1. |
Four Walsh Transform Sectors Feature Vectors
for Image Retrieval from Image Databases
Pages : 33-37
H. B. Kekre, Dhirendra Mishra
Abstract | PDF |
2. |
Performance issues on AODV and AOMDV for MANETS
Pages : 38-43
R.Balakrishna, U.Rajeswar Rao , N.Geethanjali N
Abstract | PDF |
3. |
Principal Component Analysis Based Image
Recognition
Pages : 44-50
J.Ashok,.E.G.Rajan
Abstract | PDF |
4. |
Writer Identification and Recognition
Using Radial Basis Function
Pages: 51-57
J.Ashok,.E.G.Rajan
Abstract | PDF |
5. |
Selecting type of clusters that are most
appropriate for capturing overlapping interests of
different types of users in personalization tasks using
Web Usage Mining
Pages: 58-60
Sanjay B. Thakare, Sangram Z. Gawali
Abstract | PDF |
6. |
Performance Analysis Of Guaranteed Packet Transfer In Coverage Area and
Less Coverage Area For MANET
Pages: 61-66
S.Gomathi , K.Duraiswamy
Abstract | PDF |
7. |
A New Hashing and Caching Approach for
Minimizing Overall Location Management Cost in
Next-Generation Wireless Networks
Pages: 67-76
Md. Mohsin Ali, Md. Kowsar Hossain, and Md. Amjad Hossain
Abstract | PDF |
8. |
Malicious Node Detection System for Mobile Ad hoc
Networks
Pages: 77-85
A.Rajaram, S.Palaniswami
Abstract | PDF |
9. |
Performance Enhancement of MC-CDMA System
through STTC based STBC Site Diversity
Pages: 86-92
N.Kumaratharan, K.Jayanthi and P.Dananjayan
Abstract | PDF |
10. |
Security Enhancement of First Mile Wireless Access
with Optimal QoS through Anonymity in
Convergence Network
Pages: 93-104
Shankar R and Dananjayan P
Abstract | PDF |
11. |
Article Removed
Pages: 105-109
xxx, xxx
Abstract | PDF |
12. |
Design and Analysis of Enhanced HTTP
Proxy Cashing Server
Pages: 110-113
Vimal Bibhu, Narendra Kumar, Mohammad Islam, Shashank Bhardwaj
Abstract | PDF |
13. |
Routing problem for parallel route based maxmin ant system
Pages: 114-120
K.Sankar and K.Krishnamoorthy
Abstract | PDF |
14. |
This paper is removed as requested by Author
Pages: 121-125
Madhu Yedla, Srinivasa Rao Pathakota, T M Srinivasa
Abstract | PDF |
15. |
Method to Minimize the Clock Skew and Uniform
Clock Distribution using Parallel Port in Pipe
Line Based Multi Channel DMA Request
Terminal for Frequency Measurement
Pages:126-129
N. Suresh Kumar, D.V. RamaKotiReddy, A.Harish, S.Amarnadh
Abstract | PDF
|
16. |
Detecting Malicious Node in MANET Using
Trust Based Cross-Layer Security Protocol
Pages:130-137
A.Rajaram, S.Palaniswami
Abstract | PDF
|
17. |
Selection of Best Web Site by Applying COPRAS-G
method
Pages:138-146
Bindu Madhuri .Ch, Anand Chandulal.J, Padmaja.M
Abstract | PDF |