e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

TOPICS

IJCSE Topics

ISSUES

Volume 6 Issue 12
Volume 6 Issue 11
Volume 6 Issue 10
Volume 6 Issue 9
Volume 6 Issue 8
Volume 6 Issue 7
Volume 6 Issue 6
Volume 6 Issue 5
Volume 6 Issue 4
Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1
Volume 5 Issue 12
Volume 5 Issue 11
Volume 5 Issue 10
Volume 5 Issue 9
Volume 5 Issue 8
Volume 5 Issue 7
Volume 5 Issue 6
Volume 5 Issue 5
Volume 5 Issue 4
Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1
Volume 4 Issue 12
Volume 4 Issue 11
Volume 4 Issue 10
Volume 4 Issue 9
Volume 4 Issue 8
Volume 4 Issue 7
Volume 4 Issue 6
Volume 4 Issue 5
Volume 4 Issue 4
Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1
Volume 3 Issue 12
Volume 3 Issue 11
Volume 3 Issue 10
Volume 3 Issue 9
Volume 3 Issue 8
Volume 3 Issue 7
Volume 3 Issue 6
Volume 3 Issue 5
Volume 3 Issue 4
Volume 3 Issue 3
Volume 3 Issue 2
NCICT 2010 Special Issue
Volume 3 Issue 1
Volume 2 Issue 9
Volume 2 Issue 8
Volume 2 Issue 7
Volume 2 Issue 6
Volume 2 Issue 5
Volume 2 Issue 4
Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1 Supplementary
Volume 2 Issue 1
Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 2 ISSUE 5 2010

ISSN: 0975–3397

Article # Article Title & Authors (Volume 2 Number 5 August 2010) Page
1. A Survey On Coding Algorithms In Medical Image Compression
S.Bhavani, Dr.K.Thanushkodi
Abstract | PDFIconPDF
1429-1434
2. AN ALGORITHM FOR STEERING CONTROL WITH SIMULATION RESULTS
Apeksha V. Sakhare, Prof. Dr. V. M. Thakare, Prof. R. V. Dharaskar
Abstract | PDFIconPDF
1435-1438
3. E-Commerce Security using PKI approach
Mr. Vikas Rattan, Er. Mirtunjay Sinha, Vikram Bali, Rajkumar Singh Rathore
Abstract | PDFIconPDF
1439-1444
4. A New Look to Traversal Algorithms Using Set Construct Data Structure
Vineet Kumar Sharma, Adesh Kumar Pandey, Dr. V.K. Srivastava
Abstract | PDFIconPDF
1445-1448
5. A Journey from floppy disk to cloud storage
Bindu Trikha
Abstract | PDFIconPDF
1449-1452
6. Neuro Language Generator
P. Dinadayalan, Gnanambigai Dinadayalan, R. Vasantha Kumari
Abstract | PDFIconPDF
1453-1461
7. Test Case Prioritization for Regression Testing based on Severity of Fault
R. Kavitha, Dr. N. Sureshkumar
Abstract | PDFIconPDF
1462-1466
8. Analyzing Motivation of Private Engineering College Students: A Fuzzy Logic Approach
(A case study of private Engineering College)
Abhishek Srivastava, Ayushi Rastogi, Dr. V.K. Srivastava, Kritika Saxena, Sangeeta Arora
Abstract | PDFIconPDF
1467-1476
9. Spectrum sensing and Spectrum shifting implementation in a Cognitive Radio based IEEE 802.22 Wireless Regional Area Network
Mithun Chakraborty, R.Bera, P.Pradhan, R.Pradhan, S.Sunar
Abstract | PDFIconPDF
1477-1481
10. Design and Simulation for Producing Two Amplitude Matched Anti-phase Sine Waveforms Using ±2.5 V CMOS Current-Mode Approach
Anil Kumar Sharma, Dipankar Pal
Abstract | PDFIconPDF
1482-1486
11. Short Message Service using SMS Gateway
Veena K.Katankar, Dr.V.M.Thakare
Abstract | PDFIconPDF
1487-1491
12. An Overview of Side Channel Attacks and Its Countermeasures using Elliptic Curve Cryptography
M.Prabu, R.Shanmugalakshmi
Abstract | PDFIconPDF
1492-1495
13. Next Generation High Speed Computing Using Photonic Based Technology
Umer Farooq, M. Aqeel Iqbal, Muhammad Ahsan, Mashood Malik
Abstract | PDFIconPDF
1496-1503
14. Evolutionary Aspects Of Windows Operating System To Enhance Existing Technology
M. Asad Kayani, M. Aqeel Iqbal, Waleed Abrar, Nabeel Ijaz, Maham Rabbani
Abstract | PDFIconPDF
1504-1513
15. Modern Trends Used In Operating Systems For High Speed Computing Applications
Qurat-ul-Ain Malik, M. Aqeel Iqbal, Nauman Khan, Hamza Khan, Haider Ali
Abstract | PDFIconPDF
1514-1523
16. CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks
Dr.G.Padmavathi, Dr.P.Subashini, Ms.D.Devi Aruna
Abstract | PDFIconPDF
1524-1531
17. Improving Ischemic Beat Classification Using Fuzzy-Genetic Based PCA And ICA
S. Murugan, Dr.S. Radhakrishnan
Abstract | PDFIconPDF
1532-1538
18. A New Approach to Secure Data Aggregation protocol for Wireless Sensor Network
Mukesh Kumar Jha, T. P. Sharma
Abstract | PDFIconPDF
1539-1543
19. Abnormal Gait Recognition
Naveen Rohila, Prof. Brijesh Kumar, Naresh Chauhan
Abstract | PDFIconPDF
1544-1551
20. Facial Expression Recognition
Neeta Sarode, Prof. Shalini Bhatia
Abstract | PDFIconPDF
1552-1557
21. Extraction of Radiology Reports using Text mining
A.V.Krishna Prasad, Dr.S.Ramakrishna, Dr.D.Sravan Kumar, Dr.B.Padmaja Rani
Abstract | PDFIconPDF
1558-1562
22. A Survey of Denial of Service Attacks and it's Countermeasures on Wireless Network
Arockiam. L, Vani. B
Abstract | PDFIconPDF
1563-1571
23. Emerging Requirements Of Reconfigurable Computing Systems For Performance Enhancement
M. Aqeel Iqbal, Asia Khannum, Saleem Iqbal, M. Asif
Abstract | PDFIconPDF
1572-1579
24. Reconfigurable Computing Systems Used To Support Next Generation High Speed Applications
M. Munawwar Iqbal Ch, Muhammad Younus Javed, M. Aqeel Iqbal
Abstract | PDFIconPDF
1580-1587
25. A Framework for an Ontology-Based Data-Gleaning and Agent Based Intelligent Decision Support PPDM System Employing Generalization Technique for Health Care
K. Murugesan, J.Indumathi, D.Manjula
Abstract | PDFIconPDF
1588-1596
26. Quantum Teleportation circuit using Matlab and Mathematica
Ms.Swati Sharma, Prof Asok De, Prof S.N Kulkarni, Prof Asok De, Prof S.N Kulkarni
Abstract | PDFIconPDF
1597-1600
27. Output Regulation of the Arneodo Chaotic System
Sundarapandian Vaidyanathan
Abstract | PDFIconPDF
1601-1608
28. CBIR Using Kekre's Transform over Row column Mean and Variance Vectors
Dr. H. B. Kekre, Kavita Sonavane
Abstract | PDFIconPDF
1609-1614
29. Prediction of Protein Secondary Structure using Artificial Neural Network
MN Vamsi Thalatam, P Venkata Rao, KVSRP Varma, NVR Murty, Allam Apparao
Abstract | PDFIconPDF
1615-1621
30. Printed and Handwritten Mixed Kannada Numerals Recognition Using SVM
G. G. Rajput, Rajeswari Horakeri, Sidramappa Chandrakant
Abstract | PDFIconPDF
1622-1626
31. Decentralized Service Orchestration by Continuous Message Passing
R.JAYAPRAKASH, M. SHANMUGAM , P.MANIKANDAN, S. SHIVARAJ
Abstract | PDFIconPDF
1627-1632
32. A NEW APPROACH FOR VARIANT MULTI ASSIGNMENT PROBLEM
SOBHAN BABU.K, CHANDRA KALA.K, PURUSHOTTAM.S, SUNDARA MURTHY.M
Abstract | PDFIconPDF
1633-1640
33. Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)
Prof.N..Penchalaiah, Dr.R.Seshadri
Abstract | PDFIconPDF
1641-1645
34. Performance of TCP/IP/ UDP adaptive header compression algorithm for wireless network
Prof.N.Penchalaiah, Dr.R.Seshadri
Abstract | PDFIconPDF
1646-1651
35. Enhancement of LSB based Steganography for Hiding Image in Audio
Pradeep Kumar Singh, R.K.Aggrawal
Abstract | PDFIconPDF
1652-1658
36. Superresolution: A Novel Application to Image Restoration
Sanket B.Kasturiwala, Dr.S.A.Ladhake
Abstract | PDFIconPDF
1659-1664
37. Effective Term Based Text Clustering Algorithms
P. Ponmuthuramalingam, T. Devi
Abstract | PDFIconPDF
1665-1673
38. On Human Intelligence
M.A.Anusuya, S.K.Katti
Abstract | PDFIconPDF
1674-1678
39. CLASSIFICATION TECHNIQES IN EDUCATION DOMAIN
B.Nithyasri, K.Nandhini, E.Chandra
Abstract | PDFIconPDF
1679-1684
40. Secure Mobile Agent based Information Gathering in Wireless Network
Ashish Kumar Srivastava, Aditya Goel
Abstract | PDFIconPDF
1685-1689
41. AN EFFICIENT CLASSIFICATION OF GENOMES BASED ON CLASSES AND SUBCLASSES
B.V. DHANDRA, S.S. PATIL
Abstract | PDFIconPDF
1690-1695
42. An Analysis on Preservation of Privacy in Data Mining
Madhan Subramaniam, Senthil R
Abstract | PDFIconPDF
1696-1699
43. Algorithm for Efficient Multilevel Association Rule Mining
Pratima Gautam, Dr. K. R. Pardasani
Abstract | PDFIconPDF
1700-1704
44. PERFORMANCE OF MULTI SERVER AUTHENTICATION AND KEY AGREEMENT WITH USER PROTECTION IN NETWORK SECURITY
NAGAMALLESWARA RAO. DASARI, VUDA SREENIVASARAO
Abstract | PDFIconPDF
1705-1712
45. Improved Fuzzy C-Means Algorithm for MR Brain Image Segmentation
P.Vasuda, S.Satheesh
Abstract | PDFIconPDF
1713-1715
46. Sequence Related IT Functions for String Based Update Operations by New Operational Transformation Algorithms for Wide-Area Collaborative Applications
Santosh kumawat, Ajay Khunteta
Abstract | PDFIconPDF
1716-1721
47. SEMANTIC BASED MULTIPLE WEB SEARCH ENGINE
MS.S.LATHA SHANMUGAVADIVU, DR.M.RAJARAM
Abstract | PDFIconPDF
1722-1728
48. A Single Fromat for Measuring different Aspects of Testing
Mahwish Kundi, Shahid Hussain, Bashir Ahmad, Muhammad Inayat Ullah
Abstract | PDFIconPDF
1729-1732
49. SPEAKER IDENTIFICATION USING 2-D DCT, WALSH AND HAAR ON FULL AND BLOCK SPECTROGRAM
Dr. H. B. Kekre, Dr. Tanuja K. Sarode, Shachi J. Natu, Prachi J. Natu
Abstract | PDFIconPDF
1733-1740
50. High Performance VLSI Design Using Body Biasing in Domino Logic Circuits
Salendra.Govindarajulu, Dr.T.Jayachandra Prasad
Abstract | PDFIconPDF
1741-1745
51. Power Aware Scheduling for Resource Constrained Distributed Real-Time Systems
Santhi Baskaran, P. Thambidurai
Abstract | PDFIconPDF
1746-1753
52. SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH
M.V.P. Chandra Sekhara Rao, Dr.B.Raveendra Babu, Dr. A.Damodaram, Mrs.Aparna Chaparala
Abstract | PDFIconPDF
1754-1757
53. Optimal Capacitor For Maximum Output Power Tracking Of Self Excited Induction Generator Using Fuzzy Logic Approach
Mr.M.Senthilkumar
Abstract | PDFIconPDF
1758-1762
54. Development of a quality design framework for usable User Interfaces
Dr. S. Qamar Abbas, Ms. Ankur Aggarwal
Abstract | PDFIconPDF
1763-1767
55. Performance evaluation of H.264 decoder on different processors
H.S.Prasantha, Dr.Shashidhara.H.L, Dr.K.N.B.Murthy, M.Venkatesh
Abstract | PDFIconPDF
1768-1776
56. Modeling Of Combinational Circuits Based On Ternary Multiplexer Using VHDL
A.Sathish kumar, A.Swetha Priya
Abstract | PDFIconPDF
1777-1791
57. Exploring Issues for QoS Based Routing Algorithms
Dr. Shuchita Upadhyaya, Gaytri Dhingra
Abstract | PDFIconPDF
1792-1795
58. PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
Prof.S.P. Setti, Narasimha Raju K, Naresh Kumar K
Abstract | PDFIconPDF
1796-1800
59. An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
Er. Saiqa Khan, Er. Arun Kulkarni
Abstract | PDFIconPDF
1801-1806
60. A NOVEL CODEBOOK INITIALISATION TECHNIQUE FOR GENERALIZED LLOYD ALGORITHM USING CLUSTER DENSITY
K.Somasundaram, S.Vimala
Abstract | PDFIconPDF
1807-1809
61. Poly Substitution Method for Encryption and Decryption
Jeetendra Kumar Ambulkar
Abstract | PDFIconPDF
1810-1812
62. An Artificial Immune System Model for Multi Agents Resource Sharing in Distributed Environments
Tejbanta Singh Chingtham, G. Sahoo, M.K. Ghose
Abstract | PDFIconPDF
1813-1818
63. Spam Classification using new kernel function in Support Vector Machine
Surendra Kumar Rakse, Sanyam Shukla
Abstract | PDFIconPDF
1819-1823
64. Implementation and simulation of arithmetic logic unit, shifter and Multiplier in Quantum cellular automata technology
Dr.E.N.Ganesh
Abstract | PDFIconPDF
1824-1829
65. An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures
Pooja Sharma, Pawan Bhadana
Abstract | PDFIconPDF
1830-1835
66. MISSING DATA IMPUTATION IN CARDIAC DATA SET
(SURVIVAL PROGNOSIS)
R.KAVITHA KUMAR, DR. R.M.CHADRASEKAR
Abstract | PDFIconPDF
1836-1840
67. Investigation on Efficient Management of workflows in cloud computing Environment
M.Sudha, M.Monica
Abstract | PDFIconPDF
1841-1845
68. Efficient Secured Hash Based Password Authentication in Multiple Websites
T.S.Thangavel, A. Krishnan
Abstract | PDFIconPDF
1846-1851
69. Clustering Mixed Data Set Using Modified MARDL Technique
Mrs. J.Jayabharathy, Dr. S. Kanmani, S. Pazhaniammal
Abstract | PDFIconPDF
1852-1860
70. Direct Processor Access for Non Dedicated Server using Multi Core Processor
P. S. BALAMURUGAN, Dr. K.THANUSHKODI
Abstract | PDFIconPDF
1861-1864
71. Intrusion Detection using unsupervised learning
Kusum bharti, Sanyam Shukla, Shweta Jain
Abstract | PDFIconPDF
1865-1870
72. ROLE OF SYNUCLEIN BETA (SNCB) AND SYNUCLEIN GAMMA (SNCG) IN GLAUCOMA AND ALZHEIMER'S DISEASES – A BIOINFORMATIC APPROACH
Kiran Kumar Reddi, T K Rama Krishna Rao
Abstract | PDFIconPDF
1871-1874
73. A Novel Document Clustering Algorithm Using Squared Distance Optimization Through Genetic Algorithms
Harish Verma, Eatesh Kandpal, Bipul Pandey, Joydip Dhar
Abstract | PDFIconPDF
1875-1879
74. Performance Evaluation Of Different Adaptive Filters For ECG Signal Processing
Sachin singh, Dr K. L. Yadav
Abstract | PDFIconPDF
1880-1883
75. Classification of Different Species Families using Clustering Algorithm
D.Chandravathi, TMN Vamsi, A. M.Sowjanya, Allam AppaRao
Abstract | PDFIconPDF
1884-1886
76. A VIEW ON SECURE ROUTING IN ADHOC NETWORKS
V. Venkata Ramana, K.K.Basheer, P.Srinivasa Rao
Abstract | PDFIconPDF
1887-1892
77. A Study on Enhancement of Loadability of Large-Scale Emerging Power Systems by Using FACTS Controllers
Bindeshwar Singh, N. K. Sharma, A. N. Tiwari
Abstract | PDFIconPDF
1893-1903
78. Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method
Padma Bh, D.Chandravathi, P.Prapoorna Roja
Abstract | PDFIconPDF
1904-1907
79. Performance Comparision of Image Retrieval using Row Mean of Transformed Column Image
Dr. H.B.Kekre, Sudeep D. Thepade, Akshay Maloo
Abstract | PDFIconPDF
1908-1912
80. Dynamic Resource Allocation in Desktop Grids
Bismi A S, Dr.S.Karthik
Abstract | PDFIconPDF
1913-1918
81. Algorithm for Solving Job Shop Scheduling Problem Based on machine availability constraint
Kanate Ploydanai, Anan Mungwattana
Abstract | PDFIconPDF
1919-1925
82. Grid Computing Used For Next Generation High Speed Processing Technology
Muhammad Naqaash, M. Aqeel Iqbal, Qaisar Pervaiz, Omer Shamim, Syed Aqeel Hussain
Abstract | PDFIconPDF
1926-1933
83. k-dominant and Extended k-dominant Skyline Computation by Using Statistics
Md. Anisuzzaman Siddique, Yasuhiko Morimoto
Abstract | PDFIconPDF
1934-1943

To view the PDF use Adobe Acrobat 6.0 or more

All Rights Reserved © 2009-2014 Engg Journals Publications
Creative Commons License
This work is licensed under a Creative Commons Attribution 2.5 India License.