e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

TOPICS

IJCSE Topics

ISSUES

Volume 9 Issue 9
Volume 9 Issue 8
Volume 9 Issue 7
Volume 9 Issue 6
Volume 9 Issue 5
Volume 9 Issue 4
Volume 9 Issue 3
Volume 9 Issue 2
Volume 9 Issue 1
Volume 8 Issue 12
Volume 8 Issue 11
Volume 8 Issue 10
Volume 8 Issue 9
Volume 8 Issue 8
Volume 8 Issue 7
Volume 8 Issue 6
Volume 8 Issue 5
Volume 8 Issue 4
Volume 8 Issue 3
Volume 8 Issue 2
Volume 8 Issue 1
Volume 7 Issue 12
Volume 7 Issue 11
Volume 7 Issue 10
Volume 7 Issue 9
Volume 7 Issue 8
Volume 7 Issue 7
Volume 7 Issue 6
Volume 7 Issue 5
Volume 7 Issue 4
Volume 7 Issue 3
Volume 7 Issue 2
Volume 7 Issue 1
Volume 6 Issue 12
Volume 6 Issue 11
Volume 6 Issue 10
Volume 6 Issue 9
Volume 6 Issue 8
Volume 6 Issue 7
Volume 6 Issue 6
Volume 6 Issue 5
Volume 6 Issue 4
Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1
Volume 5 Issue 12
Volume 5 Issue 11
Volume 5 Issue 10
Volume 5 Issue 9
Volume 5 Issue 8
Volume 5 Issue 7
Volume 5 Issue 6
Volume 5 Issue 5
Volume 5 Issue 4
Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1
Volume 4 Issue 12
Volume 4 Issue 11
Volume 4 Issue 10
Volume 4 Issue 9
Volume 4 Issue 8
Volume 4 Issue 7
Volume 4 Issue 6
Volume 4 Issue 5
Volume 4 Issue 4
Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1
Volume 3 Issue 12
Volume 3 Issue 11
Volume 3 Issue 10
Volume 3 Issue 9
Volume 3 Issue 8
Volume 3 Issue 7
Volume 3 Issue 6
Volume 3 Issue 5
Volume 3 Issue 4
Volume 3 Issue 3
Volume 3 Issue 2
NCICT 2010 Special Issue
Volume 3 Issue 1
Volume 2 Issue 9
Volume 2 Issue 8
Volume 2 Issue 7
Volume 2 Issue 6
Volume 2 Issue 5
Volume 2 Issue 4
Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1 S
Volume 2 Issue 1
Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 3 ISSUE 10 2011

ISSN: 0975–3397

Article # Article Title & Authors (Volume 3 Number 10 October 2011) Page
1. Detection of threats in Honeynet using Honeywall
Navita Sharma, Sukhwinder Singh Sran
Abstract | PDFIconPDF
3332-3336
2. Software efforts estimation using Use Case Point approach by increasing Technical Complexity and Experience Factors
Chetan Nagar
Abstract | PDFIconPDF
3337-3345
3. RISK BASED TESTING A Fuzzy Approach
Ochin Sharma, Ameen Yasar Khan
Abstract | PDFIconPDF
3346-3354
4. Dimensionality Reduction for Optimal Clustering In Data Mining
Ch. Raja Ramesh, DVManjula, Dr. G. Jena, Dr C V Sastry
Abstract | PDFIconPDF
3355-3358
5. A study on detecting and classifying underwater mine like objects using image processing techniques
Dr.S.N.Geethalakshmi, Dr.P.Subashini, Mrs.P.Geetha
Abstract | PDFIconPDF
3359-3366
6. New Design Metrics for Complexity Estimation in Object Oriented Systems
Nisha Malik, Rajender Singh Chhillar
Abstract | PDFIconPDF
3367-3382
7. New Design Metrics for Complexity Estimation in Object Oriented SystemsWEB-BASED-SECURE ONLINE NON-CHOICE –BASED EXAMINATION SYSTEM (WONES) using Cryptography
Dr. R. Sheshadri, T.Chalama Reddy, N.Ashok kumar
Abstract | PDFIconPDF
3383-3392
8. Specifying a model of semantic web service composition
Souleymane OUMTANAGA, Issa TRAORE, Michel BABRI
Abstract | PDFIconPDF
3393-3402
9. Two Phase Data Reduction for Hough Transformation to Detect Skew
Sunil Kumar, S. Gopinath
Abstract | PDFIconPDF
3403-3411
10. AHP and Group Decision Making for Access Network Selection in Multi-Homed Mobile Terminals
K. Radhika, Dr. A. Venugopal Reddy
Abstract | PDFIconPDF
3412-3421
11. Dual Moving Text Line Detection and Selective Masking
Panduranga H.T, Dr. Naveen Kumar S.K
Abstract | PDFIconPDF
3422-3425
12. Task-Scheduling in Cloud Computing using Credit Based Assignment Problem
Mousumi Paul, Goutam Sanyal
Abstract | PDFIconPDF
3426-3430
13. Performance Evaluation and Optimization of TCP Parameters over Frame Relay Network
Gursimran Singh, Jatinder Singh
Abstract | PDFIconPDF
3431-3440
14. A review on various methods of image thresholding
Er.Nirpjeet kaur, Er Rajpreet kaur
Abstract | PDFIconPDF
3441-3443
15. Wide Area Network's Reliability Redundancy Design Using Simulation
Janardhan Babu V, Nadhamuni Reddy C, Govardhan A
Abstract | PDFIconPDF
3444-3450
16. Generation of a pool of variable size symmetric keys through Image
Prerna Garg, Deepak Garg
Abstract | PDFIconPDF
3451-3456
17. Cluster Based Algorithm for Energy Conservation and Lifetime Maximization in Wireless Sensor Networks
H Sivasankari, Shaila K, Venugopal K R, L M Patnaik
Abstract | PDFIconPDF
3457-3471
18. Joint Link Scheduling for Optimal Management of Radio Resources in Satellite Systems
Zhao Yang
Abstract | PDFIconPDF
3472-3476
19. Q-Value Based Particle Swarm Optimization for Reinforcement Neuro-Fuzzy System Design
Yi-Chang Cheng, Sheng-Fuu Lin, Chi-Yao Hsu
Abstract | PDFIconPDF
3477-3489
20. Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks
Shaila K, S H Manjula, Thriveni J, Venugopal K R, L M Patnaik
Abstract | PDFIconPDF
3490-3501
Uploading is going on....
To view the PDF use Adobe Acrobat 6.0 or more
All Rights Reserved © 2009-2017 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License