no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A Bespoke Approach For Face-Recognition Using PCA
|
Sheifali Gupta |
|
2010 |
|
2 |
p. 155-158 |
article |
2 |
A Channel Adaptive MAC Protocol with Traffic Aware Distributed Power Management in Wireless Sensor Networks
|
Binu. G. S , |
|
2010 |
|
2 |
p. 177-182 |
article |
3 |
A Comparison and SWOT Analysis of Towards 4G Technologies: 802.16e and 3GPP-LTE
|
Dr. Pathuru Raj |
|
2010 |
|
2 |
p. 109-114 |
article |
4 |
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks
|
S. R. Biradar |
|
2010 |
|
2 |
p. 340-344 |
article |
5 |
Actuality and Future of Optical Systems
|
Natasa Zivic |
|
2009 |
|
2 |
p. 62-70 |
article |
6 |
Adaptive Background subtraction in Dynamic Environments Using Fuzzy Logic
|
Sivabalakrishnan.M |
|
2010 |
|
2 |
p. 270-273 |
article |
7 |
Adaptive Routing Algorithms in Unstructured Peer-to-Peer (P2P) Systems
|
Achmad Nizar Hidayanto, |
|
2011 |
|
2 |
p. 487-505 |
article |
8 |
A Data Mining Perspective on the Prevalence of Polio in India
|
Neera Singh, |
|
2011 |
|
2 |
p. 580-585 |
article |
9 |
A Framework for Analyzing Software Quality using Hierarchical Clustering
|
Arashdeep Kaur |
|
2011 |
|
2 |
p. 854-861 |
article |
10 |
A Heuristic Approach to the Disease Diagnose System Using Machine Learning Algorithms (An Expert Advisory System for EMU Bird’s Diseases)
|
P.Naga Jyothi, |
|
2010 |
|
2 |
p. 256-258 |
article |
11 |
A Layered Approach for Watermarking in Images Based on Huffman Coding
|
D. Lalitha Bhaskari |
|
2010 |
|
2 |
p. 149-154 |
article |
12 |
Analytical Simulation and Performance Optimization for Spectrum Sensing in Cognitive Radio Networks
|
Ayman A. El-Saleh |
|
2011 |
|
2 |
p. 554-568 |
article |
13 |
An Analysis of Irregularities in Devanagari Script Writing – A Machine Recognition Perspective
|
Satish Kumar |
|
2010 |
|
2 |
p. 274-279 |
article |
14 |
An Analysis of Q-Learning Algorithms with Strategies of Reward Function
|
Ms.S.Manju |
|
2011 |
|
2 |
p. 814-820 |
article |
15 |
AN APPLICATION OF HYBRID CLUSTERING AND NEURAL BASED PREDICTION MODELLING FOR DELINEATION OF MANAGEMENT ZONES
|
Babankumar S. Bansod |
|
2011 |
|
2 |
p. 621-631 |
article |
16 |
An Efficient Algorithm for Reliability Upper Bound of Distributed Systems with Unreliable Nodes
|
Mohamed H. S. Mohamed, |
|
2010 |
|
2 |
p. 305-308 |
article |
17 |
An Efficient Automatic Attendance System using Fingerprint Verification Technique
|
Chitresh Saraswat, |
|
2010 |
|
2 |
p. 264-269 |
article |
18 |
An Improved Framework for Enhancing QoS in MIPv6
|
Shilpy Gupta |
|
2011 |
|
2 |
p. 632-641 |
article |
19 |
An Incremental framework for a Thai-English Machine Translation System using a LFG tree structure as an Interlingual
|
Tawee Chimsuk |
|
2010 |
|
2 |
p. 280-288 |
article |
20 |
An Integer Programming-based Local Search for Large-scale Maximal Covering Problems
|
Junha Hwang |
|
2011 |
|
2 |
p. 837-843 |
article |
21 |
A Novel Algorithm for Scaling up the Accuracy of Decision Trees
|
Ali Mirza Mahmood |
|
2010 |
|
2 |
p. 126-131 |
article |
22 |
A Novel Approach using Full Counterpropagation Neural Network for Watermarking
|
Ashish Bansal, |
|
2010 |
|
2 |
p. 289-296 |
article |
23 |
A Novel Density based improved k-means Clustering Algorithm – Dbkmeans
|
K. Mumtaz |
|
2010 |
|
2 |
p. 213-218 |
article |
24 |
A Novel Technique for Embedding Data in Spatial Domain
|
V.Madhu Viswanatham |
|
2010 |
|
2 |
p. 233-236 |
article |
25 |
A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security
|
Gyanendra Kr. Gupta |
|
2011 |
|
2 |
p. 884-891 |
article |
26 |
Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks
|
K.Srinivas |
|
2010 |
|
2 |
p. 250-255 |
article |
27 |
Applied Medical Informatics Using LabVIEW
|
Himanshu Shekhar, |
|
2010 |
|
2 |
p. 198-203 |
article |
28 |
A QoS-Aware Intelligent Replica Management Architecture for Content Distribution in Peer-to-Peer Overlay Networks
|
S.Ayyasamy |
|
2009 |
|
2 |
p. 71-77 |
article |
29 |
Architecture for efficiently streaming stored video using TCP
|
G.Srinivasa Rao, |
|
2010 |
|
2 |
p. 319-327 |
article |
30 |
A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks
|
Mitra Baratchi, |
|
2011 |
|
2 |
p. 844-853 |
article |
31 |
A Study of Image Segmentation and Edge Detection Techniques
|
PunamThakare |
|
2011 |
|
2 |
p. 899-904 |
article |
32 |
A Study on Scheduling in Grid Environment
|
Dr.K.Vivekanandan, |
|
2011 |
|
2 |
p. 940-950 |
article |
33 |
A Survey of QOS with IEEE 802.11e
|
Dr.P. Chenna Reddy, |
|
2011 |
|
2 |
p. 807-813 |
article |
34 |
A Survey on Optimistic Fair Digital Signature Exchange Protocols
|
Alfin Abraham |
|
2011 |
|
2 |
p. 821-825 |
article |
35 |
A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols
|
C. Sreedhar |
|
2010 |
|
2 |
p. 224-232 |
article |
36 |
A System Based Approach to Efficiently Implement Color Differentiation Mechanism with Respect to Automobiles
|
MOHAMMED KHALID KALEEM, |
|
2011 |
|
2 |
p. 601-606 |
article |
37 |
A Voice Priority Queue (VPQ) Fair Scheduler for the VoIP over WLANs
|
Kashif Nisar |
|
2011 |
|
2 |
p. 506-518 |
article |
38 |
CHOICES ON DESIGNING GF (P) ELLIPTIC CURVE COPROCESSOR BENEFITING FROM MAPPING HOMOGENEOUS CURVES IN PARALLEL MULTIPLICATIONS
|
Mohammad Alkhatib, |
|
2011 |
|
2 |
p. 467-480 |
article |
39 |
Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework
|
MohammadReza Keyvanpour, |
|
2011 |
|
2 |
p. 862-870 |
article |
40 |
Cloud Computing: A solution to Geographical Information Systems (GIS)
|
Muzafar Ahmad Bhat, |
|
2011 |
|
2 |
p. 594-600 |
article |
41 |
COLLABORATION IN WEB BASED LEARNING: A SOCIAL COMPUTING PERSPECTIVE
|
C.Pooranachandran |
|
2011 |
|
2 |
p. 722-727 |
article |
42 |
Comparative Study a Performance and Capability Scheduling Techniques in Grid Computing
|
Mohd Kamir Yusof |
|
2010 |
|
2 |
p. 121-125 |
article |
43 |
Comparison between k-nn and svm method for speech emotion recognition
|
Muzaffar Khan |
|
2011 |
|
2 |
p. 607-611 |
article |
44 |
COMPARISON OF MULTICAST ROUTING PROTOCOLS IN AD-HOC WIRELESS NETWORKS
|
Dr.V.B.Narsimha, |
|
2011 |
|
2 |
p. 871-876 |
article |
45 |
Computational Approaches for determination of Most Probable RNA Secondary Structure Using Different Thermodynamics Parameters
|
Binod Kumar, |
|
2010 |
|
2 |
p. 345-351 |
article |
46 |
Content Based Image Retrieval using Density Distribution and Mean of Binary Patterns of Walsh Transformed Color Images
|
H.B.Kekre, |
|
2011 |
|
2 |
p. 642-651 |
article |
47 |
Convergence of ART in Few Projections
|
Tanuja Srivastava |
|
2011 |
|
2 |
p. 705-713 |
article |
48 |
Copy-Move Forgery Detection in Digital Images: Progress and Challenges
|
Sunil Kumar |
|
2011 |
|
2 |
p. 652-663 |
article |
49 |
CRM System Using UI-AKD Approach of D3M
|
J.N.V.R.Swarup kumar, |
|
2010 |
|
2 |
p. 159-163 |
article |
50 |
Debugging, Advanced Debugging and Runtime Analysis
|
Salim Istyaq |
|
2010 |
|
2 |
p. 246-249 |
article |
51 |
Dependency through Axiomatic Approach On Rough Set Theory
|
Nilaratna Kalia |
|
2010 |
|
2 |
p. 169-172 |
article |
52 |
Design of Intelligent layer for flexible querying in databases
|
Mrs. Neelu Nihalani |
|
2009 |
|
2 |
p. 30-39 |
article |
53 |
Design of MIMO Space-Time Code for High Data Rate Wireless Communication
|
Mihir Narayan Mohanty, |
|
2011 |
|
2 |
p. 693-696 |
article |
54 |
Detection and Prevention of New and Unknown Malware using Honeypots
|
Shishir Kumar |
|
2009 |
|
2 |
p. 56-61 |
article |
55 |
Development of a Model for Technology Strategy Elaboration
|
Aliakbar Mazlomi |
|
2011 |
|
2 |
p. 519-527 |
article |
56 |
DEVELOPMENT OF BIO-CRYPTO KEY FROM FINGERPRINTS USING CANCELABLE TEMPLATES
|
Prof. Sunil VK Gaddam |
|
2011 |
|
2 |
p. 775-783 |
article |
57 |
Diabetic Retinopathy-Early Detection Using Image Processing Techniques
|
V.Vijaya Kumari, |
|
2010 |
|
2 |
p. 357-361 |
article |
58 |
Digital Image Search & Retrieval using FFT Sectors of Color Images
|
H. B. Kekre |
|
2010 |
|
2 |
p. 368-372 |
article |
59 |
Dynamic Approach for Data Scrubbing Process
|
Israr Ahmed |
|
2010 |
|
2 |
p. 416-423 |
article |
60 |
Efficient Power Utilization Techniques for Wireless Sensor Networks – A Survey
|
Mr. Sharad Saxena, |
|
2011 |
|
2 |
p. 905-925 |
article |
61 |
Efficient Storage Reduction of Frequency of Items in Vertical Data Layout
|
A.Meenakshi, |
|
2011 |
|
2 |
p. 728-738 |
article |
62 |
E-Learning Technology for Rural Child Development
|
S.K.Nayak |
|
2010 |
|
2 |
p. 208-212 |
article |
63 |
ENHANCED DISTRIBUTED SERVICE MODEL FOR POWER SYSTEM STATE ESTIMATION
|
V.Gomathi |
|
2011 |
|
2 |
p. 481-486 |
article |
64 |
Entropy Based Texture Features Useful for Automatic Script Identification
|
M.C. Padma |
|
2010 |
|
2 |
p. 115-120 |
article |
65 |
Evaluation of Next Generation Networks
|
Mohsen Gerami |
|
2010 |
|
2 |
p. 378-381 |
article |
66 |
Evaluation of Varrying Mobility Models & Network Loads on DSDV Protocol of MANETs
|
C.P.Agrawal |
|
2009 |
|
2 |
p. 40-46 |
article |
67 |
Fault Predictions in Object Oriented Software
|
Bremananth R |
|
2009 |
|
2 |
p. 81-88 |
article |
68 |
Fault Tolerance in Real Time Distributed System
|
Arvind Kumar |
|
2011 |
|
2 |
p. 933-939 |
article |
69 |
Feature Extraction in Medical Image using Ant Colony Optimization : A Study
|
A. Amali Asha, |
|
2011 |
|
2 |
p. 714-721 |
article |
70 |
Frequent Data Generation Using Relative Data Analysis
|
R.ARCHANA |
|
2010 |
|
2 |
p. 382-386 |
article |
71 |
Grid Scheduling Using Enhanced PSO Algorithm
|
Mr. P.Mathiyalagan |
|
2010 |
|
2 |
p. 140-145 |
article |
72 |
High payload using mixed codebooks of Vector Quantization
|
H. B. Kekre, |
|
2010 |
|
2 |
p. 352-356 |
article |
73 |
Honeypot based Secure Network System
|
Yogendra Kumar Jain |
|
2011 |
|
2 |
p. 612-620 |
article |
74 |
Human Gait Recognition Using Bezier Curves
|
Pratibha Mishra, |
|
2011 |
|
2 |
p. 969-975 |
article |
75 |
Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images
|
Panduranga H.T |
|
2010 |
|
2 |
p. 297-300 |
article |
76 |
Ideal Strategy to Improve Datawarehouse Performance
|
Fahad Sultan |
|
2010 |
|
2 |
p. 409-415 |
article |
77 |
Impact Analysis of Recent DDoS Attacks
|
Ketki Arora |
|
2011 |
|
2 |
p. 877-883 |
article |
78 |
Implementation of Multiplatform RIA using User Interface Components
|
K.MuthuManickam M.E., |
|
2010 |
|
2 |
p. 204-207 |
article |
79 |
Improved Digital Watermarking Techniques and Data Embedding In Multimedia
|
Ajay Goel |
|
2010 |
|
2 |
p. 164-168 |
article |
80 |
Infrastructural Map for Information Security
|
Sabah Al-Fedaghi, |
|
2011 |
|
2 |
p. 789-796 |
article |
81 |
INTEGRATING INTELLIGENT PREDICTIVE CACHING AND STATIC PREFETCHING IN WEB PROXY SERVERS
|
J. B. PATIL |
|
2011 |
|
2 |
p. 697-704 |
article |
82 |
Intelligent Data Compression Approach in Multidimensional Data Warehouse
|
Walid MOUDANI |
|
2011 |
|
2 |
p. 951-960 |
article |
83 |
Invariant Moments based War Scene Classification using ANN and SVM: A Comparative Study
|
Daniel Madan Raja S |
|
2011 |
|
2 |
p. 767-774 |
article |
84 |
Message Encryption Using Deceptive Text and Randomized Hashing
|
VAMSIKRISHNA YENIKAPATI, |
|
2011 |
|
2 |
p. 760-766 |
article |
85 |
Modeling Academic Performance Evaluation Using Soft Computing Techniques: A Fuzzy Logic Approach
|
Ramjeet Singh Yadav |
|
2011 |
|
2 |
p. 676-686 |
article |
86 |
Modified Ant Colony Algorithm for Grid Scheduling
|
Mr. P.Mathiyalagan |
|
2010 |
|
2 |
p. 132-139 |
article |
87 |
Modified Kalman Filter-based Approach in Comparison with Traditional Speech Enhancement Algorithms from Adverse Noisy Environments
|
G. Ramesh Babu, |
|
2011 |
|
2 |
p. 744-759 |
article |
88 |
MRI Brain Abnormalities Segmentation using K-Nearest Neighbors (k-NN)
|
Noor Elaiza Abdul Khalid |
|
2011 |
|
2 |
p. 980-990 |
article |
89 |
Multimodal Authentication For High End Security
|
K.Elumalai |
|
2011 |
|
2 |
p. 687-692 |
article |
90 |
Natural Language Query Processing using Semantic Grammar
|
Gauri Rao |
|
2010 |
|
2 |
p. 219-223 |
article |
91 |
Nonlinear H∞ controller for flexible joint robots with using feedback linearization
|
M.E.Akbari |
|
2011 |
|
2 |
p. 451-466 |
article |
92 |
Obstacle Avoidance of mobile robot using PSO based Neuro Fuzzy Technique
|
Sourav Dutta |
|
2010 |
|
2 |
p. 301-304 |
article |
93 |
On the Use of MCDM Technique for Identifying Key Technology: A case of Auto Company
|
Aliakbar Mazlomi, |
|
2011 |
|
2 |
p. 528-539 |
article |
94 |
Optimizing Hidden Markov Model for Failure Prediction– Comparison of Gaine’s optimization and Minimum message length Estimator
|
N.Muthumani, |
|
2011 |
|
2 |
p. 892-898 |
article |
95 |
Organizational improvement using Organizational paradigms with the support of people paradigms
|
Md. Shariful Alam |
|
2011 |
|
2 |
p. 991-996 |
article |
96 |
Performance Comparison and Analysis of DSDV and AODV for MANET
|
V.Ramesh |
|
2010 |
|
2 |
p. 183-188 |
article |
97 |
PERFORMANCE CONTRIBUTION BASED SCHEDULING FRAMEWORK FOR PRECEDENCE CONSTRAINT TASKS IN REAL TIME SYSTEM
|
RADHAKRISHNA NAIK |
|
2011 |
|
2 |
p. 664-675 |
article |
98 |
Performance Evaluation and Comparison of AODV and AOMDV
|
S. R. Biradar |
|
2010 |
|
2 |
p. 373-377 |
article |
99 |
Performance Metrics Analysis of Torus Embedded Hypercube Interconnection Network
|
N. Gopalakrishna Kini |
|
2009 |
|
2 |
p. 78-80 |
article |
100 |
PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries
|
Nasir Mahmood Malik |
|
2009 |
|
2 |
p. 105-110 |
article |
101 |
Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library
|
K V S S R S S Sarma |
|
2011 |
|
2 |
p. 739-743 |
article |
102 |
Rank Based Clustering For Document Retrieval From Biomedical Databases
|
Jayanthi Manicassamy |
|
2009 |
|
2 |
p. 111-115 |
article |
103 |
Record Matching Over Query Results Using Fuzzy Ontological Document Clustering
|
V.Vijayaraja |
|
2011 |
|
2 |
p. 926-932 |
article |
104 |
Safety Measures Using Sextic Curve Cryptography
|
W. R. Sam Emmanuel, |
|
2011 |
|
2 |
p. 800-806 |
article |
105 |
Sampling based Association Rules Mining- A Recent Overview
|
V.Umarani, |
|
2010 |
|
2 |
p. 314-318 |
article |
106 |
Security Enhancement Using Mutual Authentication in Existing CDMA Systems
|
L. Krishna Bharathi |
|
2010 |
|
2 |
p. 237-245 |
article |
107 |
Security Visualization for peer-to-peer resource sharing applications
|
DANG TRAN TRI |
|
2009 |
|
2 |
p. 47-55 |
article |
108 |
Semantic Inference Model For Database Inference Detection Violation
|
Rupali Chopade |
|
2011 |
|
2 |
p. 830-836 |
article |
109 |
SERVICE ORIENTED APPLICATION IN AGENT BASED VIRTUAL KNOWLEDGE COMMUNITY
|
L. O. Yusuf |
|
2011 |
|
2 |
p. 569-579 |
article |
110 |
Sliding window approach based Text Binarisation from Complex Textual images
|
Chitrakala Gopalan |
|
2010 |
|
2 |
p. 309-313 |
article |
111 |
Software Reliability Growth Model with Logistic-Exponential Test-Effort Function and Analysis of Software Release Policy
|
Shaik.Mohammad Rafi |
|
2010 |
|
2 |
p. 387-399 |
article |
112 |
Source Feature Based Gender Identification System Using GMM
|
R. RAJESHWARA RAO, |
|
2011 |
|
2 |
p. 586-593 |
article |
113 |
Speech Quality Requirements over DSL Networks
|
Ibrahiem M. M. El Emary |
|
2010 |
|
2 |
p. 189-197 |
article |
114 |
SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags
|
Rama N |
|
2010 |
|
2 |
p. 363-367 |
article |
115 |
Survey of Attacks on Mobile AdhocWireless Networks
|
Vikas Solomon Abel |
|
2011 |
|
2 |
p. 826-829 |
article |
116 |
Survey of clustering algorithms for MANET
|
Ratish Agarwal |
|
2009 |
|
2 |
p. 98-104 |
article |
117 |
Synthesis of supervised classification algorithm using intelligent and statistical tools
|
Ali Douik |
|
2009 |
|
2 |
p. 89-97 |
article |
118 |
The CAC Model and QoS Management in Wireless Multiservice Network
|
Sonia Ben Rejeb |
|
2010 |
|
2 |
p. 333-339 |
article |
119 |
The proposed quantum computational basis of deep ecology: its implications for agriculture
|
Monendra Grover |
|
2011 |
|
2 |
p. 797-799 |
article |
120 |
The Role and Issues of Clustering Technique in Designing Maintainable Object Oriented System
|
A. K. Malviya |
|
2011 |
|
2 |
p. 784-788 |
article |
121 |
The role of Ethics in the process of Technology Transfer and Development of 206 Peugeot
|
Aliakbar Mazlomi |
|
2011 |
|
2 |
p. 540-453 |
article |
122 |
The State of Information and Communication Technology in Iran
|
Mohsen Gerami |
|
2010 |
|
2 |
p. 328-332 |
article |
123 |
The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks
|
A.Rajaram |
|
2010 |
|
2 |
p. 400-408 |
article |
124 |
Tree-kNN: A Tree-Based Algorithm for Protein Sequence Classification
|
Khaddouja Boujenfa, |
|
2011 |
|
2 |
p. 961-968 |
article |
125 |
Trust Based Security Routing in Mobile Adhoc Networks
|
K.Seshadri Ramana, |
|
2010 |
|
2 |
p. 259-263 |
article |
126 |
WaveCluster for Remote Sensing Image Retrieval
|
Priti Maheshwary |
|
2011 |
|
2 |
p. 976-979 |
article |
127 |
Weightage Factor Based Scheme for Performance Improvement in Ad Hoc Networks
|
Pushpa |
|
2010 |
|
2 |
p. 146-148 |
article |