ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 2 Number 2 March 2010) |
Page |
1. |
A Comparison and SWOT Analysis of Towards 4G Technologies: 802.16e and 3GPP-LTE
Dr. Pathuru Raj, C. Ravichandiran, Dr. Vaithiyanathan
Abstract | PDF (398KB) |
109-114 |
2. |
Entropy Based Texture Features Useful for Automatic Script Identification
M.C. Padma, P.A.Vijaya
Abstract | PDF (307KB) |
115-120 |
3. |
Comparative Study a Performance and Capability Scheduling Techniques in Grid Computing
Mohd Kamir Yusof, Muhamad Azhar Stapa
Abstract | PDF (347KB) |
121-125 |
4. |
A Novel Algorithm for Scaling up the Accuracy of Decision Trees
Ali Mirza Mahmood, K.Mrutunjaya Rao, Kiran Kumar Reddi
Abstract | PDF (344KB) |
126-131 |
5. |
Modified Ant Colony Algorithm for Grid Scheduling
Mr. P.Mathiyalagan, S.Suriya, Dr.S.N.Sivanandam
Abstract | PDF (550KB) |
132-139 |
6. |
Grid Scheduling Using Enhanced PSO Algorithm
Mr. P.Mathiyalagan, U.R.Dhepthie, Dr. S.N.Sivanandam
Abstract | PDF (469KB) |
140-145 |
7. |
Weightage Factor Based Scheme for Performance Improvement in Ad Hoc Networks
Pushpa, Narendra Singh
Abstract | PDF (305KB)
|
146-148 |
8. |
A Layered Approach for Watermarking in Images Based on Huffman Coding
D. Lalitha Bhaskari, P. S. Avadhani, M. Viswanath
Abstract | PDF (470KB) |
149-154 |
9. |
A Bespoke Approach For Face-Recognition Using PCA
Sheifali Gupta, Rupesh Gupta, O.P.Sahu, Ajay Goel
Abstract | PDF (561KB) |
155-158 |
10. |
CRM System Using UI-AKD Approach of D3M
J.N.V.R.Swarup kumar, A.Tejaswi, G.Srinivas, Ajay kumar
Abstract | PDF (492KB) |
159-163 |
11. |
Improved Digital Watermarking Techniques and Data Embedding In Multimedia
Ajay Goel, Rupesh Gupta, O.P.Sahu, Sheifali Gupta
Abstract | PDF (331KB) |
164-168 |
12. |
Dependency through Axiomatic Approach On Rough Set Theory
Nilaratna Kalia, Dr.Debadutta Mohanty
Abstract | PDF (599KB) |
169-176 |
13. |
A Channel Adaptive MAC Protocol with Traffic Aware Distributed Power Management in Wireless Sensor Networks
Binu. G. S , Dr.K. Paulose Jacob
Abstract | PDF (433KB) |
177-182 |
14. |
Performance Comparison and Analysis of DSDV and AODV for MANET
V.Ramesh, Dr.P.Subbaiah, N. Koteswar Rao, M.Janardhana Raju
Abstract | PDF (428KB) |
183-188 |
15. |
Speech Quality Requirements over DSL Networks
Ibrahiem M. M. El Emary
Abstract | PDF (599KB) |
189-197 |
16. |
Applied Medical Informatics Using LabVIEW
Himanshu Shekhar, J.Sam Jeba Kumar, V.Ashok, Dr. A.Vimala Juliet
Abstract | PDF (423KB) |
198-203 |
17. |
Implementation of Multiplatform RIA using User Interface Components
K.MuthuManickam
(This manuscript is removed due to copyright infringement)
Abstract | PDF (386KB) |
204-207 |
18. |
E-Learning Technology for Rural Child Development
S.K.Nayak, Dr.Kalyankar N.V.
Abstract | PDF (444KB) |
208-212 |
19. |
A Novel Density based improved k-means Clustering Algorithm – Dbkmeans
K. Mumtaz, Dr. K. Duraiswamy
Abstract | PDF (459KB) |
213-218 |
20. |
Natural Language Query Processing using Semantic Grammar
Gauri Rao, Chanchal Agarwal, Snehal Chaudhry, Nikita Kulkarni, Dr. S.H. Patil
Abstract | PDF (599KB) |
219-223 |
21. |
A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols
C. Sreedhar, Dr. S. Madhusudhana Verma, Prof. N. Kasiviswanath
Abstract | PDF (475KB) |
224-232 |
22. |
A Novel Technique for Embedding Data in Spatial Domain
V.Madhu Viswanatham, Jeswanth Manikonda
Abstract | PDF (599KB) |
233-236 |
23. |
Security Enhancement Using Mutual Authentication in Existing CDMA Systems
L. Krishna Bharathi, Gnanou Florence Sudha
Abstract | PDF (433KB) |
237-245 |
24. |
Debugging, Advanced Debugging and Runtime Analysis Salim Istyaq, Aufaq Zargar
Abstract | PDF (428KB) |
246-249 |
25. |
Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks
K.Srinivas, B.Kavihta Rani, Dr. A.Govrdhan
Abstract | PDF (599KB) |
250-255 |
26. |
A Heuristic Approach to the Disease Diagnose System Using Machine Learning Algorithms
(An Expert Advisory System for EMU Bird’s Diseases)
P.Naga Jyothi, S .Suresh, M.Surendra Prasad Babu
Abstract | PDF (423KB) |
256-258 |
27. |
Trust Based Security Routing in Mobile Adhoc Networks
K.Seshadri Ramana, Dr. A.A. Chari, Prof. N.Kasiviswanth
Abstract | PDF (386KB) |
259-263 |
28. |
An Efficient Automatic Attendance System using Fingerprint Verification Technique
Chitresh Saraswat, Amit Kumar
Abstract | PDF (444KB) |
264-269 |
29. |
Adaptive Background subtraction in Dynamic Environments Using Fuzzy Logic
Sivabalakrishnan.M, Dr.D.Manjula
Abstract | PDF (459KB) |
270-273 |
30. |
An Analysis of Irregularities in Devanagari Script Writing – A Machine Recognition Perspective
Satish Kumar
Abstract | PDF (599KB) |
274-279 |
31. |
An Incremental framework for a Thai-English Machine Translation System using a LFG tree structure as an Interlingual
Tawee Chimsuk, Surapong Auwatanamongkol
Abstract | PDF (475KB) |
280-288 |
32. |
A Novel Approach using Full Counterpropagation Neural Network for Watermarking
Ashish Bansal, Dr. Sarita Singh Bhadauria
Abstract | PDF (599KB) |
289-296 |
33. |
Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images
Panduranga H.T, Naveen Kumar S.K
Abstract | PDF (433KB) |
297-300 |
34. |
Obstacle Avoidance of mobile robot using PSO based Neuro Fuzzy Technique
Sourav Dutta
Abstract | PDF (428KB) |
301-304 |
35. |
An Efficient Algorithm for Reliability Upper Bound of Distributed Systems with Unreliable Nodes
Mohamed H. S. Mohamed, Yang Xiaozong, Liu Hongwei, Wu Zhibo
Abstract | PDF (599KB) |
305-308 |
36. |
Sliding window approach based Text Binarisation from Complex Textual images
Chitrakala Gopalan, D.Manjula
Abstract | PDF (423KB) |
309-313 |
37. |
Sampling based Association Rules Mining- A Recent Overview
V.Umarani, Dr.M.Punithavalli
Abstract | PDF (386KB) |
314-318 |
38. |
Architecture for efficiently streaming stored video using TCP
G.Srinivasa Rao, Dr.Prof.J.A.Chandulal, Dr.Prof. D.Rajya lakshmi, Dr.G.Appa Rao, Dr.Prof.Arun Singh, D.Rajani, G.Venkateswara Rao
(This manuscript is removed as per instructions given by the author)
Abstract | PDF (444KB) |
319-327 |
39. |
The State of Information and Communication Technology in Iran
Mohsen Gerami
Abstract | PDF (459KB) |
328-332 |
40. |
The CAC Model and QoS Management in Wireless
Multiservice Network
Sonia Ben Rejeb, Zièd Choukair, Sami Tabbane
Abstract | PDF (599KB) |
333-339 |
41. |
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks
S. R. Biradar, Subir Kumar Sarkar, Puttamadappa C
Abstract | PDF (475KB) |
340-344 |
42. |
Computational Approaches for determination of Most Probable RNA Secondary Structure Using Different Thermodynamics Parameters
Binod Kumar, Chetan R Dudhagara, Dr. N. N. Jani
Abstract | PDF (599KB) |
345-351 |
43. |
High payload using mixed codebooks of Vector Quantization
H. B. Kekre, Tanuja K. Sarode, Archana Athawale, Kalpana Sagvekar
Abstract | PDF (433KB) |
352-356 |
44. |
Diabetic Retinopathy-Early Detection Using Image Processing Techniques
V.Vijaya Kumari, N.SuriyaNarayanan
Abstract | PDF (428KB) |
357-362 |
45. |
SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags
Rama N., Suganya R.
Abstract | PDF (599KB) |
363-367 |
46. |
Digital Image Search & Retrieval using FFT Sectors
of Color Images
H. B. Kekre, Dhirendra Mishra
Abstract | PDF (423KB) |
368-372 |
47. |
Performance Evaluation and Comparison of AODV and AOMDV
S. R. Biradar, Koushik Majumder, Subir Kumar Sarkar, Puttamadappa C
Abstract | PDF (386KB) |
373-377 |
48. |
Evaluation of Next Generation Networks Mohsen Gerami
Abstract | PDF (444KB) |
378-381 |
49. |
Frequent Data Generation Using Relative Data Analysis
R.Archana, N.Manikandan
Abstract | PDF (459KB) |
382-386 |
50. |
Software Reliability Growth Model with Logistic-Exponential Test-Effort Function and Analysis of Software Release Policy
Shaik.Mohammad Rafi, Dr.K.Nageswara Rao, Shaheda Akthar Abstract | PDF (599KB) |
387-399 |
51. |
The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks
A.Rajaram, Dr. S. Palaniswami
Abstract | PDF (538KB) |
400-408 |
52. |
Ideal Strategy to Improve Datawarehouse Performance
Fahad Sultan, Dr. Abdul Aziz
Abstract | PDF (432KB) |
409-415 |
53. |
Dynamic Approach for Data Scrubbing Process
Israr Ahmed, Dr. Abdul Aziz
Abstract | PDF (524KB) |
416-423 |
|
|
|