IF

 

bh

 

VOLUME 4 ISSUE 6 November - December 2013

ISSN 0975 - 9646

1.
Watchdog Three-Tier Technique to Secure Wireless Sensor Network
Pages : 751-754
Pramod D Mane , Prof. D.H.Kulkarni
Abstract | PDFPDF
2. Survey on Security Issues and Problems in Cloud Computing Virtual Machines
Pages : 755-760
Shwetha S
Abstract | PDFPDF
3. RFID Detect Credit Card  Skimmers Using Neural Networks
Pages : 761-765
R. Dhanapal, P. Gayathri
Abstract | PDFPDF
4. Survey on Web Page Noise Cleaning for Web Mining
Pages : 766-770
S. S. Bhamare, Dr. B. V. Pawar
Abstract | PDFPDF
5. Negative Selection Method for Virus Detection in a Cloud
Pages : 771-774
Agnika Sahu, Prabhat Ranjan Maharana
Abstract | PDFPDF
6. Object Recognition Using Texture Based Analysis
Pages : 775-782
Mansi Saraswat, Anil Kumar Goswami, Aastha Tiwari
Abstract | PDFPDF
7. A Comprehensive Study of Phishing Attacks
Pages : 783-786
M. Nazreen Banu, S. Munawara Banu
Abstract | PDFPDF
8. Implementation of Personalized User Model Based on Ontology: A Review Study
Pages : 787-790
Shamkala Waghmare, Prof. R. K. Krishna
Abstract | PDFPDF
9. Sequential Mining of Multimedia Images by using SPADE Algorithm
Pages : 791-795
Harsh mathur
Abstract | PDFPDF
10. Coverage Of Total Target Field To Form WSN Using Delaunay Triangulation
Pages : 796-799
S.Surekha, M.KalyanRam
Abstract | PDFPDF
11. Robust Topology, Self-Scheduling Approach Based on Remaining Energy for WSN
Pages : 800-803
Ranjeet Kagade ,Prof.Mrs.R.A.Satao
Abstract | PDFPDF
12. On the Applications of Cellular Automata and Artificial Life
Pages : 804-807
Harsh Bhasin, Nandeesh Gupta
Abstract | PDFPDF
13. Interfirewall Optimization across Administrative Domains for Enabling Privacy Preserving and Security
Pages : 808-812
Aruna Devi.R, PON Arivanandham
Abstract | PDFPDF
14. Comparative Analysis of Hierarchical Routing in Wireless Sensor Networks
Pages : 813-817
Ankita Bindlish, Anish Soni
Abstract | PDFPDF
15. A study on Comparative Performance of SVM Classifier Models with Kernel Functions in Prediction of Hypertension
Pages : 818-821
Rahul Samant, Srikantha Rao
Abstract | PDFPDF
16. Preserving Anonymity in Mixnet using AES Encryption Algorithm
Pages : 822-825
M. Uma Devi, R.Srinivas, K.N.Bhargavi
Abstract | PDFPDF
17. Steganography– Information Hiding in Source Code Langauge
Pages : 826-829
Veenu Arora, Raninder dhillon
Abstract | PDFPDF
18. Abnormality Detection in Digital Mammogram
Pages : 830-834
S Narasimha Murthy, Arun Kumar M N , H.S. Sheshadri
Abstract | PDFPDF
19. Survey on Image Resolution Techniques for Satellite Images
Pages : 835-838
P.Suganya, N.Mohanapriya, A.Vanitha
Abstract | PDFPDF
20. Gender Classification Technique Based on Facial Features using Neural Network
Pages : 839-843
Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour
Abstract | PDFPDF
21. Image Segmentation using Morphological Operations for Automatic Region Growing
Pages : 844-847
Ritu Sharma, Rajesh Sharma
Abstract | PDFPDF
22. A Recent Approach to Organise Structured Data in Mobile Environment
Pages : 848-852
R.Jegadeesan, Dr.N.Sankar Ram, R.Janakiraman
Abstract | PDFPDF
23. Efficient Resource Allocation and Tracking in Structured P2P network: Back Trackable Finger Table based CHORD (BTFT-CHORD) Protocol
Pages : 853-857
D.Srivihari, P.Prasanna Murali Krishna
Abstract | PDFPDF
24. Fault Tolerance Techniques in Grid Computing Systems
Pages : 858-862
T. Altameem
Abstract | PDFPDF
25. An Effective Approach for Video Copy Detection and Identification of Misbehaving Users
Pages : 863-867
S.Sujatha
Abstract | PDFPDF
26. A secured Transmission of Embedded Hidden Data in Binary Images Using Resolution Variant Visual Cryptography
Pages : 868-870
Koppala K V P Sekhar, S Sateesh Kumar, Y.Ramesh Kumar
Abstract | PDFPDF
27. EDBAT: Efficient Demand Based Energy Allocation Topology for Mobile Ad Hoc Networks
Pages : 871-874
Kureti Maheswara Rao, M.L.Ravichandra
Abstract | PDFPDF
28. A Sparse Representation Approach to Facial Expression Recognition Based on LBP plus LFDA
Pages : 875-878
Ritesh Bora, V.A.Chakkarvar
Abstract | PDFPDF
29. An Enhanced Approach for Character Recognition Based On Discriminative Semi-MarkovModel
Pages : 879-882
P.Ramya , S.Karthiprem, R.V.Viswanathan
Abstract | PDFPDF
30. CAPSULE A Programming Language Code Compression Technique
Pages : 883-885
Govind Prasad Arya, Prince Kashyap, Nilika Kumari, Mitali Hembrom
Abstract | PDFPDF
31. Visualizing Page Replacement Techniques based on Page Frequency and Memory Access Pattern
Pages : 886-890
Ruchin Gupta, Narendra Teotia
Abstract | PDFPDF
32. Privacy Preserving Clustering Over Distributed Data
Pages : 891-894
K.A.Sireesha, R.Srinivas, K.Arunbhaskar
Abstract | PDFPDF
33. Ubiquitous Real Time ECG Monitoring System Using Android Smartphone
Pages : 895 - 898
Satish Patil, Pallavi Kulkarni
Abstract | PDFPDF
34. An Advanced Data Transformation Algorithm for Categorical Data Protection
Pages : 899-902
Dnyaneshwar Pandurang Naik, Anjana N. Ghule
Abstract | PDFPDF
35. Simulation Based Analysis of Target Area Calculation and Key Pre Distribution Scheme in WSNs using Node Deployment Knowledge
Pages : 903 - 907
M.L.G.N.Chellarao, M. Kalyan Ram
Abstract | PDFPDF
36. Skills Based Learning Environments: Semantic Annotation with Mapping Method
Pages : 908 - 912
R.Anish
Abstract | PDFPDF
37. Effective Energy Depletion in Wireless Sensor Network using EEDC Technique
Pages : 913 - 916
C. Chandru Vignesh, A. Christopher Paul, M.Boopathiraja
Abstract | PDFPDF
38. Utility Based Pattern Matching Approach for Data Mining
Pages : 917 - 921
Kanchi. Suresh, Dr. Hari Krishna Pulagam
Abstract | PDFPDF
39. Application of Cloud Computing in Agricultural Development of Rural India
Pages : 922-926
Rakesh Patel , Mili. Patel
Abstract | PDFPDF
40. Implementation of Ant Colony Optimization with OLSR in Mobile Ad hoc Network
Pages : 927-930
Ashu Tyagi , Pankaj Sharma
Abstract | PDFPDF
41. Integration of Transport Department Check Posts with the help of National Register (NR) of Vehicle in the Perspective of E-Governance
Pages : 931-932
Piyush Gupta, Dr saurabh Gupta
Abstract | PDFPDF
42. A Review on Fixed-Rank Representation for Supervised Learning Using Neural Network
Pages : 933-936
M. Abdul. Zahed Javeed, Shubhangi Sapkal
Abstract | PDFPDF
43. Improving Technique for GAIT RECOGNITION & Performing Feature Extraction Using Videos of
Different Forms

Pages : 937-939
Ashutosh Batta and Chirag Sharma
Abstract | PDFPDF
44. Gateway relocation by Bandwidth based Admission Control Scheme in WiMax
Pages : 940-944
Srinivasa kalyan venigalla , Mounika Modadugu , Voonna Venkata Nagaraju , Vepuri Bhargavi
Abstract | PDFPDF
45. Face Recognition using Rectangular Feature
Pages : 945-949
Sanjay Pagare, Dr. W. U. Khan
Abstract | PDFPDF
46. Denial of Service Mitigation Method
Pages : 950-953
Madhuri H. Bhagwat, Amol P. Pande
Abstract | PDFPDF
47. A Poly-alphabetic Approach to Caesar Cipher Algorithm
Pages : 954-959
Prachi Patni
Abstract | PDFPDF
48. Enhanced Naïve Bayes Algorithm for Intrusion Detection in Data Mining
Pages : 960-962
Shyara Taruna R. Mrs. Saroj Hiranwal
Abstract | PDFPDF
49. Energy Efficient Node Addressing Scheme in Hierarchical Wireless sensor Network
Pages : 963-966
Ganesh.S.Pise , Vinod. V. Kimbahune
Abstract | PDFPDF
50. Heterogeneous Spatial Data Integration Process Using Business Intelligence Approach
Pages : 967-973
M. Mustafa, A. Aliff , M. Yazid
Abstract | PDFPDF
51. Reviewing MANETs & Configurations of Certification Authority (CA) for node Authentication
Pages : 974-978
Dr. Shaveta Rani, Dr. Paramjeet Singh, Raman Preet
Abstract | PDFPDF
52. GPS Based Vehicle Navigation System Using Google Maps
Pages : 979-982
Ch.ChakradharaRao, P.Pushpalatha, N.AdityaSundar
Abstract | PDFPDF
53. Vehicle Speed Control System Using GSM/GPRS
Pages : 983-987
B.Devikiruba
Abstract | PDFPDF
54. Nested Software Pattern Testing on Cloud Storages
Pages : 988-994
V.Nethaji, C.Chandrasekar
Abstract | PDFPDF
55. Impact of Data Warehousing and Data Mining in Decision Making
Pages : 995-999
Monika Pathak, Sukhdev Singh, Sukhwinder Singh Oberoi
Abstract | PDFPDF
56. Improved Persuasive Cued Click Points for Knowledge-Based Authentication
Pages : 1000-1003
Suresh Pagidala, C. Shoba Bindu
Abstract | PDFPDF
57. Enhanced OLSR for Defense against Node Isolation Attack in Ad Hoc Networks
Pages : 1004-1009
Banoth Balaji , Mohammed HasanKhan , R. Prathap Kumar
Abstract | PDFPDF
58. Link/Node Failure Recovery through Backup Path Lengths
Pages : 1010-1016
Ravula Prathap Kumar, Banothu Balaji, Dasari Yakobu, N Sai Bala Kishore
Abstract | PDFPDF
59. Parallel Fractal Coding for Color Image Compression Using Genetic Algorithm and Simulated Annealing
Pages : 1017-1022
A.R.Nadira Banu Kamal , P.Priyanga
Abstract | PDFPDF
60. Predictive Machine Learning Techniques for Breast Cancer Detection
Pages : 1023-1028
S.Kharya , D. Dubey , and S. Soni
Abstract | PDFPDF
61. Hybrid Approach of Facial Expression Recognition
Pages : 1029-1033
Pinky Rai , Manish Dixit
Abstract | PDFPDF
62. Detection And Prevention of Misbehaving Users in Anonymizing Networks
Pages : 1034-1037
Anuse A.A, Prof. Rachana A. Satao
Abstract | PDFPDF
   
-All rights are reserved by International Journal of Computer Science and Information Technologies-