilated Approach for Statistical Genome Streak Assay between Matriclinous Datasets
Author(s): Hassan Mathkour, Muneer Ahmad and Hassan Mehmood khan
Volume: 1
Issue: 2
Year: 2009




Wavelet based Watermarking Technique using Simple Preprocessing Methods
Author(s): S.MaruthuPerumal, B.Vijaya Kumar , L.Sumalatha and Dr. V.Vijaya Kumar
Volume: 1
Issue: 2
Year: 2009




Hybrid Content Location Failure Tolerant Protocol for Wireless Ad Hoc Networks
Author(s): Maher BEN JEMAA
Volume: 1
Issue: 2
Year: 2009




A Rough Set Model for Sequential Pattern Mining with Constraints
Author(s): Jigyasa Bisaria, Namita Srivastava and Kamal Raj Pardasani
Volume: 1
Issue: 2
Year: 2009




Personal Authentication based on Keystroke Dynamics using Ant Colony Optimization and Back Propagation Neural Network
Author(s): Marcus Karnan, M. Akila
Volume: 1
Issue: 2
Year: 2009




The Stone Cipher-192 (SC-192): A Metamorphic Cipher
Author(s): Magdy Saeb
Volume: 1
Issue: 2
Year: 2009




Automation of Data Warehouse, Extraction Transformation and Loading Update Cycle
Author(s): Atif Amin and Abdul Aziz
Volume: 2
Issue: 2
Year: 2010




Comprehensive analysis of UMTS Authentication and Key Agreement
Author(s): Engr. Mujtaba Hassan, Engr. Munaza Razzaq and Engr. Asim Shahzad
Volume: 2
Issue: 2
Year: 2010




Effect of error concealment methods on UMTS radio network capacity and coverage planning
Author(s): Dr. Bhumin H. Pathak, Dr. Geoff Childs and Dr. Maaruf Ali
Volume: 2
Issue: 2
Year: 2010




Performance analysis of Dynamic load Balancing Techniques for Parallel and Distributed Systems
Author(s): Z.Khan, R.Singh, J. Alam and R.Kumar
Volume: 2
Issue: 2
Year: 2010




Efficient Code Dissemination Reprogramming Protocol for WSN
Author(s): R.P.Shaikh , Dr. V.M. Thakare, Dr. R.V. Dharaskar
Volume: 2
Issue: 2
Year: 2010




Integration of Metaheuristic Algorithms for Minimum Spanning Tree
Author(s): R.Thamilselvan, Dr.P.Balasubramanie
Volume: 2
Issue: 2
Year: 2010




A Dynamic Trust-Based Context-Aware Authentication Framework with Privacy Preserving
Author(s): Abdallah MHAMED, Pierre E. ABI-CHAR, Bachar EL-HASSAN Mounir MOKHTARI
Volume: 2
Issue: 2
Year: 2010




Detection of Masses in Digital Mammograms
Author(s): J.Subhash Chandra bose, Marcus Karnan, and R.Sivakumar
Volume: 2
Issue: 2
Year: 2010




Browser Extensible Secured Hash Password Authentication for Multiple Websites
Author(s): T.S.Thangavel and Dr. A. Krishnan
Volume: 2
Issue: 2
Year: 2010




Partial Aggregation for Multidimensional Online Analytical Processing Structures
Author(s): Naeem Akhtar Khan and Abdul Aziz
Volume: 2
Issue: 2
Year: 2010




Impact and Performance Analysis of Mobility Models on Stressful Mobile WiMax Environments
Author(s): N Vetrivelan Dr. A V Reddy
Volume: 2
Issue: 2
Year: 2010




Column Vectorizing Algorithms for Support Vector Machines
Author(s): Chen ZhiYuan, Dino Isa and Peter Blanchfield
Volume: 2
Issue: 2
Year: 2010




Securing Digital Information using Quasigroups
Author(s): Saibal K. Pal and Shivam Kapoor
Volume: 2
Issue: 2
Year: 2010




Design of a 3.3GHz Band Application LC VCO for Low Phase noise and Low power Using Current Mirror
Author(s): Namrata Prasad, R. S. Gamad
Volume: 2
Issue: 2
Year: 2010




Segmentation Method Based On Circular Edge Magnitude for Classification of Textures
Author(s): Dr. A. Nagaraja Rao , K. Lavanya,G. Aruna Kumari, M.N. Hima Bindu
Volume: 2
Issue: 2
Year: 2010




Electrocardiogram Prediction Using Error Convergence-type Neuron Network System
Author(s): Shunsuke Kobayakawa, Hirokazu Yokoi
Volume: 2
Issue: 2
Year: 2010




Multiple region Multiple Quality ROI Encoding using Wavelet Transform
Author(s): P.Rajkumar and Madhu Shandilya
Volume: 2
Issue: 2
Year: 2010




Rough Set and BP Neural Network Optimized by GA Based Anomaly Detection
Author(s): REN Xun-yi, WANG Ru-chuan, and ZHOU He-Jun
Volume: 1
Issue: 2
Year: 2009




A Collaborative Framework for Human-Agent Systems
Author(s): Moamin Ahmed, Mohd Sharifuddin Ahmad and Mohd Zaliman Mohd Yusoff
Volume: 1
Issue: 2
Year: 2009




A New Clustering Algorithm for Increasing of Lifetime in sensor Networks
Author(s): Abbas Mirzaei Somarin, Habib Motee Ghader, Amir Masoud Rahmani and Ali Ghafar
Volume: 2
Issue: 2
Year: 2010




New method to decrease probability of failure nodes in WSNs
Author(s): Ali HosseinAlipour , Davood KeyKhosravi , Abbas Mirzaei Somarin
Volume: 2
Issue: 2
Year: 2010




New protocol to increase the reliability in WSNs
Author(s): Ali HosseinAlipour, Habib Moti Ghader, Mojtaba GorbanAlizadeh
Volume: 2
Issue: 2
Year: 2010




A Large Block Cipher Involving a Key Applied on Both the Sides of the Plain Text
Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Volume: 2
Issue: 2
Year: 2010




2- Dimension Automatic Microscope Moving Stage
Author(s): Ovasit P., Adsavakulchai S., Srinonghang W., and Ueatrongchit, P.
Volume: 2
Issue: 2
Year: 2010




Modified Feistel Cipher Involving Interlacing and Decomposition
Author(s): K.Anup Kumar , V.U.K. Sastry
Volume: 1
Issue: 2
Year: 2009




Forward Collision and Delay Avoidance Using Energy Efficient Collision Sets in WSN
Author(s): Bhushan N. Mahajan , Dr. R. V. Dharaskar and Dr. V. M. Thakare
Volume: 2
Issue: 2
Year: 2010




Efficient Coverage and Connectivity with Minimized Power Consumption in Wireless Sensor Networks
Author(s): A.Balamurugan, T.Purushothaman, and S.UmaMaheswari
Volume: 2
Issue: 10
Year: 2010




Comparison of Congestion Control Schemes in Wireless LAN using Satellite link and ATM Networks
Author(s): Dr.R.Seshadri and Prof.N.Penchalaiah
Volume: 2
Issue: 10
Year: 2010




Modeling a Balanced Score Card systems in IT departments using a fuzzy AHP and non linear regression approach regarding to mindset of evaluators
Author(s): Mohammad Mehdi Farhangian, Foad Marzoughi, and Alex Tze Hiang Sim
Volume: 2
Issue: 10
Year: 2010




Providing a model to estimate the probability of the complexity of software projects
Author(s): Foad Marzoughi, Mohammad Mehdi Farhangian and Alex Tze Hiang Sim
Volume: 2
Issue: 10
Year: 2010




Adoption OF Business Continuity Planning In IT Services Case Study: MyLinE
Author(s): Parvaneh Sarshar and Mohd Zaidi Abd Rozan
Volume: 2
Issue: 10
Year: 2010




Evaluation and improvement of resource retrieving method, using reinforcement learning in Grid Network
Author(s): Erfan Shams, Abolfazl Toroghi Haghighat and Ehsan Ghamari
Volume: 2
Issue: 10
Year: 2010




An Innovative Simulation of IPv4 to IPv6 BD-SIIT Transition Mechanism Methodology between IPv4 Hosts in an Integrated IPv6/IPv4 Network
Author(s): J.Hanumanthappa, D.H.Manjaiah
Volume: 2
Issue: 10
Year: 2010




Neural Network based Regression Model for Accurate Estimation of Human Body Fat - Obesity Assessment using Circumference Measures
Author(s): N.Revathy and Dr.R.Amalraj
Volume: 2
Issue: 10
Year: 2010




Evaluating Clustering Performance for the Protected Data using Perturbative Masking Techniques in Privacy Preserving Data Mining
Author(s): S.Vijayarani, Dr.A.Tamilarasi
Volume: 2
Issue: 10
Year: 2010




Identification of Critical Factors for Fast Multiple Faults Recovery Based on Reassignment of Task in Cluster Computing
Author(s): Sanjay Bansal, Sanjeev Sharma
Volume: 2
Issue: 10
Year: 2010




Design of CMOS Active-RC Low Pass Filter Using 0.18 µm
Author(s): Dilip Singar, D.S. Ajnar and Pramod Kumar Jain
Volume: 2
Issue: 10
Year: 2010




A Modified Framework of Knowledge Management System Components for Collaborative Software Maintenance
Author(s): Mohd Zali Mohd Nor, Rusli Abdullah, Masrah Azrifah Azmi Murad and Mohd Hasan Selamat
Volume: 2
Issue: 10
Year: 2010




Evolution Of FTTH As A Novel Subscriber’s Broadband Service Access Technology
Author(s): P. Rajeswari1, N. Lavanya and Shankar Duraikannan
Volume: 2
Issue: 10
Year: 2010




A Robustness Steganographic Method Against Noise For RGB Images Based On PCA
Author(s): Hamid Dehghani, Majid Gohari
Volume: 2
Issue: 10
Year: 2010




Analysis of the Performance of Registration of Mono and Multimodal Brain Images using Fast Walsh-Hadamard Transform
Author(s): D.Sasikala and R.Neelaveni
Volume: 2
Issue: 10
Year: 2010




Hybrid Portable Document Format Protection Scheme based on Public key and Digital Watermarking
Author(s): Karim Shamekh, Ashraf Darwish and Mohamed Kouta
Volume: 2
Issue: 10
Year: 2010




An Efficient Intrusion Detection System for Mobile Ad Hoc Networks
Author(s): B.V. Ram Naresh Yadav, B.Satyanarayana, O.B.V.Ramanaiah
Volume: 2
Issue: 10
Year: 2010




Optimization of DTN routing protocols by using forwarding strategy (TSMF) and queuing drop policy (DLA)
Author(s): Sulma Rashid, Qaisar Ayub, M. Soperi Mohd Zahid , A.Hanan. Abdullah
Volume: 2
Issue: 10
Year: 2010




Protecting Consumers from the Menace of Phishing
Author(s): Vivian Ogochukwu Nwaocha
Volume: 2
Issue: 10
Year: 2010




Active Constellation Extension combined with Particle Swarm Optimization for PAPR Reduction in OFDM Signals
Author(s): A. Ouqour. Y. Jabrane, B. Ait Es Said, A. Ait Ouahman
Volume: 2
Issue: 10
Year: 2010




Object Handling Using Artificial Tactile Affordance System
Author(s): Naoto Hoshikawa, Masahiro Ohka and Hanafiah Bin Yussof
Volume: 2
Issue: 10
Year: 2010




Development of Smart Antennas for Wireless Communication System
Author(s): T. B. Lavate, Prof. V. K. Kokate and Prof. Dr. M.S. Sutaone
Volume: 2
Issue: 10
Year: 2010




A Novel Data Imputing Algorithm
Author(s): Ahmed sobhy, Hany Harb, Sherif Zaky and Helmi Mahran
Volume: 2
Issue: 10
Year: 2010




Denoising of Magnetic Resonance Images using Wavelets- A Comparative Study
Author(s): S Satheesh, Dr.KVSVR Prasad, and P.Vasuda
Volume: 2
Issue: 10
Year: 2010




Node Realization: Proposed techniques of random walk, statistical and clustering
Author(s): A.Kumar, P.Chakrabarti and P.Saini
Volume: 2
Issue: 10
Year: 2010




Optimizing AODV routing protocols through queuing creation and converting flow model into packet model in wireless sensor networks
Author(s): Ehsan Kharati , Alireza Baharizadeh, Meysam Chegini and Mohsen Amerion
Volume: 2
Issue: 10
Year: 2010




A Modified Hill Cipher Involving Permutation, Iteration and the Key in a Specified Position
Author(s): V.U.K.Sastry and Aruna Varanasi
Volume: 2
Issue: 10
Year: 2010




Security Architecture Objectives for Beyond 3G Mobile Networks: A Survey and Critical Evaluation
Author(s): Mana Yazdani, and Majid Naderi
Volume: 2
Issue: 10
Year: 2010




An Empirical Study to Investigate the Effectiveness of Masquerade Detection
Author(s): Jung Y. Kim, Charlie Y. Shim and Daniel McDonald
Volume: 2
Issue: 10
Year: 2010




An Intelligent Bidirectional Authentication Method
Author(s): Nabil EL KADHI and Hazem EL GENDY
Volume: 2
Issue: 10
Year: 2010




Semi-deflection Routing: A Non-minimal Fully-adaptive Routing for Virtual Cut-through Switching Network
Author(s): Yuri Nishikawa, Michihiro Koibuchi, Hiroki Matsutani and Hideharu Amano
Volume: 2
Issue: 10
Year: 2010




Knowledge Based Computing Using Semantic Web for Grid Applications
Author(s): M. Basheer Ahamed and J.Michael Anna Spinneli
Volume: 2
Issue: 10
Year: 2010




Combined Tactile Display Mounted on a Mouse
Author(s): Yiru Zhou, Cheng-Xue Yin, Masahiro Ohka and Tetsu Miyaoka
Volume: 2
Issue: 10
Year: 2010




Accumulation Point Model: Towards Robust and Reliable Deployment
Author(s): Yong Lin, Zhengyi Le and Fillia Makedon
Volume: 2
Issue: 10
Year: 2010




Analysis of Statistical Path Loss Models for Mobile Communications
Author(s): Y. Ramakrishna, Dr. P. V. Subbaiah and V. Ratnakumari
Volume: 2
Issue: 10
Year: 2010




Intelligent Online Course evaluation system Using NLP Approach
Author(s): Behrang Parhizkar | Kerfalla Kourouma | Siti Fazilah | Yap Sing Nian | Sujata Navartnam | Edmund Ng Giap Wen
Volume: 2
Issue: 10
Year: 2010




Design of Cryptographic Hash Algorithm using Genetic Algorithms
Author(s): Siva Prashanth J, Vishnu Murthy G and Praneeth Kumar Gunda
Volume: 2
Issue: 10
Year: 2010




Effect of Handoff on End-to-End Delay over Mobile IP Networks
Author(s): Reza Malekian, Abdul Hanan Abdullah and Elmarie Biermann
Volume: 2
Issue: 10
Year: 2010




The Online Scaffolding in the Project-Based Learning
Author(s): Sha Li
Volume: 2
Issue: 10
Year: 2010




Veracity Finding From Information Provided on the Web
Author(s): D.Vijayakumar, B.srinivasarao, M.Ananda Ranjit Kumar
Volume: 2
Issue: 10
Year: 2010




The Effect of Public String on Extracted String in A Fuzzy Extractor
Author(s): Yang Bo, Li Ximing and Zhang Wenzheng
Volume: 2
Issue: 10
Year: 2010




Novel Approach for High Secure Data Hidden in the MPEG Video Using Public Key Infrastructure
Author(s): A.A Zaidan, B.B Zaidan
Volume: 1
Issue: 1
Year: 2009




Evidence Gathering System for Input Attacks
Author(s): Deepak Singh Tomar, J.L.Rana and S.C.Shrivastava
Volume: 1
Issue: 1
Year: 2009




An Economical Model for Optimal Distribution of Loads for Grid Applications
Author(s): G. Murugesan, Dr.C. Chellappan
Volume: 1
Issue: 1
Year: 2009




Implementing Fuzzy-Genetic Algorithm in Mental Health Diagnostic Expert System
Author(s): Rozita Yati Masri, Dr. Hajar Mat Jani, Alicia Tang Yee Chong
Volume: 1
Issue: 1
Year: 2009




Feature Parameter Extraction from Wavelet Sub-band Analysis for the Recognition of Isolated Malayalam Spoken Words
Author(s): Vimal Krishnan V.R, Babu Anto P
Volume: 1
Issue: 1
Year: 2009




Identity Application Fraud Detection using Web Mining and Rule-based Decision Tree
Author(s): Amany Abdelhalim and Issa Traore
Volume: 1
Issue: 1
Year: 2009




A Block Cipher Involving a Key Applied on Both the Sides of the Plain Text
Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Volume: 1
Issue: 1
Year: 2009




New Dynamic Approach for LZW Data Compression
Author(s): Dr.Bhupendra varma, Dushyant Chawara, Balwant Singh, Sonali Jain
Volume: 1
Issue: 1
Year: 2009




Karnaugh Map Model for Mining Association Rules in Large Databases
Author(s): Neelu Khare, Neeru Adlakha and K. R. Pardasani
Volume: 1
Issue: 1
Year: 2009




Using a Novel Intelligent Location Management Strategy in Wireless Networks
Author(s): J. Amar Pratap Singh, Marcus Karnan
Volume: 1
Issue: 1
Year: 2009




Distributed Optical Raman Amplifiers in Ultra High Speed Long Haul Transmission Optical Fiber Telecommunication Networks
Author(s): Abd El Naser A. Mohammed, Mohamed A. Metawe'e, Ahmed Nabih Zaki Rashed, and Mahmoud M. A. Eid
Volume: 1
Issue: 1
Year: 2009




An Investigation of Information Security Issues in the Indian Institutes of Higher Education: Current Security State and Practices
Author(s): D.S. Bhilare, Dr. A.K. Ramani, Dr. S. Tanwani
Volume: 2
Issue: 1
Year: 2010




NUMERIC TO NUMERIC ENCRYPTION OF DATABASES: Comparison of Standard Encryption and the Proposed 3Kdec Algorithms
Author(s): Dr. Himanshu Aggarwal, Kamaljit Kaur, Kanwalvir Singh Dhindsa, Ghanaya Singh
Volume: 2
Issue: 1
Year: 2010




Uniform Crossover Genetic Algorithm to Determine Base-Stock Levels in a Serial Supply Chain
Author(s): S.Narmadha, Dr.V.Selladurai and G.Sathis
Volume: 2
Issue: 1
Year: 2010




New Frame Work of Hidden Data with in Non Multimedia File
Author(s): Hamdan.O.Alanazi , Hamid A.Jalab , A.A Zaidan and B.B Zaidan
Volume: 2
Issue: 1
Year: 2010




Improving Computing Efficiency of a Wavelet Method Using ECG as a Biometric Modality
Author(s): Jianchu Yao, Yongbo Wan
Volume: 2
Issue: 1
Year: 2010




Performance of TCP/IP over wireless Networks using unaware Approach
Author(s): Kanwalvir Singh Dhindsa , Parminder Singh and Dr. Himanshu Aggarwal
Volume: 2
Issue: 1
Year: 2010




An Improved Biometric Remote User Authentication Scheme Based on Nonce
Author(s): Keerti Srivastava, Amit K Awasthi, R.C.Mittal
Volume: 2
Issue: 1
Year: 2010




An Image Classification Scheme For Increasing Reliability Of Least Square Method And Sample Pair Method
Author(s): Shreelekshmi R, M Wilscy, C E Veni Madhavan
Volume: 2
Issue: 1
Year: 2010




Finding Shortest Path on Probabilistic Fuzzy Networks Using Measure of Fuzziness Approach
Author(s): Seyedmohsen Hosseini
Volume: 2
Issue: 1
Year: 2010




Video Quality Enhancements with Implementation of NEWPRED method for MPEG-4 over simulated UMTS Channel Propagation Environments
Author(s): Dr. Bhumin Pathak, Dr. Geoff Childs, Dr. Maaruf Ali
Volume: 2
Issue: 1
Year: 2010




DNS cache-record coordination Using Adaptive Cache TTL Adjustment
Author(s): Isihara Tomohiro, Yuji Sekiya
Volume: 2
Issue: 1
Year: 2010




Load Balancing For Unstructured Peer to Peer Systems in Heterogeneous Network
Author(s): Havinash.P.H, M.Azath, K.Prasadh
Volume: 2
Issue: 1
Year: 2010




Robust Power Optimized Secured Routing Protocol for Wireless ADHOC Network
Author(s): E.V.Reddy, J.A. Kumar
Volume: 2
Issue: 1
Year: 2010




70MHz CMOS Gm-C 2nd Order Band Pass Filter for Wireless Systems
Author(s): Sampath.P and Dr.Gunavathi.K
Volume: 2
Issue: 1
Year: 2010




Analyzing Roberts Edge Detector for Digital Images Corrupted with Noise
Author(s): Raman Maini, Himanshu Aggarwal
Volume: 2
Issue: 1
Year: 2010




Digital Simulation of Electronic Transformer based Single-phase Induction Motor Drive
Author(s): K.Samidurai, Dr. K.Thanushkodi
Volume: 2
Issue: 1
Year: 2010




Multilevel Steganography: An Enhancement in Steganography and Comparative Study with Current Tools
Author(s): Navneet Singh Sikarwar
Volume: 2
Issue: 1
Year: 2010




New Clustering protocol for increasing Wireless Sensor Networks Lifetime
Author(s): Ahmad Khadem Zadeh, Ali Hosseinalipour, Shahram Babaie
Volume: 2
Issue: 1
Year: 2010




MCDMfJ : Mining Creational Design Motifs from Java source code
Author(s): Praneeth Kumar G, Aditya Kumar K
Volume: 2
Issue: 1
Year: 2010




An Improved Implementation of Brain Tumor Detection using Soft Computing
Author(s): Marcus karnan, T.logeswari
Volume: 2
Issue: 1
Year: 2010




Comprehensive and Relatively Fast Web Archiving Application for Offline Browsing
Author(s): Mr. B.Vijaya Babu, Prof M.S.Prasad Babu
Volume: 2
Issue: 1
Year: 2010



