A Review of the Vulnerabilities of Web Applications

Author(s): Ravneet Kaur Sidhu
Volume: 2
Issue: 9
Year: 2013





TRACKING AND ACTIVITY RECOGNITION THROUGH CAMERA NETWORKS

Author(s): P. Ravali | D. Sampath Kumar
Volume: 2
Issue: 9
Year: 2013





DELAY – Disruption Tolerant Network (DTN), its Network Characteristics and Core Applications

Author(s): Vaishali.S.Raj | Dr. R. Manicka Chezian
Volume: 2
Issue: 9
Year: 2013





Performance Base Static Analysis of Malware on Android

Author(s): Khyati Rami | Vinod Desai
Volume: 2
Issue: 9
Year: 2013





CONTRAIL – ARCHITECTURE FOR MOBILE DATA SHARING APPLICATIONS

Author(s): Lavanya.K | Devipriya.C | Saradha.S | Sangeetha Priya.M
Volume: 2
Issue: 9
Year: 2013





Prototype of Vehicle Security Alert System on Proton Iswara 1.3

Author(s): N. A. Ali | A. S. Ja’afar | A. Salleh | M. A. M. Razali | M.Z.A.A Aziz | N. M. Z. Hashim
Volume: 2
Issue: 9
Year: 2013





HYBRID ENSEMBLE GENE SELECTION ALGORITHM FOR IDENTIFYING BIOMARKERS FROM BREAST CANCER GENE EXPRESSION PROFILES

Author(s): DR. S. ARUNA | DR. L.V. NANDAKISHORE
Volume: 2
Issue: 9
Year: 2013





A Comprehensive Study on Fast Image Dehazing Techniques

Author(s): Elisée A KPONOU | Zhengning Wang | Liping Li
Volume: 2
Issue: 9
Year: 2013





Impact of Uncertainty Factors in Cost Estimation – Substantiation through Normal Distribution Curve

Author(s): G. Rajkumar | Dr. K. Alagarsamy
Volume: 2
Issue: 9
Year: 2013





Design and Performance Analysis of Various Adders using Verilog

Author(s): Maroju SaiKumar | Dr. P. Samundiswary
Volume: 2
Issue: 9
Year: 2013





Design and Implementation of Rijndael Encryption Algorithm Based on FPGA

Author(s): K. Soumya | G. Shyam Kishore
Volume: 2
Issue: 9
Year: 2013





Lifetime Maximization in Sensor Networks for Rare-Event Detection using Optimal Sleep Scheduling

Author(s): M. Sindhuja | N. Kokila
Volume: 2
Issue: 9
Year: 2013





A New Technique for Test Case Prioritization

Author(s): Amandeep Kaur | Sheena Singh
Volume: 2
Issue: 9
Year: 2013





A Survey of Time Synchronization Protocols for Wireless Sensor Networks

Author(s): Baljinder Kaur | Amandeep Kaur
Volume: 2
Issue: 9
Year: 2013





Outsourced Comparison Seek on Metric Information Resources

Author(s): M. Praveen | S. Dorababu
Volume: 2
Issue: 9
Year: 2013





Home Electrical Appliances Smart System

Author(s): S. H. Husin | A. A. Ngahdiman | N. M. Z. Hashim | Y. Yusop | A.S Ja’afar
Volume: 2
Issue: 9
Year: 2013





Safety Measures in Wireless Information Networks

Author(s): K.V.N.R. Sai Krishna | CH. Krishnamohan
Volume: 2
Issue: 9
Year: 2013





Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing

Author(s): P. Sravanthi | N. Uday Bhaskar | P. Swapna | Nagaraju
Volume: 2
Issue: 9
Year: 2013





Zforce Touchscreen Technology

Author(s): A. ANUSHA REDDY | DR. R. V. KRISHNAIAH
Volume: 2
Issue: 9
Year: 2013





NEXT GENERATION MOBILE COMPUTING

Author(s): N. LAKSHMI PRASANNA | DR. R. V. KRISHNAIAH
Volume: 2
Issue: 9
Year: 2013





Comparison of Previous Result with New Model for the Improvement of Gain in Raman Amplifier

Author(s): Jyoti Dhir | Vivek Gupta
Volume: 2
Issue: 9
Year: 2013





Performance Evaluation of AODV and DSR Routing Protocols with PCM and GSM Voice Encoding Schemes

Author(s): Osamah Yaseen Fadhil
Volume: 2
Issue: 9
Year: 2013





Cloud Security for Computing Secure Cloud Bursting, Brokerage and Aggregation Using Cryptography

Author(s): Neeraj Shrivastava | Rahul Yadav
Volume: 2
Issue: 9
Year: 2013





Privacy Protected Query Processing on Spatial Networks

Author(s): K. SASIKALA | REKA.R | SASIKALA.K
Volume: 2
Issue: 8
Year: 2013





SECURITY TECHNIQUES FOR MULTI TENANCY APPLICATIONS IN CLOUD

Author(s): C.C. Kalyan Srinivas | S.Sajida | Lokesh
Volume: 2
Issue: 8
Year: 2013





Design of Improved Web Crawler By Analysing Irrelevant Result

Author(s): Prashant Dahiwale | Dr. M.M. Raghuwanshi | Dr. Latesh Malik
Volume: 2
Issue: 8
Year: 2013





Low Power Flip-Flop Design for Low Swing LC Resonant Clock Distribution Networks

Author(s): Ms. Rihana P A | Mr. R Ramar Kalangiyam
Volume: 2
Issue: 8
Year: 2013





AIM OF PROTECTED ROUTING MESSAGE AUTHENTICATION PROTOCOL FOR VEHICULAR AD HOC NETWORKS

Author(s): R. UmaSaraswathi | N. Kavitha | G. KesavaRaj
Volume: 2
Issue: 8
Year: 2013





Parallel Encryption Technique Combined With Secure Single Sign-On Mechanism for Distributed Computer Networks

Author(s): R. Suganya | A.K. Sathiya Bama
Volume: 2
Issue: 8
Year: 2013





CCLAEEO: CLUSTERING BASED CROSSLAYER AIDED ENERGY-EFFICIENT OPPORTUNISTIC ROUTING SCHEME IN MOBILE AD HOC NETWORKS

Author(s): M. Kalaivani | G. KesavaRaj
Volume: 2
Issue: 8
Year: 2013





Intelligent Heart Disease Prediction Model Using Classification Algorithms

Author(s): Pramod Kumar Yadav | K.L.Jaiswal | Shamsher Bahadur Patel | D. P.Shukla
Volume: 2
Issue: 8
Year: 2013





Depiction of Routing Protocols in Mobile Adhoc Networks: Behaviour Analysis

Author(s): Veeralakshmi M | Dr. R Pugazendi
Volume: 2
Issue: 8
Year: 2013





Analysis of Attribute Association Rule from Large Medical Datasets towards Heart Disease Prediction

Author(s): D. P. Shukla | Shamsher Bahadur Patel | Ashish Kumar Sen | Pramod Kumar Yadav
Volume: 2
Issue: 8
Year: 2013





Automated Libraries: What we expect from Digital Libraries

Author(s): Gulbasar | Prof. Saoud Sarwar
Volume: 2
Issue: 8
Year: 2013





ANOMALY INTRUSION DETECTION SYSTEM USING NEURAL NETWORK

Author(s): Ms. Vrushali D Mane | Ms. Abhilasha Sayar | Prof. Sunil Pawar
Volume: 2
Issue: 8
Year: 2013





Safety Dimensions of Session Initiation Protocol

Author(s): K.V.N.R. Sai Krishna
Volume: 2
Issue: 8
Year: 2013





Steganographic Method for Data Hiding In Audio Signals with LSB & DCT

Author(s): Linu Babu | Jais John S | Parameshachari B D | Muruganantham C | H S DivakaraMurthy
Volume: 2
Issue: 8
Year: 2013





Evolution of Mobile Wireless Communication Networks-1G to 5G as well as Future Prospective of Next Generation Communication Network

Author(s): Pankaj Sharma
Volume: 2
Issue: 8
Year: 2013





Low Complexity Multiple Active Transmit Antenna For High Transmit Rate

Author(s): Aparna S | Nithin S S | Parameshachari B D | Muruganatham C | Prof. H S DivakaraMurthy
Volume: 2
Issue: 8
Year: 2013





SMART ASSOCIATION CONTROL IN WIRELESS FIDELITY USING FBA

Author(s): Devipriya A | Prashanth M | Parameshachari B D | Muruganantham C | H S Divakara Murthy | Arun Jose
Volume: 2
Issue: 8
Year: 2013





Backfilling Strategies for Computational Grid System Load Balancing

Author(s): Prakash Kumar | Pradeep Kumar | Vikas Kumar
Volume: 2
Issue: 8
Year: 2013





ADOPTION OF AUTOMATED TELLER MACHINE IN NIGERIAN BANKS: USE ENHANCEMENTS AND LIMITATIONS

Author(s): DAWODU BAMIDELE FRIDAY | OSONDU MARY C
Volume: 2
Issue: 8
Year: 2013





Policy Enforcing and Revoking Mechanism on Trusted Ad Hoc Networks

Author(s): Sujatha J | Manoj Challa
Volume: 2
Issue: 8
Year: 2013





Implementation of SAODV and TAODV Adhoc Secure Routing Protocols

Author(s): T Nagarjuna | C.C. Kalyan Srinivas | K R Arjun Reddy
Volume: 2
Issue: 7
Year: 2013





Overview of Security Threats in WSN

Author(s): Ms. Poonam Barua | Mr. Sanjeev Indora
Volume: 2
Issue: 7
Year: 2013





Performance Comparison of Routing Protocols for Remote Login in MANETs

Author(s): VIKAS GOYAL | SHAVETA RANI | PARAMJIT SINGH
Volume: 2
Issue: 7
Year: 2013





Identifying Under Attack Hateful Email

Author(s): M. Ramu | B. Triveni | L. Srinivasa Rao
Volume: 2
Issue: 7
Year: 2013





A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users

Author(s): Khalid Waleed Hussein | Dr. Nor Fazlida Mohd. Sani | Professor Dr. Ramlan Mahmod | Dr. Mohd. Taufik Abdullah
Volume: 2
Issue: 7
Year: 2013





Energy Efficient Routing Protocols in Mobile Ad hoc Network Based on Enhanced AODV Protocol

Author(s): R. Rajeshkanna | S. Poorana Senthilkumar | C. Kumuthini
Volume: 2
Issue: 7
Year: 2013





Scalable Heat Routing Protocol for Wireless Mesh Networks

Author(s): Srivani. P
Volume: 2
Issue: 7
Year: 2013





On Some Aspects of Link Analysis and Informal Network in Social Network Platform

Author(s): Subrata Paul
Volume: 2
Issue: 7
Year: 2013





STUDY ON DECISION TREE COMPETENT DATA CLASSIFICATION

Author(s): A.Vanitha | S.Niraimathi
Volume: 2
Issue: 7
Year: 2013





METHODS FOR SEGMENTATION OF IVUS ATHEROSCLEROSIS IMAGES

Author(s): R. Ravindraiah | K. Tejaswini
Volume: 2
Issue: 7
Year: 2013





An Enhanced Authentication Scheme Using Kerberos with Hash-Based Message Authentication Code (HMAC)

Author(s): R. Kogila
Volume: 2
Issue: 7
Year: 2013





Accurate Forecasting Prediction of Foreign Exchange Rate Using Neural Network Algorithms: A STUDY

Author(s): Divyapriya .R | Dr. R. Manicka Chezhian
Volume: 2
Issue: 7
Year: 2013





Genetic Algorithm Assisted Preventive Maintenance Scheduling for Web Servers

Author(s): Ravi Sindal
Volume: 2
Issue: 7
Year: 2013





TPM as a Middleware for Enterprise Data Security

Author(s): Abhishek Patel | Prabhat Dansena
Volume: 2
Issue: 7
Year: 2013





Anisotropic Morphological and LLSURE Based Edge Preserving Image Filtering

Author(s): Ms. Jibi K George
Volume: 2
Issue: 7
Year: 2013





Automated Model-Based Test Path Generation from UML Diagrams via Graph Coverage Techniques

Author(s): Parampreet Kaur | Gaurav Gupta
Volume: 2
Issue: 7
Year: 2013





ON-DEMAND ROUTING IN MULTI-HOP WIRELESS MOBILE AD HOC NETWORKS

Author(s): P. Umamaheswari | K. Ranjith singh
Volume: 2
Issue: 7
Year: 2013





FACS BASED AUTOMATIC HUMAN EMOTION RECOGNITION

Author(s): Prof. Anuradha Savadi | Chandrakala V Patil
Volume: 2
Issue: 7
Year: 2013





ENERGY EFFICIENT ROUTING IN MANET WITH ZRP AND ANYCAST

Author(s): Satya Bhushan Verma
Volume: 2
Issue: 7
Year: 2013





INNOVATION OF IFGRP AND PERFORMANCE ASSESSMENT OF OLSR, GRP AND IFGRP

Author(s): Jatin Gupta
Volume: 2
Issue: 7
Year: 2013





Enhance Luhn Algorithm for Validation of Credit Cards Numbers

Author(s): Khalid Waleed Hussein | Dr. Nor Fazlida Mohd. Sani | Professor Dr. Ramlan Mahmod | Dr. Mohd. Taufik Abdullah
Volume: 2
Issue: 7
Year: 2013





A STUDY ON MANET INTEGRATION THROUGH INTERNET

Author(s): A. Sharmila | M. Preetha | R. Selvakumar
Volume: 2
Issue: 7
Year: 2013





An Efficient Routing Implementation Using Genetic Algorithm

Author(s): Priti Gaur
Volume: 2
Issue: 7
Year: 2013





Secure Position-Based Routing Protocol for Mobile Ad hoc Networks

Author(s): S. Sivakumar | S. Sagunthala
Volume: 2
Issue: 7
Year: 2013





CLUSTERING APPROACH FOR FAST ENERGY EFFICIENT DATA COLLECTION IN WIRELESS SENSOR NETWORK

Author(s): Mr. Sandeep.C | Mrs. Manimozhi I | Dr. Jitendranath Mungara
Volume: 2
Issue: 7
Year: 2013





Predicting Students Academic Performance Using Education Data Mining

Author(s): Suchita Borkar | K. Rajeswari
Volume: 2
Issue: 7
Year: 2013





RELATIVE INVESTIGATION OF OLSR, TORA AND GRP ROUTING PROTOCOL USING OPNET

Author(s): Jatin Gupta | Ritika Gupta
Volume: 2
Issue: 7
Year: 2013





Sentiment Analysis Based Approaches for Understanding User Context in Web Content

Author(s): M. SAKTHIVEL | G. HEMA
Volume: 2
Issue: 7
Year: 2013





A Pervasive Data Analytic Web Service for Educational Data Mining

Author(s): Shana. J | T. Venkatachalam
Volume: 2
Issue: 7
Year: 2013





Modified K-Means for Better Initial Cluster Centres

Author(s): Kalpana D. Joshi | P.S. Nalwade
Volume: 2
Issue: 7
Year: 2013





Efficient Routing Protocol for Highly Dynamic Mobile Ad Hoc Networks

Author(s): RAMKUMAR. V.D
Volume: 2
Issue: 7
Year: 2013





OVERVIEW OF DDOS ALGORITHMS: A SURVEY

Author(s): S. Chithra | Dr. E. George Dharma Prakash Raj
Volume: 2
Issue: 7
Year: 2013





A Survey of Image Segmentation Algorithms Based On Fuzzy Clustering

Author(s): R. Ravindraiah | K. Tejaswini
Volume: 2
Issue: 7
Year: 2013





Ensuring QOS in WiMAX Networks

Author(s): S. Gandhimathi | A. Srivishnuparaneetharan | M. Madhushudhanan
Volume: 2
Issue: 7
Year: 2013





Energy Conservation in MANET Using Power Saving Protocol BECA/AFECA

Author(s): R. Suguna | P. Gomathi
Volume: 2
Issue: 7
Year: 2013





An Efficient Resource Management and Scheduling Technique for Fault Tolerance in Grid Computing

Author(s): Deeptanoy Ghosh | Ramandeep Singh | Jimmy Laishram
Volume: 2
Issue: 7
Year: 2013





Online Optimization for Scheduling Preemptable Tasks on IaaS Cloud Systems

Author(s): S. Gandhimathi | M. Madhushudhanan | A. Srivishnu Paraneetharan
Volume: 2
Issue: 7
Year: 2013





Selection of Initial Centroids for k-Means Algorithm

Author(s): Anand M. Baswade | Prakash S. Nalwade
Volume: 2
Issue: 7
Year: 2013





Pragmatic Reactive Programming on Helpless Records

Author(s): Kaja Masthan
Volume: 2
Issue: 7
Year: 2013





A Comparative Security Study Review on Symmetric Key Cryptosystem Based Algorithms

Author(s): SSVR Kumar Addagarla | Babji Y
Volume: 2
Issue: 7
Year: 2013





Technical Advances in Fall Detection System – A Review

Author(s): Raveendra Hegde | Dr. B G Sudarshan | Dr. S C Prasanna Kumar | Dr. Hariprasad S A | Dr. B S Satyanarayana
Volume: 2
Issue: 7
Year: 2013





Evaluating the Derivatives of Two Types of Functions

Author(s): Chii-Huei Yu
Volume: 2
Issue: 7
Year: 2013





AUTOMATIC PUBLIC DISTRIBUTION SYSTEM

Author(s): PRASANNA BALAJI.R | MANIKANDAN.T
Volume: 2
Issue: 7
Year: 2013





The Differential Problem of Two Types of Functions

Author(s): Chii-Huei Yu
Volume: 2
Issue: 7
Year: 2013





Automation of Mathematics Teaching — Demonstration by Methods of Completing the Square in Solving a Quadratic Equation

Author(s): Ching-Sung Kuo
Volume: 2
Issue: 7
Year: 2013





A STUDY ON IRIS RECOGNITION SYSTEM

Author(s): S. RAJESH KUMAR | G.R. SUGANYA | X. NITHIYA | X. SHARMI
Volume: 2
Issue: 7
Year: 2013





FORECASTING IN SAP-SCM (SUPPLY CHAIN MANAGEMENT)

Author(s): B. Vasumathi | S.P. Shanmuga Ranjani
Volume: 2
Issue: 7
Year: 2013





Enhancing Content Security using MD5 & UTF8 Encoding at Window Azure Cloud

Author(s): Harjinder Kaur | Sarpreet Singh
Volume: 2
Issue: 7
Year: 2013





A Review and Research of Edge Detection Techniques for Image Segmentation

Author(s): Poonam Dhankhar | Neha Sahu
Volume: 2
Issue: 7
Year: 2013





Towards Secure and Dependable Ticket Based Tracing System for Obtaining Forgery Attacks in WMN

Author(s): Chandan Y.N | Manoj Challa | K. Sundeep Kumar
Volume: 2
Issue: 7
Year: 2013





An Integrated Approach to Detect and Limit IP Spoofing

Author(s): Tanmay A. Abhang | Uday V. Kulkarni
Volume: 2
Issue: 7
Year: 2013





A Survey on Security Issues in Wireless Sensor Network

Author(s): H.N. Pratihari
Volume: 2
Issue: 7
Year: 2013





USER GUIDED WEB BASED INTERACTION IN MIXED SERVICE ORIENTED SYSTEM

Author(s): S. TAMIL SELVAN | S. ARUN
Volume: 2
Issue: 7
Year: 2013





A Review on Delay Optimization in Vehicular Ad Hoc Networks Using Ant Colony Optimization and WIMAX

Author(s): Shikha Rani | Manoj Chaudhary
Volume: 2
Issue: 7
Year: 2013





A Study on the Differential Problems Using Maple

Author(s): Chii-Huei Yu
Volume: 2
Issue: 7
Year: 2013





ACTIVITY BASED PERSON IDENTIFICATION USING PARTICLE SWARM OPTIMIZATION ALGORITHM

Author(s): Sruthy Sebastian
Volume: 2
Issue: 7
Year: 2013





REMOVAL OF NOISE IN PPG SIGNALS USING WAVELETS

Author(s): YADHURAJ S.R | HARSHA.H | Dr. PADMAJA K.V
Volume: 2
Issue: 6
Year: 2013





POWER AND AREA EFFICIENT DESIGN OF COUNTER FOR LOW POWER VLSI SYSTEM

Author(s): SURESH KUMAR.R
Volume: 2
Issue: 6
Year: 2013





Design & Analysis of Computational Features Prediction Model for Heart Disease Diagnosis

Author(s): Atul Kumar Pandey | Prabhat Pandey | K.L. Jaiswal
Volume: 2
Issue: 6
Year: 2013





Various Edge Detection Methods for Foreground Detection

Author(s): Gurjeet kaur Seerha | Rajneet Kaur
Volume: 2
Issue: 6
Year: 2013





Mitigating Risk Using Puzzle-Based Defense Technique to Improve Confidentiality

Author(s): Ms. Sapna S. Khapre | Prof. Shrikant Ardhapurkar
Volume: 2
Issue: 6
Year: 2013





A Study of Manet and Wormhole Attack in Mobile Adhoc Network

Author(s): Ranjeeta Siwach | Vanditaa Kaul
Volume: 2
Issue: 6
Year: 2013





A New Approach for Retrieving Unconstrained Blurred Images

Author(s): Minu Poulose
Volume: 2
Issue: 6
Year: 2013





3D Spherical Harmonics Deformation Visualization of Intraoperative Organ

Author(s): Ms. Greeshma Jacob | Ms. Reshma V.K
Volume: 2
Issue: 6
Year: 2013





Key Generation Using Genetic Algorithm for Image Encryption

Author(s): Aarti Soni | Suyash Agrawal
Volume: 2
Issue: 6
Year: 2013





A New Cluster Based Broadcast Protocol for Delay Tolerant Mobile Networks

Author(s): Mr. Harish Kumar T.R | Dr. Dinesh K. Anvekar | Mr. K. Sundeep Kumar | Mr. Manoj Challa
Volume: 2
Issue: 6
Year: 2013





Detection of an Individual after Piercing Using Ear Biometric

Author(s): Sushreeti Bandyopadhyay | Devesh Narayan
Volume: 2
Issue: 6
Year: 2013





Facial Expression Recognition Using SVM Classification in Perceptual Color Space

Author(s): Ms. Aswathy.R
Volume: 2
Issue: 6
Year: 2013





PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW

Author(s): Suchita Baxla | Prof. Rajesh Nema
Volume: 2
Issue: 6
Year: 2013





Improving the Congestion Control over Stateless Wireless Ad Hoc Network Systems

Author(s): Shrikant Pujar | Prof. Vasudev K Parvati
Volume: 2
Issue: 6
Year: 2013





Comparative Study of Different Application of OFDM in FPGA Implementation

Author(s): Ashwin Thakur | Vipul Agrawal | Yogeshwar Khandagre | Alok Duby
Volume: 2
Issue: 6
Year: 2013





A Combined Protection for Entire Network Based On Immune Inspired Theories

Author(s): P.S. ThumilVannan | S. Hirutiha
Volume: 2
Issue: 6
Year: 2013





Performance Comparison of an Effectual Approach with K-Means Clustering Algorithm for the Recognition of Facial Expressions

Author(s): Tanvi Sheikh | Shikha Agrawal
Volume: 2
Issue: 6
Year: 2013





Management Decisions against Functional Violations of Web Services

Author(s): M. Mohemmed Sha | K. Vivekanandan
Volume: 2
Issue: 6
Year: 2013





Fast and Efficient Automated Iris Segmentation by Region Growing

Author(s): Ms. Sruthi.T.K
Volume: 2
Issue: 6
Year: 2013





Distributed Auditing for user data in the Cloud

Author(s): Ms. Indushree T G | Mr. Anand R
Volume: 2
Issue: 6
Year: 2013





A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION

Author(s): Mr. Iranna Telasang | Mr. Manjunatha S
Volume: 2
Issue: 6
Year: 2013





A Survey on Web Page Change Detection System Using Different Approaches

Author(s): Shobhna | Manoj Chaudhary
Volume: 2
Issue: 6
Year: 2013





Multioriented and Curved Text Lines Extraction from Documents

Author(s): Vaibhav Gavali | B. R. Bombade
Volume: 2
Issue: 6
Year: 2013





INTERACTIVE IMAGE SEGMENTATION BASED ON HARMONIC FUNCTIONS & RECONSTRUCTIONS

Author(s): Alisha Abraham
Volume: 2
Issue: 6
Year: 2013





Dynamic Round Robin for Load Balancing in a Cloud Computing

Author(s): Ajay Gulati | Ranjeev.K.Chopra
Volume: 2
Issue: 6
Year: 2013





NODE AND SINK MOBILITY SUPPORTED ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK WITH IMPROVED ENERGY EFFICIENCY

Author(s): Neha Upadhyay | Vikram Jain
Volume: 2
Issue: 6
Year: 2013





A REVIEW ON EFFICIENT RESOURCE BLOCK ALLOCATION IN LTE SYSTEM

Author(s): Rupinder Kaur | Manoj Kumar
Volume: 2
Issue: 6
Year: 2013





Data Protection for Clients in Private Network through Virus-Protection as a Service

Author(s): Manivannan Palanivel | Murali Prasath
Volume: 2
Issue: 6
Year: 2013





A Novel Architecture of Mercator: A Scalable, Extensible Web Crawler with Focused Web Crawler

Author(s): Sarnam Singh | Nidhi Tyagi
Volume: 2
Issue: 6
Year: 2013





Avoiding Pollution Attacks in Network Coding using Authentication Code

Author(s): Mangesh N. Bhandare | Ravindra C. Thool | Gurdeep Singh Wahi
Volume: 2
Issue: 6
Year: 2013





An Overview of Speech Recognition Using HMM

Author(s): Ms. Rupali S Chavan | Dr. Ganesh. S Sable
Volume: 2
Issue: 6
Year: 2013





Using Maple to Evaluate the Partial Derivatives of Two-Variables Functions

Author(s): Chii-Huei Yu
Volume: 2
Issue: 6
Year: 2013





Comparison of ANNs, Fuzzy Logic and Neuro-Fuzzy Integrated Approach for Diagnosis of Coronary Heart Disease: A Survey

Author(s): Nitin Kumari | Sunita | Smita
Volume: 2
Issue: 6
Year: 2013





A Novel Steganographic Approach for Enhancing the Security of Images

Author(s): Priya Thomas | Avanish Kumar Singh
Volume: 2
Issue: 6
Year: 2013





Rule-Based and Cluster-Based Intrusion Detection Technique for Wireless Sensor Network

Author(s): Ms. Rachana Deshmukh | Ms. Rashmi Deshmukh | Prof. Manoj Sharma
Volume: 2
Issue: 6
Year: 2013





GREEN: The New Color in Computer Technology

Author(s): Navdeep Kaur Maan | Navdeep Kaur Dhillon
Volume: 2
Issue: 6
Year: 2013





Performance Analysis of Routing Protocols in MANETs

Author(s): Manoj Kumar | Devendra Singh
Volume: 2
Issue: 6
Year: 2013





AN IMPLEMENTATION OF WEB PERSONALIZATION USING WEB MINING TECHNIQUES

Author(s): V. Shanmuga Priya | S. Sakthivel
Volume: 2
Issue: 6
Year: 2013





A REPLACEMENT POLICY FOR BUFFER MANAGEMENT IN IPTV SERVICES

Author(s): K.B. Dinesh Babu | M. Somu | N. Rengarajan
Volume: 2
Issue: 6
Year: 2013





A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM

Author(s): M. Preetha | M. Nithya
Volume: 2
Issue: 6
Year: 2013





Protein Structure Prediction using Genetic Algorithm

Author(s): Subhendu Bhusan Rout | Satchidananda Dehury | Bhabani Sankar Prasad Mishra
Volume: 2
Issue: 6
Year: 2013





A Novel Approach of Handwritten Character Recognition using Positional Feature Extraction

Author(s): Swapnil A. Vaidya | Balaji R. Bombade
Volume: 2
Issue: 6
Year: 2013





Security and Privacy in Cloud Computing: A Survey

Author(s): Shachindra Kumar Dubey | Prof. Ashok Verma
Volume: 2
Issue: 6
Year: 2013





A Fuzzy Improved Association Mining Approach to Estimate Software Quality

Author(s): Sonakshi Rana | Rahul Kumar Yadav
Volume: 2
Issue: 6
Year: 2013





A Novel Fuzzy Logic Analysis & Study on Intrusion Detection System

Author(s): G. Shilpa | N. Anjaneyulu
Volume: 2
Issue: 6
Year: 2013





Analysis of Android Applications & Missed Call Alerts to Registered Email Address

Author(s): A. Maharaju
Volume: 2
Issue: 6
Year: 2013





Performance Analysis of Cloud Computing for Distributed Client

Author(s): Dr. Neeraj Bhargava | Dr. Ritu Bhargava | Manish Mathuria | Ravi Daima
Volume: 2
Issue: 6
Year: 2013





Path Loss Estimation for a Wireless Sensor Network for Application in Ship

Author(s): Ananya Sarkar | Subhasish Majumdar | Partha Pratim Bhattacharya
Volume: 2
Issue: 6
Year: 2013





CNX PSU Bank Index Prediction Using Soft Computing - A Study

Author(s): J. Mary Dallfin Bruxella | S. Arun Joe Babulo
Volume: 2
Issue: 6
Year: 2013





Developing Web Based Model (Disblogwik) in Informal eLearning

Author(s): Triveni Dixit | Dinesh Gill
Volume: 2
Issue: 6
Year: 2013





Wormhole Detection Using Hidden Markov Model Approach

Author(s): Himani Deswal | Rahul Kumar Yadav
Volume: 2
Issue: 6
Year: 2013





WIRELESS SENSOR NETWORK AND ITS ROUTING PROTOCOL: A SURVEY PAPER

Author(s): Reena | Sunil Phulre | Rekha Pandit
Volume: 2
Issue: 6
Year: 2013





Android Optimization: A Survey

Author(s): Ms. Debosmita Sen Purkayastha | Mr. Nitin Singhla
Volume: 2
Issue: 6
Year: 2013





Architecture of Discrete Wavelet Transform Processor for Image Compression

Author(s): Ms. Yamini S.Bute | Ms. Indu Mandawi | Ms. Sarita Sakure
Volume: 2
Issue: 6
Year: 2013





Ethics and Impacts of Information and Communication Technology in E-Commerce

Author(s): Tryambak Hiwarkar | Dr. P.G Khot
Volume: 2
Issue: 6
Year: 2013





Remote Temperature Monitoring Using LM35 sensor and Intimate Android user via C2DM Service

Author(s): Poonam | Prof. (Dr.) Yusuf Mulge
Volume: 2
Issue: 6
Year: 2013





RECOGNITION AND PREPROCESSING OF INTRUSION DATA IN WIRELESS SENSOR NETWORK

Author(s): Manjot Singh | Himanshu Sharma
Volume: 2
Issue: 6
Year: 2013





A Survey on Brain–Machine Interface used in VLSI Field-Programmable Mixed-Signal Array

Author(s): Umayal.S
Volume: 2
Issue: 6
Year: 2013





A Novel Positioning Technique for 3D Underwater Sensor Networks

Author(s): Aditya Tandon | Kamal Kant
Volume: 2
Issue: 6
Year: 2013





A Review of Wormhole Detection Using HMM Approach

Author(s): Himani Deswal | Rahul Yadav
Volume: 2
Issue: 6
Year: 2013





A Review of Geometry Based Symmetric Key Encryption Using Ellipse

Author(s): Prerna Gaur | Dr. Paramjit Singh
Volume: 2
Issue: 6
Year: 2013





Content Management System (CMS) for Web-Based MIS Application

Author(s): P. Divya
Volume: 2
Issue: 6
Year: 2013





Security Refinement in Nymble System

Author(s): Maheshkumar S. Kamble | Hatkar S. S.
Volume: 2
Issue: 6
Year: 2013





Monitoring and Its Impacts over Distributed Systems and Possible Solutions

Author(s): Manjunath Kotari | Dr. Niranjan N. Chiplunkar | Dr. Nagesh H R
Volume: 2
Issue: 6
Year: 2013





A Novel Steganographic Approach to enhance the Performance of Security System in a Smarter Way

Author(s): Parveen Mor | Tanupriya Choudhury | Vasudha Vashisht
Volume: 2
Issue: 6
Year: 2013





Improvement in Word Sense Disambiguation by Introducing Enhancements in English WordNet Structure

Author(s): Swati Rastogi | Sanjeev Thakur
Volume: 2
Issue: 5
Year: 2013





Comparison and Simulation of POR and E-POR Routing Protocols in MANETs

Author(s): M. Chandrika | N. Papanna
Volume: 2
Issue: 5
Year: 2013





A Study on Multi Project Resource Constrained Project Scheduling using Metaheuristic Approach

Author(s): S. Siva Vidya | M. Suguna | Dr. D. Sharmila
Volume: 2
Issue: 5
Year: 2013





Stimulus-Response Behavior of Moving Agents

Author(s): Yuniel E. Proenza Arias | Martín E. Proenza Arias
Volume: 2
Issue: 5
Year: 2013





Arduino Based Wireless Intrusion Detection Using IR Sensor and GSM

Author(s): Prakash Kumar | Pradeep Kumar
Volume: 2
Issue: 5
Year: 2013





An Efficient Pixel-shuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography

Author(s): Navita Agarwal | Himanshu Sharma
Volume: 2
Issue: 5
Year: 2013





An Overview on Reactive Protocols for Mobile Ad-Hoc Networks

Author(s): P. Narendra Reddy | CH. Vishnuvardhan | V. Ramesh
Volume: 2
Issue: 5
Year: 2013





ROUTING ATTACKS IN MOBILE AD HOC NETWORKS

Author(s): P. Narendra Reddy | CH. Vishnuvardhan | V. Ramesh
Volume: 2
Issue: 5
Year: 2013





An Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA

Author(s): Prachi Agarwal | Naveen Prakash
Volume: 2
Issue: 5
Year: 2013





A STUDY OF PRIVACY-PRESERVING WHILE SHARING SENSITIVE INFORMATION

Author(s): K.V. Lakshmi Praveena
Volume: 2
Issue: 5
Year: 2013





SPEAKER RECOGNITION AND AUTHENTICATION

Author(s): Rakesh D R | JAYASIMHAN N K
Volume: 2
Issue: 5
Year: 2013





Applications of Swarm Intelligence

Author(s): Amrit Saggu | Pallavi Yadav | Monika Roopak
Volume: 2
Issue: 5
Year: 2013





Genomic Signal Processing (GSP) Of Rheumatic Arthritis (RA) Using Different Indicator Sequences

Author(s): K.B. Ramesh | Prabhu Shankar.K.S | B.P. Mallikarjunaswamy | E.T. Puttaiah
Volume: 2
Issue: 5
Year: 2013





Mitigation of Blackhole for AODV (Ad hoc On Demand Distance Vector)

Author(s): Ms. Bhumil Jani | Prof. Hitesh Patel
Volume: 2
Issue: 5
Year: 2013





Performance Evaluation of Rayleigh Multipath Fading Channel using Rectangular QAM schemes

Author(s): Mr. P. Sunil Kumar | Dr. M.G. Sumithra | Ms. M. Sarumathi
Volume: 2
Issue: 5
Year: 2013





Utilizing WM and GM for Finding Intelligence of Human Behavior

Author(s): Mrs. Mary Cecil | Prof. Samir Kumar Bandyopadhyay
Volume: 2
Issue: 5
Year: 2013





A Survey on Clustering Principles with K-means Clustering Algorithm Using Different Methods in Detail

Author(s): Manpreet Kaur | Usvir Kaur
Volume: 2
Issue: 5
Year: 2013





Analysis of Yslow Performance Test tool & Emergences on Web Page Data Extraction

Author(s): R. Mamatha | N. Indira Priyadarsini
Volume: 2
Issue: 5
Year: 2013





Research Analysis of Cloud Computing

Author(s): G. Vijay Baskar | N. Sathees Kumar | N. Karthick
Volume: 2
Issue: 5
Year: 2013





REVIEW OF ENSEMBLE CLASSIFICATION

Author(s): V. Chitraa | Dr. Antony Selvadoss Thanamani
Volume: 2
Issue: 5
Year: 2013





A Survey and Analysis of Media Keying Techniques in Session Initiation Protocol (SIP)

Author(s): Rajesh Kumar | Sandip Chauhan
Volume: 2
Issue: 5
Year: 2013





Vehicular Ad-Hoc Network a Comparative Study and Simulation

Author(s): Niranjan Singh | Sunil Kumar | Rajdeep Singh | B S Rawat | Devendra Singh
Volume: 2
Issue: 5
Year: 2013





DATA LEAKAGE DETECTION

Author(s): N. Bangar Anjali | P. Rokade Geetanjali | Patil Shivlila | R. Shetkar Swati | Prof. N B Kadu
Volume: 2
Issue: 5
Year: 2013





Swarm Intelligence for Network Communication Routing

Author(s): Gauri Nagar | Arpit Sood | Monika Roopak
Volume: 2
Issue: 5
Year: 2013





A Survey on Software Development Life Cycle Models

Author(s): T Bhuvaneswari | S Prabaharan
Volume: 2
Issue: 5
Year: 2013





Multi-frequency Measurement of Electrical Bioimpedance of Bone to assess Bone Mineral Density

Author(s): Mrs. S. Mythili | Dr. G. Athisha
Volume: 2
Issue: 5
Year: 2013





FACTS INCLUSION BIOINFORMATICS: MODERN EFFORTS AND DISPUTE

Author(s): Dr. Tryambak A. Hiwarkar | R. Sridhar Iyer
Volume: 2
Issue: 5
Year: 2013





SECURE COMMUNICATION OF SECRET DATA USING STEGNOGRAPHY

Author(s): Sobia Habib | Atiya Parveen | Saoud Sarwar
Volume: 2
Issue: 5
Year: 2013





IMAGE SEGMENTATION FOR TUMOR DETECTION USING FUZZY INFERENCE SYSTEM

Author(s): V. Janani | P. Meena
Volume: 2
Issue: 5
Year: 2013





Hybrid Compression Using DWT-DCT and Huffman Encoding Techniques for Biomedical Image and Video Applications

Author(s): K.N. Bharath | G. Padmajadevi | Kiran
Volume: 2
Issue: 5
Year: 2013





Flexible Bloom for Searching Textual Content Based Retrieval System in an Unstructured P2P Overlay Networks

Author(s): S. Uvaraj | S. Suresh | Dr. E. Mohan
Volume: 2
Issue: 5
Year: 2013





Empowering Intrusion Detection Systems in Multitier Web Applications Using Clustering Algorithms

Author(s): RANJITH SIVADASAN | P. MADHAVAN
Volume: 2
Issue: 5
Year: 2013





Survey of Resource and Grouping Based Job Scheduling Algorithm in Grid Computing

Author(s): Sandeep Kaur | Sukhpreet Kaur
Volume: 2
Issue: 5
Year: 2013





Literature Survey on Automated Person Identification Techniques

Author(s): Sruthy Sebastian
Volume: 2
Issue: 5
Year: 2013





Implementation of Multicast Routing Using Genetic Algorithm

Author(s): Priti Gaur
Volume: 2
Issue: 5
Year: 2013





THE CLOUD- CHANGING THE INDIAN HEALTHCARE SYSTEM

Author(s): Atiya Parveen | Sobia Habib | Waseem Ahmad
Volume: 2
Issue: 5
Year: 2013





New Applications of Soft Computing, Artificial Intelligence, Fuzzy Logic & Genetic Algorithm in Bioinformatics

Author(s): Dr. Tryambak A. Hiwarkar | R. Sridhar Iyer
Volume: 2
Issue: 5
Year: 2013





PATIENT MONITORING SYSTEM USING ANDROID TECHNOLOGY

Author(s): Prema Sundaram
Volume: 2
Issue: 5
Year: 2013





Enhanced Multistage Content Based Image Retrieval

Author(s): Nandish Chauhan | Mahesh Goyani
Volume: 2
Issue: 5
Year: 2013





DESIGNING A VIRTUAL MACHINE FOR IDENTIFICATION OF CARDIAC ARRHYTHMIAS USING LAB VIEW

Author(s): B. Subha | Subha.S.V | M.Anitha | M.Eniya | M.Gaayathri
Volume: 2
Issue: 5
Year: 2013





Cloud Computing: A Revolution in Communication

Author(s): Rani Srivastava | Shekhar Gupta
Volume: 2
Issue: 5
Year: 2013





Hierarchical EAP Back-End Authenticator State Machine

Author(s): Desai Malav | Kalpesh Patel
Volume: 2
Issue: 5
Year: 2013





Content Based Image Retrieval with Log Based Relevance Feedback Using Combination of Query Expansion and Query Point movement

Author(s): Bhailal Limbasiya | Swati Patel
Volume: 2
Issue: 5
Year: 2013





Improved Data Reduction Technique in Data Mining

Author(s): Pritesh Vora | Bhavesh Oza
Volume: 2
Issue: 5
Year: 2013





GENETIC ALGORITM BASED HINDI WORD SENSE DISAMBIGAUTION

Author(s): Sabnam Kumari | Prof. (Dr.) Paramjit Singh
Volume: 2
Issue: 5
Year: 2013





AN IMAGE ENCRYPTION USING BIT LEVEL PERMUTATION AND DEPENDENT DIFFUSION

Author(s): G.S. Nandeesh | P.A. Vijaya | M.V. Sathyanarayana
Volume: 2
Issue: 5
Year: 2013





Decorate Ensemble of Artificial Neural Networks with High Diversity for Classification

Author(s): Mittal C. Patel | Prof. Mahesh Panchal | Himani P. Bhavsar
Volume: 2
Issue: 5
Year: 2013





A Review: Image Extraction with Weighted Page Rank using Partial Tree Alignment Algorithm

Author(s): Gagan Preet Kaur | Usvir Kaur | Dheerendra Singh
Volume: 2
Issue: 5
Year: 2013





SCOPE AND LIMITATION OF ELECTRONIC VOTING SYSTEM

Author(s): Atiya Parveen | Sobia Habib | Saoud Sarwar
Volume: 2
Issue: 5
Year: 2013





Multi-Operating Environment System

Author(s): Aditya Thakare | Prachi Deshmukh | Shraddha Kawane | Yogesh Sarda
Volume: 2
Issue: 5
Year: 2013





Review Paper on Detection and Prevention Techniques of Gray-Hole Attack in Manet

Author(s): Ashok Desai
Volume: 2
Issue: 5
Year: 2013





An Efficient Approach to Improve Response Time in Multibiometric Patterns Retrieval from Large Database

Author(s): S. Balgani | S. Sangeetha
Volume: 2
Issue: 5
Year: 2013





Software Risk Management

Author(s): P. M. Chawan | Jijnasa Patil | Radhika Naik
Volume: 2
Issue: 5
Year: 2013





Various Hierarchical Routing Protocols in Wireless Sensor Network: A Survey

Author(s): Vandna Sharma | Payal Jain
Volume: 2
Issue: 5
Year: 2013





Study on Various Glass Defect Using Glass Edge Detection Methods

Author(s): Sumeet Singh Tiwana | Sukhpreet Kaur
Volume: 2
Issue: 5
Year: 2013





A Novel Approach of Energy Optimization in WSN

Author(s): S. Geetha Priya | A.R. Arunachalam
Volume: 2
Issue: 5
Year: 2013





Safekeeping of Network Executive for a Domestic Internet Service Provider

Author(s): K.V.N.R. Sai Krishna
Volume: 2
Issue: 5
Year: 2013





Effective Identification of the Intruders and Modifiers in Wireless Sensor Networks

Author(s): J. Vijayagajendiran | D. Udhayakumarapandian
Volume: 2
Issue: 5
Year: 2013





Judging Relevance of Candidate Answers in Question Answering System

Author(s): Rawia Awadallah
Volume: 2
Issue: 5
Year: 2013





MULTIPLE FAULT DIAGNOSIS FOR HIGH SPEED HYBRID MEMORY ARCHITECTURE

Author(s): B. Kamala Soundari | M. Praveena
Volume: 2
Issue: 5
Year: 2013





MONITORING LOCAL AREA NETWORK USING REMOTE METHOD INVOCATION

Author(s): Harsh Mittal | Manoj Jain | Latha Banda
Volume: 2
Issue: 5
Year: 2013





An Evaluation of Different Routing Schemes in DTN

Author(s): S. Anitha | G. Micheal
Volume: 2
Issue: 5
Year: 2013





Cloud on Linux Operating System

Author(s): Pritee Gavhane | Pratibha Kurumkar | Madhuri Jagtap | Dharti Mahajan
Volume: 2
Issue: 5
Year: 2013





An Evaluation of Crowd Work during Mass Disruption Events

Author(s): R. Harish | D. Keerna
Volume: 2
Issue: 4
Year: 2013





Modified Approaches on Face Recognition By using Multisensory Image

Author(s): S. Dhanarajan | G. Michael
Volume: 2
Issue: 4
Year: 2013





Normalized graph-cut based Necrotic Image Segmentation of Brain Tumours

Author(s): J.S. JUFIN | D. JEBA DERWIN
Volume: 2
Issue: 4
Year: 2013





A New Segmentation Technique by KDE Model and Two-Phase Graph Cut Method

Author(s): S. Bhagawath | T.D. Subha | A. Arul Mary
Volume: 2
Issue: 4
Year: 2013





A Novel Resource Distributed Discovery and Management in Grid Computing

Author(s): M. Brinda Kumar | Dr. K.P. Kaliyamurthie
Volume: 2
Issue: 4
Year: 2013





A Novel Security Technique in Message Passing Interface Systems

Author(s): UDHAYASHANKAR.S | Dr. K.P. KALIYAMURTHIE | MATHIVILASINI.S
Volume: 2
Issue: 4
Year: 2013





New Data Mining Algorithm for Intrusion Detection in Networks

Author(s): M. Penchala Praveen | M. Sambath | S. Ravi
Volume: 2
Issue: 4
Year: 2013





Implementation of Cryptographic Algorithm on FPGA

Author(s): Prof. S. Venkateswarlu | Deepa G.M | G. Sriteja
Volume: 2
Issue: 4
Year: 2013





Detection of Mobile Replica Nodes in Wireless Sensor Networks

Author(s): KARTHIK.S | K.P. KALIYAMURTHIE
Volume: 2
Issue: 4
Year: 2013





An Evaluation of Location Privacy in Wireless Sensor Networks

Author(s): R. SUGANYA SUBATHRA | A.R. ARUNACHALAM
Volume: 2
Issue: 4
Year: 2013





Privacy-Preserving Updates to Anonymous Databases

Author(s): SIVASUBRAMANIAN.R | K.P. KALIYAMURTHIE
Volume: 2
Issue: 4
Year: 2013





A Review on Data Leakage Detection

Author(s): SHAJ.V | K.P. KALIYAMURTHIE
Volume: 2
Issue: 4
Year: 2013





Information Extraction by Mining the Semantic Web

Author(s): R. PREETHI | C. ANURADHA
Volume: 2
Issue: 4
Year: 2013





A Novel Approach of Detecting the Camouflaging Worm

Author(s): HEMALATHA R | S. PRATHIBA
Volume: 2
Issue: 4
Year: 2013





Optimized Rapid Data Collection in Tree Based WSN

Author(s): DEVASAHAYAM | K.P. KALIYAMURTHIE
Volume: 2
Issue: 4
Year: 2013





Modified Approach of User Profiling from Search Engine Logs

Author(s): C. DEEPA | S. PRATHIBA
Volume: 2
Issue: 4
Year: 2013





Methodologies for Trend Detection Based on Temporal Text Mining

Author(s): M. BANU PRIYA | Dr. A. KUMARAVEL
Volume: 2
Issue: 4
Year: 2013





A Robust DR Classification from Blood Vessel Features

Author(s): Alka Vijayan | Antony Judice.A
Volume: 2
Issue: 4
Year: 2013





Feature Extraction and Classification of Emotions in Wave Files Using Crossbreed Algorithm

Author(s): Aastha Joshi | Rajneet Kaur
Volume: 2
Issue: 4
Year: 2013





Security Based Phishing Website Detection

Author(s): Yalavarthi Ravi Theja | R. Krishnaveni
Volume: 2
Issue: 4
Year: 2013





Deep Malicious Website Detection

Author(s): Parvatam Sriram Rohit | R. Krishnaveni
Volume: 2
Issue: 4
Year: 2013





IMPLEMENTATION OF PARALLEL APRIORI ALGORITHM ON HADOOP CLUSTER

Author(s): A. Ezhilvathani | Dr. K. Raja
Volume: 2
Issue: 4
Year: 2013





SECURED SEARCHING OF VALUABLE DATA IN A METRIC SPACE BASED ON SIMILARITY MEASURE

Author(s): R. Rathika | Dr. K. Raja
Volume: 2
Issue: 4
Year: 2013





Customer Security Issues in Cloud Computing

Author(s): Nimmati Satheesh
Volume: 2
Issue: 4
Year: 2013





Receiver Based Geographic Multicast Routing in Ad Hoc Networks

Author(s): Koteswararao Nuthalapati | Poornima Samamthula | Gunasekhar Bathina
Volume: 2
Issue: 4
Year: 2013





Coverage Analysis and Chinese Postman Algorithm for Efficient Model-Based Test Generation

Author(s): Parampreet Kaur | Gaurav Gupta
Volume: 2
Issue: 4
Year: 2013





Improve Query Performance Using Effective Materialized View Selection and Maintenance: A Survey

Author(s): Ashish P. Mohod | Manoj S. Chaudhari
Volume: 2
Issue: 4
Year: 2013





IMAGE COMPRESSION WITH SCALABLE ROI USING ADAPTIVE HUFFMAN CODING

Author(s): P. Sutha
Volume: 2
Issue: 4
Year: 2013





CANCER RESEARCH THROUGH THE HELP OF SOFT COMPUTING TECHNIQUES: A SURVEY

Author(s): Mr. Tanupriya Choudhury | Dr. Vivek Kumar | Dr. Darshika Nigam
Volume: 2
Issue: 4
Year: 2013





Exigent Vulnerability in Mobile Ad-hoc Network and Solutions in Context of Energy Optimization with Clustering Technique

Author(s): Keshav Kumar Tiwari | Prof. Sanjay Agrawal
Volume: 2
Issue: 4
Year: 2013





IMPLEMENTATION OF NORMLIZED CUT ALGORITHAM FOR IMAGE SEGMENTATION

Author(s): Hardik K Patel | Darshak G Thakore | Mahasweta Joshi
Volume: 2
Issue: 4
Year: 2013





Hand Gesture Recognition Based Real-time Command System

Author(s): P. Jenifer Martina | P. Nagarajan | P. Karthikeyan
Volume: 2
Issue: 4
Year: 2013





Automatic Licenses Plate Recognition

Author(s): Ronak P Patel | Narendra M Patel | Keyur Brahmbhatt
Volume: 2
Issue: 4
Year: 2013





ROBUST WATERMARKING SCHEME AGAINST GEOMETERICAL ATTACKS

Author(s): Kiratpreet Singh | Rajneet Kaur
Volume: 2
Issue: 4
Year: 2013





DESIGN AND ANALYSIS OF POWER EFFICIENT CLOCKED PAIR SHARED FLIPFLOP

Author(s): B. Ragavi | K. Rajesh | A. Selvapandian
Volume: 2
Issue: 4
Year: 2013





TECHNOLOGY BOON: EEG BASED BRAIN COMPUTER INTERFACE - A SURVEY

Author(s): Vasudha Vashisht | Dr. T. V. Prasad | Dr. S.V.A.V. Prasad
Volume: 2
Issue: 4
Year: 2013





A Secure Decentralized Cloud Computing Environment over Peer to Peer

Author(s): Tanupriya Choudhury | Vasudha Vashisht | Himanshu Srivastava
Volume: 2
Issue: 4
Year: 2013





IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT

Author(s): C. VAIYAPURI | R. MOHANDAS
Volume: 2
Issue: 4
Year: 2013





Adapted Encryption Algorithm with Multiple Skew Tent Map

Author(s): Sarika Tyagi | Deepak chaudhary
Volume: 2
Issue: 4
Year: 2013





Remote System Controller: An Implementation of a Secure Channel

Author(s): Shanu Sharma
Volume: 2
Issue: 4
Year: 2013





A Novel Network Interjection Avoidance for MANET

Author(s): M. Sudharani | K.P. Kaliyamurthie
Volume: 2
Issue: 4
Year: 2013





Modified Security Frame Work for PIR Cloud Computing Environment

Author(s): J. Sinduja | S. Prathiba
Volume: 2
Issue: 4
Year: 2013





An Enhanced HASBE for Cloud Computing Environment

Author(s): D. Hephzi Rachel | S. Prathiba
Volume: 2
Issue: 4
Year: 2013





An Analysis for Black Hole Attack in AODV Protocol and Its Solution

Author(s): Rahul Sharma | Naveen Dahiya | Divya Upadhyay
Volume: 2
Issue: 4
Year: 2013





Enhanced Anomaly Detection IDS-Based Scheme for Dynamic MANET on-Demand (DYMO) Routing Protocol for MANETS

Author(s): Anand Nayyar
Volume: 2
Issue: 4
Year: 2013





ROLE OF DATA MINING IN EDUCATION SECTOR

Author(s): Dr. Mohd Maqsood Ali
Volume: 2
Issue: 4
Year: 2013





AUTHENTICATING MOBILE DEVICE USERS THROUGH IMAGE SELECTION

Author(s): G. Vijay Baskar | N. Sangeetha
Volume: 2
Issue: 4
Year: 2013





IMPROVED IMAGE WATERMARKING WITH CURVELET WAVELET

Author(s): Mr. N. Suresh Kumar | Mr. B. Mathan Kumar
Volume: 2
Issue: 4
Year: 2013





HIGH IMPERCEPTIBLE ENCODING FOR COMPUTER NETWORKS SECURITY

Author(s): C. KAVITHA | ANTONY JUDICE A | S. PRATHIBA
Volume: 2
Issue: 4
Year: 2013





Design of Low Power Dual Trigger Sequential Circuit

Author(s): R. Balakumaresan | A. Selvapandian | S. Krishnakumar
Volume: 2
Issue: 4
Year: 2013





ADVANTAGES OF WCF OVER WEB SERVICES

Author(s): Kola Siva Tharun | Muppalla Prudhvi | Satti Swami Reddy
Volume: 2
Issue: 4
Year: 2013





The Amalgamation of Digital Watermarking & Cloud Watermarking for Security Enhancement in Cloud Computing

Author(s): Navneet Singh | Prof. Shailendra Singh
Volume: 2
Issue: 4
Year: 2013





Moving Object Tracking Using Kalman Filter

Author(s): Hitesh A Patel | Darshak G Thakore
Volume: 2
Issue: 4
Year: 2013





A Survey on Techniques and Challenges in Image Super Resolution Reconstruction

Author(s): Pandya Hardeep | Prof. Prashant B. Swadas | Prof. Mahasweta Joshi
Volume: 2
Issue: 4
Year: 2013





A Novel Prediction on Breast Cancer from the Basis of Association rules and Neural Network

Author(s): S. Palaniappan | T. Pushparaj
Volume: 2
Issue: 4
Year: 2013





An Implementation of a Novel Secret Image Sharing Algorithm

Author(s): Shanu Sharma
Volume: 2
Issue: 4
Year: 2013





IBM I SERIES OVER IBM Z SERIES

Author(s): MUPPALLA PRUDHVI | KOLA SIVA THARUN | SATTI SWAMI REDDY
Volume: 2
Issue: 4
Year: 2013





Historical Document Preservation using Image Processing Technique

Author(s): Prof. D.N. Satange | Ms. Swati S. Bobde | Ms. Snehal D. Chikate
Volume: 2
Issue: 4
Year: 2013





PACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY

Author(s): H.V. Laxman Vijay | K. Sudheer Kumar | R.V. Krishnaiah
Volume: 2
Issue: 4
Year: 2013





Encryption of Data to Prevent Jamming Attacks

Author(s): N. Abirami | R. Jeeva | L. Revathi | U. Safiya | Mrs. E. Baby Anitha
Volume: 2
Issue: 4
Year: 2013





Character Identification Using Graph Matching Algorithm

Author(s): S. Bharathi | P. Manirathnam | K. Ramya | R. Ranjith Kumar | Mrs. M. Tamilarasi
Volume: 2
Issue: 4
Year: 2013





Analysis of Buffer Sizing in Core Routers and Investigating Its Impact on Flow of Files

Author(s): Priyadarsini S | Sharmila S | SivaSankari B | Vijaya Kumar P | Vipin P | Mr.A.Mummoorthy
Volume: 2
Issue: 4
Year: 2013





RELAY SELECTION FOR SECURE CO-OPERATIVE NETWORKS WITH JAMMING

Author(s): Lakshmipraba.K | Nithya Devi.S | Praveen.P | Suresh Kumar.M | Mrs.V.Vennila
Volume: 2
Issue: 4
Year: 2013





Clustering for Collaborative Filtering Application in Web Recommendations

Author(s): M. Kanimozhi | K. Logeshwari | K. Saranya | D. Sowbha | Mr. R. Velumani
Volume: 2
Issue: 4
Year: 2013





Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

Author(s): Karthhik.K | Keerthana.R | Porkodi.A | Udhayakumar.S | Kesavan.S | Mr.Balamurugan.P
Volume: 2
Issue: 4
Year: 2013





SECURING CLOUD COMPUTING ENVIRONMENT USING TIME DELAY BASED ON SESSION

Author(s): Koteswar rao.M | Mr. G. Sree Ram
Volume: 2
Issue: 4
Year: 2013





A Cognitive Digital Home Framework using Admission Control and Resource Distribution

Author(s): A. Sakira Parveen | T. Muruga Jothi | R. Raja Kumari
Volume: 2
Issue: 4
Year: 2013





HDL IMPLEMENTATION OF ALGEBRAIC SOFT DECISION ALGORITHM FOR RS CODES

Author(s): M. Revathy | R. Saravanan
Volume: 2
Issue: 4
Year: 2013




