Evaluation of Destructive and Negative Effects of using Computers, the Internet and Computer Games on Students
Author(s): Mehdi Soltani
Volume: 2
Issue: 9
Year: 2010




A Graph-based Testing of UML2 Sequence Diagram
Author(s): Yujian Fu and Sha Li
Volume: 2
Issue: 9
Year: 2010




Overview of Detecting Stego-Content in Corporate Emails : a Web Based Steganalysis
Author(s): Ms. P. T. Anitha and Dr. M. Rajaram
Volume: 2
Issue: 9
Year: 2010




Cloth Deformation Simulation Based on a simplified mass-spring model
Author(s): Yao yu-feng, Xia kai-jian and Zhou jin-cheng
Volume: 2
Issue: 9
Year: 2010




A Modified Feistel Cipher Involving Modular Arithmetic and Interlacing
Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Volume: 2
Issue: 9
Year: 2010




Video Streamed Acces and Use Control Using Digital Rights Management
Author(s): Morad Rafi and Mohsine Eleuldj
Volume: 2
Issue: 9
Year: 2010




Evaluation of Intrusion Detection Techniques for Enterprise Information Security
Author(s): Kanwarpreet Singh, Yogesh Chaba and Amritpal
Volume: 2
Issue: 9
Year: 2010




Detection of Selective Forward Attack in Mobile Wireless Sensor Networks
Author(s): S.Sharmila, and G.Umamaheswari
Volume: 2
Issue: 9
Year: 2010




A 1.2V Fourth Order Low Pass Filter for UMTS Receivers
Author(s): Sandeep Garg, D.S. Ajnar, P.K. Jain
Volume: 2
Issue: 9
Year: 2010




Generating the New S-box and Analyzing the Diffusion Strength to Improve the Security of AES Algorithm
Author(s): Mohan H. S. and A Raji Reddy
Volume: 2
Issue: 9
Year: 2010




A Mechanism for detecting Wormhole Attacks on Wireless Ad Hoc Network
Author(s): Ajit Singh, Kunwar Singh Vaisla
Volume: 2
Issue: 9
Year: 2010




A Novel design of High Speed Adders Using Quaternary Signed Digit Number System
Author(s): Reena Rani, L.K. Singh and Neelam Sharma
Volume: 2
Issue: 9
Year: 2010




The Performance Analysis for MAP Selection Scheme of Hierarchical Mobile IP Networks
Author(s): Shan Zhong, Jin-yi CHANG, Dan Zhao and Hong Zhao
Volume: 2
Issue: 9
Year: 2010




Performance Evaluation of Peer–to-Peer system in Video on Demand with Load Sharing Scheduling Algorithm
Author(s): S.Nagaprasad, A.VinayaBabu, K.Madhukar, D.Marlene G Verghese, V.Mallaiah1and A.Sreelatha
Volume: 2
Issue: 9
Year: 2010




Data Aggregation Trees based Algorithm using Genetic Algorithm in Wireless Sensor Networks
Author(s): Mehdi Dabbaghian, Abolfazl Kalanaki, Hamed Taghvaei, Faezeh Sadat Babamir and Seyed Mehrdad Babamir
Volume: 2
Issue: 9
Year: 2010




A Visual Grammar Approach for TV Program Identification
Author(s): Tarek ZLITNI and Walid MAHDI
Volume: 2
Issue: 9
Year: 2010




Shadow Honeypots
Author(s): Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Michalis Polychronakis,Angelos D. Keromytis, Evangelos P. Markatos
Volume: 2
Issue: 9
Year: 2010




Knowledge Based Computing Using Semantic Web for Grid Applications
Author(s): Dr. M. Rajaram, Mrs. S. Latha Shanmuga Vadivu
Volume: 2
Issue: 9
Year: 2010




Efficient Buffer management Policy DLA for DTN Routing Protocols under Congestion
Author(s): Sulma Rashid, Qaisar Ayub
Volume: 2
Issue: 9
Year: 2010




A Modified Hill Cipher Involving a Pair of Keys and a Permutation
Author(s): V.U.K.Sastry, Aruna Varanasi and S.Udaya Kumar
Volume: 2
Issue: 9
Year: 2010




Evaluating Learning Objects for Students: An adaptive model
Author(s): Sonal Chawla and Dr. R.K. Singla
Volume: 2
Issue: 9
Year: 2010




Factors that Influence Learner-Content Interaction in the Online Top-Down Modeling Model Environment
Author(s): Sha Li, Shirley King, Yujian Fu
Volume: 2
Issue: 9
Year: 2010




Spatial Cluster Coverage of Sensor Networks
Author(s): G.N. Purohit , Megha Sharma
Volume: 2
Issue: 8
Year: 2010




An Adoptive Algorithm for Mining Time-Interval Sequential Patterns
Author(s): Hao-En Chueh and Yo-Hsien Lin
Volume: 2
Issue: 8
Year: 2010




Pairwise Key Establishment in Hierarchical WSN Cluster Network
Author(s): G.N.Purohit, Asmita Singh Rawat
Volume: 2
Issue: 8
Year: 2010




Adaptive Dual Threshold Multi-Class Scheduling for Packet Switch
Author(s): A. A. Abdul Rahman, K. Seman, K. Saadan and A. Azreen
Volume: 2
Issue: 8
Year: 2010




Performance Evaluation of MANET Routing Protocols Under Black Hole Attack
Author(s): M.Umaparvathi and Dr. Dharmishtan K Varughese
Volume: 2
Issue: 8
Year: 2010




Improved User-Centric ID Management Model for Privacy Protection in Cloud Computing
Author(s): Moonyoung Hwang, Jin Kwak
Volume: 2
Issue: 8
Year: 2010




An Exploration of Ad-hoc Network in a Real World builds in a Laboratory Environment
Author(s): Nitiket N Mhala and N K Choudhari
Volume: 2
Issue: 8
Year: 2010




A New Approach to Measure Quality of Image Encryption
Author(s): Alireza Jolfaei and Abdolrasoul Mirghadri
Volume: 2
Issue: 8
Year: 2010




A Low Power High Gain Folded-Cascode CMOS Op-Amp with Slew Rate Enhancement Circuit for 100mW 10-bit 50MS/s High Speed ADC Designed in 0.18um CMOS Technology
Author(s): Bhanu pratap singh dohare, D.S.Ajnar and P.K.Jain
Volume: 2
Issue: 8
Year: 2010




The Electronic Intermediary and the Effect on this For Developing E-Commerce
Author(s): Sahar Kosari, Mohammadreza Banan, Hadi Fanaee Tork and Ali Broumandnia
Volume: 2
Issue: 8
Year: 2010




Low Budget Honeynet Creation and Implementation for Nids and Nips
Author(s): Aathira K. S, Hiran V. Nath, Thulasi N. Kutty, Gireesh Kumar T
Volume: 2
Issue: 8
Year: 2010




The Effect of Image Compression on Face Recognition Algorithms
Author(s): Qeethara Kadhim Al-Shayea, Muzhir Shaban Al-Ani and Muna Suliman Abu Teamah
Volume: 2
Issue: 8
Year: 2010




Stock Market Forecasting using Artificial Neural Network and Statistical Technique: A Comparison Report
Author(s): K S Vaisla and Dr. Ashutosh Kumar Bhatt, Dr. Shishir Kumar
Volume: 2
Issue: 8
Year: 2010




A Survey and Comparison of Various Routing Protocols of Wireless Sensor Network (WSN) and a Proposed New TTDD Protocol Based on LEACH
Author(s): Md. Habibe Azam, Abdullah-Al-Nahid, Md. Abdul Alim3, Md. Ziaul Amin
Volume: 2
Issue: 8
Year: 2010




Students’ Perspectives on their Preferences in the Networked Learning Environment
Author(s): Sha Li
Volume: 2
Issue: 8
Year: 2010




Mathematical Models on Interaction between Computer Virus and Antivirus Software inside a Computer System
Author(s): Bimal Kumar Mishra and Gholam Mursalin Ansari
Volume: 2
Issue: 8
Year: 2010




Secured Interworking and Roaming between 3GPP LTE and Wireless Local Mesh Networks
Author(s): Faouzi Zarai, Ikbel Daly and Lotfi Kamoun
Volume: 2
Issue: 7
Year: 2010




A Large Capacity Steganography Using Bit Plane Complexity Segmentation (BPCS) algorithm for MPEG-4 Video
Author(s): M.Anandkumar, K. Appathurai, P. Nagarajan and Dr.M. Hemalatha
Volume: 2
Issue: 7
Year: 2010




A Reliable Attack-Resistant Authenticated Routing Protocol for Mobile Adhoc Networks
Author(s): M.Rajesh Babu, Dr.S.Selvan
Volume: 2
Issue: 7
Year: 2010




Speech Compression: A Comparative Study between Discreet Wavelet and Wavelet Packet Decomposition
Author(s): Shijo M Joseph, Firoz Shah A and Babu Anto P
Volume: 2
Issue: 7
Year: 2010




A Protocol for Secret Key Infusion from Satellite Transmissions
Author(s): Mohamed Ridza Wahiddin, Noor Shamila Shanaz Noor Sham
Volume: 2
Issue: 7
Year: 2010




Impedance-Based Image Reconstruction of the Field Distribution inside the Closed Phantom Using Finite Element Method
Author(s): Sarwan Kumar, Sneh Anand, Amit Sengupta
Volume: 2
Issue: 7
Year: 2010




Secure Source Routing Protocol for Mobile Adhoc Networks
Author(s): M.Rajesh Babu, Dr.S.Selvan
Volume: 2
Issue: 7
Year: 2010




A Novel Approach for Lossy Compression using Modified Gray Scale Quantization
Author(s): V. U. K. Sastry and Ch. Samson
Volume: 2
Issue: 7
Year: 2010




Design and Implementation of a Hybrid Compression Technique for Ultrasound Images in Telemedicine
Author(s): Divya Mohandass, Dr.J.Janet
Volume: 2
Issue: 7
Year: 2010




An Adaptive Power Resourceful and Energy Conscious Protocol for Multi channel Medium Access Control Layer in Wireless Sensor Networks
Author(s): M. Senthil Kumaran; Dr. R. Rangarajan
Volume: 2
Issue: 7
Year: 2010




Comparative Analysis for IPv4 and IPv6 Protocol to Evaluate Performance
Author(s): M.Anandkumar, K. Appathurai, P. Nagarajan and Dr.M. Hemalatha
Volume: 2
Issue: 7
Year: 2010



