IF

bh

 

VOLUME 3 ISSUE 5 September- October 2012

ISSN 0975 - 9646

1.
Object Detection by an Autonomous Robot through Data Fusion
Pages : 4951 - 4955
Tapan Kumar Nayak, Sanjit Kumar Dash, Himansu Sekhar Sasmal, Srikanta Patanaik
Abstract | PDFPDF
2
Authenticated Transmission using Quantum Security
Pages : 4956 - 4960
V. Kishore, M. Ramakrishna, M.A.Baseer
Abstract | PDFPDF
3
Joint effect of Learning and Testing Effort in SRGM with Fault Dependent Correction Delay
Pages : 4961 - 4967
Shaik Mohammad Rafi , Dr.K Nageswara Rao , Dr. S . Pallam Setty , Dr. Shaheda Akthar
Abstract | PDFPDF
4
FIR Filter Design Using Rounding Technique
Pages : 4968 - 4970
Sangita Solanki, Devendra Singh Mondloi
Abstract | PDFPDF
5
Network Intrusion Detection Using Improved Decision Tree Algorithm
Pages : 4971 - 4975
K.V.R. Swamy, K.S. Vijaya Lakshmi
Abstract | PDFPDF
6
Users Recommended Tag Prediction and Visualization for Dynamic Delicious Tag Data
Pages : 4976 - 4980
Jameson Ganta, G. Krishna Kishore
Abstract | PDFPDF
7
A Novel Approach for SQL Injection Prevention Using Hashing & Encryption (SQL-ENCP)
Pages : 4981 - 4987
Mayank Namdev, Fehreen Hasan, Gaurav Shrivastav
Abstract | PDFPDF
8
Simplifying Complex Tasks: Cloud Computing
Pages : 4988 - 4996
V. KISHORE, G.G.G.BHAVANI, M.RAMAKRISHNA
Abstract | PDFPDF
9
OPTIMIZED DESIGN of ALU for LOW POWER DISSIPATION
Pages : 4997 - 4999
Hare kishan, Ravinder kumar
Abstract | PDFPDF
10
Performance Analysis of Node-Disjoint Multipath Routing for Mobile Ad-hoc Networks based on QoS
Pages : 5000 - 5004
Jay Kumar Jain, Devendra Kumar Jain, Anuradha Gupta
Abstract | PDFPDF
11
Securing E-Mail System of Web Data Base Using Cloud Computing
Pages : 5005 - 5008
Tejaswi.K, Sridevi.M, Vishnu Murthy.G
Abstract | PDFPDF
12
Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks
Pages : 5009 - 5013
P.Pavan kumar Reddy, Manohar Gosul
Abstract | PDFPDF
13
A Review of Expert Systems in Animal Health Care
Pages : 5014 - 5018
A. B. Patil, Dr. R. V. Kulkarni
Abstract | PDFPDF
14
Intrusion detection: an Energy efficient approach and Data loss estimation in Heterogeneous WSN
Pages : 5019 - 5024
Mahipal Reddy.G ,Ananda Raj.S.P,Ramana.V,Poornima.S
Abstract | PDFPDF
15
Back Propagation Neural Network based Gait Recognition
Pages : 5025 - 5030
G. Venkata Narasimhulu Dr. S. A. K. Jilani
Abstract | PDFPDF
16
Web Applications Access Control Single Sign On
Pages : 5031 - 5035
Anitha Chepuru, Dr.K.Venugopal Rao, Amardeep Matta
Abstract | PDFPDF
17 Novel Algorithms Based on Legendre Neural Network for Nonlinear Active Noise Control with
Nonlinear Secondary Path
Pages : 5036 - 5039
Kunal Kumar Das and Jitendriya Kumar Satapathy
Abstract | PDFPDF
18
Proposed Multi-Layers Intrusion Detection System (MLIDS) Model
Pages : 5040 - 5042
Gargi Agrawal, Megha Kamble
Abstract | PDFPDF
18
Proposed Multi-Layers Intrusion Detection System (MLIDS) Model
Pages : 5040 - 5042
Gargi Agrawal, Megha Kamble
Abstract | PDFPDF
19
A Novel Approach for Multi-Cloud Storage security in Cloud Computing
Pages : 5043-5045
G. Rakesh Reddy, Dr. M.B. Raju, Dr. B. Ramana Naik
Abstract | PDFPDF
20
Money to ATM – Fake Currency Detection
Pages : 5046-5050
K. Satish , Y.K.Viswanadham, I Leela Priya
Abstract | PDFPDF
21
A Novel Graphical Password Scheme Resistant To Peeping Attack
Pages : 5051-5054
T.Srinivasa Ravi Kiran, Dr.K.V.Samabasiva Rao, M.Kameswara Rao
Abstract | PDFPDF
22
Need to Change focus from Link Failures to Backbone Failures in WMN
Pages : 5055-5058
Jyoti Gupta, JiwanJyoti Senapati
Abstract | PDFPDF
23
Exalt Network Lifetime for Wireless Sensor Network with Purn Delay
Pages : 5059-5061
Jangala Vineela, A.Srinivas Reddy
Abstract | PDFPDF
24
Proficient and Privacy-Attentive Framework for Continuously Moving Objects
Pages : 5062-5064
Palukuri.Jhansy, T.Sunitha
Abstract | PDFPDF
25
IC: Intelligent Clustering, a new time efficient data partitioning methodology
Pages : 5065-5067
Done Stojanov
Abstract | PDFPDF
26
A Novel System based on GMM to understand the User's Web Navigation Pattern
Pages : 5068-5070
M.Bangaru Lakshmi, A.Nageswara Rao, G.Venugopal
Abstract | PDFPDF
27
Simple Overview on Cloud Computing
Pages : 5071-5073
Jeevana Jammula, Swapna Goud.N, Vishnu Murthy.G
Abstract | PDFPDF
28
Video Error Concealment using H.264/AVC
Pages : 5074-5077
Aniruddha D.Shelotkar, Vishwajit K.Barbudhe
Abstract | PDFPDF
29
Enriching Forensic Analysis process for Tampered Data in Database
Pages : 5078-5085
Pallavi D Abhonkar, Ashok Kanthe
Abstract | PDFPDF
30
Literature Review on Expert System in Agriculture
Pages : 5086-5089
S. J. Yelapure , Dr. R. V. Kulkarni
Abstract | PDFPDF
31
Performance Comparison of transport protocols, UDP and UDP-Lite for transmission of Different Video Codecs over MANETs
Pages : 5090-5096
Puneet Kaur
Abstract | PDFPDF
32
A SECURE DATA HIDING TECHNIQUE IN COMPRESSED VIDEO USING A SECRET KEY
Pages : 5097 - 5100
V.Manjula, J. Rajani, K. Radhika                               
Abstract | PDFPDF
33
Application of Green Cloud Computing For Efficient Resource Energy Management in Data Centres
Pages : 5101-5107
Yuvapriya Ponnusamy, S Sasikumar
Abstract | PDFPDF
34
An Efficient Approach for Automatic Number Plate Recognition System Using Quick Response Codes
Pages : 5108 - 5115
Bhupendra Moharil, Vijayendra Ghadge, Chaitanya Gokhale, Pranav Tambvekar
Abstract | PDFPDF
35
Efficient Personalized Search using Ranking SVM
Pages : 5116 - 5122
V.K.Priyanka Kolluri, A.Bala Ram
Abstract | PDFPDF
36
Economic Cost Model for Software Engineering Simulation
Pages : 5123 - 5127
E.Geetha Rani,K.Swarupa Rani, D.Anusha, Dr.M.V.L.N.Raja Rao
Abstract | PDFPDF
37
Proposed Method for Image Segmentation Using Similarity Based Region Merging Techniques
Pages : 5128 - 5132
Garima Singh Rawat, Joy Bhattacharjee, Roopali Soni
Abstract | PDFPDF
38
Robust and Secure Data Hiding in Image Using Biometric Technique
Pages : 5133 - 5136
N. Lavanya, V. Manjula, N. V. Krishna Rao
Abstract | PDFPDF
39
The Applications Survey On Bee Colony Optimization
Pages : 5137 - 5140
Hemant Nagpure#, Rohit Raja
Abstract | PDFPDF
40
A Robust Facial Recognition System Based on Skew Gaussian Distribution
Pages : 5141 - 5142
Pavanendar, P.Raja Sekhar, Y.Srinivas
Abstract | PDFPDF
41
Secured Receiver Location Privacy Based on Cyclic Chain Shift Technique in Mobile Ad Hoc Networks
Pages : 5143 - 5148
Satish Shrivastava, Nitin Agrawal, Sitendra Tamrakar
Abstract | PDFPDF
42
A Survey on Data Mining Algorithms and Future Perspective
Pages : 5149 - 5156
N.K. Sharma, Dr. R.C. Jain, Manoj Yadav
Abstract | PDFPDF
43
Ensuring and Reliable Storage in Cloud Computing
Pages : 5157 - 5163
Katukam Ganesh, Maligireddy Saidireddy, KrishnaChaitanya.Katkam
Abstract | PDFPDF
44
Expedition for the Exploration of Apposite Knowledge
Pages : 5164 - 5168
Shabia Shabir Khan, Dr. Mushtaq Ahmed Peer
Abstract | PDFPDF
45
Accident Avoidance and Minimal Delay Time Efficient Automated Railway System
Pages : 5169 - 5171
Giridhari Krishnan
Abstract | PDFPDF
46
A Review of Expert System in Information System Audit
Pages : 5172 - 5175
A. B. Devale, Dr. R. V. Kulkarni
Abstract | PDFPDF
47
Polarity Analysis through Neutralization of Non-Polar Words and Segregation of Polar Words Using Training Data
Pages : 5176 - 5178
Ajay Siva Santosh Reddy
Abstract | PDFPDF
48
Fast Mining of Temporal Data Clustering
Pages : 5179 - 5181
D. Suresh Babu, K. Navya
Abstract | PDFPDF
49
A Review of Image Classification Techniques in Content Based Image Retrieval
Pages : 5182 - 5184
Neera Lal, Neetesh Gupta, Amit Sinhal
Abstract | PDFPDF
50
Personalized Web Information Collection Using Knowledge-based Ontologies
Pages : 5185 - 5189
K.V. Narayana Rao, U. Jwalitha, K.D.N.V Rajesh
Abstract | PDFPDF
51
Self learning Automated ATC using AI Technique and Entropy Approach
Pages : 5190 - 5194
Giridhari Krishnan
Abstract | PDFPDF
52
Adaptive Kalman Filter based Channel Equalizer
Pages : 5195 - 5199
Bharti Kaushal, Agya Mishra
Abstract | PDFPDF
53
Improved ID Based Key Agreement Protocol Using Timestamp
Pages : 5200 - 5205
M.D.P Kishore , Dr. K.Venkata Rao
Abstract | PDFPDF
54
Exploiting Dynamic Resource Allocation for Query Processing in the Cloud Computing
Pages : 5206 - 5209
M.S.B.Pridviraju , K.Rekha Devi
Abstract | PDFPDF
55
Extended XML Tree Pattern Matching Using TREEMATCH Algorithm
Pages : 5210 - 5211
Dr D.Suresh Babu, B.Shiva kiran
Abstract | PDFPDF
56
A Review of Data Cleaning Algorithms for Data Warehouse Systems
Pages : 5212 - 5214
Rajashree Y.Patil,#, Dr. R.V.Kulkarni
Abstract | PDFPDF
57
A Comparative Study of various Computing Processing Environments: A Review
Pages : 5215 - 5218
P.K. Suri, Sumit Mittal
Abstract | PDFPDF
58
An Approach For Intrusion Detection System In Cloud Computing
Pages : 5219 - 5222
M.Madhavi
Abstract | PDFPDF
59
Vibe: Background detection and subtraction for image sequences in video
Pages : 5223-5226
K. Kavitha, A. Tejaswini
Abstract | PDFPDF
60
ABayesian Network and variable elimination algorithm for Reasoning under Uncertainty
Pages : 5227 - 5230
Siva Rama Krishna Prasad Jaladi, Dharmaiah Devarapalli
Abstract | PDFPDF
61
Content Based Image Retrieval System Consume Semantic Gap
Pages : 5231 - 5235
K. Vijay Kumar, Dr.R.Rajeswara Rao , V.Subba Ramaiah, Jhansi Rani kaka
Abstract | PDFPDF
62
Fuzzy Logic Approach to Edge Detection for Dental X-ray Image Segmentation
Pages : 5236 - 5238
Dr. N. Senthilkumaran
Abstract | PDFPDF
63
Computer & Network Security
Pages : 5239 - 5242
Puneet Himthani , Puneet Gurbani , Shweta Tharwani , Tarun Pare
Abstract | PDFPDF
64
Avoiding Congestion Control Using Network Border Patrol
Pages : 5243 - 5246
Sudhakar Murugesan, Ganesh Gangadharan, Dr. Rajan John
Abstract | PDFPDF
65
Adaptive Square-Diamond Search(ASDS) Algorithm for Fast Block Matching Motion Estimation
Pages : 5247 - 5253
M.K. Pushpa, Dr. S. Sethu Selvi
Abstract | PDFPDF
66
On the Design of High Speed Parallel CRC Circuits using DSP Algorithams
Pages : 5254 - 5258
B.Naresh Reddy, B.Kiran Kumar, K.Mohini sirisha
Abstract | PDFPDF
67
Detection of moving object using KOF method
Pages : 5259 - 5264
B.Naresh Reddy, B.Narasimha Rao, B.Kiran Kumar
Abstract | PDFPDF
68
Secure Analysis for Interval-based  Algorithms
Pages : 5265 - 5271
V.Jaya Ramakrishna , K.Nithin Babu, M.N.Satish Kumar
Abstract | PDFPDF
69
Implementation of  Navigation Pattern Mining in Dot Net framework
Pages : 5272 - 5275
Aditi Shrivastava , Nitin Shukla
Abstract | PDFPDF
70
A Critique on Web Usage Mining
Pages : 5276 - 5279
K.S.R. Pavan Kumar , V.V. Sreedhar, L. Manoj Chowdary
Abstract | PDFPDF
71
An Enhanced Approach for Finding an Optimal Path in MANET using Energy Aware Reverse Reactive Routing Protocol (EA-RAODV)
Pages : 5280 - 5284
Bhabani Sankar Gouda1, Chandan Kumar Behera
Abstract | PDFPDF
72
CEBKST: The Cost Efficient Based On Keying and Secure Data Transmission for Wireless Sensor Network
Pages : 5285 - 5290
Narahari A, M. Preethi
Abstract | PDFPDF
73
A Secure File Transfer Based On Discrete Wavelet Transformation And Audio Watermarking Techniques
Pages : 5291 - 5295
Vineela Behara, Y. Ramesh
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-