Comparison of Graph Clustering Algorithms

Author(s): Aditya Dubey#1, Sanjiv Sharma
Volume: 4
Issue: 9
Year: 2013





Assessment of BEP of MIMO-OFDMA systems

Author(s): Manohar Naik Ramavath#1 B.A.Sarath Manohar Babu
Volume: 4
Issue: 9
Year: 2013





Parameter less Active Contour Algorithm for Segmentation and Compressing Computer Screen based Compound Images

Author(s): K. Kalpana #1 , G.Shopia Reena
Volume: 4
Issue: 9
Year: 2013





Design and PSL Verification of SoC Interconnect Using Open Core Protocol (OCP)

Author(s): Naga Prasad Reddy.T*1, Avinash.K*2
Volume: 4
Issue: 9
Year: 2013





Modern Safety Transportation Using Smart on- Board Unit in Vehicles

Author(s): L.kavya
Volume: 4
Issue: 9
Year: 2013





Image Edges Strengthening Filter Based Color Filter Array Interpolation

Author(s): C Mohammed Abdul Malik#1, B.N.Nagaveni
Volume: 4
Issue: 9
Year: 2013





Performance Evaluation of Skull Stripping Methods and Tools

Author(s): Pratibha
Volume: 4
Issue: 9
Year: 2013





Design Of Electronic Toll Collection (Etc) System On Arm- 7 Using Rfid Techonology

Author(s): A.usha kiran
Volume: 4
Issue: 9
Year: 2013





Design of Online Embedded Web Server for Data Acquisition System

Author(s): A.Shilpa
Volume: 4
Issue: 9
Year: 2013





An Optimization Technique for CRC Generation

Author(s): K.V.Krishna Reddy
Volume: 4
Issue: 9
Year: 2013





Optimization of Energy Usage in Cooperative Networks

Author(s): U.Sandhya#1, S.Vikram Phaneendra
Volume: 4
Issue: 9
Year: 2013





Anomaly Detection Using Pagerank Algorithm

Author(s): Deepak Shrivastava
Volume: 4
Issue: 9
Year: 2013





Improving classification Accuracy of Neural Network through Clustering Algorithms

Author(s): B.Madasamy#1, Dr.J.Jebamalar Tamilselvi
Volume: 4
Issue: 9
Year: 2013





An Effective Approach for Detecting Code Clones

Author(s): Girija Gupta#1, Indu Singh
Volume: 4
Issue: 9
Year: 2013





Proposed Etiquette for Ensuring Data Integrity and Verification in Cloud

Author(s): Gopi Rayala 1 , K. Anand Kumar2 , Prof.S.V.Achutha Rao
Volume: 4
Issue: 9
Year: 2013





Data Sharing on Untrusted Domains using a Novel Encryption Standard

Author(s): D. Nageshwara Rao1 , Ravi
Volume: 4
Issue: 9
Year: 2013





A Knowledge Based Model for Pecularised Web Information Gathering using Ontologies

Author(s): Satya Bhanu Jonnalagadda1 , A. Sravani2 , Prof.S.V.Achutha Rao
Volume: 4
Issue: 9
Year: 2013





Reliable and Secure Storage Services with Cloud

Author(s): Pindikura Ravi Teja Kumar 1 , Narsimha B
Volume: 4
Issue: 9
Year: 2013





Monitoring the Service Availability and Minimizing Query Delay in MANETs

Author(s): P. Chinnaiah1 , B.Srikanth
Volume: 4
Issue: 9
Year: 2013





Data Sharing Website using Personalised Search

Author(s): D. Mahesh Babu#1 , Prof.S.V.Achutha Rao
Volume: 4
Issue: 9
Year: 2013





Blocking and Blacklisting Trespassers in Anonymous Networks

Author(s): K.Sravanti1 , Manda Ashok Kumar2 , Betam Suresh
Volume: 4
Issue: 9
Year: 2013





Throughput and Power Aware Routing In Wireless Mesh Network with Path Restoration

Author(s): Sharankumar Huli#1, Sujata P Terdal
Volume: 4
Issue: 9
Year: 2013





Survey Of Privacy-Preserving Audio Representations With Speaker Diarization

Author(s): S.Sathyapriya M.phil1 , A.Indhumathi , M.Phil , Ph.D
Volume: 4
Issue: 9
Year: 2013





A Review on Green Software Development in a Cloud Environment Regarding Software Development Life Cycle: (SDLC) Perspective

Author(s): Shehla Afzal1 , M. Faisal Saleem1 , Fahad Jan1 , Mudassar Ahmad
Volume: 4
Issue: 9
Year: 2013





New Metric for Quality Analysis of Deblocked Images

Author(s): K.Venkatesh Nayak #1 , G.V.R.Sagar#
Volume: 4
Issue: 9
Year: 2013





Design and Development of Tapered Spiral Helix Antenna

Author(s): B.Sai Yashodha#1 , J.Ravindranadh
Volume: 4
Issue: 9
Year: 2013





A survey on Speech Recognition

Author(s): V.Malarmathi M.C.A 1 , Dr.E.Chandra M.Sc, M.phil, Phd
Volume: 4
Issue: 9
Year: 2013





Kernel Based Structured Svm For Speech Recognition

Author(s): V.Malarmathi M.C.A1 , Dr.E.Chandra M.Sc, M.phil, Phd
Volume: 4
Issue: 9
Year: 2013





Off-line Handwritten Malayalam Character Recognition Using Gabor Filters

Author(s): Nusaibath C#1, Ameera Mol P M
Volume: 4
Issue: 8
Year: 2013





An Efficient Edge Detection Approach based on Bacterial Foraging Optimization

Author(s): Kiranjeet Kaur1 , Sheenam Malhotra
Volume: 4
Issue: 8
Year: 2013





Efficient Allocation of Virtual Machines to Optimize Energy in Cloud Data Centre

Author(s): Jagjeet Singh1 , Sarpreet Singh
Volume: 4
Issue: 8
Year: 2013





Asynchronous TDMA Based MAC Protocol for Fast and Efficient Data Collection in Wireless Sensor Networks

Author(s): Shabana V V#1, Shiju Kumar P S
Volume: 4
Issue: 8
Year: 2013





Detection of Bold Italic and Underline Fonts for Hindi OCR

Author(s): Nidhi Sharma#1 , Mohit Khandelwal
Volume: 4
Issue: 8
Year: 2013





Implementation of Hybrid Error Model Using Super Resolution for Medical Images

Author(s): Navdeep Kaur1 , Usvir Kaur
Volume: 4
Issue: 8
Year: 2013





Wireless Sensor Network and Hierarchical Routing Protocols: A Review

Author(s): Sandeep Verma1 ,Richa Mehta2 , Divya Sharma3 ,Kanika Sharma
Volume: 4
Issue: 8
Year: 2013





A New Cellular Automata Model for Two Lane Traffic System Incorporating Sensitive Driving and Traffic Light Signals

Author(s): Saima Zia, Mudassar Ahmad
Volume: 4
Issue: 8
Year: 2013





Model Analysis of Gas Turbine Blades by varying Fillet Radius with Materials

Author(s): P.Ramesh#1 , D. Mallikarjuna Reddy
Volume: 4
Issue: 8
Year: 2013





A Survey of Methods used for Fast Retrieval of Images in Large scale dataset

Author(s): S.Kalaiarasi Msc1 , T.P.Senthilkumar Msc, M.Phil
Volume: 4
Issue: 8
Year: 2013





A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation

Author(s): Ms.Sharmi .S
Volume: 4
Issue: 8
Year: 2013





Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN

Author(s): D.Gayathri1 , Abdul Vahed
Volume: 4
Issue: 8
Year: 2013





Model and Analysis on Car Seat Mounting Bracket

Author(s): M.V.Srinivasan#1 , M. Lava Kumar
Volume: 4
Issue: 8
Year: 2013





An EMUSIM Technique and its Components in Cloud Computing- A Review

Author(s): Dr. Rahul Malhotra #1, Prince Jain
Volume: 4
Issue: 8
Year: 2013





Attacks on Ipv4 and Ipv6 Protocols and it’s Performance Parameters

Author(s): S.Clement Virgeniya #1 , Dr.V.Palanisamy
Volume: 4
Issue: 8
Year: 2013





A Prospect Mold of Visual Cryptography Design with Dynamic Set

Author(s): Gavirineni Nalini1 ,Mirza Mohsin Raza
Volume: 4
Issue: 7
Year: 2013





A Novel Cell Reckoning Intrusion against TOR

Author(s): Ujjaneni Siva Lalitha1 , Prof.S.V.Achutha Rao
Volume: 4
Issue: 7
Year: 2013





A Theoretical Review on SMS Normalization using Hidden Markov Models (HMMs)

Author(s): Ratika Bali
Volume: 4
Issue: 7
Year: 2013





Advance Cryptography Scheme for Data Hiding using Advance Hill cipher & DES

Author(s): Gurtaptish Kaur1 , Sheenam Malhotra
Volume: 4
Issue: 7
Year: 2013





ISOLATION OF CLONE NODES AND BLACKHOLE NODES USING RISK AWARE MITIGATION

Author(s): Mebi Sernaz#1 , Anand Pavithran
Volume: 4
Issue: 7
Year: 2013





Firewall Policy Anomalies- Detection and Resolution

Author(s): Jitha C K #1 , Sreekesh Namboodiri
Volume: 4
Issue: 7
Year: 2013





Averting Buffer Overflow Attack in Networking OS using – BOAT Controller

Author(s): Vadivel Murugan.P
Volume: 4
Issue: 7
Year: 2013





DESIGN AND ANALYSIS OF LIGHT WEIGHT MOTOR VEHICLE FLYWHEEL

Author(s): M.LAVAKUMAR #1, R.PRASANNA SRINIVAS
Volume: 4
Issue: 7
Year: 2013





An Efficient Subtopic Retrieval System using Hybrid Approach

Author(s): Manpreet Kaur1 , Usvir Kaur
Volume: 4
Issue: 7
Year: 2013





A Novel Firewall Policy Anomaly Management Tool

Author(s): Lakshmi Devi.N#1 , V.Srinadh
Volume: 4
Issue: 7
Year: 2013





Comparative Study of Speech Encryption Algorithms Using Mobile Applications

Author(s): Jaspreet kaur#1 , Er. Kanwal preet Singh
Volume: 4
Issue: 7
Year: 2013





Thermal Analysis of Shell and Tube Heat Ex-Changer Using C and Ansys

Author(s): v.Hari Haran,*, B g.Ravindra Reddy and C b.Sreehari
Volume: 4
Issue: 7
Year: 2013





Movie Review Classification and Feature based Summarization of Movie Reviews

Author(s): Sabeeha Mohammed Basheer#1, Syed Farook
Volume: 4
Issue: 7
Year: 2013





Flow Simulation over a Multi-Stage Launch Vehicle with Strapons Using CFD Techniques

Author(s): N.Sreedhar#1 G. Ravindra Reddy
Volume: 4
Issue: 7
Year: 2013





A Study of Topological Problems and controlling methods in Mobile Ad Hoc Networks

Author(s): G.Krishna Kishore 1 , Ajay Bhaskar Dasari
Volume: 4
Issue: 7
Year: 2013





Implementation of Neural Network Model for Solving Linear Programming Problem

Author(s): Prateeksha Chouksey#1, K.N.Hande
Volume: 4
Issue: 7
Year: 2013





Implementation of Data warehousing in Online Sales Company

Author(s): Snigdha Dash1 , Subhadra Mishra
Volume: 4
Issue: 7
Year: 2013





Sampling Approach Using Btree Indexing for Mining all Association Rules

Author(s): Samiksha Bharne#1 , Mangesh Wanjari*2
Volume: 4
Issue: 7
Year: 2013





An Overview of Techniques Used for Extracting Keywords from Documents

Author(s): Menaka S, Radha N
Volume: 4
Issue: 7
Year: 2013





Zone Based Node Replica Detection in Wireless Sensor Network Using Trust

Author(s): Soumya Sara Koshy #1 , Sajitha M
Volume: 4
Issue: 7
Year: 2013





Evapotranpiration Model Using AI Controller for automatic Irrigation system

Author(s): Mr. Raja sekhar reddy.G 1 Mr.Manujunatha.S2 Mr.Sundeep Kumar k
Volume: 4
Issue: 7
Year: 2013





Structural Analysis Of Delamination Of Composite Materials Using Vertical Milling Machine (GFRP)

Author(s): B.Bindu madhavi#1, S.Suresh
Volume: 4
Issue: 7
Year: 2013





Long Term Forecasting with Fuzzy Time Series and Neural Network: a comparative study using Sugar production data

Author(s): Ankur Kaushik 1 , A.K.Singh
Volume: 4
Issue: 7
Year: 2013





Structural Analysis of Disc Brake Rotor

Author(s): K.Sowjanya#1 , S.Suresh
Volume: 4
Issue: 7
Year: 2013





A New Approach for Iris Recognition

Author(s): Hannath C M#1, Shreeja R
Volume: 4
Issue: 7
Year: 2013





Minimizing Navigation Cost Using an Efficient Cost Based Ranking and Navigation Technique

Author(s): Jisha Jamal
Volume: 4
Issue: 7
Year: 2013





Structural Analysis Of Multi-Plate Clutch

Author(s): S. Jaya Kishore#1 , M. Lava Kumar
Volume: 4
Issue: 7
Year: 2013





Fibre Glass Cutting By Using Abrasive Jet Machining and Analysis of Process Parameters

Author(s): F. Anand Raju#1 V. Gnana Prakash*2 Dr. M.L.S Deva Kumar
Volume: 4
Issue: 7
Year: 2013





Design and Analysis of Horizontal tail of UAV using composite materials

Author(s): F. Anand Raju1# K. Bharat kumar
Volume: 4
Issue: 7
Year: 2013





To Increase the Rotation Efficiency of the Windmill Blades by Using Turbulator

Author(s): A. Suresh#1 G. Ravindra Reddy*2 Y. Hari Prasad Reddy
Volume: 4
Issue: 7
Year: 2013





An Implementation of Reverse Caesar cipher (RCC) Algorithm in Google Cloud using Cloud SQL

Author(s): P.Subhasri (M.phil, Research Scholar) #1 , Dr.A.Padmapriya M.C.A., M.phil., Ph.D
Volume: 4
Issue: 7
Year: 2013





Smart Ordering System via Bluetooth

Author(s): N. M. Z. Hashim#1 , N. A. Ali#2 , A. S. Jaafar#3 , N. R. Mohamad#4 , L. Salahuddin*5 , N. A. Ishak
Volume: 4
Issue: 7
Year: 2013





Approaches for Enhancing Reliability of Software Product

Author(s): Priyanka #1, Trilok Gabba
Volume: 4
Issue: 7
Year: 2013





A Novel Delay Oriented Reactive Routing Protocol for QoS Provisioning in MANETs

Author(s): Jyoti Bhatnagar #1, Dr. Vijay Kumar
Volume: 4
Issue: 7
Year: 2013





Speckle Noise Reduction based on Discrete Wavelet Transform

Author(s): Inderjeet Singh
Volume: 4
Issue: 7
Year: 2013





Advance Scheme for Secret Data Hiding System using Hop-field & LSB

Author(s): Ishwarjot Singh1 , J. P. Singh Raina
Volume: 4
Issue: 7
Year: 2013





Progressive Tool Design and Analysis for 49 Lever 5 Stage Tools

Author(s): H. Ameresh¹, P.Hari Shankar
Volume: 4
Issue: 7
Year: 2013





Research Methodology on an Efficient Method for Analysing EEG Signals by Pattern Recognition Using Neural Networks

Author(s): T.Joseph Judson#1 , Dr.B.Padmaja Rani
Volume: 4
Issue: 7
Year: 2013





A Comparative Study of 7T SRAM Cells

Author(s): Mr. Kariyappa B S1 , Mr. Basavaraj Madiwalar2 , Mrs. Namitha Palecha
Volume: 4
Issue: 7
Year: 2013





Automated Solution for Data Monitoring (Dashboard) of ASIC Design Flow

Author(s): Kariyappa B S1 , Aravind2 , Dhananjaya A3 , Vineet Puri
Volume: 4
Issue: 7
Year: 2013





Rotation and Illumination Invariant Texture Classification for Image Retrieval using Local Binary Pattern

Author(s): Harshal S. Patil #1 , Sandip S. Patil
Volume: 4
Issue: 7
Year: 2013





FPGA Implementation of Face Detection using Skin Segmentation and AdaBoost Algorithm

Author(s): Vinay P
Volume: 4
Issue: 7
Year: 2013





Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud

Author(s): Amandeep Kaur1 , Sarpreet Singh
Volume: 4
Issue: 7
Year: 2013





Aggregation Dynamics in Service Overlay Networks for File Sharing

Author(s): K.Deepika Reddy*1, E.Krishna*2, W.Vidyavardhan
Volume: 4
Issue: 7
Year: 2013





Automatic Railway Gate and Crossing Control based Sensors & Microcontroller

Author(s): Ahmed Salih Mahdi. Al-Zuhairi
Volume: 4
Issue: 7
Year: 2013





Dynamic Intrusion alerts generation and Aggregation using Intelligent IDS

Author(s): Mrs.Sudha Singaraju*1, G.Srikanth
Volume: 4
Issue: 7
Year: 2013





Improving The Predictive Performance by Integrating Decision tree based Attribute Selection in Clustering

Author(s): Rakesh teki #1 ,Hari narayana.P
Volume: 4
Issue: 7
Year: 2013





Bloquant: Implementation of Content Filtering - A Collaborative Approach

Author(s): Nivedita VS
Volume: 4
Issue: 7
Year: 2013





Low Cost Em Signal Direction Estimation With Two Element Time Modulated Array System For Military/Police Search Operations

Author(s): B.Gayathri#1 , M.Devendra
Volume: 4
Issue: 7
Year: 2013





Area Efficient FPGA Based Bidirectional Network on Chip Router through Virtual Channel Regulator

Author(s): Ashish khodwe1 , C.N. Bhoyar
Volume: 4
Issue: 7
Year: 2013





POTENTIAL COVERT CHANNEL IN DISTRIBUTED DATABASE

Author(s): Richa Punia1 , Dr. Sona Malhotra
Volume: 4
Issue: 7
Year: 2013





Handling Queries in MANETs Using Apriori Algorithm to Increase Data Availability and Reduce Query Latency

Author(s): Santhosh Kumar S 1 , Sundeep kumar K 2 , Sridevi K.N
Volume: 4
Issue: 7
Year: 2013





Mobile IPv6 Route Optimization Protocol

Author(s): Aumdevi K. Barbudhe
Volume: 4
Issue: 7
Year: 2013





A Survey on Energy aware offloading Techniques for Mobile Cloud Computing

Author(s): K.Ravindranath#1 , Dr. K. Raja Sekhara Rao
Volume: 4
Issue: 7
Year: 2013





Design of Image Based Authentication System for Android Smartphone Users

Author(s): Indira C K #1 , Kavitha D
Volume: 4
Issue: 7
Year: 2013





Real Time Industrial Monitoring System

Author(s): Rahul D. Chavhan#1, Sachin U. Chavhan#2 , Ganesh B. Chavan
Volume: 4
Issue: 7
Year: 2013





An Efficient Clustering and Distance Based Approach for Outlier Detection

Author(s): Garima Singh1 , Vijay Kumar
Volume: 4
Issue: 7
Year: 2013





Web Page Prediction Techniques: A Review

Author(s): Sunil Kumar#1 , Ms. Mala Kalra
Volume: 4
Issue: 7
Year: 2013





Study and Usage of Effective Tool in Healthcare Systems

Author(s): Yuva Phani K#1 , Nagaraja G S
Volume: 4
Issue: 7
Year: 2013





A Sophisticated Approach for Job Scheduling in Cloud Server

Author(s): Amandeep Kaur Sidhu1 , Supriya Kinger
Volume: 4
Issue: 7
Year: 2013





Stable Route Aware Routing in Mobile Ad-Hoc Networks

Author(s): Mamta Dhanda#1, Shikha Chaudhry
Volume: 4
Issue: 7
Year: 2013





Secure and Accountable Data Sharing In the Cloud

Author(s): T.Praveenkumar1 , K.Narsimhulu
Volume: 4
Issue: 7
Year: 2013





A Secure DCT Image Steganography based on Public-Key Cryptography

Author(s): Shahana T
Volume: 4
Issue: 7
Year: 2013





Identifying Network Intrusions using One Dimensional distance

Author(s): Greeshma K
Volume: 4
Issue: 7
Year: 2013





Foundation for Frequent Pattern Mining Algorithms’ Implementation

Author(s): Prof. Paresh Tanna#1 , Dr. Yogesh Ghodasara
Volume: 4
Issue: 7
Year: 2013





A Critical Study on Wireless Network Attacks for Preventing Channel Congestion

Author(s): N.Lakshmi Haritha #1 , M.Ashok
Volume: 4
Issue: 7
Year: 2013





Drawing Using Hand Gestures

Author(s): N.Kunal#1 , Pattan Akram#2 , Rishab kumar jain#3 , A.Kranthi chandu#4 , P.V.Karthick#5 M.R.Narsinga Rao
Volume: 4
Issue: 7
Year: 2013





Ovarian Follicle Detection for Polycystic Ovary Syndrome using Fuzzy C-Means Clustering

Author(s): Ashika Raj
Volume: 4
Issue: 7
Year: 2013





Fuzzy Feature Clustering for Text Classification Using Sequence Classifier

Author(s): Ambily Balaram
Volume: 4
Issue: 7
Year: 2013





Appraisal of Social Learning Potentials in Some Trending Mobile Computing Applications

Author(s): Abubakar Sadiq BAPPAH
Volume: 4
Issue: 7
Year: 2013





Combined testing approach with static and dynamic techniques

Author(s): Sanjeev sahrawat
Volume: 4
Issue: 7
Year: 2013





Content Based Image Retrieval System Using Feature Classification with Modified KNN Algorithm

Author(s): T. Dharani#1 , I. Laurence Aroquiaraj
Volume: 4
Issue: 7
Year: 2013





Identification of Effective Public Cloud on User Query

Author(s): Manjeet Gupta1 ,Sonia Sindhu
Volume: 4
Issue: 7
Year: 2013





Survey of Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
Author(s): N.Naga Nandhini | P.Narendran
Volume: 4
Issue: 7
Year: 2013




Noise Resilient Periodicity Mining In Time Series Data bases
Author(s): M.Gayathri | M.Gayathri
Volume: 4
Issue: 7
Year: 2013




J48 Classifier Approach to Detect Characteristic of Bt Cotton base on Soil Micro Nutrient

Author(s): Youvrajsinh Chauhan | Jignesh Vania
Volume: 5
Issue: 6
Year: 2013





Typical Security Measures Of Cloud Computing

Author(s): Mohamed Ashik M | Sankara Nayanan A | Nithyananda Kumari.K
Volume: 5
Issue: 6
Year: 2013





Impact of DDoS attack in Online Auction System and Proposed Lightweight Solution Based on Software Agent

Author(s): Mandakini vishwakarma | Brajesh Patel
Volume: 5
Issue: 6
Year: 2013





Harmony Search Optimization in K-Means Clustering

Author(s): Samina Ahamed K T | Jasila E K
Volume: 5
Issue: 6
Year: 2013





Secure and Faster NN Queries on Outsourced Metric Data Assets

Author(s): Renuka Bandi | Madhu Babu Ch
Volume: 5
Issue: 6
Year: 2013





Improved Authentication and Integrity Verification in Wireless Sensor Networks

Author(s): S.Sadakvalli | Ch.Suresh.babu
Volume: 5
Issue: 6
Year: 2013





Implementation of Flash ADC using Multisim Technology

Author(s): Raghavendra.R1 , Dr S.A Hariprasad
Volume: 4
Issue: 6
Year: 2013





Analytical Learning of a Delay Aware Routing Protocol for Multi-hop Mobile Ad-hoc Networks

Author(s): Pankaj Jain#1 , Dr. Vijay Kumar#2 , Richa Jain
Volume: 4
Issue: 6
Year: 2013





Reformation with Neural Network in Automated Software Testing

Author(s): Ayush Kumar Yogi
Volume: 4
Issue: 6
Year: 2013





Security Loopholes Of 802.11 Wireless LANs And Their Solutions

Author(s): 1 Shikha Goswami
Volume: 4
Issue: 6
Year: 2013





Auto Organization and Optimization in Heterogeneous Wireless Mesh Networks

Author(s): Sudha Abirami.R, 2 Petchiappan.K
Volume: 4
Issue: 6
Year: 2013





Ensuring Cloud Security Using Hybrid Encryption Scheme and Disaster Recovery Mechanism

Author(s): R.Sinduja1 , G.Sumathi
Volume: 4
Issue: 6
Year: 2013





Comparative Study of Image Steganography Techniques

Author(s): Sunila Godara1 , Megha Ranolia2 , Vanita Rawal
Volume: 4
Issue: 6
Year: 2013





Bandwidth-Aware AODV based Routing Protocol in MANETs

Author(s): Richa Jain#1 , Chetan Kumar#2, Pankaj Jain
Volume: 4
Issue: 6
Year: 2013





Performance Evaluation of Machine Learning Classifiers in Sentiment Mining

Author(s): G.Vinodhini*, RM.Chandrasekaran
Volume: 4
Issue: 6
Year: 2013





Development of the Content Based Image Retrieval Using Color, Texture and Edge Features

Author(s): Sindhu S#1 , Mr. C O Prakash
Volume: 4
Issue: 6
Year: 2013





Medical Image Segmentation Using Modified K Means And Cellular Automata Algorithms

Author(s): Sruthi K
Volume: 4
Issue: 6
Year: 2013





Secure Data Processing Framework for Mobile Cloud Applications

Author(s): Manjulah.S #1 , Manjunath A.E
Volume: 4
Issue: 6
Year: 2013





Determining the Cluster Labels by Using Keywords Based Similarity Measure

Author(s): G.G.V.Subrahmanyam#1, Prof. DTV Dharmajee Rao#2, T. Naresh
Volume: 4
Issue: 6
Year: 2013





Cryptanalytic JH and BLAKE Hash Function for Authentication and Proposed Work Over BLAKE-256 Using C

Author(s): Mr. Somil Jain
Volume: 4
Issue: 6
Year: 2013





Performance Analysis of Ship Tracking using PID/Fuzzy Controller

Author(s): Sanjay.N1 , Adinath Jain2 , Dr.S.A.Hariprasad
Volume: 4
Issue: 6
Year: 2013





Evolutionary Computing Strategies for Gene Selection

Author(s): Meena Moharana1 , Kaberi Das2 , Debahuti Mishra
Volume: 4
Issue: 6
Year: 2013





A survey of selfish nodes behaviour in Mobile Adhoc network

Author(s): M.Manjula M.C.A1 , P.Elango MCA, M.Phil
Volume: 4
Issue: 6
Year: 2013





Accountable Data Sharing in Cloud using Logging Mechanism

Author(s): R.Nevetha#1,C.Gayathri
Volume: 4
Issue: 6
Year: 2013





Three Mode Security For Wireless Sensor Networks with Mobile Sinks

Author(s): Mrs.S.Rajakumari#1 , Mr.P.Suresh.2, Dr.R.Sukumar
Volume: 4
Issue: 6
Year: 2013





System Atchitecture of WirelessUSB Flash devices

Author(s): Swathi Nallapati#1, Dr.M.S.S.Rukmini
Volume: 4
Issue: 6
Year: 2013





Analysis on Feature Extraction of Periocular Region(Soft biometrics) using LBP, PCA, ICA & Gabour filters

Author(s): Sunila Godara1 , Vanita Rawal2 , Megha Ranolia
Volume: 4
Issue: 6
Year: 2013





Data Mining Analysis of the Rural Public Library usages in Periyakulam Municipality

Author(s): J. Jenifer Rathnakumari #1 , P. Sathya *2 , C. Rama Devi
Volume: 4
Issue: 6
Year: 2013





Software methodology to generate code for device description for XMC microcontroller

Author(s): Ravi L. Mavani#1 , Sharvani G. S
Volume: 4
Issue: 6
Year: 2013





Adaptive Power Delay profile estimation Technique for MIMO-OFDM Systems

Author(s): K. Lakshmanna* M.V.R.Vittal
Volume: 4
Issue: 6
Year: 2013





Line Detection in Digital Images: A Modification to Randomized Line Detection Algorithm

Author(s): Mr. T P Mithun1 Dr. S A Hariprasad2 Mr. Siddappa Karabannavar
Volume: 4
Issue: 6
Year: 2013





Development of Intelligent Dashboards for Global Metrics Evaluation

Author(s): Kawinderjot Kaur a , N C Naveena , Sunil K
Volume: 4
Issue: 6
Year: 2013





A Digital Watermarking for Lifting Based Compression And Encryption of JPEG 2000 Images

Author(s): Ansu Anna Ponnachen1 , Lidiya Xavier
Volume: 4
Issue: 6
Year: 2013





The Cluster Leader Election in Manets

Author(s): Mrs.P.Radhadevi*1, Sathish Ravula
Volume: 4
Issue: 6
Year: 2013





New Filtering Approaches for Phishing Email

Author(s): Mrs.P.Lalitha*1, Sumalatha.Udutha
Volume: 4
Issue: 6
Year: 2013





A Hybrid & Robust Wavelet Based Video Watermarking Scheme for Copyright Protection Using Principal Component Analysis

Author(s): Ankita A. Hood#1 , Prof. N. J. Janwe
Volume: 4
Issue: 6
Year: 2013





Robust Watermarking of Compressed and Encrypted JPEG 2000 Images

Author(s): Dr.P.Eswaran#1 , M.Veni
Volume: 4
Issue: 6
Year: 2013





A Survey of Mobile Ad Hoc Networks Routing Algorithm

Author(s): Inderpal Singh#1 , Jaskiran kaur
Volume: 4
Issue: 6
Year: 2013





Implementation Techniques of Website Layout Designing

Author(s): Himani Goel1 , Praveen Kumar Srivastava2 , Chinmay Garg3 , Ajay Gupta
Volume: 4
Issue: 6
Year: 2013





Resolving Vulnerability Of First Hop Redundancy Protocol Using Md5 Authentication

Author(s): Priyanka Dubey* 1 , Abha Sachdev
Volume: 4
Issue: 6
Year: 2013





Improved Clustering using Hierarchical Approach

Author(s): Megha Gupta, 2 Vishal Shrivastava
Volume: 4
Issue: 6
Year: 2013





An Analysis on Privacy Preserving in Cloud Computing

Author(s): Jithin S#1 , Dr. P. Sujatha
Volume: 4
Issue: 6
Year: 2013





Review Study For Inter-Operability Of Manet Protocols In Wireless Sensor Networks

Author(s): Gurpreet Singh Saini#1, Priyanka Dubey#2, Md Tanzilur Rahman
Volume: 4
Issue: 6
Year: 2013





An Effective Approach to Information Hiding for Secure Message Transmission

Author(s): 1Manoj Kumar Sharma, 2Vishal Shrivastav
Volume: 4
Issue: 6
Year: 2013





Reliable Computing In Ad Hoc Networks

Author(s): Mrs. K.Deeepika Reddy*1, K.Ramakrishna
Volume: 4
Issue: 6
Year: 2013





Comparison of Dynamic Routing Protocols: RIP and OSPF

Author(s): Mrs.Lalitha*1, Sugand Rao Rathod
Volume: 4
Issue: 6
Year: 2013





Clone Attacks Detection In Wireless Sensor Networks

Author(s): Mrs.P.Radhadevi*1, D Gopi Krishna
Volume: 4
Issue: 6
Year: 2013





A Survey on Host to Host Congestion Control

Author(s): Mrs. P.RADHADEVI *1, G. ANJANEYULU
Volume: 4
Issue: 6
Year: 2013





Comparative Study on Global and Local Alignment methods

Author(s): 1Abhilash C B
Volume: 4
Issue: 6
Year: 2013





Improving Tor network using tunable path selection

Author(s): Amarnath Reddy.C
Volume: 4
Issue: 6
Year: 2013





Simulation of Secure Wireless Channel using Randomized Multipath Propagation

Author(s): Prof.S.Venkateswarlu#1 , G.S.Raghavendra*2 , G.SriTeja
Volume: 4
Issue: 6
Year: 2013





Design of low power SRAM Cell with combined effect of sleep stack and variable body bias technique

Author(s): Anjana R1 , Dr. Ajay kumar somkuwar
Volume: 4
Issue: 6
Year: 2013





A Study of Some List Accessing Algorithm And Novel Analytical Results

Author(s): Ms. Aishwarya Mishra
Volume: 4
Issue: 6
Year: 2013





Implementation of RISC Processor for Convolution Application

Author(s): P.Siva Nagendra Reddy1 , A.G.Murali Krishna
Volume: 4
Issue: 6
Year: 2013





Privacy preserving visualization using CLUSTERING

Author(s): Sabbisetti Naga Anisha1 , G. Rama Krishna
Volume: 4
Issue: 6
Year: 2013





An Efficient Approach for Script Identification

Author(s): Om Prakash1 , Mr.Vineet Shrivastava2 , Dr. Ashish Kumar
Volume: 4
Issue: 6
Year: 2013





MANET: Security Aspects and Challenges

Author(s): Md Tanzilur Rahman#1 , Kunal Gupta
Volume: 4
Issue: 6
Year: 2013





Sparse Transform Matrix at Low Complexity for Color Image Compression

Author(s): Dr. K. Kuppusamy, M.Sc.,M.Phil.,M.C.A.,B.Ed.,Ph.D #1 , R.Mehala
Volume: 4
Issue: 6
Year: 2013





A Soft Computing Approach for Heart Disease Analysis

Author(s): Nitika Dahiya#1 , Madan Lal Yadav
Volume: 4
Issue: 6
Year: 2013





Background and Foreground Human Character Segments for Video Object Segmentation
Author(s): Prof.K.Mahesh1 , B.Reka
Volume: 4
Issue: 6
Year: 2013




An Improved Swarm Based Approach for Efficient Document Clustering

Author(s): Kanika Khanna#1, Madan Lal Yadav
Volume: 4
Issue: 6
Year: 2013





Modern Developments in Optimization Model based on Generalized Confidence Interval Method

Author(s): Anantha Lakshmi, S#1 , Vijayalakshmi
Volume: 4
Issue: 6
Year: 2013





Performance comparison of web service in IaaS cloud and standard deployment model

Author(s): Jithin P#1 , Dr S.K.V Jayakumar
Volume: 4
Issue: 6
Year: 2013





A Security Enhanced Approach For Digital Image Steganography Using DWT And RC4 Encryption

Author(s): Amritha.G#1, Meethu Varkey
Volume: 4
Issue: 6
Year: 2013





Virtual Learning Environments – A Survey

Author(s): 1 SNEHA J.M, 2 G.S.NAGARAJA
Volume: 4
Issue: 6
Year: 2013





Extend the Efficiency of a Website Using Web Analytics

Author(s): 1 Mr.S.Balamurugan, 2Mrs.M.Vasuki, 3Mrs.A.Angayarkanni, 4Mrs.P.Aurchana
Volume: 4
Issue: 6
Year: 2013





STABLE ROUTING IN MANETS USING RD MOBILITY MODEL

Author(s): Mr.I.S.Raghuram, Mr.B.Hari Santhosh Rao, Mr.M.Gunasekhar, Miss.G.Geetha Lakshmi
Volume: 4
Issue: 6
Year: 2013





Understanding Location Manager in Android and Implementing an Optimal Image Geotagging Application

Author(s): Isha Sahu1 , Ishita Chakraborty
Volume: 4
Issue: 6
Year: 2013





Secure Storage Services In Cloud Computing

Author(s): S. Muthakshi #1, Dr. T.Meyyappan M.Sc., MBA. M.Phil., Ph.d., *
Volume: 4
Issue: 6
Year: 2013





High Utility Mining Algorithm for Preprocessed Web Data

Author(s): Swapna Mallipeddi, D.N.V.S.L.S.Indira
Volume: 3
Issue: 6
Year: 2012





Transmutation of Regular Expression to Source Code Using Code Generators

Author(s): Rashmi Sinha, Ashish Dewangan
Volume: 3
Issue: 6
Year: 2012





Simulation of File Arrivals and Departures on Buffer sizing in Access Routers

Author(s): Sivasubramanyam Mopidevi, S Narayana
Volume: 3
Issue: 6
Year: 2012





A Framework for the Engineering of Reliable Distributed Systems

Author(s): ChandraBose A Dr.K.Alagarsamy
Volume: 3
Issue: 6
Year: 2012





A Modular and Extendable Approach to Database Encryption at Multi-granularity Level

Author(s): Ramesh Pabboju | S.Krishna Mohan Rao
Volume: 3
Issue: 6
Year: 2012





Novel Energy Efficient MAC Protocol for Data Collection in Event Based Wireless Sensor Network

Author(s): Hemappa B, Dr. Rabindranath Bera | Dr. Manjaiah D H,
Volume: 3
Issue: 6
Year: 2012





Reducing Network Intrusion Detection using Association rule and Classification algorithms

Author(s): K.KEERTHI 1 , P.SREENIVAS
Volume: 3
Issue: 6
Year: 2012





Secure Client Server Message Integrity Verification Using Robust Encrypted Technique

Author(s): Madhuri Marey #1 , Mr.M.Babu Rao #2
Volume: 3
Issue: 6
Year: 2012





Robust Watermarking Framework with DCT Based Encryption

Author(s): L.Sri Lakshmi | Mrs. SK. Salma Begum
Volume: 5
Issue: 5
Year: 2013





A Novel Approach for Detection and Prevention of Wormhole Attack In Ad-hoc Networks

Author(s): Monika#1 , Jyoti Thalor
Volume: 4
Issue: 5
Year: 2013





Methodological approach for Face Recognition Using Artificial Neural Networks

Author(s): K. Shirisha1 , S. Vijaya Lakshmi2 , N. Musrat Sultana
Volume: 4
Issue: 5
Year: 2013





Evaluating Accuracy of Inference and Benefits of Compression over RFID

Author(s): S.Tashelat Masleena1 , M.Gayathri
Volume: 4
Issue: 5
Year: 2013





Video Watermarking Using Wavelet Transformation

Author(s): Rakesh Kumar1 , Savita Chaudhary
Volume: 4
Issue: 5
Year: 2013





Cryptoviral Extortion: A virus based approach

Author(s): S.Manoj Kumar# 1, M.Ravi Kumar
Volume: 4
Issue: 5
Year: 2013





Analysis and Implementation of Different Digital Image Watermarking Techniques for Secure Data Transmission

Author(s): Neeraj Kumar1 ,Veenita Gupta2 , Praveen Kumar
Volume: 4
Issue: 5
Year: 2013





Communication Model Development using Test Data for a given Protocol

Author(s): Md Tanzilur Rahman#1 , Kunal Gupta
Volume: 4
Issue: 5
Year: 2013





Advanced Replica-Based Data Access Prediction and Optimization Approach in Distributed Environment

Author(s): P. Sathiya (Member, IEEE), K. N. Vimal Shankar
Volume: 4
Issue: 5
Year: 2013





A Novel Approach for Preventing Selective Jamming Alerts

Author(s): N.Muruganadham1 , R.Umesh2 , D.Kaleeswaran
Volume: 4
Issue: 5
Year: 2013





Resource Provisioning Cost of Cloud Computing by Adaptive Reservation Techniques

Author(s): M.Manikandaprabhu1 , R.SivaSenthil
Volume: 4
Issue: 5
Year: 2013





Improving Policy Based Intrusion Response Component of a Relational Database by Evaluation of User

Author(s): M. Dharani#1 , T. Sangeetha
Volume: 4
Issue: 5
Year: 2013





Breast tumor representation & noise removal using Fuzzy c-mean algorithm and DWT

Author(s): Brijesh B Patel #1 , Brijesh N Shah*2, Vandana Shah
Volume: 4
Issue: 5
Year: 2013





Mobile Robot in Coal Mine Disaster

Author(s): S.TejaRam#1 , Smt. M. Nalinisri
Volume: 4
Issue: 5
Year: 2013





An Optimization Technique for Medical Image Segmentation

Author(s): N. Sridhar #1 , K. N. Prakash
Volume: 4
Issue: 5
Year: 2013





Cross Platform Mobile Application Development

Author(s): Mrs. V.C. Kulloli#1 , Ashish Pohare#2 , Sujit Raskar#2 , Tania Bhattacharyya#2 , Shashikant Bhure
Volume: 4
Issue: 5
Year: 2013





Optimization of RSA Processors Using Multiplier

Author(s): Chandra.K , 2Kumar.P
Volume: 4
Issue: 5
Year: 2013





Review of First Hop Redundancy Protocol and Their Functionalities

Author(s): Priyanka Dubey* 1 , Shilpi Sharma*2 , Aabha Sachdev
Volume: 4
Issue: 5
Year: 2013





DREAM_OLSR PROTOCOL (Distance Routing Effective Algorithm for Mobility - Optimized Link State Routing)

Author(s): Gurpreet Singh Saini#1 , Ashish Kots#2 , Manoj Kumar
Volume: 4
Issue: 5
Year: 2013





An Efficient Cloud Storage with Secure Dynamic Data Modification

Author(s): K.HariPriya #1 (Member – IEEE), P.Krishnamoorthy
Volume: 4
Issue: 5
Year: 2013





Lfsr-Reseeding Scheme For Achieving Test Coverage

Author(s): M.Kalaiselvi, 2K.S.Neelukumari
Volume: 4
Issue: 5
Year: 2013





Improving the Energy Efficiency in Multicast Routing For Mobile Adhoc Networks

Author(s): S.Victoria Mary , 2 J.Prathish Kumar
Volume: 4
Issue: 5
Year: 2013





Optimization of Task Scheduling and Memory Partitioning for Multiprocessor System on Chip

Author(s): Mythili.R ,2Mugilan.D
Volume: 4
Issue: 5
Year: 2013





Low Power and Memory Efficient FFT Architecture Using Modified CORDIC Algorithm

Author(s): A.Malashri , 2C.Paramasivam
Volume: 4
Issue: 5
Year: 2013





Review of transactions on illuminated facial image preprocessing for user authentication

Author(s): Mrs. Jyoti Kulkarni#1 , Puja Pomannawar#2, Pradnya Patil#2, Shruti Shah#2,Reetu Gupta
Volume: 4
Issue: 5
Year: 2013





Secure web mining framework for e-commerce websites

Author(s): M.KARTHIK
Volume: 4
Issue: 5
Year: 2013





Performance Analysis of Book Recommendation System on Hadoop Platform

Author(s): Sugandha Bhatia#1 , Surbhi Sehgal#2, Seema Sharma
Volume: 4
Issue: 5
Year: 2013





Image Restoration Using Biogeography Based Segmentation

Author(s): Nitika Jearth#1, Raju Sharma
Volume: 4
Issue: 5
Year: 2013





An Autonomous Robot Navigation

Author(s): K.D.V.S.Anil kumar, 2 M.suman
Volume: 4
Issue: 5
Year: 2013





Certain Investigations on Improving the Quality of Requirements in Stake Rare Using NLP

Author(s): Durai Arumugam S S L #1 ,Selvakumar J
Volume: 4
Issue: 5
Year: 2013





Zone Divisional Network with Double Cluster Head for effective communication in WSN

Author(s): Sandeep Verma1 , Kanika Sharma
Volume: 4
Issue: 5
Year: 2013





Privacy for Shared System in Pcloud

Author(s): M.Sultan1 , A.Suresh2 , D.Kaleeswaran
Volume: 4
Issue: 5
Year: 2013





Contrast Enhancement Using Bi-Histogram Equalization With Brightness Preservation

Author(s): Gowthami Rajagopal ,2K.Santhi
Volume: 4
Issue: 5
Year: 2013





The Implementation of Automatic Fire Rescuing and Information System in a Train using Zigbee and Sensors Networks.

Author(s): Manoj Kumar Tyagi#1, Balanagu.Raviteja
Volume: 4
Issue: 5
Year: 2013





ROI Estimation of Data Warehouse with Bottom Up Architecture and Top Down Implementation

Author(s): Bikramjit Pal 1 , Awanish Pati Mishra2 ,Mallika De
Volume: 4
Issue: 5
Year: 2013





A perspective of Security in wireless networks

Author(s): Arun Kumar Arigala*1, Sreeram.Munisankaraiah
Volume: 4
Issue: 5
Year: 2013





A Survey Report on RFM Pattern Matching Using Efficient Multi-Set HPID3 Algorithm

Author(s): Priyanka Rani1 , Nitin Mishra2 ,Samidha Diwedi Sharma
Volume: 4
Issue: 5
Year: 2013





Entrenched Visual Cryptography using Secret Sharing Scheme with public Key

Author(s): Kode Phani Kumar1 , B.VeeraMallu
Volume: 4
Issue: 5
Year: 2013





Diabetic Retinopathy Evaluation From Blood Vessel Features Using SVM Classification

Author(s): Alka Vijayan#1 , Antony Judice. A
Volume: 4
Issue: 5
Year: 2013





Detection of unattended and stolen objects in videos

Author(s): Sharon Femi. P1 , Thaiyalnayaki. K
Volume: 4
Issue: 5
Year: 2013





An Efficient Interaction Pattern Discovery For Human Meetings

Author(s): A.Nandha Kumar#1 , N.Baskar
Volume: 4
Issue: 5
Year: 2013





Computational DNA Sequence Analysis

Author(s): Archana Yashodhar*1 , Manjula*2, Praveen N *3, Pavithra K
Volume: 4
Issue: 5
Year: 2013





Ensuring Data Privacy and Access Anonymity using CryptographicTechniques in Cloud Computing

Author(s): Lamminthang Singsit #1 , Marie Stanislas Ashok
Volume: 4
Issue: 5
Year: 2013





Comparative analysis of Speech Compression on 8-bit and 16-bit data using different wavelets

Author(s): Vini Malika , Pranjal Singhb Atul kumar Singhc , Monika Singh
Volume: 4
Issue: 5
Year: 2013





Challenges and issues in 4G – Networks Mobility Management

Author(s): Payaswini P, Manjaiah D.H
Volume: 4
Issue: 5
Year: 2013





Comparison of High Level Design Based Class Cohesion Metrics

Author(s): Rupinder Kaur1 and Puneet Jai Kaur
Volume: 4
Issue: 5
Year: 2013





Image segmentation using K-mean clustering for finding tumor in medical application

Author(s): Piyush M. Patel1, Brijesh N Shah2 , Vandana Shah
Volume: 4
Issue: 5
Year: 2013





An Updated Data Compression Algorithm for Dynamic Data

Author(s): Vishal Gupta#1, Dheeraj Chandra Murari
Volume: 4
Issue: 5
Year: 2013





Clustering Based Energy Efficient Routing For Heterogeneous Wireless Sensor Networks

Author(s): Dr.B. Vijaya Babu#1, N. Manoj Kumar
Volume: 4
Issue: 5
Year: 2013





Hybridization of Symmetric Key Encryption and Visual Cryptography

Author(s): Monika#1, Rakhi Soni
Volume: 4
Issue: 5
Year: 2013





Reduction of Greedy Forwarding using Overlay Multicasting in Mobile Ad Hoc Networks

Author(s): G. Kiran Kumar#1, B.Vijaya Babu
Volume: 4
Issue: 5
Year: 2013





Efficient Energy Harvesting Techniques for Medium Access Control Protocol in Wireless Sensor Networks

Author(s): Anusha Aremanda
Volume: 4
Issue: 5
Year: 2013





An Efficient Unicast Routing Protocol for AdHoc Wireless Sensor Networks

Author(s): B. Chinmayi Roopa
Volume: 4
Issue: 5
Year: 2013





Reversible Data Hiding in Encrypted Image and Separating the Image and Data

Author(s): Naresh Achari B., Sri. Swami Naik J
Volume: 4
Issue: 5
Year: 2013





A New Approach for Providing the Data Security and Secure Data Transfer in Cloud Computing

Author(s): Manoj Prabhakar Darsi #1, K.Suresh Joseph*2 , Dr. S.K.V.Jayakumar
Volume: 4
Issue: 5
Year: 2013





Modification of Instruction Set Architecture in a UTeMRISCII Processor

Author(s): Ahmad Jamal Salim#1 , Nur Raihana Samsudin*2 , Sani Irwan Md Salim#3 , Soo Yew Guan
Volume: 4
Issue: 5
Year: 2013





Cat Swarm based Optimization of Gene Expression Data Classification

Author(s): Amit Kumar1# , Debahuti Mishra
Volume: 4
Issue: 5
Year: 2013





Emerging Network Technologies that are Likely to Become Widely Available in the Future

Author(s): Peter K. Kemei1 and William P.K. Korir
Volume: 4
Issue: 5
Year: 2013





Analysis of the chloride ion erosion in flexural cracked beam and its durability service life

Author(s): CUI Zhao-wei#1 , LU Chun-hua#2 , LIU Rong-gui#3 , HU Bai-xiang
Volume: 4
Issue: 5
Year: 2013





A Methodology to Develop the Application Faster in Automotive Field

Author(s): Shaila Ramreddy#1 , prof.Shantharam Nayak
Volume: 4
Issue: 5
Year: 2013





Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads

Author(s): G. Suganthi (Member, IEEE), K. N. Vimal Shankar,
Volume: 4
Issue: 5
Year: 2013





Mental Stress and its Implications on Reaction time

Author(s): Apoorvagiri#1 , Nagananda M S
Volume: 4
Issue: 5
Year: 2013





Data Hiding System with Mosaic Image for Protected Communication

Author(s): Nitin Kumar Agrawal#1 , Neeraj Pandey*2 , Ashish Arya
Volume: 4
Issue: 5
Year: 2013





Biomedical Image Segmentation and Registration Using Type-2 Fuzzy Logic

Author(s): Arya Ghosh1 , Himadri Nath Moulick2 , Susmit Karmokar
Volume: 4
Issue: 5
Year: 2013





Automatic fingerprint Identification Using Minutiae Matching

Author(s): S.Mousmi1 , Dr.T.Meyappan
Volume: 4
Issue: 5
Year: 2013





Biomedical Image Registration Using Fuzzy Logic

Author(s): Himadri Nath Moulick#1 , Anindita Chatterjee
Volume: 4
Issue: 5
Year: 2013





Application of Rfid Technology in Intelligent Electronic Shopping Cart

Author(s): G.Ramachandran 2 R.Ramani, 3 S.Valarmathy, 4 K.Elamathi
Volume: 4
Issue: 5
Year: 2013





A New Exemplar Based Image Completion using Belief Propagation

Author(s): N.Nanthini#1, Dr. T.Meyyappan, M.Sc., M.phil. M.B.A.,(M.Tech)., Ph.D
Volume: 4
Issue: 5
Year: 2013





Semi Supervised Color Image Segmentation Using Region Based Method

Author(s): M.MargretRubini#1 , Dr.P.Eswaran M.Sc., M.Tech., Ph.D
Volume: 4
Issue: 5
Year: 2013





Seasonal Time Series and Transfer Function Modelling for Natural Rubber Forecasting in India

Author(s): P. Arumugam#1 , V. Anithakumari
Volume: 4
Issue: 5
Year: 2013





Estimation of Arterial Stiffness by using PPG Signal: A Review

Author(s): Sanjeev kumar#1 , Dr. S.C. Prasanna kumar #2 , Dr.B.G. Sudharshan
Volume: 4
Issue: 5
Year: 2013





Slicing Technique For Privacy Preserving Data Publishing

Author(s): D. Mohanapriya #1 , Dr. T.Meyyappan M.Sc., MBA. M.Phil., Ph.d.,
Volume: 4
Issue: 5
Year: 2013





An Integrated Research Analysis of Cloud Forensics for Secured Computing Environment

Author(s): N.Jaswanth
Volume: 4
Issue: 5
Year: 2013





Wireless LAN Security: Addressing Challenges, Attacks and Solutions

Author(s): Gurpreet Kaur#1 , Kirandeep Kaur
Volume: 4
Issue: 5
Year: 2013





Fusion of CT and MRI images using Discrete Multiwavelet Transform

Author(s): Kusum Rani1 ,Reecha Sharma
Volume: 4
Issue: 5
Year: 2013





Implementation Opass Authentication Protocol System for net Security

Author(s): P.Shanmukha kumar, Sri. k.Ishthaq Ahamed
Volume: 4
Issue: 5
Year: 2013





Development of an Iris-Based Access Control System Using a Two-Level Segmentation Approach.

Author(s): Falohun A. S 1 ., Omidiora E.O. 2 , Fakolujo A.O.3 , dOjo.J.A
Volume: 4
Issue: 5
Year: 2013





Assuring Data Sharing and Culpability as a Service in Cloud

Author(s): A Sreekanth1 Sri K Ishthaq Ahamed
Volume: 4
Issue: 5
Year: 2013





Reviewing Effectiveness of CAPTCHA

Author(s): Ms. Priyanka, Ms.Harleen Kaur, Mr.Dileep Kumar Kushwaha
Volume: 4
Issue: 5
Year: 2013





Analysis of Different Techniques for Finger-Vein Feature Extraction

Author(s): Iram Malik#1 , Rohini Sharma
Volume: 4
Issue: 5
Year: 2013





TJ-ACA: An Advanced Cryptographic Algorithm for Color Images using Ikeda Mapping

Author(s): Taranjit Kaur#1 , Reecha Sharma
Volume: 4
Issue: 5
Year: 2013





An Efficient Approach For Integrating Data Mining Into Cloud Computing

Author(s): N. Janardhan
Volume: 4
Issue: 5
Year: 2013





Mobile Location-Based Tour guide System

Author(s): B Surya Narayana Reddy1 Dr R Praveen Sam
Volume: 4
Issue: 5
Year: 2013





Chain Clustered Communication Protocol for WSN

Author(s): Swati Sharma#1, Dr. Pradeep Mittal
Volume: 4
Issue: 5
Year: 2013





OFF-LINE Signature Verification Using Neural Network Approach

Author(s): Sakshi Chhabra
Volume: 4
Issue: 5
Year: 2013





Towards Achieving Secured and Decentralized Accountability in Cloud Computing

Author(s): Drishya S G #1 , Kavitha Murugeshan
Volume: 4
Issue: 5
Year: 2013





Secured Search Datapreservation Using Ascent Plugnge Method

Author(s): K.Selvasheela
Volume: 4
Issue: 5
Year: 2013





A Parametric Chain based Routing Approach for Underwater Sensor Network

Author(s): Aarti#1, Sanjiv Kumar Tomar
Volume: 4
Issue: 5
Year: 2013





General Framework for Biomedical Knowledge With Data Mining Techniques

Author(s): B.Madasamy#1, Dr.J.Jebamalar Tamilselvi
Volume: 4
Issue: 5
Year: 2013





Client Puzzle Approach for Improving Confidentiality

Author(s): Ms. Sapna S. Khapre
Volume: 4
Issue: 5
Year: 2013




