e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

TOPICS

IJCSE Topics

ISSUES

Volume 9 Issue 11
Volume 9 Issue 10
Volume 9 Issue 9
Volume 9 Issue 8
Volume 9 Issue 7
Volume 9 Issue 6
Volume 9 Issue 5
Volume 9 Issue 4
Volume 9 Issue 3
Volume 9 Issue 2
Volume 9 Issue 1
Volume 8 Issue 12
Volume 8 Issue 11
Volume 8 Issue 10
Volume 8 Issue 9
Volume 8 Issue 8
Volume 8 Issue 7
Volume 8 Issue 6
Volume 8 Issue 5
Volume 8 Issue 4
Volume 8 Issue 3
Volume 8 Issue 2
Volume 8 Issue 1
Volume 7 Issue 12
Volume 7 Issue 11
Volume 7 Issue 10
Volume 7 Issue 9
Volume 7 Issue 8
Volume 7 Issue 7
Volume 7 Issue 6
Volume 7 Issue 5
Volume 7 Issue 4
Volume 7 Issue 3
Volume 7 Issue 2
Volume 7 Issue 1
Volume 6 Issue 12
Volume 6 Issue 11
Volume 6 Issue 10
Volume 6 Issue 9
Volume 6 Issue 8
Volume 6 Issue 7
Volume 6 Issue 6
Volume 6 Issue 5
Volume 6 Issue 4
Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1
Volume 5 Issue 12
Volume 5 Issue 11
Volume 5 Issue 10
Volume 5 Issue 9
Volume 5 Issue 8
Volume 5 Issue 7
Volume 5 Issue 6
Volume 5 Issue 5
Volume 5 Issue 4
Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1
Volume 4 Issue 12
Volume 4 Issue 11
Volume 4 Issue 10
Volume 4 Issue 9
Volume 4 Issue 8
Volume 4 Issue 7
Volume 4 Issue 6
Volume 4 Issue 5
Volume 4 Issue 4
Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1
Volume 3 Issue 12
Volume 3 Issue 11
Volume 3 Issue 10
Volume 3 Issue 9
Volume 3 Issue 8
Volume 3 Issue 7
Volume 3 Issue 6
Volume 3 Issue 5
Volume 3 Issue 4
Volume 3 Issue 3
Volume 3 Issue 2
NCICT 2010 Special Issue
Volume 3 Issue 1
Volume 2 Issue 9
Volume 2 Issue 8
Volume 2 Issue 7
Volume 2 Issue 6
Volume 2 Issue 5
Volume 2 Issue 4
Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1 S
Volume 2 Issue 1
Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 4 ISSUE 9 2012

ISSN: 0975–3397

Article # Article Title & Authors (Volume 4 Number 9 September 2012) Page
1. Signature Verification Using Neural Network
Manoj Kumar
Abstract | PDFIconPDF
1498-1504
2. K-Partition Model for Mining Frequent Patterns in Large Databases
Nidhi Sharma, Anju Singh
Abstract | PDFIconPDF
1505-1512
3. MINING THE INVESTOR’S PERCEPTION ABOUT DIFFERENT INVESTMENT OPTIONS USING CLUSTERING ANALYSIS
Gunjan Batra, Vijaylaxmi, Anisha Gupta
Abstract | PDFIconPDF
1513-1516
4. A NEW PROCESS MODEL FOR EMBEDDED SYSTEMS CONTROL FOR TELECOM INDUSTRY
Sanjai Gupta, Mohammed Hussain
Abstract | PDFIconPDF
1517-1524
5. Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs
Poonam Pahuja, Sanjay Pahuja, Dr. Tarun Shrimali
Abstract | PDFIconPDF
1525-1533
6. A Classification Technique for Microarray Gene Expression Data using PSO-FLANN
Jayashree Dev, Sanjit Kumar Dash, Sweta Dash, Madhusmita Swain
Abstract | PDFIconPDF
1534-1539
7. A note on Quantum Cryptography
G. Ananda Rao, Muduganti Rathan Reddy, Y.Srinivas, J.Vijayasekhar, N.Vamsi Krishna, Ramakrishna Jaliparthi, V.Manoj Sekhar, Venu Saggurthi, S. Usha Rani
Abstract | PDFIconPDF
1540-1544
8. Noise Control in Industries by Adaptive MDCT Method
G.Suresh
Abstract | PDFIconPDF
1545-1549
9. An Efficient Method for Digital Image Watermarking Based on PN Sequences
Shivani Garg, Ranjit Singh
Abstract | PDFIconPDF
1550-1561
10. Optimization Technique for Maximization Problem in Evolutionary Programming of Genetic Algorithm in Data Mining
R. Karthick, S.Saravanan, M.VetriSelvan
Abstract | PDFIconPDF
1562-1569
11. Approaches for Intelligent Traffic System: A Survey
Pratishtha Gupta, G.N Purohit, Amrita Dadhich
Abstract | PDFIconPDF
1570-1578
12. Optimization of ETL Work Flow in Data Warehouse
Kommineni Sivaganesh, P Srinivasu, Dr Suresh Chandra Satapathy
Abstract | PDFIconPDF
1579-1586
13. Localization of Mobile Nodes in Wireless Networks with Correlated in Time Measurement Noise
K.Anusha, Manohar Gosul, G. Dileep Kumar
Abstract | PDFIconPDF
1587-1593
14. Frequent Pattern Mining using CATSIM Tree
Ketan Modi, B.L.Pal
Abstract | PDFIconPDF
1594-1602
15. E-Cash Payment Protocols
Shweta Srivastava, Vandana Saraswat
Abstract | PDFIconPDF
1603-1607
16. Energy-Balanced Transmission Policies for Wireless Sensor Networks
Y.Aswini, S.P.Anandaraj, V. Ramana, S.P.Poornima
Abstract | PDFIconPDF
1608-1616
17. A Survey paper: Data Security in Local Networks Using Distributed Firewalls
Sneha Sahare, Mamta Joshi, Manish Gehlot
Abstract | PDFIconPDF
1617-1622
18. Design of Anomaly Detection System for Outlier Detection in Hardware Profile Using PCA
Hari Om, Tanmoy Hazra
Abstract | PDFIconPDF
1623-1632
19. An Enhanced Active contour based Segmentation for Fingerprint Extraction
S.Uma maheswari, Dr.E.Chandra
Abstract | PDFIconPDF
1633-1638
20. Prediction of Association among Numerical Aptitude, Programming Skills, Trait Emotional Intelligence on Students Performance
V. Maria Antoniate Martin, T.Lucia Agnes Beena
Abstract | PDFIconPDF
1639-1646
21. SURVEY OF DIGITAL WATERMARKING USING DCT
Usha Pal, Dinesh Chandra
Abstract | PDFIconPDF
1647-1649
22. A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
Akanksha Mathur
Abstract | PDFIconPDF
1650-1657
23. EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT
Jasmin James, Dr. Bhupendra Verma
Abstract | PDFIconPDF
1658-1663
To view the PDF use Adobe Acrobat 6.0 or more
All Rights Reserved © 2009-2017 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License