e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

TOPICS

IJCSE Topics

ISSUES

Volume 9 Issue 11
Volume 9 Issue 10
Volume 9 Issue 9
Volume 9 Issue 8
Volume 9 Issue 7
Volume 9 Issue 6
Volume 9 Issue 5
Volume 9 Issue 4
Volume 9 Issue 3
Volume 9 Issue 2
Volume 9 Issue 1
Volume 8 Issue 12
Volume 8 Issue 11
Volume 8 Issue 10
Volume 8 Issue 9
Volume 8 Issue 8
Volume 8 Issue 7
Volume 8 Issue 6
Volume 8 Issue 5
Volume 8 Issue 4
Volume 8 Issue 3
Volume 8 Issue 2
Volume 8 Issue 1
Volume 7 Issue 12
Volume 7 Issue 11
Volume 7 Issue 10
Volume 7 Issue 9
Volume 7 Issue 8
Volume 7 Issue 7
Volume 7 Issue 6
Volume 7 Issue 5
Volume 7 Issue 4
Volume 7 Issue 3
Volume 7 Issue 2
Volume 7 Issue 1
Volume 6 Issue 12
Volume 6 Issue 11
Volume 6 Issue 10
Volume 6 Issue 9
Volume 6 Issue 8
Volume 6 Issue 7
Volume 6 Issue 6
Volume 6 Issue 5
Volume 6 Issue 4
Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1
Volume 5 Issue 12
Volume 5 Issue 11
Volume 5 Issue 10
Volume 5 Issue 9
Volume 5 Issue 8
Volume 5 Issue 7
Volume 5 Issue 6
Volume 5 Issue 5
Volume 5 Issue 4
Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1
Volume 4 Issue 12
Volume 4 Issue 11
Volume 4 Issue 10
Volume 4 Issue 9
Volume 4 Issue 8
Volume 4 Issue 7
Volume 4 Issue 6
Volume 4 Issue 5
Volume 4 Issue 4
Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1
Volume 3 Issue 12
Volume 3 Issue 11
Volume 3 Issue 10
Volume 3 Issue 9
Volume 3 Issue 8
Volume 3 Issue 7
Volume 3 Issue 6
Volume 3 Issue 5
Volume 3 Issue 4
Volume 3 Issue 3
Volume 3 Issue 2
NCICT 2010 Special Issue
Volume 3 Issue 1
Volume 2 Issue 9
Volume 2 Issue 8
Volume 2 Issue 7
Volume 2 Issue 6
Volume 2 Issue 5
Volume 2 Issue 4
Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1 S
Volume 2 Issue 1
Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 5 ISSUE 05 2013

ISSN: 0975–3397

Article # Article Title & Authors (Volume 5 Number 05 May 2013) Page
1. Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Dr.G.Mary Jansi Rani, Dr. S. Arumugam
Abstract | PDFIconPDF
275-279
2. Performance Evaluation of CPU-GPU communication Depending on the Characteristic of Co-Located Workloads
Dongyou Seo, Shin-gyu Kim, Hyeonsang Eom, Heon Y. Yeom
Abstract | PDFIconPDF
280-285
3. Web Miner: A Tool for Discovery of Usage Patterns From Web Data
Roop Ranjan, Sameena Naaz, Neeraj Kaushik
Abstract | PDFIconPDF
286-293
4. A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection
Sukhpreet Kaur, Geetanjali babbar
Abstract | PDFIconPDF
294-301
5. An Analysis and Knowledge Representation System to attain the genuine web user usage behavior
V.V.R. Maheswara Rao, Dr. V. Valli Kumari
Abstract | PDFIconPDF
302-316
6. DESIGN AND SIMULATION OF MULTIBAND PLANAR INVERTED-F ANTENNA FOR MOBILE PHONE APPLICATIONS
Abhay Sharma, R.P.S. Gangwar, Shakti S Chauhan
Abstract | PDFIconPDF
317-322
7. Massive Open Online Courses : A New Dawn for Higher Education?
Sara Ibn El Ahrache, Hassan Badir
Abstract | PDFIconPDF
323-327
8. A Survey : Code Optimization using Refactoring
Piyush Chandi
Abstract | PDFIconPDF
328-333
9. A Bee-Hive Optimization Approach to Improve the Network Lifetime in Wireless Sensor Networks
S. Bhuvaneshwari, P.S. Balamurugan
Abstract | PDFIconPDF
334-337
10. Efficient Parallel Data Processing in the Cloud
THANAPAL.P, NISHANTHI.S.P
Abstract | PDFIconPDF
338-342
11. Implementation of Neural Network with a variant of Turing Machine for Traffic Flow Control
Rashmi Sehrawat, Honey Malviya, Vanditaa Kaul
Abstract | PDFIconPDF
343-348
12. Principles of Video Segmentation Scenarios
M. R. KHAMMAR, YUNUSA ALI SAI’D, M. H. MARHABAN, F. ZOLFAGHARI
Abstract | PDFIconPDF
349-356
13. Human Age Prediction and Classification Using Facial Image
Sithu Ubaid, Dr. Shyama Das, Imthiyas M.P.
Abstract | PDFIconPDF
357-361
14. Cryptography on Android Message Applications – A Review
Nishika, Rahul Kumar Yadav
Abstract | PDFIconPDF
362-367
15. Distance Based Fault detection in wireless sensor network
Ayasha Siddiqua, Shikha Swaroop, Prashant Krishan, Sandip Mandal
Abstract | PDFIconPDF
368-375
16. Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network
Shikha Swaroop, Ashish Kumar
Abstract | PDFIconPDF
376-380
17. A Model Driven approach for Applicationspecific Mismatch Detection
Amit Raj
Abstract | PDFIconPDF
381-392
18. Application of fuzzy-AHP extent analysis to determine the relative importance of risk factors in operative mortality after Coronary Artery Bypass surgery
Mahyar Taghizadeh Nouei, Ali Vahidian Kamyad, Somayeh Ghazalbash, MahmoodReza Sarzaeem
Abstract | PDFIconPDF
393-401
19. Hierarchical classification of web content using Naïve Bayes approach
Neetu
Abstract | PDFIconPDF
402-408
20. FRAUDULENT ACTIVITIES USING VIRTUAL MEETINGS
Aamo Iorliam, Anne James
Abstract | PDFIconPDF
409-421
21. Cryptanalysis of Vigenere Cipher using Particle Swarm Optimization with Markov chain random walk
Aditi Bhateja, Shailender Kumar, Ashok K. Bhateja
Abstract | PDFIconPDF
422-429
22. Novel Time Aware Regression Testing Technique
Harsh Bhasin, Praveen, Anju Gera
Abstract | PDFIconPDF
430-434
To view the PDF use Adobe Acrobat 6.0 or more
All Rights Reserved © 2009-2017 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License