• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 3 ISSUE 5 September- October 2012

    ISSN 0975 - 9646

    1.
    Object Detection by an Autonomous Robot through Data Fusion
    Pages : 4951 - 4955
    Tapan Kumar Nayak, Sanjit Kumar Dash, Himansu Sekhar Sasmal, Srikanta Patanaik
    Abstract | PDFPDF
    2
    Authenticated Transmission using Quantum Security
    Pages : 4956 - 4960
    V. Kishore, M. Ramakrishna, M.A.Baseer
    Abstract | PDFPDF
    3
    Joint effect of Learning and Testing Effort in SRGM with Fault Dependent Correction Delay
    Pages : 4961 - 4967
    Shaik Mohammad Rafi , Dr.K Nageswara Rao , Dr. S . Pallam Setty , Dr. Shaheda Akthar
    Abstract | PDFPDF
    4
    FIR Filter Design Using Rounding Technique
    Pages : 4968 - 4970
    Sangita Solanki, Devendra Singh Mondloi
    Abstract | PDFPDF
    5
    Network Intrusion Detection Using Improved Decision Tree Algorithm
    Pages : 4971 - 4975
    K.V.R. Swamy, K.S. Vijaya Lakshmi
    Abstract | PDFPDF
    6
    Users Recommended Tag Prediction and Visualization for Dynamic Delicious Tag Data
    Pages : 4976 - 4980
    Jameson Ganta, G. Krishna Kishore
    Abstract | PDFPDF
    7
    A Novel Approach for SQL Injection Prevention Using Hashing & Encryption (SQL-ENCP)
    Pages : 4981 - 4987
    Mayank Namdev, Fehreen Hasan, Gaurav Shrivastav
    Abstract | PDFPDF
    8
    Simplifying Complex Tasks: Cloud Computing
    Pages : 4988 - 4996
    V. KISHORE, G.G.G.BHAVANI, M.RAMAKRISHNA
    Abstract | PDFPDF
    9
    OPTIMIZED DESIGN of ALU for LOW POWER DISSIPATION
    Pages : 4997 - 4999
    Hare kishan, Ravinder kumar
    Abstract | PDFPDF
    10
    Performance Analysis of Node-Disjoint Multipath Routing for Mobile Ad-hoc Networks based on QoS
    Pages : 5000 - 5004
    Jay Kumar Jain, Devendra Kumar Jain, Anuradha Gupta
    Abstract | PDFPDF
    11
    Securing E-Mail System of Web Data Base Using Cloud Computing
    Pages : 5005 - 5008
    Tejaswi.K, Sridevi.M, Vishnu Murthy.G
    Abstract | PDFPDF
    12
    Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks
    Pages : 5009 - 5013
    P.Pavan kumar Reddy, Manohar Gosul
    Abstract | PDFPDF
    13
    A Review of Expert Systems in Animal Health Care
    Pages : 5014 - 5018
    A. B. Patil, Dr. R. V. Kulkarni
    Abstract | PDFPDF
    14
    Intrusion detection: an Energy efficient approach and Data loss estimation in Heterogeneous WSN
    Pages : 5019 - 5024
    Mahipal Reddy.G ,Ananda Raj.S.P,Ramana.V,Poornima.S
    Abstract | PDFPDF
    15
    Back Propagation Neural Network based Gait Recognition
    Pages : 5025 - 5030
    G. Venkata Narasimhulu Dr. S. A. K. Jilani
    Abstract | PDFPDF
    16
    Web Applications Access Control Single Sign On
    Pages : 5031 - 5035
    Anitha Chepuru, Dr.K.Venugopal Rao, Amardeep Matta
    Abstract | PDFPDF
    17 Novel Algorithms Based on Legendre Neural Network for Nonlinear Active Noise Control with
    Nonlinear Secondary Path
    Pages : 5036 - 5039
    Kunal Kumar Das and Jitendriya Kumar Satapathy
    Abstract | PDFPDF
    18
    Proposed Multi-Layers Intrusion Detection System (MLIDS) Model
    Pages : 5040 - 5042
    Gargi Agrawal, Megha Kamble
    Abstract | PDFPDF
    18
    Proposed Multi-Layers Intrusion Detection System (MLIDS) Model
    Pages : 5040 - 5042
    Gargi Agrawal, Megha Kamble
    Abstract | PDFPDF
    19
    A Novel Approach for Multi-Cloud Storage security in Cloud Computing
    Pages : 5043-5045
    G. Rakesh Reddy, Dr. M.B. Raju, Dr. B. Ramana Naik
    Abstract | PDFPDF
    20
    Money to ATM – Fake Currency Detection
    Pages : 5046-5050
    K. Satish , Y.K.Viswanadham, I Leela Priya
    Abstract | PDFPDF
    21
    A Novel Graphical Password Scheme Resistant To Peeping Attack
    Pages : 5051-5054
    T.Srinivasa Ravi Kiran, Dr.K.V.Samabasiva Rao, M.Kameswara Rao
    Abstract | PDFPDF
    22
    Need to Change focus from Link Failures to Backbone Failures in WMN
    Pages : 5055-5058
    Jyoti Gupta, JiwanJyoti Senapati
    Abstract | PDFPDF
    23
    Exalt Network Lifetime for Wireless Sensor Network with Purn Delay
    Pages : 5059-5061
    Jangala Vineela, A.Srinivas Reddy
    Abstract | PDFPDF
    24
    Proficient and Privacy-Attentive Framework for Continuously Moving Objects
    Pages : 5062-5064
    Palukuri.Jhansy, T.Sunitha
    Abstract | PDFPDF
    25
    IC: Intelligent Clustering, a new time efficient data partitioning methodology
    Pages : 5065-5067
    Done Stojanov
    Abstract | PDFPDF
    26
    A Novel System based on GMM to understand the User's Web Navigation Pattern
    Pages : 5068-5070
    M.Bangaru Lakshmi, A.Nageswara Rao, G.Venugopal
    Abstract | PDFPDF
    27
    Simple Overview on Cloud Computing
    Pages : 5071-5073
    Jeevana Jammula, Swapna Goud.N, Vishnu Murthy.G
    Abstract | PDFPDF
    28
    Video Error Concealment using H.264/AVC
    Pages : 5074-5077
    Aniruddha D.Shelotkar, Vishwajit K.Barbudhe
    Abstract | PDFPDF
    29
    Enriching Forensic Analysis process for Tampered Data in Database
    Pages : 5078-5085
    Pallavi D Abhonkar, Ashok Kanthe
    Abstract | PDFPDF
    30
    Literature Review on Expert System in Agriculture
    Pages : 5086-5089
    S. J. Yelapure , Dr. R. V. Kulkarni
    Abstract | PDFPDF
    31
    Performance Comparison of transport protocols, UDP and UDP-Lite for transmission of Different Video Codecs over MANETs
    Pages : 5090-5096
    Puneet Kaur
    Abstract | PDFPDF
    32
    A SECURE DATA HIDING TECHNIQUE IN COMPRESSED VIDEO USING A SECRET KEY
    Pages : 5097 - 5100
    V.Manjula, J. Rajani, K. Radhika                               
    Abstract | PDFPDF
    33
    Application of Green Cloud Computing For Efficient Resource Energy Management in Data Centres
    Pages : 5101-5107
    Yuvapriya Ponnusamy, S Sasikumar
    Abstract | PDFPDF
    34
    An Efficient Approach for Automatic Number Plate Recognition System Using Quick Response Codes
    Pages : 5108 - 5115
    Bhupendra Moharil, Vijayendra Ghadge, Chaitanya Gokhale, Pranav Tambvekar
    Abstract | PDFPDF
    35
    Efficient Personalized Search using Ranking SVM
    Pages : 5116 - 5122
    V.K.Priyanka Kolluri, A.Bala Ram
    Abstract | PDFPDF
    36
    Economic Cost Model for Software Engineering Simulation
    Pages : 5123 - 5127
    E.Geetha Rani,K.Swarupa Rani, D.Anusha, Dr.M.V.L.N.Raja Rao
    Abstract | PDFPDF
    37
    Proposed Method for Image Segmentation Using Similarity Based Region Merging Techniques
    Pages : 5128 - 5132
    Garima Singh Rawat, Joy Bhattacharjee, Roopali Soni
    Abstract | PDFPDF
    38
    Robust and Secure Data Hiding in Image Using Biometric Technique
    Pages : 5133 - 5136
    N. Lavanya, V. Manjula, N. V. Krishna Rao
    Abstract | PDFPDF
    39
    The Applications Survey On Bee Colony Optimization
    Pages : 5137 - 5140
    Hemant Nagpure#, Rohit Raja
    Abstract | PDFPDF
    40
    A Robust Facial Recognition System Based on Skew Gaussian Distribution
    Pages : 5141 - 5142
    Pavanendar, P.Raja Sekhar, Y.Srinivas
    Abstract | PDFPDF
    41
    Secured Receiver Location Privacy Based on Cyclic Chain Shift Technique in Mobile Ad Hoc Networks
    Pages : 5143 - 5148
    Satish Shrivastava, Nitin Agrawal, Sitendra Tamrakar
    Abstract | PDFPDF
    42
    A Survey on Data Mining Algorithms and Future Perspective
    Pages : 5149 - 5156
    N.K. Sharma, Dr. R.C. Jain, Manoj Yadav
    Abstract | PDFPDF
    43
    Ensuring and Reliable Storage in Cloud Computing
    Pages : 5157 - 5163
    Katukam Ganesh, Maligireddy Saidireddy, KrishnaChaitanya.Katkam
    Abstract | PDFPDF
    44
    Expedition for the Exploration of Apposite Knowledge
    Pages : 5164 - 5168
    Shabia Shabir Khan, Dr. Mushtaq Ahmed Peer
    Abstract | PDFPDF
    45
    Accident Avoidance and Minimal Delay Time Efficient Automated Railway System
    Pages : 5169 - 5171
    Giridhari Krishnan
    Abstract | PDFPDF
    46
    A Review of Expert System in Information System Audit
    Pages : 5172 - 5175
    A. B. Devale, Dr. R. V. Kulkarni
    Abstract | PDFPDF
    47
    Polarity Analysis through Neutralization of Non-Polar Words and Segregation of Polar Words Using Training Data
    Pages : 5176 - 5178
    Ajay Siva Santosh Reddy
    Abstract | PDFPDF
    48
    Fast Mining of Temporal Data Clustering
    Pages : 5179 - 5181
    D. Suresh Babu, K. Navya
    Abstract | PDFPDF
    49
    A Review of Image Classification Techniques in Content Based Image Retrieval
    Pages : 5182 - 5184
    Neera Lal, Neetesh Gupta, Amit Sinhal
    Abstract | PDFPDF
    50
    Personalized Web Information Collection Using Knowledge-based Ontologies
    Pages : 5185 - 5189
    K.V. Narayana Rao, U. Jwalitha, K.D.N.V Rajesh
    Abstract | PDFPDF
    51
    Self learning Automated ATC using AI Technique and Entropy Approach
    Pages : 5190 - 5194
    Giridhari Krishnan
    Abstract | PDFPDF
    52
    Adaptive Kalman Filter based Channel Equalizer
    Pages : 5195 - 5199
    Bharti Kaushal, Agya Mishra
    Abstract | PDFPDF
    53
    Improved ID Based Key Agreement Protocol Using Timestamp
    Pages : 5200 - 5205
    M.D.P Kishore , Dr. K.Venkata Rao
    Abstract | PDFPDF
    54
    Exploiting Dynamic Resource Allocation for Query Processing in the Cloud Computing
    Pages : 5206 - 5209
    M.S.B.Pridviraju , K.Rekha Devi
    Abstract | PDFPDF
    55
    Extended XML Tree Pattern Matching Using TREEMATCH Algorithm
    Pages : 5210 - 5211
    Dr D.Suresh Babu, B.Shiva kiran
    Abstract | PDFPDF
    56
    A Review of Data Cleaning Algorithms for Data Warehouse Systems
    Pages : 5212 - 5214
    Rajashree Y.Patil,#, Dr. R.V.Kulkarni
    Abstract | PDFPDF
    57
    A Comparative Study of various Computing Processing Environments: A Review
    Pages : 5215 - 5218
    P.K. Suri, Sumit Mittal
    Abstract | PDFPDF
    58
    An Approach For Intrusion Detection System In Cloud Computing
    Pages : 5219 - 5222
    M.Madhavi
    Abstract | PDFPDF
    59
    Vibe: Background detection and subtraction for image sequences in video
    Pages : 5223-5226
    K. Kavitha, A. Tejaswini
    Abstract | PDFPDF
    60
    ABayesian Network and variable elimination algorithm for Reasoning under Uncertainty
    Pages : 5227 - 5230
    Siva Rama Krishna Prasad Jaladi, Dharmaiah Devarapalli
    Abstract | PDFPDF
    61
    Content Based Image Retrieval System Consume Semantic Gap
    Pages : 5231 - 5235
    K. Vijay Kumar, Dr.R.Rajeswara Rao , V.Subba Ramaiah, Jhansi Rani kaka
    Abstract | PDFPDF
    62
    Fuzzy Logic Approach to Edge Detection for Dental X-ray Image Segmentation
    Pages : 5236 - 5238
    Dr. N. Senthilkumaran
    Abstract | PDFPDF
    63
    Computer & Network Security
    Pages : 5239 - 5242
    Puneet Himthani , Puneet Gurbani , Shweta Tharwani , Tarun Pare
    Abstract | PDFPDF
    64
    Avoiding Congestion Control Using Network Border Patrol
    Pages : 5243 - 5246
    Sudhakar Murugesan, Ganesh Gangadharan, Dr. Rajan John
    Abstract | PDFPDF
    65
    Adaptive Square-Diamond Search(ASDS) Algorithm for Fast Block Matching Motion Estimation
    Pages : 5247 - 5253
    M.K. Pushpa, Dr. S. Sethu Selvi
    Abstract | PDFPDF
    66
    On the Design of High Speed Parallel CRC Circuits using DSP Algorithams
    Pages : 5254 - 5258
    B.Naresh Reddy, B.Kiran Kumar, K.Mohini sirisha
    Abstract | PDFPDF
    67
    Detection of moving object using KOF method
    Pages : 5259 - 5264
    B.Naresh Reddy, B.Narasimha Rao, B.Kiran Kumar
    Abstract | PDFPDF
    68
    Secure Analysis for Interval-based  Algorithms
    Pages : 5265 - 5271
    V.Jaya Ramakrishna , K.Nithin Babu, M.N.Satish Kumar
    Abstract | PDFPDF
    69
    Implementation of  Navigation Pattern Mining in Dot Net framework
    Pages : 5272 - 5275
    Aditi Shrivastava , Nitin Shukla
    Abstract | PDFPDF
    70
    A Critique on Web Usage Mining
    Pages : 5276 - 5279
    K.S.R. Pavan Kumar , V.V. Sreedhar, L. Manoj Chowdary
    Abstract | PDFPDF
    71
    An Enhanced Approach for Finding an Optimal Path in MANET using Energy Aware Reverse Reactive Routing Protocol (EA-RAODV)
    Pages : 5280 - 5284
    Bhabani Sankar Gouda1, Chandan Kumar Behera
    Abstract | PDFPDF
    72
    CEBKST: The Cost Efficient Based On Keying and Secure Data Transmission for Wireless Sensor Network
    Pages : 5285 - 5290
    Narahari A, M. Preethi
    Abstract | PDFPDF
    73
    A Secure File Transfer Based On Discrete Wavelet Transformation And Audio Watermarking Techniques
    Pages : 5291 - 5295
    Vineela Behara, Y. Ramesh
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-