e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

TOPICS

IJCSE Topics

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 5 ISSUE 05 2013

ISSN: 0975–3397

Article # Article Title & Authors (Volume 5 Number 05 May 2013) Page
1. Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Dr.G.Mary Jansi Rani, Dr. S. Arumugam
Abstract | PDFIconPDF
275-279
2. Performance Evaluation of CPU-GPU communication Depending on the Characteristic of Co-Located Workloads
Dongyou Seo, Shin-gyu Kim, Hyeonsang Eom, Heon Y. Yeom
Abstract | PDFIconPDF
280-285
3. Web Miner: A Tool for Discovery of Usage Patterns From Web Data
Roop Ranjan, Sameena Naaz, Neeraj Kaushik
Abstract | PDFIconPDF
286-293
4. A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection
Sukhpreet Kaur, Geetanjali babbar
Abstract | PDFIconPDF
294-301
5. An Analysis and Knowledge Representation System to attain the genuine web user usage behavior
V.V.R. Maheswara Rao, Dr. V. Valli Kumari
Abstract | PDFIconPDF
302-316
6. DESIGN AND SIMULATION OF MULTIBAND PLANAR INVERTED-F ANTENNA FOR MOBILE PHONE APPLICATIONS
Abhay Sharma, R.P.S. Gangwar, Shakti S Chauhan
Abstract | PDFIconPDF
317-322
7. Massive Open Online Courses : A New Dawn for Higher Education?
Sara Ibn El Ahrache, Hassan Badir
Abstract | PDFIconPDF
323-327
8. A Survey : Code Optimization using Refactoring
Piyush Chandi
Abstract | PDFIconPDF
328-333
9. A Bee-Hive Optimization Approach to Improve the Network Lifetime in Wireless Sensor Networks
S. Bhuvaneshwari, P.S. Balamurugan
Abstract | PDFIconPDF
334-337
10. Efficient Parallel Data Processing in the Cloud
THANAPAL.P, NISHANTHI.S.P
Abstract | PDFIconPDF
338-342
11. Implementation of Neural Network with a variant of Turing Machine for Traffic Flow Control
Rashmi Sehrawat, Honey Malviya, Vanditaa Kaul
Abstract | PDFIconPDF
343-348
12. Principles of Video Segmentation Scenarios
M. R. KHAMMAR, YUNUSA ALI SAI’D, M. H. MARHABAN, F. ZOLFAGHARI
Abstract | PDFIconPDF
349-356
13. Human Age Prediction and Classification Using Facial Image
Sithu Ubaid, Dr. Shyama Das, Imthiyas M.P.
Abstract | PDFIconPDF
357-361
14. Cryptography on Android Message Applications – A Review
Nishika, Rahul Kumar Yadav
Abstract | PDFIconPDF
362-367
15. Distance Based Fault detection in wireless sensor network
Ayasha Siddiqua, Shikha Swaroop, Prashant Krishan, Sandip Mandal
Abstract | PDFIconPDF
368-375
16. Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network
Shikha Swaroop, Ashish Kumar
Abstract | PDFIconPDF
376-380
17. A Model Driven approach for Applicationspecific Mismatch Detection
Amit Raj
Abstract | PDFIconPDF
381-392
18. Application of fuzzy-AHP extent analysis to determine the relative importance of risk factors in operative mortality after Coronary Artery Bypass surgery
Mahyar Taghizadeh Nouei, Ali Vahidian Kamyad, Somayeh Ghazalbash, MahmoodReza Sarzaeem
Abstract | PDFIconPDF
393-401
19. Hierarchical classification of web content using Naïve Bayes approach
Neetu
Abstract | PDFIconPDF
402-408
20. FRAUDULENT ACTIVITIES USING VIRTUAL MEETINGS
Aamo Iorliam, Anne James
Abstract | PDFIconPDF
409-421
21. Cryptanalysis of Vigenere Cipher using Particle Swarm Optimization with Markov chain random walk
Aditi Bhateja, Shailender Kumar, Ashok K. Bhateja
Abstract | PDFIconPDF
422-429
22. Novel Time Aware Regression Testing Technique
Harsh Bhasin, Praveen, Anju Gera
Abstract | PDFIconPDF
430-434
To view the PDF use Adobe Acrobat 6.0 or more
All Rights Reserved © 2009-2018 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License