ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 2 Number 3 May 2010) |
Page |
1. |
A Study on the Effectiveness of Different Patch Size and Shape for Eyes and Mouth Detection
Lim Huey Charn, Liyana Nuraini Rasid, Shahrel A. Suandi
Abstract | PDF (1070KB) |
424-432 |
2. |
Generalisation of RSA Scheme using fundamental groups and ZKIP
S.Samundeeswari, M.Thiyagarajan
Abstract | PDF (363KB) |
433-436 |
3. |
An Analysis on Endaira:A Provably Secure On-Demand Source Routing Protocol
A.F.A. Abidin, N.S.M. Usop, N.H.N. Zulkifli
Abstract | PDF (180KB) |
437-442 |
4. |
Exclusive Survey of Integrating Testing For Component-Based System
Mahesh Kumar Pawar, Dr. Narendra S. Choudhari, Dr. Ravindra Patel
This manuscript is removed due to copyright infringement
Abstract | PDF (7KB) |
443-450 |
5. |
Robust TCP: An improvement on TCP protocol
Seifeddine Kadry, Issa Kamar, Ali Kalakech, Mohamad Smaili
Abstract | PDF (496KB) |
451-456 |
6. |
Minimizing weighted mean flow time in open shop scheduling with time-dependent weights and intermediate storage cost
Seyed Hossein Hashemi Doulabi, Amir Ardestani jaafari, Mohsen Akbarpour Shirazi
Abstract | PDF (415KB) |
457-460 |
7. |
Ubiquitous Computing-Approach to Intelligence Building Intelligent Network
R.N.Khobragad, S.N. Sawalkar
Abstract | PDF (658KB)
|
461-467 |
8. |
Design of intelligent multinode Sensor networking
Mr. N.Suresh kumar, Dr. D.V.Rama Koti Reddy, Mr.B.Promod Kumar, S. Lavanya
Abstract | PDF (727KB) |
468-472 |
9. |
MAX-MIN ANT OPTIMIZER FOR PROBLEM OF UNCERTAINITY
Mr.K.Sankar, Dr. K.Krishnamoorthy
Abstract | PDF (455KB) |
473-480 |
10. |
Emergence of Norms in a Society of Heterogeneous Agents Influenced by the Rules of Cellular Automata Techniques
P.Chakrabarti, J.K. Basu
Abstract | PDF (362KB) |
481-486 |
11. |
Text Summarization and Discovery of Frames and Relationship from Natural Language Text - A R&D Methodology
P.Chakrabarti, J.K. Basu
Abstract | PDF (400KB) |
487-492 |
12. |
Protection of Public Network Communication by using Internet Protocol Security
Mr.Premchand, B.Ambhore, Dr. B.B.Meshram, Ku.A.D.Wankhade
Abstract | PDF (392KB) |
493-499 |
13. |
Analysis of Hopfield Autoassociative Memory in the Character Recognition
Yash Pal Singh, Abhilash Khare, Amit Gupta
Abstract | PDF (376KB) |
500-503 |
14. |
SRGM with logistic-exponential testing-effort with change-point and Analysis
of Optimal release policies based on increasing the test efficiency
Shaik. Mohammad Rafi, Dr.K.Nageswara Rao
Abstract | PDF (1129KB) |
504-516 |
15. |
An Ellipsoidal 3D Shape Representation and Wavelet Transform Feature Descriptor for 3D shape Retrieval
Asma Khatun, Prof. Wang Yin Chai
Abstract | PDF (775KB) |
517-522 |
16. |
Index Structure for the Multi-scale Representation of Multi-dimensional Spatial Data in WebGIS
ZhihanLV, GeCHEN, RuinaMA, YongHAN, TaoZhang
Abstract | PDF (829KB) |
523-530 |
17. |
A Cascaded Incoherent Spectrum Sliced Transversal Photonic Microwave Filters-An Analysis
R. K. Jeyachitra, Dr. (Mrs.) R. Sukanesh
Abstract | PDF (570KB) |
531-535 |
18. |
Analysis and Comparative Study of Clock Synchronization Schemes in Wireless Sensor Networks
Surendra Rahamatkar, Dr. Ajay Agarwal, Narendra Kumar
Abstract | PDF (437KB) |
536-541 |
19. |
IMPLEMENTATION OF TASK DISSEMINATION IN WIRELESS SENSOR NETWORKS USING MESH TOPOLOGY
B.Maheswari, Dr.S.Karthik, Prof. T.Rajendran
Abstract | PDF (360KB) |
542-546 |
20. |
Trust-based Routing Security in MANETS
R.Balakrishna, U.Rajeswar Rao, G.A.Ramachandra, M.S.Bhagyashekar
Abstract | PDF (533KB) |
547-553 |
21. |
Adaptability of IEEE 802.15.4(Zigbee) Protocol for Wireless Sensor network
Lalit Saraswat, Pankaj Singh Yadav, Rekha Rani
Abstract | PDF (474KB) |
554-559 |
22. |
Appearance Based Recognition of American Sign Language Using Gesture Segmentation
Vaishali S. Kulkarni, Author2 Dr. S.D.Lokhande
Abstract | PDF (195KB) |
560-565 |
23. |
Test Case Reduction Technique for
Semantic Based Web Services
A. Askaruinisa, A.M. Abirami
Abstract | PDF (649KB) |
566-576 |
24. |
Educational Approach of Refactoring in Facilitating Reverse Engineering
Mazni Omar, Sharifah Lailee Syed-Abdullah, Kamaruzaman Jusoff, Azman Yasin, Haslina Mohd
Abstract | PDF (410KB) |
577-581 |
25. |
An Efficient and Robust Metacrawler with Parallel Activities
Vimal Bibhu, Narendra Kumar, Mohammad Islam, Shashank Bhardwaj
Abstract | PDF (317KB) |
582-585 |
26. |
Power-efficient Routing & Increased Yield Approach For WSNs
Kalpana Sharma, Anurag S. Rathor, S. R. Biradar, M.K Ghose
Abstract | PDF (786KB) |
586-592 |
27. |
Analysis QoS Parameters for MANETs Routing Protocols
S. R. Biradar, Subir Kumar Sarkar, Rajanna K M, Puttamadappa C
Abstract | PDF (509KB) |
593-599 |
28. |
QUALITY ASSESSMENT OF CUSTOMER REVIEWS EXTRACTED FROM WEB PAGES : A REVIEW CLUSTERING APPROACH
P.S Hiremath, Siddu P. Algur, S. Shivashankar
Abstract | PDF (484KB) |
600-606 |
29. |
A Systematic Approach for Constructing Static Class
Diagrams from Software Requirements
Nabil Arman, Khalid Daghameen
Abstract | PDF (545KB) |
607-613 |
30. |
A Novel Approach for Controlling a Size of a Test Suite with Simple Technique
B.Galeebathullah, C.P.Indumathi
Abstract | PDF (384KB) |
614-618 |
31. |
SECURITY MEASURES OF RANDVUL KEYBOARD
RADHA DAMODARAM, Dr. M.L. VALARMATHI
Abstract | PDF (459KB) |
619-625 |
32. |
Effect of Normalized Scale on Design of Rectangular Microstrip Antenna by using FFBP
Abhilasha Mishra, Vaishali Bhagile, P.M.Pati
Abstract | PDF (446KB) |
626-629 |
33. |
A Handoff Technique to Reduce False-Handoff Probability in Next Generation Wireless Networks
Debabrata Sarddar, Kaushik Mandal, Tapas Jana, Utpal Biswas, M.K. Naskar
Abstract | PDF (423KB) |
630-634 |
34. |
Fuzzy time series forecasting of wheat production
Narendra Kumar, Sachin Ahuja, Shashank Bhardwaj
Abstract | PDF (394KB) |
635-640 |
35. |
Approximate string matching Algorithm
Narendra Kumar, Vipin Kumar, Amit Kumar
Abstract | PDF (352KB) |
641-644 |
36. |
Secure Routing In Wireless Sensor Networks
A.Senthilkumar, Dr. C.Chandrasekar
Abstract | PDF (608KB) |
645-655 |
37. |
Secure Web Service Using Call by Contract
R.Ashitha
Abstract | PDF (558KB) |
656-663 |
38. |
Analyzing security of Authenticated Routing Protocol (ARAN)
Seema Mehla, Bhawna Gupta, Preeti Nagrath
Abstract | PDF (357KB) |
664-668 |
39. |
The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol
Seema Mehla, Bhawna Gupta, Preeti Nagrath
Abstract | PDF (374KB) |
669-673 |
40. |
Evaluating Web Sites Based on GHAP
Bindu Madhuri .Ch, Padmaja.M, Dr.J.A.Chandulal
Abstract | PDF (357KB) |
674-679 |
41. |
Enhancement of Split Multipath Routing Protocol in MANET
Dhirendra Kumar Sharma, Sanjay Kumar Biswash, Chiranjeev Kumar
Abstract | PDF (789KB) |
680-686 |
42. |
Deriving Association between Urban and Rural Students Programming Skills
L.Arockiam, S.Charles, I.Carol, P.Bastin Thiyagaraj, S.Yosuva, V. Arulkumar
Abstract | PDF (657KB) |
687-690 |
43. |
Privacy for Semantic Web Mining using Advanced DSA – Spatial LBS Case Study
Dr.D.Sravan Kumar, M.Upendra Kumar
Abstract | PDF (408KB) |
691-694 |
44. |
Multimedia Streaming Technology n 4G Mobile Communication Systems
Govind Singh Tanwar, Ganesh Singh, Vishal Gour
Abstract | PDF (420KB) |
695-699 |
45. |
A NEW HIERARCHICAL TRANSACTION MODEL FOR MOBILE ADHOC NETWORK ENVIRONMENT
Vikram Bali, Rajkumar Singh Rathore
Abstract | PDF (394KB) |
700-705 |
46. |
Current Research Work on Routing Protocols for MANET: A Literature Survey
G.Vijaya Kumar, Y.Vasudeva Reddy, Dr.M.Nagendra
Abstract | PDF (399KB) |
706-713 |
47. |
Indoor Environment Mobile Robot Localization
IMTHIYAS M.P
Abstract | PDF (507KB) |
714-719 |
48. |
FCE: A QUALITY METRIC FOR COTS BASED SOFTWARE DESIGN
M.V.VIJAYA SARADHI, B.R.SASTRY
Abstract | PDF (395KB) |
720-725 |
49. |
Optimized Query Plan Algorithm for the Nested Query
Chittaranjan Pradhan, Sushree Sangita Jena, Prasanta kumar Mahapatra
Abstract | PDF (361KB) |
726-730 |
50. |
A Comparative Study for Deblured Average Blurred Images
Mr. Salem Saleh Al-amri, Dr. N.V. Kalyankar, Dr. Khamitkar S.D
Abstract | PDF (1407KB) |
731-733 |
51. |
A BICS Design to Detect Soft Error in CMOS SRAM
N.M.Sivamangai, Dr. K. Gunavathi, P. Balakrishnan
Abstract | PDF (624KB) |
734-740 |
52. |
INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS
P.Shanthi Bala
Abstract | PDF (403KB) |
741-745 |
53. |
A Fast Algorithm for Mining Multilevel Association Rule Based on Boolean Matrix
Pratima Gautam, K. R. Pardasani
Abstract | PDF (502KB) |
746-752 |
54. |
A Framework for Incremental Hidden Web Crawler
Rosy Madaan, Ashutosh Dixit, A.K. Sharma, Komal Kumar Bhatia
Abstract | PDF (527KB) |
753-758 |
55. |
An agent -based Intelligent System to enhance E-Learning through Mining Techniques
S.Prakasam, Prof.Dr.R.M.Suresh
Abstract | PDF (392KB) |
759-763 |
56. |
IMPROVED PROTECTION IN VIDEO STEGANOGRAPHY USED COMPRESSED VIDEO BITSTREAMS
S. Suma Christal Mary M.E
Abstract | PDF (403KB) |
764-766 |
57. |
A Hybrid System for Fingerprint Identification
Shabana Tadvi, Prof. Mahesh Kolte
Abstract | PDF (484KB) |
767-771 |
58. |
Integration of Web mining and web crawler: Relevance and State of Art
Subhendu kumar pani, Deepak Mohapatra, Bikram Keshari Ratha
Abstract | PDF (366KB) |
772-776 |
59. |
Analysis of Security Features in 5 Layer Internet Model
Suhas J Manangi, Parul Chaurasia, Mahendra Pratap Singh
Abstract | PDF (393KB) |
777-781 |
60. |
Application of Markov Process Model and Entropy Analysis in Data Classification and Information Retrieval
Udayan Ghose, C.S.Rai, Yogesh Singh
Abstract | PDF (378KB) |
782-785 |
61. |
Improve Performance of Extract, Transform and Load (ETL) in Data Warehouse
Vishal Gour, Dr. S.S.Sarangdevot, Govind Singh Tanwar, Anand Sharma
Abstract | PDF (317KB) |
786-789 |
62. |
Gesture Based Educational Software for Children with Acquired Brain Injuries
Er. Zainab Pirani, Dr. Mahesh Kolte
Abstract | PDF (872KB) |
790-794 |
63. |
CP-Miner : A hybrid Approach for Colorectal Polyp
Detection
Ms. M. Vanitha, Prof. P. Tamije Selvy, Dr. V.Palanisamy, Prof. AR.Sivakumaran
Abstract | PDF (381KB) |
795-798 |
64. |
Co-Recursively Enumerable Triods with Computable Endpoints
Zvonko Iljazović
Abstract | PDF (445KB) |
799-803 |
65. |
IMAGE SEGMENTATION BY USING EDGE DETECTION
Mr. Salem Saleh Al-amri, Dr. N.V. Kalyankar, Dr. Khamitkar S.D
Abstract | PDF (485KB) |
804-807 |
66. |
Implementation of Secured password for Web applications using two server model
Dr.R.Shashikumar, C.N.Vijay kumr, H.M.Kotresh, Vijay kumar K
Abstract | PDF (832KB) |
808-817 |
67. |
Synthesis of Linear Array of Parallel Dipole Antennas with Minimum Standing Wave Ratio Using Simulated Annealing and Particle Swarm Optimization approach
Banani Basu, G. K. Mahanti
This manuscript is removed by the author.
Abstract | PDF |
818-825 |
68. |
Design Patterns: A Resource for Reverse Engineering
P. Niranjan Reddy, Jayadev Gyani, P.R.K. Murti
Abstract | PDF (333KB) |
826-830 |
69. |
A new similarity measure for image segmentation
M.Thiyagarajan, S.Samundeeswari
Abstract | PDF (503KB) |
831-835 |
70. |
Automatic Web Image Categorization by Image Content:A case study with Web Document Images
Dr. Murugappan. S, Abirami S, Mizpha Poorana Selvi S
Abstract | PDF (518KB) |
836-840 |
71. |
An Improved Low Complex Spatially Scalable ACC-DCT Based Video Compression Method
G.Suresh, P.Epsiba, Dr.M.Rajaram, Dr.S.N.Sivanandam
Abstract | PDF (1012KB) |
841-847 |
72. |
A Effective and Complete Preprocessing for Web Usage Mining
Mr. Sanjay Bapu Thakare, Prof. Sangram. Z. Gawali
Abstract | PDF (433KB) |
848-851 |
73. |
FUZZY LOGIC BASED SOFTWARE PROCESS IMPROVIZATION FRAMEWORK FOR INDIAN SMALL SCALE SOFTWARE ORGANIZATIONS
A.M.Kalpana, Dr.A.Ebenezer Jeyakumar
Abstract | PDF (493KB) |
852-859 |
74. |
Preserving the Privacy and Sharing the Data using Classification on Perturbed Data
P.Kamakshi, Dr. A.Vinaya Babu
Abstract | PDF (420KB) |
860-864 |
75. |
Guaranteed Packet Transfer in MANET In and Out of Coverage Areas and Energy Saving Using Random Casting
Mrs. S.Gomathi, Dr K.Duraiswamy
Abstract | PDF (522KB) |
865-869 |
77. |
Multi Subgroup Data Compression Technique Using Switch Code
Rajesh Daheriya, Sushil Kumar, Vijay Chaudhari, Dr. Bhupendra Verma
Abstract | PDF (458KB) |
870-879 |
78. |
On the Design of Simulation Package for GPRS Network
Ibrahiem M. M. El Emary, Khalid S. Husain
Abstract | PDF (745KB) |
880-888 |
79. |
Architecture for Mobile based Face Detection / Recognition
Shishir Kumar, Priyank Singh, Vivek Kumar
Abstract | PDF (503KB) |
889-897 |
80. |
Analysis of Secure Real Time Transport Protocol on VoIP over Wireless LAN in Campus Environment
Mohd Nazri Ismail
Abstract | PDF (617KB) |
898-902 |
|
|
|