1. |
A Model of MULTI-VERIFIER channel e-mailing
system using Steganographic scheme
Pages : 465-468
D.B. Ojha, Abhishek Shukla, Meenu Sahni, Nitin Pandey
Abstract | PDF |
2. |
A Novel Approach for Data Security Enhancement
Using Multi Level Encryption Scheme
Pages : 469-473
Sairam Natarajan, Manikandan Ganesan, Krishnan Ganesan
Abstract | PDF |
3. |
The Foot Step of mobile network - wireless
network architecture
Pages : 474-476
Abdul Jabbar Khilji,Dr.Raghuraj Singh , Shruti Sandal ,Shashi Shekhar Ranga
Abstract | PDF |
4. |
Analysis of Data Quality Aspects in Data
Warehouse Systems
Pages: 477-485
Manjunath T.N, Ravindra S Hegadi, Ravikumar G.K
Abstract | PDF |
5. |
Performance Analysis of Clustering Algorithms
in Detecting Outliers
Pages: 486-488
Sairam, Manikandan, Sowndarya
Abstract | PDF |
6. |
Extraction of P wave and T wave in
Electrocardiogram using Wavelet Transform
Pages: 489-493
P.Sasikala , R.S.D. WahidaBanu
Abstract | PDF |
7. |
Syntactic Sentence Fusion Techniques for Bengali
Pages: 494-503
Amitava Das and Sivaji Bandyopadhyay
Abstract | PDF |
8. |
A New Fuzzy Gaussian Noise Removal Method for
Gray-Scale Images
Pages: 504-511
K.Ratna Babu, K.V.N.Sunitha
Abstract | PDF |
9. |
Outlier Detection for Multidimensional Medical Data
Pages: 512-516
Anbarasi.M.S Ghaayathri.S, Kamaleswari.R, Abirami.I
Abstract | PDF |
10. |
Information Technology (IT) Security
Management in Kenyan Small and Medium
Enterprises (SMEs)
Pages: 517-525
Michael Kimwele, Waweru Mwangi, Stephen Kimani
Abstract | PDF |
11. |
Role of soft computing as a tool in data mining
Pages: 526-537
Kanhaiya Lal, N.C.Mahanti
Abstract | PDF |
12. |
Effect of Energy and Bandwidth Constraints
in Ad Hoc Networks: A Review
Pages: 538-544
Tanu Preet Singh, Manmeet Kaur, Vishal Sharma
Abstract | PDF |
13. |
An Architechture Model for Managing Transactions in Disconnected Mobile Environment
Pages: 545-550
J.LWalter Jeyakumar, R.S.Rajesh
Abstract | PDF |
14. |
Oriya Language Text Mining Using C5.0 Algorithm
Pages: 551-554
Sohag Sundar Nanda, Soumya Mishra, Sanghamitra Mohanty
Abstract | PDF |
15. |
Software Reliability Growth Models Incorporating Burr
Type III Test-Effort and Cost-reliability Analysis
Pages: 555-562
N. Ahmad, S. M. K. Quadri, M.G.M. Khan, and M. Kumar
Abstract | PDF |
16. |
Clustering Algorithm for 2D Multi-Density Large
Dataset Using Adaptive Grids
Pages: 563-568
Mr. Chetan J. Awati, Prof. D.G. Chougule
Abstract | PDF |
17. |
Run Time Polymorphism Against Virtual Function in
Object Oriented Programming
Pages: 569-571
Devendra Gahlot, S. S. Sarangdevot, Sanjay Tejasvee
Abstract | PDF |
18. |
Survey on Ad Hoc Wireless Networks
And Routing Security issues
Pages: 572-586
Prasuna V G, Dr. S. Madhusudhana Verma
Abstract | PDF |
19. |
Ultra Wideband Channel Model for IEEE
802.15.4a and Performance Comparison of
DBPSK/OQPSK Systems
Pages: 587-596
B.V. Santhosh Krishna, K.Sakthidasan
Abstract | PDF |
20. |
Performance Analysis of V-Blast MIMO System in Rician Channel Environment
Pages: 597-601
Samarendra Nath Sur , Debjyoti Ghosh , Debasish Bhaskar , Rabindranath Bera
Abstract | PDF |