1. |
Design of DFE Based MIMO Communication System
for Mobile Moving with High Velocity
Pages : 319-323
S.Bandopadhaya, L.P. Mishra, D.Swain
, Mihir N.Mohanty
Abstract | PDF |
2. |
An Abstract memory model describing the
interaction between thread and memory with
debugger tools
Pages : 324-328
Shruti Sandal
, Dr.Raghuraj Singh ,Abdul Jabbar Khilji,,Shashi Shekhar Ranga, sanjay tejasvee
Abstract | PDF |
3. |
A noval approach for retrieving an image using CBIR
Pages : 329-331
D.Mahidhar, M.V.S.N.Maheswar
Abstract | PDF |
4. |
A comparison between Public key authority and
certification authority for distribution of public key
Pages: 332-336
Gaurav Agarwal , Saurabh Singh
Abstract | PDF |
5. |
Synthesis of DSP Systems using Data Flow Graphs for Silicon Area Reduction
Pages: 337-341
Rakhi S, PremanandaB.S, Mihir Narayan Mohanty
Abstract | PDF |
6. |
Analysis of Power Amplifier by Frontier
Recognition and Histograms
Pages: 342-346
Surekha Chauhan, Prof. P.K. Ghosh ,Madan Shishodia
Abstract | PDF |
7. |
Study of Security in Wireless Sensor Networks
Pages: 347-354
Pooja Kumari, Mukesh Kumar, Rahul Rishi
Abstract | PDF |
8. |
An Efficient Routing scheme for reliable path
establishment among Mobile Devices in
Heterogeneous Networks
Pages: 355-362
R S Shaji, R S Rajesh, B. Ramakrishnan
Abstract | PDF |
9. |
Operating System based Compliance Validation of
Trusted Computing
Pages: 363-365
Madan Singh, Surekha Chauhan
Abstract | PDF |
10. |
An Enhancing approach in MEDLINE & PubMed
using Text Mining
Pages: 366-370
R.Santhanalakshmi, Dr.K.Alagarsami
Abstract | PDF |
11. |
Pattern Extraction, Classification and Comparison
Between Attribute Selection Measures
Pages: 371-375
Subrata Pramanik, Md. Rashedul Islam, Md. Jamal Uddin
Abstract | PDF |
12. |
Article Removed due to Plagarism
Pages: 376-384
Abstract | PDF |
13. |
Effect of User-Unknown Email addresses in
spammers' lists
Pages: 385-388
Rajiv Mahajan, Dr. Surjit Singh, Pavitar Singh
Abstract | PDF |
14. |
An Approach to Shortest Path Technique for
BGP Using OSPF
Pages: 389-391
K.Krishna Chaitanya, Ch.Ravi Kishore
Abstract | PDF |
15. |
Jacobi computation using mobile agent
Pages: 392-401
Cyril Dumont, Fabrice Mourlin
Abstract | PDF |
16 |
Web Services Security Architectures using Role-
Based Access Control
Pages: 402-407
K.Venkateswar Rao, Dr.M.Srinivasa Rao, K.Mrunalini Devi, Dr.D.Sravan Kumar, M.Upendra Kumar
Abstract | PDF |
17. |
Software Architectures Design Patterns Mining for
Security Engineering
Pages: 408-413
A.V.Krishna Prasad, Dr.S.Ramakrishna
Abstract | PDF |
18. |
Combined Text Watermarking
Pages: 414-416
Suganya Ranganathan , Ahamed Johnsha Ali, Kathirvel.K & Mohan Kumar.M
Abstract | PDF |
19. |
Unsupervised Analysis of Arrhythmias using
K-means Clustering
Pages: 417-419
Manpreet Kaur, A.S.Arora
Abstract | PDF |
20. |
Performance Analysis of 802.11 and 802.11p in
Cluster Based Simple Highway Model
Pages: 420-426
B. Ramakrishnan, R. S. Rajesh, R. S. Shaji
Abstract | PDF |
21. |
Genetic Algorithms and Programming-An
Evolutionary Methodology
Pages: 427-437
T. Venkat Narayana Rao , Srikanth Madiraju
Abstract | PDF |
22. |
Detection of Abnormal Masses in
Mammogram Images
Pages: 438-442
Samir Kumar Bandyopadhyay
Abstract | PDF |
23. |
A Multiobjective Genetic Algorithm for
Feature Selection in Data Mining
Pages: 443-448
Venkatadri.M, Srinivasa Rao.K
Abstract | PDF |
24. |
Research Directions in Semantic Web on Healthcare
Pages: 449-453
S.Gnanambal. M. Thangaraj
Abstract | PDF |
25. |
Text database cleaning by filling the Missing values
using Object Oriented Intelligent
Multi-Agent
System Data Cleaning Architecture
Pages: 454-464
G. Arumugam,T. Joshva Devadas
Abstract | PDF |
|
|