bh

 

VOLUME 3 ISSUE 2 March-April 2012

ISSN 0975 - 9646

 

1.
Analysis of Optimization Techniques for Feed Forward Neural Networks Based Image Compression
Pages : 3291-3294
Neha Relhan, Manoj Jain
Abstract | PDFPDF
2.
Security Issues and Solutions In Wireless Sensor Networks
Pages : 3295-3304
Varsha Sahni, Jaspreet Kaur, Sonia Sharma
Abstract | PDFPDF
3.
Routing Protocols and Energy efficient protocols for data aggregation in Wireless Sensor Network: A Survey
Pages : 3305-3312
Meenakshi Dhull, Soni Chaurasia
Abstract | PDFPDF
4.
APPLICATION OF DHT PROTOCOL IN IP CLOAKING
Pages : 3313-3317
Anju Vijayrania, Abdul Rahman
Abstract | PDFPDF
5.
Information Security on Quick Response code
Pages : 3318-3320
S.Hemalatha, P.C.SenthilMahesh, and Dr.Paul Rodrigues
Abstract | PDFPDF
6.
Performance of Semi-Blind Reference Watermarking Scheme Using DWT-SVD for Copyright Protection
Pages : 3321-3327
Saryanarayana Murty.P, Laxmi.V, Rajesh Kumar.P
Abstract | PDFPDF
7.
Evaluation of Behavioral Security in Cloud Computing
Pages : 3328 - 3333
Ch.Naveen Kumar Reddy, G.Vishnu Murthy
Abstract | PDFPDF
8.
Performance evaluation of clustering algorithms on trajectories data
Pages : 3334 - 3336
Sweta Kumari, Varsha Singh
Abstract | PDFPDF
9.
Learning objects- an object oriented analysis, design model and research review
Pages : 3337 - 3340
S. Vasanthi, M.K. Jayanthi
Abstract | PDFPDF
10.
Exchange of Peer To Peer Identity Reputation Using Cryptology conventions
Pages : 3341 - 3347
S.Venkateswarlu and Md khaja zikriya
Abstract | PDFPDF
11.
Secret Key Generation and Eavesdropping detection using Quantum Cryptography
Pages : 3348 - 3354
Neha Chhabra
Abstract | PDFPDF
12.
Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations
Pages : 3355 - 3359
R.S.S.Vishnu Priya, P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao
Abstract | PDFPDF
13.
Performance Evaluation of Globus Grid Environment Using Avi to Flash Video Encoding
Pages : 3360 - 3364
Gurjit Singh Sra, Dinesh Kumar
Abstract | PDFPDF
14.
College InfoBank: A system for efficient visualization and analysis of College Data
Pages : 3365 - 3370
G.Anuradha , Saylee Chitre, Juilee Chitre, Kristel Alphonso
Abstract | PDFPDF
15.
Image Repossession Based on Content Analysis Focused by Color, Texture and Pseudo-Zernike Moments features of an Image
Pages : 3371 - 3377
M.Nagaraju,I.Lakshmi Narayana, S.Pramod Kumar
Abstract | PDFPDF
16.
Novel Dissimilarity Algorithm for Content Based Image Retrieval
Pages : 3378 - 3381
Suresh Kumar. D, Venkateswarlu.B, Mohan Rao. C.P.V.N.J
Abstract | PDFPDF
17.
Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4
Pages : 3382-3387
Alladi Ramesh, P.Sumithabhashini
Abstract | PDFPDF
18.
Efficient Multiple Ant Colony Algorithm for Job Scheduling In Grid Environment
Pages : 3388-3393
S.Umarani, L.M.Nithya, A.Shanmugam
Abstract | PDFPDF
19.
String Matching Methodologies: A Comparative Analysis
Pages : 3394 - 3397
Akhtar Rasool,Amrita Tiwari, Gunjan Singla,Nilay Khare
Abstract | PDFPDF
20.
EmotiFONT
Pages : 3398-3400
Rishabh Sonthalia, Juilee Chitre, Saylee Chitre
Abstract | PDFPDF
21.
Digital teaching using E-Learning
Pages : 3401-3405
Preetee Karmore, Apurva Kuchankar, Shivani Kalambe, Ankush patil,Chetan Dakhare, Pratik Channawar
Abstract | PDFPDF
22.
Survey Paper On Analysis Of Various Recommendation Algorithms
Pages : 3406-3408
Dolly Sigroha, Chhavi Rana
Abstract | PDFPDF
23. Collaborative Scheme to Detect Stealth Nodes in Mobile Adhoc Networks
Pages :3409-3412
Burra Naga Durga Srinivas, M.V.S.S. Nagendranath
Abstract | PDFPDF
24. Enhanced Query Optimization Using R Tree Variants in a Map Reduce Framework for Storing Spatial Data
Pages :3413-3418
Vaishnavi S , Subhashini K , Sangeetha K , Nalayini C.M
Abstract | PDFPDF
25. A Review on Security Mechanism of Bluetooth Communication
Pages :3419-3422
Trishna Panse, Vivek Kapoor
Abstract | PDFPDF
26. An Analysis towards the Development of Electronic Bilingual Dictionary (Manipuri-English) -A Report
Pages :3423-3426
Sagolsem Poireiton Meitei, Shantikumar Ningombam, Prof. Bipul Syam Purkayastha
Abstract | PDFPDF
27. Improved Decision Tree Induction Algorithm with Feature Selection, Cross Validation, Model
Complexity and Reduced Error Pruning
Pages :3427-3431
A. S. Galathiya, A. P. Ganatra and C. K. Bhensdadia
Abstract | PDFPDF
28. Speckle Noise Reduction in Satellite Images Using Spatially Adaptive Wavelet Thresholding
Pages :3432-3435
M.Vijay, L.Saranya Devi
Abstract | PDFPDF
29. A New Approach to Schedule Precedence Constraint Tasks in Real Time Systems
Pages :3436-3443
Radhakrishna Naik R.R.Manthalkar Yogiraj P. Korde
Abstract | PDFPDF
30. A Cryptographic Approach to Securely Share Genomic Sequences
Pages :3444-3447
G. Rajendra Kumar, V.Navya, M.Swetha, V.Sindhusha, T. Murali Kalyan
Abstract | PDFPDF
31. Analyzing a Mobile Framework for Location Based Tracking
Pages :3448-3451
Shaveta Bhatia, SabaHilal
Abstract | PDFPDF
32. Interference-Aware Robust Topology Design in Multi-Channel Wireless Mesh Networks
Pages :3452-3455
Geeta Y.Midha, R.K.Krishna
Abstract | PDFPDF
33. Concatenated Differential Space-Time Block Codes and Four Dimensional 8-PSK Trellis Coded
Modulation for Wireless MIMO system with Rayleigh fading Noise
Pages :3456-3459
Emna Ben Slimane, Slaheddine Jarboui, Imen Lamouchi and Ammar Bouallègue
Abstract | PDFPDF
34.. Survey Paper on Recommendation System
Pages :3460-3462
Mukta kohar,Chhavi Rana
Abstract | PDFPDF
35. Contrast Enhancement for Fog Degraded Video Sequences Using BPDFHE
Pages :3463-3468
C.Ramya, Dr.S.Subha Rani
Abstract | PDFPDF
36. Congestion Minimization By Using MFMP Routing Algorithm
Pages :3469-3472
T.B.Sivakumar, M.Gughan Raja, B.Palanichelvam
Abstract | PDFPDF
37. Event Detection in Videos Using Data Mining Techniques
Pages :3473-3475
P.Thirumurugan, S.Hasan Hussain
Abstract | PDFPDF
38. Minimizing Malicious Eavesdropping Ability in Wireless Mesh Networks using SKeMS
Pages :3476-3478
Haarika Kandavalli, M.V.S.S NagendraNath
Abstract | PDFPDF
39. E-FARMING
Pages :3479-3482
Sindhu M R, Aditya Pabshettiwar, Ketan.K.Ghumatkar, Pravin.H.Budhehalkar, Paresh.V.Jaju
Abstract | PDFPDF
40. Horizontal Aggregations for Mining Relational Databases
Pages :3483-3487
Dontu.Jagannadh, T.Gayathri, M.V.S.S Nagendranadh
Abstract | PDFPDF
41. A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer
Pages :3488-3492
Raghavendra.K ,G. Raghu ,Sumith N 
Abstract | PDFPDF
42 Fragment Based Approach to Forecast Association Rules from Indian IT Stock Transaction Data Pages :3493-3497
Rajesh V. Argiddi, Sulabha S. Apte
Abstract | PDFPDF
43 Modified EGMP for Efficient Multicasting over MANETS
Pages :3498-3502
Raavi. Pavani,M. Venkatesh,M.V.S.S. Nagendranath
Abstract | PDFPDF
44 Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks
Pages :3503-3507
Sabareesan M, Srinivasan S,John Deva Prasanna D S
Abstract | PDFPDF
45. A Secure Architecture for Anonymizer Networks
Pages :3508-3511
K.Ravindranath, B.V.S.N.Chaitanya, K.Krishna Chaitanya, G.Anil Reddy, B.Harish
Abstract | PDFPDF
46. Performance Investigation and Analysis of Secured MANET Routing Protocols
Pages :3512-3516
A.Jayanand, Dr.T.Jebarajan
Abstract | PDFPDF
47. Different Medias of Steganography- An Emerging Field of Network Security
Pages :3517-3522
M. Indra Sena Reddy , M. Purushotham Reddy, K. Subba Reddy
Abstract | PDFPDF
48. A Multi-Slotted Wide Microstrip Patch Antenna for Dual Frequency
Pages :3523-3525
Ram Singh Kushwaha, D.K.Srivastava, J.P.Saini
Abstract | PDFPDF
49. A Reputation Based Scheme to Prevent Routing Misbehavior in MANETs
Pages :3526-3529
M. Sreedevi
Abstract | PDFPDF
50. Implementation of Area Efficient Memor-Based FIR Digital Filter Using LUT-Multiplier
Pages :3530-3535
K.Purnima, S.AdiLakshmi, M.Jyothi
Abstract | PDFPDF
51. Identifying the User Access Pattern in Web Log Data
Pages :3536-3539
Neetu Anand, Saba Hilal
Abstract | PDFPDF
52. Appication of Hybrid ANT Colony Optimization (HACO) Algorithm for solving Capacitated Vehicle Routing Problem (CVRP)
Pages :3540-3543
B.Ramesh Babu, Manjula Poojary, B.Renuka
Abstract | PDFPDF
53. Component Extraction of Complex Biomedical Signals and Performance analysis
Pages :3544-3547
Hemant P. Kasturiwale, P.V.Ingole
Abstract | PDFPDF
54. Hybrid Routing Protocol
Pages :3548-3550
ShrutiVaish, Amit Kumar Gupta, Shilpi Singh, Saroj Sharma
Abstract | PDFPDF
55. Distributed Dynamic Clustering in Randomly Deployed Wireless Sensor Networks
Pages :3551-3556
Lavanya Thunuguntla, Rajendra Prasad G
Abstract | PDFPDF
56. Distributed Algorithm for Improving Performance through Swap Link in Wireless Networks
Pages :3557-3562
T.Kalaiselvi ,P.S.Balamurugan ,K.Sudhakar
Abstract | PDFPDF
57. Moving Towards a Robust Software Deployment Methodology – Need to Address Change
Management
Pages :3563-3569
Madhusudan Varadaraj, Nagalingappa Goud
Abstract | PDFPDF
58. A Review of Application of Data Mining in Earthquake Prediction
Pages :3570-3574
G. V. Otari, Dr. R. V. Kulkarni
Abstract | PDFPDF
59. Computational Intelligence Aided Black-Hole Detection for Secure Data Dissemination Based on
PRP Routing in WSN
Pages :3575-3581
J.Preetheswari , J.Mark Jain
Abstract | PDFPDF
60. Effect of Various Attacks on Watermarked Images
Pages :3582-3587
Nallagarla.Ramamurthy and Dr.S.Varadarajan
Abstract | PDFPDF
61. Secure Data in Wireless Sensor Network via AES
Pages :3588-3592
P.D. Khambre ,S.S.Sambhare, P.S. Chavan
Abstract | PDFPDF
62. Comparison of Mamdani Fuzzy Model and Neuro Fuzzy Model for Air Conditioning System
Pages :3593-3596
Arshdeep Kaur, Amrit Kaur
Abstract | PDFPDF
63. Energy Conservation Techniques and Application for Wireless Sensor Networks
Pages :3597-3602
M.Chithik Raja
Abstract | PDFPDF
64. Emotion Recognition from Speech
Pages :3603-3607
K. Sreenivasa Rao, Tummala Pavan Kumar, Kusam Anusha, Bathina Leela, Ingilela Bhavana and
Singavarapu V.S.K. Gowtham
Abstract | PDFPDF
65. Survey for Generating an Ideal Password Authentication Scheme Which Results In Fortification
of Transport Layer Security Protocol
Pages :3608-3614
Kuljeet Kaur ,Dr. G.Geetha
Abstract | PDFPDF
66. Attacks Due to SQL Injection & Their Prevention Method for Web-Application
Pages :3615-3618
Shubham Srivastava, Rajeev Ranjan Kumar Tripathi
Abstract | PDFPDF
67. Dynamic user profiles using fusion of Web Structure ,Web content and Web Usage Mining
Pages :3619-3621
Gajendra S.Chandel, Ravindra Gupta, Hemant k. Dhamecha
Abstract | PDFPDF
68. Design of a browser for people with low vision
Pages :3622-3624
K.Ravindranath,A.Vamsi Krishna, B.Charan Teja, K.Sandeep, P.Karthik
Abstract | PDFPDF
69. Improved secured routing in AdhocSensor Network for Emergency Medical Care
Pages :3625-3631
Anjani Yalamanchili,DeepthiKethineni, Dukkipati Padma Bhushan
Abstract | PDFPDF
70. Database Management System and Information Retrival
Pages :3632-3637
B.KiranKumar,S.Durga Prasad, P M Manohar,KVVS SatyaPrakash,M.Chiranjeevi, K.Venkat Kiran
Abstract | PDFPDF
71. An Enhanced Data Distribution with Protection of Agent Colluding Attacks
Pages :3638-3643
P.Brindha, P.S.Balamurugan, S.Kalai selvi
Abstract | PDFPDF
72. A Semi Fragile Image Watermarking Technique Using Block Based SVD
Pages :3644-3647
Chitla Arathi
Abstract | PDFPDF
73. Three Dimensional Rotation Technique
Pages :3648-3649
HamzaContractor , ShoaibInamdar, RohitKandul, Anand Magar
Abstract | PDFPDF
74. Spatial Domain Lossless Image Compression Technique by Reducing Overhead Bits and Run
Length Coding
Pages :3650-3654
Mahmud Hasan , Kamruddin Md. Nur , Tanzeem Bin Noor , Hasib Bin Shakur
Abstract | PDFPDF
75. A Detailed Study on Semantic Search Performance of Keyword and Meta Search Engines
Pages :3655-3658
Rajeev Kumar, Rajat Goel
Abstract | PDFPDF
76. Max-min Average Algorithm for Scheduling Tasks in Grid Computing Systems
Pages :3659-3663
George Amalarethinam. D.I, Vaaheedha Kfatheen .S
Abstract | PDFPDF
77. An Effective Methodology for Pattern Discovery in Web Usage Mining
Pages :3664-3667
K Sudheer Reddy, G. Partha Saradhi Varma, M. Kantha Reddy
Abstract | PDFPDF
78. A Survey:-Optimize Visual Image Search for Semantic web
Pages :3668-3671
Jaimin Shroff , Parth D. Shah , Bhaumik Nagar
Abstract | PDFPDF
79. Using Network Security Management to solve Boolean Satisfiability Problem
Pages :3672-3677
Mekala Bhaskar, G.VishnuMurthy, V.Amarnath
Abstract | PDFPDF
80. Energy Efficiency in IEEE 802.15.4/zigbee Sensor Networks: Cross-layer Approach
Pages :3678-3682
N.Gopal Krishna, S.Ganesan, N.Anand Ratnesh, S.Kishore Babu, B.Venkateswara Reddy, B.Naveen Kumar
Abstract | PDFPDF
81. Performance Analysis of Open Loop and Closed Loop Power Control Schemes for LTE Uplink
Pages :3683-3688
Purnachand S, Rajendra Prasad K, Sripath Roy K, Suresh A
Abstract | PDFPDF
82. Web Security by Preventing SQL Injection Using Encryption in Stored Procedures
Pages :3689-3692
Deevi Radha Rani, B.Siva Kumar, L.Taraka Rama Rao, V.T.Sai Jagadish, M.Pradeep
Abstract | PDFPDF
83. Contribution Based Clustering Technique for Automatic Satellite Image Segmentation
Pages :3693-3695
Chandan Kumar Moha nty, Manish Pandey, Arun P. V.
Abstract | PDFPDF
84. An Approach of UML for an Elevator System by Implementing Stereotypes
Pages :3696-3698
Clarence J M Tauro, N Ganesan2, Rashmi N C, Janet Agnes N C
Abstract | PDFPDF
85. Article Removed
Pages :xxxx-xxxx
xxxx
Abstract | PDFPDF
86. A Strategic Approach for Mapping e-Business Applications in to Cloud and providing Security to e-Busi-Cloud
Pages :3706-3710
Veera RaghavaRao Atukuri, VijayaKumar Nukala , R.Siva Rama Prasad
Abstract | PDFPDF
87.

Forecasting for Profitable CRM using Knowledge and Time Management
Pages :3711-3713
P. Menaka, k. Thangadurai, M.Uma, M. Punithavalli
Abstract | PDFPDF

88. A Robust Tree Quantization Image Watermarking Technique Based on Qualified Significant Even Wavelet Tree (QSEWT)
Pages :3714-3718
B.Vijayakumar , V.Vijayakumar, Rajya Lakshmi
Abstract | PDFPDF
89. Virtually Integrated Multi Purpose Server
Pages :3719-3725
J. Mark Jain, J.Ferlin Getziah , A.Hameeda , N.Naveena , K.Nasren Subaitha Banu
Abstract | PDFPDF
90. An Efficient Approach to Secure VPN based on Firewall using IPSec & IPtables
Pages :3726-3732
J. Mark Jain ,N. Ayyamari Devi , K. Jancy Rani, A.Meenakshi , S.Balaselvam
Abstract | PDFPDF
91. GA-Correlation Based Rule Generation for Expert Systems
Pages :3733-3736
Harsh Bhasin, Supreet Singh
Abstract | PDFPDF
92. Study of Ensemble Pruning Approaches
Pages :3737-3742
Reshma Idresh Lakhani, Arpita Shah, Amit P Ganatra
Abstract | PDFPDF
93. Dynamic Intrusion Detection with Data Fusion and Aggregation in High-Security Mobile Ad Hoc
Networks
Pages :3743-3748
T.Kumanan,.K. Duraiswamy
Abstract | PDFPDF
94. Designing and Development of a CAN Bus Analyzer for Industrial Applications Using ARM and PIC
Pages :3749-3753
Gadireddy Srikanth Kumar
Abstract | PDFPDF
95. A Strategic Approach for Bypassing the Intruder and Sending Data to Destination using Three – Tier Framework in Sensor Networks
Pages :3754-3756
Veera RaghavaRao Atukuri , Venkata Pavani S , Vasanthi B , Chandrika M , Naga Swetha M
Abstract | PDFPDF
96. Digital Image Watermarking for Copyright Protection
Pages :3757-3760
Shankar Thawkar
Abstract | PDFPDF
97. Monitoring System of Aquiculture with Automatic Control System Using ARM7
Pages :3761-3764
Bodepudi SrinivasaRao, U.Jyothi Kameswari
Abstract | PDFPDF
98. Quantum Finite Automata, Quantum Pushdown Automata & Quantum Turing Machine: A Study
Pages :3765-3769
Tanistha Nayak, Tirtharaj Dash
Abstract | PDFPDF
99. Amending Protection and Efficiency in Information Sharing
Pages :3770-3774
Vivekananda G.N., Obulesu O
Abstract | PDFPDF
100. New Aggregation Operator for Triangular Fuzzy Numbers based on the Arithmetic Means of the Slopes of the L- and R- Membership Functions
Pages :3775-3777
Manju Pandey, Nilay Khare, Dr. S.C. Shrivastava
Abstract | PDFPDF
101. Intelligent Data Mining in Autonomous Heterogeneous Distributed Bio Databases
Pages :3778-3781
T.Hemalatha, B.G.Gowthami, A.Divya Sri, Ch.Sindhuri, Y.SriDivya, B.BhanuVidhyaKiran
Abstract | PDFPDF
102. Mobile Ad-Hoc Wireless Network
Pages :3782-3786
Krunal N. Chandewar, H.R. Deshmukha
Abstract | PDFPDF
103. A Fast Moving Object Detection Technique In Video Surveillance System
Pages :3787-3792
Paresh M. Tank, Darshak G. Thakore
Abstract | PDFPDF
104. Secure Color Visual Secret Sharing Scheme Using Shifting Coefficient with No Pixel Expansion
Pages :3793-3800
John Justin M, Manimurugan S, Alagendran B
Abstract | PDFPDF
105. Improved Multilevel Feedback Queue Scheduling Using Dynamic Time Quantum and Its Performance Analysis
Pages :3801-3807
H.S. Behera, Reena Kumari Naik, Suchilagna Parida
Abstract | PDFPDF
106. Morphological Real Time Video Edge Detection in Labview
Pages :3808-3811
Ravi Kumar A.V, Nataraj K.R, Rekha K.R
Abstract | PDFPDF
107. Extracting Explanation from Artificial Neural Networks
Pages :3812-3815
Koushal Kumar,Gour Sundar Mitra Thakur
Abstract | PDFPDF
108. Comparison and Analysis of Drop Tail and RED Queuing Methodology in PIM-DM Multicasting Network
Pages :3816-3820
Ashish Kumar , Ajay K Sharma and Arun Singh
Abstract | PDFPDF
109. Performance Analysis of Homogeneous and Heterogeneous Systems Using BitTorrent in
Compeer Networks
Pages :3821-3824
K.Thamaraiselvi, P.S.Balamurugan
Abstract | PDFPDF
110 Improvement of Noise free Color Video Demosaicking Using Denoising and Iterative Enhanced Demosaicking Algorithm
Pages :3825-3832
D.S.Binu Shoba , B.SankaraLakshmi, A.Jayachandran
Abstract | PDFPDF
111. Intelligent Traffic
Pages :3833-3835
Rishabh Sonthalia, Utsav Salian, Vishal Singh, Dakshata Panchal
Abstract | PDFPDF
112. A Multimedia Interactive System
Pages :3836-3838
Manjushree Mahajan, Sushma Kate,Sandhya Katkar,Parinita Chinchalikar,Jyoti Hajare
Abstract | PDFPDF
113. Simplified Coupling Metrics for Object-Oriented Software
Pages :3839-3842
V.S.Bidve , Akhil Khare
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-