• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 4 ISSUE 1 January- February 2013

    ISSN 0975 - 9646

    1.
    Data mining techniques for Fraud Detection
    Pages : 1-4
    Anita B. Desai, Dr. Ravindra Deshmukh
    Abstract | PDFPDF
    2.
    Overview of  Fingerprint Image Enhacement & Minutia Extraction
    Pages : 5-9
    Indira Chakravarthy , VVSSS.Balaram, B.Eswara Reddy
    Abstract | PDFPDF
    3.
    Alert Areas of Cloud Security
    Pages : 10-13
    Shuchita Bhargava, Rahul M. Samant
    Abstract | PDFPDF
    4.
    Protection of Data Base Security Via Collabrative  Inference Detection
    Pages : 14-16
    Ajay Sharma, Alok Kumar Shukla, Dharmendra Kumar
    Abstract | PDFPDF
    5.
    Image Processing Edge Detection Technique used for Traffic Control Problem
    Pages : 17-20
    P.Srinivas, Y.L. Malathilatha,Dr. M.V.N.K Prasad
    Abstract | PDFPDF
    6.
    Domain Name System: The Backbone of today’s World of Internet
    Pages : 21-23
    Gopi Nath Sahani, Jitender Kumar, Manoj Kumar
    Abstract | PDFPDF
    7.
    Smart Cane for Visually Impaired People
    Pages : 24-28
    J.Ramprabu, Gowthaman.T
    Abstract | PDFPDF
    8.
    Co-Operative Distributed Intrusion Detection in  Wireless Ad-hoc Network
    Pages : 29-33
    Vinaysagar Anchuri, Basmay C. Simmi, E. Ramya Sri
    Abstract | PDFPDF
    9.
    Intelligent Approach toward Anti-Phishing using Two Factor Authentication
    Pages : 34-36
    Hardik Desai, Deepak Gupta, Noopur Pandey
    Abstract | PDFPDF
    10.
    Diagnosis of Lung Cancer Prediction System Using Data Mining Classification Techniques
    Pages : 39-45
    V.Krishnaiah, Dr.G.Narsimha, Dr.N.Subhash Chandra
    Abstract | PDFPDF
    11.
    Effectiveness of Requirement Prioritization Using Analytical Hierarchy Process (AHP) and Planning Game (PG): A Comparative Study
    Pages : 46-49
    Shadab Siddiqui, Dr.Mohd. Rizwan Beg, Shahin Fatima
    Abstract | PDFPDF
    12.
    Improving Software Quality Using FMEA and FTA Defect Prevention Techniques in Design Phase
    Pages : 50-54
    Shahin Fatima, Dr.Mohd. Rizwan Beg, Shadab Siddiqui
    Abstract | PDFPDF
    13.
    Proposed Energy Saving Scheme for Wireless Ad-hoc Sensor Network
    Pages : 55-57
    Deepika Jain , Sitendra Tamrakar
    Abstract | PDFPDF
    14.
    New Approach for Data Encryption using Two Way Crossover
    Pages : 58-60
    Deepak Nagde, Raviraj Patel, Dharmendra Kelde
    Abstract | PDFPDF
    15.
    New Image Encryption Technique Based On Combination of Block Displacement and Block Cipher Technique
    Pages : 61-65
    Keerti Kushwah, Sini Shibu
    Abstract | PDFPDF
    16.
    TECHNIQUES FOR EFFICIENT KEYWORD SEARCH IN CLOUD COMPUTING
    Pages : 66-68
    P.NIRANJAN REDDY  1* ,  Y.SWETHA 2
    Abstract | PDFPDF
    17.
    INFORMATION FORENSIC APPLICATION USING SOFT COMPUTING TECHNIQUES
    Pages : 69-72
    Dharmendra Kelde, Deepak Nagde,  Raviraj Patel, Pavan Pawar
    Abstract | PDFPDF
    18.
    Extreme Programming Verification using Unified Process
    Pages : 73-76
    G. Sivanageswara Rao, Ch.V.Phani Krishna , Dr. K.Rajasekhar rao
    Abstract | PDFPDF
    19.
    INTRUSION DETECTION SYSTEM - TYPES AND PREVENTION
    Pages : 77-82
    B.SANTOS KUMAR , T.CHANDRA SEKHARA PHANI RAJU, N.SUDHAKAR
    Abstract | PDFPDF
    20.
    Real Time Eye Recognition
    Pages : 83-86
    Hansaraj S. Wankhede, S. A. Chhabria, Dr. R. V. Dharaskar
    Abstract | PDFPDF
    21.
    A Novel Optimization Technique for Determination of Parametric Queries
    Pages : 87-90
    Arepu Yuvakishore & Kumar Vasantha
    Abstract | PDFPDF
    22.
    Spell Checker for OCR
    Pages : 91-97
    Yogomaya Mohapatra, Ashis Kumar Mishra, Anil Kumar Mishra
    Abstract | PDFPDF
    23.
    Simulation Studies on Zigbee Communication for Video Transmission and Networking
    Pages : 98-102
    Deepak Gupta, Kavita Malav, Mukesh Nagar
    Abstract | PDFPDF
    24.
    Divide and ConquerMethod for Clustering Mixed Numerical and Categorical Data
    Pages : 103-106
    Dileep Kumar Murala
    Abstract | PDFPDF
    25.
    Advanced Network Intrusion Detection System Based on Effective Feature Selection
    Pages : 107-112
    Sumathi M, Umarani R
    Abstract | PDFPDF
    26.
    A Survey on Different Image Encryption and Decryption Techniques
    Pages : 113-116
    Rinki Pakshwar, Vijay Kumar Trivedi, Vineet Richhariya
    Abstract | PDFPDF
    27.
    An Efficient password based Two-Server Authentication and Pre-shared Key Exchange System using Smart Cards
    Pages : 117-120
    Anamika Chouksey, Yogadhar Pandey
    Abstract | PDFPDF
    28.
    Article Withdrawn
    Pages : 121-125
    xxx, xxx
    Abstract | PDFPDF
    29.
    Indian Currency Denomination Identification Using Image Processing Technique
    Pages : 126-128
    Vipin Kumar Jain, Ritu Vijay
    Abstract | PDFPDF
    30.
    Security measures for Smart Devices Through Cryptography Using Cellular Automaton
    Pages : 129-133
    M.Venugopal, E.G.Rajan, Sharma
    Abstract | PDFPDF
    31.
    Real-Time Scheduler Design for Embedded System Domain
    Pages : 134-138
    Anil Kumar Mishra, Yogomaya Mohapatra, Ashis Kumar Mishra
    Abstract | PDFPDF
    32.
    Privacy Preserving Data Mining
    Pages : 139-141
    Smita D Patel, Sanjay Tiwari
    Abstract | PDFPDF
    33.
    An Energy Efficient Routing Approach based on AODV
    Pages : 142-146
    Rohit Sharma, Sangeeta Sharma
    Abstract | PDFPDF
    34.
    Fault Recovery in Optimal Task Scheduling and Grid Service Reliability
    Pages : 147-151
    Ashwini Vedulla, Pramod Reddy A, Krishna Prasad B
    Abstract | PDFPDF
    35.
    Performance Analysis for Efficient Data Collection with path Constrained Mobile sink Using SPMA Scheme in WSNs
    Pages : 152-155
    Sheetal Raina, N.A.Mhetre
    Abstract | PDFPDF
    36.
    Classifying populated IP Addresses using SVM Clustering and Vertical partition id3 decision Tree
    Pages : 156-158
    Gagan Sharma, Yogadhar Pandey
    Abstract | PDFPDF
    37.
    An Efficient ID3 Decision Tree for the Classification of Populated IP Address Using K-Mean Clustering
    Pages : 159-162
    Rajesh Kumar Sharma, Anurag Jain, Subha Dubey
    Abstract | PDFPDF
    38.
    Brain Fingerprinting
    Pages : 163-166
    Upasana M. Bhilota, Dhara J. Patel
    Abstract | PDFPDF
    39.
    Classifying Problem in Inference Engine for Different Version Based Ontology
    Pages : 167-170
    Ajaysinh Rathod, Bhaumik Nagar, Sachin Sharma
    Abstract | PDFPDF
    40.
    Survey on Different Types of Attacks and Counter Measures in Wireless Networks
    Pages : 171-174
    N. Vijaya gopal, Dr.V.Srikanth, M. Mohan Chandra
    Abstract | PDFPDF
    41.
    Effective Cloud Service Management through Volunteer Computing
    Pages : 175-177
    Nirupadi Tidigol, T.P.Lokesh, Thrilochana Kumar Y.P
    Abstract | PDFPDF
    42.
    Improving Software Quality Using FMEA and FTA Defect Prevention Techniques in Design Phase
    Pages : 178-182
    Shahin Fatima, Dr.Mohd. Rizwan Beg, Shadab Siddiqui
    Abstract | PDFPDF
    43.
    Human Digitization: Authentication Profiles in Digital Information Rights Management Systems
    Pages : 183-187
    K. M. Moorning
    Abstract | PDFPDF
    44.
    Merging Feature Method on RGB Image and Edge Detection Image for Wood Identification
    Pages : 188-193
    Gasim, Agus Harjoko, Kudang Boro Seminar, Sri Hartati
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-