e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

TOPICS

IJCSE Topics

ISSUES

Volume 9 Issue 9
Volume 9 Issue 8
Volume 9 Issue 7
Volume 9 Issue 6
Volume 9 Issue 5
Volume 9 Issue 4
Volume 9 Issue 3
Volume 9 Issue 2
Volume 9 Issue 1
Volume 8 Issue 12
Volume 8 Issue 11
Volume 8 Issue 10
Volume 8 Issue 9
Volume 8 Issue 8
Volume 8 Issue 7
Volume 8 Issue 6
Volume 8 Issue 5
Volume 8 Issue 4
Volume 8 Issue 3
Volume 8 Issue 2
Volume 8 Issue 1
Volume 7 Issue 12
Volume 7 Issue 11
Volume 7 Issue 10
Volume 7 Issue 9
Volume 7 Issue 8
Volume 7 Issue 7
Volume 7 Issue 6
Volume 7 Issue 5
Volume 7 Issue 4
Volume 7 Issue 3
Volume 7 Issue 2
Volume 7 Issue 1
Volume 6 Issue 12
Volume 6 Issue 11
Volume 6 Issue 10
Volume 6 Issue 9
Volume 6 Issue 8
Volume 6 Issue 7
Volume 6 Issue 6
Volume 6 Issue 5
Volume 6 Issue 4
Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1
Volume 5 Issue 12
Volume 5 Issue 11
Volume 5 Issue 10
Volume 5 Issue 9
Volume 5 Issue 8
Volume 5 Issue 7
Volume 5 Issue 6
Volume 5 Issue 5
Volume 5 Issue 4
Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1
Volume 4 Issue 12
Volume 4 Issue 11
Volume 4 Issue 10
Volume 4 Issue 9
Volume 4 Issue 8
Volume 4 Issue 7
Volume 4 Issue 6
Volume 4 Issue 5
Volume 4 Issue 4
Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1
Volume 3 Issue 12
Volume 3 Issue 11
Volume 3 Issue 10
Volume 3 Issue 9
Volume 3 Issue 8
Volume 3 Issue 7
Volume 3 Issue 6
Volume 3 Issue 5
Volume 3 Issue 4
Volume 3 Issue 3
Volume 3 Issue 2
NCICT 2010 Special Issue
Volume 3 Issue 1
Volume 2 Issue 9
Volume 2 Issue 8
Volume 2 Issue 7
Volume 2 Issue 6
Volume 2 Issue 5
Volume 2 Issue 4
Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1 S
Volume 2 Issue 1
Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 2 ISSUE 4 2010

ISSN: 0975–3397

Article # Article Title & Authors (Volume 2 Number 4 July 2010) Page
1. Shortest Distance Message Broadcasting for an Applications in an irregular Mobile Topologies
A.Aruna, Prof. M.Sadish Sendil, Dr S. Karthik
Abstract | PDFIconPDF
903-906
2. Tracing and Straightening the Baseline in Handwritten Persian/Arabic Text-line: A New Approach Based on Painting-technique
P. Nagabhushan, Alireza Alaei
Abstract | PDFIconPDF
907-916
3. Power and Delay Aware On-Demand RoutingFor Ad Hoc Networks
Alok Kumar Jagadev, Binod Kumar Pattanayak, Manoj Kumar Mishra, Manojranjan Nayak
Abstract | PDFIconPDF
917-923
4. MATLAB Simulation of Fuzzy Traffic Controller for Multilane Isolated Intersection
Azura Che Soh/Lai Guan Rhung, Haslina Md. Sarkan
Abstract | PDFIconPDF
924-933
5. Neural Network approach for image retrieval based on preference elicitation
B.Veera Jyothi, Dr.Uma Shanker
Abstract | PDFIconPDF
934-941
6. Efficient Algorithm for Frequent Pattern Mining Based On Apriori
Dr. D. N. Goswami, Dr. Anshu Chaturvedi, C.S. Raghuvanshi
Abstract | PDFIconPDF
942-947
7. Improved Round Robin Policya Mathematical Approach
Prof . D. Pandey, Vandana
Abstract | PDFIconPDF
948-954
8. An Efficient Adaptive Filtering for CFA Demosaicking
Dev. R. Newlin, Elwin Chandra Monie
Abstract | PDFIconPDF
954-958
9. Face and Gender Recognition Using Principal Component Analysis
Dr. H. B. Kekre, Sudeep D. Thepade, Tejas Chopra
Abstract | PDFIconPDF
959-964
10. CHARACTER BASED WEIGHTED SUPPORT THRESHOLD ALGORITHM USING MULTI CRITERIA DECISION MAKING TECHNIQUE
Dr.T.Christopher
Abstract | PDFIconPDF
965-971
11. Efficient New Design and Verification of Sign-Digit-Adder for Two Symmetric Redundant Radix-4 Numbers
Qasem Abu Al-Haija, Yathrip Al-Zahouri, Maamoun Ahmed
Abstract | PDFIconPDF
972-978
12. Analysis of AOMDV and OLSR Routing Protocols Under Levy-Walk Mobility Model and Gauss-Markov Mobility Model for Ad Hoc Networks
Gowrishankar, T.G.Basavaraju, SubirKumarSarkar
Abstract | PDFIconPDF
979-986
13. Suggestion of True Popular Items
Huidrom Romesh Chandra Singh, T. kalaikumaran, Dr. S. Karthik
Abstract | PDFIconPDF
987-992
14. Role of IPv6 over Fibre(FIPv6):Issues and Challenges
Hanumanthappa.J, Dr.Manjaiah.D.H., Aravinda.C.V
Abstract | PDFIconPDF
993-1002
15. Design And Implementation of Reconfigurable Rijndael Encryption Algorithms For Reconfigurable Mobile Terminals
L.Thulasimani, M.Madheswaran
Abstract | PDFIconPDF
1003-1011
16. Web Browser Personalisation Design of a Client Side Web-page Access Prediction Mechanism
Mangesh V. Bedekar, Nilesh Kulkarni, Atish Kathpal
Abstract | PDFIconPDF
1012-1017
17. Design and Implementation of a extensiblePeer–to–Peer Content Recommendation System
Mangesh V. Bedekar, Dr. Bharat Deshpande
Abstract | PDFIconPDF
1018-1023
18. Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H. K. Pathak, M. Sanghi
Abstract | PDFIconPDF
1024-1028
19. Public key cryptosystem and a key exchange protocol using tools of non-abelian group
H. K. Pathak, M. Sanghi
Abstract | PDFIconPDF
1029-1033
20. FRIX-Traffic Analyzer And Transportation Assistant
Manuj Darbari, Prateek Kumar, Singh Rakesh, Savitur Prakash
Abstract | PDFIconPDF
1034-1040
21. Effect of Optical Pulse Shape on the Performance of OCDMA in Presence of GVD and Pulse Linear Chirp
Md. Jahedul Islam, Kalyan Kumar Halder, Md. Rafiqul Islam
Abstract | PDFIconPDF
1041-1046
22. MVC Design Pattern for the multi framework distributed applications using XML, spring and struts framework
Praveen Gupta, Prof. M.C. Govil
Abstract | PDFIconPDF
1047-1051
23. A Review of Checkpointing Based Fault Tolerance Techniques in Mobile Distributed Systems
Rachit Garg, Praveen Kumar
Abstract | PDFIconPDF
1052-1063
24. An Improved Round Robin Scheduling Algorithm for CPU scheduling
Rakesh Kumar yadav, Abhishek K Mishra, Navin Prakash, Himanshu Sharma
Abstract | PDFIconPDF
1064-1066
25. Wireless Security on Security Standard Policy:A Case Study
Reza Amirpoor, Ajay Kumar, Satish R. Deavne
Abstract | PDFIconPDF
1067-1071
26. Feature Reduction for Intrusion Detection Using Linear Discriminant Analysis
Rupali Datti, Bhupendra verma
Abstract | PDFIconPDF
1072-1078
27. Recent Advances in SRE Research
S. K. Pandey, K. Mustafa
Abstract | PDFIconPDF
1079-1085
28. Image Segmentation using Extended Edge Operator for Mammographic Images
Dr. H. B. Kekre, Ms. Saylee M. Gharge
Abstract | PDFIconPDF
1086-1091
29. FA New Technique to Backup and Restore DBMS using XML and .NET Technologies
Seifedine Kadry, Mohamad Smaili, Hussam Kassem, Hassan Hayek
Abstract | PDFIconPDF
1092-1102
30. INCREASING THE EFFICIENCY OF THE SOFTWARE ARCHITECTURE RECOVERY THROUGH SPANNING TREE BASED MAXIMAL GRAPH MINING TECHNIQUE
Shaheda Akthar, Sk.Md.Rafi
Abstract | PDFIconPDF
1103-1106
31. SOFTWARE ARCHITECTURE RECOVERY WITH ERROR TOLERANCE AND PENALTY COST IN GRAPH MINING
Shaheda Akthar, Sk.Md.Rafi
Abstract | PDFIconPDF
1107-1110
32. Frequent Data Itemset Mining Using VS_Apriori Algorithms
N. Badal, Shruti Tripathi
Abstract | PDFIconPDF
1111-1118
33. Prediction of Rainfall Using Backpropagation Neural Network Model
Enireddy.Vamsidhar, K.V.S.R.P.Varma, P.Sankara Rao, Ravikanth satapati
Abstract | PDFIconPDF
1119-1121
34. Ruling the Remoteness of Associates and Kin Using Cellular Phone with Latitude Radius Algorithm
Dr.M.HeldaMercy, Pughazendi.N, Y.F.Sakiriyas
Abstract | PDFIconPDF
1122-1125
35. The Asset and Maintenance Management System (AMMS) Project
Rosina Surovi Khan
Abstract | PDFIconPDF
1126-1135
36. INTEGRATED SECURITY FRAMEWORK FOR HYBRID WIRELESS MESH NETWORKS
Paramjeet Rawat, Dr. M.S.Aswal
Abstract | PDFIconPDF
1136-1141
37. Improved Ant Colony Optimization Algorithm based Expert System on Nephrology
Mrs.J.Anitha, Prof.P.V.G.D. Prasad Reddy, Prof.M.S.Prasad Babu, Sri.N.V.Ramana Murty, Sri.K.Nuka Raju
Abstract | PDFIconPDF
1142-1152
38. Microsatellite Plots in SOD-1 gene with Mutations and Predicted Domains reveals a possible role of Mutagenesis
K V S R P Varma, S Ravikanth, Allam Appa Rao, E. Vamsidhar, P.Sankara Rao
Abstract | PDFIconPDF
1153-1158
39. Discovering Communities in Social Networks Through Mutual Accessibility
Dr. M. Mohamed Sathik, A. Abdul Rasheed
Abstract | PDFIconPDF
1159-1164
40. Malaysian Car Number Plate Detection System Based on Template Matching and Colour Information
Mohd Firdaus Zakaria, Shahrel A. Suandi
Abstract | PDFIconPDF
1159-1164
41. Ant Colony Optimization to Discover the Concealed Pattern in the Recruitment Process of an Industry
N. Sivaram, K. Ramar, M. Janaki Meena
Abstract | PDFIconPDF
1165-1172
42. Diagnosis of Liver Tumor from CT Images using Curvelet Transform
S. S. KUMAR, Dr. R. S. MONI
Abstract | PDFIconPDF
1173-1178
43. Control Flow Prediction through Multiblock Formation in Parallel RegisterSharing Architecture
Rajendra Kumar, Dr. P K Singh
Abstract | PDFIconPDF
1179-1183
44. Nondestructive and Noncontact Dielectric Measurement Methods for Transformer Oil Using Free-space Microwave Measurement System in 19 – 25 GHz Frequency Range
M. Aziz, A. K. Ermeey, K. Jusoff
Abstract | PDFIconPDF
1184-1189
45. A Novel Architecture of Agent based Crawling for OAI Resources
Shruti Sharma, J.P.Gupta
Abstract | PDFIconPDF
1190-1195
46. BER Analysis to Increase Capacity of A Cellular System Using SDMA Over a Multipath Rayleigh Fading Channel
Pravindra Kumar, B.K.Kanaujia, M. Gangadharappa
Abstract | PDFIconPDF
1196-1200
47. ARPE : An Attack-Resilient and Power Efficient Multihop WiMAX Network
M. Deva Priya, J.Sengathir , Dr.M.L Valarmathi
Abstract | PDFIconPDF
1201-1208
48. MEDICAL IMAGE SEGMENTATION
H.S.Prasantha, Dr.Shashidhara.H.L, Dr.K.N.B.Murthy, Madhavi Latha
Abstract | PDFIconPDF
1209-1218
49. Efficient Forward Node List Algorithm for Broadcasting in Asymmetric Mobile Ad hoc networks
M.Murugesan, A.Krishnan
Abstract | PDFIconPDF
1219-1222
50. AN EFFICIENT APPROACH FOR EXTRACTION OF LINEAR FEATURES FROM HIGH RESOLUTION INDIAN SATELLITE IMAGERIES
D Chutia, DK Bhattacharyya
Abstract | PDFIconPDF
1223-1227
51. Recovery Algorithm for Transaction Framework in Wireless Mobile Environment
Miraclin Joyce Pamila J.C, Thanushkodi K
Abstract | PDFIconPDF
1228-1232
52. A Novel Approach for Predicting User Behavior for Improving Web Performance
Priyanka Makkar, Payal Gulati
Abstract | PDFIconPDF
1233-1236
53. Distributed Data Mining and Mining Multi-Agent Data
Vuda Sreenivasa Rao, Dr. S Vidyavathi
Abstract | PDFIconPDF
1237-1244
54. Context Aware E-Learning System with Dynamically Composable Learning Objects
Minu. M. Das, Manju Bhaskar, Dr. T. Chithralekha, Dr. S. Sivasathya
Abstract | PDFIconPDF
1245-1253
55. Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach
Md.Headayetullah, G.K. Pradhan
Abstract | PDFIconPDF
1254-1265
56. SECURE ROUTING IN WIRELESS SENSOR NETWORKS: ROUTING PROTOCOLS
A.Senthilkumar, Dr.C.Chandrasekar
Abstract | PDFIconPDF
1266-1270
57. Genetic Algorithm Based Adaptive Learning Scheme Generation For Context Aware E-Learning
Manju Bhaskar, Minu. M. Das, Dr. T. Chithralekha,Dr. S. Sivasathya
Abstract | PDFIconPDF
1271-1279
58. COMPONENT-BASED HETEROGENEOUS SOFTWARE ARCHITECTURE RELIABILITY (COHAR) MODELING
S. Ramamoorthy, Dr. S. P. Rajagopalan, S. Sathyalakshmi
Abstract | PDFIconPDF
1280-1285
59. Audio-Visual Based Multi-Sample Fusion to Enhance Correlation Filters Speaker Verification System
Dzati Athiar Ramli, Salina Abdul Samad, Aini Hussain
Abstract | PDFIconPDF
1286-1294
60. A novel method of dynamic permanent caching with resourceful built up and imperative access
Ijaz Ali Shoukat, Mohsin Iftikhar
Abstract | PDFIconPDF
1295-1302
61. NETWORK FRACTIONAL ROUTING
Dr.V.PALANISAMY, S.ASOKAN
Abstract | PDFIconPDF
1303-1307
62. Implementation of ETAS (Embedding Text in Audio Signal) Model To Ensure Secrecy
K. GEETHA, P.VANITHA MUTHU
Abstract | PDFIconPDF
1308-1313
63. An Analysis of Checkpointing Algorithms for Distributed Mobile Systems
Ajay Khunteta, Praveen Kumar
Abstract | PDFIconPDF
1314-1326
64. The efficiency of algorithms DATA MINING "Close + and Extraction of association rules" for indexation 2D/3D and Selection of characteristic views
Mohamed El far, Lahcen Moumoun, Taoufiq Gadi, Rachid Benslimane
Abstract | PDFIconPDF
1327-1331
65. A Single Hidden Layered Fuzzy Back propagation Algorithm for Joint Radio Resource Management in Radio Access Systems
J.Preethi, Dr.S.Palaniswami
Abstract | PDFIconPDF
1332-1339
66. Audio Compression Codec Using a Dynamic Gammachirp Psychoacoustic Model And a D.W.T Multiresolution Analysis
Khalil Abid, Kais Ouni, Noureddine Ellouze
Abstract | PDFIconPDF
1340-1354
67. Data Security : An Analysis
Dr.S.B.Thorat, S.K.Nayak, M.M.Bokhare
Abstract | PDFIconPDF
1355-1358
68. NOISE REMOVAL IN COMPOUND IMAGE USING MEDIAN FILTER
D.Maheswari, Dr.V.Radha
Abstract | PDFIconPDF
1359-1362
69. An Analysis of Particle Swarm Optimization with Data Clustering-Technique for Optimization in Data Mining
Amreen Khan, Prof. Dr. N.G.Bawane, Prof. Sonali Bodkhe
Abstract | PDFIconPDF
1363-1366
70. A Comparative study of IPv6 Statistical Approach
Srinivasan.Nagaraj, B.Kishore, K.Koteswara rao, G. Apparao
Abstract | PDFIconPDF
1367-1370
71. A Comparative study of Forward Secure Publickey Method Using HIBE and BTE
G.Appa Rao, Srinivasan.Nagaraj, B.Prakash, Dr.V.Valli Kumari, Dr KVSVN Raju
Abstract | PDFIconPDF
1371-1374
72. Implementation of an Energy Efficient Reconfigurable Authentication Unit for Software Radio
L.Thulasimani, M.Madheswaran
Abstract | PDFIconPDF
1375-1380
73. AI based Digital Companding Scheme for OFDM system using custom constellation Mapping and selection
K.Seshadri Sastry, Dr. M. S. Prasad Babu
Abstract | PDFIconPDF
1381-1386
74. A new approach for improvement of fractal image encoding
Sofia Douda, Abdelhakim El Imrani, Abdallah Bagri
Abstract | PDFIconPDF
1387-1394
75. Query Based Duplicate Data Detection on WWW
Ranjna Gupta, Neelam Duhan, A.K. Sharma, Neha Aggarwal
Abstract | PDFIconPDF
1395-1400
76. GUI BASED REMOTE ON/OFF CONTROL AND MONITORING SINGLE PHASE LAMP USING MICROCONTROLLER
Ranjna Gupta, Neelam Duhan, A.K. Sharma, Neha Aggarwal
Abstract | PDFIconPDF
1401-1405
77. Review of some Minimum-Process Synchronous Checkpointing Schemes for Mobile Distributed Systems
Preeti Gupta, Parveen Kumar, Anil Kumar Solanki
Abstract | PDFIconPDF
1406-1410
78. Partial fingerprint matching based on SIFT Features
Ms. S.Malathi, Dr.C.Meena
Abstract | PDFIconPDF
1411-1414
79. Partial fingerprint matching based on SIFT Features
Ms. S.Malathi, Dr.C.Meena
Abstract | PDFIconPDF
1411-1414
80. Results evaluation of max rule, min rule and product rule in score fusion multibiometric systems
Shekhar Karanwal, Davendra Kumar, Rohit Maurya
Abstract | PDFIconPDF
1415-1418
To view the PDF use Adobe Acrobat 6.0 or more
All Rights Reserved © 2009-2017 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License