e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

TOPICS

IJCSE Topics

ISSUES

Volume 9 Issue 11
Volume 9 Issue 10
Volume 9 Issue 9
Volume 9 Issue 8
Volume 9 Issue 7
Volume 9 Issue 6
Volume 9 Issue 5
Volume 9 Issue 4
Volume 9 Issue 3
Volume 9 Issue 2
Volume 9 Issue 1
Volume 8 Issue 12
Volume 8 Issue 11
Volume 8 Issue 10
Volume 8 Issue 9
Volume 8 Issue 8
Volume 8 Issue 7
Volume 8 Issue 6
Volume 8 Issue 5
Volume 8 Issue 4
Volume 8 Issue 3
Volume 8 Issue 2
Volume 8 Issue 1
Volume 7 Issue 12
Volume 7 Issue 11
Volume 7 Issue 10
Volume 7 Issue 9
Volume 7 Issue 8
Volume 7 Issue 7
Volume 7 Issue 6
Volume 7 Issue 5
Volume 7 Issue 4
Volume 7 Issue 3
Volume 7 Issue 2
Volume 7 Issue 1
Volume 6 Issue 12
Volume 6 Issue 11
Volume 6 Issue 10
Volume 6 Issue 9
Volume 6 Issue 8
Volume 6 Issue 7
Volume 6 Issue 6
Volume 6 Issue 5
Volume 6 Issue 4
Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1
Volume 5 Issue 12
Volume 5 Issue 11
Volume 5 Issue 10
Volume 5 Issue 9
Volume 5 Issue 8
Volume 5 Issue 7
Volume 5 Issue 6
Volume 5 Issue 5
Volume 5 Issue 4
Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1
Volume 4 Issue 12
Volume 4 Issue 11
Volume 4 Issue 10
Volume 4 Issue 9
Volume 4 Issue 8
Volume 4 Issue 7
Volume 4 Issue 6
Volume 4 Issue 5
Volume 4 Issue 4
Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1
Volume 3 Issue 12
Volume 3 Issue 11
Volume 3 Issue 10
Volume 3 Issue 9
Volume 3 Issue 8
Volume 3 Issue 7
Volume 3 Issue 6
Volume 3 Issue 5
Volume 3 Issue 4
Volume 3 Issue 3
Volume 3 Issue 2
NCICT 2010 Special Issue
Volume 3 Issue 1
Volume 2 Issue 9
Volume 2 Issue 8
Volume 2 Issue 7
Volume 2 Issue 6
Volume 2 Issue 5
Volume 2 Issue 4
Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1 S
Volume 2 Issue 1
Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 3 ISSUE 6 2011

ISSN: 0975–3397

Article # Article Title & Authors (Volume 3 Number 6 June 2011) Page
1. A new secure and practical electronic voting protocol without revealing voters identity
Sadegh Jafari, Jaber Karimpour, Nasour Bagheri
Abstract | PDFIconPDF
2191-2199
2. Web Service Security Through Business Logic
M.S.SALEEM BASHA, M.THIRUMARAN, P.DHAVACHELVAN
Abstract | PDFIconPDF
2200-2216
3. Improving Capacity of soft Handoff Performance in Wireless Mobile Communication using Macro Diversity
Vipin Kumar Saini, Dr. Sc. Gupta
Abstract | PDFIconPDF
2217-2223
4. New Edge Detection Technique based on the Shannon Entropy in Gray Level Images
Mohamed A. El-Sayed, Tarek Abd-El Hafeez
Abstract | PDFIconPDF
2224-2232
5. A Realistic Approach: RTST to Reduce Cost & Time
Neeraj Kumar, Prof. (Dr.) Ajay Rana
Abstract | PDFIconPDF
2233-2239
6. Secure Association Rule Mining for Distributed Level Hierarchy in Web
Gulshan Shrivastava, Dr. Vishal Bhatnagar
Abstract | PDFIconPDF
2240-2244
7. Private and Secure Hyperlink Navigability Assessment in Web Mining Information System
Kavita Sharma, Dr. Vishal Bhatnagar
Abstract | PDFIconPDF
2245-2250
8. Computer Vision for Malaria Parasite Classification in Erythrocytes
J.SOMASEKAR
Abstract | PDFIconPDF
2251-2256
9. An Integer Programming-based Local Search for Large-Scale Multidimensional Knapsack Problems
Junha Hwang, Sungjae Park, In Yeup Kong
Abstract | PDFIconPDF
2257-2264
10. An Invisible Zero Watermarking Algorithm using Combined Image and Text for Protecting Text Documents
Jaseena K.U, Anita John
Abstract | PDFIconPDF
2265-2272
11. A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET
SWATI SAXENA, Dr. MADHAVI SINHA
Abstract | PDFIconPDF
2273-2285
12. PRIORITY BASED UPLINK SCHEDULER FOR IEEE 802.16 NETWORKS
Gurpreet Singh, Akashdeep
Abstract | PDFIconPDF
2286-2289
13. OPTIMIZATION OF LOW POWER USING FIR FILTER
S. Prem Kumar, S. Sivaprakasam, G. Damodharan, V. Ellappan
Abstract | PDFIconPDF
2290-2299
14. Inheritance Hierarchy Based Reuse & Reusability Metrics in OOSD
Nasib S. Gill, Sunil Sikka
Abstract | PDFIconPDF
2300-2309
15. We.I.Pe: Web Identification of People using e-mail ID
K.S. Kuppusamy, G.Aghila
Abstract | PDFIconPDF
2310-2316
16. Improving the Performance of K-Means Clustering For High Dimensional Data Set
P.Prabhu, N.Anbazhagan
Abstract | PDFIconPDF
2317-2322
17. VoIP over WMN: Effect of packet aggregation
Khyati Marwah, Dr. Gurpal Singh
Abstract | PDFIconPDF
2323-2331
18. Handwritten Gurmukhi Character Recognition Using Statistical and Background Directional Distribution Features
Kartar Singh Siddharth, Mahesh Jangid, Renu Dhir, Rajneesh Rani
Abstract | PDFIconPDF
2332-2345
19. Automatic detection of human and Energy saving based on Zigbee Communication
Chinnam Sujana, Addanki Purna Ramesh, P.Gopala Reddy
Abstract | PDFIconPDF
2346-2353
20. Security Management System for Oilfield Based on GSM Technology
Batchu Spandana, Addanki Purna Ramesh, P.Gopala Reddy
Abstract | PDFIconPDF
2354-2360
21. Quantitative evaluation of Segmentation algorithms based on level set method for ISL datasets
Ms. M. Krishnaveni, Dr. V. Radha
Abstract | PDFIconPDF
2361-2369
22. Parent Siblings Oriented Tree Quorum Protocol
Anurag Singh, Ashish Kumar Rai, Anup Kumar Jayswal and Meenu
Abstract | PDFIconPDF
2370-2376
23. A Simple Hybrid Wormhole Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks
A.VANI, D.Sreenivasa Rao
Abstract | PDFIconPDF
2377-2384
24. Intelligent and Effective Heart Disease Prediction System using Weighted Associative Classifiers
Jyoti soni, Ujma Ansari, Dipesh Sharma, Sunita Soni
Abstract | PDFIconPDF
2385-2392
25. Security For Wireless Sensor Network
Saurabh Singh, Dr. Harsh Kumar Verma
Abstract | PDFIconPDF
2393-2399
26. Devanagari Isolated Character Recognition by using Statistical features
( Foreground Pixels Distribution, Zone Density and Background Directional Distribution feature and SVM Classifier)
Mahesh Jangid
Abstract | PDFIconPDF
2400-2407
27. Schedule Risk Analysis Simulator using Beta Distribution
Isha Sharma, Dr. P.K. Suri
Abstract | PDFIconPDF
2408-2414
28. Image Compression Using Fast 2-D DCT Technique
Anjali Kapoor, Renu Dhir
Abstract | PDFIconPDF
2415-2419
29. Preprocessing and Screen-Cursor Mapping for a Virtual TouchScreen on a Projected Area
Smita Das, Dwijen Rudrapal, Anupam Jamatia, Lalita Kumari
Abstract | PDFIconPDF
2420-2429
30. Global Chaos Synchronization of the Hyperchaotic Qi Systems by Sliding Mode Control
Dr. V. Sundarapandian, S. Sivaperumal
Abstract | PDFIconPDF
2430-2437
31. Anti-Synchronization of the Hyperchaotic Liu and Hyperchaotic Qi Systems by Active Control
Dr. V. Sundarapandian, R. Karthikeyan,
Abstract | PDFIconPDF
2438-2449
32. Anti-Synchronization of the Hyperchaotic Lorenz Systems by Sliding Mode Control
Dr. V. Sundarapandian, S. Sivaperumal
Abstract | PDFIconPDF
2450-2457
33. Global Chaos Synchronization of Hyperchaotic Lorenz and Hyperchaotic Chen Systems by Adaptive Control
Dr. V. Sundarapandian, R. Karthikeyan
Abstract | PDFIconPDF
2458-2472
34. Facets of Software Component Repository
Vaneet Kaur, Shivani Goel
Abstract | PDFIconPDF
2473-2476
35. Cloud Based Distributed Databases: The Future Ahead
Arpita Mathur, Mridul Mathur, Pallavi Upadhyay
Abstract | PDFIconPDF
2477-2481
36. Metric for Early Measurement of Software Complexity
Ghazal Keshavarz, Dr. Nasser Modiri, Dr. Mirmohsen Pedram
Abstract | PDFIconPDF
2482-2490
37. Ambient Intelligence: Next Generation Technology
Anand Chandrasekhar, Vineeth.P.Kaimal, Mrs. Chhayadevi Bhamare, Miss Sunanda Khosla
Abstract | PDFIconPDF
2491-2497
38. An Implementation of Semantic Web System for Information retrieval using J2EE Technologies.
B.Hemanth kumar, Prof. M.Surendra Prasad Babu
Abstract | PDFIconPDF
2498-2505
39. Generating Customer Profiles for Retail Stores Using Clustering Tech
Pramod Prasad, Dr. Latesh G. Malik
Abstract | PDFIconPDF
2506-2510
40. Sectorization of Walsh and Walsh Wavelet in CBIR
Dr. H.B.Kekre, Dhirendra Mishra
Abstract | PDFIconPDF
2511-2522
41. ANN and Fuzzy Logic Models for the Prediction of groundwater level of a watershed
M.Kavitha Mayilvaganan, K.B.Naidu
Abstract | PDFIconPDF
2523-2530
42. A new approach for Evolution of end to end Security in Wireless Sensor Network
S. Anjali Devi, R. Venu Babu, B. Srinivasa Rao
Abstract | PDFIconPDF
2531-2543
43. Combining K-Harmonic mean and Hierarchical algorithms for robust and efficient data clustering with cohesion selfmerging
Jyothi Bankapalli, R.Venu Babu, S. Anjali Devi
Abstract | PDFIconPDF
2544-2553
44. A Mixed-Mode Signal Processing Architecture for Radix-2 DHT
Gautam A. Shah, Tejmal S. Rathore
Abstract | PDFIconPDF
2554-2564
45. Performance of SIFT based Video Retrieval
Shradha Gupta, Prof. Neetesh Gupta, Dr. Bhupendra Verma
Abstract | PDFIconPDF
2565-2571
46. Performance Evaluation of L3 Handover Latency in MIPv6
D.Kavitha, Dr.K.E.Sreenivasa Murthy, S.Zahoor ul Huq
Abstract | PDFIconPDF
2572-2579
47. Information Technology Ethics: The Conceptual Model of Constructs, Actions and Control Measure
Azhar Abd Aziz, Anitawati Mohd Lokman, Zawiyah Mohammad Yusof
Abstract | PDFIconPDF
2580-2588
To view the PDF use Adobe Acrobat 6.0 or more
All Rights Reserved © 2009-2017 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License