ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 3 Number 7 July 2011) |
Page |
1. |
Road Recognition for Vision Navigation of Robot by Using Computer Vision
Jagadeesh Thati, Fazal Noorbasha, Syam Babu Vadlamudi
Abstract | PDF |
2589-2594 |
2. |
SUPPORT VECTOR MACHINE BASED GUJARATI NUMERAL RECOGNITION
Mamta Maloo, K.V. Kale
Abstract | PDF |
2595-2600 |
3. |
Trust Worthy Architecture Implementation for Mobile Ad hoc Networks
D.Saravanan, R.M.Chandrasekaran, B.Vishnu Prabha, V.R.Sarma Dhulipala
Abstract | PDF |
2601-2609 |
4. |
IMPROVED HYBRID MODEL FOR DENOISING POISSON CORRUPTED XRAY IMAGESks
N. Umadevi, Dr. S.N.Geethalakshmi
Abstract | PDF |
2610-2619 |
5. |
Effect of Quality Parameters on Energy Efficient Routing Protocols in MANETs
Dr. R.K Singh, Tanu Preet Singh, Jayant Vats
Abstract | PDF |
2620-2626 |
6. |
An Evaluative Model for Information Retrieval System Evaluation: A Usercentered Approach
Bernard I. Akhigbe, Babajide S. Afolabi, James I. Udo, Emmanuel R. Adagunodo
Abstract | PDF |
2627-2634 |
7. |
Intelligent Public Transport Information System
Mrs. Uma Nagaraj, Mr. Rahul Wakade, Mr. Rahul Gaware, Mr. Ranjit Dhame, Mr. Dinesh Alhat
Abstract | PDF |
2635-2641 |
8. |
Semantic Web Services and Its Approaches
Tauqeer Ahmad Usmani, Prof. Durgesh Pant, Prof. Kunwar Singh Vaisla
Abstract | PDF |
2642-2648 |
9. |
Various Schemes to Speed up the PC during Virus Scan
Neha Bishnoi, Prof. S.S Tyagi
Abstract | PDF |
2649-2655 |
10. |
Betel Leaf Area Measurement Using Image Processing
Sanjay B. Patil, Dr. Shrikant K. Bodhe
Abstract | PDF |
2656-2660 |
11. |
ENERGY EFFICIENT DATA GATHERING SCHEME USING CROSS LAYER CLUSTER APPROACH FOR WIRELESS SENSOR NETWORKS
NANDINI PRASAD K S, G R VEERENDRA, PUTTAMADAPPA C
Abstract | PDF |
2661-2667 |
12. |
An Efficient Agent-Based AODV Routing Protocol in MANET
Preeti Bhati, Rinki Chauhan, R K Rathy, Ritu Khurana
Abstract | PDF |
2668-2673 |
13. |
TEMPORAL SEQUENTIAL PATTERN IN DATA MINING TASKS
DR. NAVEETA MEHTA, MS. SHILPA DANG
Abstract | PDF |
2674-2678 |
14. |
A New Image Steganography Approach for Information Security Using Gray Level Images in Spatial Domain
Rajkumar Yadav, Ravi Saini and Kamaldeep
Abstract | PDF |
2679-2690 |
15. |
FP-Tree Based Algorithms Analysis: FPGrowth, COFI-Tree and CT-PRO
Bharat Gupta, Dr. Deepak Garg
Abstract | PDF |
2691-2699 |
16. |
Simulation and Analysis of Digital Video Watermarking Using MPEG-2
Dr. Anil Kumar Sharma, Mr. Yunus Mohammed Pervej
Abstract | PDF |
2700-2706 |
17. |
Recoverable Timestamping Approach For Concurrency Control In Distributed Database
Rinki chauhan, Suman Malik, R K Rathy, Preeti Bhati
Abstract | PDF |
2707-2711 |
18. |
Comparision Of Traditional Method of Histogram Equalisation with HSV and Kekre Transform for Content Based Image Retrieval
Ms. Venu Shah, Prof. Kavita Tewari, Mr. Mahesh Dasarath, Mr. Pavan Bhat
Abstract | PDF |
2712-2718 |
19. |
Efficient Lossless Colour Image Compression Using Run Length Encoding and Special Character Replacement
Debashis Chakraborty, Soumik Banerjee
Abstract | PDF |
2719-2725 |
20. |
DATA STREAM MINING ALGORITHMS – A REVIEW OF ISSUES AND EXISTING
APPROACHES
A.Mala, F.Ramesh Dhanaseelan
Abstract | PDF |
2726-2732 |
21. |
Linear Network Fractional Routing
S.ASOKAN, Dr.V.PALANISAMY
Abstract | PDF |
2733-2738 |
22. |
Comparison of Optimal Homotopy Asymptotic Method with Homotopy
Perturbation Method of Twelfth Order Boundary Value Problems
MukeshGrover, Dr.ArunKumarTomer
Abstract | PDF |
2739-2747 |
23. |
Problem Analysis of Routing Protocols in MANET in Constrained Situation
Manish Bhardwaj, Sachi Pandey, R.P Mahapatra
Abstract | PDF |
2748-2753 |
24. |
Distinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules
Sridevi.Ravada, Vani prasanna.Kanakala, Ramya.Koilada
Abstract | PDF |
2754-2764 |
25. |
Multi-agent Collaboration Engine for Supply Chain Management
Sandeep Garg, Dr. S.Srinivasan, Vivek Jaglan
Abstract | PDF |
2765-2773 |
26. |
Flood Frequency Analysis Using the Gumbel Distribution
Never Mujere
Abstract | PDF |
2774-2778 |
27. |
A Comparative Study of Location Management Schemes: Challenges and
Guidelines
Vijendra Singh Bhadauria, Sanjeev Sharma, Ravindra Patel
Abstract | PDF |
2779-2785 |
28. |
SEGMENTATION OF OIL SPILL IMAGES USING IMPROVED FCM AND LEVEL SET METHODS.
V.RADHIKA, DR. G. PADMAVATHI
Abstract | PDF |
2786-2791 |
29. |
An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining
Yogendra Kumar Jain, Vinod Kumar Yadav, Geetika S. Panday
Abstract | PDF |
2792-2798 |
30. |
Simulator for Software Project Reliability Estimation
Sanjana, Dr. P.K. Suri
Abstract | PDF |
2799-2810 |
31. |
Molecular Database Generation for Type 2 Diabetes using Computational Science-Bioinformatics' Tools
Gagandeep Kaur Grewal, Dr. Amardeep Singh
Abstract | PDF |
2811-2817 |
32. |
Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology
B. Ravi Kumar, Dr.P.R.K.Murti
Abstract | PDF |
2818-2827 |
33. |
Iterative Enhanced Directional Based Demosaicking Algorithm
A.Jayachandran , Dr.R.Dhanasekaran, Prof P. Rajan
Abstract | PDF |
2828-2834 |
34. |
Accident Emergency Response And Routing Software (AERARS) using Genetic Algorithm
Naveen Ramachandran, G.Devi
Abstract | PDF |
2835-2845 |
35. |
A Novel Approach for Text Categorization of Unorganized data based with Information Extraction
Suneetha Manne, Dr. S. sameen Fatima
Abstract | PDF |
2846-2854 |
36. |
Ant Colony Optimization approach for Solving FPGA routing with minimum Channel Width
Vinay Chopra, Amardeep Singh
Abstract | PDF |
2855-2861 |
37. |
DCF Improvement for Satisfactory Throughput of 802.11 WLAN
Ashwini Dalvi, Pamukumar Swamy, B B Meshram
Abstract | PDF |
2862-2868 |
38. |
Achieving Improved Performance at Access Point in WLAN Infrastructure Mode
Irfan Siddavatam
Abstract | PDF |
2869-2875 |
39. |
A Review of Heuristics for Optimal Page Access Sequence with a Model for Spatial Queries
Dr.Chandra.E, Anuradha.V.P
Abstract | PDF |
2876-2885 |
40. |
DESIGN OF PARAMETER EXTRACTOR IN LOW POWER PRECOMPUTATION BASED CONTENT ADDRESSABLE MEMORY
Saroja pasumarti, Lakshmi Kadali, Swathi.Bankapalli
Abstract | PDF |
2886-2895 |
41. |
Web Log Clustering Approaches – A Survey
G. Sudhamathy, Dr. C. Jothi Venkateswaran
Abstract | PDF |
2896-2903 |
42. |
Performance Analysis of AODV-UI Routing Protocol With Energy Consumption Improvement Under Mobility Models in Hybrid Ad hoc Network
Abdusy Syarif, Riri Fitri Sari
Abstract | PDF |
2904-2918 |
To view the PDF use Adobe Acrobat 6.0 or more |