ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 2 Number 9 December 2010) |
Page |
1. |
Optimal Solution Strategy for Games
Aman Pratap Singh
Abstract | PDF |
2778-2782 |
2. |
Supervised Learning Approach for Spam Classification Analysis using Data Mining Tools
R.Deepa Lakshmi, N.Radha
Abstract | PDF |
2783-2789 |
3. |
Adjoint LMS (ALMS) Algorithm Based Active Noise Control with Feedback Path Modeling
U Ramachandraiah, M Singaperumal, B Purniah
Abstract | PDF |
2790-2794 |
4. |
Symmetric-key Inter-domain end-to-end Authentication Protocols for Mobile System
Rajarshi Roy Chowdhury, Subramanian Azhaguvel
Abstract | PDF |
2795-2800 |
5. |
A New Encryption Method for Secure Transmission of Images
B.V.Rama Devi, P.Prapoorna Roja, D.Lalitha Bhaskari, P.S.Avadhani
Abstract | PDF |
2801-2804 |
6. |
Association Analaysis in Wireless Network using Trace data
L.Velmurugan, Dr.P.Thangaraj
Abstract | PDF |
2805-2807 |
7. |
Image Mining Using Texture and Shape Feature
Prof.Rupali Sawant
Abstract | PDF |
2808-2815 |
8. |
Optimization of Composite Plates Based on Imperialist Competitive Algorithm
Hamid Mozafari, Behzad Abdi, Amran Ayob
Abstract | PDF |
2816-2819 |
9. |
A Framework for the View Selection Problem in Data Warehousing Environment
B. Ashadevi, Dr. P.Navaneetham, Dr. R.Balasubramanian
Abstract | PDF |
2820-2826 |
10. |
An Algorithm for Better Decision Tree
T.Jyothirmayi, Suresh Reddy
Abstract | PDF |
2827-2830 |
11. |
Position-Based Clustering: An Energy-Efficient Clustering Hierarchy for Heterogeneous Wireless Sensor Networks
Abderrahim BENI HSSANE, Moulay Lahcen HASNAOUI, Mostafa SAADI, Said BENKIRANE
Abstract | PDF |
2831-2835 |
12. |
Stream Ciphers Encript Transformation
Md Tanwir Uddin Haider, Rajesh Kumar Sinha
Abstract | PDF |
2836-2837 |
13. |
A New System for Extracting and Detecting Skin Color Regions from PDF Documents
Tarek Abd El-Hafeez
Abstract | PDF |
2838-2846 |
14. |
A New Effective System for Filtering Pornography Videos
Tarek Abd El-Hafeez
Abstract | PDF |
2847-2852 |
15. |
Comparative Analysis of CBRP, DSR, AODV Routing Protocol in MANET
Mukesh Kumar, Rahul Rishi, D.K. Madan
Abstract | PDF |
2853-2858 |
16. |
Service Composition in Service Oriented Product Line
Fatemeh Mafi, Shahriar Mafi, Mehran Mohsenzadeh
Abstract | PDF |
2859-2864 |
17. |
DATA WAREHOUSING, DATA MINING, OLAP AND OLTP TECHNOLOGIES ARE ESSENTIAL ELEMENTS TO SUPPORT DECISION-MAKING PROCESS IN INDUSTRIES
G.SATYANARAYANA REDDY, RALLABANDI SRINIVASU, M. POORNA CHANDER RAO, SRIKANTH REDDY RIKKULA
Abstract | PDF |
2865-2873 |
18. |
A FRAMEWORK-BASED APPROACH FOR RELIABILITY & QUALITY ASSURANCE OF SAFETY-CRITICAL SOFTWARE
Ankur Pandit
Abstract | PDF |
2874-2879 |
19. |
Medical Image Matching and Retrieval using Discrete Sine Transform
SASI KUMAR.M, Dr.Y.S.KUMARSWAMY
Abstract | PDF |
2880-2882 |
20. |
Query Optimization on Compressed and Decompressed Object-Oriented Database Using Operators
Abhijit Banubakode, Haridasa Acharya
Abstract | PDF |
2883-2889 |
21. |
Business Process Requirement Engineering
Atsa Etoundi Roger, Fouda Ndjodo Marcel, Atouba Christian Lopez
Abstract | PDF |
2890-2899 |
22. |
DYNAMIC WAVELENGTH ALLOCATION IN WDM OPTICAL NETWORKS
E. Kavitha, Dr.D.Sreenivasa Rao
Abstract | PDF |
2900-2904 |
23. |
Comparison of Digital Water Marking methods
Darshana Mistry
Abstract | PDF |
2905-2909 |
24. |
Unsupervised Hybrid Classification for Texture Analysis Using Fixed and Optimal Window Size
S.S SREEJA MOLE, Dr.L.GANESAN
Abstract | PDF |
2910-2915 |
25. |
MINING POSITIVE AND NEGATIVE ASSOCIATION RULES
R.SUMALATHA, B. RAMASUBBAREDDY
Abstract | PDF |
2916-2920 |
26. |
Technical challenges and Constraints for Spectrum Planning in GSM networks
Gaurav Kumar Nigam
Abstract | PDF |
2921-2923 |
27. |
Reducing Dataset Size in Frequency Domain for Brain Computer Interface Motor Imagery Classification
Ch.Aparna, Dr J.V.R.Murthy, Dr.B.Raveendra Babu, M.V.P.Chandra Sekhara Rao
Abstract | PDF |
2924-2927 |
28. |
A Novel approach for identifying greedy nodes in wireless sensor network by using EEGN algorithm
S.Manju Priya, K.Thilagam, K.Rama, A.Jeevarathinam, K.Lakshmi
Abstract | PDF |
2928-2931 |
29. |
Differential Evolution and Dynamic Differential Evolution Variants for High Dimensional Function Optimization : An Empirical Scalability Study
G.Jeyakumar, C.Shunmuga Velayutham
Abstract | PDF |
2932-2941 |
30. |
Classification of Indian Stock Market Data Using Machine Learning Algorithms
Sneha Soni, Shailendra Shrivastava
Abstract | PDF |
2942-2946 |
31. |
Overload Identification for Multiprocessor in Real Time System
JESTIN RAJAMONY, Dr. K.RAMAR, K.P.AJITHA GLADIS
Abstract | PDF |
2947-2952 |
32. |
Clustered Chain based Power Aware Routing (CCPAR) Scheme for Wireless Sensor Networks
Koushik Majumder, Subir Kumar Sarkar
Abstract | PDF |
2953-2963 |
33. |
Chairperson and Secretarius Meeting Guides for Electronic Meeting Direction
Gitesh K. Raikundalia
Abstract | PDF |
2964-2975 |
34. |
A Survey on clustering Current status and challenging issues
Rama.B, Jayashree.P, Salim Jiwani
Abstract | PDF |
2976-2980 |
35. |
A Genetic Algorithm Optimized Decision Tree-SVM based Stock Market Trend Prediction System
Binoy B. Nair, V.P Mohandas, N.R. Sakthivel
Abstract | PDF |
2981-2988 |
36. |
Multiframe Image Super-resolution – A Comparison
Vishal R. Jaiswal, Suhas H. Patil, Girish P. Potdar, Shrishail T. Patil
Abstract | PDF |
2989-2992 |
37. |
Implementation of Featureset Reduced Symmetric Transform in Image Retrieval Optimized for FPGA
C.Sriramakrishnan, Dr. A. Shanmugam
Abstract | PDF |
2993-2995 |
38. |
Sports Video Summarization using Priority Curve Algorithm
K Susheel Kumar, Shitala Prasad, Santosh Banwral, Vijay Bhaskar Semwal
Abstract | PDF |
2996-3002 |
39. |
Medical Image Compression Using Biorthogonal Spline Wavelet With Different Decomposition
Loganathan R, Dr.Y.S.Kumaraswamy
Abstract | PDF |
3003-3006 |
40. |
A Context-Dependent Trust Model for the MAC Layer in LR-WPANs
Bernardo M. David, Beatriz Santana, Laerte Peotta, Marcelo D. Holtz, Rafael Timóteo de Sousa Jr
Abstract | PDF |
3007-3016 |
41. |
Autonomous Home Automated Hexapod Robot
Addanki Purna Ramesh, Ch Sesha Kiran Kumar
Abstract | PDF |
3016-3020 |
42. |
Scalability Performance of MANET Routing Protocols with Reference to Variable Pause Time
Asha Ambhaikar, H.R. Sharma, V.K.Mohabey
Abstract | PDF |
3021-3024 |
43. |
A SURVEY OF CALL MARKET (DISCRETE) AGENT BASED ARTIFICIAL STOCK MARKETS
PN Kumar, Ashutosh Jha, Gautham TK, Jitesh Mohan, Rama Subramanian AJ, VP Mohandas
Abstract | PDF |
3025-3032 |
44. |
Wavelet Features Based War Scene Classification using Artificial Neural Networks
S.Daniel Madan Raja, Dr.A.Shanmugam
Abstract | PDF |
3033-3037 |
45. |
A Survey on Recent Security Trends using Quantum Cryptography
T. Rubya, N. Prema Latha, B. Sangeetha
Abstract | PDF |
3038-3042 |
46. |
Efficiency of K-Means Clustering Algorithm in Mining Outliers from Large Data Sets
Sridhar. A, Sowndarya. S
Abstract | PDF |
3043-3045 |
47. |
Automatic Recommendation of Web Pages in Web Usage Mining
C.P. Sumathi, R. Padmaja Valli, T. Santhanam
Abstract | PDF |
3046-3052 |
48. |
Relational Peer Data Sharing Settings and Consistent Query Answers
Mehedi Masud, Sultan Aljahdali
Abstract | PDF |
3053-3059 |
49. |
A Method for Group Formation Using Genetic Algorithm
Zhamri Che Ani, Azman Yasin, Mohd Zabidin Husin, Zauridah Abdul Hamid
Abstract | PDF |
3060-3064 |
50. |
Product Assembly Sequence Optimization Based on Genetic Algorithm
Azman Yasin, Nurnasran Puteh, Ruslizam Daud, Mazni Omar, Sharifah Lailee Syed-Abdullah
Abstract | PDF |
3065-3070 |
51. |
Iris Recognition Based On Its Texture Patterns
M. Ezhilarasan, R. Jacthish, K.S. Ganabathy Subramanian, R. Umapathy
Abstract | PDF |
3071-3074 |
52. |
Person Identification Using Fingerprint by Hybridizing Core Point and Minutiae Features
M. Ezhilarasan, D. Suresh Kumar, S. Santhanakrishnan, S. Dhanabalan, A.Vinod
Abstract | PDF |
3075-3078 |
53. |
Performance Analysis of Fault-Tolerant Irregular Baseline Multistage Interconnection Network
Mamta Ghai, Vinay Chopra, Karamjit Kaur Cheema
Abstract | PDF |
3079-3084 |
54. |
Integrations of Remote Sensing and GIS to Land Use and Land Cover Change Detection of Coimbatore District
Dr.S. Santhosh Baboo, M.Renuka Devi
Abstract | PDF |
3085-3088 |
55. |
Wireless Sensor Network (WSN): Architectural Design issues and Challenges
Ajay Jangra, Swati, Richa, Priyanka
Abstract | PDF |
3089-3094 |
56. |
Authenticated Routing Protocol Based on Reputation System For Adhoc Networks
Preeti Nagrath, Ashish kumar, Shikha Bhardwaj
Abstract | PDF |
3095-3099 |
57. |
Clustering Mixed Data Points Using Fuzzy C-Means Clustering Algorithm for Performance Analysis
T.Velmurugan, T.Santhanam
Abstract | PDF |
3100-3105 |
58. |
Study on Identification of Harmonic Contributions Between Utility and Customer
SVD Anil Kumar, Dr.K.Ramesh Reddy
Abstract | PDF |
3106-3110 |
59. |
A Survey of Energy Efficient Routing Protocols for Mobile Ad-hoc Networks
Ajit Singh, Harshit Tiwari, Alok Vajpayee, Shiva Prakash
Abstract | PDF |
3111-3119 |
60. |
Automated Transformation of Distributed Software Architectural Models to Finite State Process
Omid Bushehrian, Hassan Ghaedi, Reza Ghanbari Baghnavi
Abstract | PDF |
3120-3125 |
61. |
Email Spam Filtering using Supervised Machine Learning Techniques
V.Christina, S.Karpagavalli, G.Suganya
Abstract | PDF |
3126-3129 |
To view the PDF use Adobe Acrobat 6.0 or more |