• Up Coming Issue >
  • Up-Coming Conference
  • Conference Papers
  • Indexing
  • Peer-Review
  • Publication Ethics
  • Contact
  • FAQ
  • Terms&Conditions
  • Site Map
  • bh

     

    VOLUME 4 ISSUE 6 November - December 2013

    ISSN 0975 - 9646

    1.
    Watchdog Three-Tier Technique to Secure Wireless Sensor Network
    Pages : 751-754
    Pramod D Mane , Prof. D.H.Kulkarni
    Abstract | PDFPDF
    2. Survey on Security Issues and Problems in Cloud Computing Virtual Machines
    Pages : 755-760
    Shwetha S
    Abstract | PDFPDF
    3. RFID Detect Credit Card  Skimmers Using Neural Networks
    Pages : 761-765
    R. Dhanapal, P. Gayathri
    Abstract | PDFPDF
    4. Survey on Web Page Noise Cleaning for Web Mining
    Pages : 766-770
    S. S. Bhamare, Dr. B. V. Pawar
    Abstract | PDFPDF
    5. Negative Selection Method for Virus Detection in a Cloud
    Pages : 771-774
    Agnika Sahu, Prabhat Ranjan Maharana
    Abstract | PDFPDF
    6. Object Recognition Using Texture Based Analysis
    Pages : 775-782
    Mansi Saraswat, Anil Kumar Goswami, Aastha Tiwari
    Abstract | PDFPDF
    7. A Comprehensive Study of Phishing Attacks
    Pages : 783-786
    M. Nazreen Banu, S. Munawara Banu
    Abstract | PDFPDF
    8. Implementation of Personalized User Model Based on Ontology: A Review Study
    Pages : 787-790
    Shamkala Waghmare, Prof. R. K. Krishna
    Abstract | PDFPDF
    9. Sequential Mining of Multimedia Images by using SPADE Algorithm
    Pages : 791-795
    Harsh mathur
    Abstract | PDFPDF
    10. Coverage Of Total Target Field To Form WSN Using Delaunay Triangulation
    Pages : 796-799
    S.Surekha, M.KalyanRam
    Abstract | PDFPDF
    11. Robust Topology, Self-Scheduling Approach Based on Remaining Energy for WSN
    Pages : 800-803
    Ranjeet Kagade ,Prof.Mrs.R.A.Satao
    Abstract | PDFPDF
    12. On the Applications of Cellular Automata and Artificial Life
    Pages : 804-807
    Harsh Bhasin, Nandeesh Gupta
    Abstract | PDFPDF
    13. Interfirewall Optimization across Administrative Domains for Enabling Privacy Preserving and Security
    Pages : 808-812
    Aruna Devi.R, PON Arivanandham
    Abstract | PDFPDF
    14. Comparative Analysis of Hierarchical Routing in Wireless Sensor Networks
    Pages : 813-817
    Ankita Bindlish, Anish Soni
    Abstract | PDFPDF
    15. A study on Comparative Performance of SVM Classifier Models with Kernel Functions in Prediction of Hypertension
    Pages : 818-821
    Rahul Samant, Srikantha Rao
    Abstract | PDFPDF
    16. Preserving Anonymity in Mixnet using AES Encryption Algorithm
    Pages : 822-825
    M. Uma Devi, R.Srinivas, K.N.Bhargavi
    Abstract | PDFPDF
    17. Steganography– Information Hiding in Source Code Langauge
    Pages : 826-829
    Veenu Arora, Raninder dhillon
    Abstract | PDFPDF
    18. Abnormality Detection in Digital Mammogram
    Pages : 830-834
    S Narasimha Murthy, Arun Kumar M N , H.S. Sheshadri
    Abstract | PDFPDF
    19. Survey on Image Resolution Techniques for Satellite Images
    Pages : 835-838
    P.Suganya, N.Mohanapriya, A.Vanitha
    Abstract | PDFPDF
    20. Gender Classification Technique Based on Facial Features using Neural Network
    Pages : 839-843
    Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour
    Abstract | PDFPDF
    21. Image Segmentation using Morphological Operations for Automatic Region Growing
    Pages : 844-847
    Ritu Sharma, Rajesh Sharma
    Abstract | PDFPDF
    22. A Recent Approach to Organise Structured Data in Mobile Environment
    Pages : 848-852
    R.Jegadeesan, Dr.N.Sankar Ram, R.Janakiraman
    Abstract | PDFPDF
    23. Efficient Resource Allocation and Tracking in Structured P2P network: Back Trackable Finger Table based CHORD (BTFT-CHORD) Protocol
    Pages : 853-857
    D.Srivihari, P.Prasanna Murali Krishna
    Abstract | PDFPDF
    24. Fault Tolerance Techniques in Grid Computing Systems
    Pages : 858-862
    T. Altameem
    Abstract | PDFPDF
    25. An Effective Approach for Video Copy Detection and Identification of Misbehaving Users
    Pages : 863-867
    S.Sujatha
    Abstract | PDFPDF
    26. A secured Transmission of Embedded Hidden Data in Binary Images Using Resolution Variant Visual Cryptography
    Pages : 868-870
    Koppala K V P Sekhar, S Sateesh Kumar, Y.Ramesh Kumar
    Abstract | PDFPDF
    27. EDBAT: Efficient Demand Based Energy Allocation Topology for Mobile Ad Hoc Networks
    Pages : 871-874
    Kureti Maheswara Rao, M.L.Ravichandra
    Abstract | PDFPDF
    28. A Sparse Representation Approach to Facial Expression Recognition Based on LBP plus LFDA
    Pages : 875-878
    Ritesh Bora, V.A.Chakkarvar
    Abstract | PDFPDF
    29. An Enhanced Approach for Character Recognition Based On Discriminative Semi-MarkovModel
    Pages : 879-882
    P.Ramya , S.Karthiprem, R.V.Viswanathan
    Abstract | PDFPDF
    30. CAPSULE A Programming Language Code Compression Technique
    Pages : 883-885
    Govind Prasad Arya, Prince Kashyap, Nilika Kumari, Mitali Hembrom
    Abstract | PDFPDF
    31. Visualizing Page Replacement Techniques based on Page Frequency and Memory Access Pattern
    Pages : 886-890
    Ruchin Gupta, Narendra Teotia
    Abstract | PDFPDF
    32. Privacy Preserving Clustering Over Distributed Data
    Pages : 891-894
    K.A.Sireesha, R.Srinivas, K.Arunbhaskar
    Abstract | PDFPDF
    33. Ubiquitous Real Time ECG Monitoring System Using Android Smartphone
    Pages : 895 - 898
    Satish Patil, Pallavi Kulkarni
    Abstract | PDFPDF
    34. An Advanced Data Transformation Algorithm for Categorical Data Protection
    Pages : 899-902
    Dnyaneshwar Pandurang Naik, Anjana N. Ghule
    Abstract | PDFPDF
    35. Simulation Based Analysis of Target Area Calculation and Key Pre Distribution Scheme in WSNs using Node Deployment Knowledge
    Pages : 903 - 907
    M.L.G.N.Chellarao, M. Kalyan Ram
    Abstract | PDFPDF
    36. Skills Based Learning Environments: Semantic Annotation with Mapping Method
    Pages : 908 - 912
    R.Anish
    Abstract | PDFPDF
    37. Effective Energy Depletion in Wireless Sensor Network using EEDC Technique
    Pages : 913 - 916
    C. Chandru Vignesh, A. Christopher Paul, M.Boopathiraja
    Abstract | PDFPDF
    38. Utility Based Pattern Matching Approach for Data Mining
    Pages : 917 - 921
    Kanchi. Suresh, Dr. Hari Krishna Pulagam
    Abstract | PDFPDF
    39. Application of Cloud Computing in Agricultural Development of Rural India
    Pages : 922-926
    Rakesh Patel , Mili. Patel
    Abstract | PDFPDF
    40. Implementation of Ant Colony Optimization with OLSR in Mobile Ad hoc Network
    Pages : 927-930
    Ashu Tyagi , Pankaj Sharma
    Abstract | PDFPDF
    41. Integration of Transport Department Check Posts with the help of National Register (NR) of Vehicle in the Perspective of E-Governance
    Pages : 931-932
    Piyush Gupta, Dr saurabh Gupta
    Abstract | PDFPDF
    42. A Review on Fixed-Rank Representation for Supervised Learning Using Neural Network
    Pages : 933-936
    M. Abdul. Zahed Javeed, Shubhangi Sapkal
    Abstract | PDFPDF
    43. Improving Technique for GAIT RECOGNITION & Performing Feature Extraction Using Videos of
    Different Forms

    Pages : 937-939
    Ashutosh Batta and Chirag Sharma
    Abstract | PDFPDF
    44. Gateway relocation by Bandwidth based Admission Control Scheme in WiMax
    Pages : 940-944
    Srinivasa kalyan venigalla , Mounika Modadugu , Voonna Venkata Nagaraju , Vepuri Bhargavi
    Abstract | PDFPDF
    45. Face Recognition using Rectangular Feature
    Pages : 945-949
    Sanjay Pagare, Dr. W. U. Khan
    Abstract | PDFPDF
    46. Denial of Service Mitigation Method
    Pages : 950-953
    Madhuri H. Bhagwat, Amol P. Pande
    Abstract | PDFPDF
    47. A Poly-alphabetic Approach to Caesar Cipher Algorithm
    Pages : 954-959
    Prachi Patni
    Abstract | PDFPDF
    48. Enhanced Naïve Bayes Algorithm for Intrusion Detection in Data Mining
    Pages : 960-962
    Shyara Taruna R. Mrs. Saroj Hiranwal
    Abstract | PDFPDF
    49. Energy Efficient Node Addressing Scheme in Hierarchical Wireless sensor Network
    Pages : 963-966
    Ganesh.S.Pise , Vinod. V. Kimbahune
    Abstract | PDFPDF
    50. Heterogeneous Spatial Data Integration Process Using Business Intelligence Approach
    Pages : 967-973
    M. Mustafa, A. Aliff , M. Yazid
    Abstract | PDFPDF
    51. Reviewing MANETs & Configurations of Certification Authority (CA) for node Authentication
    Pages : 974-978
    Dr. Shaveta Rani, Dr. Paramjeet Singh, Raman Preet
    Abstract | PDFPDF
    52. GPS Based Vehicle Navigation System Using Google Maps
    Pages : 979-982
    Ch.ChakradharaRao, P.Pushpalatha, N.AdityaSundar
    Abstract | PDFPDF
    53. Vehicle Speed Control System Using GSM/GPRS
    Pages : 983-987
    B.Devikiruba
    Abstract | PDFPDF
    54. Nested Software Pattern Testing on Cloud Storages
    Pages : 988-994
    V.Nethaji, C.Chandrasekar
    Abstract | PDFPDF
    55. Impact of Data Warehousing and Data Mining in Decision Making
    Pages : 995-999
    Monika Pathak, Sukhdev Singh, Sukhwinder Singh Oberoi
    Abstract | PDFPDF
    56. Improved Persuasive Cued Click Points for Knowledge-Based Authentication
    Pages : 1000-1003
    Suresh Pagidala, C. Shoba Bindu
    Abstract | PDFPDF
    57. Enhanced OLSR for Defense against Node Isolation Attack in Ad Hoc Networks
    Pages : 1004-1009
    Banoth Balaji , Mohammed HasanKhan , R. Prathap Kumar
    Abstract | PDFPDF
    58. Link/Node Failure Recovery through Backup Path Lengths
    Pages : 1010-1016
    Ravula Prathap Kumar, Banothu Balaji, Dasari Yakobu, N Sai Bala Kishore
    Abstract | PDFPDF
    59. Parallel Fractal Coding for Color Image Compression Using Genetic Algorithm and Simulated Annealing
    Pages : 1017-1022
    A.R.Nadira Banu Kamal , P.Priyanga
    Abstract | PDFPDF
    60. Predictive Machine Learning Techniques for Breast Cancer Detection
    Pages : 1023-1028
    S.Kharya , D. Dubey , and S. Soni
    Abstract | PDFPDF
    61. Hybrid Approach of Facial Expression Recognition
    Pages : 1029-1033
    Pinky Rai , Manish Dixit
    Abstract | PDFPDF
    62. Detection And Prevention of Misbehaving Users in Anonymizing Networks
    Pages : 1034-1037
    Anuse A.A, Prof. Rachana A. Satao
    Abstract | PDFPDF
       
    -All rights are reserved by International Journal of Computer Science and Information Technologies-