e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

TOPICS

IJCSE Topics

ISSUES

Volume 9 Issue 9
Volume 9 Issue 8
Volume 9 Issue 7
Volume 9 Issue 6
Volume 9 Issue 5
Volume 9 Issue 4
Volume 9 Issue 3
Volume 9 Issue 2
Volume 9 Issue 1
Volume 8 Issue 12
Volume 8 Issue 11
Volume 8 Issue 10
Volume 8 Issue 9
Volume 8 Issue 8
Volume 8 Issue 7
Volume 8 Issue 6
Volume 8 Issue 5
Volume 8 Issue 4
Volume 8 Issue 3
Volume 8 Issue 2
Volume 8 Issue 1
Volume 7 Issue 12
Volume 7 Issue 11
Volume 7 Issue 10
Volume 7 Issue 9
Volume 7 Issue 8
Volume 7 Issue 7
Volume 7 Issue 6
Volume 7 Issue 5
Volume 7 Issue 4
Volume 7 Issue 3
Volume 7 Issue 2
Volume 7 Issue 1
Volume 6 Issue 12
Volume 6 Issue 11
Volume 6 Issue 10
Volume 6 Issue 9
Volume 6 Issue 8
Volume 6 Issue 7
Volume 6 Issue 6
Volume 6 Issue 5
Volume 6 Issue 4
Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1
Volume 5 Issue 12
Volume 5 Issue 11
Volume 5 Issue 10
Volume 5 Issue 9
Volume 5 Issue 8
Volume 5 Issue 7
Volume 5 Issue 6
Volume 5 Issue 5
Volume 5 Issue 4
Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1
Volume 4 Issue 12
Volume 4 Issue 11
Volume 4 Issue 10
Volume 4 Issue 9
Volume 4 Issue 8
Volume 4 Issue 7
Volume 4 Issue 6
Volume 4 Issue 5
Volume 4 Issue 4
Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1
Volume 3 Issue 12
Volume 3 Issue 11
Volume 3 Issue 10
Volume 3 Issue 9
Volume 3 Issue 8
Volume 3 Issue 7
Volume 3 Issue 6
Volume 3 Issue 5
Volume 3 Issue 4
Volume 3 Issue 3
Volume 3 Issue 2
NCICT 2010 Special Issue
Volume 3 Issue 1
Volume 2 Issue 9
Volume 2 Issue 8
Volume 2 Issue 7
Volume 2 Issue 6
Volume 2 Issue 5
Volume 2 Issue 4
Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1 S
Volume 2 Issue 1
Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 2 ISSUE 3 2010

ISSN: 0975–3397

Article # Article Title & Authors (Volume 2 Number 3 May 2010) Page
1. A Study on the Effectiveness of Different Patch Size and Shape for Eyes and Mouth Detection
Lim Huey Charn, Liyana Nuraini Rasid, Shahrel A. Suandi
Abstract | PDFIconPDF (1070KB)
424-432
2. Generalisation of RSA Scheme using fundamental groups and ZKIP
S.Samundeeswari, M.Thiyagarajan
Abstract | PDFIconPDF (363KB)
433-436
3. An Analysis on Endaira:A Provably Secure On-Demand Source Routing Protocol
A.F.A. Abidin, N.S.M. Usop, N.H.N. Zulkifli
Abstract | PDFIconPDF (180KB)
437-442
4. Exclusive Survey of Integrating Testing For Component-Based System
Mahesh Kumar Pawar, Dr. Narendra S. Choudhari, Dr. Ravindra Patel
This manuscript is removed due to copyright infringement
Abstract | PDFIconPDF (7KB)
443-450
5. Robust TCP: An improvement on TCP protocol
Seifeddine Kadry, Issa Kamar, Ali Kalakech, Mohamad Smaili
Abstract | PDFIconPDF (496KB)
451-456
6. Minimizing weighted mean flow time in open shop scheduling with time-dependent weights and intermediate storage cost
Seyed Hossein Hashemi Doulabi, Amir Ardestani jaafari, Mohsen Akbarpour Shirazi
Abstract | PDFIconPDF (415KB)
457-460
7. Ubiquitous Computing-Approach to Intelligence Building Intelligent Network
R.N.Khobragad, S.N. Sawalkar
Abstract | PDFIconPDF (658KB)
461-467
8. Design of intelligent multinode Sensor networking
Mr. N.Suresh kumar, Dr. D.V.Rama Koti Reddy, Mr.B.Promod Kumar, S. Lavanya
Abstract | PDFIconPDF (727KB)
468-472
9. MAX-MIN ANT OPTIMIZER FOR PROBLEM OF UNCERTAINITY
Mr.K.Sankar, Dr. K.Krishnamoorthy
Abstract | PDFIconPDF (455KB)
473-480
10. Emergence of Norms in a Society of Heterogeneous Agents Influenced by the Rules of Cellular Automata Techniques
P.Chakrabarti, J.K. Basu
Abstract | PDFIconPDF (362KB)
481-486
11. Text Summarization and Discovery of Frames and Relationship from Natural Language Text - A R&D Methodology
P.Chakrabarti, J.K. Basu
Abstract | PDFIconPDF (400KB)
487-492
12. Protection of Public Network Communication by using Internet Protocol Security
Mr.Premchand, B.Ambhore, Dr. B.B.Meshram, Ku.A.D.Wankhade
Abstract | PDFIconPDF (392KB)
493-499
13. Analysis of Hopfield Autoassociative Memory in the Character Recognition
Yash Pal Singh, Abhilash Khare, Amit Gupta
Abstract | PDFIconPDF (376KB)
500-503
14. SRGM with logistic-exponential testing-effort with change-point and Analysis of Optimal release policies based on increasing the test efficiency
Shaik. Mohammad Rafi, Dr.K.Nageswara Rao
Abstract | PDFIconPDF (1129KB)
504-516
15. An Ellipsoidal 3D Shape Representation and Wavelet Transform Feature Descriptor for 3D shape Retrieval
Asma Khatun, Prof. Wang Yin Chai
Abstract | PDFIconPDF (775KB)
517-522
16. Index Structure for the Multi-scale Representation of Multi-dimensional Spatial Data in WebGIS
ZhihanLV, GeCHEN, RuinaMA, YongHAN, TaoZhang
Abstract | PDFIconPDF (829KB)
523-530
17. A Cascaded Incoherent Spectrum Sliced Transversal Photonic Microwave Filters-An Analysis
R. K. Jeyachitra, Dr. (Mrs.) R. Sukanesh
Abstract | PDFIconPDF (570KB)
531-535
18. Analysis and Comparative Study of Clock Synchronization Schemes in Wireless Sensor Networks
Surendra Rahamatkar, Dr. Ajay Agarwal, Narendra Kumar
Abstract | PDFIconPDF (437KB)
536-541
19. IMPLEMENTATION OF TASK DISSEMINATION IN WIRELESS SENSOR NETWORKS USING MESH TOPOLOGY
B.Maheswari, Dr.S.Karthik, Prof. T.Rajendran
Abstract | PDFIconPDF (360KB)
542-546
20. Trust-based Routing Security in MANETS
R.Balakrishna, U.Rajeswar Rao, G.A.Ramachandra, M.S.Bhagyashekar
Abstract | PDFIconPDF (533KB)
547-553
21. Adaptability of IEEE 802.15.4(Zigbee) Protocol for Wireless Sensor network
Lalit Saraswat, Pankaj Singh Yadav, Rekha Rani
Abstract | PDFIconPDF (474KB)
554-559
22. Appearance Based Recognition of American Sign Language Using Gesture Segmentation
Vaishali S. Kulkarni, Author2 Dr. S.D.Lokhande
Abstract | PDFIconPDF (195KB)
560-565
23. Test Case Reduction Technique for Semantic Based Web Services
A. Askaruinisa, A.M. Abirami
Abstract | PDFIconPDF (649KB)
566-576
24. Educational Approach of Refactoring in Facilitating Reverse Engineering
Mazni Omar, Sharifah Lailee Syed-Abdullah, Kamaruzaman Jusoff, Azman Yasin, Haslina Mohd
Abstract | PDFIconPDF (410KB)
577-581
25. An Efficient and Robust Metacrawler with Parallel Activities
Vimal Bibhu, Narendra Kumar, Mohammad Islam, Shashank Bhardwaj
Abstract | PDFIconPDF (317KB)
582-585
26. Power-efficient Routing & Increased Yield Approach For WSNs
Kalpana Sharma, Anurag S. Rathor, S. R. Biradar, M.K Ghose
Abstract | PDFIconPDF (786KB)
586-592
27. Analysis QoS Parameters for MANETs Routing Protocols
S. R. Biradar, Subir Kumar Sarkar, Rajanna K M, Puttamadappa C
Abstract | PDFIconPDF (509KB)
593-599
28. QUALITY ASSESSMENT OF CUSTOMER REVIEWS EXTRACTED FROM WEB PAGES : A REVIEW CLUSTERING APPROACH
P.S Hiremath, Siddu P. Algur, S. Shivashankar
Abstract | PDFIconPDF (484KB)
600-606
29. A Systematic Approach for Constructing Static Class Diagrams from Software Requirements
Nabil Arman, Khalid Daghameen
Abstract | PDFIconPDF (545KB)
607-613
30. A Novel Approach for Controlling a Size of a Test Suite with Simple Technique
B.Galeebathullah, C.P.Indumathi
Abstract | PDFIconPDF (384KB)
614-618
31. SECURITY MEASURES OF RANDVUL KEYBOARD
RADHA DAMODARAM, Dr. M.L. VALARMATHI
Abstract | PDFIconPDF (459KB)
619-625
32. Effect of Normalized Scale on Design of Rectangular Microstrip Antenna by using FFBP
Abhilasha Mishra, Vaishali Bhagile, P.M.Pati
Abstract | PDFIconPDF (446KB)
626-629
33. A Handoff Technique to Reduce False-Handoff Probability in Next Generation Wireless Networks
Debabrata Sarddar, Kaushik Mandal, Tapas Jana, Utpal Biswas, M.K. Naskar
Abstract | PDFIconPDF (423KB)
630-634
34. Fuzzy time series forecasting of wheat production
Narendra Kumar, Sachin Ahuja, Shashank Bhardwaj
Abstract | PDFIconPDF (394KB)
635-640
35. Approximate string matching Algorithm
Narendra Kumar, Vipin Kumar, Amit Kumar
Abstract | PDFIconPDF (352KB)
641-644
36. Secure Routing In Wireless Sensor Networks
A.Senthilkumar, Dr. C.Chandrasekar
Abstract | PDFIconPDF (608KB)
645-655
37. Secure Web Service Using Call by Contract
R.Ashitha
Abstract | PDFIconPDF (558KB)
656-663
38. Analyzing security of Authenticated Routing Protocol (ARAN)
Seema Mehla, Bhawna Gupta, Preeti Nagrath
Abstract | PDFIconPDF (357KB)
664-668
39. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol
Seema Mehla, Bhawna Gupta, Preeti Nagrath
Abstract | PDFIconPDF (374KB)
669-673
40. Evaluating Web Sites Based on GHAP
Bindu Madhuri .Ch, Padmaja.M, Dr.J.A.Chandulal
Abstract | PDFIconPDF (357KB)
674-679
41. Enhancement of Split Multipath Routing Protocol in MANET
Dhirendra Kumar Sharma, Sanjay Kumar Biswash, Chiranjeev Kumar
Abstract | PDFIconPDF (789KB)
680-686
42. Deriving Association between Urban and Rural Students Programming Skills
L.Arockiam, S.Charles, I.Carol, P.Bastin Thiyagaraj, S.Yosuva, V. Arulkumar
Abstract | PDFIconPDF (657KB)
687-690
43. Privacy for Semantic Web Mining using Advanced DSA – Spatial LBS Case Study
Dr.D.Sravan Kumar, M.Upendra Kumar
Abstract | PDFIconPDF (408KB)
691-694
44. Multimedia Streaming Technology n 4G Mobile Communication Systems
Govind Singh Tanwar, Ganesh Singh, Vishal Gour
Abstract | PDFIconPDF (420KB)
695-699
45. A NEW HIERARCHICAL TRANSACTION MODEL FOR MOBILE ADHOC NETWORK ENVIRONMENT
Vikram Bali, Rajkumar Singh Rathore
Abstract | PDFIconPDF (394KB)
700-705
46. Current Research Work on Routing Protocols for MANET: A Literature Survey
G.Vijaya Kumar, Y.Vasudeva Reddy, Dr.M.Nagendra
Abstract | PDFIconPDF (399KB)
706-713
47. Indoor Environment Mobile Robot Localization
IMTHIYAS M.P
Abstract | PDFIconPDF (507KB)
714-719
48. FCE: A QUALITY METRIC FOR COTS BASED SOFTWARE DESIGN
M.V.VIJAYA SARADHI, B.R.SASTRY
Abstract | PDFIconPDF (395KB)
720-725
49. Optimized Query Plan Algorithm for the Nested Query
Chittaranjan Pradhan, Sushree Sangita Jena, Prasanta kumar Mahapatra
Abstract | PDFIconPDF (361KB)
726-730
50. A Comparative Study for Deblured Average Blurred Images
Mr. Salem Saleh Al-amri, Dr. N.V. Kalyankar, Dr. Khamitkar S.D
Abstract | PDFIconPDF (1407KB)
731-733
51. A BICS Design to Detect Soft Error in CMOS SRAM
N.M.Sivamangai, Dr. K. Gunavathi, P. Balakrishnan
Abstract | PDFIconPDF (624KB)
734-740
52. INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS
P.Shanthi Bala
Abstract | PDFIconPDF (403KB)
741-745
53. A Fast Algorithm for Mining Multilevel Association Rule Based on Boolean Matrix
Pratima Gautam, K. R. Pardasani
Abstract | PDFIconPDF (502KB)
746-752
54. A Framework for Incremental Hidden Web Crawler
Rosy Madaan, Ashutosh Dixit, A.K. Sharma, Komal Kumar Bhatia
Abstract | PDFIconPDF (527KB)
753-758
55. An agent -based Intelligent System to enhance E-Learning through Mining Techniques
S.Prakasam, Prof.Dr.R.M.Suresh
Abstract | PDFIconPDF (392KB)
759-763
56. IMPROVED PROTECTION IN VIDEO STEGANOGRAPHY USED COMPRESSED VIDEO BITSTREAMS
S. Suma Christal Mary M.E
Abstract | PDFIconPDF (403KB)
764-766
57. A Hybrid System for Fingerprint Identification
Shabana Tadvi, Prof. Mahesh Kolte
Abstract | PDFIconPDF (484KB)
767-771
58. Integration of Web mining and web crawler: Relevance and State of Art
Subhendu kumar pani, Deepak Mohapatra, Bikram Keshari Ratha
Abstract | PDFIconPDF (366KB)
772-776
59. Analysis of Security Features in 5 Layer Internet Model
Suhas J Manangi, Parul Chaurasia, Mahendra Pratap Singh
Abstract | PDFIconPDF (393KB)
777-781
60. Application of Markov Process Model and Entropy Analysis in Data Classification and Information Retrieval
Udayan Ghose, C.S.Rai, Yogesh Singh
Abstract | PDFIconPDF (378KB)
782-785
61. Improve Performance of Extract, Transform and Load (ETL) in Data Warehouse
Vishal Gour, Dr. S.S.Sarangdevot, Govind Singh Tanwar, Anand Sharma
Abstract | PDFIconPDF (317KB)
786-789
62. Gesture Based Educational Software for Children with Acquired Brain Injuries
Er. Zainab Pirani, Dr. Mahesh Kolte
Abstract | PDFIconPDF (872KB)
790-794
63. CP-Miner : A hybrid Approach for Colorectal Polyp Detection
Ms. M. Vanitha, Prof. P. Tamije Selvy, Dr. V.Palanisamy, Prof. AR.Sivakumaran
Abstract | PDFIconPDF (381KB)
795-798
64. Co-Recursively Enumerable Triods with Computable Endpoints
Zvonko Iljazović
Abstract | PDFIconPDF (445KB)
799-803
65. IMAGE SEGMENTATION BY USING EDGE DETECTION
Mr. Salem Saleh Al-amri, Dr. N.V. Kalyankar, Dr. Khamitkar S.D
Abstract | PDFIconPDF (485KB)
804-807
66. Implementation of Secured password for Web applications using two server model
Dr.R.Shashikumar, C.N.Vijay kumr, H.M.Kotresh, Vijay kumar K
Abstract | PDFIconPDF (832KB)
808-817
67.

Synthesis of Linear Array of Parallel Dipole Antennas with Minimum Standing Wave Ratio Using Simulated Annealing and Particle Swarm Optimization approach
Banani Basu, G. K. Mahanti
This manuscript is removed by the author.
Abstract | PDFIconPDF

818-825
68. Design Patterns: A Resource for Reverse Engineering
P. Niranjan Reddy, Jayadev Gyani, P.R.K. Murti
Abstract | PDFIconPDF (333KB)
826-830
69. A new similarity measure for image segmentation
M.Thiyagarajan, S.Samundeeswari
Abstract | PDFIconPDF (503KB)
831-835
70. Automatic Web Image Categorization by Image Content:A case study with Web Document Images
Dr. Murugappan. S, Abirami S, Mizpha Poorana Selvi S
Abstract | PDFIconPDF (518KB)
836-840
71. An Improved Low Complex Spatially Scalable ACC-DCT Based Video Compression Method
G.Suresh, P.Epsiba, Dr.M.Rajaram, Dr.S.N.Sivanandam
Abstract | PDFIconPDF (1012KB)
841-847
72. A Effective and Complete Preprocessing for Web Usage Mining
Mr. Sanjay Bapu Thakare, Prof. Sangram. Z. Gawali
Abstract | PDFIconPDF (433KB)
848-851
73. FUZZY LOGIC BASED SOFTWARE PROCESS IMPROVIZATION FRAMEWORK FOR INDIAN SMALL SCALE SOFTWARE ORGANIZATIONS
A.M.Kalpana, Dr.A.Ebenezer Jeyakumar
Abstract | PDFIconPDF (493KB)
852-859
74. Preserving the Privacy and Sharing the Data using Classification on Perturbed Data
P.Kamakshi, Dr. A.Vinaya Babu
Abstract | PDFIconPDF (420KB)
860-864
75. Guaranteed Packet Transfer in MANET In and Out of Coverage Areas and Energy Saving Using Random Casting
Mrs. S.Gomathi, Dr K.Duraiswamy
Abstract | PDFIconPDF (522KB)
865-869
77. Multi Subgroup Data Compression Technique Using Switch Code
Rajesh Daheriya, Sushil Kumar, Vijay Chaudhari, Dr. Bhupendra Verma
Abstract | PDFIconPDF (458KB)
870-879
78. On the Design of Simulation Package for GPRS Network
Ibrahiem M. M. El Emary, Khalid S. Husain
Abstract | PDFIconPDF (745KB)
880-888
79. Architecture for Mobile based Face Detection / Recognition
Shishir Kumar, Priyank Singh, Vivek Kumar
Abstract | PDFIconPDF (503KB)
889-897
80. Analysis of Secure Real Time Transport Protocol on VoIP over Wireless LAN in Campus Environment
Mohd Nazri Ismail
Abstract | PDFIconPDF (617KB)
898-902
     
All Rights Reserved © 2009-2017 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License