An Efficient Morphological Salt-and-Pepper Noise Detector

Author(s): Alok Singh | Umesh Ghanekar | Chakresh Kumar | Ghanendra Kumar
Volume: 2
Issue: 5
Year: 2011





An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel

Author(s): Deo Brat Ojha | Ajay Sharma
Volume: 2
Issue: 5
Year: 2011





How Good Is The DES Algorithm In Image Ciphering?

Author(s): Said F. El-Zoghdy | Yasser A. Nada | A. A. Abdo
Volume: 2
Issue: 5
Year: 2011





Attacking Embedded Systems through Power Analysis

Author(s): Dr. Sastry JKR | Prof K. SubbaRao, | Prof N Venkata Ram, | Ms.J. Sasi Bhanu
Volume: 2
Issue: 5
Year: 2011





A New Method of APWM Resonant Inverter Topology for High Frequency AC Power Distribution Systems

Author(s): S.Arumugam | S.Ramareddy
Volume: 2
Issue: 5
Year: 2011





Implementation of LSB Steganography and its Evaluation for Various File Formats

Author(s): V. Lokeswara Reddy | Dr. A. Subramanyam | Dr.P. Chenna Reddy
Volume: 2
Issue: 5
Year: 2011





Novel Mobile Network Service for Road Safety

Author(s): J.Radhakrishnan | R.S.Rajesh, M.E., Ph.D
Volume: 2
Issue: 5
Year: 2011





Analysis of Users Web Browsing Behavior Using Markov chain Model

Author(s): Diwakar Shukla | Rahul Singhai
Volume: 2
Issue: 5
Year: 2011





Watermarking Algorithm Using Sobel Edge Detection

Author(s): P. Ramesh Kumar | K.L.Sailaja
Volume: 2
Issue: 5
Year: 2011





Heuristic Task Allocation Strategies for Computational Grid

Author(s): Ashish V. Chandak | Bibhudatta Sahoo | Ashok Kumar Turuk
Volume: 2
Issue: 5
Year: 2011





Silhouette Based Human Motion Detection and Recognising their Actions from the Captured Video Streams

Author(s): Deepak. N. A | Dr.U. N. Sinha
Volume: 2
Issue: 5
Year: 2011





Comparison of Multidimensional MFCC Feature Vectors for Objective Assessment of Stuttered Disfluencies

Author(s): Ravi Kumar K M | Ganesan S
Volume: 2
Issue: 5
Year: 2011





Reliable Point to Multipoint Hierarchical Routing in Scatternet Sensor Network

Author(s): R.Dhaya | Dr.V.Sadasivam, | Dr.R.Kanthavel,
Volume: 2
Issue: 4
Year: 2011





A Survey on Clustering Algorithms for Heterogeneous Wireless Sensor Networks

Author(s): Vivek Katiyar | Narottam Chand | Surender Soni
Volume: 2
Issue: 4
Year: 2011





A Key Agreement Protocol Using Non-Abelian Group

Author(s): Abhishek Dwivedi1 | D.B.Ojha2
Volume: 2
Issue: 4
Year: 2011





Performance Evaluation of DSR and DSDV Routing Protocols for Wireless Ad Hoc Networks

Author(s): Rajeshwar Singh | Dharmendra K Singh | Lalan Kumar
Volume: 2
Issue: 4
Year: 2011





Temporal Dynamics of Repetitions during the Early Stage of Stuttering: An Acoustic Study

Author(s): Tara. V.K | RaviKumar .K.M
Volume: 2
Issue: 4
Year: 2011





Different Aspects of Evolutionary Algorithms, Multi-Objective Optimization Algorithms and Application Domain

Author(s): Dhirendra Pal Singh | Ashish Khare
Volume: 2
Issue: 4
Year: 2011





The Impact of K-Factor on Wireless Link in Indian Semi-desert Terrain

Author(s): Naveen Kumar Chaudhary | D K Trivedi | Roopam Gupta
Volume: 2
Issue: 4
Year: 2011





Robust Energy Management Routing in WSN using Neural Networks

Author(s): Mohd. Uruj Jalil | Ashish Chaturvedi
Volume: 2
Issue: 4
Year: 2011





Off-Line Hand Written Character Recognition Using Radial Basis Function

Author(s): J.ASHOK | DR.E.G.RAJAN
Volume: 2
Issue: 4
Year: 2011





CBVANET: A Cluster Based Vehicular Adhoc Network Model for Simple Highway Communication

Author(s): B. Ramakrishnan | Dr. R. S. Rajesh | R. S. Shaji
Volume: 2
Issue: 4
Year: 2011





Frame Based Symmetric Key Cryptography

Author(s): Uttam Kr. Mondal | Satyendra Nath Mandal | J. PalChoudhury | J.K.Mandal
Volume: 2
Issue: 4
Year: 2011




