ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 3 Number 6 June 2011) |
Page |
1. |
A new secure and practical electronic voting protocol without revealing voters identity
Sadegh Jafari, Jaber Karimpour, Nasour Bagheri
Abstract | PDF |
2191-2199 |
2. |
Web Service Security Through Business Logic
M.S.SALEEM BASHA, M.THIRUMARAN, P.DHAVACHELVAN
Abstract | PDF |
2200-2216 |
3. |
Improving Capacity of soft Handoff Performance in Wireless Mobile
Communication using Macro Diversity
Vipin Kumar Saini, Dr. Sc. Gupta
Abstract | PDF |
2217-2223 |
4. |
New Edge Detection Technique based on the Shannon Entropy in Gray Level Images
Mohamed A. El-Sayed, Tarek Abd-El Hafeez
Abstract | PDF |
2224-2232 |
5. |
A Realistic Approach: RTST to Reduce Cost & Time
Neeraj Kumar, Prof. (Dr.) Ajay Rana
Abstract | PDF |
2233-2239 |
6. |
Secure Association Rule Mining for Distributed Level Hierarchy in Web
Gulshan Shrivastava, Dr. Vishal Bhatnagar
Abstract | PDF |
2240-2244 |
7. |
Private and Secure Hyperlink Navigability Assessment in Web Mining Information System
Kavita Sharma, Dr. Vishal Bhatnagar
Abstract | PDF |
2245-2250 |
8. |
Computer Vision for Malaria Parasite Classification in Erythrocytes
J.SOMASEKAR
Abstract | PDF |
2251-2256 |
9. |
An Integer Programming-based Local Search for Large-Scale Multidimensional Knapsack Problems
Junha Hwang, Sungjae Park, In Yeup Kong
Abstract | PDF |
2257-2264 |
10. |
An Invisible Zero Watermarking Algorithm using Combined Image and Text for Protecting Text Documents
Jaseena K.U, Anita John
Abstract | PDF |
2265-2272 |
11. |
A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET
SWATI SAXENA, Dr. MADHAVI SINHA
Abstract | PDF |
2273-2285 |
12. |
PRIORITY BASED UPLINK SCHEDULER FOR IEEE 802.16 NETWORKS
Gurpreet Singh, Akashdeep
Abstract | PDF |
2286-2289 |
13. |
OPTIMIZATION OF LOW POWER USING FIR FILTER
S. Prem Kumar, S. Sivaprakasam, G. Damodharan, V. Ellappan
Abstract | PDF |
2290-2299 |
14. |
Inheritance Hierarchy Based Reuse & Reusability Metrics in OOSD
Nasib S. Gill, Sunil Sikka
Abstract | PDF |
2300-2309 |
15. |
We.I.Pe: Web Identification of People using e-mail ID
K.S. Kuppusamy, G.Aghila
Abstract | PDF |
2310-2316 |
16. |
Improving the Performance of K-Means Clustering For High Dimensional Data Set
P.Prabhu, N.Anbazhagan
Abstract | PDF |
2317-2322 |
17. |
VoIP over WMN: Effect of packet aggregation
Khyati Marwah, Dr. Gurpal Singh
Abstract | PDF |
2323-2331 |
18. |
Handwritten Gurmukhi Character Recognition Using Statistical and Background Directional Distribution Features
Kartar Singh Siddharth, Mahesh Jangid, Renu Dhir, Rajneesh Rani
Abstract | PDF |
2332-2345 |
19. |
Automatic detection of human and Energy saving based on Zigbee Communication
Chinnam Sujana, Addanki Purna Ramesh, P.Gopala Reddy
Abstract | PDF |
2346-2353 |
20. |
Security Management System for Oilfield Based on GSM Technology
Batchu Spandana, Addanki Purna Ramesh, P.Gopala Reddy
Abstract | PDF |
2354-2360 |
21. |
Quantitative evaluation of Segmentation algorithms based on level set method for ISL datasets
Ms. M. Krishnaveni, Dr. V. Radha
Abstract | PDF |
2361-2369 |
22. |
Parent Siblings Oriented Tree Quorum Protocol
Anurag Singh, Ashish Kumar Rai, Anup Kumar Jayswal and Meenu
Abstract | PDF |
2370-2376 |
23. |
A Simple Hybrid Wormhole Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks
A.VANI, D.Sreenivasa Rao
Abstract | PDF |
2377-2384 |
24. |
Intelligent and Effective Heart Disease Prediction System using Weighted Associative Classifiers
Jyoti soni, Ujma Ansari, Dipesh Sharma, Sunita Soni
Abstract | PDF |
2385-2392 |
25. |
Security For Wireless Sensor Network
Saurabh Singh, Dr. Harsh Kumar Verma
Abstract | PDF |
2393-2399 |
26. |
Devanagari Isolated Character Recognition by using Statistical features
( Foreground Pixels Distribution, Zone Density and Background Directional Distribution feature and SVM Classifier)
Mahesh Jangid
Abstract | PDF |
2400-2407 |
27. |
Schedule Risk Analysis Simulator using Beta Distribution
Isha Sharma, Dr. P.K. Suri
Abstract | PDF |
2408-2414 |
28. |
Image Compression Using Fast 2-D DCT Technique
Anjali Kapoor, Renu Dhir
Abstract | PDF |
2415-2419 |
29. |
Preprocessing and Screen-Cursor Mapping for a Virtual TouchScreen on a Projected Area
Smita Das, Dwijen Rudrapal, Anupam Jamatia, Lalita Kumari
Abstract | PDF |
2420-2429 |
30. |
Global Chaos Synchronization of the Hyperchaotic Qi Systems by Sliding Mode Control
Dr. V. Sundarapandian, S. Sivaperumal
Abstract | PDF |
2430-2437 |
31. |
Anti-Synchronization of the Hyperchaotic Liu and Hyperchaotic Qi Systems by Active Control
Dr. V. Sundarapandian, R. Karthikeyan,
Abstract | PDF |
2438-2449 |
32. |
Anti-Synchronization of the Hyperchaotic Lorenz Systems by Sliding Mode Control
Dr. V. Sundarapandian, S. Sivaperumal
Abstract | PDF |
2450-2457 |
33. |
Global Chaos Synchronization of Hyperchaotic Lorenz and Hyperchaotic Chen Systems by Adaptive Control
Dr. V. Sundarapandian, R. Karthikeyan
Abstract | PDF |
2458-2472 |
34. |
Facets of Software Component Repository
Vaneet Kaur, Shivani Goel
Abstract | PDF |
2473-2476 |
35. |
Cloud Based Distributed Databases: The Future Ahead
Arpita Mathur, Mridul Mathur, Pallavi Upadhyay
Abstract | PDF |
2477-2481 |
36. |
Metric for Early Measurement of Software Complexity
Ghazal Keshavarz, Dr. Nasser Modiri, Dr. Mirmohsen Pedram
Abstract | PDF |
2482-2490 |
37. |
Ambient Intelligence: Next Generation Technology
Anand Chandrasekhar, Vineeth.P.Kaimal, Mrs. Chhayadevi Bhamare, Miss Sunanda Khosla
Abstract | PDF |
2491-2497 |
38. |
An Implementation of Semantic Web System for Information retrieval using J2EE Technologies.
B.Hemanth kumar, Prof. M.Surendra Prasad Babu
Abstract | PDF |
2498-2505 |
39. |
Generating Customer Profiles for Retail Stores Using Clustering Tech
Pramod Prasad, Dr. Latesh G. Malik
Abstract | PDF |
2506-2510 |
40. |
Sectorization of Walsh and Walsh Wavelet in CBIR
Dr. H.B.Kekre, Dhirendra Mishra
Abstract | PDF |
2511-2522 |
41. |
ANN and Fuzzy Logic Models for the Prediction of groundwater level of a watershed
M.Kavitha Mayilvaganan, K.B.Naidu
Abstract | PDF |
2523-2530 |
42. |
A new approach for Evolution of end to end Security in Wireless Sensor Network
S. Anjali Devi, R. Venu Babu, B. Srinivasa Rao
Abstract | PDF |
2531-2543 |
43. |
Combining K-Harmonic mean and Hierarchical algorithms for robust and efficient data clustering with cohesion selfmerging
Jyothi Bankapalli, R.Venu Babu, S. Anjali Devi
Abstract | PDF |
2544-2553 |
44. |
A Mixed-Mode Signal Processing Architecture for Radix-2 DHT
Gautam A. Shah, Tejmal S. Rathore
Abstract | PDF |
2554-2564 |
45. |
Performance of SIFT based Video Retrieval
Shradha Gupta, Prof. Neetesh Gupta, Dr. Bhupendra Verma
Abstract | PDF |
2565-2571 |
46. |
Performance Evaluation of L3 Handover Latency in MIPv6
D.Kavitha, Dr.K.E.Sreenivasa Murthy, S.Zahoor ul Huq
Abstract | PDF |
2572-2579 |
47. |
Information Technology Ethics: The Conceptual Model of Constructs, Actions and Control Measure
Azhar Abd Aziz, Anitawati Mohd Lokman, Zawiyah Mohammad Yusof
Abstract | PDF |
2580-2588 |
To view the PDF use Adobe Acrobat 6.0 or more |