ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 3 Number 2 February 2011) |
Page |
1. |
Nonlinear H∞ controller for flexible joint robots with using feedback linearization
M.E.Akbari, G.Alizadeh, S.Khanmohammadi, I.Hassanzadeh, M.Mirzaei,M.A.Badamchizadeh
Abstract | PDF |
451-466 |
2. |
CHOICES ON DESIGNING GF (P) ELLIPTIC CURVE COPROCESSOR BENEFITING FROM MAPPING HOMOGENEOUS CURVES IN PARALLEL MULTIPLICATIONS
Qasem Abu Al-Haija , Mohammad Alkhatib, Azmi B. Jaafar
Abstract | PDF |
467-480 |
3. |
ENHANCED DISTRIBUTED SERVICE MODEL FOR POWER SYSTEM STATE ESTIMATION
V.Gomathi ,V.Ramachandran
Abstract | PDF |
481-486 |
4. |
Adaptive Routing Algorithms in Unstructured Peer-to-Peer (P2P) Systems
Achmad Nizar Hidayanto, Stephane Bressan
Abstract | PDF |
487-505 |
5. |
A Voice Priority Queue (VPQ) Fair Scheduler for the VoIP over WLANs
Kashif Nisar, Abas Md Said, Halabi Hasbullah
Abstract | PDF |
506-518 |
6. |
Development of a Model for Technology Strategy Elaboration
Aliakbar Mazlomi, Rosnah bt. Mohd. Yusuff
Abstract | PDF |
519-527 |
7. |
On the Use of MCDM Technique for Identifying Key Technology: A case of Auto Company
Aliakbar Mazlomi, Rosnah bt. Mohd. Yusuff
Abstract | PDF |
528-539 |
8. |
The role of Ethics in the process of Technology Transfer and Development of 206 Peugeot
Aliakbar Mazlomi, Rosnah bt. Mohd. Yusuff
Abstract | PDF |
540-553 |
9. |
Analytical Simulation and Performance Optimization for Spectrum Sensing in Cognitive Radio Networks
Ayman A. El-Saleh, Mahamod Ismail, Mohd Alauddin Mohd Ali, M. R. Kamarudin, T. A. Rahman
Abstract | PDF |
554-568 |
10. |
SERVICE ORIENTED APPLICATION IN AGENT BASED VIRTUAL KNOWLEDGE COMMUNITY
L. O. Yusuf, O. Folorunso, A. T. Akinwale, A. I. Adejumobi
Abstract | PDF |
569-579 |
11. |
A Data Mining Perspective on the Prevalence of Polio in India
Neera Singh, Sonali Agarwal and Ramesh C. Tripathi
Abstract | PDF |
580-585 |
12. |
Source Feature Based Gender Identification System Using GMM
R. RAJESHWARA RAO, NAGESH
Abstract | PDF |
586-593 |
13. |
Cloud Computing: A solution to Geographical Information Systems (GIS)
Muzafar Ahmad Bhat, Razeef Mohd Shah, Bashir Ahmad
Abstract | PDF |
594-600 |
14. |
A System Based Approach to Efficiently Implement Color Differentiation Mechanism with Respect to Automobiles
MOHAMMED KHALID KALEEM, MOHAMMAD IQUEBAL AKHTER
Abstract | PDF |
601-606 |
15. |
Comparison between k-nn and svm method for speech emotion recognition
Muzaffar Khan, Tirupati Goskula, Mohmmed Nasiruddin ,Ruhina Quazi
Abstract | PDF |
607-611 |
16. |
Honeypot based Secure Network System
Yogendra Kumar Jain, Surabhi Singh
Abstract | PDF |
612-620 |
17. |
AN APPLICATION OF HYBRID CLUSTERING AND NEURAL BASED PREDICTION MODELLING FOR DELINEATION OF MANAGEMENT ZONES
Babankumar S. Bansod, OP Pandey
Abstract | PDF |
621-631 |
18. |
An Improved Framework for Enhancing QoS in MIPv6
Shilpy Gupta, Amit Sharma, Mohit Chowdhary
Abstract | PDF |
632-641 |
19. |
Content Based Image Retrieval using Density Distribution and Mean of Binary Patterns of Walsh Transformed Color
Images
H.B.Kekre, Dhirendra Mishra
Abstract | PDF |
642-651 |
20. |
Copy-Move Forgery Detection in Digital Images: Progress and Challenges
Sunil Kumar, P. K. Das, Shally, S. Mukherjee
Abstract | PDF |
652-663 |
21. |
PERFORMANCE CONTRIBUTION BASED SCHEDULING FRAMEWORK FOR PRECEDENCE CONSTRAINT TASKS IN REAL TIME SYSTEM
RADHAKRISHNA NAIK, R.R.MANTHALKAR
Abstract | PDF |
664-675 |
22. |
Modeling Academic Performance Evaluation Using Soft Computing Techniques: A Fuzzy Logic Approach
Ramjeet Singh Yadav, Vijendra Pratap Singh
Abstract | PDF |
676-686 |
23. |
Multimodal Authentication For High End Security
K.Elumalai, M.Kannan
Abstract | PDF |
687-692 |
24. |
Design of MIMO Space-Time Code for High Data Rate Wireless Communication
Mihir Narayan Mohanty, Laxmi Prasad Mishra, Saumendra Kumar Mohanty
Abstract | PDF |
693-696 |
25. |
INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS
J. B. PATIL, B. V. PAWAR
Abstract | PDF |
697-704 |
26. |
Convergence of ART in Few Projections
Tanuja Srivastava, Nirvikar, Raghuvir Singh
Abstract | PDF |
705-713 |
27. |
Feature Extraction in Medical Image using Ant Colony Optimization : A Study
A. Amali Asha, S.P. Victor, A. Lourdusamy
Abstract | PDF |
714-721 |
28. |
COLLABORATION IN WEB BASED LEARNING: A SOCIAL COMPUTING PERSPECTIVE
C.Pooranachandran, Dr.R.Balasubramanian
Abstract | PDF |
722-727 |
29. |
Efficient Storage Reduction of Frequency of Items in Vertical Data Layout
A.Meenakshi, Dr.K.Alagarsamy
Abstract | PDF |
728-738 |
30. |
Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library
K V S S R S S Sarma, P S Avadhani
Abstract | PDF |
739-743 |
31. |
Modified Kalman Filter-based Approach in Comparison with Traditional Speech Enhancement Algorithms from Adverse Noisy Environments
G. Ramesh Babu, Rameshwara Rao
Abstract | PDF |
744-759 |
32. |
Message Encryption Using Deceptive Text and Randomized Hashing
VAMSIKRISHNA YENIKAPATI, B.POORNA SATYANARAYANA
Abstract | PDF |
760-766 |
33. |
Invariant Moments based War Scene Classification using ANN and SVM: A Comparative Study
Daniel Madan Raja S, Shanmugam A
Abstract | PDF |
767-774 |
34. |
DEVELOPMENT OF BIO-CRYPTO KEY FROM FINGERPRINTS USING CANCELABLE TEMPLATES
Prof. Sunil VK Gaddam, Prof. Manohar Lal
Abstract | PDF |
775-783 |
35. |
The Role and Issues of Clustering Technique in Designing Maintainable Object Oriented System
A. K. Malviya, Vibhooti Singh
Abstract | PDF |
784-788 |
36. |
Infrastructural Map for Information Security
Sabah Al-Fedaghi, Hanaa Alnashwan
Abstract | PDF |
789-796 |
37. |
The proposed quantum computational basis of deep ecology: its implications for agriculture
Monendra Grover
Abstract | PDF |
797-799 |
38. |
Safety Measures Using Sextic Curve Cryptography
W. R. Sam Emmanuel, Dr.C.Suyambulingom
Abstract | PDF |
800-806 |
39. |
A Survey of QOS with IEEE 802.11e
Dr.P. Chenna Reddy, V. Venkata Ramana, Dr A. Rama Mohan Reddy
Abstract | PDF |
807-813 |
40. |
An Analysis of Q-Learning Algorithms with Strategies of Reward Function
Ms.S.Manju, Dr.Ms.M.Punithavalli
Abstract | PDF |
814-820 |
41. |
A Survey on Optimistic Fair Digital Signature Exchange Protocols
Alfin Abraham, Vinodh Ewards, Harlay Maria Mathew
Abstract | PDF |
821-825 |
42. |
Survey of Attacks on Mobile AdhocWireless Networks
Vikas Solomon Abel
Abstract | PDF |
826-829 |
43. |
Semantic Inference Model For Database Inference Detection Violation
Rupali Chopade, Prof. B. N. Jagdale, Prof. Amit Savyanavar
Abstract | PDF |
830-836 |
44. |
An Integer Programming-based Local Search for Large-scale Maximal Covering Problems
Junha Hwang, Sungyoung Kim
Abstract | PDF |
837-843 |
45. |
A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks
Mitra Baratchi, Kamal Jamshidi
Abstract | PDF |
844-853 |
46. |
A Framework for Analyzing Software Quality using Hierarchical Clustering
Arashdeep Kaur, Sunil Gulati
Abstract | PDF |
854-861 |
47. |
Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework
MohammadReza Keyvanpour, Somayyeh Seifi Moradi
Abstract | PDF |
862-870 |
48. |
COMPARISON OF MULTICAST ROUTING PROTOCOLS IN AD-HOC WIRELESS NETWORKS
Dr.V.B.Narsimha, B.Manjula, B.Sujatha, K.Arun Raj Bapuji
Abstract | PDF |
871-876 |
49. |
Impact Analysis of Recent DDoS Attacks
Ketki Arora, Krishan Kumar, Monika Sachdeva
Abstract | PDF |
877-883 |
50. |
A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security
Gyanendra Kr. Gupta, A. K. Sharma, Vishnu Swaroop
Abstract | PDF |
884-891 |
51. |
Optimizing Hidden Markov Model for Failure Prediction– Comparison of Gaine’s optimization and Minimum message length
Estimator
N.Muthumani, Dr.Antony Selvadass Thanamani
Abstract | PDF |
892-898 |
52. |
A Study of Image Segmentation and Edge Detection Techniques
PunamThakare
Abstract | PDF |
899-904 |
53. |
Efficient Power Utilization Techniques for Wireless Sensor Networks – A Survey
Mr. Sharad Saxena, Dr. Shailendra Mishra, Dr. Ashok Kumar, Dr. D. S. Chauhan
Abstract | PDF |
905-925 |
54. |
Record Matching Over Query Results Using Fuzzy Ontological Document Clustering
V.Vijayaraja, R.Prasanna Kumar, M.A.Mukunthan, G.Bharathi Mohan
Abstract | PDF |
926-932 |
55. |
Fault Tolerance in Real Time Distributed System
Arvind Kumar, Rama Shankar Yadav, Ranvijay, Anjali Jain
Abstract | PDF |
933-939 |
56. |
A Study on Scheduling in Grid Environment
Dr.K.Vivekanandan, D.Ramyachitra
Abstract | PDF |
940-950 |
57. |
Intelligent Data Compression Approach in Multidimensional Data Warehouse
Walid MOUDANI, Mohammad HUSSEIN, Mirna MOUKHTAR, Félix MORA-CAMINO
Abstract | PDF |
951-960 |
58. |
Tree-kNN: A Tree-Based Algorithm for Protein Sequence Classification
Khaddouja Boujenfa, Nadia Essoussi, Mohamed Limam
Abstract | PDF |
961-968 |
59. |
Human Gait Recognition Using Bezier Curves
Pratibha Mishra, Shweta Ezra
Abstract | PDF |
969-975 |
60. |
WaveCluster for Remote Sensing Image Retrieval
Priti Maheshwary, Namita Srivastava
Abstract | PDF |
976-979 |
61. |
MRI Brain Abnormalities Segmentation using K-Nearest Neighbors (k-NN)
Noor Elaiza Abdul Khalid, Shafaf Ibrahim, Puteri Nurain Megat Mohd Haniff
Abstract | PDF |
980-990 |
62. |
Organizational improvement using Organizational paradigms with the support of people paradigms
Md. Shariful Alam, Md. Rashedul Islam, Md. Rofiqul Islam
Abstract | PDF |
991-996 |
If you didn't see your file in the TOC drop us an email to ijcseditor @ enggjournals.com with your manuscript id |
To view the PDF use Adobe Acrobat 6.0 or more |