Article#
|
Article Title & Authors (Volume 1 Number 1 April 2009)
|
Page
|
1 |
A Novel Genetic Algorithm using Simulated Annealing for Static Task Scheduling in Distributed Systems
Amir Masoud Rahmani |
1 |
2 |
Speckle Noise Reduction in Ultrasound Images using Adaptive Wavelet Thresholding
S Sudha, G.R Suresh and R. Sukanesh |
7 |
3 |
Efficient Job Scheduling in Grid Computing with Modified Artificial Fish Swarm Algorithm
Saeed Farzi |
13 |
4 |
A Sensor Network Data Aggregation Technique
Mohamed Watfa, William Daher and Hisham Al Azar |
19 |
5 |
Compounded Uniqueness Level: Geo-Location Indexing Using Address Parser
Shoaib Jameel and Chingtham Tejbanta Singh |
27 |
6 |
An Object-Oriented Approach to UML Scenarios Engineering and Code Generation
A. Jakimi and M. El Koutbi |
35 |
7 |
Some Observations on Semantic Web Service Processes, Tools and Applications
Kuldeep Kumar and Sandeep Kumar |
42 |
8 |
QoS Based Power Aware Routing in MANETs
Vinay Rishiwal, Shekhar Verma and S.K. Bajpai |
47 |
9 |
Atmospheric Temperature Prediction using Support Vector Machines
Y.Radhika and M.Shashi |
55 |
10 |
Probability Analysis of Channel Collision between IEEE 802.15.4 and IEEE 802.11b using Qualnet Simulation for Various Topologies
G.M.Tamilselvan, Dr.A.Shanmugam |
59 |
11 |
Location Updating Strategies in Moving Object Databases
Hatem Abdul-Kader |
65 |
12 |
Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
B. B. Gupta, R. C. Joshi, Manoj Misra |
71 |
13 |
Velocity Control of DC Motor Based Intelligent Methods and Optimal Integral State Feedback Controller
M.B.B. Sharifian, Reza Rahnavard and H. Delavari |
81 |
14 |
Parallel Form of the Pipelined Lifting-based VLSI Architectures for Two-dimensional Discrete Wavelet Transforms
Ibrahim Saeed Koko and Herman Agustiawan |
85 |
15 |
Modeling of Fluid Industry Based on Flexible Neural Tree
QU Shou-ning, LIU Zhao-lian, CUI Guang-qiang, and FUAi-fang |
97 |
Article#
|
Article Title & Authors (Volume 1 Number 2 June 2009)
|
Page
|
16 |
A Filtering Algorithm for Efficient Retrieving of DNA Sequence
M Nordin A Rahman, M Yazid M Saman, Aziz Ahmad and A Osman M Tap |
102 |
17 |
Lower Computation and Storage Complexity of QC-LDPC Codes in Rayleigh Fading Channel
Abid Yahya, Othman Sidek, M. F. M. Salleh and Farid Ghani
|
110 |
18 |
|
114 |
19 |
Clustering Categorical Data using Bayesian Concept
Aranganayagi.S and Thangavel. K
|
119 |
20 |
Vague Metagraph
Deepti Gaur, Aditya Shastri and Ranjit Biswas |
126 |
21 |
|
131 |
22 |
Weighted Structural Similarity Based on Edge Strength for Image Quality Assessment
D.Venkata Rao, L.Pratap Reddy
|
136 |
23 |
Performance Analysis of Wireless Local Area Networks
Muhammad Umair Naru, Umar Nauman, Khalid Hussain |
140 |
24 |
|
146 |
25 |
An Approach for Discretization and Feature Selection Of Continuous-Valued Attributes in Medical Images for Classification Learning
Jaba Sheela L, Dr.V.Shanthi |
154 |
26 |
Channel Controlled Payload Length &Rate in MIMO Networks Using Cross-Layer
Mrs.Srimathi Mathialagan, Research Scholar, Dr. S. Shanmugavel, Professor |
159 |
27 |
|
166 |
28 |
Mutual Information based Rigid Medical Image registration using Normalized Tsallis entropy and Type II fuzzy index
Mohanalin , Prem Kumar Kalra , Nirmal Kumar |
173 |
29 |
Aligning Multiple Sequences with Genetic Algorithm
Segun A. Fatumo, Ibidapo O. Akinyemi, and Ezekiel .F. Adebiyi |
179 |
30 |
|
183 |
31 |
DWT-AES Processor for a Reconfigurable Secure Image Coding
D. Dia, M. Zeghid, M. Atri, B. Bouallegue, M. Machhout and R. Tourki |
188 |
Article#
|
Article Title & Authors (Volume 1 Number 3 August 2009)
|
Page
|
32 |
A Novel Rhetorical Structure Approach for Classifying Arabic Security Documents
Hassan I. Mathkour, Member, IAENG |
195 |
33 |
|
201 |
34 |
|
209 |
35 |
A Novel Approach for Authentication Technique in Mobile Communications
C. Koner, Member, IACSIT , P. K. Bhattacharjee, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U Maulik, Sr. Member, IEEE |
216 |
36 |
Multi-Dimensional Visualization of Bioinformatics Tools Classification and Its Transformation – For Quality Assessment
Jayanthi Manicassamy and P. Dhavachelvan |
222 |
37 |
|
231 |
38 |
|
236 |
39 |
An efficient similarity indexing by ordering permutations for Spatial Multi-Resolution images
Rachid Alaoui, Said Ouatik El Alaoui and Mohammed Meknassi |
244 |
40 |
SUCCESSFUL IMPLEMENTATION OF INTEGRATED EALTH INFORMATION SYSTEMS: THE ROLE AND IMPACT OF BUSINESS PROCESS MANAGEMENT
Dr. Abdullah S. Al-Mudimigh |
251 |
41 |
|
258 |
42 |
Low -Complex ICI Reduction due to Channel Estimation Error in OFDM systems using VSB-VBL Technique for High Mobility Applications
K. Vinoth Babu , K.V.N. Kavitha and K. Murali Babu |
262 |
43 |
Development of WAP Based Students Information System in Campus Environment
Mohd Nazri Ismail |
266 |
44 |
|
272 |
45 |
Applications of Conventional and A thermal Arrayed Waveguide Grating (AWG) Module in Active and Passive Optical Networks (PONs)
Abd El–Naser A. Mohammed, Ahmed Nabih Zaki Rashed, Gaber E. S. M. El-Abyad and Abd-El-fattah A. Saad |
276 |
46 |
A New Generation Cryptographic Technique
Swarnendu Mukherjee, Debashis Ganguly and Somnath Naskar |
284 |
47 |
|
288 |
48 |
Evaluating the Effects of Cryptography Algorithms on power consumption for wireless devices
D. S. Abdul. Elminaam, H. M. Abdul Kader, and M. M. Hadhoud
|
293 |
49 |
Energy Efficiency of Encryption Schemes for Wireless Devices
Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud
|
302 |
50 |
|
310 |
51 |
Measuring and Reducing Energy Consumption of Cryptographic Schemes for Different Data Types
Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud |
318 |
52 |
Tradeoffs between Energy Consumption and Security of Symmetric Encryption Algorithms
Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud |
325 |
Article#
|
Article Title & Authors (Volume 1 Number 4 October 2009)
|
Page
|
53 |
|
334 |
54 |
Performance Evaluation of Symmetric Encryption Algorithms on power consumption for wireless devices
Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud |
343 |
55 |
|
352 |
56 |
|
358 |
57 |
Blind Image Fidelity Assessment Using the Histogram
M. I. Khalil |
364 |
58 |
Fuzzy Mathematical Model for Utilization of the Resources
Manoj Kumar Jain, A. K. Dalela and Sandeep Kumar Tiwari |
370 |
59 |
|
375 |
60 |
|
382 |
61 |
A Study of suitability and effectiveness of various implementation options of finite field arithmetic on Elliptic Curve Crypto System
Bimal Kumar Meher |
389 |
62 |
Research on Correlative Techniques of Building Specific Topic Lexicon
First A. Shouning QU, Second B. Jian Lu, and Third C. Jing Li |
394 |
63 |
|
398 |
64 |
UML Design for Performance Evaluation of Object Oriented Programs on Dual Core Processors
Dr. Vipin Saxena and Manish Shrivastava |
403 |
65 |
Link State Generation using Antnet Algorithm
D.N. Mallikarjuna Rao, Dr. V. Kamakshi Prasad |
409 |
66
|
|
413 |
67
|
Assessment Of Ocean Parameters through the Satellite Images - AOOPSI
R.D.Sathiya, Dr.G.Victor Rajamanickam, Dr.V.Vaidhyanathan |
420 |
68
|
DWT-SVD Combined Full Band Robust Watermarking Technique for Color Images in YUV Color Space
V.Santhi, Arunkumar Thangavelu |
424 |
69
|
|
430 |
70
|
SystemCtlmFL: the Successor of SystemCFL
K.L. Man, M. Mercaldi |
434 |
71
|
Neuro – Genetic Cost Optimization Model: Application of Textile Spinning Process
L. S. Admuthe and S. D. Apte |
441 |
72
|
|
445 |
73
|
Review on Applicability of Genetic Algorithm to Web Search
S.Siva Sathya, Philomina Simon, Member IACSIT |
450 |
74
|
Secure Routing Techniques for MANETs
Dr. Harsh Sadawarti and Anuj K. Gupta, Member, IAENG |
456 |
75
|
|
461 |
76
|
A hierarchical possibilistic clustering
Mehdi Salkhordeh Haghighi, Hadi Sadoghi Yazdi, AbedinVahedian |
465 |
77
|
|
473 |
Article#
|
Article Title & Authors (Volume 1 Number 5 December 2009)
|
Page
|
78 |
Lifetime Estimation of Composite Bone Joint Screws
A. Khalatbari, K. Jenab, A. Varvani-Farahani
|
477 |
79 |
The Mathematical Formula Recognizing System Based On Web Service
Qi Xiangwei and Yusup Abaydulla
|
482 |
80 |
Particle Swarm Optimization Methods, Taxonomy and Applications
Davoud Sedighizadeh and and Ellips Masehian
|
486 |
81 |
Effects of the Vector Combinatorial code connection parameters on the performance of an OCDMA system for high-speed networks
Hassan Yousif Ahmed, Ibrahima Faye, N.M.Saad and S.A. Aljined
|
503 |
82 |
Virtual Clock Scheduling Algorithm for Video Streaming
Sankar.P and Chellamuthu .C
|
509 |
83 |
Cryptic key prediction and statistical inferences thereof
P. Chakrabarti
|
512 |
84 |
Studies on Graph based Approaches for Single and Multi Document Summarizations
Shanmugasundaram Hariharan and Rengaramanujam Srinivasan
|
519 |
85 |
Robust Multiple Image Watermarking Scheme using Discrete Cosine Transform with Multiple Descriptions
Chandra Mohan B and Srinivas Kumar S.
|
527 |
86 |
Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks
A. Mardanian Dehkordi and V. Tabataba Vakili
|
533 |
87 |
A Hybrid Intelligent Approach for Automated Alert Clustering and Filtering in Intrusion Alert Analysis
Maheyzah Md Siraj, Member, IACSIT, Mohd Aizaini Maarof and Siti Zaiton Mohd Hashim
|
539 |
88 |
Properties of Autocorrelation Coefficients for Single-Output Switching Functions
J. E. Rice, Member, IEEE, J. C. Muzio, Senior Member, IEEE, N. A. Anderson and R. Jansen
|
546 |
89 |
A Linda-based Hierarchical Master-Worker Model
Mohammad GhasemiGol, Mostafa Sabzekar, Hossein Deldari and Amir-Hassan Bahmani
|
556 |
90 |
Reconfigurable Automatic Modulation Identification Hardware Module for Software Defined Radio Receivers
P.Prakasam, MIEEE, SMIACSIT and M.Madheswaran, MIEEE, SMIACSIT
|
562 |
91 |
Impact of Multiencryption in Data Security
W.R. Sam Emmanuel, Member, IAENG
|
571 |
92 |
State Complexity of Shuffle and Intersection Combined with Complement
Kavitha Joseph, Member, CSI
|
577 |
93 |
A NOVEL APPROACH FOR ESTIMATION AND OPTIMIZATION OF MEMORY IN LOW POWER EMBEDDED SYSTEMS
SRILATHA C, Dr. GURU RAO C V
|
581 |
94 |
Comparative Analysis of Simulated Annealing and Tabu Search Channel Allocation Algorithms
Maninder Singh Kamboj, Jyotsna Sengupta
|
588 |
95 |
A Modified Playfair Cipher for a Large Block of Plaintext
V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani
|
592 |
96 |
A Modified Playfair Cipher Involving Interweaving and Iteration
V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani
|
597 |
97 |
Scavenging Idle CPU Cycles for Creation of Inexpensive Supercomputing Power
Madhuri D Bhavsar, Shrikant N Pradhan
|
602 |
98 |
Covering Rough Sets From a Topological Point of View
Nguyen Duc Thuan, Member, IACSIT
|
606 |
99 |
Classification Of Documents Using Kohonen’s Self-Organizing Map
B.H.ChandraShekar, Dr.G.Shoba
|
610 |
100 |
Performance Evaluation of Edge Detection Techniques for Images in Spatial Domain
Mamta Juneja , Parvinder Singh Sandhu
|
614 |
101 |
Towards Detection of Brain Tumor in Electroencephalogram Signals Using Support Vector Machines
M. Murugesan and Dr.(Mrs.).R. Sukanesh |
622 |
102 |
Fisher over Fuzzy Samples
B. Rajaei, H. Sadoghi Yazdi, S. Effati
|
632 |
103 |
Effectiveness of Eigenspaces for Facial Expressions Recognition
G. R. S. Murthy, R.S.Jadon |
638 |
104 |
Analysis of Microarray Image Spots Intensity:A Comparative Study
M.Anandhavalli, Chandan Mishra, M.K.Ghose |
643 |
105 |
Process Grain Size Based Scheduling of Parallel Jobs withAgile Algorithm
S.V.Sudha, K.Thanushkodi ,Kalignar Karunanidhi Institute of Technology,Coimbatore |
647 |
Article#
|
Article Title & Authors (Volume 2 Number 1 February 2010)
|
Page
|
106 |
Application of Automatic Variable Password Technique in Das’s Remote System Authentication Scheme Using Smart Card
C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
|
1 |
107 |
Validation of Temporary Delegation and Revocation of Roles with UML and OCL
Mohsin Ali Memon, Manzoor Hashmani, and Karsten Sohr
|
6 |
108 |
Intelligent Tutoring System Using Hybrid Expert System With Speech Model in Neural Networks
R.Venkatesh, E.R.Naganathan, N.Uma Maheswari
|
12 |
109 |
Neural Network-A Novel Technique for Software Effort Estimation
Jaswinder Kaur, Satwinder Singh, Dr. Karanjeet Singh Kahlon, Pourush Bassi
|
17 |
110 |
Lifetime Maximisation of Multihop WSN using Cluster-based Cooperative MIMO Scheme
J. Vidhya and P. Dananjayan
|
20 |
111 |
Biometric Entity Based Mutual Authentication Technique for 3-G Mobile Communications
Pijush Kanti Bhattacharjee, Chandan Koner,Chandan Tilak Bhunia, and Ujjwal Maulik
|
26 |
112 |
A Propose Architecture of MANET for Disaster Area Architecture
R.P.Mahapatra, Tanvir Ahmad Abbasi, and Mohd Suhaib Abbasi
|
31 |
113 |
Context Based Meaning Extraction by Means of Markov Logic
Imran Sarwar Bajwa
|
35 |
114 |
Image Compression Using New Entropy Coder
M. I. Khalil
|
39 |
115 |
Web Page Ranking Based on Text Content of Linked Pages
P. C. Saxena, J. P. Gupta, Namita Gupta
|
42 |
116 |
Solovay-Strassen test in a RSA Pubic key Cryptosystem
L. Sreenivasulu Reddy , K.Ramakrishna Prasad, N.Ch. S.N.Iyengar, and V.Ramachandran
|
52 |
117 |
Fuzzy multicriteria decision-making approach for Collaborative recommender systems
K. Palanivel and R. Sivakumar
|
57 |
118 |
Distance Measurement of an Object or Obstacle by Ultrasound Sensors using P89C51RD2
A. K. Shrivastava, A. Verma, and S. P. Singh
|
64 |
119 |
Neighborhood Pixels Weights-A New Feature Extractor
Satish Kumar
|
69 |
120 |
Detection and prevention of wormhole attack in mobile adhoc networks
Shalini Jain, Dr.Satbir Jain
|
78 |
121 |
A Meta-Model Based Approach for Definition of a Multi-Formalism Modeling Framework
Hamid Mohammad Gholizadeh and Mohammad Abdollahi Azgomi
|
87 |
122 |
Grid Operating System: Making Dynamic Virtual Services in Organizations
Sanjeev Puri and. Dr. Qamas Abbas
|
96 |
123 |
An Overview of Video Encryption Techniques
M. Abomhara, Omar Zakaria, Othman O. Khalifa
|
103 |
124 |
Dynamic route selection: An artificial intelligence based approach
P.Chakrabarti
|
111 |
125 |
Data Quality Measurement using Data Mining
Saeed Farzi, Ahmad Baraani Dastjerdi
|
115 |
126 |
Fuzzy Logic approach to Recognition of Isolated Arabic Characters
Majida Ali Abed, Hamid Ali Abed AL-Asadi, Zainab sabah Baha Al-Deen, Ahmad Naser Ismail
|
119 |
127 |
Testability Analysis of Aspect Oriented Software
Sushil Garg, Dr. K.S.Kahlon and Dr.P.K.Bansal
|
125 |
128 |
Enchanced Self Umpiring System For Security Using Salvaging Route Reply
Ayyaswamy Kathirvel, Rengaramanujam Srinivasan
|
129 |
129 |
Implementation of Routing Security Aspects in AODV
Suman Deswal and Sukhbir Singh
|
135 |
130 |
Web Service Categorization Using Normalized Similarity Score
Shalini Batra, Seema Bawa
|
139 |
131 |
WLAN QoS Issues and IEEE 802.11e QoS Enhancement
Prof. Rathnakar Acharya, Dr. V. Vityanathan, Dr. Pethur Raj Chellaih
|
143 |
Article#
|
Article Title & Authors (Volume 2 Number 2 April 2010)
|
Page
|
132 |
E-learning for Tertiary Level Education in Least Developed Countries: Implementation Obstacles and Way Outs for Bangladesh
Khaled Mahmud
|
150 |
133 |
Performance Analysis of Coexistent Heterogeneous Networks for various Routing Protocols using Qualnet Simulation
G.M.Tamilselvan, Dr.A.Shanmugam
|
156 |
134 |
Design Fault Tolerance System Using Genetic Algorithm Employing Mutation and Back-to-Back Testing
Rakesh Kumar, Kulvinder Singh |
166 |
135 |
WebPage Transclusion – An Adaptive Algorithm for Web Technologies
Vishwas J Raval, Amit R Thakkar, Amit P Ganatra, Yogeshwar P Kosta |
172 |
136 |
Automatic Volumetric Liver Segmentation from MRI Data
Haidi Ibrahim, Maria Petrou, Kevin Wells, Simon Doran, Øystein Olsen |
176 |
137 |
A Family of Covering Rough Sets Based Algorithm for Reduction of Attributes
Nguyen Duc Thuan |
180 |
138 |
Modeling Clinical Database using Time Series based Temporal Mining
Akash Rajak, Kanak Saxena |
185 |
139 |
A hybrid particle swarm optimization and tabu search algorithm for flexible job-shop scheduling problem
Jun-qing Li, Quan-ke Pan, Sheng-xian Xie, Bao-xian Jia, Yu-ting Wang |
189 |
140 |
Multi-Level Synthesis of Frequent Rules from Different Data-Sources
Thirunavukkarasu Ramkumar, Rengaramanujam Srinivasan |
195 |
141 |
Artificial Intelligence Based Mutual Authentication Technique with Biometric Entities in 3-G MobileCommunications
Pijush Kanti Bhattacharjee, Chandan Koner, Chandan Tilak Bhunia, Ujjwal Maulik |
205 |
142 |
Use of Symmetric Functions Designed by QCA Gates for Next Generation IC
Pijush Kanti Bhattacharjee |
211 |
143 |
A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared
A.A.Zaidan, B.B.Zaidan, Hamid.A.Jalab |
218 |
144 |
A Cluster Based Parallel Computing Framework (CBPCF) for Performance Evaluation of Parallel Applications
Amit Chhabra, Gurvinder Singh |
226 |
145 |
Novel Biorthogonal Wavelet based Iris Recognition for Robust Biometric System
Aditya Abhyankar, Stephanie Schuckers |
233 |
146 |
Application of GA and PSO Tuned Fuzzy Controller for AGC of Three Area Thermal-Thermal-Hydro Power System
S. K. Sinha, R. N. Patel, R. Prasad |
238 |
147 |
A Neuro Fuzzy approach for Facial Expression Recognition using LBP Histograms
V. Gomathi, Dr. K. Ramar, A. Santhiyaku Jeevakumar |
245 |
148 |
Analysis of Parallel Manufacturing Processes with Resource Sharing
Farooq Ahmad, Hejiao Huang, Xiao-long Wang |
250 |
149 |
Prediction of miRNAs in Bombyx mori through Computational Approaches
A.K. Mishra, D.K. Lobiyal |
258 |
150 |
New Morphology-Based Method for Robust Iranian Car Plate Detection and Recognition
S. Hamidreza Kasaei, S. Mohammadreza Kasaei, S. Alireza Kasaei |
264 |
151 |
Association Rule Mining in Genomics
M.Anandhavalli, M.K.Ghose, K.Gauthaman |
259 |
152 |
A Novel Approach in Video Scene Background Estimation
Hamidreza Baradaran Kashani, Seyed Alireza Seyedin, Hadi Sadoghi Yazdi |
274 |
153 |
Kernel Least Mean Square Features For HMM-Based Signal Recognition
Seyed Hossein Ghafarian, Hadi Sadoghi Yazdi, Hamidreza Baradaran Kashani |
283 |
154 |
Optimization of Path Finding Algorithm using Clonal Selection: Application to Traveling Salesperson Problem
Tejbanta Singh Chingtham, G. Sahoo, M. K. Ghose |
290 |
155 |
An Intuitionistic Fuzzy Approach to Distributed Fuzzy Clustering
Suman Deswal, Ukhbir Singh |
295 |
156 |
Taxonomy of Routing Security for Ad-Hoc Network
Rajendra Prasad Mahapatra, Mohit Katyal |
303 |
157 |
Mobile Agent Based Trust Management Framework using Fuzzy Logic in B2C E-Business Environment
E.Sathiyamoorthy, N.Ch.S.N Iyengar, V.Ramachandran |
308 |
Article#
|
Article Title & Authors (Volume 2 Number 3 June 2010)
|
Page
|
158 |
DC Energy Storage Schemes for DVR Voltage Sag Mitigation System
H.P. Tiwari and Sunil Kumar Gupta |
313 |
159 |
Discrete Wavelet Transforms and Artificial Neural Networks for Speech Emotion Recognition
Firoz Shah. A, Raji Sukumar. A and Babu Anto. P |
319 |
160 |
Read Range of UHF Passive RFID
Satya Sai Srikant, Rajendra Prasad Mahapatra |
323 |
161 |
Incremental Clustering in Data Mining using Genetic Algorithm
Atul Kamble |
326 |
162 |
Detection and segmentation of Handwritten Textin Gurmukhi Script using Flexible Windowing
Rajiv Kumar and Amardeep Singh |
329 |
163 |
Realization of BCD adder using Reversible Logic
X. Susan Christina, M.Sangeetha Justine, K.Rekha, U.Subha and R.Sumathi |
333 |
164 |
An Adaptive Data Hiding Technique for Digital Image Authentication
Sarabjeet S. Bedi, Shekhar Verma and Geetam Tomar |
338 |
165 |
Genetically Tuned STATCOM for Voltage Control and Reactive Power Compensation
Naveen Goel, R.N. Patel and Saji T. Chacko |
345 |
166 |
Inverted Lists String Matching Algorithms
Chouvalit Khancome and Veera Boonjing |
352 |
167 |
Openness, Conscientiousness and Stingy for Buyer and Seller Agents in Electronic Marketplace
Aboozar Barzegar, Adel Jahanbani and Omid Roozmand |
358 |
168 |
A Novel Approach for Web Page Change Detection System
H. P. Khandagale and P. P. Halkarnikar |
364 |
169 |
Cancer Classification of Bioinformatics data using ANOVA
A. Bharathi and Dr.A.M.Natarajan |
369 |
170 |
A Decision System for Commercial Products using Rough-Fuzzy Hybridization
Suvobrata Sarkar |
374 |
171 |
An Innovative Approach to Enhance the Security of Data Encryption Scheme
D.B. Ojha, Ramveer Singh, Ajay Sharma, Awakash Mishra and Swati garg |
380 |
172 |
Delay Bound Multicast Routing Using Hopfield Neural Network
Sushma Jain and J.D. Sharma |
384 |
173 |
Software Calibration for Stereo Camera on Stereo Vision Mobile Robot using Tsai’s Method
Rostam Affendi Hamzah and Sani Irwan Md Salim |
390 |
174 |
Artificial Intelligence Based Authentication Technique with Three Attributes in Vehicular Ad Hoc Network
Pijush Kanti Bhattacharjee, Utpal Roy and Anup Kumar Bhattacharjee |
395 |
175 |
A Robust Algorithm for Local Obstacle Avoidance
Puneet Kumar, Nikhil Jindal, Akhil Jindal and Sidharth Chhabra |
401 |
176 |
Mutual Authentication Tracking Loop Technique for 3-G Mobile Communications
Pijush Kanti Bhattacharjee |
405 |
177 |
Nomadic Genetic Algorithm for Cryptanalysis of DES 16
S.Siva Sathya, T.Chithralekha and P.AnandaKumar |
411 |
178 |
Finding Optimal Paths on Terrain Maps using Ant Colony Algorithm
Vinay Rishiwal ,Mano Yadav and K.V. Arya |
416 |
179 |
Naïve Bayes Classifier for Classification of Plant and Animal miRNA
Bhasker Pant, Kumud Pant and K. R. Pardasani |
420 |
180 |
Virtual sub carrier based Frequency and Phase Synchronization Algorithm for MC CDMA System
L.Nithyanandan, S.Thirunavukarasu and P. Dananjayan |
425 |
181 |
Extended K-Modes with Probability Measure
Aranganayagi.S and Thangavel. K |
431 |
182 |
An Improved Multimodal Palm Vein Recognition System Using Shape and Texture Features
M.Deepamalar and M.Madheswaran |
436 |
183 |
A Generalized Despeckling Filter for Enhancing Fetal Structures to Aid Automated Obstetric Pathologies
B.Priestly Shan and M.Madheswaran |
445 |
184 |
An Ensemble Model of Multiple Classifiers for Time Series Prediction
Dr. A. Chitra and S. Uma |
454 |
185 |
A Novel Genetic Algorithm approach for Network Design with Robust Fitness Function
Anand Kumar and Dr. N. N. Jani |
459 |
Article#
|
Article Title & Authors (Volume 2 Number 4 August 2010)
|
Page
|
186 |
Modeling and Simulation of Multi-Operation Microcode-based Built-in Self Test for Memory Fault Detection and Repair
Dr. R.K. Sharma and Aditi Sood |
466 |
187 |
High linear, High CMRR, Low Power OTA with Class AB Output Stage
Seyed Javad Azhari and Farzan Rezaei |
473 |
188 |
Computational Modeling of Cell Survival/Death Using BiCMOS
Shruti Jain, Pradeep K. Naik and Sunil V. Bhooshan |
478 |
189 |
Circuit-Level Design of Human Voice Source
R. K. Sharma and Nikhil Raj |
482 |
190 |
Design of a Digital Preprocessor System Based on Software Radios Conception
Dingkun Ma, Xiaomin Zhang and Jian Luo |
491 |
191 |
Sensor Set Selection for Cooperative Spectrum Sensing Based on Confidence Detection
Xiao Zhang, Jin-long Wang and Qi-hui Wu |
496 |
192 |
Secured Back up Routing Protocol for Adhoc Networks
G. Lavanya, C.Kumar and A. Rex Macedo Arokiaraj |
503 |
193 |
Performance Analysis of Kekre's Median Fast Search, Kekre's Centroid Fast Search and Exhaustive Search Used for Colouring a Greyscale Image
Dr. H. B. Kekre, Sudeep D. Thepade and Adib Parkar |
507 |
194 |
Euclidean Distance Based Color Image Segmentation of Abnormality Detection from Pseudo Color Thermographs
N.Selvarasu, Alamelu Nachiappan and N.M.Nandhitha |
514 |
195 |
Gaussianization for Interference Background
Wang Pingbo, Tang Suofu, Wei Hongkai and Cai Zhiming |
517 |
196 |
An Improved Melody Contour Feature Extraction for Query by Humming
Nattha Phiwma and Parinya Sanguansat |
523 |
197 |
Study of Intelligent Optimization Methods Applied in the Fractional Fourier Transform
Wei Hongkai, Cai Zhiming, Wang Pingbo and Fu Yinfeng |
532 |
198 |
Sindhi Part of Speech Tagging System Using Wordnet
Javed Ahmed Mahar and Ghulam Qadir Memon |
538 |
199 |
Preprocessing Cover Images for More Secure LSB Steganography
Shreelekshmi R, M Wilscy and M Wilscy |
546 |
200 |
Segmentation Algorithm for Multiple Face Detection in Color Images with Skin Tone Regions using Color Spaces and Edge Detection Techniques
H C Vijay Lakshmi and S. PatilKulakarni |
552 |
201 |
Efficient Distribution of Conference Key for Dynamic Groups
D. V. Naga Raju, Dr. V. Valli Kumari and Dr. K. V.S.V.N. Raju |
559 |
202 |
The Effect of Subcarrier-Based Channel Estimation on the BER Bound of Turbo Coded OFDM/SDMA System
Y. Taghinia and G. Dadashzadeh, E. Jedari and A. R. Enayati |
564 |
203 |
A DOA Estimation Algorithm without Source Number Estimation for Nonplanar Array with Arbitrary Geometry
He Ke, Zhang Xiaomin, Han Peng, Yu Yang and Yan Shi |
569 |
204 |
Automatic Book Placement and Searching Technique for Performance Enhancement of Library Management System
Umar Farooq, Muhammad Amar, K. M. Hasan, Muhammad Usman Asad and Asim Iqbal |
574 |
205 |
A Dynamic Location Management Scheme for Wirless Networks Using Cascaded Correlation Neural Network
Amar Pratap Singh.J and Karnan.M |
581 |
206 |
An Enhanced Implementation of Brain Tumor Detection Using Segmentation Based on Soft Computing
T.Logeswari and M.Karnan |
586 |
207 |
An Improved Implementation of Brain Tumor Detection Using Segmentation Based on Hierarchical Self Organizing Map
T.Logeswari and M.Karnan |
591 |
208 |
Extracting Prediction Rules for Loan Default Using Neural Networks through Attribute Relevance Analysis
M. V. Jagannatha Reddy and Dr. B.Kavitha |
596 |
209 |
SASMS: Spectrum Allocation Scheme under Multi-transceiver Structure in CogMesh Network
Xiao-tian Xiang and Qi-hui Wu |
602 |
210 |
CAD Design of Operational Amplifiers with Noise Power Balance for SoC Application
B. K. Mishra and Sandhya Save |
608 |
211 |
SlimSS-tree: A New Tree Combined SS-tree With Slim-down Algorithm
Lifang Yang, Xianglin Huang, Rui Lv and Hui Lv |
613 |
212 |
Analysis and Characterisation of Heart Rate Variability (hrv) Data of Different Sets of Subjects Using Nonlinear Measure (Approximate Entropy)
CH.RenuMadhavi and A.G.Ananth |
619 |
213 |
Face Recognition Using Eigen Faces and Artificial Neural Network
Mayank Agarwal, Nikunj Jain, Mr. Manish Kumar and Himanshu Agrawal |
624 |
214 |
Alerting Service for GEO Satellite System
Gao Qian, Li Guang-xia and Lv Jing |
630 |
215 |
Face Recognition Using Wavelet Based Kernel Locally Discriminating Projection
Venkatrama Phani Kumar S, KVK Kishore and K Hemantha Kumar |
636 |
216 |
Exploring the Discrete Wavelet Transform as a Tool for Hindi Speech Recognition
Shivesh Ranjan |
642 |
217 |
A Comparative Study on Performance of Novel,Robust Spatial Domain Digital Image Watermarking with DCT Based Watermarking
Rajesh Kannan Megalingam, Mithun Muralidharan Nair, Rahul Srikumar, Venkat Krishnan Balasubramanian and Vineeth Sarma Venugopala Sarma |
647 |
218 |
A Novel Approach for Enciphering Data of Smaller Bytes
R.Satheesh Kumar, E.Pradeep, K.Naveen and R.Gunasekaran |
654 |
219 |
Efficient Computation of Phonocardiographic Signal Analysis in Digital Signal Processor Based System
D. Balasubramaniam and D. Nedumaran |
660 |
220 |
Private Inputs to Tree Parity Machine
Pravin Revankar, W. Z. Gandhare and Dilip Rathod |
665 |
221 |
Memory Reduced and Fast DDS Using FPGA
Dr. R. K. Sharma and Gargi Upadhyaya, ECE Department and NIT Kurukshetra |
670 |
222 |
A Novel Interpolation Method Using Soft Data and Hard Data
Yi Du and Ting Zhang |
673 |
223 |
The Research and Design of Asynchronous Communication Mode in Mobile Service Platform
Yonghua Qiao, Yuhui Tian, Shouning Qu and Tao Du |
678 |
Article#
|
Article Title & Authors (Volume 2 Number 5 October 2010)
|
Page
|
224 |
Car Plate Recognition Using the Template Matching Method
M.I.Khalil |
683 |
225 |
Human Face Recognition Using Superior Principal Component Analysis (SPCA)
Mohammed Aboud Kadhim and Widad Ismai |
688 |
226 |
A Robust Method Applied to Human Detection
Seyyed Meysam Hosseini, Hasan Farsi |
692 |
227 |
Image Retrieval using Texture Features extracted from GLCM, LBG and KPE
Dr. H.B.Kekre, Sudeep D. Thepade, Tanuja K. Sarode and Vashali Suryawanshi |
695 |
228 |
A Transition from Traditional Checkpointing towards Multi-Agent based Approaches
Gerard McKee, Blesson Varghese and Vassil Alexandrov |
701 |
229 |
Hole Healing Energy Aware Algorithm For Wireless Sensor Networks
Ifrah Farrukh Khan and Muhammad Younus Javed |
706 |
230 |
Quality Metrics Tool for Object Oriented Programming
Mythili Thirugnanam and Swathi.J.N. |
712 |
231 |
Mining Imperfectly Sporadic Rules with Two Thresholds
Cu Thu Thuy and Do Van Thanh |
718 |
232 |
Image Restoration Using Cellular Neural Network With Contour Tracking Ideas
P.Elango and K.Murugesan |
724 |
233 |
Sequential Pattern Mining from Multidimensional Sequence Data in Parallel
Mahdi Esmaieli and Mansour Tarafdar |
730 |
234 |
An Approach of Line Scan Conversion Based on Multiple Segments
Aloke Kumar Saha and Kazi Shamsul Arefin |
734 |
235 |
An Adaptive Energy Efficient and Reliable Gossip Routing Protocol For Mobile Adhoc Networks
S.Rajeswari and Dr.Y.Venkataramani |
740 |
236 |
Mitigation of Web Based attacks using Mobile Agents in client side
E. Rajesh, R.Raju and R.Ezumalai |
746 |
237 |
Empirical Study on Dynamic Warehousing
C K Bhensdadia and Yogeshwar P Kosta |
751 |
238 |
Incrimination Immune Method (I2M) – A Novel Messaging Technique To Combat Sybil Attack In Ad Hoc Network
N. Sreenath, S. Vijayalakshmi and P.Annadurai |
760 |
239 |
Process Grain Sized Based Scheduling of Parallel Jobs using Genetic Fuzzy Systems
S.V.Sudha and K.Thanushkodi |
768 |
240 |
Effective Web Service Discovery Model Using Neural Network Approach
Ezhilarasi G and Dhavachelvan P |
773 |
241 |
Cluster Based QoS Routing Protocol for MANET
Prof. P.K. Suri, Dr. M. K.Soni and Parul Tomar |
783 |
242 |
Ant-based Clustering Algorithms: A Brief Survey
O.A. Mohamed Jafar and R. Sivakumar |
787 |
243 |
Template based Mole Detection for Face Recognition
Ramesha K, K B Raja, Venugopal K R and L M Patnaik |
797 |
244 |
A Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side
Dr. V. U. K. Sastry, Prof. D. S. R. Murthy and Dr. S. Durga Bhavani |
805 |
245 |
Course planning of higher education to meet market demand by using data mining techniques – a case of a Technical University in India
C.Usharani and Rm.Chandrasekaran |
809 |
246 |
A Highly Secured Approach against Attacks in MANETS
G.S. Mamatha and Dr. S. C. Sharma |
815 |
247 |
Implementation of WIMAX IEEE 802.16e Baseband Transceiver on Multi-Core Software Defined Radio Platform
Mohammed Aboud Kadhim and Widad Ismail |
820 |
Article#
|
Article Title & Authors (Volume 2 Number 6 December 2010)
|
Page
|
248 |
A Novel Video Object Segmentation Approach for Noisy Video Sequences towards Effective Video Retrieval
S.Padmakala and Dr.G.S.AnandhaMala |
826 |
249 |
Stego-Based-Crypto Technique for High Security Applications
Adnan Mohsin Abdulazeez Brifcani and Wafaa Mustafa Abduallah Brifcani |
835 |
250 |
Hybridization of ANN and GA with Adaptive Mutation: A Proficient Technique for Optimal Transmit Antenna Subset Selection for MIMO-OFDM Systems
Madan Lal and Dr Ashok De |
842 |
251 |
On-line Image Compression based on Pipelined Architecture
Subarna Bhattacharjee, Dipak Kumar Kole and Amiya Halder |
851 |
252 |
The Proposal of Step Stress Testing Automation
P. Tanuska, O. Vlkovic and L. Spendla |
860 |
253 |
Association Rule Mining for Multiple Tables With Fuzzy Taxonomic Structures
Praveen Arora, R. K. Chauhan and Ashwani Kush |
866 |
254 |
Study and Simulation of Fault Tolerant Quantum Cellular Automata Structures
Dr. E.N.Ganesh, R.Kaushik Ragavan, M.Krishna Kumar and V.Krishnan |
871 |
255 |
Soft Decision Parallel Interference Cancellation for Scrambled/Unscrambled DS-CDMA System
Sasipriya S. and Ravichandran C.S. |
877 |
256 |
Fuzzy Rule Based Expert System to Represent Uncertain Knowledge of E-commerce
Pankaj Dashore and Dr.Suresh Jain |
882 |
257 |
Ontology Languages – A Review
V. Maniraj, Dr.R. Sivakumar |
887 |
258 |
A Novel Genetic Algorithm for GTSP
Zaheed Ahmed, Irfan Younas and Muhammad Zahoor |
892 |
259 |
A combination approach for Web Page Classification using Page Rank and Feature Selection Technique
Sini Shibu, Aishwarya Vishwakarma and Niket Bhargava |
897 |
260 |
Intrusion Detection Tools and Techniques – A Survey
Karthikeyan .K.R and A. Indra |
901 |
261 |
Re-Search & Re-Classification Algorithm – An Adaptive Algorithm for Search Engines
Vishwas J Raval, Amit R Thakkar, Amit P Ganatra and Yogesh P Kosta |
907 |
262 |
A Hybrid model of Neural Network Approach for Speaker independent Word Recognition
N.Uma Maheswari, A.P.Kabilan and R.Venkatesh |
912 |
263 |
Classification Algorithms in Achieving Partitioning Optimization for VLSI Applications
Dr .Sumithra devi K.A. and Vijayalakshmi.M.N |
916 |
264 |
Realization of Threats and Countermeasure in Semantic Web Services
Mr. Suresh Kumar , Mr. Rakesh Kumar Prajapati, Dr. Manjeet Singh and Asok De |
919 |
265 |
Trend Spotting Technological advancement, Issues, Challenges and Opportunities in Information Fusion Methods specific to Multiple Classifier Systems - A Survey Paper
Amit P Ganatra and Yogesh P Kosta |
925 |
266 |
Comprehensive Evolution and Evaluation of Boosting
Amit P Ganatra and Yogesh P Kosta |
931 |
267 |
E-Management Framework for Teaching Hospital Complexes in Developing Countries
Emmanuel Olajubu1, Anuoluwapo Ajayi, Deborah Ninan, Sururah Bello, Olofin Bodunde and Omodunbi Theresa |
937 |
268 |
Design of High Performance Quaternary Adders
Vasundara Patel K S and K S Gurumurthy |
944 |
269 |
Metrics for Test Case Design in Test Driven Development
Divya Prakash Shrivastava and R.C. Jain |
952 |
270 |
State of the Art of Data Dissemination in VANETs
Pratibha Tomar, Brijesh Kumar Chaurasia and G. S. Tomar |
957 |
271 |
Spiking Back Propagation Multilayer Neural Network Design for Predicting Unpredictable Stock Market Prices with Time Series Analysis
Amit Ganatr and Y. P. Kosta |
963 |
272 |
iACO: A Bio-inspired Power Efficient Routing Scheme for Sensor Networks
Venkatesh Mahadevan and Frank Chiang |
972 |
273 |
OpenPC : A Toolkit for Public Cluster with Full Ownership
Z. Akbar, I. Firmansyah, B. Hermanto and L.T. Handoko |
978 |
274 |
A Hop by Hop Congestion Control Protocol to Mitigate Traffic Contention in Wireless Sensor Networks
Kamal Kumar Sharma, Dr. Harbhajan Singh and Dr. R.B Patel |
986 |