• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 3 ISSUE 3 May - June 2012

    ISSN 0975 - 9646

    1.
    SEMANTIC WEB and COMPARATIVE ANALYSIS of INFERENCE ENGINES
    Pages : 3843-3847
    Neha Dalwadi, Bhaumik Nagar, Ashwin Makwana
    Abstract | PDFPDF
    2
    GSM Based LAN Monitoring System
    Pages : 3848-3851
    Amol Poman,Mahesh Gundras, Prashant Pujari
    Abstract | PDFPDF
    3
    Bandwidth Recycling  in WiMAX Networks
    Pages : 3852-3855
    Deepak H.L, Shantharam Nayak
    Abstract | PDFPDF
    4.
    A Remote Smart Card Authentication Protocol Using Elliptic Curves
    Pages :3856-3866
    Ranbir Soram, Rajeev Chatterjee, Durga Prasad Roy, Rupesh Patidar
    Abstract | PDFPDF
    5.
    Intrusion Detection Techniques in Mobile Ad hoc Networks
    Pages : 3867-3870
    G.L.Anand Bab1, G.Sekhar Redd2, Swathi Agarwal
    Abstract | PDFPDF
    6.
    Design and Implementation of Graphical User Interface for Relational Database Management System
    Pages : 3871-3874
    Manoj E. Patil,Ravi N. Mulchandani,Ravikumar R. Ahuja
    Abstract | PDFPDF

    7.

     

    Detection and Verification of Program Behaviour- A Graph Grammer Approach
    Pages : 3875-3878
    M.Sivalakshmi, T.M.Devi, K.AyyappaRaja
    Abstract | PDFPDF
    8.
    Network Performance investigation in Presence of Multiple Vital Node and IDS in MANET
    Pages :3879-3883
    Ghanshyam Prasad Dubey, Amit Sinhal , Neetesh Gupta
    Abstract | PDFPDF
    9.
    Study and Analysis of Reliable MAC Protocols for Wireless Sensor Networks
    Pages : 3884-3887
    Umesh Kumar Singh, Kailash Chandra Phuleriya,LokeshLaddhani
    Abstract | PDFPDF
    10.
    Evaluation of Stopping Criterion in Contour Tracing Algorithms
    Pages : 3888-3894
    P.Rajashekar Reddy, V.Amarnadh, Mekala Bhaskar
    Abstract | PDFPDF
    11.
    Combined Intra-Inter transaction based approach for mining Association among the Sectors in Indian Stock Market
    Pages : 3895-3899
    Ranjeetsingh B.Parihar ,  Rajesh V. Argiddi,Sulabha S.Apte
    Abstract | PDFPDF
    12.
    Proposing Efficient Neural Network Training Model for Kidney STone Diagnosis
    Pages : 3900-3904
    Abhishek, Gour Sundar Mitra Thakur,Dolly Gupta
    Abstract | PDFPDF
    13.
    A Novel Method for Secured Communication by Merging Steganography with Encryption Technique
    Pages : 3905-3909
    Deepa S, Umarani R
    Abstract | PDFPDF
    14.
    Using Propagation Techniques to Enhance Cache Consistency in Wireless Ad-hoc Networks
    Pages : 3910-3916
    J.Arumai Ruban, D.Selvam, L.Dinesh
    Abstract | PDFPDF
    15.
    Touchpad: A versatile input device
    Pages : 3917-3920
    Vishal Rathod, Sumeet Chavan, Akshay Londhe, Ashish Kawade, Prajakta Ugale.
    Abstract | PDFPDF
    16.
    Monitoring & Security by Mobile Snapshot Spy
    Pages : 3921-3923
    Pravin Kamble, Kirti Panmand, Kishor Gaikwad, Nitesh Goyal
    Abstract | PDFPDF
    17.
    CAN Bus Analyzer for Industrial Applications
    Pages : 3924-3928
    Gadireddy Srikanth Kumar
    Abstract | PDFPDF
    18.
    Blending of Face Segments
    Pages : 3929-3933
    Akshay Kajekar, Shreyash Patel, Sweta Chauhan, Prashasti Kanikar
    Abstract | PDFPDF
    19.
    Detection of Gallbladder Stone Using Learning Vector Quantization Neural Network
    Pages : 3934-3937
    Dolly Gupta, Gour Sundar Mitra Thakur, Abhishek
    Abstract | PDFPDF
    20.
    Improved Broadcast Algorithm For Wireless Mesh Networks
    Pages : 3938-3941
    Saranya.S, T.MOhanRaj, M.Bhanumanthi
    Abstract | PDFPDF
    21.
    An Optimize Decision Tree Algorithm Based on Variable Precision Rough Set Theory Using Degree of β-dependency and Significance of Attributes
    Pages : 3942-3947
    Rajkumar Sharma, Pranita Jain,Shailendra K.Shrivastava
    Abstract | PDFPDF
    22.
    Content Based Image Retrieval for Brain Scan Images
    Pages : 3948-3951
    Priyanka Chaurasia, Richa Singh, Qaim Mehdi Rizvi.
    Abstract | PDFPDF
    23.
    Knowledge Discovery in Datamining Using Soft Computing
    Pages :3952-3957
    K.Suresh,Ch.Jnaneswari,G.Lakshmi Kranthi, K.Bindu
    Abstract | PDFPDF
    24.
    SCADA Based Monitoring and Controlling Using ZIGBEE
    Pages : 3958-3961
    Sachin Shinde, Rohit Jethmalani, Pankaj Sawant,Adnan Ansari
    Abstract | PDFPDF
    25.
    A Novel Approach for Spoofing Media Access Control Address
    Pages :3962-3969
    G. Ram Sekhar, Dwarampudi Rajasekhar Reddy, R. Srinivas
    Abstract | PDFPDF
    26.
    Digital Fountain in Data Distribution over Non Ad hoc Network
    Pages :3970-3974
    Prakhar Srivastava, Shivam Rao, Vinay Kumar Nirmal
    Abstract | PDFPDF
    27.
    An Empirical Study: Musical Influence on Face Using the Local Binary Pattern (LBP) Approach
    Pages :3975-3979
    AshishA.Bardekar ,V.M.Deshmukh
    Abstract | PDFPDF
    28.
    Article Removed
    Pages :xxxx-xxxx
    xxxx,xxxx
    Abstract | PDFPDF
    29.
    A Prototype for Secure Web Access Model using Multimodal Biometric System based on Fingerprint and Face Recognition
    Pages :3985-3988
    D. Gayathri, R. Uma Rani
    Abstract | PDFPDF
    30.
    Speech Recognition System; Challenges and Techniques
    Pages :3989-3992
    Parneet Kaur, Parminder Singh, Vidushi Garg
    Abstract | PDFPDF
    31.
    Performance Comparison of FFT and DWT based OFDM and Selection of Mother Wavelet for OFDM
    Pages :3993-3997
    Rohit Bodhe, Shirish Joshi, Satish Narkhede
    Abstract | PDFPDF
    32.
    A Review of Fuzzy Computations
    Pages : 3998-4001
    S. A. Magdum , Dr R. V. Kulkarni
    Abstract | PDFPDF
    33.
    A Novel Dimension Reduction Technique based on Correlation Coefficient
    Pages : 4002-4004
    Vinay Soni, Ritesh Joshi
    Abstract | PDFPDF
    34.
    On some classes of Z-bent functions
    Pages :4005 - 4009
    Anand Joshi, R. K. Sharma
    Abstract | PDFPDF
    35.
    Illumination Invariant Face Recognition System
    Pages :4010 - 4014
    Haresh D. Chande, Zankhana H. Shah
    Abstract | PDFPDF
    36.
    Fuzzy Principal Component Analysis based Gait Recognition
    Pages : 4015 - 4020
    G. Venkata Narasimhulu, Dr. S. A. K. Jilani
    Abstract | PDFPDF
    37.
    A Unique Approach to Develop a Band Gap Reference Voltage Chip
    Pages : 4021 - 4023
    S. Rama Devi, D. Rama Devi
    Abstract | PDFPDF
    38.
    Impact of Training Function Based Neural Network on Reusable Software Modules
    Pages :4024 - 4027
    Anupama Kaur
    Abstract | PDFPDF
    39.
    The Network and Security Analysis for Wireless Sensor Network : A Survey
    Pages :4028 - 4037
    Alok Ranjan Prusty
    Abstract | PDFPDF
    40.
    Parallel Lempel-Ziv-Welch (PLZW) Technique for Data Compression
    Pages :4038 - 4040
    Manas Kumar Mishra, Tapas Kumar Mishra, Alok Kumar Pani
    Abstract | PDFPDF
    41.
    Use of Data Mining & Neural Network in Commercial Application
    Pages :4041 - 4049
    Vinodini Katiyaar, Ina Kapoor Sharma
    Abstract | PDFPDF
    42.
    Design of Slot Loaded Stacked Wideband Microstrip Patch Antenna for Wireless Communications
    Pages :4050-4052
    Deepak Shukla, Ram Singh Kushwaha, Archna Sharma, D.K.Srivastava
    Abstract | PDFPDF
    43.
    Efficient QPSK Burst Demodulator for Onboard Application
    Pages :4053-4058
    Deepak Mishra , K S Dasgupta and S.Jit
    Abstract | PDFPDF
    44.
    Receiver Designing and Channel Estimation
    Pages :4059-4063
    Deepti Tyagi and Neeraj Prakash Shrivastava
    Abstract | PDFPDF
    45.
    A Review on Image Mining Frameworks and Techniques
    Pages :4064-4066
    T. Y. Gajjar, N. C. Chauhan
    Abstract | PDFPDF
    46.
    Modified Expanding Ring Search Algorithm for Ad-hoc Networks
    Pages :4067-4070
    Shweta Mishra, Jyoti Singh, Arti Dixit, Shiva Prakash
    Abstract | PDFPDF
    47.
    Incremental Mining of Association Rules: A Survey
    Pages :4071-4074
    Siddharth Shah ,N. C. Chauhan,S. D. Bhanderi
    Abstract | PDFPDF
    48.
    Assessing the Guilt Probability in Intentional Data Leakage
    Pages :4075-4078
    Yadav Gitanjali B., Bhaskar P. C., Dr. Kamat R. K.
    Abstract | PDFPDF
    49.
    Design an Monitoring System of Aquaculture with Multi-Environmental Factors Using ARM7
    Pages :4079-4083
    Bodepudi SrinivasaRao, U.Jyothi Kameswari
    Abstract | PDFPDF
    50.
    Security Provision in Publicly Auditable Secure Cloud Data Storage Services Using SHA-1 Algorithm
    Pages :4084-4088
    Akkala.Saibabu, T.Satyanarayana Murthy
    Abstract | PDFPDF
    51.
    Continuous Energy-Efficient Link Assessment in Sensor Networks
    Pages :4089-4092
    Ramineni Saichand, B.Suvarna
    Abstract | PDFPDF
    52.
    Article Removed
    Pages :xxxx-xxxx
    xxxxxxxxxx
    Abstract | PDFPDF
    53.
    Cluster Diagnostics and Verification Tool for Effective and Scalable Web Log Analysis
    Pages :4097-4100
    Shakti Kundu
    Abstract | PDFPDF
    54.
    Virtualization of Multi Server Environment Results in Enhanced Communication and Fortification of Transport Layer Security Protocol
    Pages :4101-4108
    Kuljeet Kaur ,Dr. G.Geetha
    Abstract | PDFPDF
    55.
    A Novel Architecture Providing Scalable Quality of Service - Adaptive Services
    Pages :4109-4112
    HarishBabu.Kalidasu , Bhagyalakshmi.Basuvula ,Haripriya.P
    Abstract | PDFPDF
    56.
    Comparative Analysis of Throughput and Dropped rate for Location-Aided Routing Protocol
    Pages :4113-4118
    Neelima Parsendia, Amit Sinhal
    Abstract | PDFPDF
    57.
    Performance Evaluation of K-Means and Heirarichal Clustering in Terms of Accuracy and
    Running Time

    Pages :4119-4121
    Nidhi Singh,.Divakar Singh
    Abstract | PDFPDF
    58.
    Geometric Routing Protocol based on Genetic Algorithm for Delay Minimization in MANETs
    Pages :4122-4126
    Sonam Jain, Sandeep Sahu
    Abstract | PDFPDF
    59.
    Design of Leakage Power Reduced Static RAM using LECTOR
    Pages :4127-4130
    B. Dilip, P. Surya Prasad
    Abstract | PDFPDF
    60.
    A Low Power and High Speed Design for VLSI Logic Circuits Using Multi-Threshold Voltage CMOS Technology
    Pages :4131-4133
    Phani kumar M, N. Shanmukha Rao
    Abstract | PDFPDF
    61.
    An Optimized Design for Parallel MAC based on Radix-4 MBA
    Pages :4134-4138
    R.M.N.M.Varaprasad , M.Satyanarayana
    Abstract | PDFPDF
    62.
    A Low Power Area Efficient Design for 1-bit Full Adder Cell
    Pages :4139-4142
    Manoj Kumar R and Krishna Murthy M
    Abstract | PDFPDF
    63.
    Article removed
    Pages :xxxx - xxxx
    xxxx
    Abstract | PDFPDF
    64.
    ESD Protected on -Chip Crystal Oscillator
    Pages : 4147 - 4150
    K. Gowthami, P.U.K. Prabha
    Abstract | PDFPDF
    65.
    An Efficient Image Matching algorithm
    Pages : 4151 - 4152
    Rajesh Kumar,Anurag Singh Tomar
    Abstract | PDFPDF
    66.
    Study of the Different Types of Coupling Present in the Software Code
    Pages : 4153 - 4156
    Harjot Singh Virdi, Balraj Singh
    Abstract | PDFPDF
    67.
    Design of an Automated System to Represent Web Requirements Engineering
    Pages : 4157 - 4160
    Harjot Singh Virdi, Balraj Singh
    Abstract | PDFPDF
    68.
    Evaluation of Mobile nodes over Different Density Models using MANET Routing Protocols
    Pages : 4161 - 4165
    Shikha Jat, Brajesh Patel
    Abstract | PDFPDF
    69.
    Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
    Pages : 4166 - 4170
    Deepak Agrawal, Brajesh Patel
    Abstract | PDFPDF
    70.
    Identification of Energy Consumption Packets in MANET Routing Protocols under CBR and Exponential Traffic Models
    Pages : 4171 - 4175
    Shailendra Singh Raghuwanshi,Brajesh Patel
    Abstract | PDFPDF
    71.
    Image Enhancement of Normal and Abnormal with Edema Segmentation of Brain MR Images Using Adaptive Wiener Filter
    Pages : 4176 - 4181
    A.Ramaswamy Reddy, Dr. E.V.Prasad, Dr.L.S.S.Reddy
    Abstract | PDFPDF
    72.
    Powerful Research Documentation Software ‘LaTeX’
    Pages : 4182-4184
    Sivagaminathan Ganesan
    Abstract | PDFPDF
    73.
    Digital Audio Watermarking for Copyright Protection
    Pages : 4185-4188
    Chakradhar Kahalkar
    Abstract | PDFPDF
    74.
    Load Flaking on Continuous Monitoring of Spatial Queries
    Pages : 4189-4198
    Narendra Babu.Pamula,G.Bargavi
    Abstract | PDFPDF
    75.
    Performance Evaluation of Inference Engine in Static and Changeable Environment
    Pages : 4199-4201
    Ajaysinh Rathod, Bhaumik Nagar, Sachin Sharma
    Abstract | PDFPDF
    76.
    Ant Colony Optimization is the limited case of Prim’s Algorithm
    Pages : 4202-4204
    Pratibha Raj, Monica Sood
    Abstract | PDFPDF
    77.
    An Adaptive Representation of RFID Data Sets Based on Movement Graph Model
    Pages : 4205-4209
    M. P. Ravikanth, A. K. Rout
    Abstract | PDFPDF
    78.
    Content Based Recommendation System Using SOM and Latent Dirichlet Allocation Model
    Pages : 4210-4215
    Amit Kumar Nandanwar, Geetika S. Pandey
    Abstract | PDFPDF
    79.
    Information Hiding in an Image File: Steganography
    Pages : 4216-4217
    Harsh Prayagi, Tushar Srivastava, Gyanendra Ojha, Sunil Chaurasia
    Abstract | PDFPDF
    80.
    A Novel Approach for an Early Test Case Generation using Genetic Algorithm and Dominance Concept based on Use cases
    Pages : 4218-4224
    Alekhya Varikuti ,Deepika Puvvula
    Abstract | PDFPDF
    81.
    QoS Based Web Service Selection using Credibility Evaluation
    Pages : 4225-4231
    Deepika Puvvula, Sai Charan Dhatrika , Alekhya Varikuti
    Abstract | PDFPDF
    82.
    Classification of Text Data by Fuzzy Self-Constructing Feature Clustering Algorithm
    Pages : 4232-4236
    Y. Ratna Kumari, R. Siva Ranjani
    Abstract | PDFPDF
    83.
    Article Removed
    Pages : xxxx-xxxx
    xxxx
    Abstract | PDFPDF
    84. Age identification of Facial Images using Neural Network
    Pages : 4244-4247
    Sneha Thakur, Ligendra Verma
    Abstract | PDFPDF
    85. A Preventive Anti-Phishing Technique using code word
    Pages : 4248-4250
    Madhuresh Mishra, Gaurav, Anurag Jain
    Abstract | PDFPDF
    86. Securing Information: Cryptography and Steganography
    Pages : 4251-4255
    Ramakrishna Mathe, Veera RaghavaRao Atukuri, Srinivasa Kumar Devireddy
    Abstract | PDFPDF
    87. Visual Model for Structured data Extraction Using Position Details
    Pages : 4256-4260
    B.Venkat Ramana, A.Damodaram
    Abstract | PDFPDF
    88. Behaviour Analysis of Wireless Ad-Hoc Networks under Different Transmission Rate
    Pages : 4261-4264
    Madhuri Agrawal, Chirag Sharma, Sheveta Vashisht
    Abstract | PDFPDF
    89. An advanced and area optimized L.U.T design using A.P.C. and O.M.S
    Pages : 4265-4269
    K.Sreelakshmi, A.Srinivasa Rao
    Abstract | PDFPDF
    90. A Low Power DDR SDRAM Controller Design
    Pages : 4270-4274
    P.Anup, R.Ramana Reddy
    Abstract | PDFPDF
    91. An Implementation of Open Core Protocol for the On-Chip Bus
    Pages : 4275-4278
    Ch.Suryanarayana, M.Vinodh kumar
    Abstract | PDFPDF
    92. Architecture for Securing Virtual Instance in Cloud
    Pages : 4279-4282
    Krimit Shukla, Harshal Trivedi, Parth Shah
    Abstract | PDFPDF
    93. Data optimization in speech recognition using Data mining concepts and ANN
    Pages : 4283-4286
    Navdeep Kaur, Sanjay Kumar Singh
    Abstract | PDFPDF
    94. Application of incoming SMS to a website, control the website to send bulk SMS
    Pages : 4287-4289
    Sawal Tandon
    Abstract | PDFPDF
    95. Effective impact of ECN with RED to control heavy Congestion
    Pages : 4290-4293
    Shweta Mishra, Nidhi Jain
    Abstract | PDFPDF
    96. Efficient Multicast for Grid Environment Using Robber and Bit Torrent Protocol
    Pages : 4294-4301
    V.Matheswaran, S.Usha
    Abstract | PDFPDF
    97. Cloud Security with Encryption using Hybrid Algorithm and Secured Endpoints
    Pages : 4302-4304
    Sunita Rani, Ambrish Gangal
    Abstract | PDFPDF
    98. Compression Method for Handwritten Document Images in Devnagri Script
    Pages : 4305-4309
    Smita V. Khangar, Latesh G. Malik
    Abstract | PDFPDF
    99. An automated tool for web site evaluation
    Pages : 4310-4313
    Sukhpal Kaur
    Abstract | PDFPDF
    100. Low cost Parallel TCP optical Communication Between Data Centers
    Pages : 4314-4317
    G. Srinivasa Rao, Ch. Krishna Prasad, G.Vijay kumar
    Abstract | PDFPDF
    101. The Application of Genetic Algorithm in the design of Routing Protocols in MANETs: A Survey
    Pages : 4318-4321
    Sonam Jain,Sandeep Sahu
    Abstract | PDFPDF
    102. Gabor Based Face Recognition Using EBGM and PCA
    Pages : 4322-4326
    Manan Tiwari
    Abstract | PDFPDF
    103. A TRUST BASED SCHEME TO ENCOURAGE PACKET FORWARDING IN MOBILE AD-HOC NETWORKS
    Pages : 4327-4330
    Deepak Kumar Dixit, Praveen Kaushik
    Abstract | PDFPDF
    104. Reliable Pareto Solutions for Multiple Objective Scheduling Problems
    Pages : 4331-4338
    Praveen Kumar Malladi, Deepika Puvvula, Anisha Nagalla
    Abstract | PDFPDF
    105. Achieving a Secure E-Cash System
    Pages : 4339-4340
    Swati Rana, Gaurav Chaudhry
    Abstract | PDFPDF
    106. Network Coding Based Virtual Backbone for Wireless Sensor Network
    Pages : 4341-4344
    Ramakant Sharma, Praveen Kaushik
    Abstract | PDFPDF
    107. An efficient dynamic approach for exact reconstruction for CT image application
    Pages : 4345-4349
    S.Asif Hussain, P.Syamala Devi, C.Hemanth
    Abstract | PDFPDF
    108. Energy Efficient Routing Algorithm with sleep scheduling in Wireless Sensor Network
    Pages : 4350-4353
    Subhash Dhar Dwivedi, Praveen Kaushik
    Abstract | PDFPDF
    109. A Complete Design of Advanced embedded chatter box for physically challenging persons
    Pages : 4354-4358
    Dharani Kumar Chowdary.M, Naresh Kumar Reddy.Beechu, G.Subrahmanya Sharma
    Abstract | PDFPDF
    110. Implementation of Nth Order Bandpass filter
    Pages : 4359-4361
    S.Shirin, CH.R.Phani Kumar
    Abstract | PDFPDF
    111. Proposed A Robust Trust Model for Reliable and Secure Transactions in Grid Computing
    Pages : 4362-4365
    Biswajit Upadhyay, Abhishek Bandyopadhyay, Avijit Bhowmick
    Abstract | PDFPDF
    112. Combine use of Steganography and Visual Cryptography for Secured Data hiding in Computer Forensics
    Pages : 4366-4370
    Ravindra Gupta, Akanksha Jain, Gajendra Singh
    Abstract | PDFPDF
    113. An innovative Algorithm for Flash memory
    Pages : 4371-4376
    M. N. Kale, A. S. Jahagirdar
    Abstract | PDFPDF
    114. Design and Development of M learning standard for content portability: Overview and case study
    Pages : 4377-4380
    Chandni Sharma, Parmeet Kaur Grewal
    Abstract | PDFPDF
    115. Adaptive Algorithm for Cyber Crime Detection
    Pages : 4381-4384
    Manveer Kaur, Sheveta Vashisht, Kumar Saurabh
    Abstract | PDFPDF
    116. Hash Table Based Word Searching Algorithm
    Pages :4385 - 4388
    Sanket Jain, Manish Pandey
    Abstract | PDFPDF
    117. Handwriting Characterization of Neurodegenerative diseases
    Pages : 4389 - 4391
    Jammi Ashok, Alekhya Guduri, O.Nitya Sarayu
    Abstract | PDFPDF
    118. A Novel Approach Based Image Tracing
    Pages : 4392- 4395
    K.Satish Babu, Y N Supraja, S.Karunakar Reddy
    Abstract | PDFPDF
    119. Enhancing Functioning of WSAN for Road Surveillance
    Pages : 4396 - 4399
    Roma Kudale, Rachana Satao
    Abstract | PDFPDF
    120. Enhancing Security in Software development life cycle
    Pages : 4400 - 4403
    Chandana Das, Pardeep Kumar Sharma
    Abstract | PDFPDF
    121. Performance Evolution of Heart Sound Information Retrievel System in Multicore Environment
    Pages : 4404 - 4407
    Amrita Maity, P. Sivakumar, M Rajasekhara Babu, Ch. Pradeep Reddy
    Abstract | PDFPDF
    122. Very Low Resolution Face Recognition In Parallel Environment
    Pages : 4408 - 4410
    Debabrata Chowdhuri, Sendhil Kumar K.S., M Rajasekhara Babu, Ch. Pradeep Reddy
    Abstract | PDFPDF
    123. A Compression Algorithm for Nucleotide Data Based on Differential Direct Coding and Variable Length Look up Table (LUT)
    Pages : 4411- 4416
    Govind Prasad Arya, R. K. Bharti
    Abstract | PDFPDF
    124. Design and analysis of E-learning content in accordance with SCORM
    Pages : 4417 - 4420
    Shaveta Bhambi, Balwant ram
    Abstract | PDFPDF
    125. Design of Keyed Secure 256Bit Chaotic Hash Function
    Pages : 4421 - 4426
    SambasivaRaoMeduri,Srinivasareddy Ogirala B.Tirapathi Reddy
    Abstract | PDFPDF
    126. Windows Registry Forensics: An Imperative Step in Tracking Data Theft via USB Devices
    Pages : 4427- 4433
    Tanushree Roy, Aruna Jain
    Abstract | PDFPDF
    127. Predictive Analytics: A Survey, Trends,Applications, Oppurtunities & Challenges
    Pages : 4434- 4438
    Nishchol Mishra, Sanjay Silakari
    Abstract | PDFPDF
    128. Wireless Telecommunications Call Records Data warehouse ETL Flows
    Pages : 4439 - 4442
    K.Srikanth, N.V.E.S.Murthy, J.Anitha
    Abstract | PDFPDF
    129. Implementation of Optimized Reconfigurable Built-In Self-Repair Scheme for RAMs In SOCs
    Pages : 4443 - 4446
    Venkatesh S, Laxmi Prasanna Rani M
    Abstract | PDFPDF
    130. Transistor Implementation of Reversible Comparator Circuit Using Low Power Technique
    Pages : 4447 - 4452
    Madhina Basha, V.N.Lakshmana Kumar
    Abstract | PDFPDF
    131. Logical Supportive Interface to Hardware Description for Analog Design Interface
    Pages : 4453 - 4459
    R.Prakash Rao, B.K.Madhavi
    Abstract | PDFPDF
    132. A Vision based Application for Virtual Mouse Interface Using Finger-Tip
    Pages : 4460 - 4464
    K S Chidanand Kumar
    Abstract | PDFPDF
    133. Dispatcher algorithm for effective resource utilization of server using volunteer computing: A case study
    Pages : 4465 - 4468
    Jayaram C V, Rampur Srinath
    Abstract | PDFPDF
    134. Analyzing the biosignal to make fatigue measurement as a parameter for mood detection
    Pages : 4469 - 4472
    Suwarna Hajare, Chhaya Dule
    Abstract | PDFPDF
    135. Performance Analysis of Adaptive Dynamic Load Balancing in Grid Environment using GRIDSIM
    Pages : 4473 - 4479
    Pawandeep Kaur, Harshpreet Singh
    Abstract | PDFPDF
    136. Developing Decision Trees for Handling Uncertain Data
    Pages : 4480 - 4485
    P. Satya Prakash, P. Jhansi Lakshmi, B.L Krishna
    Abstract | PDFPDF
    137. Article Removed
    Pages : xxxx - xxxx
    xxx, xxxx, xxx
    Abstract | PDFPDF
    138. Combination of Density Based and Partition Based Clustering Algorithm-DBK Means
    Pages : 4491 - 4494
    B.L. Krishna, P.Jhansi Lakshmi , P.Satya Prakash
    Abstract | PDFPDF
    139. Code Compression Algorithm for High Performance Micro Processor
    Pages : 4495 - 4498
    S.Sekhar dileep kumar, K.Rakesh
    Abstract | PDFPDF
    140. Application of Elliptic Curve Method in Cryptography: A Literature Review
    Pages : 4499 - 4503
    Samta Gajbhiy e,Dr. Sanjeev Karmakar, D r. Monisha Sharma,Dr. Sanjay Sharma, Dr. M K Kowar
    Abstract | PDFPDF
    141. Decision Theoretic in SQL to Prepare Data Sets for Data Mining Analysis
    Pages : 4504-4507
    Venkata Changal Rao , T. Rajesh, Sk. Karimulla
    Abstract | PDFPDF
    142. A Novel Method for Divide and Convergent Coherent Mechanism in Cloud Computing
    Pages : 4508-4513
    Amena Nasreen, SK.Haseena, G.Srinivasa Rao
    Abstract | PDFPDF
    143. Cloud Security Challenges
    Pages : 4514-4515
    Juhi Sharma , Kshitiz Saxena
    Abstract | PDFPDF
    144. Denial of Service Attacks in Wireless Mesh Networks
    Pages : 4516-4522
    Monika
    Abstract | PDFPDF
    145. An Effectual Defense Method against Gray Hole Attack in Wireless Sensor Networks
    Pages : 4523-4528
    Jaspreet Kaur, Vinod Kumar
    Abstract | PDFPDF
    146. An Expert System for Advising Postgraduate Students
    Pages : 4529-4532
    Dr. Abdullah Al-Ghamdi, Sumaia Al-Ghuribi ,Arwa Fadel,Fatima Al-Aswadi ,Thamary AL-Ruhaili
    Abstract | PDFPDF
    147. Research Challenges in Extracting Personal Name Pseudonyms from the Web
    Pages : 4533-4542
    Sivagaminathan Ganesan
    Abstract | PDFPDF
    148. Opportunities, Concerns and Challenges in the Adoption of Cloud Storage
    Pages : 4543-4548
    Indu Arora, Dr. Anu Gupta
    Abstract | PDFPDF
    149. Uncertain Numerical Data Clustering with VORONOI Diagram and R-Tree with Ensemble SVM
    Pages : 4549-4552
    D. M. Padulkar, V. Z. Attar
    Abstract | PDFPDF
    150. Resolving Referential Ambiguity on the Web Using Higher Order Co-occurrences in Anchor-Texts
    Pages : 4553-4557
    Rama.K, Sridevi.M, Vishnu Murthy.G
    Abstract | PDFPDF

    151.

     

    Discovery of Preliminary Centroids Using Improved K- Means Clustering Algorithm
    Pages : 4558-4561
    N. Koteswara Rao, G. Sridhar Reddy
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-