• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 2 ISSUE 5 September-October 2011

    ISSN 0975 - 9646

    1.
    Effective Congestion Control for Wireless Ad-Hoc Networks
    Pages : 1832-1835
    P.Sruthi, Manohar Goshel
    Abstract | PDFPDF
    2.
    Data Security through Confidentiality in Cloud Computing Environment
    Pages : 1836-1840
    Subedari Mithila, P. Pradeep Kumar
    Abstract | PDFPDF
    3.
    Information -Aware Scheduling Strategies for Desktop Grid Environment
    Pages : 1841-1846
    Er. Jayoti Arora, Ms. Geeta Arora , Dr. Paramjit , Dr. Shaveta
    Abstract | PDFPDF
    4. Issues in Dimensionality Reduction of Multispectral and Hyperspectral data
    Pages : 1847-1851
    Bijith Marakarkandy,Dr. B.K. Mishra
    Abstract | PDFPDF
    5. Scalability & Security Architecture for Internet2 Applications
    Pages : 1852-1855
    T.Mahesh, Prof. P.Pradeep, R.SatyaTeja
    Abstract | PDFPDF
    6. A Sequential Approach for Surmising Missing Items in the Shopping Cart
    Pages : 1856-1861
    Arshiya Subhani, Prof. P.Pradeep kumar
    Abstract | PDFPDF
    7.
    An approach to deal with time- evolving Categorical data based on NIR using Clustering
    Pages : 1862-1866
    A. Shiva Prasad, Prof P.Pradeep Kumar , D.Prashanth Kumar
    Abstract | PDFPDF
    8.
    Web-based Analysis for Optical Network Data Path Selection
    Pages : 1867-1870
    M.Murali Krishna, G Devi priya and K Balamurali Krishna
    Abstract | PDFPDF
    9.
    Item Set Extraction of Mining Association Rule
    Pages : 1871-1875
    Shabana Yasmeen, Prof. P.Pradeep Kumar, A.Ranjith Kumar
    Abstract | PDFPDF
    10. Kannada and Telugu Native Languages to English Cross Language Information Retrieval
    Pages : 1876-1880
    Mallamma V Reddy, Dr. M. Hanumanthappa
    Abstract | PDFPDF
    11. Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
    Pages : 1881-1886
    P.Pranitha, G.Swamy , Manjula Aakunuri
    Abstract | PDFPDF
    12. Intrusion Detection in Wireless Networks Using Selected Features
    Pages : 1887-1893
    M.Nadeem Baig, K. Kanthi Kumar, P.Pradeep kumar and Dr. A. Yesu Babu
    Abstract | PDFPDF
    13.
    Enhanced Features For Text Categorization
    Pages : 1894-1897
    N. Swarna Jyothi, M. Sailaja
    Abstract | PDFPDF
    14.
    Efficient Item Set Mining Supported by IMine Index
    Pages : 1898-1903
    Manohar.M , Bharathi.G
    Abstract | PDFPDF
    15.
    Malicious Packet Losses Detection by using Compromised Router Detection Protocol
    Pages : 1904-1909
    Chandra Sekhar.G, Srikanth.D
    Abstract | PDFPDF
    16. Data Accessibility for Resource Selection in Large-Scale Distributed Systems
    Pages : 1910-1922
    B.Anusha, Pallamreddy VenkataSubbaReddy, T.V.Sai Krishna
    Abstract | PDFPDF
    17. A Distributed Dynamic Routing with Security Considerations
    Pages : 1923- 1926
    B.Mallesham, T.Mahesh, Prof. P.Pradeep, D.Ramesh
    Abstract | PDFPDF
    18. Detection & Analysis of Skin Cancer using Wavelet Techniques
    Pages : 1927-1932
    D.N.V.S.L.S. Indira , JYOTSNA SUPRIYA P
    Abstract | PDFPDF
    19. An Approach to Improve the Security of Online System using Crypto System
    Pages: 1933-1939
    Saurav Mallik, Sutapa Majee,Arun Kanti Manna,Md. Headayetullah
    Abstract | PDFPDF
    20. Paper Removed
    Pages: xxxx-xxxx
    xxxx
    Abstract | PDFPDF
    21.
    Frequency and Compactness for Text Categorization
    Pages : 1947-1950
    Sumayya Hasan Osmani, T.Naresh Kumar
    Abstract | PDFPDF
    22.
    Evolving User Profiles in Dynamic Web Sites
    Pages : 1951-1953
    G BHANU, A .V. RAMANA
    Abstract | PDFPDF
    23.
    Analysis and Performance of ARCP for Multi Region Mobile Emissary Environments
    Pages : 1954-1957
    Venkata Durga.Kiran Kasula, Venkata Sumanth Mareedu, S.S.Reddy. L
    Abstract | PDFPDF
    24.
    VLSI Design Approach for Emergency Locator Transmitter (ELT) signal of 406MHz with Enhanced Ground Proximity Warning System Receiver
    Pages : 1958-1961
    K. Babulu,R.S.Vinay
    Abstract | PDFPDF
    25. A Comparative Study of Routing Protocols
    Pages : 1962-1964
    Rajender Kumar, Jitender Vats, Arvind Kumar
    Abstract | PDFPDF
    26. A Research Study on Accountability of Dynamic IP Generation in a Campus Network (Wi-Fi)
    Pages : 1965-1970
    Pawan Prakash Singh, Savita Shiwani, Ruchi Dave, Naveen Hemrajani
    Abstract | PDFPDF
    27. A Review of Storage and Fault Tolerace Approaches Used in Cloud Computing
    Pages : 1971-1978
    Amit Batra, Rajender Kumar, Arvind Kumar
    Abstract | PDFPDF
    28. Improving Web Accessibility of graphs for visually Impaired
    Pages : 1979-1981
    Dr.Arvinder Kaur, Diksha Dani and Neeta Mishra
    Abstract | PDFPDF
    29. An Expert System of Determining Diabetes Treatment Based on Cloud Computing Platforms
    Pages : 1982-1987
    Dr. Abdullah Al-Malaise Al-Ghamdi, Majda A.Wazzan, Fatimah M. Mujallid, Najwa K.Bakhsh
    Abstract | PDFPDF
    30. VHDL Modelling of WI- FI Mac Layer for Transmitter
    Pages : 1988-1989
    Bhanu Sireesha ,M.S.R.Sekhar
    Abstract | PDFPDF
    31. Competent Search in Blog Ranking Algorithm Using Cluster Mining
    Pages : 1990-1994
    Robin Singh Bhadoria
    Abstract | PDFPDF
    32. An Efficient Parallel Sorting Algorithm for Multicore Machines
    Pages : 1995-1998
    D.Abhyankar, M.Ingle
    Abstract | PDFPDF
    33. Performance Analysis and Comparison of MANET Routing Protocols
    Pages : 1999-2003
    Kuljit Kaur,Swati Jindal,Lavneet Bansal
    Abstract | PDFPDF
    34. Generic Complex Programmable Logic Device (CPLD) Board
    Pages : 2004-2007
    Nagaraj Hediyal
    Abstract | PDFPDF
    35. An Effective Indexing Method for High Dimensional Databases
    Pages : 2008-2018
    Manjunath K.G. , Kallinatha H.D.
    Abstract | PDFPDF
    36. Advanced Indexing Techniques for Achieving Concurrency in Multidimensional Data Sets
    Pages : 2019-2024
    N Krishna Kumari, Dr. M.H.M. Krishna Prasad
    Abstract | PDFPDF
    37. A New Optimal Checkpoint Restart Model
    Pages : 2025-2032
    Mallikarjuna Shastry P.M., K. Venkatesh
    Abstract | PDFPDF
    38. IVR Recognisation Using Speech Signals
    Pages : 2033-2035
    Arjun Kumar.P, Chinna Rao.M, Sridhar. G, Ravi Kumar. B
    Abstract | PDFPDF
    39. Robust Watermarking of Color Images under Noise and Cropping Attacks in Spatial Domain
    Pages : 2036-2041
    Alankrita Aggarwal, Monika Singla
    Abstract | PDFPDF
    40. Data Mining: a Healthy Tool for Your Information Retrieval and Text Mining
    Pages : 2042-2045
    Santosh Kumar Rath, Manobendu Kesari Jena, Tapaswini Nayak, Biswajit Bisoyee
    Abstract | PDFPDF
    41. Power Saving Strategies In Wireless Sensor Networks Using Cross Layer Design
    Pages : 2046-2051
    Pranali D. Tembhurne (Nandeshwar), R.K. Krishna, Nilkamal G. Ramteke
    Abstract | PDFPDF
    42. Development of a Robot-Car in LEGO Mindstorms NXT tool kit for Obstacle Avoidance using JAVA
    Pages : 2052-2054
    Saswat Kumar Jena, Prof. (Dr.) Srikant Patnaik
    Abstract | PDFPDF
    43. Rephrasing Essentials of Object Oriented Programming based on Testing Pre-requisites
    Pages : 2055-2059
    Amarnath Singh, Biswajit Bishoyee, Santosh Kumar Rath, Dharmananda Parida
    Abstract | PDFPDF
    44. Text -Steganography: Review Study & Comparative Analysis
    Pages : 2060-2062
    Swati Gupta and Deepti Gupta
    Abstract | PDFPDF
    45. Object Classification in Still Images
    Pages : 2063-2067
    T.Harini, J.Uday Kiran, Prof. P.Pradeep, K. Jhansi Rani
    Abstract | PDFPDF
    46. An Accurate Termination Condition of the Probabilistic Packet Marking Algorithm
    Pages : 2068-2072
    J.Shiva Kumar, P.Pradeep Kumar
    Abstract | PDFPDF
    47. Performance Analysis of Hybrid approach of Clustering Algorithms
    Pages : 2073-2077
    Alankrita Aggarwal, Neetu Wadhwa
    Abstract | PDFPDF
    48. Efficient way of Data Managing for Range Queries in Unstructured Peer to Peer Networks.
    Pages : 2078-2083
    P. Lalitha Kumari, P. Rama Rao and Chinnam Yuva Raju
    Abstract | PDFPDF
    49. Handling Various Best Security Methods for Bluetooth Technology in Cars to Maintain Secrecy
    Pages : 2084-2090
    Y.V.K.D.Bhavani
    Abstract | PDFPDF
    50. Hybrid Broadcast Routing with Dynamic Security Considerations
    Pages : 2091-2094
    S.Ramasubba Reddy, O. Srinivasa Rao, Dr MHM Krishna Prasad
    Abstract | PDFPDF
    51. Phishing WebPages Strategy Based On Optical Semblance Assessment
    Pages : 2095-2098
    Vijaykumar kangala, A. Ranjith Kumar ,Shilpa shesham,Rampelly shilpa
    Abstract | PDFPDF
    52. Construction of Developing User Profiles for Mining Structure
    Pages : 2099-2101
    Davuluri Suneetha, Kumar Vasantha
    Abstract | PDFPDF
    53. FPGA Realization of Radix-4 Booth Multiplication Algorithm for High Speed Arithmetic Logics
    Pages : 2102-2107
    K. Babulu,G.Parasuram
    Abstract | PDFPDF
    54. A Novel Approach of Entropy based Adaptive Thresholding Technique for Video Edge Detection
    Pages : 2108-2110
    Debabrata Samanta, Mousumi Paul
    Abstract | PDFPDF
    55. Weighted Association Rule Mining Without Pre-assigned Weights
    Pages : 2111-2115
    PURNA PRASAD MUTYALA, KUMAR VASANTHA
    Abstract | PDFPDF
    56. Distributional Features for Text Categorization Based on Weight
    Pages : 2116-2120
    CH.GOWTHAMI, P.RAJA SEKHAR
    Abstract | PDFPDF
    57. Intrusion Detection
    Pages :2121-2123
    B. Kiran Kumar, A. Kamala Priya, R. Vishnumurthy and Thillai Nayagi
    Abstract | PDFPDF
    58. Sensitive Itemset Hiding in Multi-level Association Rule Mining
    Pages : 2124-2126
    P.RajyaLakshmi, C.Mohan Rao,Madhavi Dabbiru and Kopparthy Vinay Kumar
    Abstract | PDFPDF
    59. A NOVEL APPROACH FOR PASS WORD AUTHENTICATION USING BRAIN -STATE -IN -A BOX (BSB) MODEL
    Pages : 2127-2131
    A S N Chakravarthy, Penmetsa V Krishna Raja , Prof. P S Avadhani
    Abstract | PDFPDF
    60. VLSI Design Approach to Online Analog/Digital DAQ System
    Pages : 2132-2136
    K Babulu and P Parasuram
    Abstract | PDFPDF
    61. Implementation of Viterbi Decoder for Convolutional Code in HDL
    Pages : 2137-2140
    Nilesh G. Nirmal, Gajanan U.Patil, Prafulla.P.Chaudhari, Mandar.M.Kulkarni
    Abstract | PDFPDF
    62. A Performance Analysis of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET
    Pages : 2141-2146
    S.Tamilarasan
    Abstract | PDFPDF
    63. Implementation of blind source separation of speech signals using independent component analysis
    Pages : 2147-2151
    Vivek Anand. Dr. R. S. Anand.Dr. M. L. Dewal
    Abstract | PDFPDF
    64. The Next Generation of Cloud Computing on Information Technology
    Pages : 2152-2155
    G.C.Priya, R.Parameswari, G.Gayathri
    Abstract | PDFPDF
    65. Dynamic Routing Key Distribution in Security Considerations
    Pages : 2156-2158
    D. Raghu, MD. Baliguddin, Ch. Raja Jacub
    Abstract | PDFPDF
    66. Design and Implementation of Efficient Load Balancing Algorithm in Grid Environment
    Pages : 2159-2164
    Sandip S.Patil, Preeti Singh
    Abstract | PDFPDF
    67. Different Network Micro-Mobility Protocols and their Performance Analysis
    Pages :2165-2175
    K Karmakar, J S Banerjee
    Abstract | PDFPDF
    68. Future Challenges and Opportunities of Systems and Software Engineering Processes
    Pages : 2176-2179
    Rohit Sharma ,Samridhi Sharma ,Sachleen Singh
    Abstract | PDFPDF
    69. Comparative Study of Knowledge in Crop Diseases Using Machine Learning Techniques
    Pages : 2180-2182
    P. Revathi , R. Revathi and Dr.M.Hemalatha
    Abstract | PDFPDF
    70. An Improved Page Rank Algorithm based on Optimized Normalization Technique
    Pages : 2183-2188
    Hema Dubey ,Prof. B. N. Roy
    Abstract | PDFPDF
    71. Object Oriented Software Testing
    Pages : 2189-2192
    P.D.Ratna Raju, Suresh.Cheekaty, HarishBabu.Kalidasu
    Abstract | PDFPDF
    72. Inverse ObjectRank: Dynamic Authority Based Search in Databases
    Pages : 2193-2194
    C.Vijaya Ram ,Ch.Srinivasalu, T.Jacob Sanjay Kumar
    Abstract | PDFPDF
    73. A Neural Network Approach for Fragmentation in Distributed Databases
    Pages : 2195-2197
    M.Ram Bhupal , A. Raga Deepthi
    Abstract | PDFPDF
    74. The Wonderful Toy of 20th Century can be a Disaster in 21st Century: Scenario and Policies Regarding Mobile Waste in India
    Pages :2198-2203
    Neeta Sharma1 and Manoj Kumar
    Abstract | PDFPDF
    75. Approaches on Detecting Domain Errors – A Survey
    Pages : 2204-2212
    Dr. Anna Saro Vijendran, N.R.Suganya
    Abstract | PDFPDF
    76. Implementation of High Security in MANET Using Combined IDS and Finger Print Authentication with Data Fusion
    Pages :2213-2215
    J. Deny and N. Sivasankari
    Abstract | PDFPDF
    77. A Novel Approach of THUI (Temporal High Utility Item sets) Algorithm on On-Shelf Web
    Log Data
    Pages : 2216-2219
    D.N.V.S.L.S. Indira , JYOTSNA SUPRIYA P2, S.Narayana
    Abstract | PDFPDF
    78. A Closer look at RSA and ECC
    Pages : 2220-2224
    Aditya Kumar Kommera, Keerthana Kommera, Praneeth Kumar Gunda
    Abstract | PDFPDF
    79. A Framework on Database Content Security using Negative Databases
    Pages : 2225-2228
    Vemula Vamshi Krishna ,Rama Krishna V
    Abstract | PDFPDF
    80. An Efficient Image Based Approach for Extraction of Deep Web Data (AEiEDWD)
    Pages :229-2232
    MSN. Murthy, S.Sreenivasa Rao
    Abstract | PDFPDF
    81. An Enhanced Digital Watermarking for Color Image using Support Vector Machine
    Pages : 2233-2236
    Yogendra Kumar Jain ,Saurabh Tiwari
    Abstract | PDFPDF
    82. Secure Dynamic Routing Using DDRA
    Pages : 2237-2241
    Nagamalleswara Rao.A, Adilakshmi.Y
    Abstract | PDFPDF
    83. Defect Prediction and Analysis Using ODC Approach in a Web Application
    Pages : 2242-2245
    Pranayanath Reddy Anantula, Raghuram Chamarthi (Tejoraghuram)
    Abstract | PDFPDF
    84. Employing Grid Computing Strategies in Cloud Computing
    Pages : 2246-2253
    Amit Batra, Rajender Kumar, Arvind Kumar
    Abstract | PDFPDF
    85. Feature Level Medical Image Fusion Using MUlti Wavelet Transforms
    Pages : 2254-2257
    P.Daniel Ratna Raju, Guntupalli Neelima, K.Prasada Rao
    Abstract | PDFPDF
    86. Semantic Web Mining - A Critical Review
    Pages : 2258-2261
    S.S. Dhenakaran, S.Yasodha
    Abstract | PDFPDF
    87. Mobile Communications for E-Applications
    Pages : 2262-2266
    K.V.Ashok, K.Raja Sekhar, V.Dhana Raj
    Abstract | PDFPDF
    88. Hotel Management System -an E-Commerce Application using REsource Description Framework (RDF)
    Pages : 2267-2272
    A. Gauthami Latha, R. Naga Raju, Ch. Satyanarayana, Y. Srinivas
    Abstract | PDFPDF
    89. Power Quality Improvement of Three-phase four-wire DSTATCOM with Fuzzy logic Controller
    Pages : 2273-2276
    M.Bhanu Siva, M.R.P Reddy, Ch.Rambabu
    Abstract | PDFPDF
    90. A Survey on Detecting Domain Errors in Programs
    Pages : 2277-2279
    N.R.Suganya, R.Venkateswaran, K.Kathirvel, M.Mohankumar, G.Manivasagam
    Abstract | PDFPDF
    91. Sub Pattern Technique for Face Recognition
    Pages : 2280-2283
    M.Pradeep, CH.Sri Devi, V.Dhana Raj
    Abstract | PDFPDF
    92. Performance Analysis of Counting Sort Algorithm using various Parallel Programming Models
    Pages : 2294-2287
    M Rajasekhara Babu, M Khalid, Sachin Soni, Sunil Chowdari Babu, Mahesh
    Abstract | PDFPDF
    93. Design of Triangular Microstrip Patch Antenna at Super High Frequency
    Pages : 2288-2289
    Sunil kr singh ,Shirish kumar Jain
    Abstract | PDFPDF
    94. Cloud Computing – A New Paradigm for Modern Computing
    Pages : 2290-2292
    S.U.Sharma, Y.B.Gandole
    Abstract | PDFPDF
    95. Real Time Facial Expression Detection Techniques using Pixels Values
    Pages : 2293-2296
    Jabir Ali ,Ankur Shree Aggrawal ,Anuradha Tyagi ,Amit Kr. Balyan
    Abstract | PDFPDF
    96. New Shuffle Algorithm for Lossless Compression Method of JPEG File
    Pages : 2297-2299
    Surgali Chanti, Ch Ramesh
    Abstract | PDFPDF
    97. Avoidance of Collision and Overhearing in Wireless Sensor Networks
    Pages : 2300-2303
    P. Srivalli, N. Nagakumari, G. Anupama, V. Srujana
    Abstract | PDFPDF
    98. Modifying Simple Spatial Operator for High Dynamic Range Images to Improve Image Quality
    and Automating the User Parameter
    Pages : 2304-2308
    Sumandeep Kaur, Sumeet Kaurj
    Abstract | PDFPDF
    99. Rainfall forecasting using Nonlinear SVM based on PSO
    Pages : 2309-2313
    P. Vikram, P. Raghu Veer
    Abstract | PDFPDF
    100. INCOG Query Processing in Networks
    Pages : 2314-2318
    Yetcherla Kumar Sekhar, U. Nanaji
    Abstract | PDFPDF
    101. Cloud Computing Based Visual Backchannel for Web Based Events
    Pages : 2319-2325
    Santhosh.kola, Sanjib.k
    Abstract | PDFPDF
    102. Performance Analysis of HR Portal Domain Components Extraction
    Pages : 2326-2331
    N Md Jubair Basha, Salman Abdul Moiz , A. A. Moiz Qyser
    Abstract | PDFPDF
    103. Color Image Segmentation using Watershed Algorithm
    Pages : 2332-2334
    Thodeti Srikanth, P.Pradeep Kumar, Ashwin Kumar
    Abstract | PDFPDF
    104. Analysis of Human Immune System Inspired Intrusion Detection System
    Pages : 2335-2339
    R.Sridevi , . Rajan Chattamvelli, E . K a n nan
    Abstract | PDFPDF
    105. Texture and Shape Based Classification of Brain Tumors Using Back-Propagation Algorithm
    Pages : 2340-2342
    Neelam Marshkole, Bikesh Kumar Singh and A.S.Thoke
    Abstract | PDFPDF
    106. An Efficient Key Management Scheme for Heterogeneous Sensor Networks
    Pages : 2343-2347
    S.Gandhi ,D.Indira
    Abstract | PDFPDF
    107. Automatic Eye Blink Tracking and Detection in an Image Sequence
    Pages : 2348-2349
    Tarun Dhar Diwan ,Rajesh Tiwari
    Abstract | PDFPDF
    108. The Design of Adaptive E-Learning System based on Student's Learning Styles
    Pages : 2350-2353
    Herman Dwi Surjono
    Abstract | PDFPDF
    109. Dynamic Resource Discovery protocol in Unstructured Peer-to-Peer Networks
    Pages : 2354-2355
    B. Steffi, D. Srinivas, V. Naga Raju, K. Upendra Das
    Abstract | PDFPDF
    110. Services in Android can Share Your Personal Information in Background
    Pages : 2356-2359
    Manoj Kumar and Sheshendra Rathi
    Abstract | PDFPDF
    111. Article Removed
    Pages : xxxx-xxxx
    xxxxxxx
    Abstract | PDFPDF
    112. LROR Oriented Tree Quorum Protocol
    Pages : 2367-2368
    Meenu and .Udai Shanker
    Abstract | PDFPDF
    113. Simultaneous Data Compression and Encryption
    Pages : 2369-2374
    T.SubhamastanRao , M.Soujanya, T.Hemalatha, T.Revathi
    Abstract | PDFPDF
    114. A Comparative Study of Iterative Thinning Algorithms for BMP Images
    Pages : 2375-2379
    Harish Kumar and Paramjeet Kaur
    Abstract | PDFPDF
    115. Network Control Systems RTAI framework – A Review
    Pages : 2380-2383
    Deepika Bhatia, Urmila Shrawankar
    Abstract | PDFPDF
    116. Article removed
    Pages : 2384-2389
    xxxx,xxxx
    Abstract | PDFPDF
    117. Web Usage Mining: A Research Concept of Web Mining
    Pages : 2390-2393
    D.Suresh Babu, SK.Abdul Nabi,Mohd.Anwar Ali ,Y.Raju
    Abstract | PDFPDF
    118. Comparison and Implementation of Compound Memood Model and Memood Model
    Pages : 2394-2398
    Chhavi Gautam , Sandeep Singh Kang
    Abstract | PDFPDF
    119. Inferring web user sessions by Clustering techniques
    Pages : 2399-2404
    N. kalpana,G.V.S.N.R.V.Prasad
    Abstract | PDFPDF
    120. Proficient Resource Allocation for Wireless Multicast
    Pages : 2405-2411
    Mounika.D,Suresh babu.CH
    Abstract | PDFPDF
    121. Application of Genetic Algorithms in Machine learning
    Pages : 2412-2415
    Harsh Bhasin, Surbhi Bhatia
    Abstract | PDFPDF
    122. Spam Weeding, Detection and Filtering on P2P System
    Pages : 2416-2420
    Sarvani Rallabandi , M V Krishna
    Abstract | PDFPDF
    123. A Survey of Link Failure Mechanism and Overhead of Routing Protocols in MANET
    Pages : 2421-2425
    Ashish Kumar, M. Q. Rafiq, Kamal Bansal
    Abstract | PDFPDF
    124. ANN Based Directional Fault Detector/Classifier for Protection of Transmission Lines
    Pages : 2426-2433
    Anamika Yadav, A.S. Thoke
    Abstract | PDFPDF
    125. Image Edge Detection by Using Rule Based Fuzzy Classifier
    Pages : 2434-2439
    Mandeep Singh Sandhu ,Vikram Mutneja ,Nishi
    Abstract | PDFPDF
    126. Context-aware Personalized Mobile Web Search Techniques-A Review
    Pages : 2440-2443
    Deepika Bhatia, Smita Nirkhi, Preeti Bajaj
    Abstract | PDFPDF
    127. Vector Quantization for Image Compression using Repulsion based FPCM
    Pages : 2444-2451
    S. Sathappan,S. Pannirselvam
    Abstract | PDFPDF
    128. Access Control Policy: A Framework to Enforce Recommendations
    Pages : 2452-2463
    Nada Essaouini , Anas Abou El Kalam , Abdellah Ait Ouahman
    Abstract | PDFPDF
    129. Relevant Data Clustering In Web Search Engine
    Pages : 2464-2466
    N.NAGAKUMARI, P.SRIVALLI, K.SATYA TEJ
    Abstract | PDFPDF
    130. A Comprehensive Analysis and Comparison of TCP Tahoe, TCP Reno and TCP Lite
    Pages : 2467-2472
    Poonam Tomar, Prashant Panse
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-