VOLUME 2 ISSUE 3 May-June 2011

ISSN 0975 - 9646

Dynamic Monitoring of Moving Objects: A Novel Model to Improve Efficiency, Privacy and Accuracy of the Framework
Pages : 946-950
Bathula Sowjanya, Kolikipogu Ramakrishna, K.Sailaja
Abstract | PDFPDF
Pages : 951-954
Yogish H K ,Dr. G T Raju,Deepa Yogish
Abstract | PDFPDF
An Effective Determination of Initial Centroids in K-Means Clustering Using Kernel PCA
Pages : 955-959
M.Sakthi and Dr. Antony Selvadoss Thanamani
Abstract | PDFPDF
4. Wave Atoms Decomposition based Eye Iris Image Compression
Pages : 960-964
Satya P Kumar Somayajula,Sai Charan Dhatrika,Deepika Puvvula
Abstract | PDFPDF
5. Fusion of Web Structure Mining and Web Usage Mining
Pages : 965-967
Suresh Babu, P. Sathish, J. Ashok
Abstract | PDFPDF
6. Feasibility study on component based software architecture for large scale software systems
Pages : 968-972
P. G. Chaitanya , K.V.Ramesh
Abstract | PDFPDF
Analyzing XML Parsers Performance for Android Platform
Pages : 973-976
M V Uttam Tej ,Dhanaraj Cheelu, M.Rajasekhara Babu, P Venkata Krishna
Abstract | PDFPDF
Automated Functional Testing Using IBM Rational Robot
Pages : 977-981
A.Chakrapani, K.V.Ramesh
Abstract | PDFPDF
Detection of Attacks in an Intrusion Detection System
Pages : 982-986
Sapna S. Kaushik,P.R.Deshmukh
Abstract | PDFPDF
10. Combined Security Model Tool for Adhoc Networks
Pages : 987-991
Kishore Kumar Maturi , Ratnaraju Mukiri , Srinivasa Rao P , Basheera Shaik
Abstract | PDFPDF
11. Web Intelligence: Analysis of Unstructured Database of Documents Using KnowItAll
Pages : 992-994
Shweta Gupta, Kovid Agarwal, Shamla Mantri
Abstract | PDFPDF
12. Application of Web Mining with XML Data using XQuery
Pages : 995-1000
Roop Ranjan,Ritu Yadav ,Jaya Verma
Abstract | PDFPDF
A Design of Centralized Meeting Scheduler with Distance Metrics
Pages : 1001-1006
M. Sugumaran
Abstract | PDFPDF
A Cross Layered Architecture and Its Proposed Security Mechanism to Lessen Attacks Vulnerability in Mobile Ad Hoc Networks
Pages : 1007-1011
K.P.Manikandan,R.Satyaprasad, K.Rajasekhararao
Abstract | PDFPDF
Framework of M-Commerce using ID-Based Cryptography
Pages : 1012-1017
Sridhar.K ,M.Sandeep ,D.Sagar
Abstract | PDFPDF
16. Image Retrieval with the use of Color and Texture Feature
Pages : 1018-1021
Gauri Deshpande, Megha Borse
Abstract | PDFPDF
17. Load Balancing In Structured Peer to Peer Systems
Pages : 1022-1025
Sumit A. Hirve, Suhas H. Patil,
Abstract | PDFPDF
18. Data Mining : A prediction of performer or underperformer using classification
Pages : 1026-1030
Umesh Kumar P andey S. Pal
Abstract | PDFPDF
19. Applying Hidden Markov Model to Protein Sequence Alignment
Pages: 1031-1035
Er. Neeshu Sharma, Dinesh Kumar, Reet Kamal Kaur
Abstract | PDFPDF
20. Handwritten Gurumukhi Character Recognition Using Zoning Density and Background
Directional Distribution Features

Pages: 1036-1041
Kartar Singh Siddharth, Renu Dhir, Rajneesh Rani
Abstract | PDFPDF
A Survey on Model Based Test Case Prioritization
Pages : 1042-1047
Sanjukta Mohanty, Arup Abhinna Acharya, Durga Prasad Mohapatra
Abstract | PDFPDF
Filter versus Wrapper Feature Subset Selection in Large Dimensionality Micro array: A Review
Pages : 1048-1053
Binita Kumari, Tripti Swarnkar
Abstract | PDFPDF
A Novel Approach for Test CAse Prioritization using Priority Level Technique
Pages : 1054-1060
Arup Abhinna Acharya, Goutam Budha, Namita Panda
Abstract | PDFPDF
24. Implementation of User’s Browse Log Monitoring Tool for Effective Web Usage Mining
Pages : 1061-1064
Asha Khilrani,Shishir K. Shandilya
Abstract | PDFPDF
25. Mining Frequent Patterns Using Queues In Large Databases
Pages : 1065-1067
Divya Bhatnagar, Neeru Adlakha, K. R. Pardasani
Abstract | PDFPDF
26. A Simulation Study between the Random Based Synthetic Entity Mobility Models in Ad Hoc Networks
Pages : 1068-1074
D.Srinivasa Rao , T. Susan Salomi, G. Sriram
Abstract | PDFPDF
27. Dual Band E-Shape Micro strip Patch Antenna on RT DUROID 5880 Substrate for Pervasive Wireless Communication
Pages : 1075-1081
Neenansha Jain, Prof Rajesh Nema, Anubhuti Khare, Puran Gour
Abstract | PDFPDF
28. Fast Face Detection Using Graphics Processor
Pages : 1082-1086
Kailash Devrari, K.Vinay Kumar
Abstract | PDFPDF
29. Evolution of 4G-Research Directions Towards Fourth Generation Wireless Communication
Pages: 1087-1095
B.Vasavi,Mounika Marepalli, Leepika Gudur
Abstract | PDFPDF
30. Solving Traveling Salesman Problem Using Hierarchical Clustering and Genetic Algorithm
Pages: 1096-1098
S N S Kalyan Bharadwaj.B, Krishna Kishore.G, Srinivasa Rao.V
Abstract | PDFPDF
An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks
Pages : 1009-1104
Tejomayee Nath & Suneeta Mohanty
Abstract | PDFPDF
32. Comparative study of FIR and IIR filters for the removal of Baseline noises from ECG signal
Pages : 1105-1108
Seema rani, Amanpreet Kaur, J S Ubhi
Abstract | PDFPDF
33. Lossless Visible Watermarking for Video
Pages : 1109-1113
Saraswathi M
Abstract | PDFPDF
34. Tank Water Level Monitoring System using GSM Network
Pages : 1114-1120
Ayob Johari, Mohd Helmy Abd Wahab, Nur Suryani Abdul Latif, M. Erdi Ayob, M. Izwan Ayob, M. Afif Ayob,
Mohd Norzali Haji Mohd
Abstract | PDFPDF
35. Rule based programming with Drools
Pages : 1121-1126
Narendra Kumar, Dipti D Patil, Vijay M. Wadhai
Abstract | PDFPDF
Mobile User’s Location Management using Bloom Filter
Pages : 1127-1130
Pragyan Acharya, Sudhansu Sekhar Singh
Abstract | PDFPDF
37. Flooding Based DDoS Attacks and Their Influence on Web Services
Pages :1131-1136
Sunil Kumar,Mandeep Singh,Monika Sachdeva, and Krishan Kumar
Abstract | PDFPDF
38. Web Components as a measure for estimating Effort and Size of Web Applications
Pages : 1137-1143
Sworoop Suhanjan Das, Kumar Devadutta, Santosh Kumar Swain, Sanjay Kumar
Abstract | PDFPDF
39. A Model for Web Page Usage Mining Based on Segmentation
Pages : 1144-1148
K.S.Kuppusamy, G.Aghila
Abstract | PDFPDF
40. Clonal Selection Method for Virus Detection in a Cloud
Pages : 1149-1153
Agnika Sahu, Tanmaya Swain, Tapaswini Samant
Abstract | PDFPDF
41. Media Access Control Protocol for Mobile Sensor Network- Modelling Using OMNeT++ -MiXiM Network Simulator.
Pages : 1154-1159
Aditi .P. Khadilkar , Nitin G. Palan
Abstract | PDFPDF
42. Geographical Routing Algorithms In Asynchronous Wireless Sensor Network
Pages : 1160-1163
A. Vaishali S.K, B.N.G. Palan
Abstract | PDFPDF
43. A Survey on Test Case Generation from UML Model
Pages :1164-1171
Monalisha Khandai, Arup Abhinna Acharya, Durga Prasad Mohapatra
Abstract | PDFPDF
44. Test Case Generation for Concurrent System using UML Combinational Diagram
Pages : 1172-1181
Monalisha Khandai, Arup Abhinna Acharya, Durga Prasad Mohapatra
Abstract | PDFPDF
45. Energy Conservation Techniques in Ad hoc Networks
Pages : 1182-1186
Mohammed Ali Hussain, M.Ravi Sankar, Vijaya Kumar Voleti,Y.Srinivasa Rao , Nalla Lovanjaneyulu
Abstract | PDFPDF
46. Generation of Test Cases Using UML Sequence Diagram in a System with Communication Deadlock
Pages : 1187-1190
DebashreePatnaik,Arup Abhinna Acharya, Durga Prasad Mohapatra
Abstract | PDFPDF
47. Pair vs Solo Programming: Students’ Perceptions
Pages : 1191-1196
Madhumita Singha Neogi , Vandana Bhattacherjee
Abstract | PDFPDF
48. Anomaly Detection On User Browsing Behaviors Using Hidden Semi-Markov Model
Pages : 1197-1201
Gamidi Pavan babu, Jayavani.V, C.P.V.N.J. Mohan Rao
Abstract | PDFPDF
49. Modeling and Re-Employment of Differential Unit Test Cases from System Test Cases
Pages : 1202-1221
C.P.V. N. J. Mohan Rao , Nandagiri R G K prasad, Satya P Kumar Somayajula
Abstract | PDFPDF
50. Optimization of Query Processing Time Base on Materialized Sample View
Pages : 1222-1228
Mahip Bartere and Prashant Deshmukh
Abstract | PDFPDF
51. Node Density based Performance Analysis of Two Reactive Routing Protocols in Mobile Ad-hoc
Pages : 1229-1234
Gurleen Kaur Walia and Charanjit Singh
Abstract | PDFPDF
52. Simulation based Performance Evaluation and Comparison of Proactive and Reactive Routing
Protocols in Mobile Ad-hoc Networks
Pages : 1235-1239
Gurleen Kaur Walia and Charanjit Singh
Abstract | PDFPDF
53. Automated Authentication using Information Fusion and Score Normalization in Multimodal Biometric Systems
Pages : 1240-1243
Sasidhar Kothuru,Kailasarao. K
Abstract | PDFPDF
54. Segmentation of Handwritten Devanagari Script
Pages : 1244-1247
Saiprakash Palakollu, Renu Dhir, Rajneesh Rani
Abstract | PDFPDF
55. Human Identification using Face and Voice Recognition
Pages : 1248-1252
Ishwar S. Jadhav, V. T. Gaikwad, Gajanan U. Patil
Abstract | PDFPDF
56. A Survey on Intrusion Network Detection System Using Data Mining Techniques
Pages :1253-1256
A. S. Kapse, V. P. Kshirsagar, Avinash Kapse, M. B. Nagori
Abstract | PDFPDF
57. Perturbation of String Values
Pages : 1257-1259
Krishna Priya .J Geetha Mary. A
Abstract | PDFPDF
58. Implementation of Web Cache using Web Browser
Pages : 1260-1262
Harshal N. Datir, Dr. P.R. Deshmukh
Abstract | PDFPDF
59. Estimation of MIMO-OFDM Based Channel for High Data Rate Wireless Communication
Pages : 1263-1266
Deeparani Mishra, Sikha Mishra, Mihir N. Mohanty
Abstract | PDFPDF
60. Contour-Based Character Extraction from Text Regions of an Image
Pages : 1267-1271
V.N.Santosh Kumar.Kuppili, Dhanaraj Cheelu, M.Rajasekhara Babu,P.Venkata Krishna
Abstract | PDFPDF
61. A Review on Personalized Information Recommendation System Using Collaborative Filtering
Pages : 1272-1278
Kumar Abhishek, Saurabh Kulkarni, Vipin Kumar.N Archana, P. Kumar
Abstract | PDFPDF
62. Architecting and Designing of Semantic Web Based Application using the JENA and PROTÉGÉ
– A Comprehensive Study
Pages :1279-1282
Archana P. Kumar, Kumar Abhishek, and Vipin Kumar.N
Abstract | PDFPDF
63. An Implementation of the User-based Collaborative Filtering Algorithm
Pages : 1283-1286
Maddali Surendra Prasad Babu, Boddu Raja Sarath Kumar
Abstract | PDFPDF
64. Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA
Pages : 1287-1291
Snehlata Barde , Sujata Khobragade ,Rasmiprava Singh
Abstract | PDFPDF
65. Data mining: Identify the hidden anomalous through modified data characteristics checking algorithm and disease modeling By Genomics
Pages : 1292-1296
PavanKumar kolla, kolla.haripriyanka
Abstract | PDFPDF
66. Architecture for the Detection of phishing in Mobile Internet
Pages : 1297-1299
M.Archana, P.M.Durai Raj Vincent , Naveen Kumar Boggavarapu
Abstract | PDFPDF
67. A New Algorithm for Scheduling Parallel Tasks in Utility Grids using Reserve Resources for Tasks with Deadline
Pages : 1300-1304
Leyli Mohammad khanli, Motahareh Ahmadi
Abstract | PDFPDF
68. Sign Gesture Recognition using Combined Features of Sum graph and HMM with Decision
tree classifier
Pages : 1305-1308
Punamchand Patidar, Neetesh Gupta
Abstract | PDFPDF
69. Performance Improvement of IEEE 802.16 / Wimax Using Elliptic Curve Cryptography
Pages : 1309-1311
Pranita K. Gandhewar, Kapil N. Hande
Abstract | PDFPDF
70. Five Layer Security Architecture & Policies for Grid Computing System
Pages : 1312-1314
M. K. Singh & S. Pal
Abstract | PDFPDF
71. A Survey on Performance Analysis of TCP Variants in IEEE 802.11 Based Ad-Hoc Networks
Pages : 1315-1317
Komal Tahiliani, Anju singh, R.C.jain
Abstract | PDFPDF
72. Geographical Routing Algorithms In Asynchronous Wireless Sensor Network
Pages : 1318-1323
Vaishali.S.K , N.G.Palan
Abstract | PDFPDF
73. The Relationship Between Reinforcement Learning and Hash Tables
Pages : 1324-1326
Mohammad Mehdi Hassani
Abstract | PDFPDF
74. Assessing Deviations of Empirical Measures for Temporal Network Anomaly Detection: An
Pages : 1327-1332
Amjan Shaik, S.V. Achuta RAo, Hymavathi. Bhadriraju, Md.Reyaz, Nazeer Shaik
Abstract | PDFPDF
75.. Deconstructing Digital-to-Analog Converters
Pages : 1333-1335
Mohammad Mehdi Hassani
Abstract | PDFPDF
76. An Image Retrieval System Using Spatial Database: An Image Processing Context With
Software Metrics
Pages : 1336-1341
Amjan Shaik, Shaik Meeravali, G. Krishna Reddy, S.V. Achuta RAo, Mohd Mukarram Uddin
Abstract | PDFPDF
77. A Case for Neural Networks
Pages : 1342-1344
Mohammad Mehdi Hassani
Abstract | PDFPDF
78. A Suggestive Evaluation of System Test Cases in OO Systems Through Carving and Replaying
Differential Unit Test Cases: A Metric Context
Pages : 1345-1353
Amjan Shaik, Hymavathi Bhadriraju, K.Vikram, Nazeer Shaik, S.V. Achuta Rao
Abstract | PDFPDF
79. Deconstructing 16 Bit Architectures
Pages : 1354-1357
Mohammad Mehdi Hassani
Abstract | PDFPDF
80. Scale the Active Influence Based Investigation Using Materialized Sub Graphs
Pages : 1358-1363
Amjan Shaik, Nazeer Shaik, Amtul Mubeena, S.V. Achuta Rao, K. Vikram
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-