bh

 

VOLUME 3 ISSUE 4 July- August 2012

ISSN 0975 - 9646

1.
Comparative Study of Automated Testing Tools: Quick Test Pro and Load Runner
Pages : 4562 - 4567
Shaveta,Sachin kumar,Nitika,Snehlata
Abstract | PDFPDF
2
Achieving fast recovery in IP networks by MULTIPLE ROUTING CONFIGURATION
Pages : 4568 - 4570
Rajnee Kumari, Sitanath Biswas, Subrat S. Pattnaik
Abstract | PDFPDF
3
Modern Power Semiconductor Devices (A Review)
Pages : 4571 - 4574
Meenakshi Mataray A.P
Abstract | PDFPDF
4
Public Key Cryptography by Centralized Offline Server in Mission-Critical Networks
Pages : 4575 - 4579
K. Naresh Kumar, Dr. S. Srinivasu,K.P.R KrishnaChaitanya
Abstract | PDFPDF
5
Explore 10 Different Types of Software Development Process Models
Pages : 4580 - 4584
S.Thulasee Krishna ,Dr. S.Sreekanth,Perumal,K.Rajesh Kumar Reddy 
Abstract | PDFPDF
6
Robust Techniques based Hybrid Models in Classification Experiments
Pages : 4585 - 4589
Karnakar Gulla, Ashok kumar Aithagani ,  Satyanarayana Vollala,Srinivas Pilli
Abstract | PDFPDF
7
Multiplexing in the peer-to-peer Live Streaming
Pages : 4590 - 4595
T.Ashalatha, Ch.Naveen Kumar Reddy, G.Vishnu Murthy,Ch.Venkata Rajam
Abstract | PDFPDF
8
DNA representation based on ladder like structure property of DNA sequence double Helix
Pages : 4596 - 4598
Archana Verma, R.K.Singh
Abstract | PDFPDF
9. An Approach to Find Out at which Maintainability Metric, Software Maintenance Cost is Less Pages : 4599 - 4602
C.V.S.R Syavasya
Abstract | PDFPDF
10. Cross Lingual Query Dependent Snippet Generation
Pages : 4603 - 4609
Pinaki Bhaskar, Sivaji Bandyopadhyay
Abstract | PDFPDF
11. Answer Extraction of Comparative and Evaluative Question in Tourism Domain
Pages : 4610 - 4616
Pinaki Bhaskar, Bidhan Chandra Pal, Sivaji Bandyopadhyay
Abstract | PDFPDF
12. Impact Analysis Through Regression Test Selection
Pages : 4617 - 4624
S. Sushumna, K. Rakesh, G. HimaBindu
Abstract | PDFPDF
13. Resource Allocation Method using Scheduling methods for Parallel Data Processing in CloudPages : 4625 - 4628
Sowmya Koneru, V N Rajesh Uddandi, Satheesh Kavuri
Abstract | PDFPDF
14. Online Intrusion Alert Aggregation Using DGDSM Approach
Pages : 4629 - 4632
J.Poongodi, C.Vimalarani, Dr.S.Karthik
Abstract | PDFPDF
15. Congestion control in wireless sensor networks: Existing Applicable Techniques for Weather Sensor Networks
Pages : 4633 - 4636
Meenu Chawla, Sunil Mandave
Abstract | PDFPDF
16. An Approach Based On Artificial Neural Network for Data Deduplication
Pages : 4637 - 4644
M.Padmanaban, T.Bhuvaneswari
Abstract | PDFPDF
17. Extended Ad hoc On demand Distance Vector Multipath Routing (EAODVMR) protocol for Mobile Ad hoc NETwork(MANET)
Pages : 4645 - 4652
Dr.M.Sadish sendil, V. Balajishanmugam
Abstract | PDFPDF
18. Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for 802.11 Based Wireless Networks
Pages : 4653 - 4657
Santosh Hosamani, G.S.Nagaraja
Abstract | PDFPDF
19. Ensuring Security in Resource Centers of Cloud Environment by Using Trusted Pools
Pages : 4658 - 4661
K.P.R KrishnaChaitanya, Dr. S. Srinivasu, K. Naresh Kumar
Abstract | PDFPDF
20. Comparative Analysis of Apriori Algorithm and Frequent Pattern Algorithm for Frequent Pattern
Mining in Web Log Data
Pages : 4662 - 4665
Rahul Mishra, Abha choubey
Abstract | PDFPDF
21. A Novel Approach Based Wireless Intrusion Detection System
Pages : 4666 - 4669
K.Suresh, A.Sarala Devi , Jammi Ashok
Abstract | PDFPDF
22. Software Simulation of Unequal Error Protection Based Demodulator (Burst Mode) for Onboard
Application
Pages : 4670 - 4673
Deepak Mishra , K S Dasgupta and S.Jit
Abstract | PDFPDF
23. Bandwidth Optimization, Recycling In IEEE 802.16 Networks by Using Call Admission Control & Scheduler
Pages : 4674 - 4680
Sk.Jahangeer basha, Ch.Prakasa rao
Abstract | PDFPDF
24. Web Page Adaptation for Large Screens
Pages : 4681 - 4683
Neetu Narwal, Saba Hilal
Abstract | PDFPDF
25. Fault Prediction OO Systems Using the Conceptual Cohesion of Classes
Pages : 4684 - 4688
Subba Rao Polamuri, S. Rama Sree, M.Rajababu
Abstract | PDFPDF
26. Fractal Based Management of Heterogeneous Data Streams
Pages : 4689 - 4691
M.Prosant Kumar, N.Naga Subrahmanyeswari , S. Rama Sree
Abstract | PDFPDF
27. Design and Implementation of Stegnography Algorithm using Color Transformation
Pages : 4692-4695
Anjali Dua , Sonia Sharma
Abstract | PDFPDF
28. Detecting Image Forgeries using Discrepancies in Motion Blur
Pages : 4696-4700
Rupali M. Bora, N. M. Shahane, Umesh K. Gaikwad
Abstract | PDFPDF
29. Effective Performance Analysis of Bin –Periodic Algorithm for Wireless Sensor –Actor Network
Pages : 4701-4703
M.E. Sanap, Rachana A.Satao
Abstract | PDFPDF
30. Web Service Quality Composition Determination Using Genetic Algorithm in Sematic Web
Pages : 4704-4706
Nandhini.M ,Sadish Sendil.M
Abstract | PDFPDF
31. Learning Based Single-Frame Image Super-Resolution using Contourlet Transform
Pages : 4707-4711
Sukeshkumar P.Borate, Dr. Sanjay L.Nalbalwar
Abstract | PDFPDF
32. Secure Group Key Transfer Protocol Based on Secret Sharing
Pages : 4712-4717
Vijaya lakshmi Pandranki ,N.Krishna
Abstract | PDFPDF
33. False Data Detection in Wireless Network using Dynamic Security Protocol
Pages : 4718-4722
Garaga Subba Rao, Kothapalli Ramesh
Abstract | PDFPDF
34.
Detection of Intrusion using Alert Aggregation in DataStream Modelling with Constructive Basis
Pages : 4723-4730
J Swathi, Prof.P.Pradeep, P Mahesh Kumar
Abstract | PDFPDF
35. Analysis of Business Processes and Modeling Approach to Business Process Re-Engineering
Pages : 4731-4737
Chandrahauns R Chavan, Bechoo Lal
Abstract | PDFPDF
36.
Improving security By Quantum Cryptography in P2P Reputation Management in Distributed Identities and Decentralized Recommendation Chains
Pages : 4738-4742
V V Murali Babu Polukonda, A Harish
Abstract | PDFPDF
37. Dynamic Behavioral Pattern Mining from Point of Coverage Wireless Sensor Networks
Pages : 4743-4746
U. Sandhya Rani, P.Subba Rao
Abstract | PDFPDF
38. Web Security and Classification of Different Types of Attack for Web
Pages : 4747-4750
Shubham Srivastava
Abstract | PDFPDF
39.
Scenario Based Performance and Comparative Simulation Analysis of Routing Protocols of MANET
Pages : 4751 - 4756
Vikas Gupta, Ajay Lala, Shivendu Dubey, Ashish Chaurasia
Abstract | PDFPDF
40. Efficient Power MAC Protocol in Ad-hoc Network’s
Pages : 4757 - 4763
Rahul Mukherjee
Abstract | PDFPDF
41.
Hatch-Sens: a Theoretical Bio-Inspired Model to Monitor the Hatching of Plankton Culture in the Vicinity of Wireless Sensor Network
Pages : 4764 - 4769
Poulami Majumder, Partha Pratim Ray
Abstract | PDFPDF
42. Multi-Constrained QoS Routing Issues in High-Speed Multimedia Networks
Pages : 4770 - 4773
Monika Jena, Ajay Rana
Abstract | PDFPDF
43. Replication of Authorized Data Objects in Data Grid
Pages : 4774 -4779
D. Subhramanya Sharma, Sudha Gontu
Abstract | PDFPDF
44. Secure File Transfer by using Modular Encryption
Pages : 4780 - 4784
D. Subhramanya Sharma, D.Geetha jyothi
Abstract | PDFPDF
45. Secured Auditing of Outsourced Data using Linear Programming in Cloud
Pages : 4785 - 4789
Satheesh Kavuri, Gangadhara Rao Kancharla, Sowmya Koneru, Sandeep Kotte
Abstract | PDFPDF
46. 3G/4G Network Evolution
Pages : 4790 - 4793
Krunal N. Chandewar, Amit N. Sangole, Shailesh S. Shekapure
Abstract | PDFPDF
47. Automated Detection of Diabetic Retinopathy Using Fundus Image Analysis
Pages : 4794 - 4799
Jaspreet Kaur,Dr. H.P.Sinha
Abstract | PDFPDF
48. Secret Sharing against Transmission Error for an Invisible Communication
Pages : 4780 - 4783
HarishBabu. Kalidasu , B.PrasannaKumar, Haripriya.P
Abstract | PDFPDF
49. Objective Quality Measures in Binarization
Pages : 4784 - 4788
Ambily Joseph, Jaini Sara Babu, Poorna Jayaraj, Beena K.B
Abstract | PDFPDF
50. Optimization CBIR using K-Means Clustering for Image Database
Pages : 4789 - 4793
Juli Rejito, Retantyo Wardoyo, Sri Hartati, Agus Harjoko
Abstract | PDFPDF
51. Discovering Hidden Values in Data Warehouse with Predictive Data Mining
Pages : 4794 - 4797
Duvvuri Arun Kumar, V.Vamsi Krishna, K.Suresh,Ch.Jnaneswari,G.Lakshmi Kranthi, $Anilpatro
Abstract | PDFPDF
52. Secure Mobile Agent Based IDS for MANET
Pages : 4798 - 4805
Yogendra Kumar Jain, Rajesh Kumar Ahirwar
Abstract | PDFPDF
53. Estimating the Effects of Gold Plating Using Fuzzy Cognitive Maps
Pages : 4806 - 4808
Neha Malhotra,Manisha Bhardwaj, Rajwinder Kaur
Abstract | PDFPDF
54. Chaos-Based System for Image Encryption
Pages : 4809 - 4811
Deep Desai, Appoorv Prasad, Jackson Crasto
Abstract | PDFPDF
55. A New Blind Image Watermarking using Hermite Spline Approach
Pages : 4812 - 4817
Allam Mohan, Kampalli Ramu, Salina Adinarayana
Abstract | PDFPDF
56. A Comprehensive Review of Recent Relevance Feedback Techniques in CBIR
Pages : 4818 - 4822
Shruti Patil
Abstract | PDFPDF
57. Role of Wireless Technology for Vehicular Network
Pages : 4823 - 4828
Akshata Gandhi, B. T. Jadhav
Abstract | PDFPDF
58. 3D/4D Image Registration and Fusion Techniques : A Survey
Pages : 4829 - 4839
Shajan P X, Dr.N.J.R.Muniraj, Dr.John T Abraham
Abstract | PDFPDF
59. Weak Bloom Filtering for Large-Scale Dynamic Networks
Pages : 4840 - 4842
Krishna Siva Prasad.M , Y.Adilakshmi
Abstract | PDFPDF
60. Attribute Series of Software Evolution for Software Quality Assessment
Pages : 4843 - 4849
Varaprakash, Praveen Kumar Malladi, Venkata Kiran Talluri
Abstract | PDFPDF
61. Civilizing Exploitation of Communication Clouds
Pages : 4850 - 4857
Janga Santhosh, Puram Pradeep kumar, Majoju Sridhar kumar
Abstract | PDFPDF
62. A Survey of Web Usage Mining based on Fuzzy Clustering and HMM
Pages : 4858 - 4862
Neelam Sain, Prof. Sitendra Tamrakar
Abstract | PDFPDF
63. Protocol Based Attack Injection Framework to Fault Diagnosis in Server Applications
Pages : 4863 - 4867
Kalagotla satish kumar, L.R.Krishna kotapati
Abstract | PDFPDF
64. Security of Data Dynamics in Cloud Computing
Pages : 4868 - 4873
M.Yugandhar, D. Subhramanya Sharma
Abstract | PDFPDF
65. Web Usage Mining & Pre-Fetching Based on Hidden Markov Model & Fuzzy Clustering
Pages : 4874 - 4877
Neelam Sain, Prof. Sitendra Tamrakar
Abstract | PDFPDF
66. A Modified Efficient Log File Compression Mechanism for Digital Forensic in Web Environment
Pages : 4878 - 4882
Rashmi Gupta, Raj Kumar Gupta
Abstract | PDFPDF
67. Social Networking: A Quantitative Research Report into Impact, Attitudes, Behaviours and Use
Pages : 4883 - 4886
Preeta Mahapatra
Abstract | PDFPDF
68. Random Routing Algorithm for Secured Data Collection Accessed in Wireless Sensor Networks
Pages : 4887 - 4891
K.Deepthi, K.Rajani , Y.Suresh
Abstract | PDFPDF
69. Recognition of Handwritten Hindi Characters using Backpropagation Neural Network
Pages : 4892 - 4895
Gunjan Singh, Sushma Lehri
Abstract | PDFPDF
70. A Study of Cloud Privacy and Privacy Patterns
Pages : 4896 - 4899
D.Veerabhadra Rao, G.Appa Rao, Prasad Reddy P.V.G.D
Abstract | PDFPDF
71. Similarity of Fuzzy Ontology Generation for Semantic web
Pages : 4900 - 4903
G. Umamaheswara Rao,K.V. Subba Raju ,K. Srikanth
Abstract | PDFPDF
72. Fail-Proof Connectivity with Continuous Neighbor Discovery in Sensor Networks
Pages : 4904 - 4912
K Sujith Kumar, P Praveen Kumar, B Prasad
Abstract | PDFPDF
73. Analysis and Study of Host To Host Congestion Control for TCP
Pages : 4913 - 4916
V.Akhila Reddy, D.Jamuna, L.Haritha, G.Rakesh Reddy
Abstract | PDFPDF
74. A Navel Approach to Identify Geo-Encryption with GPS and Different Parameters (Locations And Time)
Pages : 4917 - 4919
V. Rajeswari, V. Murali, A.V.S. Anil
Abstract | PDFPDF
75. Dynamic Clustering in Sensor Networks using HMM and Neuro Computation
Pages : 4920 - 4926
Veena K.N., Vijaya Kumar B.P.
Abstract | PDFPDF
76. Semantic Answer Validation using Universal Networking Language
Pages : 4927 - 4932
Partha Pakray, Utsab Barman, Sivaji Bandyopadhyay, Alexander Gelbukh
Abstract | PDFPDF
77. RDF /RDF-S Providing Framework Support to OWL Ontologies
Pages : 4933 - 4937
Rajiv Pandey, Dr.Sanjay Dwivedi
Abstract | PDFPDF
78. Estimating the Probability of Project Completion by SIM_DEL Estimator
Pages : 4938 - 4945
Dr. P.K.Suri, Pallavi Ranjan
Abstract | PDFPDF
79. A Min-Max Inspired Intelligent Approach to Perform Load balancing in Wireless Network
Pages : 4946 - 4950
Harvinder Singh, Narwal Sarita
Abstract | PDFPDF
 
-All rights are reserved by International Journal of Computer Science and Information Technologies-