e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

ISSUES

Current Issue
Archives

CALL FOR PAPERS

CFP 2021

TOPICS

IJCSE Topics

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 3 ISSUE 2 2011

ISSN: 0975–3397

Article # Article Title & Authors (Volume 3 Number 2 February 2011) Page
1. Nonlinear H∞ controller for flexible joint robots with using feedback linearization
M.E.Akbari, G.Alizadeh, S.Khanmohammadi, I.Hassanzadeh, M.Mirzaei,M.A.Badamchizadeh
Abstract | PDFIconPDF
451-466
2. CHOICES ON DESIGNING GF (P) ELLIPTIC CURVE COPROCESSOR BENEFITING FROM MAPPING HOMOGENEOUS CURVES IN PARALLEL MULTIPLICATIONS
Qasem Abu Al-Haija , Mohammad Alkhatib, Azmi B. Jaafar
Abstract | PDFIconPDF
467-480
3. ENHANCED DISTRIBUTED SERVICE MODEL FOR POWER SYSTEM STATE ESTIMATION
V.Gomathi ,V.Ramachandran
Abstract | PDFIconPDF
481-486
4. Adaptive Routing Algorithms in Unstructured Peer-to-Peer (P2P) Systems
Achmad Nizar Hidayanto, Stephane Bressan
Abstract | PDFIconPDF
487-505
5. A Voice Priority Queue (VPQ) Fair Scheduler for the VoIP over WLANs
Kashif Nisar, Abas Md Said, Halabi Hasbullah
Abstract | PDFIconPDF
506-518
6. Development of a Model for Technology Strategy Elaboration
Aliakbar Mazlomi, Rosnah bt. Mohd. Yusuff
Abstract | PDFIconPDF
519-527
7. On the Use of MCDM Technique for Identifying Key Technology: A case of Auto Company
Aliakbar Mazlomi, Rosnah bt. Mohd. Yusuff
Abstract | PDFIconPDF
528-539
8. The role of Ethics in the process of Technology Transfer and Development of 206 Peugeot
Aliakbar Mazlomi, Rosnah bt. Mohd. Yusuff
Abstract | PDFIconPDF
540-553
9. Analytical Simulation and Performance Optimization for Spectrum Sensing in Cognitive Radio Networks
Ayman A. El-Saleh, Mahamod Ismail, Mohd Alauddin Mohd Ali, M. R. Kamarudin, T. A. Rahman
Abstract | PDFIconPDF
554-568
10. SERVICE ORIENTED APPLICATION IN AGENT BASED VIRTUAL KNOWLEDGE COMMUNITY
L. O. Yusuf, O. Folorunso, A. T. Akinwale, A. I. Adejumobi
Abstract | PDFIconPDF
569-579
11. A Data Mining Perspective on the Prevalence of Polio in India
Neera Singh, Sonali Agarwal and Ramesh C. Tripathi
Abstract | PDFIconPDF
580-585
12. Source Feature Based Gender Identification System Using GMM
R. RAJESHWARA RAO, NAGESH
Abstract | PDFIconPDF
586-593
13. Cloud Computing: A solution to Geographical Information Systems (GIS)
Muzafar Ahmad Bhat, Razeef Mohd Shah, Bashir Ahmad
Abstract | PDFIconPDF
594-600
14. A System Based Approach to Efficiently Implement Color Differentiation Mechanism with Respect to Automobiles
MOHAMMED KHALID KALEEM, MOHAMMAD IQUEBAL AKHTER
Abstract | PDFIconPDF
601-606
15. Comparison between k-nn and svm method for speech emotion recognition
Muzaffar Khan, Tirupati Goskula, Mohmmed Nasiruddin ,Ruhina Quazi
Abstract | PDFIconPDF
607-611
16. Honeypot based Secure Network System
Yogendra Kumar Jain, Surabhi Singh
Abstract | PDFIconPDF
612-620
17. AN APPLICATION OF HYBRID CLUSTERING AND NEURAL BASED PREDICTION MODELLING FOR DELINEATION OF MANAGEMENT ZONES
Babankumar S. Bansod, OP Pandey
Abstract | PDFIconPDF
621-631
18. An Improved Framework for Enhancing QoS in MIPv6
Shilpy Gupta, Amit Sharma, Mohit Chowdhary
Abstract | PDFIconPDF
632-641
19. Content Based Image Retrieval using Density Distribution and Mean of Binary Patterns of Walsh Transformed Color Images
H.B.Kekre, Dhirendra Mishra
Abstract | PDFIconPDF
642-651
20. Copy-Move Forgery Detection in Digital Images: Progress and Challenges
Sunil Kumar, P. K. Das, Shally, S. Mukherjee
Abstract | PDFIconPDF
652-663
21. PERFORMANCE CONTRIBUTION BASED SCHEDULING FRAMEWORK FOR PRECEDENCE CONSTRAINT TASKS IN REAL TIME SYSTEM
RADHAKRISHNA NAIK, R.R.MANTHALKAR
Abstract | PDFIconPDF
664-675
22. Modeling Academic Performance Evaluation Using Soft Computing Techniques: A Fuzzy Logic Approach
Ramjeet Singh Yadav, Vijendra Pratap Singh
Abstract | PDFIconPDF
676-686
23. Multimodal Authentication For High End Security
K.Elumalai, M.Kannan
Abstract | PDFIconPDF
687-692
24. Design of MIMO Space-Time Code for High Data Rate Wireless Communication
Mihir Narayan Mohanty, Laxmi Prasad Mishra, Saumendra Kumar Mohanty
Abstract | PDFIconPDF
693-696
25. INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS
J. B. PATIL, B. V. PAWAR
Abstract | PDFIconPDF
697-704
26. Convergence of ART in Few Projections
Tanuja Srivastava, Nirvikar, Raghuvir Singh
Abstract | PDFIconPDF
705-713
27. Feature Extraction in Medical Image using Ant Colony Optimization : A Study
A. Amali Asha, S.P. Victor, A. Lourdusamy
Abstract | PDFIconPDF
714-721
28. COLLABORATION IN WEB BASED LEARNING: A SOCIAL COMPUTING PERSPECTIVE
C.Pooranachandran, Dr.R.Balasubramanian
Abstract | PDFIconPDF
722-727
29. Efficient Storage Reduction of Frequency of Items in Vertical Data Layout
A.Meenakshi, Dr.K.Alagarsamy
Abstract | PDFIconPDF
728-738
30. Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library
K V S S R S S Sarma, P S Avadhani
Abstract | PDFIconPDF
739-743
31. Modified Kalman Filter-based Approach in Comparison with Traditional Speech Enhancement Algorithms from Adverse Noisy Environments
G. Ramesh Babu, Rameshwara Rao
Abstract | PDFIconPDF
744-759
32. Message Encryption Using Deceptive Text and Randomized Hashing
VAMSIKRISHNA YENIKAPATI, B.POORNA SATYANARAYANA
Abstract | PDFIconPDF
760-766
33. Invariant Moments based War Scene Classification using ANN and SVM: A Comparative Study
Daniel Madan Raja S, Shanmugam A
Abstract | PDFIconPDF
767-774
34. DEVELOPMENT OF BIO-CRYPTO KEY FROM FINGERPRINTS USING CANCELABLE TEMPLATES
Prof. Sunil VK Gaddam, Prof. Manohar Lal
Abstract | PDFIconPDF
775-783
35. The Role and Issues of Clustering Technique in Designing Maintainable Object Oriented System
A. K. Malviya, Vibhooti Singh
Abstract | PDFIconPDF
784-788
36. Infrastructural Map for Information Security
Sabah Al-Fedaghi, Hanaa Alnashwan
Abstract | PDFIconPDF
789-796
37. The proposed quantum computational basis of deep ecology: its implications for agriculture
Monendra Grover
Abstract | PDFIconPDF
797-799
38. Safety Measures Using Sextic Curve Cryptography
W. R. Sam Emmanuel, Dr.C.Suyambulingom
Abstract | PDFIconPDF
800-806
39. A Survey of QOS with IEEE 802.11e
Dr.P. Chenna Reddy, V. Venkata Ramana, Dr A. Rama Mohan Reddy
Abstract | PDFIconPDF
807-813
40. An Analysis of Q-Learning Algorithms with Strategies of Reward Function
Ms.S.Manju, Dr.Ms.M.Punithavalli
Abstract | PDFIconPDF
814-820
41. A Survey on Optimistic Fair Digital Signature Exchange Protocols
Alfin Abraham, Vinodh Ewards, Harlay Maria Mathew
Abstract | PDFIconPDF
821-825
42. Survey of Attacks on Mobile AdhocWireless Networks
Vikas Solomon Abel
Abstract | PDFIconPDF
826-829
43. Semantic Inference Model For Database Inference Detection Violation
Rupali Chopade, Prof. B. N. Jagdale, Prof. Amit Savyanavar
Abstract | PDFIconPDF
830-836
44. An Integer Programming-based Local Search for Large-scale Maximal Covering Problems
Junha Hwang, Sungyoung Kim
Abstract | PDFIconPDF
837-843
45. A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks
Mitra Baratchi, Kamal Jamshidi
Abstract | PDFIconPDF
844-853
46. A Framework for Analyzing Software Quality using Hierarchical Clustering
Arashdeep Kaur, Sunil Gulati
Abstract | PDFIconPDF
854-861
47. Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework
MohammadReza Keyvanpour, Somayyeh Seifi Moradi
Abstract | PDFIconPDF
862-870
48. COMPARISON OF MULTICAST ROUTING PROTOCOLS IN AD-HOC WIRELESS NETWORKS
Dr.V.B.Narsimha, B.Manjula, B.Sujatha, K.Arun Raj Bapuji
Abstract | PDFIconPDF
871-876
49. Impact Analysis of Recent DDoS Attacks
Ketki Arora, Krishan Kumar, Monika Sachdeva
Abstract | PDFIconPDF
877-883
50. A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security
Gyanendra Kr. Gupta, A. K. Sharma, Vishnu Swaroop
Abstract | PDFIconPDF
884-891
51. Optimizing Hidden Markov Model for Failure Prediction– Comparison of Gaine’s optimization and Minimum message length Estimator
N.Muthumani, Dr.Antony Selvadass Thanamani
Abstract | PDFIconPDF
892-898
52. A Study of Image Segmentation and Edge Detection Techniques
PunamThakare
Abstract | PDFIconPDF
899-904
53. Efficient Power Utilization Techniques for Wireless Sensor Networks – A Survey
Mr. Sharad Saxena, Dr. Shailendra Mishra, Dr. Ashok Kumar, Dr. D. S. Chauhan
Abstract | PDFIconPDF
905-925
54. Record Matching Over Query Results Using Fuzzy Ontological Document Clustering
V.Vijayaraja, R.Prasanna Kumar, M.A.Mukunthan, G.Bharathi Mohan
Abstract | PDFIconPDF
926-932
55. Fault Tolerance in Real Time Distributed System
Arvind Kumar, Rama Shankar Yadav, Ranvijay, Anjali Jain
Abstract | PDFIconPDF
933-939
56. A Study on Scheduling in Grid Environment
Dr.K.Vivekanandan, D.Ramyachitra
Abstract | PDFIconPDF
940-950
57. Intelligent Data Compression Approach in Multidimensional Data Warehouse
Walid MOUDANI, Mohammad HUSSEIN, Mirna MOUKHTAR, Félix MORA-CAMINO
Abstract | PDFIconPDF
951-960
58. Tree-kNN: A Tree-Based Algorithm for Protein Sequence Classification
Khaddouja Boujenfa, Nadia Essoussi, Mohamed Limam
Abstract | PDFIconPDF
961-968
59. Human Gait Recognition Using Bezier Curves
Pratibha Mishra, Shweta Ezra
Abstract | PDFIconPDF
969-975
60. WaveCluster for Remote Sensing Image Retrieval
Priti Maheshwary, Namita Srivastava
Abstract | PDFIconPDF
976-979
61. MRI Brain Abnormalities Segmentation using K-Nearest Neighbors (k-NN)
Noor Elaiza Abdul Khalid, Shafaf Ibrahim, Puteri Nurain Megat Mohd Haniff
Abstract | PDFIconPDF
980-990
62. Organizational improvement using Organizational paradigms with the support of people paradigms
Md. Shariful Alam, Md. Rashedul Islam, Md. Rofiqul Islam
Abstract | PDFIconPDF
991-996
If you didn't see your file in the TOC drop us an email to ijcseditor @ enggjournals.com with your manuscript id
To view the PDF use Adobe Acrobat 6.0 or more
All Rights Reserved © 2009-2024 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License