e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

TOPICS

IJCSE Topics

ISSUES

Volume 9 Issue 11
Volume 9 Issue 10
Volume 9 Issue 9
Volume 9 Issue 8
Volume 9 Issue 7
Volume 9 Issue 6
Volume 9 Issue 5
Volume 9 Issue 4
Volume 9 Issue 3
Volume 9 Issue 2
Volume 9 Issue 1
Volume 8 Issue 12
Volume 8 Issue 11
Volume 8 Issue 10
Volume 8 Issue 9
Volume 8 Issue 8
Volume 8 Issue 7
Volume 8 Issue 6
Volume 8 Issue 5
Volume 8 Issue 4
Volume 8 Issue 3
Volume 8 Issue 2
Volume 8 Issue 1
Volume 7 Issue 12
Volume 7 Issue 11
Volume 7 Issue 10
Volume 7 Issue 9
Volume 7 Issue 8
Volume 7 Issue 7
Volume 7 Issue 6
Volume 7 Issue 5
Volume 7 Issue 4
Volume 7 Issue 3
Volume 7 Issue 2
Volume 7 Issue 1
Volume 6 Issue 12
Volume 6 Issue 11
Volume 6 Issue 10
Volume 6 Issue 9
Volume 6 Issue 8
Volume 6 Issue 7
Volume 6 Issue 6
Volume 6 Issue 5
Volume 6 Issue 4
Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1
Volume 5 Issue 12
Volume 5 Issue 11
Volume 5 Issue 10
Volume 5 Issue 9
Volume 5 Issue 8
Volume 5 Issue 7
Volume 5 Issue 6
Volume 5 Issue 5
Volume 5 Issue 4
Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1
Volume 4 Issue 12
Volume 4 Issue 11
Volume 4 Issue 10
Volume 4 Issue 9
Volume 4 Issue 8
Volume 4 Issue 7
Volume 4 Issue 6
Volume 4 Issue 5
Volume 4 Issue 4
Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1
Volume 3 Issue 12
Volume 3 Issue 11
Volume 3 Issue 10
Volume 3 Issue 9
Volume 3 Issue 8
Volume 3 Issue 7
Volume 3 Issue 6
Volume 3 Issue 5
Volume 3 Issue 4
Volume 3 Issue 3
Volume 3 Issue 2
NCICT 2010 Special Issue
Volume 3 Issue 1
Volume 2 Issue 9
Volume 2 Issue 8
Volume 2 Issue 7
Volume 2 Issue 6
Volume 2 Issue 5
Volume 2 Issue 4
Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1 S
Volume 2 Issue 1
Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 4 ISSUE 4 2012

ISSN: 0975–3397

Article # Article Title & Authors (Volume 4 Number 4 April 2012) Page
1. SQL Injection in Oracle An exploration of vulnerabilities
Sid Ansari, Edward R. Sykes
Abstract | PDFIconPDF
522-531
2. A Study on the Performance of Android Platform
Hyeon-Ju Yoon
Abstract | PDFIconPDF
532-537
3. Association Rules Extraction from Incremental Databases through ICPT
K. Swarupa Rani, V. Kamakshi Prasad, C. Raghavendra Rao
Abstract | PDFIconPDF
538-547
4. INVESTMENT PORTFOLIO MANAGER- MOBILE APPLICATION
A.N. ADAPANAWAR, VIKRANT KADAM, ARJUN RAVAL, ASHISH UJJAWAL, SAHIL MAGO
Abstract | PDFIconPDF
548-551
5. WEB-BASED QUERY BUILDER
ANAND M. MAGAR, VINAY S. KANDUL, RAHUL S. AGARWAL
Abstract | PDFIconPDF
552-555
6. Artificial Neural Network Employed To Design Annular Ring Microstrip Antenna
Anil Kumar, Chandra Kant Shukla
Abstract | PDFIconPDF
556-564
7. Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
Preeti Yadav, Yogesh Rathore
Abstract | PDFIconPDF
565-570
8. FEATURE BASED IMAGE OPTIMIZATION TECHIQUE
Dr. R.Ramakishore, Yogiraj Sharma
Abstract | PDFIconPDF
571-576
9. CLOUD COMPUTING AND ITS PRICING SCHEMES
Varun Kamra, Kapil Sonawane, Pankaja Alappanavar
Abstract | PDFIconPDF
577-581
10. Trust Based Decision Making System on MANET
Dr. Abhishek Vaish, Utkarsh Goel, Amita Siddarth, Jyoti Soni, Pooja Vishwakarma, Sourabh Prakash
This manuscript is removed due to request made by the author.
Abstract | PDFIconPDF
582-588
11. Ontology-based Semantic Search Engine for Healthcare Services
Jotsna Molly Rajan, M. Deepa Lakshmi
Abstract | PDFIconPDF
589-594
12. Literature Review on Mobile MPLS Techniques
Jyoti Kohli, Dr. Mritunjay Kumar Rai
Abstract | PDFIconPDF
595-600
13. SPMLS : An Efficient Sequential Pattern Mining Algorithm with candidate Generation and Frequency Testing
M.Parimala, S.Sathiyabama
Abstract | PDFIconPDF
601-607
14. Improving the Performance of Interactive TCP Applications using End-point Based and Network Level Techniques
Varun G Menon
Abstract | PDFIconPDF
608-614
15. Efficient Energy-Aware Cooperative Group Clustering Data Gathering Algorithm in Wireless Networks
M.SANTHALAKSHMI, P.KAVITHA
Abstract | PDFIconPDF
615-621
16. Malware Analysis & its Application to Digital Forensic
Gursimran Kaur, Bharti Nagpal
Abstract | PDFIconPDF
622-626
17. Meta-Content framework for back index generation
Tripti Sharma, Sarang Pitale
Abstract | PDFIconPDF
627-633
18. IROBOT CREATE: PROGRAMMED AS PROVIDER
Ankur Aggarwal, Rachna Jain
Abstract | PDFIconPDF
634-637
19. Mobility Prediction and Load Balancing Based Adaptive Handovers for LTE Systems
Qi-Ping Yang, Jae-Woo Kim, Tae-Hyong Kim
Abstract | PDFIconPDF
638-646
20. Great Circle Distance Methode for Improving Operational Control System
Based on GPS Tracking System
Benny Dwi Kifana, Maman Abdurohman
Abstract | PDFIconPDF
647-662
To view the PDF use Adobe Acrobat 6.0 or more
All Rights Reserved © 2009-2017 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License