IF

 

bh

 

VOLUME 4 ISSUE 1 January- February 2013

ISSN 0975 - 9646

1.
Data mining techniques for Fraud Detection
Pages : 1-4
Anita B. Desai, Dr. Ravindra Deshmukh
Abstract | PDFPDF
2.
Overview of  Fingerprint Image Enhacement & Minutia Extraction
Pages : 5-9
Indira Chakravarthy , VVSSS.Balaram, B.Eswara Reddy
Abstract | PDFPDF
3.
Alert Areas of Cloud Security
Pages : 10-13
Shuchita Bhargava, Rahul M. Samant
Abstract | PDFPDF
4.
Protection of Data Base Security Via Collabrative  Inference Detection
Pages : 14-16
Ajay Sharma, Alok Kumar Shukla, Dharmendra Kumar
Abstract | PDFPDF
5.
Image Processing Edge Detection Technique used for Traffic Control Problem
Pages : 17-20
P.Srinivas, Y.L. Malathilatha,Dr. M.V.N.K Prasad
Abstract | PDFPDF
6.
Domain Name System: The Backbone of today’s World of Internet
Pages : 21-23
Gopi Nath Sahani, Jitender Kumar, Manoj Kumar
Abstract | PDFPDF
7.
Smart Cane for Visually Impaired People
Pages : 24-28
J.Ramprabu, Gowthaman.T
Abstract | PDFPDF
8.
Co-Operative Distributed Intrusion Detection in  Wireless Ad-hoc Network
Pages : 29-33
Vinaysagar Anchuri, Basmay C. Simmi, E. Ramya Sri
Abstract | PDFPDF
9.
Intelligent Approach toward Anti-Phishing using Two Factor Authentication
Pages : 34-36
Hardik Desai, Deepak Gupta, Noopur Pandey
Abstract | PDFPDF
10.
Diagnosis of Lung Cancer Prediction System Using Data Mining Classification Techniques
Pages : 39-45
V.Krishnaiah, Dr.G.Narsimha, Dr.N.Subhash Chandra
Abstract | PDFPDF
11.
Effectiveness of Requirement Prioritization Using Analytical Hierarchy Process (AHP) and Planning Game (PG): A Comparative Study
Pages : 46-49
Shadab Siddiqui, Dr.Mohd. Rizwan Beg, Shahin Fatima
Abstract | PDFPDF
12.
Improving Software Quality Using FMEA and FTA Defect Prevention Techniques in Design Phase
Pages : 50-54
Shahin Fatima, Dr.Mohd. Rizwan Beg, Shadab Siddiqui
Abstract | PDFPDF
13.
Proposed Energy Saving Scheme for Wireless Ad-hoc Sensor Network
Pages : 55-57
Deepika Jain , Sitendra Tamrakar
Abstract | PDFPDF
14.
New Approach for Data Encryption using Two Way Crossover
Pages : 58-60
Deepak Nagde, Raviraj Patel, Dharmendra Kelde
Abstract | PDFPDF
15.
New Image Encryption Technique Based On Combination of Block Displacement and Block Cipher Technique
Pages : 61-65
Keerti Kushwah, Sini Shibu
Abstract | PDFPDF
16.
TECHNIQUES FOR EFFICIENT KEYWORD SEARCH IN CLOUD COMPUTING
Pages : 66-68
P.NIRANJAN REDDY  1* ,  Y.SWETHA 2
Abstract | PDFPDF
17.
INFORMATION FORENSIC APPLICATION USING SOFT COMPUTING TECHNIQUES
Pages : 69-72
Dharmendra Kelde, Deepak Nagde,  Raviraj Patel, Pavan Pawar
Abstract | PDFPDF
18.
Extreme Programming Verification using Unified Process
Pages : 73-76
G. Sivanageswara Rao, Ch.V.Phani Krishna , Dr. K.Rajasekhar rao
Abstract | PDFPDF
19.
INTRUSION DETECTION SYSTEM - TYPES AND PREVENTION
Pages : 77-82
B.SANTOS KUMAR , T.CHANDRA SEKHARA PHANI RAJU, N.SUDHAKAR
Abstract | PDFPDF
20.
Real Time Eye Recognition
Pages : 83-86
Hansaraj S. Wankhede, S. A. Chhabria, Dr. R. V. Dharaskar
Abstract | PDFPDF
21.
A Novel Optimization Technique for Determination of Parametric Queries
Pages : 87-90
Arepu Yuvakishore & Kumar Vasantha
Abstract | PDFPDF
22.
Spell Checker for OCR
Pages : 91-97
Yogomaya Mohapatra, Ashis Kumar Mishra, Anil Kumar Mishra
Abstract | PDFPDF
23.
Simulation Studies on Zigbee Communication for Video Transmission and Networking
Pages : 98-102
Deepak Gupta, Kavita Malav, Mukesh Nagar
Abstract | PDFPDF
24.
Divide and ConquerMethod for Clustering Mixed Numerical and Categorical Data
Pages : 103-106
Dileep Kumar Murala
Abstract | PDFPDF
25.
Advanced Network Intrusion Detection System Based on Effective Feature Selection
Pages : 107-112
Sumathi M, Umarani R
Abstract | PDFPDF
26.
A Survey on Different Image Encryption and Decryption Techniques
Pages : 113-116
Rinki Pakshwar, Vijay Kumar Trivedi, Vineet Richhariya
Abstract | PDFPDF
27.
An Efficient password based Two-Server Authentication and Pre-shared Key Exchange System using Smart Cards
Pages : 117-120
Anamika Chouksey, Yogadhar Pandey
Abstract | PDFPDF
28.
Article Withdrawn
Pages : 121-125
xxx, xxx
Abstract | PDFPDF
29.
Indian Currency Denomination Identification Using Image Processing Technique
Pages : 126-128
Vipin Kumar Jain, Ritu Vijay
Abstract | PDFPDF
30.
Security measures for Smart Devices Through Cryptography Using Cellular Automaton
Pages : 129-133
M.Venugopal, E.G.Rajan, Sharma
Abstract | PDFPDF
31.
Real-Time Scheduler Design for Embedded System Domain
Pages : 134-138
Anil Kumar Mishra, Yogomaya Mohapatra, Ashis Kumar Mishra
Abstract | PDFPDF
32.
Privacy Preserving Data Mining
Pages : 139-141
Smita D Patel, Sanjay Tiwari
Abstract | PDFPDF
33.
An Energy Efficient Routing Approach based on AODV
Pages : 142-146
Rohit Sharma, Sangeeta Sharma
Abstract | PDFPDF
34.
Fault Recovery in Optimal Task Scheduling and Grid Service Reliability
Pages : 147-151
Ashwini Vedulla, Pramod Reddy A, Krishna Prasad B
Abstract | PDFPDF
35.
Performance Analysis for Efficient Data Collection with path Constrained Mobile sink Using SPMA Scheme in WSNs
Pages : 152-155
Sheetal Raina, N.A.Mhetre
Abstract | PDFPDF
36.
Classifying populated IP Addresses using SVM Clustering and Vertical partition id3 decision Tree
Pages : 156-158
Gagan Sharma, Yogadhar Pandey
Abstract | PDFPDF
37.
An Efficient ID3 Decision Tree for the Classification of Populated IP Address Using K-Mean Clustering
Pages : 159-162
Rajesh Kumar Sharma, Anurag Jain, Subha Dubey
Abstract | PDFPDF
38.
Brain Fingerprinting
Pages : 163-166
Upasana M. Bhilota, Dhara J. Patel
Abstract | PDFPDF
39.
Classifying Problem in Inference Engine for Different Version Based Ontology
Pages : 167-170
Ajaysinh Rathod, Bhaumik Nagar, Sachin Sharma
Abstract | PDFPDF
40.
Survey on Different Types of Attacks and Counter Measures in Wireless Networks
Pages : 171-174
N. Vijaya gopal, Dr.V.Srikanth, M. Mohan Chandra
Abstract | PDFPDF
41.
Effective Cloud Service Management through Volunteer Computing
Pages : 175-177
Nirupadi Tidigol, T.P.Lokesh, Thrilochana Kumar Y.P
Abstract | PDFPDF
42.
Improving Software Quality Using FMEA and FTA Defect Prevention Techniques in Design Phase
Pages : 178-182
Shahin Fatima, Dr.Mohd. Rizwan Beg, Shadab Siddiqui
Abstract | PDFPDF
43.
Human Digitization: Authentication Profiles in Digital Information Rights Management Systems
Pages : 183-187
K. M. Moorning
Abstract | PDFPDF
44.
Merging Feature Method on RGB Image and Edge Detection Image for Wood Identification
Pages : 188-193
Gasim, Agus Harjoko, Kudang Boro Seminar, Sri Hartati
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-