Application of Honeypots to Study Character of Attackers Based on their Accountability in the Network
Author(s): Tushar Kanti | Vineet Richhariya
Volume: 9
Issue: 9
Year: 2011




A Hierarchical View for Level Set Method Based on Segmentation of Non-Constant Intensity Objects
Author(s): M. Janani | D. Kavitha Devi
Volume: 9
Issue: 9
Year: 2011




Real Time Transmission Protocol (RTP) and Real Time Transmission Control Protocol (RTCP) Library Implementation
Author(s): Mohammad Monirul Islam
Volume: 9
Issue: 9
Year: 2011




Lossless Image Compression for Transmitting Over Low Bandwidth Line
Author(s): G. Murugan | E. Kannan | S. Arun
Volume: 9
Issue: 9
Year: 2011




Customer Relationship Management and its Implementation in E-Commerce
Author(s): Mohammad Behrouzian Nejad
Volume: 9
Issue: 9
Year: 2011




Critical Analysis of Design Criteria and Reliability Of Safety Instrumented System (Sis) For Offshore Oil & Gas Production Platforms In India
Author(s): Rakesh Sethi | Manjeet Patterh
Volume: 9
Issue: 9
Year: 2011




Performance of Input and Output Selection Techniques on Routing Efficiency in Network-On-Chip: A Review
Author(s): Mohammad Behrouzian Nejad | Amin Mehranzadeh | Mehdi Hoodgar
Volume: 9
Issue: 9
Year: 2011




Towards Discriminant Analysis Modeling of Web 3.0 Design and Development for Students, Faculty and IT Professionals
Author(s): S. Padma | Ananthi Seshasaayee
Volume: 9
Issue: 9
Year: 2011




A Decision Tree Based Model to Identify the Career Focus of Computer Stream Students in ITES Industry
Author(s): T. Hemalatha | Ananthi Sheshasaayee
Volume: 9
Issue: 9
Year: 2011




Securing the Multilevel Information System
Author(s): Mohan H.S. | A. Raji Reddy
Volume: 9
Issue: 9
Year: 2011




A Method for Fingerprint Authentication for ATM Based Banking Application
Author(s): S. Koteswari | P. John Paul | V. Pradeep kumar | A.B.S.R. Manohar
Volume: 9
Issue: 9
Year: 2011




Role Based Authentication Schemes to Support Multiple Realms for Security Automation
Author(s): Rajasekhar B. M | G. A. Ramachandra
Volume: 9
Issue: 9
Year: 2011




A New Efficient Symbol Timing Synchronization Scheme for MB-OFDM UWB Systems
Author(s): Reza Shahbazian | Bahman Abolhassani
Volume: 9
Issue: 9
Year: 2011




Study of Neural Network Algorithm for Straight-Line Drawings of Planar Graphs
Author(s): Mohamed A. El-Sayed | S. Abdel-Khalek | Hanan H. Amin
Volume: 9
Issue: 9
Year: 2011




A Multilevel Representation of Repository for Software Reuse
Author(s): C. V. Guru Rao | P. Niranjan
Volume: 9
Issue: 9
Year: 2011




Identifying Harmonics By Empirical Mode Decomposition For Effective Control Of Active Filters During Electric Vehicle Charging
Author(s): B.V. Dhananjay | T. Senthil kumar
Volume: 9
Issue: 9
Year: 2011




Multithreaded Image Processing
Author(s): Jamil A. M. Saif | Hamid S. S. Alraimi
Volume: 9
Issue: 9
Year: 2011




Empirical Study of Evolution of Decision making Factors from 1990-2010
Author(s): Mohammed Suliman Al-Shakkah | Wan Rozaini Sheik Osman
Volume: 9
Issue: 9
Year: 2011




Streamed Coefficients Approach for Quantization Table Estimation in JPEG Images
Author(s): Salma Hamdy
Volume: 9
Issue: 9
Year: 2011




GPS L2C Signal Acquisition Algorithms for Resource-Limited Applications in Challenging Environments
Author(s): Nesreen I Ziedan
Volume: 9
Issue: 9
Year: 2011




Using Image Steganography to Establish Covert Communication Channels
Author(s): Keith L Haynes
Volume: 9
Issue: 9
Year: 2011




Virtual Education and its Importance as a New Method in Educational System
Author(s): Mohammad Behrouzian Nejad | Ebrahim Behrouzian Nejad
Volume: 9
Issue: 9
Year: 2011




Parallel Edge Projection and Pruning (PEPP) Based Sequence Graph protrude approach for Closed Itemset Mining
Author(s): kalli Srinivasa Nageswara Prasad | S. Ramakrishna
Volume: 9
Issue: 9
Year: 2011




PAPR Reduction of OFDM Signal Using Error Correcting Code and Selective Mapping
Author(s): Anshu | Himanshu Sharma
Volume: 9
Issue: 9
Year: 2011




Noise Reduction in Fast Fading Channel Using OFDM/TDM
Author(s): A. Sagaya selvaraj | R.S.D. Wahidabanu
Volume: 9
Issue: 8
Year: 2011




Design and Implementation of Extendable Media Streaming Application: Case Study of Windows 2003 Voice Recorder
Author(s): Ezekiel U. Okike | Ayorinde Afolayan
Volume: 9
Issue: 8
Year: 2011




Efficient Cryptographic Technique for Securing and Accessing Outsourced Data
Author(s): Hasan Omar Al-Sakran | Fahad Bin Muhaya | Irina Serguievskaia
Volume: 9
Issue: 8
Year: 2011




Comparision Analysis of Contrast Restoration of Weather Degraded Images using Histogram and MSRCR algorithm
Author(s): Charanpreet Kaur | Danvir Mandal
Volume: 9
Issue: 8
Year: 2011




Aspect-Oriented Approach for the Improvement of the Reliability and Time Performance of a Fault-Tolerant System
Author(s): Khalid Bouragba | Hicham Belhadaoui | Mohammed Ouzzif | Mounir Rifi
Volume: 9
Issue: 8
Year: 2011




A System for Social Network Extraction of Web Complex Structures
Author(s): Amir Ansari | Mehrdad Jalali
Volume: 9
Issue: 8
Year: 2011




Predictive Analytical Model for Requirement Volatility in ICT Projects
Author(s): Malaya Kumar Nayak | Sanghamitra Mohanty
Volume: 9
Issue: 8
Year: 2011




Model Based Cancer Data Classification using Advanced ART Neural Network based Technique
Author(s): Sandhia Valsala | Dr. Sayed Sayeed Ahmed
Volume: 9
Issue: 8
Year: 2011




Data Mining and its Application in Banking Industry: A Survey
Author(s): Mohammad Behrouzian Nejad | Ebrahim Behrouzian Nejad | Mehdi Sadeghzadeh
Volume: 9
Issue: 8
Year: 2011




Analysis of a Novel Hash Function Based upon Chaotic Nonlinear Map with Variable Parameter
Author(s): M. Nouri | S. Abazari Aghdam | P. Pourmahdi | M. Safarinia
Volume: 9
Issue: 8
Year: 2011




Software Requirement Analysis Enhancements by Prioritizing Requirement Attributes Using Rank Based Agents
Author(s): Ashok Kumar | Vinay Goyal
Volume: 9
Issue: 8
Year: 2011




T-Fuzzy Subsemiautomata with Thresholds
Author(s): M. Basheer Ahamed | J. Michael Anna Spinneli
Volume: 9
Issue: 8
Year: 2011




Working in an Inter-Organisational Context: The Relevance of IT Governance and Business-IT Alignment
Author(s): Carl Stolze | Novica Zarvić | Oliver Thomas
Volume: 9
Issue: 8
Year: 2011




Neighbor Based Text Document Clustering
Author(s): Y. Sri Lalitha | N. Sandhya | K. Anuradha | A. Govardhan
Volume: 9
Issue: 8
Year: 2011




Green Computing Approach to Improve Algorithmic Efficiency through Associating Rule Mining
Author(s): Latika Mehrotra
Volume: 9
Issue: 8
Year: 2011




Review of e-Government Policy and Outcomes in the kingdom of Saudi Arabia
Author(s): Mohammed Ateeq Alanezi | Ahmad Kamil Mahmood | Shuib Basri
Volume: 9
Issue: 8
Year: 2011




Tag Recommendation System for Social Annotation System
Author(s): Ali Kohi | Mehrdad Jalali | Seyed Javad Ebrahimi
Volume: 9
Issue: 8
Year: 2011




Performances Evaluation of Enhanced Basic Time Space Priority combined with an AQM
Author(s): Said El Kafhali | Mohamed Hanini | Abdelali El Bouchti | Abdelkrim Haqiq
Volume: 9
Issue: 8
Year: 2011




A Study about Developing Trends in Information Retrieval from Google to Swoogle
Author(s): S. Kalarani | G. V. Uma
Volume: 9
Issue: 8
Year: 2011




A New Expert System for Pediatric Respiratory Diseases by Using Neural Network
Author(s): A. A. Radwan | H. M. El Bakry | H. M. El Hadad
Volume: 9
Issue: 8
Year: 2011




3D Parity Bit Structure: A novel technique to correct maximal number of bits in a simpler way
Author(s): Pushpa R. Suri | Sukhvinder Singh Deora
Volume: 9
Issue: 8
Year: 2011




Facial Tracking Using Echostate Neural Network
Author(s): P. Mayilvahanan | S. Purushothaman | A. Jothi
Volume: 9
Issue: 8
Year: 2011




“Chain of Digital Evidence” Based Model of Digital Forensic Investigation Process
Author(s): Jasmin Ćosić | Zoran Ćosić | Miroslav Bača
Volume: 9
Issue: 8
Year: 2011




Protecting the Content - Using Digest Authentication System and Other Techniques
Author(s): Raman Kumar | Naman Kumar | Neetika Vats
Volume: 9
Issue: 8
Year: 2011




QoS enabled Cluster Based Routing Protocols in MANETs
Author(s): Narendar Reddy Mandhadi | Lakshmi Rajamani
Volume: 9
Issue: 8
Year: 2011




Experimental Study of Various Data Masking Techniques with Random Replacement using Data Volume
Author(s): Ravikumar G K | B. Justus Rabi | Ravindra S. Hegadi | Manjunath T.N | Archana R A
Volume: 9
Issue: 8
Year: 2011



