VOLUME 2 ISSUE 5 September-October 2011

ISSN 0975 - 9646

Effective Congestion Control for Wireless Ad-Hoc Networks
Pages : 1832-1835
P.Sruthi, Manohar Goshel
Abstract | PDFPDF
Data Security through Confidentiality in Cloud Computing Environment
Pages : 1836-1840
Subedari Mithila, P. Pradeep Kumar
Abstract | PDFPDF
Information -Aware Scheduling Strategies for Desktop Grid Environment
Pages : 1841-1846
Er. Jayoti Arora, Ms. Geeta Arora , Dr. Paramjit , Dr. Shaveta
Abstract | PDFPDF
4. Issues in Dimensionality Reduction of Multispectral and Hyperspectral data
Pages : 1847-1851
Bijith Marakarkandy,Dr. B.K. Mishra
Abstract | PDFPDF
5. Scalability & Security Architecture for Internet2 Applications
Pages : 1852-1855
T.Mahesh, Prof. P.Pradeep, R.SatyaTeja
Abstract | PDFPDF
6. A Sequential Approach for Surmising Missing Items in the Shopping Cart
Pages : 1856-1861
Arshiya Subhani, Prof. P.Pradeep kumar
Abstract | PDFPDF
An approach to deal with time- evolving Categorical data based on NIR using Clustering
Pages : 1862-1866
A. Shiva Prasad, Prof P.Pradeep Kumar , D.Prashanth Kumar
Abstract | PDFPDF
Web-based Analysis for Optical Network Data Path Selection
Pages : 1867-1870
M.Murali Krishna, G Devi priya and K Balamurali Krishna
Abstract | PDFPDF
Item Set Extraction of Mining Association Rule
Pages : 1871-1875
Shabana Yasmeen, Prof. P.Pradeep Kumar, A.Ranjith Kumar
Abstract | PDFPDF
10. Kannada and Telugu Native Languages to English Cross Language Information Retrieval
Pages : 1876-1880
Mallamma V Reddy, Dr. M. Hanumanthappa
Abstract | PDFPDF
11. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
Pages : 1881-1886
P.Pranitha, G.Swamy , Manjula Aakunuri
Abstract | PDFPDF
12. Intrusion Detection in Wireless Networks Using Selected Features
Pages : 1887-1893
M.Nadeem Baig, K. Kanthi Kumar, P.Pradeep kumar and Dr. A. Yesu Babu
Abstract | PDFPDF
Enhanced Features For Text Categorization
Pages : 1894-1897
N. Swarna Jyothi, M. Sailaja
Abstract | PDFPDF
Efficient Item Set Mining Supported by IMine Index
Pages : 1898-1903
Manohar.M , Bharathi.G
Abstract | PDFPDF
Malicious Packet Losses Detection by using Compromised Router Detection Protocol
Pages : 1904-1909
Chandra Sekhar.G, Srikanth.D
Abstract | PDFPDF
16. Data Accessibility for Resource Selection in Large-Scale Distributed Systems
Pages : 1910-1922
B.Anusha, Pallamreddy VenkataSubbaReddy, T.V.Sai Krishna
Abstract | PDFPDF
17. A Distributed Dynamic Routing with Security Considerations
Pages : 1923- 1926
B.Mallesham, T.Mahesh, Prof. P.Pradeep, D.Ramesh
Abstract | PDFPDF
18. Detection & Analysis of Skin Cancer using Wavelet Techniques
Pages : 1927-1932
Abstract | PDFPDF
19. An Approach to Improve the Security of Online System using Crypto System
Pages: 1933-1939
Saurav Mallik, Sutapa Majee,Arun Kanti Manna,Md. Headayetullah
Abstract | PDFPDF
20. Paper Removed
Pages: xxxx-xxxx
Abstract | PDFPDF
Frequency and Compactness for Text Categorization
Pages : 1947-1950
Sumayya Hasan Osmani, T.Naresh Kumar
Abstract | PDFPDF
Evolving User Profiles in Dynamic Web Sites
Pages : 1951-1953
Abstract | PDFPDF
Analysis and Performance of ARCP for Multi Region Mobile Emissary Environments
Pages : 1954-1957
Venkata Durga.Kiran Kasula, Venkata Sumanth Mareedu, S.S.Reddy. L
Abstract | PDFPDF
VLSI Design Approach for Emergency Locator Transmitter (ELT) signal of 406MHz with Enhanced Ground Proximity Warning System Receiver
Pages : 1958-1961
K. Babulu,R.S.Vinay
Abstract | PDFPDF
25. A Comparative Study of Routing Protocols
Pages : 1962-1964
Rajender Kumar, Jitender Vats, Arvind Kumar
Abstract | PDFPDF
26. A Research Study on Accountability of Dynamic IP Generation in a Campus Network (Wi-Fi)
Pages : 1965-1970
Pawan Prakash Singh, Savita Shiwani, Ruchi Dave, Naveen Hemrajani
Abstract | PDFPDF
27. A Review of Storage and Fault Tolerace Approaches Used in Cloud Computing
Pages : 1971-1978
Amit Batra, Rajender Kumar, Arvind Kumar
Abstract | PDFPDF
28. Improving Web Accessibility of graphs for visually Impaired
Pages : 1979-1981
Dr.Arvinder Kaur, Diksha Dani and Neeta Mishra
Abstract | PDFPDF
29. An Expert System of Determining Diabetes Treatment Based on Cloud Computing Platforms
Pages : 1982-1987
Dr. Abdullah Al-Malaise Al-Ghamdi, Majda A.Wazzan, Fatimah M. Mujallid, Najwa K.Bakhsh
Abstract | PDFPDF
30. VHDL Modelling of WI- FI Mac Layer for Transmitter
Pages : 1988-1989
Bhanu Sireesha ,M.S.R.Sekhar
Abstract | PDFPDF
31. Competent Search in Blog Ranking Algorithm Using Cluster Mining
Pages : 1990-1994
Robin Singh Bhadoria
Abstract | PDFPDF
32. An Efficient Parallel Sorting Algorithm for Multicore Machines
Pages : 1995-1998
D.Abhyankar, M.Ingle
Abstract | PDFPDF
33. Performance Analysis and Comparison of MANET Routing Protocols
Pages : 1999-2003
Kuljit Kaur,Swati Jindal,Lavneet Bansal
Abstract | PDFPDF
34. Generic Complex Programmable Logic Device (CPLD) Board
Pages : 2004-2007
Nagaraj Hediyal
Abstract | PDFPDF
35. An Effective Indexing Method for High Dimensional Databases
Pages : 2008-2018
Manjunath K.G. , Kallinatha H.D.
Abstract | PDFPDF
36. Advanced Indexing Techniques for Achieving Concurrency in Multidimensional Data Sets
Pages : 2019-2024
N Krishna Kumari, Dr. M.H.M. Krishna Prasad
Abstract | PDFPDF
37. A New Optimal Checkpoint Restart Model
Pages : 2025-2032
Mallikarjuna Shastry P.M., K. Venkatesh
Abstract | PDFPDF
38. IVR Recognisation Using Speech Signals
Pages : 2033-2035
Arjun Kumar.P, Chinna Rao.M, Sridhar. G, Ravi Kumar. B
Abstract | PDFPDF
39. Robust Watermarking of Color Images under Noise and Cropping Attacks in Spatial Domain
Pages : 2036-2041
Alankrita Aggarwal, Monika Singla
Abstract | PDFPDF
40. Data Mining: a Healthy Tool for Your Information Retrieval and Text Mining
Pages : 2042-2045
Santosh Kumar Rath, Manobendu Kesari Jena, Tapaswini Nayak, Biswajit Bisoyee
Abstract | PDFPDF
41. Power Saving Strategies In Wireless Sensor Networks Using Cross Layer Design
Pages : 2046-2051
Pranali D. Tembhurne (Nandeshwar), R.K. Krishna, Nilkamal G. Ramteke
Abstract | PDFPDF
42. Development of a Robot-Car in LEGO Mindstorms NXT tool kit for Obstacle Avoidance using JAVA
Pages : 2052-2054
Saswat Kumar Jena, Prof. (Dr.) Srikant Patnaik
Abstract | PDFPDF
43. Rephrasing Essentials of Object Oriented Programming based on Testing Pre-requisites
Pages : 2055-2059
Amarnath Singh, Biswajit Bishoyee, Santosh Kumar Rath, Dharmananda Parida
Abstract | PDFPDF
44. Text -Steganography: Review Study & Comparative Analysis
Pages : 2060-2062
Swati Gupta and Deepti Gupta
Abstract | PDFPDF
45. Object Classification in Still Images
Pages : 2063-2067
T.Harini, J.Uday Kiran, Prof. P.Pradeep, K. Jhansi Rani
Abstract | PDFPDF
46. An Accurate Termination Condition of the Probabilistic Packet Marking Algorithm
Pages : 2068-2072
J.Shiva Kumar, P.Pradeep Kumar
Abstract | PDFPDF
47. Performance Analysis of Hybrid approach of Clustering Algorithms
Pages : 2073-2077
Alankrita Aggarwal, Neetu Wadhwa
Abstract | PDFPDF
48. Efficient way of Data Managing for Range Queries in Unstructured Peer to Peer Networks.
Pages : 2078-2083
P. Lalitha Kumari, P. Rama Rao and Chinnam Yuva Raju
Abstract | PDFPDF
49. Handling Various Best Security Methods for Bluetooth Technology in Cars to Maintain Secrecy
Pages : 2084-2090
Abstract | PDFPDF
50. Hybrid Broadcast Routing with Dynamic Security Considerations
Pages : 2091-2094
S.Ramasubba Reddy, O. Srinivasa Rao, Dr MHM Krishna Prasad
Abstract | PDFPDF
51. Phishing WebPages Strategy Based On Optical Semblance Assessment
Pages : 2095-2098
Vijaykumar kangala, A. Ranjith Kumar ,Shilpa shesham,Rampelly shilpa
Abstract | PDFPDF
52. Construction of Developing User Profiles for Mining Structure
Pages : 2099-2101
Davuluri Suneetha, Kumar Vasantha
Abstract | PDFPDF
53. FPGA Realization of Radix-4 Booth Multiplication Algorithm for High Speed Arithmetic Logics
Pages : 2102-2107
K. Babulu,G.Parasuram
Abstract | PDFPDF
54. A Novel Approach of Entropy based Adaptive Thresholding Technique for Video Edge Detection
Pages : 2108-2110
Debabrata Samanta, Mousumi Paul
Abstract | PDFPDF
55. Weighted Association Rule Mining Without Pre-assigned Weights
Pages : 2111-2115
Abstract | PDFPDF
56. Distributional Features for Text Categorization Based on Weight
Pages : 2116-2120
Abstract | PDFPDF
57. Intrusion Detection
Pages :2121-2123
B. Kiran Kumar, A. Kamala Priya, R. Vishnumurthy and Thillai Nayagi
Abstract | PDFPDF
58. Sensitive Itemset Hiding in Multi-level Association Rule Mining
Pages : 2124-2126
P.RajyaLakshmi, C.Mohan Rao,Madhavi Dabbiru and Kopparthy Vinay Kumar
Abstract | PDFPDF
Pages : 2127-2131
A S N Chakravarthy, Penmetsa V Krishna Raja , Prof. P S Avadhani
Abstract | PDFPDF
60. VLSI Design Approach to Online Analog/Digital DAQ System
Pages : 2132-2136
K Babulu and P Parasuram
Abstract | PDFPDF
61. Implementation of Viterbi Decoder for Convolutional Code in HDL
Pages : 2137-2140
Nilesh G. Nirmal, Gajanan U.Patil, Prafulla.P.Chaudhari, Mandar.M.Kulkarni
Abstract | PDFPDF
62. A Performance Analysis of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET
Pages : 2141-2146
Abstract | PDFPDF
63. Implementation of blind source separation of speech signals using independent component analysis
Pages : 2147-2151
Vivek Anand. Dr. R. S. Anand.Dr. M. L. Dewal
Abstract | PDFPDF
64. The Next Generation of Cloud Computing on Information Technology
Pages : 2152-2155
G.C.Priya, R.Parameswari, G.Gayathri
Abstract | PDFPDF
65. Dynamic Routing Key Distribution in Security Considerations
Pages : 2156-2158
D. Raghu, MD. Baliguddin, Ch. Raja Jacub
Abstract | PDFPDF
66. Design and Implementation of Efficient Load Balancing Algorithm in Grid Environment
Pages : 2159-2164
Sandip S.Patil, Preeti Singh
Abstract | PDFPDF
67. Different Network Micro-Mobility Protocols and their Performance Analysis
Pages :2165-2175
K Karmakar, J S Banerjee
Abstract | PDFPDF
68. Future Challenges and Opportunities of Systems and Software Engineering Processes
Pages : 2176-2179
Rohit Sharma ,Samridhi Sharma ,Sachleen Singh
Abstract | PDFPDF
69. Comparative Study of Knowledge in Crop Diseases Using Machine Learning Techniques
Pages : 2180-2182
P. Revathi , R. Revathi and Dr.M.Hemalatha
Abstract | PDFPDF
70. An Improved Page Rank Algorithm based on Optimized Normalization Technique
Pages : 2183-2188
Hema Dubey ,Prof. B. N. Roy
Abstract | PDFPDF
71. Object Oriented Software Testing
Pages : 2189-2192
P.D.Ratna Raju, Suresh.Cheekaty, HarishBabu.Kalidasu
Abstract | PDFPDF
72. Inverse ObjectRank: Dynamic Authority Based Search in Databases
Pages : 2193-2194
C.Vijaya Ram ,Ch.Srinivasalu, T.Jacob Sanjay Kumar
Abstract | PDFPDF
73. A Neural Network Approach for Fragmentation in Distributed Databases
Pages : 2195-2197
M.Ram Bhupal , A. Raga Deepthi
Abstract | PDFPDF
74. The Wonderful Toy of 20th Century can be a Disaster in 21st Century: Scenario and Policies Regarding Mobile Waste in India
Pages :2198-2203
Neeta Sharma1 and Manoj Kumar
Abstract | PDFPDF
75. Approaches on Detecting Domain Errors – A Survey
Pages : 2204-2212
Dr. Anna Saro Vijendran, N.R.Suganya
Abstract | PDFPDF
76. Implementation of High Security in MANET Using Combined IDS and Finger Print Authentication with Data Fusion
Pages :2213-2215
J. Deny and N. Sivasankari
Abstract | PDFPDF
77. A Novel Approach of THUI (Temporal High Utility Item sets) Algorithm on On-Shelf Web
Log Data
Pages : 2216-2219
D.N.V.S.L.S. Indira , JYOTSNA SUPRIYA P2, S.Narayana
Abstract | PDFPDF
78. A Closer look at RSA and ECC
Pages : 2220-2224
Aditya Kumar Kommera, Keerthana Kommera, Praneeth Kumar Gunda
Abstract | PDFPDF
79. A Framework on Database Content Security using Negative Databases
Pages : 2225-2228
Vemula Vamshi Krishna ,Rama Krishna V
Abstract | PDFPDF
80. An Efficient Image Based Approach for Extraction of Deep Web Data (AEiEDWD)
Pages :229-2232
MSN. Murthy, S.Sreenivasa Rao
Abstract | PDFPDF
81. An Enhanced Digital Watermarking for Color Image using Support Vector Machine
Pages : 2233-2236
Yogendra Kumar Jain ,Saurabh Tiwari
Abstract | PDFPDF
82. Secure Dynamic Routing Using DDRA
Pages : 2237-2241
Nagamalleswara Rao.A, Adilakshmi.Y
Abstract | PDFPDF
83. Defect Prediction and Analysis Using ODC Approach in a Web Application
Pages : 2242-2245
Pranayanath Reddy Anantula, Raghuram Chamarthi (Tejoraghuram)
Abstract | PDFPDF
84. Employing Grid Computing Strategies in Cloud Computing
Pages : 2246-2253
Amit Batra, Rajender Kumar, Arvind Kumar
Abstract | PDFPDF
85. Feature Level Medical Image Fusion Using MUlti Wavelet Transforms
Pages : 2254-2257
P.Daniel Ratna Raju, Guntupalli Neelima, K.Prasada Rao
Abstract | PDFPDF
86. Semantic Web Mining - A Critical Review
Pages : 2258-2261
S.S. Dhenakaran, S.Yasodha
Abstract | PDFPDF
87. Mobile Communications for E-Applications
Pages : 2262-2266
K.V.Ashok, K.Raja Sekhar, V.Dhana Raj
Abstract | PDFPDF
88. Hotel Management System -an E-Commerce Application using REsource Description Framework (RDF)
Pages : 2267-2272
A. Gauthami Latha, R. Naga Raju, Ch. Satyanarayana, Y. Srinivas
Abstract | PDFPDF
89. Power Quality Improvement of Three-phase four-wire DSTATCOM with Fuzzy logic Controller
Pages : 2273-2276
M.Bhanu Siva, M.R.P Reddy, Ch.Rambabu
Abstract | PDFPDF
90. A Survey on Detecting Domain Errors in Programs
Pages : 2277-2279
N.R.Suganya, R.Venkateswaran, K.Kathirvel, M.Mohankumar, G.Manivasagam
Abstract | PDFPDF
91. Sub Pattern Technique for Face Recognition
Pages : 2280-2283
M.Pradeep, CH.Sri Devi, V.Dhana Raj
Abstract | PDFPDF
92. Performance Analysis of Counting Sort Algorithm using various Parallel Programming Models
Pages : 2294-2287
M Rajasekhara Babu, M Khalid, Sachin Soni, Sunil Chowdari Babu, Mahesh
Abstract | PDFPDF
93. Design of Triangular Microstrip Patch Antenna at Super High Frequency
Pages : 2288-2289
Sunil kr singh ,Shirish kumar Jain
Abstract | PDFPDF
94. Cloud Computing – A New Paradigm for Modern Computing
Pages : 2290-2292
S.U.Sharma, Y.B.Gandole
Abstract | PDFPDF
95. Real Time Facial Expression Detection Techniques using Pixels Values
Pages : 2293-2296
Jabir Ali ,Ankur Shree Aggrawal ,Anuradha Tyagi ,Amit Kr. Balyan
Abstract | PDFPDF
96. New Shuffle Algorithm for Lossless Compression Method of JPEG File
Pages : 2297-2299
Surgali Chanti, Ch Ramesh
Abstract | PDFPDF
97. Avoidance of Collision and Overhearing in Wireless Sensor Networks
Pages : 2300-2303
P. Srivalli, N. Nagakumari, G. Anupama, V. Srujana
Abstract | PDFPDF
98. Modifying Simple Spatial Operator for High Dynamic Range Images to Improve Image Quality
and Automating the User Parameter
Pages : 2304-2308
Sumandeep Kaur, Sumeet Kaurj
Abstract | PDFPDF
99. Rainfall forecasting using Nonlinear SVM based on PSO
Pages : 2309-2313
P. Vikram, P. Raghu Veer
Abstract | PDFPDF
100. INCOG Query Processing in Networks
Pages : 2314-2318
Yetcherla Kumar Sekhar, U. Nanaji
Abstract | PDFPDF
101. Cloud Computing Based Visual Backchannel for Web Based Events
Pages : 2319-2325
Santhosh.kola, Sanjib.k
Abstract | PDFPDF
102. Performance Analysis of HR Portal Domain Components Extraction
Pages : 2326-2331
N Md Jubair Basha, Salman Abdul Moiz , A. A. Moiz Qyser
Abstract | PDFPDF
103. Color Image Segmentation using Watershed Algorithm
Pages : 2332-2334
Thodeti Srikanth, P.Pradeep Kumar, Ashwin Kumar
Abstract | PDFPDF
104. Analysis of Human Immune System Inspired Intrusion Detection System
Pages : 2335-2339
R.Sridevi , . Rajan Chattamvelli, E . K a n nan
Abstract | PDFPDF
105. Texture and Shape Based Classification of Brain Tumors Using Back-Propagation Algorithm
Pages : 2340-2342
Neelam Marshkole, Bikesh Kumar Singh and A.S.Thoke
Abstract | PDFPDF
106. An Efficient Key Management Scheme for Heterogeneous Sensor Networks
Pages : 2343-2347
S.Gandhi ,D.Indira
Abstract | PDFPDF
107. Automatic Eye Blink Tracking and Detection in an Image Sequence
Pages : 2348-2349
Tarun Dhar Diwan ,Rajesh Tiwari
Abstract | PDFPDF
108. The Design of Adaptive E-Learning System based on Student's Learning Styles
Pages : 2350-2353
Herman Dwi Surjono
Abstract | PDFPDF
109. Dynamic Resource Discovery protocol in Unstructured Peer-to-Peer Networks
Pages : 2354-2355
B. Steffi, D. Srinivas, V. Naga Raju, K. Upendra Das
Abstract | PDFPDF
110. Services in Android can Share Your Personal Information in Background
Pages : 2356-2359
Manoj Kumar and Sheshendra Rathi
Abstract | PDFPDF
111. Article Removed
Pages : xxxx-xxxx
Abstract | PDFPDF
112. LROR Oriented Tree Quorum Protocol
Pages : 2367-2368
Meenu and .Udai Shanker
Abstract | PDFPDF
113. Simultaneous Data Compression and Encryption
Pages : 2369-2374
T.SubhamastanRao , M.Soujanya, T.Hemalatha, T.Revathi
Abstract | PDFPDF
114. A Comparative Study of Iterative Thinning Algorithms for BMP Images
Pages : 2375-2379
Harish Kumar and Paramjeet Kaur
Abstract | PDFPDF
115. Network Control Systems RTAI framework – A Review
Pages : 2380-2383
Deepika Bhatia, Urmila Shrawankar
Abstract | PDFPDF
116. Article removed
Pages : 2384-2389
Abstract | PDFPDF
117. Web Usage Mining: A Research Concept of Web Mining
Pages : 2390-2393
D.Suresh Babu, SK.Abdul Nabi,Mohd.Anwar Ali ,Y.Raju
Abstract | PDFPDF
118. Comparison and Implementation of Compound Memood Model and Memood Model
Pages : 2394-2398
Chhavi Gautam , Sandeep Singh Kang
Abstract | PDFPDF
119. Inferring web user sessions by Clustering techniques
Pages : 2399-2404
N. kalpana,G.V.S.N.R.V.Prasad
Abstract | PDFPDF
120. Proficient Resource Allocation for Wireless Multicast
Pages : 2405-2411
Mounika.D,Suresh babu.CH
Abstract | PDFPDF
121. Application of Genetic Algorithms in Machine learning
Pages : 2412-2415
Harsh Bhasin, Surbhi Bhatia
Abstract | PDFPDF
122. Spam Weeding, Detection and Filtering on P2P System
Pages : 2416-2420
Sarvani Rallabandi , M V Krishna
Abstract | PDFPDF
123. A Survey of Link Failure Mechanism and Overhead of Routing Protocols in MANET
Pages : 2421-2425
Ashish Kumar, M. Q. Rafiq, Kamal Bansal
Abstract | PDFPDF
124. ANN Based Directional Fault Detector/Classifier for Protection of Transmission Lines
Pages : 2426-2433
Anamika Yadav, A.S. Thoke
Abstract | PDFPDF
125. Image Edge Detection by Using Rule Based Fuzzy Classifier
Pages : 2434-2439
Mandeep Singh Sandhu ,Vikram Mutneja ,Nishi
Abstract | PDFPDF
126. Context-aware Personalized Mobile Web Search Techniques-A Review
Pages : 2440-2443
Deepika Bhatia, Smita Nirkhi, Preeti Bajaj
Abstract | PDFPDF
127. Vector Quantization for Image Compression using Repulsion based FPCM
Pages : 2444-2451
S. Sathappan,S. Pannirselvam
Abstract | PDFPDF
128. Access Control Policy: A Framework to Enforce Recommendations
Pages : 2452-2463
Nada Essaouini , Anas Abou El Kalam , Abdellah Ait Ouahman
Abstract | PDFPDF
129. Relevant Data Clustering In Web Search Engine
Pages : 2464-2466
Abstract | PDFPDF
130. A Comprehensive Analysis and Comparison of TCP Tahoe, TCP Reno and TCP Lite
Pages : 2467-2472
Poonam Tomar, Prashant Panse
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-