IF

 

bh

 

VOLUME 3 ISSUE 1 January - February 2012

ISSN 0975 - 9646

1.
A Comparative Study on Quantum Pushdown Automata, Turing Machine and Quantum Turing Machine
Pages : 2932 - 2935
TANISTHA NAYAK, TIRTHARAJ DASH
Abstract | PDFPDF
2.
Bandwidth Improvement of a Left Arm Shorter U - Slot Micro Strip Antenna
Pages : 2936 - 2939
Lakhan Singh, Rajesh Kumar Verma and D.C. Dhubkarya
Abstract | PDFPDF
3.
Using Contextual Inquiry as a subset of Requirement Gathering Process
Pages : 2940 - 2942
Rajesh Kulkarni, Dr.P.Padmanabham
Abstract | PDFPDF
4. Clustering Technique in Data Mining for Text Documents
Pages : 2943-2947
J.Sathya Priya and S.Priyadharshini
Abstract | PDFPDF
5. Intrusion Detection Technique -A Review
Pages : 2948 - 2956
Abstract | PDFPDF
6.
Highly Accelerated Advanced Multiplier Design for An Efficient Bandwidth Utilized FFT Computation
Pages : 2957 - 2963
M.Sahithi,Naseema Shaik, A.Jhansi Rani,J.Poornima,M.Jyothi and K.Purnima
Abstract | PDFPDF
7.
Design of Modified Shannon Based Full Adder Cell Using PTL Logic for Low Power Applications
Pages : 2964 - 2968
K.Purnima, S.AdiLakshmi, M.Sahithi, A.Jhansi Rani and J.Poornima
Abstract | PDFPDF
8.
Simulation Result of Hybrid Routing Protocol for Mobile Ad hoc Network
Pages : 2969 - 2974
Makarand R. Shahade and D. N. Choudhari
Abstract | PDFPDF
9. Development of Artificial Intelligent Model For Reduction Of Noise From Biomedical Signal
Pages : 2975 - 2977
R.J.Gajbe and Dr. Y.B.Gandole
Abstract | PDFPDF
10. Disclosure Control of Sensitve Information from OLAP Query Results
Pages : 2978 - 2981
P.Kamakshi and A.Vinaya Babu
Abstract | PDFPDF
11. High Speed and Low Power Dynamic Latched Comparator for PTL Circuit Applications
Pages : 2982 - 2991
N. Naga Sudha, V. Narasimha Nayak, Suneel Mudunuru,M. Nagesh Babu,B.K.V Prasad, M. Jyothi
Abstract | PDFPDF
12.
Autonomous Network Security using Unsupervised Detection of Network Attacks
Pages : 2992 - 2995
Pragati H. Chandankhede and Sonali U. Nimbhorkar
Abstract | PDFPDF
13.
Clustering technique to interpret Numerical Weather Prediction output products for forecast of Cloudburst
Pages : 2996 - 2999
Kavita Pabreja
Abstract | PDFPDF
14. Latest Trends in Wireless Mobile Communication (3G to 4G Technologies)
Pages : 3000 - 3005
B.KiranKumar, R.VishnuMurthy, Kondapalli BalaKrishna
Abstract | PDFPDF
15. Pondering of agent technologies in road transportation system and their critical issues
Pages : 3006 - 3011
V.Divya, M.Hema Madhuri, Movva N.V Kiran Babu
Abstract | PDFPDF
16. Analysis of Temperature and Humidity Data for Future value prediction
Pages : 3012 - 3014
Badhiye S. S., Wakode B. V., Chatur P. N
Abstract | PDFPDF
17.
A Generalized Framework for Building Scalable Load Balancing Architectures in the Cloud
Pages : 3015 - 3021
Illa Pavan Kumar, Subrahmanyam Kodukula
Abstract | PDFPDF
18.
Comparison study between Traditional and Object- Oriented Approaches to Develop all projects in Software Engineering
Pages : 3022 - 3028
Nabil Mohammed Ali Munassar and A. Govardhan
Abstract | PDFPDF
19. Component-Based Software Development with Component Technologies: An Overview
Pages : 3029 - 3036
Jawwad Wasat Shareef, Rajesh Kumar Pandey
Abstract | PDFPDF
20. Geometric Invariant Digital Image Watermarking Techniques for QR code
Pages : 3037 - 3041
Lakshmi Chetana Vemuri, Gogineni Krishna Chaitanya and Narasimham
Abstract | PDFPDF
21.
Searching Images Segmented from Search Engine database using sophisticated QIMERA method of Algorithm
Pages :3042 - 3046
P.Daniel Ratna Raju, G.Neelima
Abstract | PDFPDF
22.
Secure and Scalable Multicasting Services in Wireless Mesh Networks
Pages : 3047 - 3052
B Tejaswi S . Sivanageswara Rao, S. Gopi Krishna and Y. K. Sundara Krishna
Abstract | PDFPDF
23.
Secure Optimized Link State Routing Protocol for Ad-Hoc Networks
Pages : 3053 - 3058
Priyanka A. Hajare, Pritish A. Tijare
Abstract | PDFPDF
24. Smart Card Fraud Prevention Scheme Using Fingerprinting Authentication
Pages : 3059 - 3062
Jayesh Gaurav, Sanjive Tyagi, Dr Jayanthi Ranjan
Abstract | PDFPDF
25. The Fault Management System Using Amazon EC2: Web Application Deployment on Cloud
Pages : 3063 - 3067
K Raja Sekhar, Sarat Chalamalsetty, Prahasith Katuri and Varun Jajam
Abstract | PDFPDF
26.
Undecryptable Encryption against Network and Forensic Attack
Pages : 3068 - 3072
Raana Syeda, S . U . Nimbhorkar
Abstract | PDFPDF
27.
Web Usage Mining Using Neiural Network Approach: A Critical Review
Pages : 3073 - 3077
Vaishali A.Zilpe, Dr. Mohammad Atique
Abstract | PDFPDF
28.
A New Multiresolution Algorithm for Image Segmentation
Pages : 3078 - 3084
David Solomon Raju Y, Krishna Reddy D
Abstract | PDFPDF
29.
A study of comparison of Network Simulator -3 and Network Simulator -2
Pages : 3085 - 3092
Rachna Chaudhary, Shweta Sethi, Rita Keshari, Sakshi Goel
Abstract | PDFPDF
30.
Stagnant Memory and Timing investigation of Embedded Systems Code
Pages : 3093 - 3098
M.Shankar, Dr.M.Sridar, Dr.M.Rajani
Abstract | PDFPDF
31.
Automated Green House Management Using GMS Modem
Pages : 3099 - 3102
Sumit A. Khandelwal
Abstract | PDFPDF
32.
Performance Analysis of Matrix Multiplication Algorithms Using MPI
Pages : 3103 - 3106
Javed Ali ,Rafiqul Zaman Khan
Abstract | PDFPDF
33.
Integrating Logic Analyzer Functionality into VHDL designs
Pages : 3107 - 3111
S.Adilakshmi, K.Rajasekhar, T.B.K.Manoj kumar
Abstract | PDFPDF
34.
Deriving Serial and Parallel Spikes Data in Neural Science Using Data Mining Techniques
Pages : 3112 - 3115
Srinivas Bobba, Jammi Ashok
Abstract | PDFPDF
35.
Track and Identify the Human Motion with Alert
Pages : 3116 - 3118
Thota Jeevana Krupa, Prof Koduru Prasada Rao
Abstract | PDFPDF
36.
A Modified Feistel Cipher involving a pair of key matrices,Supplemented with Modular
Arithmetic Addition and Shuffling of the plaintext in each round of the iteration process
Pages : 3119 - 3128
V.U.K. Sastry, K. Anup Kumar
Abstract | PDFPDF
37.
Emphasizing Requirement Elicitation Process for Electronic Payment Secured System using VORD Methodology - A Practical Approach
Pages : 3129 - 3132
Md. Faisa1, Mohammed Hussain
Abstract | PDFPDF
38.
A Modified Feistel Cipher Involving a Pair of Key Matrices, Supplemented with XOR
Operation, and Blending of the Plaintext in each Round of the Iteration Process
Pages : 3133 - 3141
V.U.K. Sastry, K. Anup Kumar
Abstract | PDFPDF
39.
Counter Measure for Congestion in TCP/IP using Bandwidth Estimation
Pages : 3142 - 3143
S.Priyadharshini,J.Sathya Priya
Abstract | PDFPDF
40.
Microstrip Rectangular Patch Antenna : Computer Aided Design Methology
Pages : 3144-3146
R.D.Kanphade, D.G. Wakade, N.T. Markad
Abstract | PDFPDF
41.
Location Based Services on Mobile E-Commerce
Pages : 3147 - 3151
B. Renuka, Manjula Poojary, B.Ramesh Babu
Abstract | PDFPDF
42.
Social Networking: Innovative Communication Technology
Pages : 3152 - 3156
S.T. Bhosale, B.S. Sawant, S.D. Munde
Abstract | PDFPDF
43.
Secured Communication Protocol via Encrypted Key Ensuring Message Integrity
Pages : 3157 - 3161
Devarakonda John Livingstion, P.Raja Sekhar
Abstract | PDFPDF
44.
Analysis and Prevention of Malware in P2P
Pages : 3162 - 3169
Puram.Pradeep Kumar, Naini Shekar Reddy, Saleha Saudagar, T. Puneeth Chandra, Ch. Kishor Kumar
Abstract | PDFPDF
45.
Study of Ant Colony Algorithm using Adaptive Schematization Methodology Based on Prognosticative Learning
Pages : 3170 - 3175
Arjun Arora, Ashish Pant, R P Arora, Suneet Kumar
Abstract | PDFPDF
46.
Privacy Preserving Association Rule Mining in Horizontally Partitioned Databases Using Cryptography Techniques
Pages : 3176 - 3182
N V Muthu lakshmi,Dr. K Sandhya Rani
Abstract | PDFPDF
47.
A Fine Grained Access Control Model for Relational Databases
Pages : 3183 - 3186
Neha Sehta, Dr. Suresh Jain
Abstract | PDFPDF
48.
Key Distribution Approaches for Wireless Sensor Networks
Pages : 3187-3190
Ramu kuchipudi, N Md Jubair Basha
Abstract | PDFPDF
49.
Enhanced Dynamical Hierarchical Mobile Internet Protocol for Mobile IP Networks
Pages : 3191 - 3194
U.Thirupathi Rao, Sk.Mastan Vali, P.sankar Rao, Ch.Samba Siva Rao, Krishna Sah, K.V.D.Kiran
Abstract | PDFPDF
50.
Analysis and Individualization of Clients concern based on the Internet Browsing History
Pages : 3195 - 3198
V.Ravindranadhan, P.Sarath, M.Gopi Mahesh, M.Rajasekhar. K.V.D.Kiran
Abstract | PDFPDF
51.
GUI Based Data Acquisition System Using ARM-Cortex M3 Microcontroller
Pages : 3199 - 3204
Patel Hiren, Patel Dipak
Abstract | PDFPDF
52.
Novel Approach to Identify Relevant and Irrelevant Questions Using Text Categorization
Pages : 3205 - 3207
C.M.Nalayini, J.Keerthika
Abstract | PDFPDF
53.
Design and Implementation of Pipelined 32-bit Advanced RISC Processor for Various D.S.P Applications
Pages : 3208-3213
J.Poornima, G.V.Ganesh, M.jyothi,M.Sahithi,A.jhansi RaniB. Raghu Kanth
Abstract | PDFPDF
54.
Implementation of Low Complex and High Secured SPI Communication System for Multipurpose Applications
Pages : 3214-3219
M.Jyothi, L.Ravi Chandra, M.Sahithi,A.Jhansi Rani,J.Poornima,N.Naga Sudha
Abstract | PDFPDF
55.
Fault Torelant Distributed Intrusion Detection System Using Advanced Honeypots
Pages : 3220-3224
Akshay Kulkarni, Sujal Raul, Vidhya Suresh
Abstract | PDFPDF
56.
A Survey On: Attacks due to SQL injection and their prevention method for web application
Pages : 3225-3228
Shubham Srivastava
Abstract | PDFPDF
57.
Column wise DCT plane sectorization in CBIR
Pages : 3229-3235
H.B.Kekre, Dhirendra Mishra, Chirag Thakkar
Abstract | PDFPDF
58.
SCTP over MIPv4 for Multi-homed Mobile Host
Pages : 3236-3240
Surmila Thokchom, Thoudam Doren Singh
Abstract | PDFPDF
59.
Cloud Computing Technology for Effective e-Governance
Pages : 3241-3244
R.Siva Rama Prasad, Veera RaghavaRao Atukuri
Abstract | PDFPDF
60.
Exemplar-Based Image Inpainting for Region Filling & Object Removal
Pages : 3245-3248
Rashmi Bijwe, P. R. Deshmukh
Abstract | PDFPDF
61.
Watermarking of 3D Meshes using Matlab
Pages : 3249 - 3254
Deepti Gaidhane, Uzma Ansari
Abstract | PDFPDF
62.
Regression Testing Using Coupling and Genetic Algorithms
Pages : 3255 - 3259
Harsh Bhasin, Manoj
Abstract | PDFPDF
63.
Fundamental of Content Based Image Retrieval
Pages : 3260 - 3263
Ritika Hirwane
Abstract | PDFPDF
64.
Sram Cell Static Faults Detection and Repair Using Memory Bist
Pages : 3264 - 3268
Shaik Moulali, Dr. Fazal Noor Bhasha, B.Srinivas, S.Dayasagar chowdary , P.Srinivas, K. Hari Kishore
Abstract | PDFPDF
65.
A Brief Review of Handover schemes in Wireless communication
Pages : 3269 - 3278
Madhuri R. Pawar, Prof. Santosh Sheshrao Sambare
Abstract | PDFPDF
66.
The File Encryption Method in Cryptographic Key Management Wireless Ad Hoc Networks
Pages : 3279 - 3282
D. Raghu, Munagala. Srinivasa Rao, Ch. Raja Jacub
Abstract | PDFPDF
67.
Cloud Network: Integration of Cloud Computing and Virtualization with Network
Pages : 3283-3286
Puram.Pradeep Kumar, R.Sai Krishna,.Kishor Kumar, Naini.Shekar Reddy, M.Ramesh
Abstract | PDFPDF
68.
Implementation of Random Number Generator Using LFSR for High Secured Multi Purpose Applications
Pages : 3283-3286
M.Sahithi, B.MuraliKrishna,M.Jyothi,K.Purnima,A.Jhansi Rani,N.Naga Sudha
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-