• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 4 ISSUE 2 March- April 2013

    ISSN 0975 - 9646

    1.
    Merge the results of search engine
    Pages : 194-198
    ABDELBAKI Issam, BENLHMAR El habib, LABRIJI Elhoussin
    Abstract | PDFPDF
    2.
    A  Review: Application of Data Mining Tools in CRM for Selected Banks
    Pages : 199-201
    Dileep B. Desai ,Dr. R.V.Kulkarni
    Abstract | PDFPDF
    3.
    A Resilient Two - Server Authentication Mechanism for Enhancing Security in Grid Environment
    Pages : 202-209
    K.AnithaKumari, G.SudhaSadasivam
    Abstract | PDFPDF
    4.
    Manet Protocols Efficiency – Comparative Study
    Pages : 210-215
    Dr.T.Nalini , Dr.K.Manivannan
    Abstract | PDFPDF
    5.
    Multicast Routing Protocols in Wireless Sensor Network
    Pages : 216-219
    Pareesha Aggarwal, Rishi Kumar, Abhishek Bhardwaj
    Abstract | PDFPDF
    6.
    Preventing Data Leakage in Distributive Strategies by Steganography Technique
    Pages : 220-223
    Narendra Babu.Pamula, M.Siva Naga Prasad, K.Deepthi
    Abstract | PDFPDF
    7.
    Localization in wireless Sensor Network: An Optimistic Approach
    Pages : 224-226
    Swati Singhal, Santosh Kr.Bharti, Garima Kaushik
    Abstract | PDFPDF
    8.
    Moving to the Media Cloud for Data and Content Integration Management
    Pages : 227-232
    Zulfikhar Ahmad, Ashis Kumar Mishra,Asisha Kumar Jena
    Abstract | PDFPDF
    9.
    Simulation of Artificial Noses for the Automated Detection and Classification of Organic Compounds
    Pages : 233-237
    Hardik Desai, Deepak Gupta, Noopur Pandey
    Abstract | PDFPDF
    10.
    Cloud Computing in Mobile Networks with Middleware Technology
    Pages : 238-241
    G.Srinivas Reddy, D Khalandar Basha
    Abstract | PDFPDF
    11.
    Content Based Image Retrieval Using Color Histogram
    Pages : 242-245
    A.Ramesh Kumar, D.Saravanan
    Abstract | PDFPDF
    12.
    A Comprehensive Study on Making Food Using Rice Cooker with Fuzzy Logic Technique
    Pages : 246-247
    K Rajesh, D. Rajeswara Rao,Kandula Venkata Reddy
    Abstract | PDFPDF
    13.
    Comparative Study of Exponential Signal by an Interpolated DFT Algorithm
    Pages : 248-251
    Minal Patil, T.G. Panse
    Abstract | PDFPDF
    14.
    Design of Four Bit FLASH ADC using Clocked Digital Comparator
    Pages : 252-254
    Abhishek madankar, Prachi Palsodkar
    Abstract | PDFPDF
    15.
    Biometric and RFID Secured Centralised Voting System
    Pages : 255-258
    Ankita Kadbe, Shweta Balgujar, Siddhita Chimote
    Abstract | PDFPDF
    16.
    Generation of a New Complexity Dimension Scheme for Complexity Measure of Procedural Program
    Pages : 259-264
    Nikhar Tak, Dr. Naveen Hemrajani
    Abstract | PDFPDF
    17.
    Strength and Accuracy Analysis of Affix Removal Stemming Algorithms
    Pages : 265-269
    Sandeep R. Sirsat, Vinay Chavan, Hemant S. Mahalle
    Abstract | PDFPDF
    18.
    Review- Role of Data Mining in Agriculture
    Pages : 270-272
    Raorane A.A., Kulkarni R.V.
    Abstract | PDFPDF
    19.
    Continuously Distributed Path Estimation by Using DIV
    Pages : 273-277
    K. Anusha, R. Lakshmi Tulasi
    Abstract | PDFPDF
    20.
    Mobility and Scalability based Performance Analysis of DSDV, AODV and DSR Routing Protocols in MANETs - A Technical Perspective
    Pages : 278-284
    G.L. Saini, Deepak Dembla
    Abstract | PDFPDF
    21.
    Securing SMS using Cryptography
    Pages : 285-288
    Sri Rangarajan, N. Sai Ram, N. Vamshi Krishna
    Abstract | PDFPDF
    22.
    Background Detection by Two Way Technique
    Pages : 289-291
    Rupali Patharkar, Sonali Bodkhe, Dr. A.R Mahajan
    Abstract | PDFPDF
    23.
    Innovative Context Free Approach for Image Retrieval
    Pages : 292-294
    B.Ramesh Kumar, K.Suresh, S.K.Basheer, M.Raja Krishna Kumar
    Abstract | PDFPDF
    24.
    Real - Time Fault Tolerance and it's Implementation Using RTAI 3.8
    Pages : 295-301
    Ashis Kumar Mishra, Anil Kumar Mishra, Yogomaya Mohapatra
    Abstract | PDFPDF
    25.
    A Java Implementation of Signcryption Protocol Based on Elliptic Curve
    Pages : 302-305
    Biswajit Sama, Sumanjit Das, J. Chandrakanta Badajena
    Abstract | PDFPDF
    26.
    Software Testing
    Pages : 306-308
    Uma Nath Yadav, Ashutosh Rai,,Priyaranjan Verma
    Abstract | PDFPDF
    27.
    Model Driven Engineering Using UML. A Pragmatic Approach
    Pages : 309-314
    Biswajit Sama, Sumanjit Das, J. Chandrakanta Badajena
    Abstract | PDFPDF
    28.
    Foolproof Security for KeyStrokeBiometrics
    Pages : 315-318
    M. IndraSena Reddy, K. Subba Reddy, V. Uday Kumar
    Abstract | PDFPDF
    29.
    Relevance Feedback for Image Retrieval
    Pages : 319-323
    Vaishali D. Dhale, Dr. A. R. Mahajan, Prof. Uma Thakur
    Abstract | PDFPDF
    30.
    CIS: Web Knowledge on Achievable Search Engine
    Pages : 324-330
    P.Srilakshmi,M.Rajasekhar
    Abstract | PDFPDF
    31.
    Authenticated Mutual Communication between two Nodes in MANETs
    Pages : 331-333
    Dega Ravi Kumar Yadav , K. Nikitha Reddy , N. Vamshi Krishna
    Abstract | PDFPDF
    32.
    QOS Provisoning Scheme for Wireless Ad-hoc Sensor Networks
    Pages : 334-337
    Deepika Jain , Sitendra Tamrakar
    Abstract | PDFPDF
    33.
    Unobtrusive Technique for the Detection of Data Seepage
    Pages : 338-340
    Anusha.Koneru,G.Siva Nageswara Rao,J.Venkata Rao
    Abstract | PDFPDF
    34.
    A Graspable Learning System for the Classification of XML Documents
    Pages : 341-344
    Navya sree.Yarramsetti,G.Siva Nageswara Rao,J.Venkata Rao
    Abstract | PDFPDF
    35.
    SQL Injection Prevention in Banking
    Pages : 345-349
    Sampada Gadgil
    Abstract | PDFPDF
    36.
    An Empirical Observation Of 3G Networks Property:Bandwidth Analysis
    Pages : 350-354
    Krishna Kant Lavania, Yogita Sharma, Arun Kumar Singh
    Abstract | PDFPDF
    37.
    Cryptography Using Cellular Automata
    Pages : 355-357
    Harsh Bhasin, Ramesh Kumar, Neha Kathuria
    Abstract | PDFPDF
    38.
    An Adaptive MAC 802.11 Protocol for MANET Using Exponential Algorithm
    Pages : 358-362
    P.S. Patheja , Vaishali Tiwari , Akhilesh A. Waoo
    Abstract | PDFPDF
    39.
    Article Removed
    Pages : xxx-xxx
    xxx, xxx
    Abstract | PDFPDF
    40.
    Survey of Power Control Schemes for LTE Uplink
    Pages : 369-373
    E Tejaswi, Suresh B
    Abstract | PDFPDF
    41.
    Orthogonal Testing Using Genetic Algorithms
    Pages : 374-377
    Orthogonal Testing Using Genetic Algorithms
    Abstract | PDFPDF
    42.
    Regression Testing Using Fuzzy Logic
    Pages : 378-380
    Harsh Bhasin, Shailja Gupta, Mamta Kathuria
    Abstract | PDFPDF
    43.
    A Block based Reversible Medical Image Watermarking
    Pages : 381-384
    Manish Madhava Tripathi
    Abstract | PDFPDF
    44.
    An Extended Zigbee Wireless Vehicular Identification and Authentication System
    Pages : 385-387
    Md.Asim Iqbal, Dr.Syed Musthaq Ahmed
    Abstract | PDFPDF
    45.
    Neural Network
    Pages : 388-391
    Krunal N. Chandewar, Amit N. Sangol, Gunwant V. Mankar
    Abstract | PDFPDF
    46.
    A Novel Energy threshold based Location Aided Routing in MANET
    Pages : 392-397
    Richa Jain, Dr. Samidha Dewivedi Sharma
    Abstract | PDFPDF
    -All rights are reserved by International Journal of Computer Science and Information Technologies-