Developing Framework to do the Reliability Testing on webMethods Product Suite

Author(s): Harsh Chincholi | Sandhya S | Rameshchandra V
Volume: 02
Issue: 03
Year: 2012





Maintaining Stored Procedures in Database Application

Author(s): Santosh Kakade | Rohan Thakare | Bhushan Sapare | Dr. B.B. Meshram
Volume: 02
Issue: 03
Year: 2012





A Data mining approach for Monsoon prediction using Satellite image data

Author(s): Dinu John | Dr. B. B. Meshram
Volume: 02
Issue: 03
Year: 2012





An Effective Leading Zero Anticipation for High Speed Floating Point Addition and Subtraction

Author(s): Satish Paidi | Rohit Sreerama | Neelima koppala
Volume: 02
Issue: 03
Year: 2012





Online Imposition Aware Aggregation with Generative Data Flow Model

Author(s): P V Radhakrishna Murty | G.BHARGAVI
Volume: 02
Issue: 03
Year: 2012





Implementation of Magnified Edge Detection using Fuzzy-Canny Logic

Author(s): Hitesh Kapoor | Parikshit Singla
Volume: 02
Issue: 03
Year: 2012





Can Electronic Medical Record Systems Transform Health Care? Potential Health Benefits, Savings, and Cost Using Latest Advancements in ICT for Better interactive Healthcare Learning

Author(s): Onkar S Kemkar | Dr P B Dahikar
Volume: 02
Issue: 03
Year: 2012





Analysis of Software Rejuvenation on ADHOC Conferencing and Media Distribution System

Author(s): Karthika Murthy | Rashmi R
Volume: 02
Issue: 03
Year: 2012





Enhancement of Digital Radio Features-An Approach towards Generation of Waveforms for SDR

Author(s): T.Sailaja rani | Raja Sekhar
Volume: 02
Issue: 03
Year: 2012





Diagnosis of Diabetes Using OLAP and Data Mining Integration

Author(s): Rupa Bagdi | Prof. Pramod Patil
Volume: 02
Issue: 03
Year: 2012





Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

Author(s): P.Satheesh | P.Naresh
Volume: 02
Issue: 03
Year: 2012





Hacking of Passwords in Windows Environment

Author(s): C.K. GOEL | GAURAV ARYA
Volume: 02
Issue: 03
Year: 2012





Incorporating Fault Tolerance in LEACH Protocol for Wireless Sensor Networks

Author(s): Rudranath Mitra | Anurupa Biswas
Volume: 02
Issue: 03
Year: 2012





An Object Oriented Approach to Mining Web Graphs for Recommendations

Author(s): T Murali Mohan | N T Radha | P Suresh Babu | T V Satya Sheela
Volume: 02
Issue: 03
Year: 2012





Analysis of Transaction and Concurrency Mechanism in Two Way Waiting Algorithm for different Databases

Author(s): K.CHANDRA SEKHAR
Volume: 02
Issue: 03
Year: 2012





A Survey on Distributed Explicit Rate Schemes in Multi Input Multi Output Network Systems

Author(s): Vishalakshi Bhavikatti | Mahima M Katti
Volume: 02
Issue: 03
Year: 2012





Synthesis and Image Matching On Structural Patterns Using Affine Transformation

Author(s): S.Vandana | K.TulasiRam | Y.RajaSree | K.Anitha Sheela
Volume: 02
Issue: 03
Year: 2012





Fault Tolerance Approach in Mobile Agents for Information Retrieval Applications Using Check Points

Author(s): Rahul Hans | Ramandeep kaur
Volume: 02
Issue: 03
Year: 2012





Data Analysis of EMR in Distributed Database with Respect to Today's E -Health Apps

Author(s): Onkar S Kemkar | Dr P B Dahikar
Volume: 02
Issue: 03
Year: 2012





Node Deployment and the Impact of Relay Nodes in Wireless Sensor Network

Author(s): Rudranath Mitra | Diya Nandy
Volume: 02
Issue: 03
Year: 2012





An Improved Markov Model Approach to Predict Web Page Caching

Author(s): Meenu Brala | Mamta Dhanda
Volume: 02
Issue: 03
Year: 2012





Fusion of High Spatial and Spectral Resolution Images Based on Spatial Domain and Multiresolution Analysis

Author(s): Kavita Tewari | Leena Shah
Volume: 02
Issue: 03
Year: 2012





Low Complexity Expert Dependent Noise Filtration Algorithm

Author(s): Sasi Rekha.Sanivarapu | P.Padmaja Priyadarsini | Dr.M.VenuGopala Rao
Volume: 02
Issue: 03
Year: 2012





Fuzzy Inspired Hybrid Genetic Approach to Optimize Travelling Salesman Problem

Author(s): Bindu | Pinki Tanwar
Volume: 02
Issue: 03
Year: 2012





Impact of E-Banking on Traditional Banking Services

Author(s): Shilpan Vyas
Volume: 02
Issue: 03
Year: 2012





Feature Specific Criminal Mapping using Data Mining Techniques and Generalized Gaussian Mixture Model

Author(s): Uttam Mande | Y.Srinivas | J.V.R.Murthy
Volume: 02
Issue: 03
Year: 2012





Extracting Answer in QA System: Learning Based

Author(s): Megha Mishra | Vishnu Kumar Mishra | H.R. Sharma
Volume: 02
Issue: 03
Year: 2012





A Method to Detect Uncoverd Faults for Benchmark Circuits

Author(s): Ch.Vinaykumar | A.S.Srinivasa rao
Volume: 02
Issue: 03
Year: 2012





Design and Implementation of a Low Complex Pattern Matching Algorithm for Memory Based Computations

Author(s): SRI M.L.NAIDU | K.NIVEA
Volume: 02
Issue: 03
Year: 2012





Energy Efficient Multicast through Acknowledgment based TPC in Adhoc Wireless Networks

Author(s): SANGAVI.S | P.S.BALAMURUGAN
Volume: 02
Issue: 02
Year: 2012





A Current Mode Second Order Filter Using Dual Output CDTA

Author(s): Sunil Kumar Pandey | Abhay Pratap Singh | Manish Kumar | Sumit Dubey | Pallavie Tyagi
Volume: 02
Issue: 02
Year: 2012





Analysis of Two Way Waiting Algorithm in Databases

Author(s): Sunil Ahuja | Reena Sharma
Volume: 02
Issue: 02
Year: 2012





Development of a Relation between Slot Lengths of Microstrip Antenna and Its Resonant Frequencies Using Soft Computing Tool

Author(s): P.Pradhan | D.Sarkar | P.P.Sarkar
Volume: 02
Issue: 02
Year: 2012





Automation Tool for Comparing the Two Different Printouts From the Same Application for PCL3GUI Based HP Inkjet Printers

Author(s): Akula Bhargavaram | Shanta Rangaswami
Volume: 02
Issue: 02
Year: 2012





Near Duplicate Document Detection Survey

Author(s): Bassma S. Alsulami | Maysoon F. Abulkhair | Fathy E. Eassa
Volume: 02
Issue: 02
Year: 2012





Patient Centric Integrated EHA of Physician Practice Portal Through Cloud Computing Technology

Author(s): Dr VaraPrasad .s. .Kondapalli | Jvsm raju | k Ramakrishna rao | kdbs tanuja
Volume: 02
Issue: 02
Year: 2012





Automated Personal Email Organizer with Information Management and Text Mining Application

Author(s): Dr. Sanjay Tanwani | Neha Rahatekar | Shruti Dubey | Deepka Parmar
Volume: 02
Issue: 02
Year: 2012





Electrically Small Antenna Covered by Two circular Ring Resonators for C, X, KU band applications

Author(s): I.Govardhani | M.VenkataNarayana | Dr.Habibullakhan | K.Rajkamal
Volume: 02
Issue: 02
Year: 2012





Application Denial of Service Attacks Detection using Group Testing Based Approach

Author(s): P.Ravi Kiran Varma | D.Sai Krishna
Volume: 02
Issue: 02
Year: 2012





Modeling and Detection of Camouflaging Worm using IP Traceback

Author(s): S Preetha
Volume: 02
Issue: 02
Year: 2012





Annotation of Function Point Model over Size Estimation

Author(s): Souvik Daw | Avijit Das | Parthasarathi paul
Volume: 02
Issue: 02
Year: 2012





The Dynamic Buffer Sizing Strategies for 802.11 Based Wireless Networks

Author(s): Santosh Hosamani | G.S.Nagaraja
Volume: 02
Issue: 02
Year: 2012





RC4 Enrichment Algorithm Approach for Selective Image Encryption

Author(s): Pramod Kumar | Pushpendra Kumar Pateriya
Volume: 02
Issue: 02
Year: 2012





Vehicle Classification using Novel EDGE Detection Technique

Author(s): Poonam Yadav | Prof. Mandeep Kaur
Volume: 02
Issue: 01
Year: 2012





Techniques and Programs Used in Bidding and Playing phases of Imperfect Information Game – an Overview

Author(s): M DHARMALINGAM | Dr E CHANDRA
Volume: 02
Issue: 01
Year: 2012





Rectangular Patch Array Antenna with Liquid Crystal Substrate for Ka and Q Band Applications

Author(s): I.Govardhani | M.Venkata Narayana
Volume: 02
Issue: 01
Year: 2012





Nonlinear filtering in ECG Signal Enhancement

Author(s): N. Siddiah | T.Srikanth | Y. Satish Kumar
Volume: 02
Issue: 01
Year: 2012





Design and Implementation of 64 Bit RISC Processor Using System on Chip (SOC)

Author(s): Y. B. N. V. Bhaskar | D. Rajesh Setty | Addanki Purna Ramesh
Volume: 02
Issue: 01
Year: 2012




