• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 3 ISSUE 2 March-April 2012

    ISSN 0975 - 9646

     

    1.
    Analysis of Optimization Techniques for Feed Forward Neural Networks Based Image Compression
    Pages : 3291-3294
    Neha Relhan, Manoj Jain
    Abstract | PDFPDF
    2.
    Security Issues and Solutions In Wireless Sensor Networks
    Pages : 3295-3304
    Varsha Sahni, Jaspreet Kaur, Sonia Sharma
    Abstract | PDFPDF
    3.
    Routing Protocols and Energy efficient protocols for data aggregation in Wireless Sensor Network: A Survey
    Pages : 3305-3312
    Meenakshi Dhull, Soni Chaurasia
    Abstract | PDFPDF
    4.
    APPLICATION OF DHT PROTOCOL IN IP CLOAKING
    Pages : 3313-3317
    Anju Vijayrania, Abdul Rahman
    Abstract | PDFPDF
    5.
    Information Security on Quick Response code
    Pages : 3318-3320
    S.Hemalatha, P.C.SenthilMahesh, and Dr.Paul Rodrigues
    Abstract | PDFPDF
    6.
    Performance of Semi-Blind Reference Watermarking Scheme Using DWT-SVD for Copyright Protection
    Pages : 3321-3327
    Saryanarayana Murty.P, Laxmi.V, Rajesh Kumar.P
    Abstract | PDFPDF
    7.
    Evaluation of Behavioral Security in Cloud Computing
    Pages : 3328 - 3333
    Ch.Naveen Kumar Reddy, G.Vishnu Murthy
    Abstract | PDFPDF
    8.
    Performance evaluation of clustering algorithms on trajectories data
    Pages : 3334 - 3336
    Sweta Kumari, Varsha Singh
    Abstract | PDFPDF
    9.
    Learning objects- an object oriented analysis, design model and research review
    Pages : 3337 - 3340
    S. Vasanthi, M.K. Jayanthi
    Abstract | PDFPDF
    10.
    Exchange of Peer To Peer Identity Reputation Using Cryptology conventions
    Pages : 3341 - 3347
    S.Venkateswarlu and Md khaja zikriya
    Abstract | PDFPDF
    11.
    Secret Key Generation and Eavesdropping detection using Quantum Cryptography
    Pages : 3348 - 3354
    Neha Chhabra
    Abstract | PDFPDF
    12.
    Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations
    Pages : 3355 - 3359
    R.S.S.Vishnu Priya, P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao
    Abstract | PDFPDF
    13.
    Performance Evaluation of Globus Grid Environment Using Avi to Flash Video Encoding
    Pages : 3360 - 3364
    Gurjit Singh Sra, Dinesh Kumar
    Abstract | PDFPDF
    14.
    College InfoBank: A system for efficient visualization and analysis of College Data
    Pages : 3365 - 3370
    G.Anuradha , Saylee Chitre, Juilee Chitre, Kristel Alphonso
    Abstract | PDFPDF
    15.
    Image Repossession Based on Content Analysis Focused by Color, Texture and Pseudo-Zernike Moments features of an Image
    Pages : 3371 - 3377
    M.Nagaraju,I.Lakshmi Narayana, S.Pramod Kumar
    Abstract | PDFPDF
    16.
    Novel Dissimilarity Algorithm for Content Based Image Retrieval
    Pages : 3378 - 3381
    Suresh Kumar. D, Venkateswarlu.B, Mohan Rao. C.P.V.N.J
    Abstract | PDFPDF
    17.
    Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4
    Pages : 3382-3387
    Alladi Ramesh, P.Sumithabhashini
    Abstract | PDFPDF
    18.
    Efficient Multiple Ant Colony Algorithm for Job Scheduling In Grid Environment
    Pages : 3388-3393
    S.Umarani, L.M.Nithya, A.Shanmugam
    Abstract | PDFPDF
    19.
    String Matching Methodologies: A Comparative Analysis
    Pages : 3394 - 3397
    Akhtar Rasool,Amrita Tiwari, Gunjan Singla,Nilay Khare
    Abstract | PDFPDF
    20.
    EmotiFONT
    Pages : 3398-3400
    Rishabh Sonthalia, Juilee Chitre, Saylee Chitre
    Abstract | PDFPDF
    21.
    Digital teaching using E-Learning
    Pages : 3401-3405
    Preetee Karmore, Apurva Kuchankar, Shivani Kalambe, Ankush patil,Chetan Dakhare, Pratik Channawar
    Abstract | PDFPDF
    22.
    Survey Paper On Analysis Of Various Recommendation Algorithms
    Pages : 3406-3408
    Dolly Sigroha, Chhavi Rana
    Abstract | PDFPDF
    23. Collaborative Scheme to Detect Stealth Nodes in Mobile Adhoc Networks
    Pages :3409-3412
    Burra Naga Durga Srinivas, M.V.S.S. Nagendranath
    Abstract | PDFPDF
    24. Enhanced Query Optimization Using R Tree Variants in a Map Reduce Framework for Storing Spatial Data
    Pages :3413-3418
    Vaishnavi S , Subhashini K , Sangeetha K , Nalayini C.M
    Abstract | PDFPDF
    25. A Review on Security Mechanism of Bluetooth Communication
    Pages :3419-3422
    Trishna Panse, Vivek Kapoor
    Abstract | PDFPDF
    26. An Analysis towards the Development of Electronic Bilingual Dictionary (Manipuri-English) -A Report
    Pages :3423-3426
    Sagolsem Poireiton Meitei, Shantikumar Ningombam, Prof. Bipul Syam Purkayastha
    Abstract | PDFPDF
    27. Improved Decision Tree Induction Algorithm with Feature Selection, Cross Validation, Model
    Complexity and Reduced Error Pruning
    Pages :3427-3431
    A. S. Galathiya, A. P. Ganatra and C. K. Bhensdadia
    Abstract | PDFPDF
    28. Speckle Noise Reduction in Satellite Images Using Spatially Adaptive Wavelet Thresholding
    Pages :3432-3435
    M.Vijay, L.Saranya Devi
    Abstract | PDFPDF
    29. A New Approach to Schedule Precedence Constraint Tasks in Real Time Systems
    Pages :3436-3443
    Radhakrishna Naik R.R.Manthalkar Yogiraj P. Korde
    Abstract | PDFPDF
    30. A Cryptographic Approach to Securely Share Genomic Sequences
    Pages :3444-3447
    G. Rajendra Kumar, V.Navya, M.Swetha, V.Sindhusha, T. Murali Kalyan
    Abstract | PDFPDF
    31. Analyzing a Mobile Framework for Location Based Tracking
    Pages :3448-3451
    Shaveta Bhatia, SabaHilal
    Abstract | PDFPDF
    32. Interference-Aware Robust Topology Design in Multi-Channel Wireless Mesh Networks
    Pages :3452-3455
    Geeta Y.Midha, R.K.Krishna
    Abstract | PDFPDF
    33. Concatenated Differential Space-Time Block Codes and Four Dimensional 8-PSK Trellis Coded
    Modulation for Wireless MIMO system with Rayleigh fading Noise
    Pages :3456-3459
    Emna Ben Slimane, Slaheddine Jarboui, Imen Lamouchi and Ammar Bouallègue
    Abstract | PDFPDF
    34.. Survey Paper on Recommendation System
    Pages :3460-3462
    Mukta kohar,Chhavi Rana
    Abstract | PDFPDF
    35. Contrast Enhancement for Fog Degraded Video Sequences Using BPDFHE
    Pages :3463-3468
    C.Ramya, Dr.S.Subha Rani
    Abstract | PDFPDF
    36. Congestion Minimization By Using MFMP Routing Algorithm
    Pages :3469-3472
    T.B.Sivakumar, M.Gughan Raja, B.Palanichelvam
    Abstract | PDFPDF
    37. Event Detection in Videos Using Data Mining Techniques
    Pages :3473-3475
    P.Thirumurugan, S.Hasan Hussain
    Abstract | PDFPDF
    38. Minimizing Malicious Eavesdropping Ability in Wireless Mesh Networks using SKeMS
    Pages :3476-3478
    Haarika Kandavalli, M.V.S.S NagendraNath
    Abstract | PDFPDF
    39. E-FARMING
    Pages :3479-3482
    Sindhu M R, Aditya Pabshettiwar, Ketan.K.Ghumatkar, Pravin.H.Budhehalkar, Paresh.V.Jaju
    Abstract | PDFPDF
    40. Horizontal Aggregations for Mining Relational Databases
    Pages :3483-3487
    Dontu.Jagannadh, T.Gayathri, M.V.S.S Nagendranadh
    Abstract | PDFPDF
    41. A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer
    Pages :3488-3492
    Raghavendra.K ,G. Raghu ,Sumith N 
    Abstract | PDFPDF
    42 Fragment Based Approach to Forecast Association Rules from Indian IT Stock Transaction Data Pages :3493-3497
    Rajesh V. Argiddi, Sulabha S. Apte
    Abstract | PDFPDF
    43 Modified EGMP for Efficient Multicasting over MANETS
    Pages :3498-3502
    Raavi. Pavani,M. Venkatesh,M.V.S.S. Nagendranath
    Abstract | PDFPDF
    44 Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks
    Pages :3503-3507
    Sabareesan M, Srinivasan S,John Deva Prasanna D S
    Abstract | PDFPDF
    45. A Secure Architecture for Anonymizer Networks
    Pages :3508-3511
    K.Ravindranath, B.V.S.N.Chaitanya, K.Krishna Chaitanya, G.Anil Reddy, B.Harish
    Abstract | PDFPDF
    46. Performance Investigation and Analysis of Secured MANET Routing Protocols
    Pages :3512-3516
    A.Jayanand, Dr.T.Jebarajan
    Abstract | PDFPDF
    47. Different Medias of Steganography- An Emerging Field of Network Security
    Pages :3517-3522
    M. Indra Sena Reddy , M. Purushotham Reddy, K. Subba Reddy
    Abstract | PDFPDF
    48. A Multi-Slotted Wide Microstrip Patch Antenna for Dual Frequency
    Pages :3523-3525
    Ram Singh Kushwaha, D.K.Srivastava, J.P.Saini
    Abstract | PDFPDF
    49. A Reputation Based Scheme to Prevent Routing Misbehavior in MANETs
    Pages :3526-3529
    M. Sreedevi
    Abstract | PDFPDF
    50. Implementation of Area Efficient Memor-Based FIR Digital Filter Using LUT-Multiplier
    Pages :3530-3535
    K.Purnima, S.AdiLakshmi, M.Jyothi
    Abstract | PDFPDF
    51. Identifying the User Access Pattern in Web Log Data
    Pages :3536-3539
    Neetu Anand, Saba Hilal
    Abstract | PDFPDF
    52. Appication of Hybrid ANT Colony Optimization (HACO) Algorithm for solving Capacitated Vehicle Routing Problem (CVRP)
    Pages :3540-3543
    B.Ramesh Babu, Manjula Poojary, B.Renuka
    Abstract | PDFPDF
    53. Component Extraction of Complex Biomedical Signals and Performance analysis
    Pages :3544-3547
    Hemant P. Kasturiwale, P.V.Ingole
    Abstract | PDFPDF
    54. Hybrid Routing Protocol
    Pages :3548-3550
    ShrutiVaish, Amit Kumar Gupta, Shilpi Singh, Saroj Sharma
    Abstract | PDFPDF
    55. Distributed Dynamic Clustering in Randomly Deployed Wireless Sensor Networks
    Pages :3551-3556
    Lavanya Thunuguntla, Rajendra Prasad G
    Abstract | PDFPDF
    56. Distributed Algorithm for Improving Performance through Swap Link in Wireless Networks
    Pages :3557-3562
    T.Kalaiselvi ,P.S.Balamurugan ,K.Sudhakar
    Abstract | PDFPDF
    57. Moving Towards a Robust Software Deployment Methodology – Need to Address Change
    Management
    Pages :3563-3569
    Madhusudan Varadaraj, Nagalingappa Goud
    Abstract | PDFPDF
    58. A Review of Application of Data Mining in Earthquake Prediction
    Pages :3570-3574
    G. V. Otari, Dr. R. V. Kulkarni
    Abstract | PDFPDF
    59. Computational Intelligence Aided Black-Hole Detection for Secure Data Dissemination Based on
    PRP Routing in WSN
    Pages :3575-3581
    J.Preetheswari , J.Mark Jain
    Abstract | PDFPDF
    60. Effect of Various Attacks on Watermarked Images
    Pages :3582-3587
    Nallagarla.Ramamurthy and Dr.S.Varadarajan
    Abstract | PDFPDF
    61. Secure Data in Wireless Sensor Network via AES
    Pages :3588-3592
    P.D. Khambre ,S.S.Sambhare, P.S. Chavan
    Abstract | PDFPDF
    62. Comparison of Mamdani Fuzzy Model and Neuro Fuzzy Model for Air Conditioning System
    Pages :3593-3596
    Arshdeep Kaur, Amrit Kaur
    Abstract | PDFPDF
    63. Energy Conservation Techniques and Application for Wireless Sensor Networks
    Pages :3597-3602
    M.Chithik Raja
    Abstract | PDFPDF
    64. Emotion Recognition from Speech
    Pages :3603-3607
    K. Sreenivasa Rao, Tummala Pavan Kumar, Kusam Anusha, Bathina Leela, Ingilela Bhavana and
    Singavarapu V.S.K. Gowtham
    Abstract | PDFPDF
    65. Survey for Generating an Ideal Password Authentication Scheme Which Results In Fortification
    of Transport Layer Security Protocol
    Pages :3608-3614
    Kuljeet Kaur ,Dr. G.Geetha
    Abstract | PDFPDF
    66. Attacks Due to SQL Injection & Their Prevention Method for Web-Application
    Pages :3615-3618
    Shubham Srivastava, Rajeev Ranjan Kumar Tripathi
    Abstract | PDFPDF
    67. Dynamic user profiles using fusion of Web Structure ,Web content and Web Usage Mining
    Pages :3619-3621
    Gajendra S.Chandel, Ravindra Gupta, Hemant k. Dhamecha
    Abstract | PDFPDF
    68. Design of a browser for people with low vision
    Pages :3622-3624
    K.Ravindranath,A.Vamsi Krishna, B.Charan Teja, K.Sandeep, P.Karthik
    Abstract | PDFPDF
    69. Improved secured routing in AdhocSensor Network for Emergency Medical Care
    Pages :3625-3631
    Anjani Yalamanchili,DeepthiKethineni, Dukkipati Padma Bhushan
    Abstract | PDFPDF
    70. Database Management System and Information Retrival
    Pages :3632-3637
    B.KiranKumar,S.Durga Prasad, P M Manohar,KVVS SatyaPrakash,M.Chiranjeevi, K.Venkat Kiran
    Abstract | PDFPDF
    71. An Enhanced Data Distribution with Protection of Agent Colluding Attacks
    Pages :3638-3643
    P.Brindha, P.S.Balamurugan, S.Kalai selvi
    Abstract | PDFPDF
    72. A Semi Fragile Image Watermarking Technique Using Block Based SVD
    Pages :3644-3647
    Chitla Arathi
    Abstract | PDFPDF
    73. Three Dimensional Rotation Technique
    Pages :3648-3649
    HamzaContractor , ShoaibInamdar, RohitKandul, Anand Magar
    Abstract | PDFPDF
    74. Spatial Domain Lossless Image Compression Technique by Reducing Overhead Bits and Run
    Length Coding
    Pages :3650-3654
    Mahmud Hasan , Kamruddin Md. Nur , Tanzeem Bin Noor , Hasib Bin Shakur
    Abstract | PDFPDF
    75. A Detailed Study on Semantic Search Performance of Keyword and Meta Search Engines
    Pages :3655-3658
    Rajeev Kumar, Rajat Goel
    Abstract | PDFPDF
    76. Max-min Average Algorithm for Scheduling Tasks in Grid Computing Systems
    Pages :3659-3663
    George Amalarethinam. D.I, Vaaheedha Kfatheen .S
    Abstract | PDFPDF
    77. An Effective Methodology for Pattern Discovery in Web Usage Mining
    Pages :3664-3667
    K Sudheer Reddy, G. Partha Saradhi Varma, M. Kantha Reddy
    Abstract | PDFPDF
    78. A Survey:-Optimize Visual Image Search for Semantic web
    Pages :3668-3671
    Jaimin Shroff , Parth D. Shah , Bhaumik Nagar
    Abstract | PDFPDF
    79. Using Network Security Management to solve Boolean Satisfiability Problem
    Pages :3672-3677
    Mekala Bhaskar, G.VishnuMurthy, V.Amarnath
    Abstract | PDFPDF
    80. Energy Efficiency in IEEE 802.15.4/zigbee Sensor Networks: Cross-layer Approach
    Pages :3678-3682
    N.Gopal Krishna, S.Ganesan, N.Anand Ratnesh, S.Kishore Babu, B.Venkateswara Reddy, B.Naveen Kumar
    Abstract | PDFPDF
    81. Performance Analysis of Open Loop and Closed Loop Power Control Schemes for LTE Uplink
    Pages :3683-3688
    Purnachand S, Rajendra Prasad K, Sripath Roy K, Suresh A
    Abstract | PDFPDF
    82. Web Security by Preventing SQL Injection Using Encryption in Stored Procedures
    Pages :3689-3692
    Deevi Radha Rani, B.Siva Kumar, L.Taraka Rama Rao, V.T.Sai Jagadish, M.Pradeep
    Abstract | PDFPDF
    83. Contribution Based Clustering Technique for Automatic Satellite Image Segmentation
    Pages :3693-3695
    Chandan Kumar Moha nty, Manish Pandey, Arun P. V.
    Abstract | PDFPDF
    84. An Approach of UML for an Elevator System by Implementing Stereotypes
    Pages :3696-3698
    Clarence J M Tauro, N Ganesan2, Rashmi N C, Janet Agnes N C
    Abstract | PDFPDF
    85. Article Removed
    Pages :xxxx-xxxx
    xxxx
    Abstract | PDFPDF
    86. A Strategic Approach for Mapping e-Business Applications in to Cloud and providing Security to e-Busi-Cloud
    Pages :3706-3710
    Veera RaghavaRao Atukuri, VijayaKumar Nukala , R.Siva Rama Prasad
    Abstract | PDFPDF
    87.

    Forecasting for Profitable CRM using Knowledge and Time Management
    Pages :3711-3713
    P. Menaka, k. Thangadurai, M.Uma, M. Punithavalli
    Abstract | PDFPDF

    88. A Robust Tree Quantization Image Watermarking Technique Based on Qualified Significant Even Wavelet Tree (QSEWT)
    Pages :3714-3718
    B.Vijayakumar , V.Vijayakumar, Rajya Lakshmi
    Abstract | PDFPDF
    89. Virtually Integrated Multi Purpose Server
    Pages :3719-3725
    J. Mark Jain, J.Ferlin Getziah , A.Hameeda , N.Naveena , K.Nasren Subaitha Banu
    Abstract | PDFPDF
    90. An Efficient Approach to Secure VPN based on Firewall using IPSec & IPtables
    Pages :3726-3732
    J. Mark Jain ,N. Ayyamari Devi , K. Jancy Rani, A.Meenakshi , S.Balaselvam
    Abstract | PDFPDF
    91. GA-Correlation Based Rule Generation for Expert Systems
    Pages :3733-3736
    Harsh Bhasin, Supreet Singh
    Abstract | PDFPDF
    92. Study of Ensemble Pruning Approaches
    Pages :3737-3742
    Reshma Idresh Lakhani, Arpita Shah, Amit P Ganatra
    Abstract | PDFPDF
    93. Dynamic Intrusion Detection with Data Fusion and Aggregation in High-Security Mobile Ad Hoc
    Networks
    Pages :3743-3748
    T.Kumanan,.K. Duraiswamy
    Abstract | PDFPDF
    94. Designing and Development of a CAN Bus Analyzer for Industrial Applications Using ARM and PIC
    Pages :3749-3753
    Gadireddy Srikanth Kumar
    Abstract | PDFPDF
    95. A Strategic Approach for Bypassing the Intruder and Sending Data to Destination using Three – Tier Framework in Sensor Networks
    Pages :3754-3756
    Veera RaghavaRao Atukuri , Venkata Pavani S , Vasanthi B , Chandrika M , Naga Swetha M
    Abstract | PDFPDF
    96. Digital Image Watermarking for Copyright Protection
    Pages :3757-3760
    Shankar Thawkar
    Abstract | PDFPDF
    97. Monitoring System of Aquiculture with Automatic Control System Using ARM7
    Pages :3761-3764
    Bodepudi SrinivasaRao, U.Jyothi Kameswari
    Abstract | PDFPDF
    98. Quantum Finite Automata, Quantum Pushdown Automata & Quantum Turing Machine: A Study
    Pages :3765-3769
    Tanistha Nayak, Tirtharaj Dash
    Abstract | PDFPDF
    99. Amending Protection and Efficiency in Information Sharing
    Pages :3770-3774
    Vivekananda G.N., Obulesu O
    Abstract | PDFPDF
    100. New Aggregation Operator for Triangular Fuzzy Numbers based on the Arithmetic Means of the Slopes of the L- and R- Membership Functions
    Pages :3775-3777
    Manju Pandey, Nilay Khare, Dr. S.C. Shrivastava
    Abstract | PDFPDF
    101. Intelligent Data Mining in Autonomous Heterogeneous Distributed Bio Databases
    Pages :3778-3781
    T.Hemalatha, B.G.Gowthami, A.Divya Sri, Ch.Sindhuri, Y.SriDivya, B.BhanuVidhyaKiran
    Abstract | PDFPDF
    102. Mobile Ad-Hoc Wireless Network
    Pages :3782-3786
    Krunal N. Chandewar, H.R. Deshmukha
    Abstract | PDFPDF
    103. A Fast Moving Object Detection Technique In Video Surveillance System
    Pages :3787-3792
    Paresh M. Tank, Darshak G. Thakore
    Abstract | PDFPDF
    104. Secure Color Visual Secret Sharing Scheme Using Shifting Coefficient with No Pixel Expansion
    Pages :3793-3800
    John Justin M, Manimurugan S, Alagendran B
    Abstract | PDFPDF
    105. Improved Multilevel Feedback Queue Scheduling Using Dynamic Time Quantum and Its Performance Analysis
    Pages :3801-3807
    H.S. Behera, Reena Kumari Naik, Suchilagna Parida
    Abstract | PDFPDF
    106. Morphological Real Time Video Edge Detection in Labview
    Pages :3808-3811
    Ravi Kumar A.V, Nataraj K.R, Rekha K.R
    Abstract | PDFPDF
    107. Extracting Explanation from Artificial Neural Networks
    Pages :3812-3815
    Koushal Kumar,Gour Sundar Mitra Thakur
    Abstract | PDFPDF
    108. Comparison and Analysis of Drop Tail and RED Queuing Methodology in PIM-DM Multicasting Network
    Pages :3816-3820
    Ashish Kumar , Ajay K Sharma and Arun Singh
    Abstract | PDFPDF
    109. Performance Analysis of Homogeneous and Heterogeneous Systems Using BitTorrent in
    Compeer Networks
    Pages :3821-3824
    K.Thamaraiselvi, P.S.Balamurugan
    Abstract | PDFPDF
    110 Improvement of Noise free Color Video Demosaicking Using Denoising and Iterative Enhanced Demosaicking Algorithm
    Pages :3825-3832
    D.S.Binu Shoba , B.SankaraLakshmi, A.Jayachandran
    Abstract | PDFPDF
    111. Intelligent Traffic
    Pages :3833-3835
    Rishabh Sonthalia, Utsav Salian, Vishal Singh, Dakshata Panchal
    Abstract | PDFPDF
    112. A Multimedia Interactive System
    Pages :3836-3838
    Manjushree Mahajan, Sushma Kate,Sandhya Katkar,Parinita Chinchalikar,Jyoti Hajare
    Abstract | PDFPDF
    113. Simplified Coupling Metrics for Object-Oriented Software
    Pages :3839-3842
    V.S.Bidve , Akhil Khare
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-