bh

 

VOLUME 3 ISSUE 3 May - June 2012

ISSN 0975 - 9646

1.
SEMANTIC WEB and COMPARATIVE ANALYSIS of INFERENCE ENGINES
Pages : 3843-3847
Neha Dalwadi, Bhaumik Nagar, Ashwin Makwana
Abstract | PDFPDF
2
GSM Based LAN Monitoring System
Pages : 3848-3851
Amol Poman,Mahesh Gundras, Prashant Pujari
Abstract | PDFPDF
3
Bandwidth Recycling  in WiMAX Networks
Pages : 3852-3855
Deepak H.L, Shantharam Nayak
Abstract | PDFPDF
4.
A Remote Smart Card Authentication Protocol Using Elliptic Curves
Pages :3856-3866
Ranbir Soram, Rajeev Chatterjee, Durga Prasad Roy, Rupesh Patidar
Abstract | PDFPDF
5.
Intrusion Detection Techniques in Mobile Ad hoc Networks
Pages : 3867-3870
G.L.Anand Bab1, G.Sekhar Redd2, Swathi Agarwal
Abstract | PDFPDF
6.
Design and Implementation of Graphical User Interface for Relational Database Management System
Pages : 3871-3874
Manoj E. Patil,Ravi N. Mulchandani,Ravikumar R. Ahuja
Abstract | PDFPDF

7.

 

Detection and Verification of Program Behaviour- A Graph Grammer Approach
Pages : 3875-3878
M.Sivalakshmi, T.M.Devi, K.AyyappaRaja
Abstract | PDFPDF
8.
Network Performance investigation in Presence of Multiple Vital Node and IDS in MANET
Pages :3879-3883
Ghanshyam Prasad Dubey, Amit Sinhal , Neetesh Gupta
Abstract | PDFPDF
9.
Study and Analysis of Reliable MAC Protocols for Wireless Sensor Networks
Pages : 3884-3887
Umesh Kumar Singh, Kailash Chandra Phuleriya,LokeshLaddhani
Abstract | PDFPDF
10.
Evaluation of Stopping Criterion in Contour Tracing Algorithms
Pages : 3888-3894
P.Rajashekar Reddy, V.Amarnadh, Mekala Bhaskar
Abstract | PDFPDF
11.
Combined Intra-Inter transaction based approach for mining Association among the Sectors in Indian Stock Market
Pages : 3895-3899
Ranjeetsingh B.Parihar ,  Rajesh V. Argiddi,Sulabha S.Apte
Abstract | PDFPDF
12.
Proposing Efficient Neural Network Training Model for Kidney STone Diagnosis
Pages : 3900-3904
Abhishek, Gour Sundar Mitra Thakur,Dolly Gupta
Abstract | PDFPDF
13.
A Novel Method for Secured Communication by Merging Steganography with Encryption Technique
Pages : 3905-3909
Deepa S, Umarani R
Abstract | PDFPDF
14.
Using Propagation Techniques to Enhance Cache Consistency in Wireless Ad-hoc Networks
Pages : 3910-3916
J.Arumai Ruban, D.Selvam, L.Dinesh
Abstract | PDFPDF
15.
Touchpad: A versatile input device
Pages : 3917-3920
Vishal Rathod, Sumeet Chavan, Akshay Londhe, Ashish Kawade, Prajakta Ugale.
Abstract | PDFPDF
16.
Monitoring & Security by Mobile Snapshot Spy
Pages : 3921-3923
Pravin Kamble, Kirti Panmand, Kishor Gaikwad, Nitesh Goyal
Abstract | PDFPDF
17.
CAN Bus Analyzer for Industrial Applications
Pages : 3924-3928
Gadireddy Srikanth Kumar
Abstract | PDFPDF
18.
Blending of Face Segments
Pages : 3929-3933
Akshay Kajekar, Shreyash Patel, Sweta Chauhan, Prashasti Kanikar
Abstract | PDFPDF
19.
Detection of Gallbladder Stone Using Learning Vector Quantization Neural Network
Pages : 3934-3937
Dolly Gupta, Gour Sundar Mitra Thakur, Abhishek
Abstract | PDFPDF
20.
Improved Broadcast Algorithm For Wireless Mesh Networks
Pages : 3938-3941
Saranya.S, T.MOhanRaj, M.Bhanumanthi
Abstract | PDFPDF
21.
An Optimize Decision Tree Algorithm Based on Variable Precision Rough Set Theory Using Degree of β-dependency and Significance of Attributes
Pages : 3942-3947
Rajkumar Sharma, Pranita Jain,Shailendra K.Shrivastava
Abstract | PDFPDF
22.
Content Based Image Retrieval for Brain Scan Images
Pages : 3948-3951
Priyanka Chaurasia, Richa Singh, Qaim Mehdi Rizvi.
Abstract | PDFPDF
23.
Knowledge Discovery in Datamining Using Soft Computing
Pages :3952-3957
K.Suresh,Ch.Jnaneswari,G.Lakshmi Kranthi, K.Bindu
Abstract | PDFPDF
24.
SCADA Based Monitoring and Controlling Using ZIGBEE
Pages : 3958-3961
Sachin Shinde, Rohit Jethmalani, Pankaj Sawant,Adnan Ansari
Abstract | PDFPDF
25.
A Novel Approach for Spoofing Media Access Control Address
Pages :3962-3969
G. Ram Sekhar, Dwarampudi Rajasekhar Reddy, R. Srinivas
Abstract | PDFPDF
26.
Digital Fountain in Data Distribution over Non Ad hoc Network
Pages :3970-3974
Prakhar Srivastava, Shivam Rao, Vinay Kumar Nirmal
Abstract | PDFPDF
27.
An Empirical Study: Musical Influence on Face Using the Local Binary Pattern (LBP) Approach
Pages :3975-3979
AshishA.Bardekar ,V.M.Deshmukh
Abstract | PDFPDF
28.
Article Removed
Pages :xxxx-xxxx
xxxx,xxxx
Abstract | PDFPDF
29.
A Prototype for Secure Web Access Model using Multimodal Biometric System based on Fingerprint and Face Recognition
Pages :3985-3988
D. Gayathri, R. Uma Rani
Abstract | PDFPDF
30.
Speech Recognition System; Challenges and Techniques
Pages :3989-3992
Parneet Kaur, Parminder Singh, Vidushi Garg
Abstract | PDFPDF
31.
Performance Comparison of FFT and DWT based OFDM and Selection of Mother Wavelet for OFDM
Pages :3993-3997
Rohit Bodhe, Shirish Joshi, Satish Narkhede
Abstract | PDFPDF
32.
A Review of Fuzzy Computations
Pages : 3998-4001
S. A. Magdum , Dr R. V. Kulkarni
Abstract | PDFPDF
33.
A Novel Dimension Reduction Technique based on Correlation Coefficient
Pages : 4002-4004
Vinay Soni, Ritesh Joshi
Abstract | PDFPDF
34.
On some classes of Z-bent functions
Pages :4005 - 4009
Anand Joshi, R. K. Sharma
Abstract | PDFPDF
35.
Illumination Invariant Face Recognition System
Pages :4010 - 4014
Haresh D. Chande, Zankhana H. Shah
Abstract | PDFPDF
36.
Fuzzy Principal Component Analysis based Gait Recognition
Pages : 4015 - 4020
G. Venkata Narasimhulu, Dr. S. A. K. Jilani
Abstract | PDFPDF
37.
A Unique Approach to Develop a Band Gap Reference Voltage Chip
Pages : 4021 - 4023
S. Rama Devi, D. Rama Devi
Abstract | PDFPDF
38.
Impact of Training Function Based Neural Network on Reusable Software Modules
Pages :4024 - 4027
Anupama Kaur
Abstract | PDFPDF
39.
The Network and Security Analysis for Wireless Sensor Network : A Survey
Pages :4028 - 4037
Alok Ranjan Prusty
Abstract | PDFPDF
40.
Parallel Lempel-Ziv-Welch (PLZW) Technique for Data Compression
Pages :4038 - 4040
Manas Kumar Mishra, Tapas Kumar Mishra, Alok Kumar Pani
Abstract | PDFPDF
41.
Use of Data Mining & Neural Network in Commercial Application
Pages :4041 - 4049
Vinodini Katiyaar, Ina Kapoor Sharma
Abstract | PDFPDF
42.
Design of Slot Loaded Stacked Wideband Microstrip Patch Antenna for Wireless Communications
Pages :4050-4052
Deepak Shukla, Ram Singh Kushwaha, Archna Sharma, D.K.Srivastava
Abstract | PDFPDF
43.
Efficient QPSK Burst Demodulator for Onboard Application
Pages :4053-4058
Deepak Mishra , K S Dasgupta and S.Jit
Abstract | PDFPDF
44.
Receiver Designing and Channel Estimation
Pages :4059-4063
Deepti Tyagi and Neeraj Prakash Shrivastava
Abstract | PDFPDF
45.
A Review on Image Mining Frameworks and Techniques
Pages :4064-4066
T. Y. Gajjar, N. C. Chauhan
Abstract | PDFPDF
46.
Modified Expanding Ring Search Algorithm for Ad-hoc Networks
Pages :4067-4070
Shweta Mishra, Jyoti Singh, Arti Dixit, Shiva Prakash
Abstract | PDFPDF
47.
Incremental Mining of Association Rules: A Survey
Pages :4071-4074
Siddharth Shah ,N. C. Chauhan,S. D. Bhanderi
Abstract | PDFPDF
48.
Assessing the Guilt Probability in Intentional Data Leakage
Pages :4075-4078
Yadav Gitanjali B., Bhaskar P. C., Dr. Kamat R. K.
Abstract | PDFPDF
49.
Design an Monitoring System of Aquaculture with Multi-Environmental Factors Using ARM7
Pages :4079-4083
Bodepudi SrinivasaRao, U.Jyothi Kameswari
Abstract | PDFPDF
50.
Security Provision in Publicly Auditable Secure Cloud Data Storage Services Using SHA-1 Algorithm
Pages :4084-4088
Akkala.Saibabu, T.Satyanarayana Murthy
Abstract | PDFPDF
51.
Continuous Energy-Efficient Link Assessment in Sensor Networks
Pages :4089-4092
Ramineni Saichand, B.Suvarna
Abstract | PDFPDF
52.
Article Removed
Pages :xxxx-xxxx
xxxxxxxxxx
Abstract | PDFPDF
53.
Cluster Diagnostics and Verification Tool for Effective and Scalable Web Log Analysis
Pages :4097-4100
Shakti Kundu
Abstract | PDFPDF
54.
Virtualization of Multi Server Environment Results in Enhanced Communication and Fortification of Transport Layer Security Protocol
Pages :4101-4108
Kuljeet Kaur ,Dr. G.Geetha
Abstract | PDFPDF
55.
A Novel Architecture Providing Scalable Quality of Service - Adaptive Services
Pages :4109-4112
HarishBabu.Kalidasu , Bhagyalakshmi.Basuvula ,Haripriya.P
Abstract | PDFPDF
56.
Comparative Analysis of Throughput and Dropped rate for Location-Aided Routing Protocol
Pages :4113-4118
Neelima Parsendia, Amit Sinhal
Abstract | PDFPDF
57.
Performance Evaluation of K-Means and Heirarichal Clustering in Terms of Accuracy and
Running Time

Pages :4119-4121
Nidhi Singh,.Divakar Singh
Abstract | PDFPDF
58.
Geometric Routing Protocol based on Genetic Algorithm for Delay Minimization in MANETs
Pages :4122-4126
Sonam Jain, Sandeep Sahu
Abstract | PDFPDF
59.
Design of Leakage Power Reduced Static RAM using LECTOR
Pages :4127-4130
B. Dilip, P. Surya Prasad
Abstract | PDFPDF
60.
A Low Power and High Speed Design for VLSI Logic Circuits Using Multi-Threshold Voltage CMOS Technology
Pages :4131-4133
Phani kumar M, N. Shanmukha Rao
Abstract | PDFPDF
61.
An Optimized Design for Parallel MAC based on Radix-4 MBA
Pages :4134-4138
R.M.N.M.Varaprasad , M.Satyanarayana
Abstract | PDFPDF
62.
A Low Power Area Efficient Design for 1-bit Full Adder Cell
Pages :4139-4142
Manoj Kumar R and Krishna Murthy M
Abstract | PDFPDF
63.
Article removed
Pages :xxxx - xxxx
xxxx
Abstract | PDFPDF
64.
ESD Protected on -Chip Crystal Oscillator
Pages : 4147 - 4150
K. Gowthami, P.U.K. Prabha
Abstract | PDFPDF
65.
An Efficient Image Matching algorithm
Pages : 4151 - 4152
Rajesh Kumar,Anurag Singh Tomar
Abstract | PDFPDF
66.
Study of the Different Types of Coupling Present in the Software Code
Pages : 4153 - 4156
Harjot Singh Virdi, Balraj Singh
Abstract | PDFPDF
67.
Design of an Automated System to Represent Web Requirements Engineering
Pages : 4157 - 4160
Harjot Singh Virdi, Balraj Singh
Abstract | PDFPDF
68.
Evaluation of Mobile nodes over Different Density Models using MANET Routing Protocols
Pages : 4161 - 4165
Shikha Jat, Brajesh Patel
Abstract | PDFPDF
69.
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Pages : 4166 - 4170
Deepak Agrawal, Brajesh Patel
Abstract | PDFPDF
70.
Identification of Energy Consumption Packets in MANET Routing Protocols under CBR and Exponential Traffic Models
Pages : 4171 - 4175
Shailendra Singh Raghuwanshi,Brajesh Patel
Abstract | PDFPDF
71.
Image Enhancement of Normal and Abnormal with Edema Segmentation of Brain MR Images Using Adaptive Wiener Filter
Pages : 4176 - 4181
A.Ramaswamy Reddy, Dr. E.V.Prasad, Dr.L.S.S.Reddy
Abstract | PDFPDF
72.
Powerful Research Documentation Software ‘LaTeX’
Pages : 4182-4184
Sivagaminathan Ganesan
Abstract | PDFPDF
73.
Digital Audio Watermarking for Copyright Protection
Pages : 4185-4188
Chakradhar Kahalkar
Abstract | PDFPDF
74.
Load Flaking on Continuous Monitoring of Spatial Queries
Pages : 4189-4198
Narendra Babu.Pamula,G.Bargavi
Abstract | PDFPDF
75.
Performance Evaluation of Inference Engine in Static and Changeable Environment
Pages : 4199-4201
Ajaysinh Rathod, Bhaumik Nagar, Sachin Sharma
Abstract | PDFPDF
76.
Ant Colony Optimization is the limited case of Prim’s Algorithm
Pages : 4202-4204
Pratibha Raj, Monica Sood
Abstract | PDFPDF
77.
An Adaptive Representation of RFID Data Sets Based on Movement Graph Model
Pages : 4205-4209
M. P. Ravikanth, A. K. Rout
Abstract | PDFPDF
78.
Content Based Recommendation System Using SOM and Latent Dirichlet Allocation Model
Pages : 4210-4215
Amit Kumar Nandanwar, Geetika S. Pandey
Abstract | PDFPDF
79.
Information Hiding in an Image File: Steganography
Pages : 4216-4217
Harsh Prayagi, Tushar Srivastava, Gyanendra Ojha, Sunil Chaurasia
Abstract | PDFPDF
80.
A Novel Approach for an Early Test Case Generation using Genetic Algorithm and Dominance Concept based on Use cases
Pages : 4218-4224
Alekhya Varikuti ,Deepika Puvvula
Abstract | PDFPDF
81.
QoS Based Web Service Selection using Credibility Evaluation
Pages : 4225-4231
Deepika Puvvula, Sai Charan Dhatrika , Alekhya Varikuti
Abstract | PDFPDF
82.
Classification of Text Data by Fuzzy Self-Constructing Feature Clustering Algorithm
Pages : 4232-4236
Y. Ratna Kumari, R. Siva Ranjani
Abstract | PDFPDF
83.
Article Removed
Pages : xxxx-xxxx
xxxx
Abstract | PDFPDF
84. Age identification of Facial Images using Neural Network
Pages : 4244-4247
Sneha Thakur, Ligendra Verma
Abstract | PDFPDF
85. A Preventive Anti-Phishing Technique using code word
Pages : 4248-4250
Madhuresh Mishra, Gaurav, Anurag Jain
Abstract | PDFPDF
86. Securing Information: Cryptography and Steganography
Pages : 4251-4255
Ramakrishna Mathe, Veera RaghavaRao Atukuri, Srinivasa Kumar Devireddy
Abstract | PDFPDF
87. Visual Model for Structured data Extraction Using Position Details
Pages : 4256-4260
B.Venkat Ramana, A.Damodaram
Abstract | PDFPDF
88. Behaviour Analysis of Wireless Ad-Hoc Networks under Different Transmission Rate
Pages : 4261-4264
Madhuri Agrawal, Chirag Sharma, Sheveta Vashisht
Abstract | PDFPDF
89. An advanced and area optimized L.U.T design using A.P.C. and O.M.S
Pages : 4265-4269
K.Sreelakshmi, A.Srinivasa Rao
Abstract | PDFPDF
90. A Low Power DDR SDRAM Controller Design
Pages : 4270-4274
P.Anup, R.Ramana Reddy
Abstract | PDFPDF
91. An Implementation of Open Core Protocol for the On-Chip Bus
Pages : 4275-4278
Ch.Suryanarayana, M.Vinodh kumar
Abstract | PDFPDF
92. Architecture for Securing Virtual Instance in Cloud
Pages : 4279-4282
Krimit Shukla, Harshal Trivedi, Parth Shah
Abstract | PDFPDF
93. Data optimization in speech recognition using Data mining concepts and ANN
Pages : 4283-4286
Navdeep Kaur, Sanjay Kumar Singh
Abstract | PDFPDF
94. Application of incoming SMS to a website, control the website to send bulk SMS
Pages : 4287-4289
Sawal Tandon
Abstract | PDFPDF
95. Effective impact of ECN with RED to control heavy Congestion
Pages : 4290-4293
Shweta Mishra, Nidhi Jain
Abstract | PDFPDF
96. Efficient Multicast for Grid Environment Using Robber and Bit Torrent Protocol
Pages : 4294-4301
V.Matheswaran, S.Usha
Abstract | PDFPDF
97. Cloud Security with Encryption using Hybrid Algorithm and Secured Endpoints
Pages : 4302-4304
Sunita Rani, Ambrish Gangal
Abstract | PDFPDF
98. Compression Method for Handwritten Document Images in Devnagri Script
Pages : 4305-4309
Smita V. Khangar, Latesh G. Malik
Abstract | PDFPDF
99. An automated tool for web site evaluation
Pages : 4310-4313
Sukhpal Kaur
Abstract | PDFPDF
100. Low cost Parallel TCP optical Communication Between Data Centers
Pages : 4314-4317
G. Srinivasa Rao, Ch. Krishna Prasad, G.Vijay kumar
Abstract | PDFPDF
101. The Application of Genetic Algorithm in the design of Routing Protocols in MANETs: A Survey
Pages : 4318-4321
Sonam Jain,Sandeep Sahu
Abstract | PDFPDF
102. Gabor Based Face Recognition Using EBGM and PCA
Pages : 4322-4326
Manan Tiwari
Abstract | PDFPDF
103. A TRUST BASED SCHEME TO ENCOURAGE PACKET FORWARDING IN MOBILE AD-HOC NETWORKS
Pages : 4327-4330
Deepak Kumar Dixit, Praveen Kaushik
Abstract | PDFPDF
104. Reliable Pareto Solutions for Multiple Objective Scheduling Problems
Pages : 4331-4338
Praveen Kumar Malladi, Deepika Puvvula, Anisha Nagalla
Abstract | PDFPDF
105. Achieving a Secure E-Cash System
Pages : 4339-4340
Swati Rana, Gaurav Chaudhry
Abstract | PDFPDF
106. Network Coding Based Virtual Backbone for Wireless Sensor Network
Pages : 4341-4344
Ramakant Sharma, Praveen Kaushik
Abstract | PDFPDF
107. An efficient dynamic approach for exact reconstruction for CT image application
Pages : 4345-4349
S.Asif Hussain, P.Syamala Devi, C.Hemanth
Abstract | PDFPDF
108. Energy Efficient Routing Algorithm with sleep scheduling in Wireless Sensor Network
Pages : 4350-4353
Subhash Dhar Dwivedi, Praveen Kaushik
Abstract | PDFPDF
109. A Complete Design of Advanced embedded chatter box for physically challenging persons
Pages : 4354-4358
Dharani Kumar Chowdary.M, Naresh Kumar Reddy.Beechu, G.Subrahmanya Sharma
Abstract | PDFPDF
110. Implementation of Nth Order Bandpass filter
Pages : 4359-4361
S.Shirin, CH.R.Phani Kumar
Abstract | PDFPDF
111. Proposed A Robust Trust Model for Reliable and Secure Transactions in Grid Computing
Pages : 4362-4365
Biswajit Upadhyay, Abhishek Bandyopadhyay, Avijit Bhowmick
Abstract | PDFPDF
112. Combine use of Steganography and Visual Cryptography for Secured Data hiding in Computer Forensics
Pages : 4366-4370
Ravindra Gupta, Akanksha Jain, Gajendra Singh
Abstract | PDFPDF
113. An innovative Algorithm for Flash memory
Pages : 4371-4376
M. N. Kale, A. S. Jahagirdar
Abstract | PDFPDF
114. Design and Development of M learning standard for content portability: Overview and case study
Pages : 4377-4380
Chandni Sharma, Parmeet Kaur Grewal
Abstract | PDFPDF
115. Adaptive Algorithm for Cyber Crime Detection
Pages : 4381-4384
Manveer Kaur, Sheveta Vashisht, Kumar Saurabh
Abstract | PDFPDF
116. Hash Table Based Word Searching Algorithm
Pages :4385 - 4388
Sanket Jain, Manish Pandey
Abstract | PDFPDF
117. Handwriting Characterization of Neurodegenerative diseases
Pages : 4389 - 4391
Jammi Ashok, Alekhya Guduri, O.Nitya Sarayu
Abstract | PDFPDF
118. A Novel Approach Based Image Tracing
Pages : 4392- 4395
K.Satish Babu, Y N Supraja, S.Karunakar Reddy
Abstract | PDFPDF
119. Enhancing Functioning of WSAN for Road Surveillance
Pages : 4396 - 4399
Roma Kudale, Rachana Satao
Abstract | PDFPDF
120. Enhancing Security in Software development life cycle
Pages : 4400 - 4403
Chandana Das, Pardeep Kumar Sharma
Abstract | PDFPDF
121. Performance Evolution of Heart Sound Information Retrievel System in Multicore Environment
Pages : 4404 - 4407
Amrita Maity, P. Sivakumar, M Rajasekhara Babu, Ch. Pradeep Reddy
Abstract | PDFPDF
122. Very Low Resolution Face Recognition In Parallel Environment
Pages : 4408 - 4410
Debabrata Chowdhuri, Sendhil Kumar K.S., M Rajasekhara Babu, Ch. Pradeep Reddy
Abstract | PDFPDF
123. A Compression Algorithm for Nucleotide Data Based on Differential Direct Coding and Variable Length Look up Table (LUT)
Pages : 4411- 4416
Govind Prasad Arya, R. K. Bharti
Abstract | PDFPDF
124. Design and analysis of E-learning content in accordance with SCORM
Pages : 4417 - 4420
Shaveta Bhambi, Balwant ram
Abstract | PDFPDF
125. Design of Keyed Secure 256Bit Chaotic Hash Function
Pages : 4421 - 4426
SambasivaRaoMeduri,Srinivasareddy Ogirala B.Tirapathi Reddy
Abstract | PDFPDF
126. Windows Registry Forensics: An Imperative Step in Tracking Data Theft via USB Devices
Pages : 4427- 4433
Tanushree Roy, Aruna Jain
Abstract | PDFPDF
127. Predictive Analytics: A Survey, Trends,Applications, Oppurtunities & Challenges
Pages : 4434- 4438
Nishchol Mishra, Sanjay Silakari
Abstract | PDFPDF
128. Wireless Telecommunications Call Records Data warehouse ETL Flows
Pages : 4439 - 4442
K.Srikanth, N.V.E.S.Murthy, J.Anitha
Abstract | PDFPDF
129. Implementation of Optimized Reconfigurable Built-In Self-Repair Scheme for RAMs In SOCs
Pages : 4443 - 4446
Venkatesh S, Laxmi Prasanna Rani M
Abstract | PDFPDF
130. Transistor Implementation of Reversible Comparator Circuit Using Low Power Technique
Pages : 4447 - 4452
Madhina Basha, V.N.Lakshmana Kumar
Abstract | PDFPDF
131. Logical Supportive Interface to Hardware Description for Analog Design Interface
Pages : 4453 - 4459
R.Prakash Rao, B.K.Madhavi
Abstract | PDFPDF
132. A Vision based Application for Virtual Mouse Interface Using Finger-Tip
Pages : 4460 - 4464
K S Chidanand Kumar
Abstract | PDFPDF
133. Dispatcher algorithm for effective resource utilization of server using volunteer computing: A case study
Pages : 4465 - 4468
Jayaram C V, Rampur Srinath
Abstract | PDFPDF
134. Analyzing the biosignal to make fatigue measurement as a parameter for mood detection
Pages : 4469 - 4472
Suwarna Hajare, Chhaya Dule
Abstract | PDFPDF
135. Performance Analysis of Adaptive Dynamic Load Balancing in Grid Environment using GRIDSIM
Pages : 4473 - 4479
Pawandeep Kaur, Harshpreet Singh
Abstract | PDFPDF
136. Developing Decision Trees for Handling Uncertain Data
Pages : 4480 - 4485
P. Satya Prakash, P. Jhansi Lakshmi, B.L Krishna
Abstract | PDFPDF
137. Article Removed
Pages : xxxx - xxxx
xxx, xxxx, xxx
Abstract | PDFPDF
138. Combination of Density Based and Partition Based Clustering Algorithm-DBK Means
Pages : 4491 - 4494
B.L. Krishna, P.Jhansi Lakshmi , P.Satya Prakash
Abstract | PDFPDF
139. Code Compression Algorithm for High Performance Micro Processor
Pages : 4495 - 4498
S.Sekhar dileep kumar, K.Rakesh
Abstract | PDFPDF
140. Application of Elliptic Curve Method in Cryptography: A Literature Review
Pages : 4499 - 4503
Samta Gajbhiy e,Dr. Sanjeev Karmakar, D r. Monisha Sharma,Dr. Sanjay Sharma, Dr. M K Kowar
Abstract | PDFPDF
141. Decision Theoretic in SQL to Prepare Data Sets for Data Mining Analysis
Pages : 4504-4507
Venkata Changal Rao , T. Rajesh, Sk. Karimulla
Abstract | PDFPDF
142. A Novel Method for Divide and Convergent Coherent Mechanism in Cloud Computing
Pages : 4508-4513
Amena Nasreen, SK.Haseena, G.Srinivasa Rao
Abstract | PDFPDF
143. Cloud Security Challenges
Pages : 4514-4515
Juhi Sharma , Kshitiz Saxena
Abstract | PDFPDF
144. Denial of Service Attacks in Wireless Mesh Networks
Pages : 4516-4522
Monika
Abstract | PDFPDF
145. An Effectual Defense Method against Gray Hole Attack in Wireless Sensor Networks
Pages : 4523-4528
Jaspreet Kaur, Vinod Kumar
Abstract | PDFPDF
146. An Expert System for Advising Postgraduate Students
Pages : 4529-4532
Dr. Abdullah Al-Ghamdi, Sumaia Al-Ghuribi ,Arwa Fadel,Fatima Al-Aswadi ,Thamary AL-Ruhaili
Abstract | PDFPDF
147. Research Challenges in Extracting Personal Name Pseudonyms from the Web
Pages : 4533-4542
Sivagaminathan Ganesan
Abstract | PDFPDF
148. Opportunities, Concerns and Challenges in the Adoption of Cloud Storage
Pages : 4543-4548
Indu Arora, Dr. Anu Gupta
Abstract | PDFPDF
149. Uncertain Numerical Data Clustering with VORONOI Diagram and R-Tree with Ensemble SVM
Pages : 4549-4552
D. M. Padulkar, V. Z. Attar
Abstract | PDFPDF
150. Resolving Referential Ambiguity on the Web Using Higher Order Co-occurrences in Anchor-Texts
Pages : 4553-4557
Rama.K, Sridevi.M, Vishnu Murthy.G
Abstract | PDFPDF

151.

 

Discovery of Preliminary Centroids Using Improved K- Means Clustering Algorithm
Pages : 4558-4561
N. Koteswara Rao, G. Sridhar Reddy
Abstract | PDFPDF
-All rights are reserved by International Journal of Computer Science and Information Technologies-