e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

ISSUES

Current Issue
Archives

CALL FOR PAPERS

CFP 2021

TOPICS

IJCSE Topics

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 2 ISSUE 2 2010

ISSN: 0975–3397

Article # Article Title & Authors (Volume 2 Number 2 March 2010) Page
1. A Comparison and SWOT Analysis of Towards 4G Technologies: 802.16e and 3GPP-LTE
Dr. Pathuru Raj, C. Ravichandiran, Dr. Vaithiyanathan
Abstract | PDFIconPDF (398KB)
109-114
2. Entropy Based Texture Features Useful for Automatic Script Identification
M.C. Padma, P.A.Vijaya
Abstract | PDFIconPDF (307KB)
115-120
3. Comparative Study a Performance and Capability Scheduling Techniques in Grid Computing
Mohd Kamir Yusof, Muhamad Azhar Stapa
Abstract | PDFIconPDF (347KB)
121-125
4. A Novel Algorithm for Scaling up the Accuracy of Decision Trees
Ali Mirza Mahmood, K.Mrutunjaya Rao, Kiran Kumar Reddi
Abstract | PDFIconPDF (344KB)
126-131
5. Modified Ant Colony Algorithm for Grid Scheduling
Mr. P.Mathiyalagan, S.Suriya, Dr.S.N.Sivanandam
Abstract | PDFIconPDF (550KB)
132-139
6. Grid Scheduling Using Enhanced PSO Algorithm
Mr. P.Mathiyalagan, U.R.Dhepthie, Dr. S.N.Sivanandam
Abstract | PDFIconPDF (469KB)
140-145
7. Weightage Factor Based Scheme for Performance Improvement in Ad Hoc Networks
Pushpa, Narendra Singh
Abstract | PDFIconPDF (305KB)
146-148
8. A Layered Approach for Watermarking in Images Based on Huffman Coding
D. Lalitha Bhaskari, P. S. Avadhani, M. Viswanath
Abstract | PDFIconPDF (470KB)
149-154
9. A Bespoke Approach For Face-Recognition Using PCA
Sheifali Gupta, Rupesh Gupta, O.P.Sahu, Ajay Goel
Abstract | PDFIconPDF (561KB)
155-158
10. CRM System Using UI-AKD Approach of D3M
J.N.V.R.Swarup kumar, A.Tejaswi, G.Srinivas, Ajay kumar
Abstract | PDFIconPDF (492KB)
159-163
11. Improved Digital Watermarking Techniques and Data Embedding In Multimedia
Ajay Goel, Rupesh Gupta, O.P.Sahu, Sheifali Gupta
Abstract | PDFIconPDF (331KB)
164-168
12. Dependency through Axiomatic Approach On Rough Set Theory
Nilaratna Kalia, Dr.Debadutta Mohanty
Abstract | PDFIconPDF (599KB)
169-176
13. A Channel Adaptive MAC Protocol with Traffic Aware Distributed Power Management in Wireless Sensor Networks
Binu. G. S , Dr.K. Paulose Jacob
Abstract | PDFIconPDF (433KB)
177-182
14. Performance Comparison and Analysis of DSDV and AODV for MANET
V.Ramesh, Dr.P.Subbaiah, N. Koteswar Rao, M.Janardhana Raju
Abstract | PDFIconPDF (428KB)
183-188
15. Speech Quality Requirements over DSL Networks
Ibrahiem M. M. El Emary
Abstract | PDFIconPDF (599KB)
189-197
16. Applied Medical Informatics Using LabVIEW
Himanshu Shekhar, J.Sam Jeba Kumar, V.Ashok, Dr. A.Vimala Juliet
Abstract | PDFIconPDF (423KB)
198-203
17. Implementation of Multiplatform RIA using User Interface Components
K.MuthuManickam
(This manuscript is removed due to copyright infringement)
Abstract | PDFIconPDF (386KB)
204-207
18. E-Learning Technology for Rural Child Development
S.K.Nayak, Dr.Kalyankar N.V.
Abstract | PDFIconPDF (444KB)
208-212
19. A Novel Density based improved k-means Clustering Algorithm – Dbkmeans
K. Mumtaz, Dr. K. Duraiswamy
Abstract | PDFIconPDF (459KB)
213-218
20. Natural Language Query Processing using Semantic Grammar
Gauri Rao, Chanchal Agarwal, Snehal Chaudhry, Nikita Kulkarni, Dr. S.H. Patil
Abstract | PDFIconPDF (599KB)
219-223
21. A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols
C. Sreedhar, Dr. S. Madhusudhana Verma, Prof. N. Kasiviswanath
Abstract | PDFIconPDF (475KB)
224-232
22. A Novel Technique for Embedding Data in Spatial Domain
V.Madhu Viswanatham, Jeswanth Manikonda
Abstract | PDFIconPDF (599KB)
233-236
23. Security Enhancement Using Mutual Authentication in Existing CDMA Systems
L. Krishna Bharathi, Gnanou Florence Sudha
Abstract | PDFIconPDF (433KB)
237-245
24. Debugging, Advanced Debugging and Runtime Analysis
Salim Istyaq, Aufaq Zargar
Abstract | PDFIconPDF (428KB)
246-249
25. Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks
K.Srinivas, B.Kavihta Rani, Dr. A.Govrdhan
Abstract | PDFIconPDF (599KB)
250-255
26. A Heuristic Approach to the Disease Diagnose System Using Machine Learning Algorithms
(An Expert Advisory System for EMU Bird’s Diseases)
P.Naga Jyothi, S .Suresh, M.Surendra Prasad Babu
Abstract | PDFIconPDF (423KB)
256-258
27. Trust Based Security Routing in Mobile Adhoc Networks
K.Seshadri Ramana, Dr. A.A. Chari, Prof. N.Kasiviswanth
Abstract | PDFIconPDF (386KB)
259-263
28. An Efficient Automatic Attendance System using Fingerprint Verification Technique
Chitresh Saraswat, Amit Kumar
Abstract | PDFIconPDF (444KB)
264-269
29. Adaptive Background subtraction in Dynamic Environments Using Fuzzy Logic
Sivabalakrishnan.M, Dr.D.Manjula
Abstract | PDFIconPDF (459KB)
270-273
30. An Analysis of Irregularities in Devanagari Script Writing – A Machine Recognition Perspective
Satish Kumar
Abstract | PDFIconPDF (599KB)
274-279
31. An Incremental framework for a Thai-English Machine Translation System using a LFG tree structure as an Interlingual
Tawee Chimsuk, Surapong Auwatanamongkol
Abstract | PDFIconPDF (475KB)
280-288
32. A Novel Approach using Full Counterpropagation Neural Network for Watermarking
Ashish Bansal, Dr. Sarita Singh Bhadauria
Abstract | PDFIconPDF (599KB)
289-296
33. Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images
Panduranga H.T, Naveen Kumar S.K
Abstract | PDFIconPDF (433KB)
297-300
34. Obstacle Avoidance of mobile robot using PSO based Neuro Fuzzy Technique
Sourav Dutta
Abstract | PDFIconPDF (428KB)
301-304
35. An Efficient Algorithm for Reliability Upper Bound of Distributed Systems with Unreliable Nodes
Mohamed H. S. Mohamed, Yang Xiaozong, Liu Hongwei, Wu Zhibo
Abstract | PDFIconPDF (599KB)
305-308
36. Sliding window approach based Text Binarisation from Complex Textual images
Chitrakala Gopalan, D.Manjula
Abstract | PDFIconPDF (423KB)
309-313
37. Sampling based Association Rules Mining- A Recent Overview
V.Umarani, Dr.M.Punithavalli
Abstract | PDFIconPDF (386KB)
314-318
38. Architecture for efficiently streaming stored video using TCP
G.Srinivasa Rao, Dr.Prof.J.A.Chandulal, Dr.Prof. D.Rajya lakshmi, Dr.G.Appa Rao, Dr.Prof.Arun Singh, D.Rajani, G.Venkateswara Rao
(This manuscript is removed as per instructions given by the author)
Abstract | PDFIconPDF (444KB)
319-327
39. The State of Information and Communication Technology in Iran
Mohsen Gerami
Abstract | PDFIconPDF (459KB)
328-332
40. The CAC Model and QoS Management in Wireless Multiservice Network
Sonia Ben Rejeb, Zièd Choukair, Sami Tabbane
Abstract | PDFIconPDF (599KB)
333-339
41. A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks
S. R. Biradar, Subir Kumar Sarkar, Puttamadappa C
Abstract | PDFIconPDF (475KB)
340-344
42. Computational Approaches for determination of Most Probable RNA Secondary Structure Using Different Thermodynamics Parameters
Binod Kumar, Chetan R Dudhagara, Dr. N. N. Jani
Abstract | PDFIconPDF (599KB)
345-351
43. High payload using mixed codebooks of Vector Quantization
H. B. Kekre, Tanuja K. Sarode, Archana Athawale, Kalpana Sagvekar
Abstract | PDFIconPDF (433KB)
352-356
44. Diabetic Retinopathy-Early Detection Using Image Processing Techniques
V.Vijaya Kumari, N.SuriyaNarayanan
Abstract | PDFIconPDF (428KB)
357-362
45. SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags
Rama N., Suganya R.
Abstract | PDFIconPDF (599KB)
363-367
46. Digital Image Search & Retrieval using FFT Sectors of Color Images
H. B. Kekre, Dhirendra Mishra
Abstract | PDFIconPDF (423KB)
368-372
47. Performance Evaluation and Comparison of AODV and AOMDV
S. R. Biradar, Koushik Majumder, Subir Kumar Sarkar, Puttamadappa C
Abstract | PDFIconPDF (386KB)
373-377
48. Evaluation of Next Generation Networks
Mohsen Gerami
Abstract | PDFIconPDF (444KB)
378-381
49. Frequent Data Generation Using Relative Data Analysis
R.Archana, N.Manikandan
Abstract | PDFIconPDF (459KB)
382-386
50. Software Reliability Growth Model with Logistic-Exponential Test-Effort Function and Analysis of Software Release Policy
Shaik.Mohammad Rafi,    Dr.K.Nageswara Rao,  Shaheda Akthar
Abstract | PDFIconPDF (599KB)
387-399
51. The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks
A.Rajaram, Dr. S. Palaniswami
Abstract | PDFIconPDF (538KB)
400-408
52. Ideal Strategy to Improve Datawarehouse Performance
Fahad Sultan, Dr. Abdul Aziz
Abstract | PDFIconPDF (432KB)
409-415
53. Dynamic Approach for Data Scrubbing Process
Israr Ahmed, Dr. Abdul Aziz
Abstract | PDFIconPDF (524KB)
416-423
     
All Rights Reserved © 2009-2024 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License