ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 3 Number 1 January 2011) |
Page |
1. |
Extracting Noun Phrases in Subject and Object Roles for Exploring Text Semantics
Ani Thomas, M K Kowar, Sanjay Sharma, H R Sharma
Abstract | PDF |
1-7 |
2. |
An Efficient Clustering Technique for Message Passing between Data Points using Affinity Propagation
D. NAPOLEON, G.BASKAR, S.PAVALAKODI
Abstract | PDF |
8-14 |
3. |
Classification of Herbs Plant Diseases via Hierarchical Dynamic Artificial Neural Network after Image Removal using Kernel Regression Framework
Lili N.A, F. Khalid, N.M. Borhan
Abstract | PDF |
15-20 |
4. |
Class hierarchy method to find Change-Proneness
Malan V.Gaikwad, Aparna S.Nakil, Akhil Khare
Abstract | PDF |
21-27 |
5. |
Neural Network Model Based Cluster Head Selection for Power Control
Krishan Kumar, V.P.Singh
Abstract | PDF |
28-33 |
6. |
A Study on Block Matching Algorithms for Motion Estimation
S. Immanuel Alex Pandian, Dr. G. Josemin Bala, Becky Alma George
Abstract | PDF |
34-44 |
7. |
Bilateral Filtering using Modified Fuzzy Clustering for Image Denoising
G.Vijaya, Dr.V.Vasudevan
Abstract | PDF |
45-49 |
8. |
Bitwise Operations Based Encryption and Decryption
K.Naveen Kumar, K.T.Praveen kumar, G.V.S.Raj Kumar, P.Chandra Sekhar
Abstract | PDF |
50-54 |
9. |
An Efficient Approach for Image Recognition using Data Mining
Walid MOUDANI, Ahmad SHAHIN, Fadi CHAKIK, A.R. SAYED, Félix Mora-Camino
Abstract | PDF |
55-68 |
10. |
NEW NUMERICAL ALGORITHMS FOR MINIMIZATION OF NON-LINEAR FUNCTIONS
K. Karthikeyan, SK. Khadar Babu, B. Rajesh Anand
Abstract | PDF |
69-75 |
11. |
Enhanced Matrix Model for Finding Sequence Motif
Pankaj Agarwal, Laxmikant Vishwamitra
Abstract | PDF |
76-82 |
12. |
Frequent Itemset Discovery in E-commerce Domain: A novel Approach
Venkateswari S, Suresh R.M
Abstract | PDF |
83-88 |
13. |
Grid Computing: A Collaborative Approach in Distributed Environment for Achieving Parallel Performance and Better Resource Utilization
Sashi Tarun, Neeti Sharma
Abstract | PDF |
89-92 |
14. |
Enhanced TCP Friendly Congestion Control Protocol
D Ganesh Gopal, K Marimuthu, A Jennifer Cecilia Rana
This manuscript withdrawn by the author
Abstract | PDF |
93-101 |
15. |
An Approach to Automatic Generation of Test Cases Based on Use Cases in the Requirements Phase
U.Senthil Kumaran, S. Arun Kumar, K.Vijaya Kumar
Abstract | PDF |
102-113 |
16. |
A cross layer Design to Enhance Throughput for Multimedia Streaming over Mobile Ad hoc Networks
N.Gomathi, Dr.P.Seethalakshmi, Dr.A.Govardhan
Abstract | PDF |
114-126 |
17. |
A Survey on Sensor's Drift Counteraction Using Dynamic Pattern Recognition System
Tapsi Garg, Dr. Rabins Porwal
Abstract | PDF |
127-132 |
18. |
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
P.Suganthi, Dr.A.Tamilarasi
Abstract | PDF |
133-137 |
19. |
Dynamic Steering Control of Battery Operated Car for Lane Keeping using Image Sensor
Ankit Sharma, Abhishek Srivastava, Amod Garg
Abstract | PDF |
138-145 |
20. |
Encryption using XOR based Extended Key for Information Security – A Novel Approach
E. Anupriya, Amit Agnihotri, Sachin Soni, Sourabh Babelay
Abstract | PDF |
146-154 |
21. |
A Face Recognition System Through Somatology
Dr. Sipi Dubey, Tripti Sharma
Abstract | PDF |
155-160 |
22. |
Fingerprint Recognition Using Global and Local Structures
Kalyani Mali, Samayita Bhattacharya
Abstract | PDF |
161-172 |
23. |
Facial Expressions with Some Mixed Expressions Recognition Using Neural Networks
Dr.R.Parthasarathi, V.Lokeswar Reddy, K.Vishnuthej, G.Vishnu Vandan
Abstract | PDF |
173-176 |
24. |
Cluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS
M. A. Berlin, S. Muthu Sundari
Abstract | PDF |
177-184 |
25. |
PARALLELS BETWEEN GLUCONEOGENESIS AND SYNCHRONOUS MACHINES
Monendra Grover
Abstract | PDF |
185-191 |
26. |
Location Management Techniques to Improve QoS in Mobile Networks Using Intelligent Agent
Selvan.C, Dr.R.Shanmugalakshmi
Abstract | PDF |
192-198 |
27. |
SQL Injection Attacks: Techniques and Protection Mechanisms
Nikita Patel, Fahim Mohammed, Santosh Soni
Abstract | PDF |
199-203 |
28. |
A Brief Overview Of Software Testing Metrics
Premal B. Nirpal, Dr. K. V. Kale
Abstract | PDF |
204-211 |
29. |
Opinion Mining Classification Using Key Word Summarization Based on Singular Value Decomposition
B Valarmathi, Dr.V Palanisamy
Abstract | PDF |
212-215 |
30. |
Performance Comparison of Wireless Ad Hoc Routing Protocols
Ad Hoc On-Demand Distance Vector Routing, Dynamic Source Routing and Destination-Sequenced Distance-Vector
A.F.A. Abidin, N.S.M. Usop, M.K. Yusof
Abstract | PDF |
216-224 |
31. |
Multi-Criteria Genetic Algorithms for Solving Pig Food Problems
Anon Sukstrienwong
Abstract | PDF |
225-235 |
32. |
A Dynamic Slack Management Technique for Real-Time Distributed Embedded System with Enhanced Fault Tolerance and Resource Constraints
Santhi Baskaran, I. Gugan, A. Aswin Kumar, D. Govindarajan
Abstract | PDF |
236-245 |
33. |
Improving diffusion power of AES Rijndael with 8x8 MDS matrix
R.Elumalai, Dr.A.R.Reddy
Abstract | PDF |
246-253 |
34. |
A generic Framework for Landmine detection using statistical classifier based on IR images
Dr.G.Padmavathi, Dr.P.Subashini, M. Krishnaveni
Abstract | PDF |
254-261 |
35. |
Constructing Scalable local Distributed Decision Trees algorithm for heterogeneous data sources
Dr.E.Chandra, P.Ajitha
Abstract | PDF |
262-265 |
36. |
Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio
M. M. Kazi, A. V. Mane, R. R. Manza, K. V. Kale
Abstract | PDF |
266-270 |
37. |
Dynamic Broadcast Scheduling in DDBMS
Babu Santhalingam, C.Gunasekar, K.Jayakumar
Abstract | PDF |
271-275 |
38. |
Performance Analysis of Lifetime Maximizing Trees for Data Aggregation in Wireless Sensor Networks
Deepali Virmani, Satbir Jain
Abstract | PDF |
276-285 |
39. |
Delayed Reservation And Differential Service For Multimedia Traffic In Optical Burst Switched Networks
P.BOOBALAN, SRINIVASANE.A, MAHESH TEJASWI.T, SIVA PRASAD. P, PRABHAKARAN. V
Abstract | PDF |
286-290 |
40. |
CONTROLLING BURST LOSS RATIO IN OBS USING FEEDBACK CONTROL AND DYNAMIC TECHNIQUES
P. Boobalan, B.M. Krishnachandran, K. Vignesh and K. Peyal Nizhalan
Abstract | PDF |
291-298 |
41. |
A PATTERN BASED KEY GENERATION TO AUTHENTICATION FOR MULTIHOP ROUTING IN WMSN
P. Kalyani, Dr.C.Chellappan
Abstract | PDF |
299-306 |
42. |
General Framework for Cluster based Active Learning Algorithm
Prerna Mahajan, Dr. R. Kandwal
Abstract | PDF |
307-312 |
43. |
Comparative study of Attacks on AODV-based Mobile Ad Hoc Networks
Ipsa De, Debdutta Barman Roy
Abstract | PDF |
313-322 |
44. |
Improved FCM algorithm for Clustering the IRIS data
K.Suresh, R.Madana Mohana, A.RamaMohanReddy
Abstract | PDF |
323-326 |
45. |
Classification of Breast cancer by comparing Back propagation training algorithms
F.Paulin, A.Santhakumaran
Abstract | PDF |
327-332 |
46. |
Improved Hybrid Clustering and Distance-based Technique for Outlier Removal
P. Murugavel, Dr. M. Punithavalli
Abstract | PDF |
333-339 |
47. |
Classification of Incomplete Data Handling Techniques – An Overview
N.C. Vinod, Dr. M. Punithavalli
Abstract | PDF |
340-344 |
48. |
A Content Management System for Building Quality Blogs
Mohammad Javad Kargar
Abstract | PDF |
345-351 |
49. |
Weblog Search Engine Based on Quality Criteria
F. Azimzadeh, A. R. Ramli, B. M. Ali, H. Ibrahim
Abstract | PDF |
352-358 |
50. |
Prevention Of WormholeAttacks In Geographic Routing Protocol
E.Poornima, C.Shoba Bindhu
Abstract | PDF |
359-370 |
51. |
An Algorithm for Finding Frequent Itemset based on Lattice Approach for Lower Cardinality Dense and Sparse Dataset
Ajay Acharya, Shweta Modi
Abstract | PDF |
371-378 |
52. |
CLASSIFICATION OF AGRICULTURAL LAND SOILS A DATA MINING APPROACH
Ramesh Vamanan, K.Ramar
Abstract | PDF |
379-384 |
53. |
On the Security of Image Encoding Based on Fractal Functions
Nadia M. G. AL-Saidi
Abstract | PDF |
385-392 |
54. |
User centric approach to itemset utility mining in Market Basket Analysis
Jyothi Pillai
Abstract | PDF |
393-400 |
55. |
Inferring Packet Forwarding Priority, Network Tomography, Congestion Control Based On Packet Probing In Network
J.Benitha Christinal, V.Vivek
Abstract | PDF |
401-409 |
56. |
Resolving Ambiguous Entity through Context Knowledge and Fuzzy Approach
Hejab M. Alfawareh, Shaidah Jusoh
Abstract | PDF |
410-422 |
57. |
Rule Based Classification to Detect Malnutrition in Children
Xu Dezhi, Gamage Upeksha Ganegoda
Abstract | PDF |
423-429 |
58. |
CIRS: A State-Conscious Concurrency Control Protocol for Replicated Real-Time Databases
Vishal Pathak, Ajay Pratap, Rabin Kr. Singh, Abhishek Kr. Singh
Abstract | PDF |
430-434 |
59. |
Fuzzy Metagraph and Hierarchical Modeling
Pankaj Dashore, Dr. Suresh Jain
Abstract | PDF |
435-439 |
60. |
OBJECT-ORIENTED DATABASE REPRESENTATION THORUGH UML
Dr. Vipin Saxena, Santosh Kumar
Abstract | PDF |
440-444 |
61. |
MEASURING THE QUALITY OF OBJECT ORIENTED SOFTWARE MODULARIZATION
Sunil L. Bangare, Akhil R. Khare, Pallavi S. Bangare
Abstract | PDF |
445-450 |
|
To view the PDF use Adobe Acrobat 6.0 or more |