• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 3 ISSUE 4 July- August 2012

    ISSN 0975 - 9646

    1.
    Comparative Study of Automated Testing Tools: Quick Test Pro and Load Runner
    Pages : 4562 - 4567
    Shaveta,Sachin kumar,Nitika,Snehlata
    Abstract | PDFPDF
    2
    Achieving fast recovery in IP networks by MULTIPLE ROUTING CONFIGURATION
    Pages : 4568 - 4570
    Rajnee Kumari, Sitanath Biswas, Subrat S. Pattnaik
    Abstract | PDFPDF
    3
    Modern Power Semiconductor Devices (A Review)
    Pages : 4571 - 4574
    Meenakshi Mataray A.P
    Abstract | PDFPDF
    4
    Public Key Cryptography by Centralized Offline Server in Mission-Critical Networks
    Pages : 4575 - 4579
    K. Naresh Kumar, Dr. S. Srinivasu,K.P.R KrishnaChaitanya
    Abstract | PDFPDF
    5
    Explore 10 Different Types of Software Development Process Models
    Pages : 4580 - 4584
    S.Thulasee Krishna ,Dr. S.Sreekanth,Perumal,K.Rajesh Kumar Reddy 
    Abstract | PDFPDF
    6
    Robust Techniques based Hybrid Models in Classification Experiments
    Pages : 4585 - 4589
    Karnakar Gulla, Ashok kumar Aithagani ,  Satyanarayana Vollala,Srinivas Pilli
    Abstract | PDFPDF
    7
    Multiplexing in the peer-to-peer Live Streaming
    Pages : 4590 - 4595
    T.Ashalatha, Ch.Naveen Kumar Reddy, G.Vishnu Murthy,Ch.Venkata Rajam
    Abstract | PDFPDF
    8
    DNA representation based on ladder like structure property of DNA sequence double Helix
    Pages : 4596 - 4598
    Archana Verma, R.K.Singh
    Abstract | PDFPDF
    9. An Approach to Find Out at which Maintainability Metric, Software Maintenance Cost is Less Pages : 4599 - 4602
    C.V.S.R Syavasya
    Abstract | PDFPDF
    10. Cross Lingual Query Dependent Snippet Generation
    Pages : 4603 - 4609
    Pinaki Bhaskar, Sivaji Bandyopadhyay
    Abstract | PDFPDF
    11. Answer Extraction of Comparative and Evaluative Question in Tourism Domain
    Pages : 4610 - 4616
    Pinaki Bhaskar, Bidhan Chandra Pal, Sivaji Bandyopadhyay
    Abstract | PDFPDF
    12. Impact Analysis Through Regression Test Selection
    Pages : 4617 - 4624
    S. Sushumna, K. Rakesh, G. HimaBindu
    Abstract | PDFPDF
    13. Resource Allocation Method using Scheduling methods for Parallel Data Processing in CloudPages : 4625 - 4628
    Sowmya Koneru, V N Rajesh Uddandi, Satheesh Kavuri
    Abstract | PDFPDF
    14. Online Intrusion Alert Aggregation Using DGDSM Approach
    Pages : 4629 - 4632
    J.Poongodi, C.Vimalarani, Dr.S.Karthik
    Abstract | PDFPDF
    15. Congestion control in wireless sensor networks: Existing Applicable Techniques for Weather Sensor Networks
    Pages : 4633 - 4636
    Meenu Chawla, Sunil Mandave
    Abstract | PDFPDF
    16. An Approach Based On Artificial Neural Network for Data Deduplication
    Pages : 4637 - 4644
    M.Padmanaban, T.Bhuvaneswari
    Abstract | PDFPDF
    17. Extended Ad hoc On demand Distance Vector Multipath Routing (EAODVMR) protocol for Mobile Ad hoc NETwork(MANET)
    Pages : 4645 - 4652
    Dr.M.Sadish sendil, V. Balajishanmugam
    Abstract | PDFPDF
    18. Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for 802.11 Based Wireless Networks
    Pages : 4653 - 4657
    Santosh Hosamani, G.S.Nagaraja
    Abstract | PDFPDF
    19. Ensuring Security in Resource Centers of Cloud Environment by Using Trusted Pools
    Pages : 4658 - 4661
    K.P.R KrishnaChaitanya, Dr. S. Srinivasu, K. Naresh Kumar
    Abstract | PDFPDF
    20. Comparative Analysis of Apriori Algorithm and Frequent Pattern Algorithm for Frequent Pattern
    Mining in Web Log Data
    Pages : 4662 - 4665
    Rahul Mishra, Abha choubey
    Abstract | PDFPDF
    21. A Novel Approach Based Wireless Intrusion Detection System
    Pages : 4666 - 4669
    K.Suresh, A.Sarala Devi , Jammi Ashok
    Abstract | PDFPDF
    22. Software Simulation of Unequal Error Protection Based Demodulator (Burst Mode) for Onboard
    Application
    Pages : 4670 - 4673
    Deepak Mishra , K S Dasgupta and S.Jit
    Abstract | PDFPDF
    23. Bandwidth Optimization, Recycling In IEEE 802.16 Networks by Using Call Admission Control & Scheduler
    Pages : 4674 - 4680
    Sk.Jahangeer basha, Ch.Prakasa rao
    Abstract | PDFPDF
    24. Web Page Adaptation for Large Screens
    Pages : 4681 - 4683
    Neetu Narwal, Saba Hilal
    Abstract | PDFPDF
    25. Fault Prediction OO Systems Using the Conceptual Cohesion of Classes
    Pages : 4684 - 4688
    Subba Rao Polamuri, S. Rama Sree, M.Rajababu
    Abstract | PDFPDF
    26. Fractal Based Management of Heterogeneous Data Streams
    Pages : 4689 - 4691
    M.Prosant Kumar, N.Naga Subrahmanyeswari , S. Rama Sree
    Abstract | PDFPDF
    27. Design and Implementation of Stegnography Algorithm using Color Transformation
    Pages : 4692-4695
    Anjali Dua , Sonia Sharma
    Abstract | PDFPDF
    28. Detecting Image Forgeries using Discrepancies in Motion Blur
    Pages : 4696-4700
    Rupali M. Bora, N. M. Shahane, Umesh K. Gaikwad
    Abstract | PDFPDF
    29. Effective Performance Analysis of Bin –Periodic Algorithm for Wireless Sensor –Actor Network
    Pages : 4701-4703
    M.E. Sanap, Rachana A.Satao
    Abstract | PDFPDF
    30. Web Service Quality Composition Determination Using Genetic Algorithm in Sematic Web
    Pages : 4704-4706
    Nandhini.M ,Sadish Sendil.M
    Abstract | PDFPDF
    31. Learning Based Single-Frame Image Super-Resolution using Contourlet Transform
    Pages : 4707-4711
    Sukeshkumar P.Borate, Dr. Sanjay L.Nalbalwar
    Abstract | PDFPDF
    32. Secure Group Key Transfer Protocol Based on Secret Sharing
    Pages : 4712-4717
    Vijaya lakshmi Pandranki ,N.Krishna
    Abstract | PDFPDF
    33. False Data Detection in Wireless Network using Dynamic Security Protocol
    Pages : 4718-4722
    Garaga Subba Rao, Kothapalli Ramesh
    Abstract | PDFPDF
    34.
    Detection of Intrusion using Alert Aggregation in DataStream Modelling with Constructive Basis
    Pages : 4723-4730
    J Swathi, Prof.P.Pradeep, P Mahesh Kumar
    Abstract | PDFPDF
    35. Analysis of Business Processes and Modeling Approach to Business Process Re-Engineering
    Pages : 4731-4737
    Chandrahauns R Chavan, Bechoo Lal
    Abstract | PDFPDF
    36.
    Improving security By Quantum Cryptography in P2P Reputation Management in Distributed Identities and Decentralized Recommendation Chains
    Pages : 4738-4742
    V V Murali Babu Polukonda, A Harish
    Abstract | PDFPDF
    37. Dynamic Behavioral Pattern Mining from Point of Coverage Wireless Sensor Networks
    Pages : 4743-4746
    U. Sandhya Rani, P.Subba Rao
    Abstract | PDFPDF
    38. Web Security and Classification of Different Types of Attack for Web
    Pages : 4747-4750
    Shubham Srivastava
    Abstract | PDFPDF
    39.
    Scenario Based Performance and Comparative Simulation Analysis of Routing Protocols of MANET
    Pages : 4751 - 4756
    Vikas Gupta, Ajay Lala, Shivendu Dubey, Ashish Chaurasia
    Abstract | PDFPDF
    40. Efficient Power MAC Protocol in Ad-hoc Network’s
    Pages : 4757 - 4763
    Rahul Mukherjee
    Abstract | PDFPDF
    41.
    Hatch-Sens: a Theoretical Bio-Inspired Model to Monitor the Hatching of Plankton Culture in the Vicinity of Wireless Sensor Network
    Pages : 4764 - 4769
    Poulami Majumder, Partha Pratim Ray
    Abstract | PDFPDF
    42. Multi-Constrained QoS Routing Issues in High-Speed Multimedia Networks
    Pages : 4770 - 4773
    Monika Jena, Ajay Rana
    Abstract | PDFPDF
    43. Replication of Authorized Data Objects in Data Grid
    Pages : 4774 -4779
    D. Subhramanya Sharma, Sudha Gontu
    Abstract | PDFPDF
    44. Secure File Transfer by using Modular Encryption
    Pages : 4780 - 4784
    D. Subhramanya Sharma, D.Geetha jyothi
    Abstract | PDFPDF
    45. Secured Auditing of Outsourced Data using Linear Programming in Cloud
    Pages : 4785 - 4789
    Satheesh Kavuri, Gangadhara Rao Kancharla, Sowmya Koneru, Sandeep Kotte
    Abstract | PDFPDF
    46. 3G/4G Network Evolution
    Pages : 4790 - 4793
    Krunal N. Chandewar, Amit N. Sangole, Shailesh S. Shekapure
    Abstract | PDFPDF
    47. Automated Detection of Diabetic Retinopathy Using Fundus Image Analysis
    Pages : 4794 - 4799
    Jaspreet Kaur,Dr. H.P.Sinha
    Abstract | PDFPDF
    48. Secret Sharing against Transmission Error for an Invisible Communication
    Pages : 4780 - 4783
    HarishBabu. Kalidasu , B.PrasannaKumar, Haripriya.P
    Abstract | PDFPDF
    49. Objective Quality Measures in Binarization
    Pages : 4784 - 4788
    Ambily Joseph, Jaini Sara Babu, Poorna Jayaraj, Beena K.B
    Abstract | PDFPDF
    50. Optimization CBIR using K-Means Clustering for Image Database
    Pages : 4789 - 4793
    Juli Rejito, Retantyo Wardoyo, Sri Hartati, Agus Harjoko
    Abstract | PDFPDF
    51. Discovering Hidden Values in Data Warehouse with Predictive Data Mining
    Pages : 4794 - 4797
    Duvvuri Arun Kumar, V.Vamsi Krishna, K.Suresh,Ch.Jnaneswari,G.Lakshmi Kranthi, $Anilpatro
    Abstract | PDFPDF
    52. Secure Mobile Agent Based IDS for MANET
    Pages : 4798 - 4805
    Yogendra Kumar Jain, Rajesh Kumar Ahirwar
    Abstract | PDFPDF
    53. Estimating the Effects of Gold Plating Using Fuzzy Cognitive Maps
    Pages : 4806 - 4808
    Neha Malhotra,Manisha Bhardwaj, Rajwinder Kaur
    Abstract | PDFPDF
    54. Chaos-Based System for Image Encryption
    Pages : 4809 - 4811
    Deep Desai, Appoorv Prasad, Jackson Crasto
    Abstract | PDFPDF
    55. A New Blind Image Watermarking using Hermite Spline Approach
    Pages : 4812 - 4817
    Allam Mohan, Kampalli Ramu, Salina Adinarayana
    Abstract | PDFPDF
    56. A Comprehensive Review of Recent Relevance Feedback Techniques in CBIR
    Pages : 4818 - 4822
    Shruti Patil
    Abstract | PDFPDF
    57. Role of Wireless Technology for Vehicular Network
    Pages : 4823 - 4828
    Akshata Gandhi, B. T. Jadhav
    Abstract | PDFPDF
    58. 3D/4D Image Registration and Fusion Techniques : A Survey
    Pages : 4829 - 4839
    Shajan P X, Dr.N.J.R.Muniraj, Dr.John T Abraham
    Abstract | PDFPDF
    59. Weak Bloom Filtering for Large-Scale Dynamic Networks
    Pages : 4840 - 4842
    Krishna Siva Prasad.M , Y.Adilakshmi
    Abstract | PDFPDF
    60. Attribute Series of Software Evolution for Software Quality Assessment
    Pages : 4843 - 4849
    Varaprakash, Praveen Kumar Malladi, Venkata Kiran Talluri
    Abstract | PDFPDF
    61. Civilizing Exploitation of Communication Clouds
    Pages : 4850 - 4857
    Janga Santhosh, Puram Pradeep kumar, Majoju Sridhar kumar
    Abstract | PDFPDF
    62. A Survey of Web Usage Mining based on Fuzzy Clustering and HMM
    Pages : 4858 - 4862
    Neelam Sain, Prof. Sitendra Tamrakar
    Abstract | PDFPDF
    63. Protocol Based Attack Injection Framework to Fault Diagnosis in Server Applications
    Pages : 4863 - 4867
    Kalagotla satish kumar, L.R.Krishna kotapati
    Abstract | PDFPDF
    64. Security of Data Dynamics in Cloud Computing
    Pages : 4868 - 4873
    M.Yugandhar, D. Subhramanya Sharma
    Abstract | PDFPDF
    65. Web Usage Mining & Pre-Fetching Based on Hidden Markov Model & Fuzzy Clustering
    Pages : 4874 - 4877
    Neelam Sain, Prof. Sitendra Tamrakar
    Abstract | PDFPDF
    66. A Modified Efficient Log File Compression Mechanism for Digital Forensic in Web Environment
    Pages : 4878 - 4882
    Rashmi Gupta, Raj Kumar Gupta
    Abstract | PDFPDF
    67. Social Networking: A Quantitative Research Report into Impact, Attitudes, Behaviours and Use
    Pages : 4883 - 4886
    Preeta Mahapatra
    Abstract | PDFPDF
    68. Random Routing Algorithm for Secured Data Collection Accessed in Wireless Sensor Networks
    Pages : 4887 - 4891
    K.Deepthi, K.Rajani , Y.Suresh
    Abstract | PDFPDF
    69. Recognition of Handwritten Hindi Characters using Backpropagation Neural Network
    Pages : 4892 - 4895
    Gunjan Singh, Sushma Lehri
    Abstract | PDFPDF
    70. A Study of Cloud Privacy and Privacy Patterns
    Pages : 4896 - 4899
    D.Veerabhadra Rao, G.Appa Rao, Prasad Reddy P.V.G.D
    Abstract | PDFPDF
    71. Similarity of Fuzzy Ontology Generation for Semantic web
    Pages : 4900 - 4903
    G. Umamaheswara Rao,K.V. Subba Raju ,K. Srikanth
    Abstract | PDFPDF
    72. Fail-Proof Connectivity with Continuous Neighbor Discovery in Sensor Networks
    Pages : 4904 - 4912
    K Sujith Kumar, P Praveen Kumar, B Prasad
    Abstract | PDFPDF
    73. Analysis and Study of Host To Host Congestion Control for TCP
    Pages : 4913 - 4916
    V.Akhila Reddy, D.Jamuna, L.Haritha, G.Rakesh Reddy
    Abstract | PDFPDF
    74. A Navel Approach to Identify Geo-Encryption with GPS and Different Parameters (Locations And Time)
    Pages : 4917 - 4919
    V. Rajeswari, V. Murali, A.V.S. Anil
    Abstract | PDFPDF
    75. Dynamic Clustering in Sensor Networks using HMM and Neuro Computation
    Pages : 4920 - 4926
    Veena K.N., Vijaya Kumar B.P.
    Abstract | PDFPDF
    76. Semantic Answer Validation using Universal Networking Language
    Pages : 4927 - 4932
    Partha Pakray, Utsab Barman, Sivaji Bandyopadhyay, Alexander Gelbukh
    Abstract | PDFPDF
    77. RDF /RDF-S Providing Framework Support to OWL Ontologies
    Pages : 4933 - 4937
    Rajiv Pandey, Dr.Sanjay Dwivedi
    Abstract | PDFPDF
    78. Estimating the Probability of Project Completion by SIM_DEL Estimator
    Pages : 4938 - 4945
    Dr. P.K.Suri, Pallavi Ranjan
    Abstract | PDFPDF
    79. A Min-Max Inspired Intelligent Approach to Perform Load balancing in Wireless Network
    Pages : 4946 - 4950
    Harvinder Singh, Narwal Sarita
    Abstract | PDFPDF
     
    -All rights are reserved by International Journal of Computer Science and Information Technologies-