• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 3 ISSUE 1 January - February 2012

    ISSN 0975 - 9646

    1.
    A Comparative Study on Quantum Pushdown Automata, Turing Machine and Quantum Turing Machine
    Pages : 2932 - 2935
    TANISTHA NAYAK, TIRTHARAJ DASH
    Abstract | PDFPDF
    2.
    Bandwidth Improvement of a Left Arm Shorter U - Slot Micro Strip Antenna
    Pages : 2936 - 2939
    Lakhan Singh, Rajesh Kumar Verma and D.C. Dhubkarya
    Abstract | PDFPDF
    3.
    Using Contextual Inquiry as a subset of Requirement Gathering Process
    Pages : 2940 - 2942
    Rajesh Kulkarni, Dr.P.Padmanabham
    Abstract | PDFPDF
    4. Clustering Technique in Data Mining for Text Documents
    Pages : 2943-2947
    J.Sathya Priya and S.Priyadharshini
    Abstract | PDFPDF
    5. Intrusion Detection Technique -A Review
    Pages : 2948 - 2956
    Abstract | PDFPDF
    6.
    Highly Accelerated Advanced Multiplier Design for An Efficient Bandwidth Utilized FFT Computation
    Pages : 2957 - 2963
    M.Sahithi,Naseema Shaik, A.Jhansi Rani,J.Poornima,M.Jyothi and K.Purnima
    Abstract | PDFPDF
    7.
    Design of Modified Shannon Based Full Adder Cell Using PTL Logic for Low Power Applications
    Pages : 2964 - 2968
    K.Purnima, S.AdiLakshmi, M.Sahithi, A.Jhansi Rani and J.Poornima
    Abstract | PDFPDF
    8.
    Simulation Result of Hybrid Routing Protocol for Mobile Ad hoc Network
    Pages : 2969 - 2974
    Makarand R. Shahade and D. N. Choudhari
    Abstract | PDFPDF
    9. Development of Artificial Intelligent Model For Reduction Of Noise From Biomedical Signal
    Pages : 2975 - 2977
    R.J.Gajbe and Dr. Y.B.Gandole
    Abstract | PDFPDF
    10. Disclosure Control of Sensitve Information from OLAP Query Results
    Pages : 2978 - 2981
    P.Kamakshi and A.Vinaya Babu
    Abstract | PDFPDF
    11. High Speed and Low Power Dynamic Latched Comparator for PTL Circuit Applications
    Pages : 2982 - 2991
    N. Naga Sudha, V. Narasimha Nayak, Suneel Mudunuru,M. Nagesh Babu,B.K.V Prasad, M. Jyothi
    Abstract | PDFPDF
    12.
    Autonomous Network Security using Unsupervised Detection of Network Attacks
    Pages : 2992 - 2995
    Pragati H. Chandankhede and Sonali U. Nimbhorkar
    Abstract | PDFPDF
    13.
    Clustering technique to interpret Numerical Weather Prediction output products for forecast of Cloudburst
    Pages : 2996 - 2999
    Kavita Pabreja
    Abstract | PDFPDF
    14. Latest Trends in Wireless Mobile Communication (3G to 4G Technologies)
    Pages : 3000 - 3005
    B.KiranKumar, R.VishnuMurthy, Kondapalli BalaKrishna
    Abstract | PDFPDF
    15. Pondering of agent technologies in road transportation system and their critical issues
    Pages : 3006 - 3011
    V.Divya, M.Hema Madhuri, Movva N.V Kiran Babu
    Abstract | PDFPDF
    16. Analysis of Temperature and Humidity Data for Future value prediction
    Pages : 3012 - 3014
    Badhiye S. S., Wakode B. V., Chatur P. N
    Abstract | PDFPDF
    17.
    A Generalized Framework for Building Scalable Load Balancing Architectures in the Cloud
    Pages : 3015 - 3021
    Illa Pavan Kumar, Subrahmanyam Kodukula
    Abstract | PDFPDF
    18.
    Comparison study between Traditional and Object- Oriented Approaches to Develop all projects in Software Engineering
    Pages : 3022 - 3028
    Nabil Mohammed Ali Munassar and A. Govardhan
    Abstract | PDFPDF
    19. Component-Based Software Development with Component Technologies: An Overview
    Pages : 3029 - 3036
    Jawwad Wasat Shareef, Rajesh Kumar Pandey
    Abstract | PDFPDF
    20. Geometric Invariant Digital Image Watermarking Techniques for QR code
    Pages : 3037 - 3041
    Lakshmi Chetana Vemuri, Gogineni Krishna Chaitanya and Narasimham
    Abstract | PDFPDF
    21.
    Searching Images Segmented from Search Engine database using sophisticated QIMERA method of Algorithm
    Pages :3042 - 3046
    P.Daniel Ratna Raju, G.Neelima
    Abstract | PDFPDF
    22.
    Secure and Scalable Multicasting Services in Wireless Mesh Networks
    Pages : 3047 - 3052
    B Tejaswi S . Sivanageswara Rao, S. Gopi Krishna and Y. K. Sundara Krishna
    Abstract | PDFPDF
    23.
    Secure Optimized Link State Routing Protocol for Ad-Hoc Networks
    Pages : 3053 - 3058
    Priyanka A. Hajare, Pritish A. Tijare
    Abstract | PDFPDF
    24. Smart Card Fraud Prevention Scheme Using Fingerprinting Authentication
    Pages : 3059 - 3062
    Jayesh Gaurav, Sanjive Tyagi, Dr Jayanthi Ranjan
    Abstract | PDFPDF
    25. The Fault Management System Using Amazon EC2: Web Application Deployment on Cloud
    Pages : 3063 - 3067
    K Raja Sekhar, Sarat Chalamalsetty, Prahasith Katuri and Varun Jajam
    Abstract | PDFPDF
    26.
    Undecryptable Encryption against Network and Forensic Attack
    Pages : 3068 - 3072
    Raana Syeda, S . U . Nimbhorkar
    Abstract | PDFPDF
    27.
    Web Usage Mining Using Neiural Network Approach: A Critical Review
    Pages : 3073 - 3077
    Vaishali A.Zilpe, Dr. Mohammad Atique
    Abstract | PDFPDF
    28.
    A New Multiresolution Algorithm for Image Segmentation
    Pages : 3078 - 3084
    David Solomon Raju Y, Krishna Reddy D
    Abstract | PDFPDF
    29.
    A study of comparison of Network Simulator -3 and Network Simulator -2
    Pages : 3085 - 3092
    Rachna Chaudhary, Shweta Sethi, Rita Keshari, Sakshi Goel
    Abstract | PDFPDF
    30.
    Stagnant Memory and Timing investigation of Embedded Systems Code
    Pages : 3093 - 3098
    M.Shankar, Dr.M.Sridar, Dr.M.Rajani
    Abstract | PDFPDF
    31.
    Automated Green House Management Using GMS Modem
    Pages : 3099 - 3102
    Sumit A. Khandelwal
    Abstract | PDFPDF
    32.
    Performance Analysis of Matrix Multiplication Algorithms Using MPI
    Pages : 3103 - 3106
    Javed Ali ,Rafiqul Zaman Khan
    Abstract | PDFPDF
    33.
    Integrating Logic Analyzer Functionality into VHDL designs
    Pages : 3107 - 3111
    S.Adilakshmi, K.Rajasekhar, T.B.K.Manoj kumar
    Abstract | PDFPDF
    34.
    Deriving Serial and Parallel Spikes Data in Neural Science Using Data Mining Techniques
    Pages : 3112 - 3115
    Srinivas Bobba, Jammi Ashok
    Abstract | PDFPDF
    35.
    Track and Identify the Human Motion with Alert
    Pages : 3116 - 3118
    Thota Jeevana Krupa, Prof Koduru Prasada Rao
    Abstract | PDFPDF
    36.
    A Modified Feistel Cipher involving a pair of key matrices,Supplemented with Modular
    Arithmetic Addition and Shuffling of the plaintext in each round of the iteration process
    Pages : 3119 - 3128
    V.U.K. Sastry, K. Anup Kumar
    Abstract | PDFPDF
    37.
    Emphasizing Requirement Elicitation Process for Electronic Payment Secured System using VORD Methodology - A Practical Approach
    Pages : 3129 - 3132
    Md. Faisa1, Mohammed Hussain
    Abstract | PDFPDF
    38.
    A Modified Feistel Cipher Involving a Pair of Key Matrices, Supplemented with XOR
    Operation, and Blending of the Plaintext in each Round of the Iteration Process
    Pages : 3133 - 3141
    V.U.K. Sastry, K. Anup Kumar
    Abstract | PDFPDF
    39.
    Counter Measure for Congestion in TCP/IP using Bandwidth Estimation
    Pages : 3142 - 3143
    S.Priyadharshini,J.Sathya Priya
    Abstract | PDFPDF
    40.
    Microstrip Rectangular Patch Antenna : Computer Aided Design Methology
    Pages : 3144-3146
    R.D.Kanphade, D.G. Wakade, N.T. Markad
    Abstract | PDFPDF
    41.
    Location Based Services on Mobile E-Commerce
    Pages : 3147 - 3151
    B. Renuka, Manjula Poojary, B.Ramesh Babu
    Abstract | PDFPDF
    42.
    Social Networking: Innovative Communication Technology
    Pages : 3152 - 3156
    S.T. Bhosale, B.S. Sawant, S.D. Munde
    Abstract | PDFPDF
    43.
    Secured Communication Protocol via Encrypted Key Ensuring Message Integrity
    Pages : 3157 - 3161
    Devarakonda John Livingstion, P.Raja Sekhar
    Abstract | PDFPDF
    44.
    Analysis and Prevention of Malware in P2P
    Pages : 3162 - 3169
    Puram.Pradeep Kumar, Naini Shekar Reddy, Saleha Saudagar, T. Puneeth Chandra, Ch. Kishor Kumar
    Abstract | PDFPDF
    45.
    Study of Ant Colony Algorithm using Adaptive Schematization Methodology Based on Prognosticative Learning
    Pages : 3170 - 3175
    Arjun Arora, Ashish Pant, R P Arora, Suneet Kumar
    Abstract | PDFPDF
    46.
    Privacy Preserving Association Rule Mining in Horizontally Partitioned Databases Using Cryptography Techniques
    Pages : 3176 - 3182
    N V Muthu lakshmi,Dr. K Sandhya Rani
    Abstract | PDFPDF
    47.
    A Fine Grained Access Control Model for Relational Databases
    Pages : 3183 - 3186
    Neha Sehta, Dr. Suresh Jain
    Abstract | PDFPDF
    48.
    Key Distribution Approaches for Wireless Sensor Networks
    Pages : 3187-3190
    Ramu kuchipudi, N Md Jubair Basha
    Abstract | PDFPDF
    49.
    Enhanced Dynamical Hierarchical Mobile Internet Protocol for Mobile IP Networks
    Pages : 3191 - 3194
    U.Thirupathi Rao, Sk.Mastan Vali, P.sankar Rao, Ch.Samba Siva Rao, Krishna Sah, K.V.D.Kiran
    Abstract | PDFPDF
    50.
    Analysis and Individualization of Clients concern based on the Internet Browsing History
    Pages : 3195 - 3198
    V.Ravindranadhan, P.Sarath, M.Gopi Mahesh, M.Rajasekhar. K.V.D.Kiran
    Abstract | PDFPDF
    51.
    GUI Based Data Acquisition System Using ARM-Cortex M3 Microcontroller
    Pages : 3199 - 3204
    Patel Hiren, Patel Dipak
    Abstract | PDFPDF
    52.
    Novel Approach to Identify Relevant and Irrelevant Questions Using Text Categorization
    Pages : 3205 - 3207
    C.M.Nalayini, J.Keerthika
    Abstract | PDFPDF
    53.
    Design and Implementation of Pipelined 32-bit Advanced RISC Processor for Various D.S.P Applications
    Pages : 3208-3213
    J.Poornima, G.V.Ganesh, M.jyothi,M.Sahithi,A.jhansi RaniB. Raghu Kanth
    Abstract | PDFPDF
    54.
    Implementation of Low Complex and High Secured SPI Communication System for Multipurpose Applications
    Pages : 3214-3219
    M.Jyothi, L.Ravi Chandra, M.Sahithi,A.Jhansi Rani,J.Poornima,N.Naga Sudha
    Abstract | PDFPDF
    55.
    Fault Torelant Distributed Intrusion Detection System Using Advanced Honeypots
    Pages : 3220-3224
    Akshay Kulkarni, Sujal Raul, Vidhya Suresh
    Abstract | PDFPDF
    56.
    A Survey On: Attacks due to SQL injection and their prevention method for web application
    Pages : 3225-3228
    Shubham Srivastava
    Abstract | PDFPDF
    57.
    Column wise DCT plane sectorization in CBIR
    Pages : 3229-3235
    H.B.Kekre, Dhirendra Mishra, Chirag Thakkar
    Abstract | PDFPDF
    58.
    SCTP over MIPv4 for Multi-homed Mobile Host
    Pages : 3236-3240
    Surmila Thokchom, Thoudam Doren Singh
    Abstract | PDFPDF
    59.
    Cloud Computing Technology for Effective e-Governance
    Pages : 3241-3244
    R.Siva Rama Prasad, Veera RaghavaRao Atukuri
    Abstract | PDFPDF
    60.
    Exemplar-Based Image Inpainting for Region Filling & Object Removal
    Pages : 3245-3248
    Rashmi Bijwe, P. R. Deshmukh
    Abstract | PDFPDF
    61.
    Watermarking of 3D Meshes using Matlab
    Pages : 3249 - 3254
    Deepti Gaidhane, Uzma Ansari
    Abstract | PDFPDF
    62.
    Regression Testing Using Coupling and Genetic Algorithms
    Pages : 3255 - 3259
    Harsh Bhasin, Manoj
    Abstract | PDFPDF
    63.
    Fundamental of Content Based Image Retrieval
    Pages : 3260 - 3263
    Ritika Hirwane
    Abstract | PDFPDF
    64.
    Sram Cell Static Faults Detection and Repair Using Memory Bist
    Pages : 3264 - 3268
    Shaik Moulali, Dr. Fazal Noor Bhasha, B.Srinivas, S.Dayasagar chowdary , P.Srinivas, K. Hari Kishore
    Abstract | PDFPDF
    65.
    A Brief Review of Handover schemes in Wireless communication
    Pages : 3269 - 3278
    Madhuri R. Pawar, Prof. Santosh Sheshrao Sambare
    Abstract | PDFPDF
    66.
    The File Encryption Method in Cryptographic Key Management Wireless Ad Hoc Networks
    Pages : 3279 - 3282
    D. Raghu, Munagala. Srinivasa Rao, Ch. Raja Jacub
    Abstract | PDFPDF
    67.
    Cloud Network: Integration of Cloud Computing and Virtualization with Network
    Pages : 3283-3286
    Puram.Pradeep Kumar, R.Sai Krishna,.Kishor Kumar, Naini.Shekar Reddy, M.Ramesh
    Abstract | PDFPDF
    68.
    Implementation of Random Number Generator Using LFSR for High Secured Multi Purpose Applications
    Pages : 3283-3286
    M.Sahithi, B.MuraliKrishna,M.Jyothi,K.Purnima,A.Jhansi Rani,N.Naga Sudha
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-