• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 2 ISSUE 6 November-December 2011

    ISSN 0975 - 9646

    1.
    Study of Traditional Upstream Congestion Control Algorithm with various Metrics in Realistic WSN Scenarios
    Pages : 2473-2478
    V. Vijaya Raja, R. Rani Hemamalini and A. Jose Anand
    Abstract | PDFPDF
    2.
    Active Queue Management for Flow Congestion Control in wireless network
    Pages : 2479-2481
    Kiran babu Kommu, Kakara Ravi Kumar, Srinivasa Rao S
    Abstract | PDFPDF
    3.
    Dynamic Bandwidth for Minimum Delay Peer-to-peer Streaming
    Pages : 2482-2484
    K. Venkata Ganesh Babu, K. Ravi Kumar
    Abstract | PDFPDF
    4. An Adaptive Rate Control based QoS Provisioning in Mobile Ad hoc Networks
    Pages : 2485-2491.
    S.Venkatasubramanian
    Abstract | PDFPDF
    5. Emotion Recognition System for English Dialects using Dimensional Theory
    Pages : 2492-2495.
    M. Chinna Rao, A.V.S.N. Murthy
    Abstract | PDFPDF
    6. High Secure Crypto Biometric Authentication Protocol
    Pages : 2496-2502
    K Hemanth, Srinivasulu Asadi, Dabbu Murali, N Karimulla and M Aswin
    Abstract | PDFPDF
    7.
    Performance Evaluation of Grid Computing in Trust Related Environment
    Pages : 2503-2506.
    V.Vijayakumar, R.S.D.Wahidabanu
    Abstract | PDFPDF
    8.
    Design a MNUR method for Finding Similarity between Fingerprint Images Based on Fingerprint Detection Technique -1
    Pages : 2507-2509
    Jitendra Singh Sengar, Jasvinder Pal Singh, Niresh Sharma
    Abstract | PDFPDF
    9.
    Article Removed
    Pages : 2510-2516
    Article Removed
    Abstract | PDFPDF
    10. BiFree: An Efficient Biclustering Technique for Gene Expression Data Using Two Layer Free
    Weighted Bipartite Graph Crossing Minimization
    Pages : 2517-2524
    Suvendu Kanungo, Gadadhar Sahoo, Manoj Madhava Gore
    Abstract | PDFPDF
    11. Seamless handoff in Next Generation Wireless System
    Pages : 2525-2530
    Poonam B. Bhilare, Santosh S. Sambare
    Abstract | PDFPDF
    12. Real Time Security Control System For Smoke and Fire Detection Using ZigBee
    Pages : 2531-2540.
    Suneel Mudunuru, V. Narasimha Nayak, G.Madhusudhana Rao, K.Sreenivasa Ravi
    Abstract | PDFPDF
    13.
    Dynamic Approch to Retrive the Web Pages
    Pages : 2541-2547
    Muthe V Satya Nagaraju, U. Nanaji
    Abstract | PDFPDF
    14.
    Using Hybrid And LQR Method Control Of A Self-Erecting Rotary Inverted Pendulum System
    Based On PIC 18F4431
    Pages : 2548-2553
    Huu Chan Thanh Nguyen, An Wen Shen
    Abstract | PDFPDF
    15.

    Adaptive MIMO-OFDM Scheme to Reduce Complexity and Optimize User Data Rate Over Fading Channel in Wireless Sensor Networks
    Pages : 2554-2561
    L.C.Siddanna Gowd A. Natarajan , M.Manikandan and R.Pavendiran
    Abstract | PDFPDF

    16. Detecting the Age of the Fish through Image Processing using its Morphological Features
    Pages : 2562-2567
    G.T.Shrivakshan , C. Chandrasekar
    Abstract | PDFPDF
    17. Node Localization in Wireless Sensor Networks
    Pages : 2568-2572
    P.K Singh, Bharat Tripathi, Narendra Pal Singh
    Abstract | PDFPDF
    18. Image segmentation-MR Images Segmentation with A Modified Gaussian Mixture Model
    Pages : 2573-2578
    P.Daniel Ratna Raju, G.Neelima, K.Prasada Rao
    Abstract | PDFPDF
    19. An Approach to Improve the Security of Online System using Crypto System
    Pages: 2579-2583
    M.V.B.T.Santhi, K.Deepthi, Ch.Satya Keerthi .N.V.L, P.Lakshmi Prasanna
    Abstract | PDFPDF
    20. A Review on LBG Algorithm for Image Compression
    Pages: 2584-2589
    Asmita A.Bardekar, P.A.Tijare
    Abstract | PDFPDF
    21.
    Secure Employee Information System to Manage Integrated Network Services
    Pages : 2590-2595
    P.Rama Rao, O.Obulesu
    Abstract | PDFPDF
    22.
    An inference routing tree topology algorithm for reducing overhead in packet probing
    Pages : 2596-2601
    V. Srujana and Vadlamudi Rajesh
    Abstract | PDFPDF
    23.
    Throughput Enhancement by Robust Routing in MANET
    Pages : 2602-2606
    Manikonda Aparna, Motahar Reza
    Abstract | PDFPDF
    24.
    A Mechanism for Recognition & Eradication of Gray Hole Attack using AODV routing protocol in
    MANET
    Pages : 2607-2613
    Onkar V. Chandure, V. T. Gaikwad
    Abstract | PDFPDF
    25. Analysis of Optimal Route Algorithms Under Constraint Conditions
    Pages : 2614-2619
    M.V.Mawale, Y.B.Gandole
    Abstract | PDFPDF
    26. Network Delay: Network Analyzer and Opnet Simulation Tool
    Pages : 2620-2626
    Sandhya Rani.S, Chandrasekhar.G
    Abstract | PDFPDF
    27. A Review of Security Metrics in Software Development Process
    Pages : 2627-2631
    Smriti Jain, Maya Ingle
    Abstract | PDFPDF
    28. Performance Evaluation of ATM Networks in Computer Simulation
    Pages : 2632-2636
    A. Ghaddar , Y. Mohanna , M. Dbouk , O. Bazzi
    Abstract | PDFPDF
    29.
    Article Withdrawn
    Pages : 2637-2644
    xxx,xxx
    Abstract | PDFPDF
    30. Reducing End to End per Packet Energy Consumption
    Pages : 2645-2649
    N.Annapurna#1, M.V.Vijaya Saradhi
    Abstract | PDFPDF
    31. Smart Sensor System for Agricultural Chronology
    Pages : 2650-2658
    K.Srinivasa Ravi, K.Tapaswi, B.Lokesh, G.Sai Krishna
    Abstract | PDFPDF
    32. A Novel Iris Recognition System Using Statistical Feature Analysis By Haar Wavelet
    Pages : 2659-2662
    S.Balaji, G.Gayathri, K.Lokesh, S.Sindhu
    Abstract | PDFPDF
    33. Reduced -Reference Image Quality Assessment
    Pages : 2663-2665
    Shraddha N. Utane, V. K. Shandilya
    Abstract | PDFPDF
    34. A Controller Based Approach for Web Services Virtualized Instance Allocation
    Pages : 2666-2670
    Sandesh Tripathi , S Q Abbas , Rizwan Beg
    Abstract | PDFPDF
    35.
    Solution of Time Constrained Vehicle Routing Problems using Multi-Objective Hybrid Genetic Algorithm
    Pages : 2671-2676
    Bhawna Minocha, Saswati Tripathi
    Abstract | PDFPDF
    36. Mining frequent item sets without candidate generation using FP-Trees
    Pages : 2677-2685
    G.Nageswara Rao, Suman Kumar Gurram
    Abstract | PDFPDF
    37.
    A Novel Approach of Watershed Segmentation of Noisy Image Using Adaptive Wavelet Threshold
    Pages : 2686-2690
    Nilanjan Dey, Arpan Sinha, Pranati Rakshit
    Abstract | PDFPDF
    38.
    Privacy-Preserving Public Auditing In Cloud Storage Security
    Pages : 2691-2693
    D. Srinivas
    Abstract | PDFPDF
    39.
    Enhancement of Diabetic Retinopathy Imagery Using Contrast Limited Adaptive Histogram
    Equalization
    Pages : 2694-2699
    Saikat Kumar Shome, Siva Ram Krishna Vadali
    Abstract | PDFPDF
    40
    Dynamic Congestion control for TCP in Peer - to - Peer Network
    Pages : 2700-2702
    D. Raghu, Thatha Reddy Karri ,Ch. Raja Jacob
    Abstract | PDFPDF
    41.
    Route Management Protocol for Misbehavior in Ad Hoc Networks
    Pages : 2703-2709
    A. Shalini,Krishna Rao, Sridhar G
    Abstract | PDFPDF
    42.
    A Comparison of Rule based and Distance Based Semantic Video Mining
    Pages : 2710-2713
    D.Raghu, K.sandeep , CH. Raja Jacob
    Abstract | PDFPDF
    43..
    Implementation study of Hybrid caching scheme in Wireless P2P networks with Asymmetric Cooperative caching
    Pages : 2714-2718
    B.S.V.N.L.Gayatri M.H.M. Krishna Prasad
    Abstract | PDFPDF
    44.
    Face Detection by Fine Tuning the Gabor Filter Parameter
    Pages : 2719-2724
    Suraj Prakash Sahu , Vibhav Anand, Nitin Kumar*, Pavan Chakraborty and G.C.Nandi
    Abstract | PDFPDF
    45.
    Improving User Experience by Mining Usage Patterns
    Pages : 2725-2727
    J.Isabella,R.M.Suresh
    Abstract | PDFPDF
    46.
    Virtual Instrumentation as an Effective Enhancement to Laboratory Experiment
    Pages : 2728-2733
    Yogendra B.Gandole
    Abstract | PDFPDF
    47.
    Dynamic Vision-Based Approach in Web Data Extraction
    Pages : 2734-2736
    D.Raghu, V.Sridhar Reddy, Ch.Raja Jacob
    Abstract | PDFPDF
    48.
    Article Removed
    Pages : 2737-2739
    xxxx, xxxx
    Abstract | PDFPDF
    49.
    An Efficient Channel Allocation in Mobile Computing
    Pages : 2740-2747
    A.S.C.Padma, M.Chinnaarao
    Abstract | PDFPDF
    50.
    RSVP protocol in Multimedia Networks
    Pages :2748-2751
    T. SaiDurga, D. V.Manjula
    Abstract | PDFPDF
    51.
    Design and Performance Evaluation of Transmitted Reference BPSK UWB Receiver using SIMULINK
    Pages : 2752-2760
    Alpana P. Adsul , Shrikant. K. Bodhe
    Abstract | PDFPDF
    52.
    A New Low Power 9T SRAM Cell based on CNTFET at 32nm Technology Node
    Pages : 2761-2764
    Rajendra Prasad S, Dr. B K Madhavi, Dr. K Lal Kishore
    Abstract | PDFPDF
    53.
    Neural Network Based Authentication and Verification for Web Based Key Stroke Dynamics
    Pages : 2765-2772
    D. RAGHU, CH. RAJA JACOB, Y.V.K.D.BHAVANI
    Abstract | PDFPDF
    54.
    Medical Image Classification Using Information Gain for Global Feature Reduction
    Pages : 2773-2775
    T.Baranidharan, Dr.D.K.Ghosh
    Abstract | PDFPDF
    55.
    ANT COLONY OPTIMIZATION ROUTING to MOBILE AD HOC NETWORKS in URBAN ENVIRONMENTS
    Pages : 2776-2779
    Manjula Poojary, B.Renuka
    Abstract | PDFPDF
    56.
    Efficient way of Detecting Malicious Packet Losses
    Pages : 2780-2783
    K Bala murali Krishna,K Prasada Rao
    Abstract | PDFPDF
    57.
    A Review of Security and Privacy Issues in Social Networking
    Pages : 2784-2787
    A. A. Sattikar, Dr. R. V. Kulkarni
    Abstract | PDFPDF
    58.
    Efficient Apriori Mend Algorithm for Pattern Extraction Process
    Pages : 2788-2791
    D.Magdalene Delighta Angeline ,I.Samuel Peter James
    Abstract | PDFPDF
    59.
    ESDPMANT: Efficient Service Discovery Protocols for Mobile Ad Hoc Networks.
    Pages : 2792-2795
    Raghu.Devarapalli, Jeevan babu.Vara, Raja Jacob.Chidipi, Lakshman babu.Didde
    Abstract | PDFPDF
    60.
    The Performance of Parallel Algorithms by Amdahl's Law, Gustafson's Trend
    Pages : 2796-2799
    Juby Mathew, Dr.R Vijayakumar
    Abstract | PDFPDF
    61.
    Network Security through SSL in Cloud Computing Environment
    Pages : 2800-2803
    Pankaj Patidar, Arpit Bhardwaj
    Abstract | PDFPDF
    62.
    Comparative Study of DECIM-128 and DECIMV2 in relation to Compact Hash-based Message
    Authentication Code
    Pages : 2804-2806
    P.Venkateswara Rao, K.Seetha Devi, CH.V. Phani Krishna, Dr. K.Subrahmanyam
    Abstract | PDFPDF
    63.
    A Mobile IPv6-Based Architecture for Mobility of Mobile Terminals in Heterogeneous Networks
    Pages : 2807-2810
    G.Praveen,M.RajaRamesh
    Abstract | PDFPDF
    64.
    Provably Secure Quantum Key Distribution Protocols in 802.11 Wireless Networks
    Pages : 2811-2815
    R.Lalu Naik , Dr.P.Chenna Reddy , U.Sathish Kumar
    Abstract | PDFPDF
    65.
    Model Driven Design Method for Software Architecture
    Pages : 2816-2821
    Thodeti Srikanth, Dachepally Ravi Kumar , Mahi Naveen Kumar
    Abstract | PDFPDF
    66.
    Information technology in Tourism
    Pages : 2822-2825
    Vidyullata Shekhar Jadhav,Shivaji D. Mundhe
    Abstract | PDFPDF
    67.
    Wireless Communication Networks – A Study & Emergence of Multipath Dissemination
    Pages : 2826-2829
    B.Sailaja, N.Sujata Gupta
    Abstract | PDFPDF
    68.
    Investigation of Classification Accuracy using Fast Hartley Transform for Feature Extraction
    Pages : 2830-2834
    V.Baby Deepa, Dr. P. Thangaraj
    Abstract | PDFPDF
    69.
    NETWORK EVOLUTION in 3G / 4G: APPLICATIONS and SECURITY ISSUES
    Pages : 2835-2837
    Veera RaghavaRao Atukuri, RamaKrishna Mathe,Mrunalini Pamidipati
    Abstract | PDFPDF
    70.
    Comparison of Frequent Item Set Mining Algorithms
    Pages : 2838-2841
    J.R.Jeba,S.P.Victor
    Abstract | PDFPDF
    71. Design and Realization of Augmented Reality Based Navigation Assistance System
    Pages : 2842-2846
    Veeraraghavulu Nakka, A Kabirdas
    Abstract | PDFPDF
    72. An Accomplishment of Web Personalization Using Web Mining Techniqu
    Pages : 2847-2851
    Y.Raju m B.Prashanth Kumar ,.D.Suresh Babu
    Abstract | PDFPDF
    73. Node Localization for Wireless Sensor Networks
    Pages : 2852-2856
    P.K Singh, Bharat Tripathi, Narendra Pal Singh
    Abstract | PDFPDF
    74. FaceMovie - A Novel Approach to Post the Mining Classification Data
    Pages : 2857-2861
    Venkata Ramana Adari ,Ch.Diwakar , P.Suresh Varma
    Abstract | PDFPDF
    75. Web Usage Mining: An Incremental Positive and Negative Association Rule Mining Approach
    Pages : 2862-2866
    Anuradha veleti, T.Nagalakshmi
    Abstract | PDFPDF
    76. Spatial Clustering Simulation on Analysis of Spatial-Temporal Crime Hotspot for Predicting Crime activities
    Pages : 2867-2874
    M.Vijaya Kumar,C.Chandrasekar
    Abstract | PDFPDF
    77. Scheduling in Wi-MAX Networks
    Pages : 2875-2879
    A. P.Vikram , B. T.Lakshmi Deepak ,and C. S.Deepthi
    Abstract | PDFPDF
    78. Detecting Application Denial-of-Service Attacks : A Dynamic Group-Testing-Based Approach
    Pages : 2880-2884
    Sikakolanu Hareesh Kumar, U. Nanaji
    Abstract | PDFPDF
    79. Analysis and Automation of Security Management System for Remote Terminals Based on Advanced Finger Print Reorganization Algorithm
    Pages : 2885-2888
    Sai Kumar Nadakudhiti, A KabirDas
    Abstract | PDFPDF
    80. A Novel Approach for Subjective Content Accessibility Mining using Lib Mart & Web Mart Classification having Multilayered Architecture
    Pages : 2889-2893
    Sachin Yele, Ravindra Gupta
    Abstract | PDFPDF
    81. A Process for Data Storage security in Cloud Computing
    Pages : 2894-2897
    Durgarajesh Rachamsetty, Prof Ramakrishna Rao TK
    Abstract | PDFPDF
    82. Mining Accurate Information on Web Using Truth Algorithm
    Pages : 2898-2901
    K.Vijaya Lakshmi , B.Jayanag, Dr. V.Srinivasa Rao
    Abstract | PDFPDF
    83. Security Issues on Inter-Vehicle Communications
    Pages : 2902-2905
    M.V.B.T.Santhi, K.Deepthi, Ch.Satya Keerthi .N.V.L,P.Lakshmi Prasanna
    Abstract | PDFPDF
    84. Warehouse Management for Improved Efficiency in A Small Warehouse
    Pages : 2906-2908
    M. Srikanth Yadav, Y. Eswara Rao, P. Sudhakar, Allada Aparna
    Abstract | PDFPDF
    85. Revocation and Self Healing of keys in Hierarchical Wireless Sensor Network
    Pages : 2909-2914
    G.N.Purohit,Asmita Singh Rawat
    Abstract | PDFPDF
    86. Software Quality Assurance in CMM and XPA Comparative Study
    Pages : 2915-2919
    CH.V. Phani Krishna and Dr. K.Rajasekhara Rao
    Abstract | PDFPDF
    87. Broadcasting Through UDG in Manets by GPS Assistance
    Pages : 2920-2923
    A. P.Vikram , B. K.Renuka ,and C. P.VenkataNaveen
    Abstract | PDFPDF
    88. Performance Analysis of Parallel Programming Tools
    Pages : 2924-2931
    Md Firoj Ali, Rafiqul Zaman Khan
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-