Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Trends and Technology

ISSN: 2231--2803
Publisher: Seventh Sense Research Group


ADD TO MY LIST
 
Comparison of Graph Clustering Algorithms PDF available

Author(s): Aditya Dubey#1, Sanjiv Sharma
Volume: 4
Issue: 9
Year: 2013
Assessment of BEP of MIMO-OFDMA systems PDF available

Author(s): Manohar Naik Ramavath#1 B.A.Sarath Manohar Babu
Volume: 4
Issue: 9
Year: 2013
Design and PSL Verification of SoC Interconnect Using Open Core Protocol (OCP) PDF available

Author(s): Naga Prasad Reddy.T*1, Avinash.K*2
Volume: 4
Issue: 9
Year: 2013
Modern Safety Transportation Using Smart on- Board Unit in Vehicles PDF available

Author(s): L.kavya
Volume: 4
Issue: 9
Year: 2013
Image Edges Strengthening Filter Based Color Filter Array Interpolation PDF available

Author(s): C Mohammed Abdul Malik#1, B.N.Nagaveni
Volume: 4
Issue: 9
Year: 2013
Performance Evaluation of Skull Stripping Methods and Tools PDF available

Author(s): Pratibha
Volume: 4
Issue: 9
Year: 2013
Design Of Electronic Toll Collection (Etc) System On Arm- 7 Using Rfid Techonology PDF available

Author(s): A.usha kiran
Volume: 4
Issue: 9
Year: 2013
Design of Online Embedded Web Server for Data Acquisition System PDF available

Author(s): A.Shilpa
Volume: 4
Issue: 9
Year: 2013
An Optimization Technique for CRC Generation PDF available

Author(s): K.V.Krishna Reddy
Volume: 4
Issue: 9
Year: 2013
Optimization of Energy Usage in Cooperative Networks PDF available

Author(s): U.Sandhya#1, S.Vikram Phaneendra
Volume: 4
Issue: 9
Year: 2013
Anomaly Detection Using Pagerank Algorithm PDF available

Author(s): Deepak Shrivastava
Volume: 4
Issue: 9
Year: 2013
Improving classification Accuracy of Neural Network through Clustering Algorithms PDF available

Author(s): B.Madasamy#1, Dr.J.Jebamalar Tamilselvi
Volume: 4
Issue: 9
Year: 2013
An Effective Approach for Detecting Code Clones PDF available

Author(s): Girija Gupta#1, Indu Singh
Volume: 4
Issue: 9
Year: 2013
Proposed Etiquette for Ensuring Data Integrity and Verification in Cloud PDF available

Author(s): Gopi Rayala 1 , K. Anand Kumar2 , Prof.S.V.Achutha Rao
Volume: 4
Issue: 9
Year: 2013
Data Sharing on Untrusted Domains using a Novel Encryption Standard PDF available

Author(s): D. Nageshwara Rao1 , Ravi
Volume: 4
Issue: 9
Year: 2013
A Knowledge Based Model for Pecularised Web Information Gathering using Ontologies PDF available

Author(s): Satya Bhanu Jonnalagadda1 , A. Sravani2 , Prof.S.V.Achutha Rao
Volume: 4
Issue: 9
Year: 2013
Reliable and Secure Storage Services with Cloud PDF available

Author(s): Pindikura Ravi Teja Kumar 1 , Narsimha B
Volume: 4
Issue: 9
Year: 2013
Monitoring the Service Availability and Minimizing Query Delay in MANETs PDF available

Author(s): P. Chinnaiah1 , B.Srikanth
Volume: 4
Issue: 9
Year: 2013
Data Sharing Website using Personalised Search PDF available

Author(s): D. Mahesh Babu#1 , Prof.S.V.Achutha Rao
Volume: 4
Issue: 9
Year: 2013
Blocking and Blacklisting Trespassers in Anonymous Networks PDF available

Author(s): K.Sravanti1 , Manda Ashok Kumar2 , Betam Suresh
Volume: 4
Issue: 9
Year: 2013
Throughput and Power Aware Routing In Wireless Mesh Network with Path Restoration PDF available

Author(s): Sharankumar Huli#1, Sujata P Terdal
Volume: 4
Issue: 9
Year: 2013
Survey Of Privacy-Preserving Audio Representations With Speaker Diarization PDF available

Author(s): S.Sathyapriya M.phil1 , A.Indhumathi , M.Phil , Ph.D
Volume: 4
Issue: 9
Year: 2013
A Review on Green Software Development in a Cloud Environment Regarding Software Development Life Cycle: (SDLC) Perspective PDF available

Author(s): Shehla Afzal1 , M. Faisal Saleem1 , Fahad Jan1 , Mudassar Ahmad
Volume: 4
Issue: 9
Year: 2013
New Metric for Quality Analysis of Deblocked Images PDF available

Author(s): K.Venkatesh Nayak #1 , G.V.R.Sagar#
Volume: 4
Issue: 9
Year: 2013
Design and Development of Tapered Spiral Helix Antenna PDF available

Author(s): B.Sai Yashodha#1 , J.Ravindranadh
Volume: 4
Issue: 9
Year: 2013
Web Mining: A Survey Paper PDF available

Author(s): K.Amutha1 Dr.M.Devapriya
Volume: 4
Issue: 9
Year: 2013
A survey on Speech Recognition PDF available

Author(s): V.Malarmathi M.C.A 1 , Dr.E.Chandra M.Sc, M.phil, Phd
Volume: 4
Issue: 9
Year: 2013
Kernel Based Structured Svm For Speech Recognition PDF available

Author(s): V.Malarmathi M.C.A1 , Dr.E.Chandra M.Sc, M.phil, Phd
Volume: 4
Issue: 9
Year: 2013
Off-line Handwritten Malayalam Character Recognition Using Gabor Filters PDF available

Author(s): Nusaibath C#1, Ameera Mol P M
Volume: 4
Issue: 8
Year: 2013
An Efficient Edge Detection Approach based on Bacterial Foraging Optimization PDF available

Author(s): Kiranjeet Kaur1 , Sheenam Malhotra
Volume: 4
Issue: 8
Year: 2013
Efficient Allocation of Virtual Machines to Optimize Energy in Cloud Data Centre PDF available

Author(s): Jagjeet Singh1 , Sarpreet Singh
Volume: 4
Issue: 8
Year: 2013
Asynchronous TDMA Based MAC Protocol for Fast and Efficient Data Collection in Wireless Sensor Networks PDF available

Author(s): Shabana V V#1, Shiju Kumar P S
Volume: 4
Issue: 8
Year: 2013
Detection of Bold Italic and Underline Fonts for Hindi OCR PDF available

Author(s): Nidhi Sharma#1 , Mohit Khandelwal
Volume: 4
Issue: 8
Year: 2013
Implementation of Hybrid Error Model Using Super Resolution for Medical Images PDF available

Author(s): Navdeep Kaur1 , Usvir Kaur
Volume: 4
Issue: 8
Year: 2013
Wireless Sensor Network and Hierarchical Routing Protocols: A Review PDF available

Author(s): Sandeep Verma1 ,Richa Mehta2 , Divya Sharma3 ,Kanika Sharma
Volume: 4
Issue: 8
Year: 2013
Model Analysis of Gas Turbine Blades by varying Fillet Radius with Materials PDF available

Author(s): P.Ramesh#1 , D. Mallikarjuna Reddy
Volume: 4
Issue: 8
Year: 2013
A Survey of Methods used for Fast Retrieval of Images in Large scale dataset PDF available

Author(s): S.Kalaiarasi Msc1 , T.P.Senthilkumar Msc, M.Phil
Volume: 4
Issue: 8
Year: 2013
Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN PDF available

Author(s): D.Gayathri1 , Abdul Vahed
Volume: 4
Issue: 8
Year: 2013
Model and Analysis on Car Seat Mounting Bracket PDF available

Author(s): M.V.Srinivasan#1 , M. Lava Kumar
Volume: 4
Issue: 8
Year: 2013
An EMUSIM Technique and its Components in Cloud Computing- A Review PDF available

Author(s): Dr. Rahul Malhotra #1, Prince Jain
Volume: 4
Issue: 8
Year: 2013
Attacks on Ipv4 and Ipv6 Protocols and it’s Performance Parameters PDF available

Author(s): S.Clement Virgeniya #1 , Dr.V.Palanisamy
Volume: 4
Issue: 8
Year: 2013
A Prospect Mold of Visual Cryptography Design with Dynamic Set PDF available

Author(s): Gavirineni Nalini1 ,Mirza Mohsin Raza
Volume: 4
Issue: 7
Year: 2013
A Novel Cell Reckoning Intrusion against TOR PDF available

Author(s): Ujjaneni Siva Lalitha1 , Prof.S.V.Achutha Rao
Volume: 4
Issue: 7
Year: 2013
A Theoretical Review on SMS Normalization using Hidden Markov Models (HMMs) PDF available

Author(s): Ratika Bali
Volume: 4
Issue: 7
Year: 2013
Advance Cryptography Scheme for Data Hiding using Advance Hill cipher & DES PDF available

Author(s): Gurtaptish Kaur1 , Sheenam Malhotra
Volume: 4
Issue: 7
Year: 2013
ISOLATION OF CLONE NODES AND BLACKHOLE NODES USING RISK AWARE MITIGATION PDF available

Author(s): Mebi Sernaz#1 , Anand Pavithran
Volume: 4
Issue: 7
Year: 2013
Firewall Policy Anomalies- Detection and Resolution PDF available

Author(s): Jitha C K #1 , Sreekesh Namboodiri
Volume: 4
Issue: 7
Year: 2013
Averting Buffer Overflow Attack in Networking OS using – BOAT Controller PDF available

Author(s): Vadivel Murugan.P
Volume: 4
Issue: 7
Year: 2013
DESIGN AND ANALYSIS OF LIGHT WEIGHT MOTOR VEHICLE FLYWHEEL PDF available

Author(s): M.LAVAKUMAR #1, R.PRASANNA SRINIVAS
Volume: 4
Issue: 7
Year: 2013
An Efficient Subtopic Retrieval System using Hybrid Approach PDF available

Author(s): Manpreet Kaur1 , Usvir Kaur
Volume: 4
Issue: 7
Year: 2013
A Novel Firewall Policy Anomaly Management Tool PDF available

Author(s): Lakshmi Devi.N#1 , V.Srinadh
Volume: 4
Issue: 7
Year: 2013
Comparative Study of Speech Encryption Algorithms Using Mobile Applications PDF available

Author(s): Jaspreet kaur#1 , Er. Kanwal preet Singh
Volume: 4
Issue: 7
Year: 2013
Thermal Analysis of Shell and Tube Heat Ex-Changer Using C and Ansys PDF available

Author(s): v.Hari Haran,*, B g.Ravindra Reddy and C b.Sreehari
Volume: 4
Issue: 7
Year: 2013
Movie Review Classification and Feature based Summarization of Movie Reviews PDF available

Author(s): Sabeeha Mohammed Basheer#1, Syed Farook
Volume: 4
Issue: 7
Year: 2013
Flow Simulation over a Multi-Stage Launch Vehicle with Strapons Using CFD Techniques PDF available

Author(s): N.Sreedhar#1 G. Ravindra Reddy
Volume: 4
Issue: 7
Year: 2013
A Study of Topological Problems and controlling methods in Mobile Ad Hoc Networks PDF available

Author(s): G.Krishna Kishore 1 , Ajay Bhaskar Dasari
Volume: 4
Issue: 7
Year: 2013
Implementation of Neural Network Model for Solving Linear Programming Problem PDF available

Author(s): Prateeksha Chouksey#1, K.N.Hande
Volume: 4
Issue: 7
Year: 2013
Implementation of Data warehousing in Online Sales Company PDF available

Author(s): Snigdha Dash1 , Subhadra Mishra
Volume: 4
Issue: 7
Year: 2013
Sampling Approach Using Btree Indexing for Mining all Association Rules PDF available

Author(s): Samiksha Bharne#1 , Mangesh Wanjari*2
Volume: 4
Issue: 7
Year: 2013
An Overview of Techniques Used for Extracting Keywords from Documents PDF available

Author(s): Menaka S, Radha N
Volume: 4
Issue: 7
Year: 2013
Zone Based Node Replica Detection in Wireless Sensor Network Using Trust PDF available

Author(s): Soumya Sara Koshy #1 , Sajitha M
Volume: 4
Issue: 7
Year: 2013
Evapotranpiration Model Using AI Controller for automatic Irrigation system PDF available

Author(s): Mr. Raja sekhar reddy.G 1 Mr.Manujunatha.S2 Mr.Sundeep Kumar k
Volume: 4
Issue: 7
Year: 2013
Structural Analysis Of Delamination Of Composite Materials Using Vertical Milling Machine (GFRP) PDF available

Author(s): B.Bindu madhavi#1, S.Suresh
Volume: 4
Issue: 7
Year: 2013
Structural Analysis of Disc Brake Rotor PDF available

Author(s): K.Sowjanya#1 , S.Suresh
Volume: 4
Issue: 7
Year: 2013
A New Approach for Iris Recognition PDF available

Author(s): Hannath C M#1, Shreeja R
Volume: 4
Issue: 7
Year: 2013
Structural Analysis Of Multi-Plate Clutch PDF available

Author(s): S. Jaya Kishore#1 , M. Lava Kumar
Volume: 4
Issue: 7
Year: 2013
Fibre Glass Cutting By Using Abrasive Jet Machining and Analysis of Process Parameters PDF available

Author(s): F. Anand Raju#1 V. Gnana Prakash*2 Dr. M.L.S Deva Kumar
Volume: 4
Issue: 7
Year: 2013
Design and Analysis of Horizontal tail of UAV using composite materials PDF available

Author(s): F. Anand Raju1# K. Bharat kumar
Volume: 4
Issue: 7
Year: 2013
To Increase the Rotation Efficiency of the Windmill Blades by Using Turbulator PDF available

Author(s): A. Suresh#1 G. Ravindra Reddy*2 Y. Hari Prasad Reddy
Volume: 4
Issue: 7
Year: 2013
An Implementation of Reverse Caesar cipher (RCC) Algorithm in Google Cloud using Cloud SQL PDF available

Author(s): P.Subhasri (M.phil, Research Scholar) #1 , Dr.A.Padmapriya M.C.A., M.phil., Ph.D
Volume: 4
Issue: 7
Year: 2013
Smart Ordering System via Bluetooth PDF available

Author(s): N. M. Z. Hashim#1 , N. A. Ali#2 , A. S. Jaafar#3 , N. R. Mohamad#4 , L. Salahuddin*5 , N. A. Ishak
Volume: 4
Issue: 7
Year: 2013
Approaches for Enhancing Reliability of Software Product PDF available

Author(s): Priyanka #1, Trilok Gabba
Volume: 4
Issue: 7
Year: 2013
A Novel Delay Oriented Reactive Routing Protocol for QoS Provisioning in MANETs PDF available

Author(s): Jyoti Bhatnagar #1, Dr. Vijay Kumar
Volume: 4
Issue: 7
Year: 2013
Speckle Noise Reduction based on Discrete Wavelet Transform PDF available

Author(s): Inderjeet Singh
Volume: 4
Issue: 7
Year: 2013
Advance Scheme for Secret Data Hiding System using Hop-field & LSB PDF available

Author(s): Ishwarjot Singh1 , J. P. Singh Raina
Volume: 4
Issue: 7
Year: 2013
Review Paper on Credit Card Fraud Detection PDF available

Author(s): Suman
Volume: 4
Issue: 7
Year: 2013
Progressive Tool Design and Analysis for 49 Lever 5 Stage Tools PDF available

Author(s): H. Ameresh¹, P.Hari Shankar
Volume: 4
Issue: 7
Year: 2013
Research Methodology on an Efficient Method for Analysing EEG Signals by Pattern Recognition Using Neural Networks PDF available

Author(s): T.Joseph Judson#1 , Dr.B.Padmaja Rani
Volume: 4
Issue: 7
Year: 2013
A Comparative Study of 7T SRAM Cells PDF available

Author(s): Mr. Kariyappa B S1 , Mr. Basavaraj Madiwalar2 , Mrs. Namitha Palecha
Volume: 4
Issue: 7
Year: 2013
Automated Solution for Data Monitoring (Dashboard) of ASIC Design Flow PDF available

Author(s): Kariyappa B S1 , Aravind2 , Dhananjaya A3 , Vineet Puri
Volume: 4
Issue: 7
Year: 2013
Rotation and Illumination Invariant Texture Classification for Image Retrieval using Local Binary Pattern PDF available

Author(s): Harshal S. Patil #1 , Sandip S. Patil
Volume: 4
Issue: 7
Year: 2013
Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud PDF available

Author(s): Amandeep Kaur1 , Sarpreet Singh
Volume: 4
Issue: 7
Year: 2013
Aggregation Dynamics in Service Overlay Networks for File Sharing PDF available

Author(s): K.Deepika Reddy*1, E.Krishna*2, W.Vidyavardhan
Volume: 4
Issue: 7
Year: 2013
Automatic Railway Gate and Crossing Control based Sensors & Microcontroller PDF available

Author(s): Ahmed Salih Mahdi. Al-Zuhairi
Volume: 4
Issue: 7
Year: 2013
Dynamic Intrusion alerts generation and Aggregation using Intelligent IDS PDF available

Author(s): Mrs.Sudha Singaraju*1, G.Srikanth
Volume: 4
Issue: 7
Year: 2013
Improving The Predictive Performance by Integrating Decision tree based Attribute Selection in Clustering PDF available

Author(s): Rakesh teki #1 ,Hari narayana.P
Volume: 4
Issue: 7
Year: 2013
Bloquant: Implementation of Content Filtering - A Collaborative Approach PDF available

Author(s): Nivedita VS
Volume: 4
Issue: 7
Year: 2013
Area Efficient FPGA Based Bidirectional Network on Chip Router through Virtual Channel Regulator PDF available

Author(s): Ashish khodwe1 , C.N. Bhoyar
Volume: 4
Issue: 7
Year: 2013
POTENTIAL COVERT CHANNEL IN DISTRIBUTED DATABASE PDF available

Author(s): Richa Punia1 , Dr. Sona Malhotra
Volume: 4
Issue: 7
Year: 2013
Handling Queries in MANETs Using Apriori Algorithm to Increase Data Availability and Reduce Query Latency PDF available

Author(s): Santhosh Kumar S 1 , Sundeep kumar K 2 , Sridevi K.N
Volume: 4
Issue: 7
Year: 2013
Mobile IPv6 Route Optimization Protocol PDF available

Author(s): Aumdevi K. Barbudhe
Volume: 4
Issue: 7
Year: 2013
A Survey on Energy aware offloading Techniques for Mobile Cloud Computing PDF available

Author(s): K.Ravindranath#1 , Dr. K. Raja Sekhara Rao
Volume: 4
Issue: 7
Year: 2013
Design of Image Based Authentication System for Android Smartphone Users PDF available

Author(s): Indira C K #1 , Kavitha D
Volume: 4
Issue: 7
Year: 2013
Real Time Industrial Monitoring System PDF available

Author(s): Rahul D. Chavhan#1, Sachin U. Chavhan#2 , Ganesh B. Chavan
Volume: 4
Issue: 7
Year: 2013
An Efficient Clustering and Distance Based Approach for Outlier Detection PDF available

Author(s): Garima Singh1 , Vijay Kumar
Volume: 4
Issue: 7
Year: 2013
Web Page Prediction Techniques: A Review PDF available

Author(s): Sunil Kumar#1 , Ms. Mala Kalra
Volume: 4
Issue: 7
Year: 2013
Study and Usage of Effective Tool in Healthcare Systems PDF available

Author(s): Yuva Phani K#1 , Nagaraja G S
Volume: 4
Issue: 7
Year: 2013
A Sophisticated Approach for Job Scheduling in Cloud Server PDF available

Author(s): Amandeep Kaur Sidhu1 , Supriya Kinger
Volume: 4
Issue: 7
Year: 2013
Stable Route Aware Routing in Mobile Ad-Hoc Networks PDF available

Author(s): Mamta Dhanda#1, Shikha Chaudhry
Volume: 4
Issue: 7
Year: 2013
Secure and Accountable Data Sharing In the Cloud PDF available

Author(s): T.Praveenkumar1 , K.Narsimhulu
Volume: 4
Issue: 7
Year: 2013
A Secure DCT Image Steganography based on Public-Key Cryptography PDF available

Author(s): Shahana T
Volume: 4
Issue: 7
Year: 2013
PFI Testing On Uncertain Databases PDF available

Author(s): Resma. K.S
Volume: 4
Issue: 7
Year: 2013
Identifying Network Intrusions using One Dimensional distance PDF available

Author(s): Greeshma K
Volume: 4
Issue: 7
Year: 2013
Variable Output AC-DC Converter PDF available

Author(s): Mr. Pavankumar.R.Patil
Volume: 4
Issue: 7
Year: 2013
Foundation for Frequent Pattern Mining Algorithms’ Implementation PDF available

Author(s): Prof. Paresh Tanna#1 , Dr. Yogesh Ghodasara
Volume: 4
Issue: 7
Year: 2013
A Critical Study on Wireless Network Attacks for Preventing Channel Congestion PDF available

Author(s): N.Lakshmi Haritha #1 , M.Ashok
Volume: 4
Issue: 7
Year: 2013
Drawing Using Hand Gestures PDF available

Author(s): N.Kunal#1 , Pattan Akram#2 , Rishab kumar jain#3 , A.Kranthi chandu#4 , P.V.Karthick#5 M.R.Narsinga Rao
Volume: 4
Issue: 7
Year: 2013
Fuzzy Feature Clustering for Text Classification Using Sequence Classifier PDF available

Author(s): Ambily Balaram
Volume: 4
Issue: 7
Year: 2013
Appraisal of Social Learning Potentials in Some Trending Mobile Computing Applications PDF available

Author(s): Abubakar Sadiq BAPPAH
Volume: 4
Issue: 7
Year: 2013
Combined testing approach with static and dynamic techniques PDF available

Author(s): Sanjeev sahrawat
Volume: 4
Issue: 7
Year: 2013
Content Based Image Retrieval System Using Feature Classification with Modified KNN Algorithm PDF available

Author(s): T. Dharani#1 , I. Laurence Aroquiaraj
Volume: 4
Issue: 7
Year: 2013
Identification of Effective Public Cloud on User Query PDF available

Author(s): Manjeet Gupta1 ,Sonia Sindhu
Volume: 4
Issue: 7
Year: 2013
Depth Detection of Facial feature PDF available

Author(s): Sushma.H.R
Volume: 4
Issue: 7
Year: 2013
Survey of Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

Author(s): N.Naga Nandhini | P.Narendran
Volume: 4
Issue: 7
Year: 2013
Noise Resilient Periodicity Mining In Time Series Data bases

Author(s): M.Gayathri | M.Gayathri
Volume: 4
Issue: 7
Year: 2013
J48 Classifier Approach to Detect Characteristic of Bt Cotton base on Soil Micro Nutrient PDF available

Author(s): Youvrajsinh Chauhan | Jignesh Vania
Volume: 5
Issue: 6
Year: 2013
Typical Security Measures Of Cloud Computing PDF available

Author(s): Mohamed Ashik M | Sankara Nayanan A | Nithyananda Kumari.K
Volume: 5
Issue: 6
Year: 2013
Impact of DDoS attack in Online Auction System and Proposed Lightweight Solution Based on Software Agent PDF available

Author(s): Mandakini vishwakarma | Brajesh Patel
Volume: 5
Issue: 6
Year: 2013
Harmony Search Optimization in K-Means Clustering PDF available

Author(s): Samina Ahamed K T | Jasila E K
Volume: 5
Issue: 6
Year: 2013
Secure and Faster NN Queries on Outsourced Metric Data Assets PDF available

Author(s): Renuka Bandi | Madhu Babu Ch
Volume: 5
Issue: 6
Year: 2013
Improved Authentication and Integrity Verification in Wireless Sensor Networks PDF available

Author(s): S.Sadakvalli | Ch.Suresh.babu
Volume: 5
Issue: 6
Year: 2013
Implementation of Flash ADC using Multisim Technology PDF available

Author(s): Raghavendra.R1 , Dr S.A Hariprasad
Volume: 4
Issue: 6
Year: 2013
Analytical Learning of a Delay Aware Routing Protocol for Multi-hop Mobile Ad-hoc Networks PDF available

Author(s): Pankaj Jain#1 , Dr. Vijay Kumar#2 , Richa Jain
Volume: 4
Issue: 6
Year: 2013
Reformation with Neural Network in Automated Software Testing PDF available

Author(s): Ayush Kumar Yogi
Volume: 4
Issue: 6
Year: 2013
Security Loopholes Of 802.11 Wireless LANs And Their Solutions PDF available

Author(s): 1 Shikha Goswami
Volume: 4
Issue: 6
Year: 2013
Auto Organization and Optimization in Heterogeneous Wireless Mesh Networks PDF available

Author(s): Sudha Abirami.R, 2 Petchiappan.K
Volume: 4
Issue: 6
Year: 2013
Ensuring Cloud Security Using Hybrid Encryption Scheme and Disaster Recovery Mechanism PDF available

Author(s): R.Sinduja1 , G.Sumathi
Volume: 4
Issue: 6
Year: 2013
Comparative Study of Image Steganography Techniques PDF available

Author(s): Sunila Godara1 , Megha Ranolia2 , Vanita Rawal
Volume: 4
Issue: 6
Year: 2013
Bandwidth-Aware AODV based Routing Protocol in MANETs PDF available

Author(s): Richa Jain#1 , Chetan Kumar#2, Pankaj Jain
Volume: 4
Issue: 6
Year: 2013
Performance Evaluation of Machine Learning Classifiers in Sentiment Mining PDF available

Author(s): G.Vinodhini*, RM.Chandrasekaran
Volume: 4
Issue: 6
Year: 2013
Development of the Content Based Image Retrieval Using Color, Texture and Edge Features PDF available

Author(s): Sindhu S#1 , Mr. C O Prakash
Volume: 4
Issue: 6
Year: 2013
Secure Data Processing Framework for Mobile Cloud Applications PDF available

Author(s): Manjulah.S #1 , Manjunath A.E
Volume: 4
Issue: 6
Year: 2013
Determining the Cluster Labels by Using Keywords Based Similarity Measure PDF available

Author(s): G.G.V.Subrahmanyam#1, Prof. DTV Dharmajee Rao#2, T. Naresh
Volume: 4
Issue: 6
Year: 2013
Performance Analysis of Ship Tracking using PID/Fuzzy Controller PDF available

Author(s): Sanjay.N1 , Adinath Jain2 , Dr.S.A.Hariprasad
Volume: 4
Issue: 6
Year: 2013
Evolutionary Computing Strategies for Gene Selection PDF available

Author(s): Meena Moharana1 , Kaberi Das2 , Debahuti Mishra
Volume: 4
Issue: 6
Year: 2013
A survey of selfish nodes behaviour in Mobile Adhoc network PDF available

Author(s): M.Manjula M.C.A1 , P.Elango MCA, M.Phil
Volume: 4
Issue: 6
Year: 2013
Survey on SOA Fault Tolerance Techniques PDF available

Author(s): Anushka
Volume: 4
Issue: 6
Year: 2013
Accountable Data Sharing in Cloud using Logging Mechanism PDF available

Author(s): R.Nevetha#1,C.Gayathri
Volume: 4
Issue: 6
Year: 2013
Three Mode Security For Wireless Sensor Networks with Mobile Sinks PDF available

Author(s): Mrs.S.Rajakumari#1 , Mr.P.Suresh.2, Dr.R.Sukumar
Volume: 4
Issue: 6
Year: 2013
System Atchitecture of WirelessUSB Flash devices PDF available

Author(s): Swathi Nallapati#1, Dr.M.S.S.Rukmini
Volume: 4
Issue: 6
Year: 2013
Analysis on Feature Extraction of Periocular Region(Soft biometrics) using LBP, PCA, ICA & Gabour filters PDF available

Author(s): Sunila Godara1 , Vanita Rawal2 , Megha Ranolia
Volume: 4
Issue: 6
Year: 2013
Data Mining Analysis of the Rural Public Library usages in Periyakulam Municipality PDF available

Author(s): J. Jenifer Rathnakumari #1 , P. Sathya *2 , C. Rama Devi
Volume: 4
Issue: 6
Year: 2013
Software methodology to generate code for device description for XMC microcontroller PDF available

Author(s): Ravi L. Mavani#1 , Sharvani G. S
Volume: 4
Issue: 6
Year: 2013
Adaptive Power Delay profile estimation Technique for MIMO-OFDM Systems PDF available

Author(s): K. Lakshmanna* M.V.R.Vittal
Volume: 4
Issue: 6
Year: 2013
Line Detection in Digital Images: A Modification to Randomized Line Detection Algorithm PDF available

Author(s): Mr. T P Mithun1 Dr. S A Hariprasad2 Mr. Siddappa Karabannavar
Volume: 4
Issue: 6
Year: 2013
Development of Intelligent Dashboards for Global Metrics Evaluation PDF available

Author(s): Kawinderjot Kaur a , N C Naveena , Sunil K
Volume: 4
Issue: 6
Year: 2013
A Digital Watermarking for Lifting Based Compression And Encryption of JPEG 2000 Images PDF available

Author(s): Ansu Anna Ponnachen1 , Lidiya Xavier
Volume: 4
Issue: 6
Year: 2013
The Cluster Leader Election in Manets PDF available

Author(s): Mrs.P.Radhadevi*1, Sathish Ravula
Volume: 4
Issue: 6
Year: 2013
Optimal Network Utility PDF available

Author(s): Mrs.P.Radhadevi*1, Anil Ravala
Volume: 4
Issue: 6
Year: 2013
New Filtering Approaches for Phishing Email PDF available

Author(s): Mrs.P.Lalitha*1, Sumalatha.Udutha
Volume: 4
Issue: 6
Year: 2013
A Hybrid & Robust Wavelet Based Video Watermarking Scheme for Copyright Protection Using Principal Component Analysis PDF available

Author(s): Ankita A. Hood#1 , Prof. N. J. Janwe
Volume: 4
Issue: 6
Year: 2013
Masquerading Attack To Break Tor’s Anonymity PDF available

Author(s): Deepa S.V
Volume: 4
Issue: 6
Year: 2013
Robust Watermarking of Compressed and Encrypted JPEG 2000 Images PDF available

Author(s): Dr.P.Eswaran#1 , M.Veni
Volume: 4
Issue: 6
Year: 2013
A Survey of Mobile Ad Hoc Networks Routing Algorithm PDF available

Author(s): Inderpal Singh#1 , Jaskiran kaur
Volume: 4
Issue: 6
Year: 2013
Implementation Techniques of Website Layout Designing PDF available

Author(s): Himani Goel1 , Praveen Kumar Srivastava2 , Chinmay Garg3 , Ajay Gupta
Volume: 4
Issue: 6
Year: 2013
Resolving Vulnerability Of First Hop Redundancy Protocol Using Md5 Authentication PDF available

Author(s): Priyanka Dubey* 1 , Abha Sachdev
Volume: 4
Issue: 6
Year: 2013
Improved Clustering using Hierarchical Approach PDF available

Author(s): Megha Gupta, 2 Vishal Shrivastava
Volume: 4
Issue: 6
Year: 2013
An Analysis on Privacy Preserving in Cloud Computing PDF available

Author(s): Jithin S#1 , Dr. P. Sujatha
Volume: 4
Issue: 6
Year: 2013
Review Study For Inter-Operability Of Manet Protocols In Wireless Sensor Networks PDF available

Author(s): Gurpreet Singh Saini#1, Priyanka Dubey#2, Md Tanzilur Rahman
Volume: 4
Issue: 6
Year: 2013
An Effective Approach to Information Hiding for Secure Message Transmission PDF available

Author(s): 1Manoj Kumar Sharma, 2Vishal Shrivastav
Volume: 4
Issue: 6
Year: 2013
Reliable Computing In Ad Hoc Networks PDF available

Author(s): Mrs. K.Deeepika Reddy*1, K.Ramakrishna
Volume: 4
Issue: 6
Year: 2013
Congestion Avoidance by TCP PDF available

Author(s): Mrs.P.Radhadevi*1, Ch.Srikanth
Volume: 4
Issue: 6
Year: 2013
Comparison of Dynamic Routing Protocols: RIP and OSPF PDF available

Author(s): Mrs.Lalitha*1, Sugand Rao Rathod
Volume: 4
Issue: 6
Year: 2013
Clone Attacks Detection In Wireless Sensor Networks PDF available

Author(s): Mrs.P.Radhadevi*1, D Gopi Krishna
Volume: 4
Issue: 6
Year: 2013
A Survey on Host to Host Congestion Control PDF available

Author(s): Mrs. P.RADHADEVI *1, G. ANJANEYULU
Volume: 4
Issue: 6
Year: 2013
Comparative Study on Global and Local Alignment methods PDF available

Author(s): 1Abhilash C B
Volume: 4
Issue: 6
Year: 2013
Improving Tor network using tunable path selection PDF available

Author(s): Amarnath Reddy.C
Volume: 4
Issue: 6
Year: 2013
Simulation of Secure Wireless Channel using Randomized Multipath Propagation PDF available

Author(s): Prof.S.Venkateswarlu#1 , G.S.Raghavendra*2 , G.SriTeja
Volume: 4
Issue: 6
Year: 2013
Design of low power SRAM Cell with combined effect of sleep stack and variable body bias technique PDF available

Author(s): Anjana R1 , Dr. Ajay kumar somkuwar
Volume: 4
Issue: 6
Year: 2013
A Study of Some List Accessing Algorithm And Novel Analytical Results PDF available

Author(s): Ms. Aishwarya Mishra
Volume: 4
Issue: 6
Year: 2013
Implementation of RISC Processor for Convolution Application PDF available

Author(s): P.Siva Nagendra Reddy1 , A.G.Murali Krishna
Volume: 4
Issue: 6
Year: 2013
Privacy preserving visualization using CLUSTERING PDF available

Author(s): Sabbisetti Naga Anisha1 , G. Rama Krishna
Volume: 4
Issue: 6
Year: 2013
An Efficient Approach for Script Identification PDF available

Author(s): Om Prakash1 , Mr.Vineet Shrivastava2 , Dr. Ashish Kumar
Volume: 4
Issue: 6
Year: 2013
MANET: Security Aspects and Challenges PDF available

Author(s): Md Tanzilur Rahman#1 , Kunal Gupta
Volume: 4
Issue: 6
Year: 2013
Sparse Transform Matrix at Low Complexity for Color Image Compression PDF available

Author(s): Dr. K. Kuppusamy, M.Sc.,M.Phil.,M.C.A.,B.Ed.,Ph.D #1 , R.Mehala
Volume: 4
Issue: 6
Year: 2013
A Soft Computing Approach for Heart Disease Analysis PDF available

Author(s): Nitika Dahiya#1 , Madan Lal Yadav
Volume: 4
Issue: 6
Year: 2013
Background and Foreground Human Character Segments for Video Object Segmentation

Author(s): Prof.K.Mahesh1 , B.Reka
Volume: 4
Issue: 6
Year: 2013
An Improved Swarm Based Approach for Efficient Document Clustering PDF available

Author(s): Kanika Khanna#1, Madan Lal Yadav
Volume: 4
Issue: 6
Year: 2013
Modern Developments in Optimization Model based on Generalized Confidence Interval Method PDF available

Author(s): Anantha Lakshmi, S#1 , Vijayalakshmi
Volume: 4
Issue: 6
Year: 2013
Performance comparison of web service in IaaS cloud and standard deployment model PDF available

Author(s): Jithin P#1 , Dr S.K.V Jayakumar
Volume: 4
Issue: 6
Year: 2013
A Security Enhanced Approach For Digital Image Steganography Using DWT And RC4 Encryption PDF available

Author(s): Amritha.G#1, Meethu Varkey
Volume: 4
Issue: 6
Year: 2013
Virtual Learning Environments – A Survey PDF available

Author(s): 1 SNEHA J.M, 2 G.S.NAGARAJA
Volume: 4
Issue: 6
Year: 2013
Spectrum Based Fault Localization PDF available

Author(s): Anta Devi
Volume: 4
Issue: 6
Year: 2013
Extend the Efficiency of a Website Using Web Analytics PDF available

Author(s): 1 Mr.S.Balamurugan, 2Mrs.M.Vasuki, 3Mrs.A.Angayarkanni, 4Mrs.P.Aurchana
Volume: 4
Issue: 6
Year: 2013
STABLE ROUTING IN MANETS USING RD MOBILITY MODEL PDF available

Author(s): Mr.I.S.Raghuram, Mr.B.Hari Santhosh Rao, Mr.M.Gunasekhar, Miss.G.Geetha Lakshmi
Volume: 4
Issue: 6
Year: 2013
Understanding Location Manager in Android and Implementing an Optimal Image Geotagging Application PDF available

Author(s): Isha Sahu1 , Ishita Chakraborty
Volume: 4
Issue: 6
Year: 2013
Secure Storage Services In Cloud Computing PDF available

Author(s): S. Muthakshi #1, Dr. T.Meyyappan M.Sc., MBA. M.Phil., Ph.d., *
Volume: 4
Issue: 6
Year: 2013
High Utility Mining Algorithm for Preprocessed Web Data PDF available

Author(s): Swapna Mallipeddi, D.N.V.S.L.S.Indira
Volume: 3
Issue: 6
Year: 2012
Transmutation of Regular Expression to Source Code Using Code Generators PDF available

Author(s): Rashmi Sinha, Ashish Dewangan
Volume: 3
Issue: 6
Year: 2012
Simulation of File Arrivals and Departures on Buffer sizing in Access Routers PDF available

Author(s): Sivasubramanyam Mopidevi, S Narayana
Volume: 3
Issue: 6
Year: 2012
A Framework for the Engineering of Reliable Distributed Systems PDF available

Author(s): ChandraBose A Dr.K.Alagarsamy
Volume: 3
Issue: 6
Year: 2012
A Modular and Extendable Approach to Database Encryption at Multi-granularity Level PDF available

Author(s): Ramesh Pabboju | S.Krishna Mohan Rao
Volume: 3
Issue: 6
Year: 2012
Novel Energy Efficient MAC Protocol for Data Collection in Event Based Wireless Sensor Network PDF available

Author(s): Hemappa B, Dr. Rabindranath Bera | Dr. Manjaiah D H,
Volume: 3
Issue: 6
Year: 2012
Reducing Network Intrusion Detection using Association rule and Classification algorithms PDF available

Author(s): K.KEERTHI 1 , P.SREENIVAS
Volume: 3
Issue: 6
Year: 2012
Secure Client Server Message Integrity Verification Using Robust Encrypted Technique PDF available

Author(s): Madhuri Marey #1 , Mr.M.Babu Rao #2
Volume: 3
Issue: 6
Year: 2012
Robust Watermarking Framework with DCT Based Encryption PDF available

Author(s): L.Sri Lakshmi | Mrs. SK. Salma Begum
Volume: 5
Issue: 5
Year: 2013
A Novel Approach for Detection and Prevention of Wormhole Attack In Ad-hoc Networks PDF available

Author(s): Monika#1 , Jyoti Thalor
Volume: 4
Issue: 5
Year: 2013
Methodological approach for Face Recognition Using Artificial Neural Networks PDF available

Author(s): K. Shirisha1 , S. Vijaya Lakshmi2 , N. Musrat Sultana
Volume: 4
Issue: 5
Year: 2013
Evaluating Accuracy of Inference and Benefits of Compression over RFID PDF available

Author(s): S.Tashelat Masleena1 , M.Gayathri
Volume: 4
Issue: 5
Year: 2013
Video Watermarking Using Wavelet Transformation PDF available

Author(s): Rakesh Kumar1 , Savita Chaudhary
Volume: 4
Issue: 5
Year: 2013
Cryptoviral Extortion: A virus based approach PDF available

Author(s): S.Manoj Kumar# 1, M.Ravi Kumar
Volume: 4
Issue: 5
Year: 2013
Analysis and Implementation of Different Digital Image Watermarking Techniques for Secure Data Transmission PDF available

Author(s): Neeraj Kumar1 ,Veenita Gupta2 , Praveen Kumar
Volume: 4
Issue: 5
Year: 2013
Communication Model Development using Test Data for a given Protocol PDF available

Author(s): Md Tanzilur Rahman#1 , Kunal Gupta
Volume: 4
Issue: 5
Year: 2013
Advanced Replica-Based Data Access Prediction and Optimization Approach in Distributed Environment PDF available

Author(s): P. Sathiya (Member, IEEE), K. N. Vimal Shankar
Volume: 4
Issue: 5
Year: 2013
A Novel Approach for Preventing Selective Jamming Alerts PDF available

Author(s): N.Muruganadham1 , R.Umesh2 , D.Kaleeswaran
Volume: 4
Issue: 5
Year: 2013
Resource Provisioning Cost of Cloud Computing by Adaptive Reservation Techniques PDF available

Author(s): M.Manikandaprabhu1 , R.SivaSenthil
Volume: 4
Issue: 5
Year: 2013
Improving Policy Based Intrusion Response Component of a Relational Database by Evaluation of User PDF available

Author(s): M. Dharani#1 , T. Sangeetha
Volume: 4
Issue: 5
Year: 2013
Breast tumor representation & noise removal using Fuzzy c-mean algorithm and DWT PDF available

Author(s): Brijesh B Patel #1 , Brijesh N Shah*2, Vandana Shah
Volume: 4
Issue: 5
Year: 2013
Mobile Robot in Coal Mine Disaster PDF available

Author(s): S.TejaRam#1 , Smt. M. Nalinisri
Volume: 4
Issue: 5
Year: 2013
An Optimization Technique for Medical Image Segmentation PDF available

Author(s): N. Sridhar #1 , K. N. Prakash
Volume: 4
Issue: 5
Year: 2013
Cross Platform Mobile Application Development PDF available

Author(s): Mrs. V.C. Kulloli#1 , Ashish Pohare#2 , Sujit Raskar#2 , Tania Bhattacharyya#2 , Shashikant Bhure
Volume: 4
Issue: 5
Year: 2013
Optimization of RSA Processors Using Multiplier PDF available

Author(s): Chandra.K , 2Kumar.P
Volume: 4
Issue: 5
Year: 2013
Review of First Hop Redundancy Protocol and Their Functionalities PDF available

Author(s): Priyanka Dubey* 1 , Shilpi Sharma*2 , Aabha Sachdev
Volume: 4
Issue: 5
Year: 2013
DREAM_OLSR PROTOCOL (Distance Routing Effective Algorithm for Mobility - Optimized Link State Routing) PDF available

Author(s): Gurpreet Singh Saini#1 , Ashish Kots#2 , Manoj Kumar
Volume: 4
Issue: 5
Year: 2013
An Efficient Cloud Storage with Secure Dynamic Data Modification PDF available

Author(s): K.HariPriya #1 (Member – IEEE), P.Krishnamoorthy
Volume: 4
Issue: 5
Year: 2013
Lfsr-Reseeding Scheme For Achieving Test Coverage PDF available

Author(s): M.Kalaiselvi, 2K.S.Neelukumari
Volume: 4
Issue: 5
Year: 2013
Improving the Energy Efficiency in Multicast Routing For Mobile Adhoc Networks PDF available

Author(s): S.Victoria Mary , 2 J.Prathish Kumar
Volume: 4
Issue: 5
Year: 2013
Optimization of Task Scheduling and Memory Partitioning for Multiprocessor System on Chip PDF available

Author(s): Mythili.R ,2Mugilan.D
Volume: 4
Issue: 5
Year: 2013
Low Power and Memory Efficient FFT Architecture Using Modified CORDIC Algorithm PDF available

Author(s): A.Malashri , 2C.Paramasivam
Volume: 4
Issue: 5
Year: 2013
Review of transactions on illuminated facial image preprocessing for user authentication PDF available

Author(s): Mrs. Jyoti Kulkarni#1 , Puja Pomannawar#2, Pradnya Patil#2, Shruti Shah#2,Reetu Gupta
Volume: 4
Issue: 5
Year: 2013
Secure web mining framework for e-commerce websites PDF available

Author(s): M.KARTHIK
Volume: 4
Issue: 5
Year: 2013
Performance Analysis of Book Recommendation System on Hadoop Platform PDF available

Author(s): Sugandha Bhatia#1 , Surbhi Sehgal#2, Seema Sharma
Volume: 4
Issue: 5
Year: 2013
Image Restoration Using Biogeography Based Segmentation PDF available

Author(s): Nitika Jearth#1, Raju Sharma
Volume: 4
Issue: 5
Year: 2013
An Autonomous Robot Navigation PDF available

Author(s): K.D.V.S.Anil kumar, 2 M.suman
Volume: 4
Issue: 5
Year: 2013
Certain Investigations on Improving the Quality of Requirements in Stake Rare Using NLP PDF available

Author(s): Durai Arumugam S S L #1 ,Selvakumar J
Volume: 4
Issue: 5
Year: 2013
Zone Divisional Network with Double Cluster Head for effective communication in WSN PDF available

Author(s): Sandeep Verma1 , Kanika Sharma
Volume: 4
Issue: 5
Year: 2013
Privacy for Shared System in Pcloud PDF available

Author(s): M.Sultan1 , A.Suresh2 , D.Kaleeswaran
Volume: 4
Issue: 5
Year: 2013
Contrast Enhancement Using Bi-Histogram Equalization With Brightness Preservation PDF available

Author(s): Gowthami Rajagopal ,2K.Santhi
Volume: 4
Issue: 5
Year: 2013
The Implementation of Automatic Fire Rescuing and Information System in a Train using Zigbee and Sensors Networks. PDF available

Author(s): Manoj Kumar Tyagi#1, Balanagu.Raviteja
Volume: 4
Issue: 5
Year: 2013
Wireless Grid Computing PDF available

Author(s): Sowndharya Kavati, B.V.Mallu
Volume: 4
Issue: 5
Year: 2013
ROI Estimation of Data Warehouse with Bottom Up Architecture and Top Down Implementation PDF available

Author(s): Bikramjit Pal 1 , Awanish Pati Mishra2 ,Mallika De
Volume: 4
Issue: 5
Year: 2013
A perspective of Security in wireless networks PDF available

Author(s): Arun Kumar Arigala*1, Sreeram.Munisankaraiah
Volume: 4
Issue: 5
Year: 2013
A Survey Report on RFM Pattern Matching Using Efficient Multi-Set HPID3 Algorithm PDF available

Author(s): Priyanka Rani1 , Nitin Mishra2 ,Samidha Diwedi Sharma
Volume: 4
Issue: 5
Year: 2013
Entrenched Visual Cryptography using Secret Sharing Scheme with public Key PDF available

Author(s): Kode Phani Kumar1 , B.VeeraMallu
Volume: 4
Issue: 5
Year: 2013
Diabetic Retinopathy Evaluation From Blood Vessel Features Using SVM Classification PDF available

Author(s): Alka Vijayan#1 , Antony Judice. A
Volume: 4
Issue: 5
Year: 2013
Detection of unattended and stolen objects in videos PDF available

Author(s): Sharon Femi. P1 , Thaiyalnayaki. K
Volume: 4
Issue: 5
Year: 2013
An Efficient Interaction Pattern Discovery For Human Meetings PDF available

Author(s): A.Nandha Kumar#1 , N.Baskar
Volume: 4
Issue: 5
Year: 2013
Computational DNA Sequence Analysis PDF available

Author(s): Archana Yashodhar*1 , Manjula*2, Praveen N *3, Pavithra K
Volume: 4
Issue: 5
Year: 2013
Ensuring Data Privacy and Access Anonymity using CryptographicTechniques in Cloud Computing PDF available

Author(s): Lamminthang Singsit #1 , Marie Stanislas Ashok
Volume: 4
Issue: 5
Year: 2013
Comparative analysis of Speech Compression on 8-bit and 16-bit data using different wavelets PDF available

Author(s): Vini Malika , Pranjal Singhb Atul kumar Singhc , Monika Singh
Volume: 4
Issue: 5
Year: 2013
Challenges and issues in 4G – Networks Mobility Management PDF available

Author(s): Payaswini P, Manjaiah D.H
Volume: 4
Issue: 5
Year: 2013
Comparison of High Level Design Based Class Cohesion Metrics PDF available

Author(s): Rupinder Kaur1 and Puneet Jai Kaur
Volume: 4
Issue: 5
Year: 2013
Image segmentation using K-mean clustering for finding tumor in medical application PDF available

Author(s): Piyush M. Patel1, Brijesh N Shah2 , Vandana Shah
Volume: 4
Issue: 5
Year: 2013
An Updated Data Compression Algorithm for Dynamic Data PDF available

Author(s): Vishal Gupta#1, Dheeraj Chandra Murari
Volume: 4
Issue: 5
Year: 2013
Clustering Based Energy Efficient Routing For Heterogeneous Wireless Sensor Networks PDF available

Author(s): Dr.B. Vijaya Babu#1, N. Manoj Kumar
Volume: 4
Issue: 5
Year: 2013
Hybridization of Symmetric Key Encryption and Visual Cryptography PDF available

Author(s): Monika#1, Rakhi Soni
Volume: 4
Issue: 5
Year: 2013
Reduction of Greedy Forwarding using Overlay Multicasting in Mobile Ad Hoc Networks PDF available

Author(s): G. Kiran Kumar#1, B.Vijaya Babu
Volume: 4
Issue: 5
Year: 2013
An Efficient Unicast Routing Protocol for AdHoc Wireless Sensor Networks PDF available

Author(s): B. Chinmayi Roopa
Volume: 4
Issue: 5
Year: 2013
Reversible Data Hiding in Encrypted Image and Separating the Image and Data PDF available

Author(s): Naresh Achari B., Sri. Swami Naik J
Volume: 4
Issue: 5
Year: 2013
A New Approach for Providing the Data Security and Secure Data Transfer in Cloud Computing PDF available

Author(s): Manoj Prabhakar Darsi #1, K.Suresh Joseph*2 , Dr. S.K.V.Jayakumar
Volume: 4
Issue: 5
Year: 2013
Modification of Instruction Set Architecture in a UTeMRISCII Processor PDF available

Author(s): Ahmad Jamal Salim#1 , Nur Raihana Samsudin*2 , Sani Irwan Md Salim#3 , Soo Yew Guan
Volume: 4
Issue: 5
Year: 2013
Mitigating DoS Attack in VPN PDF available

Author(s): Monika#1 , Swati Kapoor
Volume: 4
Issue: 5
Year: 2013
Cat Swarm based Optimization of Gene Expression Data Classification PDF available

Author(s): Amit Kumar1# , Debahuti Mishra
Volume: 4
Issue: 5
Year: 2013
Emerging Network Technologies that are Likely to Become Widely Available in the Future PDF available

Author(s): Peter K. Kemei1 and William P.K. Korir
Volume: 4
Issue: 5
Year: 2013
Analysis of the chloride ion erosion in flexural cracked beam and its durability service life PDF available

Author(s): CUI Zhao-wei#1 , LU Chun-hua#2 , LIU Rong-gui#3 , HU Bai-xiang
Volume: 4
Issue: 5
Year: 2013
A Methodology to Develop the Application Faster in Automotive Field PDF available

Author(s): Shaila Ramreddy#1 , prof.Shantharam Nayak
Volume: 4
Issue: 5
Year: 2013
A Reconnaissance on Design Patterns PDF available

Author(s): M.Chaithanya Varma
Volume: 4
Issue: 5
Year: 2013
Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads PDF available

Author(s): G. Suganthi (Member, IEEE), K. N. Vimal Shankar,
Volume: 4
Issue: 5
Year: 2013
Mental Stress and its Implications on Reaction time PDF available

Author(s): Apoorvagiri#1 , Nagananda M S
Volume: 4
Issue: 5
Year: 2013
Data Hiding System with Mosaic Image for Protected Communication PDF available

Author(s): Nitin Kumar Agrawal#1 , Neeraj Pandey*2 , Ashish Arya
Volume: 4
Issue: 5
Year: 2013
Biomedical Image Segmentation and Registration Using Type-2 Fuzzy Logic PDF available

Author(s): Arya Ghosh1 , Himadri Nath Moulick2 , Susmit Karmokar
Volume: 4
Issue: 5
Year: 2013
Automatic fingerprint Identification Using Minutiae Matching PDF available

Author(s): S.Mousmi1 , Dr.T.Meyappan
Volume: 4
Issue: 5
Year: 2013
Biomedical Image Registration Using Fuzzy Logic PDF available

Author(s): Himadri Nath Moulick#1 , Anindita Chatterjee
Volume: 4
Issue: 5
Year: 2013
Application of Rfid Technology in Intelligent Electronic Shopping Cart PDF available

Author(s): G.Ramachandran 2 R.Ramani, 3 S.Valarmathy, 4 K.Elamathi
Volume: 4
Issue: 5
Year: 2013
A New Exemplar Based Image Completion using Belief Propagation PDF available

Author(s): N.Nanthini#1, Dr. T.Meyyappan, M.Sc., M.phil. M.B.A.,(M.Tech)., Ph.D
Volume: 4
Issue: 5
Year: 2013
Semi Supervised Color Image Segmentation Using Region Based Method PDF available

Author(s): M.MargretRubini#1 , Dr.P.Eswaran M.Sc., M.Tech., Ph.D
Volume: 4
Issue: 5
Year: 2013
Automated Test Oracle Methods PDF available

Author(s): Rupinder Kaur
Volume: 4
Issue: 5
Year: 2013
Seasonal Time Series and Transfer Function Modelling for Natural Rubber Forecasting in India PDF available

Author(s): P. Arumugam#1 , V. Anithakumari
Volume: 4
Issue: 5
Year: 2013
Estimation of Arterial Stiffness by using PPG Signal: A Review PDF available

Author(s): Sanjeev kumar#1 , Dr. S.C. Prasanna kumar #2 , Dr.B.G. Sudharshan
Volume: 4
Issue: 5
Year: 2013
Slicing Technique For Privacy Preserving Data Publishing PDF available

Author(s): D. Mohanapriya #1 , Dr. T.Meyyappan M.Sc., MBA. M.Phil., Ph.d.,
Volume: 4
Issue: 5
Year: 2013
Wireless LAN Security: Addressing Challenges, Attacks and Solutions PDF available

Author(s): Gurpreet Kaur#1 , Kirandeep Kaur
Volume: 4
Issue: 5
Year: 2013
Fusion of CT and MRI images using Discrete Multiwavelet Transform PDF available

Author(s): Kusum Rani1 ,Reecha Sharma
Volume: 4
Issue: 5
Year: 2013
Implementation Opass Authentication Protocol System for net Security PDF available

Author(s): P.Shanmukha kumar, Sri. k.Ishthaq Ahamed
Volume: 4
Issue: 5
Year: 2013
Securing User’s Data in HDFS PDF available

Author(s): Hetalben Gajjar
Volume: 4
Issue: 5
Year: 2013
Development of an Iris-Based Access Control System Using a Two-Level Segmentation Approach. PDF available

Author(s): Falohun A. S 1 ., Omidiora E.O. 2 , Fakolujo A.O.3 , dOjo.J.A
Volume: 4
Issue: 5
Year: 2013
Assuring Data Sharing and Culpability as a Service in Cloud PDF available

Author(s): A Sreekanth1 Sri K Ishthaq Ahamed
Volume: 4
Issue: 5
Year: 2013
Reviewing Effectiveness of CAPTCHA PDF available

Author(s): Ms. Priyanka, Ms.Harleen Kaur, Mr.Dileep Kumar Kushwaha
Volume: 4
Issue: 5
Year: 2013
Analysis of Different Techniques for Finger-Vein Feature Extraction PDF available

Author(s): Iram Malik#1 , Rohini Sharma
Volume: 4
Issue: 5
Year: 2013
TJ-ACA: An Advanced Cryptographic Algorithm for Color Images using Ikeda Mapping PDF available

Author(s): Taranjit Kaur#1 , Reecha Sharma
Volume: 4
Issue: 5
Year: 2013
An Efficient Approach For Integrating Data Mining Into Cloud Computing PDF available

Author(s): N. Janardhan
Volume: 4
Issue: 5
Year: 2013
Mobile Location-Based Tour guide System PDF available

Author(s): B Surya Narayana Reddy1 Dr R Praveen Sam
Volume: 4
Issue: 5
Year: 2013
Chain Clustered Communication Protocol for WSN PDF available

Author(s): Swati Sharma#1, Dr. Pradeep Mittal
Volume: 4
Issue: 5
Year: 2013
OFF-LINE Signature Verification Using Neural Network Approach PDF available

Author(s): Sakshi Chhabra
Volume: 4
Issue: 5
Year: 2013
Towards Achieving Secured and Decentralized Accountability in Cloud Computing PDF available

Author(s): Drishya S G #1 , Kavitha Murugeshan
Volume: 4
Issue: 5
Year: 2013
Secured Search Datapreservation Using Ascent Plugnge Method PDF available

Author(s): K.Selvasheela
Volume: 4
Issue: 5
Year: 2013
A Parametric Chain based Routing Approach for Underwater Sensor Network PDF available

Author(s): Aarti#1, Sanjiv Kumar Tomar
Volume: 4
Issue: 5
Year: 2013
General Framework for Biomedical Knowledge With Data Mining Techniques PDF available

Author(s): B.Madasamy#1, Dr.J.Jebamalar Tamilselvi
Volume: 4
Issue: 5
Year: 2013
Client Puzzle Approach for Improving Confidentiality PDF available

Author(s): Ms. Sapna S. Khapre
Volume: 4
Issue: 5
Year: 2013
Why do you need a reservation system?     Free Forms + CRM