• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 1 ISSUE 4 SEPTEMBER 2010

    ISSN 0975 - 9646

    1.
    Use of Local Minimization for Lossless Gray Image Compression
    Pages : 203-207
    Narendra Kumar, Dr. Sachin Gupta
    Abstract | PDFPDF
    2.
    Securing Mobile Agent Using Dummy and Monitoring Mobile Agents
    Pages : 208-211
    Neelesh Kumar Panthi, Ilyas Khan, Vijay k. Chaudhari
    Abstract | PDFPDF
    3.
    A new horizon in data security by Cryptography & Steganography
    Pages :212-220
    Dipti Kapoor Sarmah, Neha Bajpai
    Abstract | PDFPDF
    4. Skin Detection Based Cryptography in Steganography(SDBCS)
    Pages: 221-225
    R.Surendiran, Dr.K.Alagarsamy
    Abstract | PDFPDF
    5. Application of Free and Open source software and its Impact on society
    Pages: 226-229
    Ambar kundu, Debashish swain.Sitanath Biswas
    Abstract | PDFPDF
    6. Knowledge Engineering-an Overview
    Pages: 230-234
    D.S Darai, S Singh, S Biswas
    Abstract | PDFPDF
    7. Network Storage and its Future
    Pages: 235-239
    S.Mohanty, P.Nayak, S.Biswas
    Abstract | PDFPDF
    8. Challenges in Computing today
    Pages: 240-243
    Sibani Mahapatra, Nayeera Samar, Sitanath Biswas
    Abstract | PDFPDF
    9. An Approach to Secure Larger Size Data with Authenticity and Integrity
    Pages: 244-248
    Sanjive Tyagi, Ajay Agarwal, Ramveer Singh
    Abstract | PDFPDF
    10. Caching Technique for Improving Data Retrieval Performance in Mobile Ad Hoc Networks
    Pages: 249-255
    K.Shanmugavadivu and M.Madheswaran
    Abstract | PDFPDF
    11. A Journey on WiMAX and its Security Issues
    Pages: 256-263
    Rakesh Kumar Jha, Dr Upena D Dalal
    Abstract | PDFPDF
    12. An Instinctive Approach for Secure Communication - Enhanced Data Encryption Standard (EHDES)
    Pages: 264-267
    Ramveer Singh ,Awakash Mishra and D.B.Ojha
    Abstract | PDFPDF
    13. Security Issues on Banking Systems
    Pages: 268-272
    Mohd Khairul Affendy Ahmad , Rayvieana Vera Rosalim, Leau Yu Beng, Tan Soo Fun
    Abstract | PDFPDF
    14. Automatic Image Retargeting using Saliency based Mesh Parameterization
    Pages: 273-279
    S.Sai kumar, A. Sudhir Babu
    Abstract | PDFPDF
    15. Novel Implementation of Text Mining for Reports
    Pages: 280-284
    K.Suresh, K.Venkatesh Sharma, Y.Srinivas, K.Shalini
    Abstract | PDFPDF
    16. A Two Stage Language Independent Named Entity Recognition for Indian Languages
    Pages: 285-289
    S.Biswas, M.K. Mishra, S.Acharya, S.Mohanty
    Abstract | PDFPDF
    17. Achieving Energy Conservation in Wireless Sensor Networks by using WB (Witness-Based) Approach
    Pages: 290-297
    S.Anandamurugan, C.Venkatesh
    Abstract | PDFPDF
    18. E-Governance and Effective Deliverance of Information and Services to Citizens Architecture
    Pages: 298-302
    Sanjay Tejasvee, Dr. S.S. Sarangdevot, Devendra Gahlot, Shruti Sandal
    Abstract | PDFPDF
    19. Micro-Processor based Improved Ultrasonic Direction and Range Finder
    Pages:303-308
    Ariel Barzilay, Arieh Salomon, Dov Avraham and Zeev Zalevsky
    Abstract | PDFPDF
    20. An approach of Requirements Tracing by using a multilevel Framework
    Pages:309-314
    Anurag Yadav, Yashpal Singh
    Abstract | PDFPDF
    21. Fuzzy K-mean Clustering Via J48 For Intrusiion Detection System
    Pages:315-318
    Kusum Bharti, Shweta Jain, Sanyam Shukla
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-