ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 2 Number 5 August 2010) |
Page |
1. |
A Survey On Coding Algorithms In Medical Image Compression
S.Bhavani, Dr.K.Thanushkodi
Abstract | PDF |
1429-1434 |
2. |
AN ALGORITHM FOR STEERING CONTROL WITH SIMULATION RESULTS
Apeksha V. Sakhare, Prof. Dr. V. M. Thakare, Prof. R. V. Dharaskar
Abstract | PDF |
1435-1438 |
3. |
E-Commerce Security using PKI approach
Mr. Vikas Rattan, Er. Mirtunjay Sinha, Vikram Bali, Rajkumar Singh Rathore
Abstract | PDF |
1439-1444 |
4. |
A New Look to Traversal Algorithms Using Set Construct Data Structure
Vineet Kumar Sharma, Adesh Kumar Pandey, Dr. V.K. Srivastava
Abstract | PDF |
1445-1448 |
5. |
A Journey from floppy disk to cloud storage
Bindu Trikha
Abstract | PDF |
1449-1452 |
6. |
Neuro Language Generator
P. Dinadayalan, Gnanambigai Dinadayalan, R. Vasantha Kumari
Abstract | PDF |
1453-1461 |
7. |
Test Case Prioritization for Regression Testing based on Severity of Fault
R. Kavitha, Dr. N. Sureshkumar
Abstract | PDF |
1462-1466 |
8. |
Analyzing Motivation of Private Engineering College Students: A Fuzzy Logic Approach (A case study of private Engineering College)
Abhishek Srivastava, Ayushi Rastogi, Dr. V.K. Srivastava, Kritika Saxena, Sangeeta Arora
Abstract | PDF |
1467-1476 |
9. |
Spectrum sensing and Spectrum shifting implementation in a Cognitive Radio based IEEE 802.22 Wireless Regional Area Network
Mithun Chakraborty, R.Bera, P.Pradhan, R.Pradhan, S.Sunar
Abstract | PDF |
1477-1481 |
10. |
Design and Simulation for Producing Two Amplitude Matched Anti-phase Sine Waveforms Using ±2.5 V CMOS Current-Mode Approach
Anil Kumar Sharma, Dipankar Pal
Abstract | PDF |
1482-1486 |
11. |
Short Message Service using SMS Gateway
Veena K.Katankar, Dr.V.M.Thakare
Abstract | PDF |
1487-1491 |
12. |
An Overview of Side Channel Attacks and Its Countermeasures using Elliptic Curve Cryptography
M.Prabu, R.Shanmugalakshmi
Abstract | PDF |
1492-1495 |
13. |
Next Generation High Speed Computing Using Photonic Based Technology
Umer Farooq, M. Aqeel Iqbal, Muhammad Ahsan, Mashood Malik
Abstract | PDF |
1496-1503 |
14. |
Evolutionary Aspects Of Windows Operating System To Enhance Existing Technology
M. Asad Kayani, M. Aqeel Iqbal, Waleed Abrar, Nabeel Ijaz, Maham Rabbani
Abstract | PDF |
1504-1513 |
15. |
Modern Trends Used In Operating Systems For High Speed Computing Applications
Qurat-ul-Ain Malik, M. Aqeel Iqbal, Nauman Khan, Hamza Khan, Haider Ali
Abstract | PDF |
1514-1523 |
16. |
CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks
Dr.G.Padmavathi, Dr.P.Subashini, Ms.D.Devi Aruna
Abstract | PDF |
1524-1531 |
17. |
Improving Ischemic Beat Classification Using Fuzzy-Genetic Based PCA And ICA
S. Murugan, Dr.S. Radhakrishnan
Abstract | PDF |
1532-1538 |
18. |
A New Approach to Secure Data Aggregation protocol for Wireless Sensor Network
Mukesh Kumar Jha, T. P. Sharma
Abstract | PDF |
1539-1543 |
19. |
Abnormal Gait Recognition
Naveen Rohila, Prof. Brijesh Kumar, Naresh Chauhan
Abstract | PDF |
1544-1551 |
20. |
Facial Expression Recognition
Neeta Sarode, Prof. Shalini Bhatia
Abstract | PDF |
1552-1557 |
21. |
Extraction of Radiology Reports using Text mining
A.V.Krishna Prasad, Dr.S.Ramakrishna, Dr.D.Sravan Kumar, Dr.B.Padmaja Rani
Abstract | PDF |
1558-1562 |
22. |
A Survey of Denial of Service Attacks and it's Countermeasures on Wireless Network
Arockiam. L, Vani. B
Abstract | PDF |
1563-1571 |
23. |
Emerging Requirements Of Reconfigurable Computing Systems For Performance Enhancement
M. Aqeel Iqbal, Asia Khannum, Saleem Iqbal, M. Asif
Abstract | PDF |
1572-1579 |
24. |
Reconfigurable Computing Systems Used To Support Next Generation High Speed Applications
M. Munawwar Iqbal Ch, Muhammad Younus Javed, M. Aqeel Iqbal
Abstract | PDF |
1580-1587 |
25. |
A Framework for an Ontology-Based Data-Gleaning and Agent Based Intelligent Decision Support PPDM System Employing Generalization Technique for Health Care
K. Murugesan, J.Indumathi, D.Manjula
Abstract | PDF |
1588-1596 |
26. |
Quantum Teleportation circuit using Matlab and Mathematica
Ms.Swati Sharma, Prof Asok De, Prof S.N Kulkarni, Prof Asok De, Prof S.N Kulkarni
Abstract | PDF |
1597-1600 |
27. |
Output Regulation of the Arneodo Chaotic System
Sundarapandian Vaidyanathan
Abstract | PDF |
1601-1608 |
28. |
CBIR Using Kekre's Transform over Row column Mean and Variance Vectors
Dr. H. B. Kekre, Kavita Sonavane
Abstract | PDF |
1609-1614 |
29. |
Prediction of Protein Secondary Structure using Artificial Neural Network
MN Vamsi Thalatam, P Venkata Rao, KVSRP Varma, NVR Murty, Allam Apparao
Abstract | PDF |
1615-1621 |
30. |
Printed and Handwritten Mixed Kannada Numerals Recognition Using SVM
G. G. Rajput, Rajeswari Horakeri, Sidramappa Chandrakant
Abstract | PDF |
1622-1626 |
31. |
Decentralized Service Orchestration by Continuous Message Passing
R.JAYAPRAKASH, M. SHANMUGAM , P.MANIKANDAN, S. SHIVARAJ
Abstract | PDF |
1627-1632 |
32. |
A NEW APPROACH FOR VARIANT MULTI ASSIGNMENT PROBLEM
SOBHAN BABU.K, CHANDRA KALA.K, PURUSHOTTAM.S, SUNDARA MURTHY.M
Abstract | PDF |
1633-1640 |
33. |
Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)
Prof.N..Penchalaiah, Dr.R.Seshadri
Abstract | PDF |
1641-1645 |
34. |
Performance of TCP/IP/ UDP adaptive header compression algorithm for wireless network
Prof.N.Penchalaiah, Dr.R.Seshadri
Abstract | PDF |
1646-1651 |
35. |
Enhancement of LSB based Steganography for Hiding Image in Audio
Pradeep Kumar Singh, R.K.Aggrawal
Abstract | PDF |
1652-1658 |
36. |
Superresolution: A Novel Application to Image Restoration
Sanket B.Kasturiwala, Dr.S.A.Ladhake
Abstract | PDF |
1659-1664 |
37. |
Effective Term Based Text Clustering Algorithms
P. Ponmuthuramalingam, T. Devi
Abstract | PDF |
1665-1673 |
38. |
On Human Intelligence
M.A.Anusuya, S.K.Katti
Abstract | PDF |
1674-1678 |
39. |
CLASSIFICATION TECHNIQES IN EDUCATION DOMAIN
B.Nithyasri, K.Nandhini, E.Chandra
Abstract | PDF |
1679-1684 |
40. |
Secure Mobile Agent based Information Gathering in Wireless Network
Ashish Kumar Srivastava, Aditya Goel
Abstract | PDF |
1685-1689 |
41. |
AN EFFICIENT CLASSIFICATION OF GENOMES BASED ON CLASSES AND SUBCLASSES
B.V. DHANDRA, S.S. PATIL
Abstract | PDF |
1690-1695 |
42. |
An Analysis on Preservation of Privacy in Data Mining
Madhan Subramaniam, Senthil R
Abstract | PDF |
1696-1699 |
43. |
Algorithm for Efficient Multilevel Association Rule Mining
Pratima Gautam, Dr. K. R. Pardasani
Abstract | PDF |
1700-1704 |
44. |
PERFORMANCE OF MULTI SERVER AUTHENTICATION AND KEY AGREEMENT WITH USER PROTECTION IN NETWORK SECURITY
NAGAMALLESWARA RAO. DASARI, VUDA SREENIVASARAO
Abstract | PDF |
1705-1712 |
45. |
Improved Fuzzy C-Means Algorithm for MR Brain Image Segmentation
P.Vasuda, S.Satheesh
Abstract | PDF |
1713-1715 |
46. |
Sequence Related IT Functions for String Based Update Operations by New Operational Transformation Algorithms for Wide-Area Collaborative Applications
Santosh kumawat, Ajay Khunteta
Abstract | PDF |
1716-1721 |
47. |
SEMANTIC BASED MULTIPLE WEB SEARCH ENGINE
MS.S.LATHA SHANMUGAVADIVU, DR.M.RAJARAM
Abstract | PDF |
1722-1728 |
48. |
A Single Fromat for Measuring different Aspects of Testing
Mahwish Kundi, Shahid Hussain, Bashir Ahmad, Muhammad Inayat Ullah
Abstract | PDF |
1729-1732 |
49. |
SPEAKER IDENTIFICATION USING 2-D DCT, WALSH AND HAAR ON FULL AND BLOCK SPECTROGRAM
Dr. H. B. Kekre, Dr. Tanuja K. Sarode, Shachi J. Natu, Prachi J. Natu
Abstract | PDF |
1733-1740 |
50. |
High Performance VLSI Design Using Body Biasing in Domino Logic Circuits
Salendra.Govindarajulu, Dr.T.Jayachandra Prasad
Abstract | PDF |
1741-1745 |
51. |
Power Aware Scheduling for Resource Constrained Distributed Real-Time Systems
Santhi Baskaran, P. Thambidurai
Abstract | PDF |
1746-1753 |
52. |
SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH
M.V.P. Chandra Sekhara Rao, Dr.B.Raveendra Babu, Dr. A.Damodaram, Mrs.Aparna Chaparala
Abstract | PDF |
1754-1757 |
53. |
Optimal Capacitor For Maximum Output Power Tracking Of Self Excited Induction Generator Using Fuzzy Logic Approach
Mr.M.Senthilkumar
Abstract | PDF |
1758-1762 |
54. |
Development of a quality design framework for usable User Interfaces
Dr. S. Qamar Abbas, Ms. Ankur Aggarwal
Abstract | PDF |
1763-1767 |
55. |
Performance evaluation of H.264 decoder on different processors
H.S.Prasantha, Dr.Shashidhara.H.L, Dr.K.N.B.Murthy, M.Venkatesh
Abstract | PDF |
1768-1776 |
56. |
Modeling Of Combinational Circuits Based On Ternary Multiplexer Using VHDL
A.Sathish kumar, A.Swetha Priya
Abstract | PDF |
1777-1791 |
57. |
Exploring Issues for QoS Based Routing Algorithms
Dr. Shuchita Upadhyaya, Gaytri Dhingra
Abstract | PDF |
1792-1795 |
58. |
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
Prof.S.P. Setti, Narasimha Raju K, Naresh Kumar K
Abstract | PDF |
1796-1800 |
59. |
An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
Er. Saiqa Khan, Er. Arun Kulkarni
Abstract | PDF |
1801-1806 |
60. |
A NOVEL CODEBOOK INITIALISATION TECHNIQUE FOR GENERALIZED LLOYD ALGORITHM USING CLUSTER DENSITY
K.Somasundaram, S.Vimala
Abstract | PDF |
1807-1809 |
61. |
Poly Substitution Method for Encryption and Decryption
Jeetendra Kumar Ambulkar
Abstract | PDF |
1810-1812 |
62. |
An Artificial Immune System Model for Multi Agents Resource Sharing in Distributed Environments
Tejbanta Singh Chingtham, G. Sahoo, M.K. Ghose
Abstract | PDF |
1813-1818 |
63. |
Spam Classification using new kernel function in Support Vector Machine
Surendra Kumar Rakse, Sanyam Shukla
Abstract | PDF |
1819-1823 |
64. |
Implementation and simulation of arithmetic logic unit, shifter and Multiplier in Quantum cellular automata technology
Dr.E.N.Ganesh
Abstract | PDF |
1824-1829 |
65. |
An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures
Pooja Sharma, Pawan Bhadana
Abstract | PDF |
1830-1835 |
66. |
MISSING DATA IMPUTATION IN CARDIAC DATA SET (SURVIVAL PROGNOSIS)
R.KAVITHA KUMAR, DR. R.M.CHADRASEKAR
Abstract | PDF |
1836-1840 |
67. |
Investigation on Efficient Management of workflows in cloud computing Environment
M.Sudha, M.Monica
Abstract | PDF |
1841-1845 |
68. |
Efficient Secured Hash Based Password Authentication in Multiple Websites
T.S.Thangavel, A. Krishnan
Abstract | PDF |
1846-1851 |
69. |
Clustering Mixed Data Set Using Modified MARDL Technique
Mrs. J.Jayabharathy, Dr. S. Kanmani, S. Pazhaniammal
Abstract | PDF |
1852-1860 |
70. |
Direct Processor Access for Non Dedicated Server using Multi Core Processor
P. S. BALAMURUGAN, Dr. K.THANUSHKODI
Abstract | PDF |
1861-1864 |
71. |
Intrusion Detection using unsupervised learning
Kusum bharti, Sanyam Shukla, Shweta Jain
Abstract | PDF |
1865-1870 |
72. |
ROLE OF SYNUCLEIN BETA (SNCB) AND SYNUCLEIN GAMMA (SNCG) IN GLAUCOMA AND ALZHEIMER'S DISEASES – A BIOINFORMATIC APPROACH
Kiran Kumar Reddi, T K Rama Krishna Rao
Abstract | PDF |
1871-1874 |
73. |
A Novel Document Clustering Algorithm Using Squared Distance Optimization Through Genetic Algorithms
Harish Verma, Eatesh Kandpal, Bipul Pandey, Joydip Dhar
Abstract | PDF |
1875-1879 |
74. |
Performance Evaluation Of Different Adaptive Filters For ECG Signal Processing
Sachin singh, Dr K. L. Yadav
Abstract | PDF |
1880-1883 |
75. |
Classification of Different Species Families using Clustering Algorithm
D.Chandravathi, TMN Vamsi, A. M.Sowjanya, Allam AppaRao
Abstract | PDF |
1884-1886 |
76. |
A VIEW ON SECURE ROUTING IN ADHOC NETWORKS
V. Venkata Ramana, K.K.Basheer, P.Srinivasa Rao
Abstract | PDF |
1887-1892 |
77. |
A Study on Enhancement of Loadability of Large-Scale Emerging Power Systems by Using FACTS Controllers
Bindeshwar Singh, N. K. Sharma, A. N. Tiwari
Abstract | PDF |
1893-1903 |
78. |
Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method
Padma Bh, D.Chandravathi, P.Prapoorna Roja
Abstract | PDF |
1904-1907 |
79. |
Performance Comparision of Image Retrieval using Row Mean of Transformed Column Image
Dr. H.B.Kekre, Sudeep D. Thepade, Akshay Maloo
Abstract | PDF |
1908-1912 |
80. |
Dynamic Resource Allocation in Desktop Grids
Bismi A S, Dr.S.Karthik
Abstract | PDF |
1913-1918 |
81. |
Algorithm for Solving Job Shop Scheduling Problem Based on machine availability constraint
Kanate Ploydanai, Anan Mungwattana
Abstract | PDF |
1919-1925 |
82. |
Grid Computing Used For Next Generation High Speed Processing Technology
Muhammad Naqaash, M. Aqeel Iqbal, Qaisar Pervaiz, Omer Shamim, Syed Aqeel Hussain
Abstract | PDF |
1926-1933 |
83. |
k-dominant and Extended k-dominant Skyline Computation by Using Statistics
Md. Anisuzzaman Siddique, Yasuhiko Morimoto
Abstract | PDF |
1934-1943 |
To view the PDF use Adobe Acrobat 6.0 or more |