• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 2 ISSUE 1 January-February 2011

    ISSN 0975 - 9646

    1.
    A Model of MULTI-VERIFIER channel e-mailing system using Steganographic scheme
    Pages : 465-468
    D.B. Ojha, Abhishek Shukla, Meenu Sahni, Nitin Pandey
    Abstract | PDFPDF
    2.
    A Novel Approach for Data Security Enhancement Using Multi Level Encryption Scheme
    Pages : 469-473
    Sairam Natarajan, Manikandan Ganesan, Krishnan Ganesan
    Abstract | PDFPDF
    3.
    The Foot Step of mobile network - wireless network architecture
    Pages : 474-476
    Abdul Jabbar Khilji,Dr.Raghuraj Singh , Shruti Sandal ,Shashi Shekhar Ranga
    Abstract | PDFPDF
    4. Analysis of Data Quality Aspects in Data Warehouse Systems
    Pages: 477-485
    Manjunath T.N, Ravindra S Hegadi, Ravikumar G.K
    Abstract | PDFPDF
    5. Performance Analysis of Clustering Algorithms in Detecting Outliers
    Pages: 486-488
    Sairam, Manikandan, Sowndarya
    Abstract | PDFPDF
    6. Extraction of P wave and T wave in Electrocardiogram using Wavelet Transform
    Pages: 489-493
    P.Sasikala , R.S.D. WahidaBanu
    Abstract | PDFPDF
    7. Syntactic Sentence Fusion Techniques for Bengali
    Pages: 494-503
    Amitava Das and Sivaji Bandyopadhyay
    Abstract | PDFPDF
    8. A New Fuzzy Gaussian Noise Removal Method for Gray-Scale Images
    Pages: 504-511
    K.Ratna Babu, K.V.N.Sunitha
    Abstract | PDFPDF
    9. Outlier Detection for Multidimensional Medical Data
    Pages: 512-516
    Anbarasi.M.S Ghaayathri.S, Kamaleswari.R, Abirami.I
    Abstract | PDFPDF
    10. Information Technology (IT) Security Management in Kenyan Small and Medium Enterprises (SMEs)
    Pages: 517-525
    Michael Kimwele, Waweru Mwangi, Stephen Kimani
    Abstract | PDFPDF
    11. Role of soft computing as a tool in data mining
    Pages: 526-537
    Kanhaiya Lal, N.C.Mahanti
    Abstract | PDFPDF
    12. Effect of Energy and Bandwidth Constraints in Ad Hoc Networks: A Review
    Pages: 538-544
    Tanu Preet Singh, Manmeet Kaur, Vishal Sharma
    Abstract | PDFPDF
    13. An Architechture Model for Managing Transactions in Disconnected Mobile Environment
    Pages: 545-550
    J.LWalter Jeyakumar, R.S.Rajesh
    Abstract | PDFPDF
    14. Oriya Language Text Mining Using C5.0 Algorithm
    Pages: 551-554
    Sohag Sundar Nanda, Soumya Mishra, Sanghamitra Mohanty
    Abstract | PDFPDF
    15. Software Reliability Growth Models Incorporating Burr Type III Test-Effort and Cost-reliability Analysis
    Pages: 555-562
    N. Ahmad, S. M. K. Quadri, M.G.M. Khan, and M. Kumar
    Abstract | PDFPDF
    16. Clustering Algorithm for 2D Multi-Density Large Dataset Using Adaptive Grids
    Pages: 563-568
    Mr. Chetan J. Awati, Prof. D.G. Chougule
    Abstract | PDFPDF
    17. Run Time Polymorphism Against Virtual Function in Object Oriented Programming
    Pages: 569-571
    Devendra Gahlot, S. S. Sarangdevot, Sanjay Tejasvee
    Abstract | PDFPDF
    18. Survey on Ad Hoc Wireless Networks And Routing Security issues
    Pages: 572-586
    Prasuna V G, Dr. S. Madhusudhana Verma
    Abstract | PDFPDF
    19. Ultra Wideband Channel Model for IEEE 802.15.4a and Performance Comparison of
    DBPSK/OQPSK Systems

    Pages: 587-596
    B.V. Santhosh Krishna, K.Sakthidasan
    Abstract | PDFPDF
    20. Performance Analysis of V-Blast MIMO System in Rician Channel Environment
    Pages: 597-601
    Samarendra Nath Sur , Debjyoti Ghosh , Debasish Bhaskar , Rabindranath Bera
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-