ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 4 Number 9 September 2012) |
Page |
1. |
Signature Verification Using Neural Network
Manoj Kumar
Abstract | PDF |
1498-1504 |
2. |
K-Partition Model for Mining Frequent Patterns in Large Databases
Nidhi Sharma, Anju Singh
Abstract | PDF |
1505-1512 |
3. |
MINING THE INVESTOR’S PERCEPTION ABOUT DIFFERENT INVESTMENT OPTIONS USING CLUSTERING ANALYSIS
Gunjan Batra, Vijaylaxmi, Anisha Gupta
Abstract | PDF |
1513-1516 |
4. |
A NEW PROCESS MODEL FOR EMBEDDED SYSTEMS CONTROL FOR TELECOM INDUSTRY
Sanjai Gupta, Mohammed Hussain
Abstract | PDF |
1517-1524 |
5. |
Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs
Poonam Pahuja, Sanjay Pahuja, Dr. Tarun Shrimali
Abstract | PDF |
1525-1533 |
6. |
A Classification Technique for Microarray Gene Expression Data using PSO-FLANN
Jayashree Dev, Sanjit Kumar Dash, Sweta Dash, Madhusmita Swain
Abstract | PDF |
1534-1539 |
7. |
A note on Quantum Cryptography
G. Ananda Rao, Muduganti Rathan Reddy, Y.Srinivas, J.Vijayasekhar, N.Vamsi Krishna, Ramakrishna Jaliparthi, V.Manoj Sekhar, Venu Saggurthi, S. Usha Rani
Abstract | PDF |
1540-1544 |
8. |
Noise Control in Industries by Adaptive MDCT Method
G.Suresh
Abstract | PDF |
1545-1549 |
9. |
An Efficient Method for Digital Image Watermarking Based on PN Sequences
Shivani Garg, Ranjit Singh
Abstract | PDF |
1550-1561 |
10. |
Optimization Technique for Maximization Problem in Evolutionary Programming of Genetic Algorithm in Data Mining
R. Karthick, S.Saravanan, M.VetriSelvan
Abstract | PDF |
1562-1569 |
11. |
Approaches for Intelligent Traffic System: A Survey
Pratishtha Gupta, G.N Purohit, Amrita Dadhich
Abstract | PDF |
1570-1578 |
12. |
Optimization of ETL Work Flow in Data Warehouse
Kommineni Sivaganesh, P Srinivasu, Dr Suresh Chandra Satapathy
Abstract | PDF |
1579-1586 |
13. |
Localization of Mobile Nodes in Wireless Networks with Correlated in Time Measurement Noise
K.Anusha, Manohar Gosul, G. Dileep Kumar
Abstract | PDF |
1587-1593 |
14. |
Frequent Pattern Mining using CATSIM Tree
Ketan Modi, B.L.Pal
Abstract | PDF |
1594-1602 |
15. |
E-Cash Payment Protocols
Shweta Srivastava, Vandana Saraswat
Abstract | PDF |
1603-1607 |
16. |
Energy-Balanced Transmission Policies for Wireless Sensor Networks
Y.Aswini, S.P.Anandaraj, V. Ramana, S.P.Poornima
Abstract | PDF |
1608-1616 |
17. |
A Survey paper: Data Security in Local Networks Using Distributed Firewalls
Sneha Sahare, Mamta Joshi, Manish Gehlot
Abstract | PDF |
1617-1622 |
18. |
Design of Anomaly Detection System for Outlier Detection in Hardware Profile Using PCA
Hari Om, Tanmoy Hazra
Abstract | PDF |
1623-1632 |
19. |
An Enhanced Active contour based Segmentation for Fingerprint Extraction
S.Uma maheswari, Dr.E.Chandra
Abstract | PDF |
1633-1638 |
20. |
Prediction of Association among Numerical Aptitude, Programming Skills, Trait Emotional Intelligence on Students Performance
V. Maria Antoniate Martin, T.Lucia Agnes Beena
Abstract | PDF |
1639-1646 |
21. |
SURVEY OF DIGITAL WATERMARKING USING DCT
Usha Pal, Dinesh Chandra
Abstract | PDF |
1647-1649 |
22. |
A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
Akanksha Mathur
Abstract | PDF |
1650-1657 |
23. |
EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT
Jasmin James, Dr. Bhupendra Verma
Abstract | PDF |
1658-1663 |
To view the PDF use Adobe Acrobat 6.0 or more |