ISSN: 0975–3397
Vol. 1, No.3 |
Article # |
Article Title & Authors (Volume 1 Number 3 November 2009) |
Page |
1. |
NeuralNetwork Based 3D Surface Reconstruction
Vincy Joseph and Shalini Bhatia
Abstract | PDF (433KB) |
116-121 |
2. |
VirusPKT: A Search Tool For Assimilating Assorted Acquaintance For Viruses
Jayanthi Manicassamy and P. Dhavachelvan
Abstract | PDF (156KB) |
122-126 |
3. |
Early Detection of Breast Cancer using SVM Classifier Technique
Y.Ireaneus Anna Rejani and Dr.S.Thamarai Selvi
Abstract | PDF (127KB) |
127-130 |
4. |
Heart Rate Variability Analysis Using Threshold of Wavelet Package Coefficients
G. Kheder, A. Kachouri, M. Ben Massoued and M. Samet
Abstract | PDF (256KB) |
131-136 |
5. |
Steganography An Art of Hiding Data
Shashikala Channalli and Ajay Jadhav
Abstract | PDF (333KB) |
137-141 |
6. |
Identifying the Importance of Software Reuse in COCOMO81, COCOMOII
CH.V.M.K.Hari, Prof. Prasad Reddy P.V.G.D,J.N.V.R Swarup Kumar and G.SriRamGanesh
Abstract | PDF (948KB) |
142-147 |
7. |
Access control methodology for sharing of open and domain confined data using Standard Credentials
Dr. Nirmal Dagdee and Ruchi Vijaywargiya
Abstract | PDF (80KB)
|
148-155 |
8. |
Flexibility Concept: Facilitating Post-sale Changes in Online Reservation System
Arif Mushtaq, Sadia Riaz and Dr. Suziah Bt Sulaiman
Abstract | PDF (97KB) |
156-162 |
9. |
Computer Assisted Diagnoses for Red Eye (CADRE)
Muhammad Zubair Asghar, Abdur Rashid Khan and Muhammad Junaid Asghar
Abstract | PDF (162KB) |
163-170 |
10. |
A Glance at Secure Multiparty Computation for Privacy Preserving Data Mining
Dr. Durgesh Kumar Mishra, Purnima Trivedi and Samiksha Shukla
Abstract | PDF (56KB) |
171-175 |
11. |
Comparative Analysis of the Impact of Blogging and Micro-blogging on Market Performance
Devendra Tayal and Satya Komaragiri
Abstract | PDF (219KB) |
176-182 |
12. |
Efficient Power Management using Adaptive Receiver Centric Transport Layer Protocols on Wireless Heterogeneous Networks
Kamalakshi.N, Dr. Naganna H and Dr Ganesh Rao
Abstract | PDF (35KB) |
183-185 |
13. |
Investigation on Quality of Service Provided by Third Tier Internet Service Providers in Nigeria: Akure Cybercafés as case study
Mr. Jide Julius Popoola
Abstract | PDF (130KB) |
186-191 |
14. |
Detection of Optic Disk in Retinal Images - A Comparison
V.Viajaya Kumari and N.SuriyaNarayanan
Abstract | PDF (215KB) |
192-195 |
15. |
Prediction of the Recognition Reliability using Clustering Results
Otar Verulava, Ramaz Khurodze, Tea Todua, Otar Tavdishvili, Taliko Zhvania
Abstract | PDF (57KB) |
196-198 |
16. |
Building Privacy-Preserving C4.5 Decision Tree Classifier on Multi-Parties
Alka Gangrade and Ravindra Patel
Abstract | PDF (127KB) |
199-205 |
17. |
Use of Object-Oriented Concepts in Databases for Effective Mining
Ajita Satheesh and Dr. Ravindra Patel
Abstract | PDF (205KB) |
206-216 |
18. |
Fuzzy Weighted Adaptive Linear Filter for Color Image Restoration Using Morphological Detectors
Anita Sahoo and Dr. Manu Pratap Singh
Abstract | PDF (293KB) |
217-221 |
19. |
Generalizing Agile Software Development Life Cycle
S. Bhalerao, D. Puntambekar and M.Ingle
Abstract | PDF (77KB) |
222-226 |
20. |
Heterogeneous Database integration for Web Applications
V. Rajeswari and Dr. Dharmishtan K. Varughese
Abstract | PDF (101KB) |
227-234 |
21. |
Result Analysis Using Various Pattern Mining Techniques:- A Recommendation to Strengthen the Standard of Technical Education
Dr. Kanak Saxena and D.S Rajpoot
Abstract | PDF (115KB) |
235-238 |
22. |
Application of Genetic Algorithm to Optimize Robustness and Fidelity of Watermarked Images (A conceptual approach)
Mr. Sachin Goyal, Dr Roopam Gupta and Mr. Ashish Bansal
Abstract | PDF (153KB) |
239-242 |
23. |
Semi-automatic Annotation System for OWL-based Semantic Search
C.-H. Liu, S.-C. Hung, J.-L. Jain and J.-Y. Chen
Abstract | PDF (858KB) |
243-247 |
24. |
Generic Web Services: A Step Towards Green Computing
Mydhili K Nair and Dr. V. Gopalakrishna
Abstract | PDF (210KB) |
248-253 |
25. |
Fuzzy - Expert System for Cost Benefit Analysis of Enterprise Information Systems: A Framework
Faith –Michael E. Uzoka
Abstract | PDF (358KB) |
254-262 |
26. |
New Comprehensive Study to Assess Comparatively the QKD, XKMS, KDM in the PKI encryption algorithms
Bilal Bahaa Zaidan, Aws Alaa Zaidan and Harith Mwafak
Abstract | PDF (123KB) |
263-268 |
27. |
Novel Simulation Framework of Three-Dimensional Skull Bio-Metric Measurement
Shihab A. Hameed, B.B.Zaidan, A.A.Zaidan, A.W. Naji and Omar Faroq
Abstract | PDF (645KB) |
269-274 |
28. |
Interactive English to Urdu Machine Translation using Example-Based Approach
Maryam Zafar and Asif Masood
Abstract | PDF (133KB) |
275-282 |
29. |
Vector Quantized Codebook Optimization using K-Means
Dr. H.B. Kekre and Ms. Tanuja K. Sarode
Abstract | PDF (133KB) |
283-290 |
|
|
|