• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 2 ISSUE 3 May-June 2011

    ISSN 0975 - 9646

    1.
    Dynamic Monitoring of Moving Objects: A Novel Model to Improve Efficiency, Privacy and Accuracy of the Framework
    Pages : 946-950
    Bathula Sowjanya, Kolikipogu Ramakrishna, K.Sailaja
    Abstract | PDFPDF
    2.
    The STUDY on KNOWLEDGE DISCOVERY from WEB DATA
    Pages : 951-954
    Yogish H K ,Dr. G T Raju,Deepa Yogish
    Abstract | PDFPDF
    3.
    An Effective Determination of Initial Centroids in K-Means Clustering Using Kernel PCA
    Pages : 955-959
    M.Sakthi and Dr. Antony Selvadoss Thanamani
    Abstract | PDFPDF
    4. Wave Atoms Decomposition based Eye Iris Image Compression
    Pages : 960-964
    Satya P Kumar Somayajula,Sai Charan Dhatrika,Deepika Puvvula
    Abstract | PDFPDF
    5. Fusion of Web Structure Mining and Web Usage Mining
    Pages : 965-967
    Suresh Babu, P. Sathish, J. Ashok
    Abstract | PDFPDF
    6. Feasibility study on component based software architecture for large scale software systems
    Pages : 968-972
    P. G. Chaitanya , K.V.Ramesh
    Abstract | PDFPDF
    7.
    Analyzing XML Parsers Performance for Android Platform
    Pages : 973-976
    M V Uttam Tej ,Dhanaraj Cheelu, M.Rajasekhara Babu, P Venkata Krishna
    Abstract | PDFPDF
    8.
    Automated Functional Testing Using IBM Rational Robot
    Pages : 977-981
    A.Chakrapani, K.V.Ramesh
    Abstract | PDFPDF
    9.
    Detection of Attacks in an Intrusion Detection System
    Pages : 982-986
    Sapna S. Kaushik,P.R.Deshmukh
    Abstract | PDFPDF
    10. Combined Security Model Tool for Adhoc Networks
    Pages : 987-991
    Kishore Kumar Maturi , Ratnaraju Mukiri , Srinivasa Rao P , Basheera Shaik
    Abstract | PDFPDF
    11. Web Intelligence: Analysis of Unstructured Database of Documents Using KnowItAll
    Pages : 992-994
    Shweta Gupta, Kovid Agarwal, Shamla Mantri
    Abstract | PDFPDF
    12. Application of Web Mining with XML Data using XQuery
    Pages : 995-1000
    Roop Ranjan,Ritu Yadav ,Jaya Verma
    Abstract | PDFPDF
    13.
    A Design of Centralized Meeting Scheduler with Distance Metrics
    Pages : 1001-1006
    M. Sugumaran
    Abstract | PDFPDF
    14.
    A Cross Layered Architecture and Its Proposed Security Mechanism to Lessen Attacks Vulnerability in Mobile Ad Hoc Networks
    Pages : 1007-1011
    K.P.Manikandan,R.Satyaprasad, K.Rajasekhararao
    Abstract | PDFPDF
    15.
    Framework of M-Commerce using ID-Based Cryptography
    Pages : 1012-1017
    Sridhar.K ,M.Sandeep ,D.Sagar
    Abstract | PDFPDF
    16. Image Retrieval with the use of Color and Texture Feature
    Pages : 1018-1021
    Gauri Deshpande, Megha Borse
    Abstract | PDFPDF
    17. Load Balancing In Structured Peer to Peer Systems
    Pages : 1022-1025
    Sumit A. Hirve, Suhas H. Patil,
    Abstract | PDFPDF
    18. Data Mining : A prediction of performer or underperformer using classification
    Pages : 1026-1030
    Umesh Kumar P andey S. Pal
    Abstract | PDFPDF
    19. Applying Hidden Markov Model to Protein Sequence Alignment
    Pages: 1031-1035
    Er. Neeshu Sharma, Dinesh Kumar, Reet Kamal Kaur
    Abstract | PDFPDF
    20. Handwritten Gurumukhi Character Recognition Using Zoning Density and Background
    Directional Distribution Features

    Pages: 1036-1041
    Kartar Singh Siddharth, Renu Dhir, Rajneesh Rani
    Abstract | PDFPDF
    21.
    A Survey on Model Based Test Case Prioritization
    Pages : 1042-1047
    Sanjukta Mohanty, Arup Abhinna Acharya, Durga Prasad Mohapatra
    Abstract | PDFPDF
    22.
    Filter versus Wrapper Feature Subset Selection in Large Dimensionality Micro array: A Review
    Pages : 1048-1053
    Binita Kumari, Tripti Swarnkar
    Abstract | PDFPDF
    23.
    A Novel Approach for Test CAse Prioritization using Priority Level Technique
    Pages : 1054-1060
    Arup Abhinna Acharya, Goutam Budha, Namita Panda
    Abstract | PDFPDF
    24. Implementation of User’s Browse Log Monitoring Tool for Effective Web Usage Mining
    Pages : 1061-1064
    Asha Khilrani,Shishir K. Shandilya
    Abstract | PDFPDF
    25. Mining Frequent Patterns Using Queues In Large Databases
    Pages : 1065-1067
    Divya Bhatnagar, Neeru Adlakha, K. R. Pardasani
    Abstract | PDFPDF
    26. A Simulation Study between the Random Based Synthetic Entity Mobility Models in Ad Hoc Networks
    Pages : 1068-1074
    D.Srinivasa Rao , T. Susan Salomi, G. Sriram
    Abstract | PDFPDF
    27. Dual Band E-Shape Micro strip Patch Antenna on RT DUROID 5880 Substrate for Pervasive Wireless Communication
    Pages : 1075-1081
    Neenansha Jain, Prof Rajesh Nema, Anubhuti Khare, Puran Gour
    Abstract | PDFPDF
    28. Fast Face Detection Using Graphics Processor
    Pages : 1082-1086
    Kailash Devrari, K.Vinay Kumar
    Abstract | PDFPDF
    29. Evolution of 4G-Research Directions Towards Fourth Generation Wireless Communication
    Pages: 1087-1095
    B.Vasavi,Mounika Marepalli, Leepika Gudur
    Abstract | PDFPDF
    30. Solving Traveling Salesman Problem Using Hierarchical Clustering and Genetic Algorithm
    Pages: 1096-1098
    S N S Kalyan Bharadwaj.B, Krishna Kishore.G, Srinivasa Rao.V
    Abstract | PDFPDF
    31.
    An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks
    Pages : 1009-1104
    Tejomayee Nath & Suneeta Mohanty
    Abstract | PDFPDF
    32. Comparative study of FIR and IIR filters for the removal of Baseline noises from ECG signal
    Pages : 1105-1108
    Seema rani, Amanpreet Kaur, J S Ubhi
    Abstract | PDFPDF
    33. Lossless Visible Watermarking for Video
    Pages : 1109-1113
    Saraswathi M
    Abstract | PDFPDF
    34. Tank Water Level Monitoring System using GSM Network
    Pages : 1114-1120
    Ayob Johari, Mohd Helmy Abd Wahab, Nur Suryani Abdul Latif, M. Erdi Ayob, M. Izwan Ayob, M. Afif Ayob,
    Mohd Norzali Haji Mohd
    Abstract | PDFPDF
    35. Rule based programming with Drools
    Pages : 1121-1126
    Narendra Kumar, Dipti D Patil, Vijay M. Wadhai
    Abstract | PDFPDF
    36.
    Mobile User’s Location Management using Bloom Filter
    Pages : 1127-1130
    Pragyan Acharya, Sudhansu Sekhar Singh
    Abstract | PDFPDF
    37. Flooding Based DDoS Attacks and Their Influence on Web Services
    Pages :1131-1136
    Sunil Kumar,Mandeep Singh,Monika Sachdeva, and Krishan Kumar
    Abstract | PDFPDF
    38. Web Components as a measure for estimating Effort and Size of Web Applications
    Pages : 1137-1143
    Sworoop Suhanjan Das, Kumar Devadutta, Santosh Kumar Swain, Sanjay Kumar
    Abstract | PDFPDF
    39. A Model for Web Page Usage Mining Based on Segmentation
    Pages : 1144-1148
    K.S.Kuppusamy, G.Aghila
    Abstract | PDFPDF
    40. Clonal Selection Method for Virus Detection in a Cloud
    Pages : 1149-1153
    Agnika Sahu, Tanmaya Swain, Tapaswini Samant
    Abstract | PDFPDF
    41. Media Access Control Protocol for Mobile Sensor Network- Modelling Using OMNeT++ -MiXiM Network Simulator.
    Pages : 1154-1159
    Aditi .P. Khadilkar , Nitin G. Palan
    Abstract | PDFPDF
    42. Geographical Routing Algorithms In Asynchronous Wireless Sensor Network
    Pages : 1160-1163
    A. Vaishali S.K, B.N.G. Palan
    Abstract | PDFPDF
    43. A Survey on Test Case Generation from UML Model
    Pages :1164-1171
    Monalisha Khandai, Arup Abhinna Acharya, Durga Prasad Mohapatra
    Abstract | PDFPDF
    44. Test Case Generation for Concurrent System using UML Combinational Diagram
    Pages : 1172-1181
    Monalisha Khandai, Arup Abhinna Acharya, Durga Prasad Mohapatra
    Abstract | PDFPDF
    45. Energy Conservation Techniques in Ad hoc Networks
    Pages : 1182-1186
    Mohammed Ali Hussain, M.Ravi Sankar, Vijaya Kumar Voleti,Y.Srinivasa Rao , Nalla Lovanjaneyulu
    Abstract | PDFPDF
    46. Generation of Test Cases Using UML Sequence Diagram in a System with Communication Deadlock
    Pages : 1187-1190
    DebashreePatnaik,Arup Abhinna Acharya, Durga Prasad Mohapatra
    Abstract | PDFPDF
    47. Pair vs Solo Programming: Students’ Perceptions
    Pages : 1191-1196
    Madhumita Singha Neogi , Vandana Bhattacherjee
    Abstract | PDFPDF
    48. Anomaly Detection On User Browsing Behaviors Using Hidden Semi-Markov Model
    Pages : 1197-1201
    Gamidi Pavan babu, Jayavani.V, C.P.V.N.J. Mohan Rao
    Abstract | PDFPDF
    49. Modeling and Re-Employment of Differential Unit Test Cases from System Test Cases
    Pages : 1202-1221
    C.P.V. N. J. Mohan Rao , Nandagiri R G K prasad, Satya P Kumar Somayajula
    Abstract | PDFPDF
    50. Optimization of Query Processing Time Base on Materialized Sample View
    Pages : 1222-1228
    Mahip Bartere and Prashant Deshmukh
    Abstract | PDFPDF
    51. Node Density based Performance Analysis of Two Reactive Routing Protocols in Mobile Ad-hoc
    Networks
    Pages : 1229-1234
    Gurleen Kaur Walia and Charanjit Singh
    Abstract | PDFPDF
    52. Simulation based Performance Evaluation and Comparison of Proactive and Reactive Routing
    Protocols in Mobile Ad-hoc Networks
    Pages : 1235-1239
    Gurleen Kaur Walia and Charanjit Singh
    Abstract | PDFPDF
    53. Automated Authentication using Information Fusion and Score Normalization in Multimodal Biometric Systems
    Pages : 1240-1243
    Sasidhar Kothuru,Kailasarao. K
    Abstract | PDFPDF
    54. Segmentation of Handwritten Devanagari Script
    Pages : 1244-1247
    Saiprakash Palakollu, Renu Dhir, Rajneesh Rani
    Abstract | PDFPDF
    55. Human Identification using Face and Voice Recognition
    Pages : 1248-1252
    Ishwar S. Jadhav, V. T. Gaikwad, Gajanan U. Patil
    Abstract | PDFPDF
    56. A Survey on Intrusion Network Detection System Using Data Mining Techniques
    Pages :1253-1256
    A. S. Kapse, V. P. Kshirsagar, Avinash Kapse, M. B. Nagori
    Abstract | PDFPDF
    57. Perturbation of String Values
    Pages : 1257-1259
    Krishna Priya .J Geetha Mary. A
    Abstract | PDFPDF
    58. Implementation of Web Cache using Web Browser
    Pages : 1260-1262
    Harshal N. Datir, Dr. P.R. Deshmukh
    Abstract | PDFPDF
    59. Estimation of MIMO-OFDM Based Channel for High Data Rate Wireless Communication
    Pages : 1263-1266
    Deeparani Mishra, Sikha Mishra, Mihir N. Mohanty
    Abstract | PDFPDF
    60. Contour-Based Character Extraction from Text Regions of an Image
    Pages : 1267-1271
    V.N.Santosh Kumar.Kuppili, Dhanaraj Cheelu, M.Rajasekhara Babu,P.Venkata Krishna
    Abstract | PDFPDF
    61. A Review on Personalized Information Recommendation System Using Collaborative Filtering
    Pages : 1272-1278
    Kumar Abhishek, Saurabh Kulkarni, Vipin Kumar.N Archana, P. Kumar
    Abstract | PDFPDF
    62. Architecting and Designing of Semantic Web Based Application using the JENA and PROTÉGÉ
    – A Comprehensive Study
    Pages :1279-1282
    Archana P. Kumar, Kumar Abhishek, and Vipin Kumar.N
    Abstract | PDFPDF
    63. An Implementation of the User-based Collaborative Filtering Algorithm
    Pages : 1283-1286
    Maddali Surendra Prasad Babu, Boddu Raja Sarath Kumar
    Abstract | PDFPDF
    64. Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA
    Pages : 1287-1291
    Snehlata Barde , Sujata Khobragade ,Rasmiprava Singh
    Abstract | PDFPDF
    65. Data mining: Identify the hidden anomalous through modified data characteristics checking algorithm and disease modeling By Genomics
    Pages : 1292-1296
    PavanKumar kolla, kolla.haripriyanka
    Abstract | PDFPDF
    66. Architecture for the Detection of phishing in Mobile Internet
    Pages : 1297-1299
    M.Archana, P.M.Durai Raj Vincent , Naveen Kumar Boggavarapu
    Abstract | PDFPDF
    67. A New Algorithm for Scheduling Parallel Tasks in Utility Grids using Reserve Resources for Tasks with Deadline
    Pages : 1300-1304
    Leyli Mohammad khanli, Motahareh Ahmadi
    Abstract | PDFPDF
    68. Sign Gesture Recognition using Combined Features of Sum graph and HMM with Decision
    tree classifier
    Pages : 1305-1308
    Punamchand Patidar, Neetesh Gupta
    Abstract | PDFPDF
    69. Performance Improvement of IEEE 802.16 / Wimax Using Elliptic Curve Cryptography
    Pages : 1309-1311
    Pranita K. Gandhewar, Kapil N. Hande
    Abstract | PDFPDF
    70. Five Layer Security Architecture & Policies for Grid Computing System
    Pages : 1312-1314
    M. K. Singh & S. Pal
    Abstract | PDFPDF
    71. A Survey on Performance Analysis of TCP Variants in IEEE 802.11 Based Ad-Hoc Networks
    Pages : 1315-1317
    Komal Tahiliani, Anju singh, R.C.jain
    Abstract | PDFPDF
    72. Geographical Routing Algorithms In Asynchronous Wireless Sensor Network
    Pages : 1318-1323
    Vaishali.S.K , N.G.Palan
    Abstract | PDFPDF
    73. The Relationship Between Reinforcement Learning and Hash Tables
    Pages : 1324-1326
    Mohammad Mehdi Hassani
    Abstract | PDFPDF
    74. Assessing Deviations of Empirical Measures for Temporal Network Anomaly Detection: An
    Exercise
    Pages : 1327-1332
    Amjan Shaik, S.V. Achuta RAo, Hymavathi. Bhadriraju, Md.Reyaz, Nazeer Shaik
    Abstract | PDFPDF
    75.. Deconstructing Digital-to-Analog Converters
    Pages : 1333-1335
    Mohammad Mehdi Hassani
    Abstract | PDFPDF
    76. An Image Retrieval System Using Spatial Database: An Image Processing Context With
    Software Metrics
    Pages : 1336-1341
    Amjan Shaik, Shaik Meeravali, G. Krishna Reddy, S.V. Achuta RAo, Mohd Mukarram Uddin
    Abstract | PDFPDF
    77. A Case for Neural Networks
    Pages : 1342-1344
    Mohammad Mehdi Hassani
    Abstract | PDFPDF
    78. A Suggestive Evaluation of System Test Cases in OO Systems Through Carving and Replaying
    Differential Unit Test Cases: A Metric Context
    Pages : 1345-1353
    Amjan Shaik, Hymavathi Bhadriraju, K.Vikram, Nazeer Shaik, S.V. Achuta Rao
    Abstract | PDFPDF
    79. Deconstructing 16 Bit Architectures
    Pages : 1354-1357
    Mohammad Mehdi Hassani
    Abstract | PDFPDF
    80. Scale the Active Influence Based Investigation Using Materialized Sub Graphs
    Pages : 1358-1363
    Amjan Shaik, Nazeer Shaik, Amtul Mubeena, S.V. Achuta Rao, K. Vikram
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-