دانلود رایگان تعدادی مقاله در رشته مهندسی کامپیوتر

 

در این جا لیست تعدادی مقاله به همراه لینک دانلود متن کامل مقاله از International Journal of Computer Theory and Engineering (IJCTE) برای شما فراهم شده است.برای دانلود متن کامل مقاله بر روی عنوان مقاله کلیک کنید.

Article#

Article Title & Authors (Volume 1 Number 1 April 2009)

Page

1 A Novel Genetic Algorithm using Simulated Annealing for Static Task Scheduling in Distributed Systems
Amir Masoud Rahmani
1
2 Speckle Noise Reduction in Ultrasound Images using Adaptive Wavelet Thresholding
S Sudha, G.R Suresh and R. Sukanesh
7
3 Efficient Job Scheduling in Grid Computing with Modified Artificial Fish Swarm Algorithm
Saeed Farzi
13
4 A Sensor Network Data Aggregation Technique
Mohamed Watfa, William Daher and Hisham Al Azar
19
5 Compounded Uniqueness Level: Geo-Location Indexing Using Address Parser
Shoaib Jameel and Chingtham Tejbanta Singh
27
6 An Object-Oriented Approach to UML Scenarios Engineering and Code Generation
A. Jakimi and M. El Koutbi
35
7 Some Observations on Semantic Web Service Processes, Tools and Applications
Kuldeep Kumar and Sandeep Kumar
42
8 QoS Based Power Aware Routing in MANETs
Vinay Rishiwal, Shekhar Verma and S.K. Bajpai
47
9 Atmospheric Temperature Prediction using Support Vector Machines
Y.Radhika and M.Shashi
55
10 Probability Analysis of Channel Collision between IEEE 802.15.4 and IEEE 802.11b using Qualnet Simulation for Various Topologies
G.M.Tamilselvan, Dr.A.Shanmugam
59
11 Location Updating Strategies in Moving Object Databases
Hatem Abdul-Kader
65
12 Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
B. B. Gupta, R. C. Joshi, Manoj Misra
71
13 Velocity Control of DC Motor Based Intelligent Methods and Optimal Integral State Feedback Controller
M.B.B. Sharifian, Reza Rahnavard and H. Delavari
81
14 Parallel Form of the Pipelined Lifting-based VLSI Architectures for Two-dimensional Discrete Wavelet Transforms
Ibrahim Saeed Koko and Herman Agustiawan
85
15 Modeling of Fluid Industry Based on Flexible Neural Tree
QU Shou-ning, LIU Zhao-lian, CUI Guang-qiang, and FUAi-fang
97

Article#

Article Title & Authors (Volume 1 Number 2 June 2009)

Page

16 A Filtering Algorithm for Efficient Retrieving of DNA Sequence
M Nordin A Rahman, M Yazid M Saman, Aziz Ahmad and A Osman M Tap
102
17

Lower Computation and Storage Complexity of QC-LDPC Codes in Rayleigh Fading Channel
Abid Yahya, Othman Sidek, M. F. M. Salleh and Farid Ghani

110
18 114
19

Clustering Categorical Data using Bayesian Concept
Aranganayagi.S and  Thangavel. K

119
20 Vague Metagraph
Deepti Gaur, Aditya Shastri and Ranjit Biswas
126
21 131
22

Weighted Structural Similarity Based on Edge Strength for Image Quality Assessment
D.Venkata Rao, L.Pratap Reddy

136
23 Performance Analysis of Wireless Local Area Networks
Muhammad Umair Naru, Umar Nauman, Khalid Hussain
140
24 146
25 An Approach for Discretization and Feature Selection Of Continuous-Valued Attributes in Medical Images for Classification Learning
Jaba Sheela L, Dr.V.Shanthi
154
26 Channel Controlled Payload Length &Rate in MIMO Networks Using Cross-Layer
Mrs.Srimathi Mathialagan, Research Scholar, Dr. S. Shanmugavel, Professor
159
27 166
28 Mutual Information based Rigid Medical Image registration using Normalized Tsallis entropy and Type II fuzzy index
Mohanalin , Prem Kumar Kalra , Nirmal Kumar
173
29 Aligning Multiple Sequences with Genetic Algorithm
Segun A. Fatumo, Ibidapo O. Akinyemi, and Ezekiel .F. Adebiyi
179
30
Products Recommendation in a B2C E-Commerce Using Fuzzy Logic
Salam A. Ismaeel, Karim M. Ahjebory, and Oras I. Sulaiman
183
31 DWT-AES Processor for a Reconfigurable Secure Image Coding
D. Dia, M. Zeghid, M. Atri, B. Bouallegue, M. Machhout and R. Tourki
188

Article#

Article Title & Authors (Volume 1 Number 3 August 2009)

Page

32 A Novel Rhetorical Structure Approach for Classifying Arabic Security Documents
Hassan I. Mathkour, Member, IAENG
195
33
A survey on Bandwidth Allocation methods in Optical Networks
ARASH HABIBI LASHKARI, SHAHRAM JAZAYERI, DARYOUSH NAGHNEH ABBASPOUR
201
34
Mobile Agent Architecture for Networking in Hospital Organizations and Healthcare Enterprises
Meiappane.A, Maheswaran.S, Prabhakaran.M, LakshmiNarayanan.A
209
35 A Novel Approach for Authentication Technique in Mobile Communications
C. Koner, Member, IACSIT , P. K. Bhattacharjee, Member, IACSIT,  C. T. Bhunia, Sr. Member, IEEE and U Maulik, Sr. Member, IEEE
216
36 Multi-Dimensional Visualization of Bioinformatics Tools Classification and Its Transformation – For Quality Assessment
Jayanthi Manicassamy and P. Dhavachelvan
222
37 231
38
From XML Schema to Cube
Parimala N. and Payal Pahwa
236
39 An efficient similarity indexing by ordering permutations for Spatial Multi-Resolution images
Rachid Alaoui, Said Ouatik El Alaoui and Mohammed Meknassi
244
40 SUCCESSFUL IMPLEMENTATION OF INTEGRATED EALTH INFORMATION SYSTEMS: THE ROLE AND IMPACT OF BUSINESS PROCESS MANAGEMENT
Dr.  Abdullah S. Al-Mudimigh
251
41 258
42 Low -Complex ICI Reduction due to Channel Estimation Error in OFDM systems using VSB-VBL Technique for High Mobility Applications
K. Vinoth Babu , K.V.N. Kavitha and K. Murali Babu
262
43 Development of WAP Based Students Information System in Campus Environment
Mohd Nazri Ismail
266
44
Multi-Dimensional Analysis of ISA Server Logs
Salman Ahmed Shaikh and Dr. Manzoor Hashmani
272
45 Applications of Conventional and A thermal Arrayed Waveguide Grating (AWG) Module in Active and Passive Optical Networks (PONs)
Abd El–Naser A. Mohammed, Ahmed Nabih Zaki Rashed, Gaber E. S. M. El-Abyad and Abd-El-fattah A. Saad
276
46 A New Generation Cryptographic Technique
Swarnendu Mukherjee, Debashis Ganguly and Somnath Naskar
284
47 288
48

Evaluating the Effects of Cryptography  Algorithms on power consumption for wireless devices
D. S.  Abdul. Elminaam, H. M. Abdul Kader,  and M. M. Hadhoud

293
49

Energy Efficiency of Encryption Schemes for Wireless Devices
Diaa Salama  Abdul. Elminaam, Hatem Mohamed Abdul Kader,  and Mohie Mohamed Hadhoud

302
50
Secured Routing Scheme for Adhoc Networks
Ashwani Kush, P. Gupta, C.Jinshong. Hwang
310
51 Measuring and Reducing Energy Consumption of Cryptographic Schemes for Different Data Types
Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud
318
52 Tradeoffs between Energy Consumption and Security of Symmetric Encryption Algorithms
Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud
325

Article#

Article Title & Authors (Volume 1 Number 4 October 2009)

Page

53
Analyzing the Energy Consumption of Security Algorithms for Wireless LANs
Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud
334
54 Performance Evaluation of Symmetric Encryption Algorithms on power consumption for wireless devices
Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud
343
55
A Novel Method of Fingerprint Classification Using Image Parameters on ANFIS
Rajesh Kumar, Senior Member, IAENG, B R Deva Vikram
352
56 358
57 Blind Image Fidelity Assessment Using the Histogram
M. I. Khalil
364
58 Fuzzy Mathematical Model for Utilization of the Resources
Manoj Kumar Jain, A. K. Dalela and Sandeep Kumar Tiwari
370
59 375
60 382
61 A Study of suitability and effectiveness of various implementation options of finite field arithmetic on Elliptic Curve Crypto System
Bimal Kumar Meher
389
62 Research on Correlative Techniques of Building Specific Topic Lexicon
First A. Shouning QU, Second B. Jian Lu, and Third C. Jing Li
394
63 398
64 UML Design for Performance Evaluation of Object Oriented Programs on Dual Core Processors
Dr. Vipin Saxena and Manish Shrivastava
403
65 Link State Generation using Antnet Algorithm
D.N. Mallikarjuna Rao, Dr. V. Kamakshi Prasad
409

66

413

67

Assessment Of Ocean Parameters through the Satellite Images - AOOPSI
R.D.Sathiya, Dr.G.Victor Rajamanickam, Dr.V.Vaidhyanathan
420

68

DWT-SVD Combined Full Band Robust Watermarking Technique for Color Images in YUV Color Space
V.Santhi, Arunkumar Thangavelu
424

69

430

70

SystemCtlmFL: the Successor of SystemCFL
K.L. Man, M. Mercaldi
434

71

Neuro – Genetic Cost Optimization Model: Application of Textile Spinning Process
L. S. Admuthe and S. D. Apte
441

72

445

73

Review on Applicability of Genetic Algorithm to Web Search
S.Siva Sathya, Philomina Simon, Member IACSIT
450

74

Secure Routing Techniques for MANETs
Dr. Harsh Sadawarti and Anuj K. Gupta, Member, IAENG
456

75

461

76

A hierarchical possibilistic clustering
Mehdi Salkhordeh Haghighi, Hadi Sadoghi Yazdi, AbedinVahedian
465

77

Software Development Effort Estimation
Based on a New Fuzzy Logic Model
473

Article#

Article Title & Authors (Volume 1 Number 5 December 2009)

Page

78

Lifetime Estimation of Composite Bone Joint Screws  
A. Khalatbari, K. Jenab, A. Varvani-Farahani

477
79

The Mathematical Formula Recognizing System Based   On Web Service                                              
Qi Xiangwei and Yusup Abaydulla

482
80

Particle Swarm Optimization Methods, Taxonomy and Applications
Davoud Sedighizadeh and and Ellips Masehian

486
81

Effects of the Vector Combinatorial code connection parameters on the    performance of an OCDMA system for high-speed networks  
Hassan Yousif Ahmed, Ibrahima Faye, N.M.Saad and S.A. Aljined

503
82

Virtual Clock Scheduling Algorithm for Video Streaming
Sankar.P and Chellamuthu .C

509
83

Cryptic key prediction and statistical inferences thereof  
P. Chakrabarti

512
84

Studies on Graph based Approaches for Single and Multi Document Summarizations
Shanmugasundaram Hariharan and Rengaramanujam Srinivasan

519
85

Robust Multiple Image Watermarking Scheme using Discrete Cosine Transform with Multiple Descriptions 
Chandra Mohan B and Srinivas Kumar S.

527
86

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks
A. Mardanian Dehkordi and V. Tabataba Vakili

533
87

A Hybrid Intelligent Approach for Automated Alert Clustering and Filtering in Intrusion Alert Analysis 
Maheyzah Md Siraj, Member, IACSIT, Mohd Aizaini Maarof and Siti Zaiton Mohd Hashim

539
88

Properties of Autocorrelation Coefficients for Single-Output Switching Functions 
J. E. Rice, Member, IEEE, J. C. Muzio, Senior Member, IEEE, N. A. Anderson and R. Jansen

546
89

A Linda-based Hierarchical Master-Worker Model
Mohammad GhasemiGol, Mostafa Sabzekar, Hossein Deldari and Amir-Hassan Bahmani

556
90

Reconfigurable Automatic Modulation Identification Hardware Module for Software Defined Radio Receivers 
P.Prakasam, MIEEE, SMIACSIT and M.Madheswaran, MIEEE, SMIACSIT

562
91

Impact of Multiencryption in Data Security
W.R. Sam Emmanuel, Member, IAENG

571
92

State Complexity of Shuffle and Intersection Combined with Complement
Kavitha Joseph, Member, CSI

577
93

A NOVEL APPROACH FOR ESTIMATION AND OPTIMIZATION OF MEMORY IN LOW POWER EMBEDDED SYSTEMS 
SRILATHA C, Dr. GURU RAO C V

581
94

Comparative Analysis of Simulated Annealing and Tabu Search Channel Allocation Algorithms  
Maninder Singh Kamboj, Jyotsna Sengupta

588
95

A Modified Playfair Cipher for a Large Block of Plaintext
V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani

592
96

A Modified Playfair Cipher Involving Interweaving and Iteration 
V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani

597
97

Scavenging Idle CPU Cycles for Creation of Inexpensive Supercomputing Power 
Madhuri D Bhavsar, Shrikant N Pradhan

602
98

Covering Rough Sets From a Topological Point of View 
Nguyen Duc Thuan, Member, IACSIT

606
99

Classification Of Documents Using Kohonen’s Self-Organizing Map 
B.H.ChandraShekar, Dr.G.Shoba

610
100

Performance Evaluation of Edge Detection Techniques for Images in Spatial Domain 
Mamta Juneja , Parvinder Singh Sandhu

614
101

Towards Detection of Brain Tumor in Electroencephalogram Signals Using Support Vector Machines

M. Murugesan and Dr.(Mrs.).R. Sukanesh
622
102

Fisher over Fuzzy Samples     
B. Rajaei, H. Sadoghi Yazdi, S. Effati

632
103 Effectiveness of Eigenspaces for Facial Expressions Recognition
G. R. S. Murthy, R.S.Jadon
638
104 Analysis of Microarray Image Spots Intensity:A Comparative Study
M.Anandhavalli, Chandan Mishra, M.K.Ghose
643
105 Process Grain Size Based Scheduling of Parallel Jobs withAgile Algorithm
S.V.Sudha, K.Thanushkodi ,Kalignar Karunanidhi Institute of Technology,Coimbatore
647

Article#

Article Title & Authors (Volume 2 Number 1 February 2010)

Page

106 Application of Automatic Variable Password Technique in Das’s Remote System Authentication Scheme Using Smart Card

C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE

1
107 Validation of Temporary Delegation and Revocation of Roles with UML and OCL

Mohsin Ali Memon, Manzoor Hashmani, and Karsten Sohr

6
108 Intelligent Tutoring System Using Hybrid Expert System With Speech Model in  Neural Networks

R.Venkatesh, E.R.Naganathan, N.Uma Maheswari

12
109 Neural Network-A Novel Technique for Software Effort Estimation

Jaswinder Kaur, Satwinder Singh, Dr. Karanjeet Singh Kahlon, Pourush Bassi

17
110 Lifetime Maximisation of Multihop WSN using Cluster-based Cooperative MIMO Scheme

J. Vidhya and P. Dananjayan

20
111 Biometric Entity Based Mutual Authentication Technique for 3-G Mobile Communications

Pijush Kanti Bhattacharjee, Chandan Koner,Chandan Tilak Bhunia, and Ujjwal Maulik

26
112 A Propose Architecture of MANET for Disaster Area Architecture

R.P.Mahapatra, Tanvir Ahmad Abbasi, and Mohd Suhaib Abbasi

31
113 Context Based Meaning Extraction by Means of Markov Logic

Imran Sarwar Bajwa

35
114 Image Compression Using New Entropy Coder

M. I. Khalil

39
115 Web Page Ranking Based on Text Content of Linked Pages

P. C. Saxena, J. P. Gupta, Namita Gupta

42
116 Solovay-Strassen test in a RSA Pubic key Cryptosystem

L. Sreenivasulu Reddy , K.Ramakrishna Prasad, N.Ch. S.N.Iyengar, and V.Ramachandran

52
117 Fuzzy multicriteria decision-making approach for Collaborative recommender systems

K. Palanivel  and R. Sivakumar

57
118 Distance Measurement of an Object or Obstacle by Ultrasound Sensors using P89C51RD2

A. K. Shrivastava, A. Verma, and S. P. Singh

64
119 Neighborhood Pixels Weights-A New Feature Extractor

Satish Kumar

69
120 Detection and prevention of wormhole attack in mobile adhoc networks

Shalini Jain, Dr.Satbir Jain

78
121 A Meta-Model Based Approach for Definition of a Multi-Formalism Modeling Framework

Hamid Mohammad Gholizadeh and Mohammad Abdollahi Azgomi

87
122 Grid Operating System: Making Dynamic Virtual Services in Organizations

Sanjeev Puri and. Dr. Qamas Abbas

96
123 An Overview of Video Encryption Techniques

M. Abomhara, Omar Zakaria, Othman O. Khalifa

103
124 Dynamic route selection: An artificial intelligence based approach

P.Chakrabarti

111
125 Data Quality Measurement using Data Mining

Saeed Farzi, Ahmad Baraani Dastjerdi

115
126 Fuzzy Logic approach to Recognition of Isolated Arabic Characters

Majida Ali Abed, Hamid Ali Abed AL-Asadi, Zainab sabah Baha Al-Deen, Ahmad Naser Ismail

119
127 Testability Analysis of Aspect Oriented Software

Sushil Garg, Dr. K.S.Kahlon and Dr.P.K.Bansal

125
128 Enchanced Self Umpiring System For Security Using Salvaging Route Reply

Ayyaswamy Kathirvel, Rengaramanujam Srinivasan

129
129 Implementation of Routing Security Aspects in AODV

Suman Deswal and Sukhbir Singh

135
130 Web Service Categorization Using Normalized Similarity Score

Shalini Batra, Seema Bawa

139
131 WLAN QoS Issues and IEEE 802.11e QoS Enhancement

Prof. Rathnakar Acharya, Dr. V. Vityanathan, Dr. Pethur Raj Chellaih

143

Article#

Article Title & Authors (Volume 2 Number 2 April 2010)

Page

132

E-learning for Tertiary Level Education in Least Developed Countries: Implementation Obstacles and Way Outs for Bangladesh
Khaled Mahmud

150
133

Performance Analysis of Coexistent Heterogeneous Networks for various Routing Protocols using Qualnet Simulation
G.M.Tamilselvan, Dr.A.Shanmugam

156
134 Design Fault Tolerance System Using Genetic Algorithm Employing Mutation and Back-to-Back Testing
Rakesh Kumar, Kulvinder Singh
166
135 WebPage Transclusion – An Adaptive Algorithm for Web Technologies
Vishwas J Raval, Amit R Thakkar, Amit P Ganatra, Yogeshwar P Kosta
172
136 Automatic Volumetric Liver Segmentation from MRI Data
Haidi Ibrahim, Maria Petrou, Kevin Wells, Simon Doran, Øystein Olsen
176
137 A Family of Covering Rough Sets Based Algorithm for Reduction of Attributes
Nguyen Duc Thuan
180
138 Modeling Clinical Database using Time Series based Temporal Mining
Akash Rajak, Kanak Saxena
185
139 A hybrid particle swarm optimization and tabu search algorithm for flexible job-shop scheduling problem
Jun-qing Li, Quan-ke Pan, Sheng-xian Xie, Bao-xian Jia, Yu-ting Wang
189
140 Multi-Level Synthesis of Frequent Rules from Different Data-Sources
Thirunavukkarasu Ramkumar, Rengaramanujam Srinivasan
195
141 Artificial Intelligence Based Mutual Authentication Technique with Biometric Entities in 3-G MobileCommunications
Pijush Kanti Bhattacharjee, Chandan Koner, Chandan Tilak Bhunia, Ujjwal Maulik
205
142 Use of Symmetric Functions Designed by QCA Gates for Next Generation IC
Pijush Kanti Bhattacharjee
211
143 A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared
A.A.Zaidan, B.B.Zaidan, Hamid.A.Jalab
218
144 A Cluster Based Parallel Computing Framework (CBPCF) for Performance Evaluation of Parallel Applications
Amit Chhabra, Gurvinder Singh
226
145 Novel Biorthogonal Wavelet based Iris Recognition for Robust Biometric System
Aditya Abhyankar, Stephanie Schuckers
233
146 Application of GA and PSO Tuned Fuzzy Controller for AGC of Three Area Thermal-Thermal-Hydro Power System
S. K. Sinha, R. N. Patel, R. Prasad
238
147 A Neuro Fuzzy approach for Facial Expression Recognition using LBP Histograms
V. Gomathi, Dr. K. Ramar, A. Santhiyaku Jeevakumar
245
148 Analysis of Parallel Manufacturing Processes with Resource Sharing
Farooq Ahmad, Hejiao Huang, Xiao-long Wang
250
149 Prediction of miRNAs in Bombyx mori through Computational Approaches
A.K. Mishra, D.K. Lobiyal
258
150 New Morphology-Based Method for Robust Iranian Car Plate Detection and Recognition
S. Hamidreza Kasaei, S. Mohammadreza Kasaei, S. Alireza Kasaei
264
151 Association Rule Mining in Genomics
M.Anandhavalli, M.K.Ghose, K.Gauthaman
259
152 A Novel Approach in Video Scene Background Estimation
Hamidreza Baradaran Kashani, Seyed Alireza Seyedin, Hadi Sadoghi Yazdi
274
153 Kernel Least Mean Square Features For HMM-Based Signal Recognition
Seyed Hossein Ghafarian, Hadi Sadoghi Yazdi, Hamidreza Baradaran Kashani
283
154 Optimization of Path Finding Algorithm using Clonal Selection: Application to Traveling Salesperson Problem
Tejbanta Singh Chingtham, G. Sahoo, M. K. Ghose
290
155 An Intuitionistic Fuzzy Approach to Distributed Fuzzy Clustering
Suman Deswal, Ukhbir Singh
295
156 Taxonomy of Routing Security for Ad-Hoc Network
Rajendra Prasad Mahapatra, Mohit Katyal
303
157 Mobile Agent Based Trust Management Framework  using  Fuzzy Logic in  B2C E-Business Environment
E.Sathiyamoorthy, N.Ch.S.N Iyengar, V.Ramachandran
308

Article#

Article Title & Authors (Volume 2 Number 3 June 2010)

Page

158 DC Energy Storage Schemes for DVR Voltage Sag Mitigation System
H.P. Tiwari and Sunil Kumar Gupta
313
159 Discrete Wavelet Transforms and Artificial Neural Networks for Speech Emotion Recognition
Firoz Shah. A, Raji Sukumar. A and Babu Anto. P
319
160 Read Range of UHF Passive RFID
Satya Sai Srikant, Rajendra Prasad Mahapatra
323
161 Incremental Clustering in Data Mining using Genetic Algorithm
Atul Kamble
326
162 Detection and segmentation of Handwritten Textin Gurmukhi Script using Flexible Windowing
Rajiv Kumar and Amardeep Singh
329
163 Realization of BCD adder using Reversible Logic
X. Susan Christina, M.Sangeetha Justine, K.Rekha, U.Subha and R.Sumathi
333
164 An Adaptive Data Hiding Technique for Digital Image Authentication
Sarabjeet S. Bedi, Shekhar Verma and Geetam Tomar
338
165 Genetically Tuned STATCOM for Voltage Control and Reactive Power Compensation
Naveen Goel, R.N. Patel and Saji T. Chacko
345
166 Inverted Lists String Matching Algorithms
Chouvalit Khancome and Veera Boonjing
352
167 Openness, Conscientiousness and Stingy for Buyer and Seller Agents in Electronic Marketplace
Aboozar Barzegar, Adel Jahanbani and Omid Roozmand
358
168 A Novel Approach for Web Page Change Detection System
H. P. Khandagale and P. P. Halkarnikar
364
169 Cancer Classification of Bioinformatics data using ANOVA
A. Bharathi and Dr.A.M.Natarajan
369
170 A Decision System for Commercial Products using Rough-Fuzzy Hybridization
Suvobrata Sarkar
374
171 An Innovative Approach to Enhance the Security of Data Encryption Scheme
D.B. Ojha, Ramveer Singh, Ajay Sharma, Awakash Mishra and Swati garg
380
172 Delay Bound Multicast Routing Using Hopfield Neural Network
Sushma Jain and J.D. Sharma
384
173 Software Calibration for Stereo Camera on Stereo Vision Mobile Robot using Tsai’s Method
Rostam Affendi Hamzah and Sani Irwan Md Salim
390
174 Artificial Intelligence Based Authentication Technique with Three Attributes in Vehicular Ad Hoc Network
Pijush Kanti Bhattacharjee, Utpal Roy and Anup Kumar Bhattacharjee
395
175 A Robust Algorithm for Local Obstacle Avoidance
Puneet Kumar, Nikhil Jindal, Akhil Jindal and Sidharth Chhabra
401
176 Mutual Authentication Tracking Loop Technique for 3-G Mobile Communications
Pijush Kanti Bhattacharjee
405
177 Nomadic Genetic Algorithm for Cryptanalysis of DES 16
S.Siva Sathya, T.Chithralekha and P.AnandaKumar
411
178 Finding Optimal Paths on Terrain Maps using Ant Colony Algorithm
Vinay Rishiwal ,Mano Yadav and K.V. Arya
416
179 Naïve Bayes Classifier for Classification of Plant and Animal miRNA
Bhasker Pant, Kumud Pant and K. R. Pardasani
420
180 Virtual sub carrier based Frequency and Phase Synchronization Algorithm for MC CDMA System
L.Nithyanandan, S.Thirunavukarasu and P. Dananjayan
425
181 Extended K-Modes with Probability Measure
Aranganayagi.S and Thangavel. K
431
182 An Improved Multimodal Palm Vein Recognition System Using Shape and Texture Features
M.Deepamalar and M.Madheswaran
436
183 A Generalized Despeckling Filter for Enhancing Fetal Structures to Aid Automated Obstetric Pathologies
B.Priestly Shan and M.Madheswaran
445
184 An Ensemble Model of Multiple Classifiers for Time Series Prediction
Dr. A. Chitra and S. Uma
454
185 A Novel Genetic Algorithm approach for Network Design with Robust Fitness Function
Anand Kumar and Dr. N. N. Jani
459

Article#

Article Title & Authors (Volume 2 Number 4 August 2010)

Page

186 Modeling and Simulation of Multi-Operation Microcode-based Built-in Self Test for Memory Fault Detection and Repair
Dr. R.K. Sharma and Aditi Sood
466
187 High linear, High CMRR, Low Power OTA with Class AB Output Stage
Seyed Javad Azhari and Farzan Rezaei
473
188 Computational Modeling of Cell Survival/Death Using BiCMOS
Shruti Jain, Pradeep K. Naik and Sunil V. Bhooshan
478
189 Circuit-Level Design of Human Voice Source
R. K. Sharma and Nikhil Raj
482
190 Design of a Digital Preprocessor System Based on Software Radios Conception
Dingkun Ma, Xiaomin Zhang and Jian Luo
491
191 Sensor Set Selection for Cooperative Spectrum Sensing Based on Confidence Detection
Xiao Zhang, Jin-long Wang and Qi-hui Wu
496
192 Secured Back up Routing Protocol for Adhoc Networks
G. Lavanya, C.Kumar and A. Rex Macedo Arokiaraj
503
193 Performance Analysis of Kekre's Median Fast Search, Kekre's Centroid Fast Search and Exhaustive Search Used for Colouring a Greyscale Image
Dr. H. B. Kekre, Sudeep D. Thepade and Adib Parkar
507
194 Euclidean Distance Based Color Image Segmentation of Abnormality Detection from Pseudo Color Thermographs
N.Selvarasu, Alamelu Nachiappan and N.M.Nandhitha
514
195 Gaussianization for Interference Background
Wang Pingbo, Tang Suofu, Wei Hongkai and Cai Zhiming
517
196 An Improved Melody Contour Feature Extraction for Query by Humming
Nattha Phiwma and Parinya Sanguansat
523
197 Study of Intelligent Optimization Methods Applied in the Fractional Fourier Transform
Wei Hongkai, Cai Zhiming, Wang Pingbo and Fu Yinfeng
532
198 Sindhi Part of Speech Tagging System Using Wordnet
Javed Ahmed Mahar and Ghulam Qadir Memon
538
199 Preprocessing Cover Images for More Secure LSB Steganography
Shreelekshmi R, M Wilscy and M Wilscy
546
200 Segmentation Algorithm for Multiple Face Detection in Color Images with Skin Tone Regions using Color Spaces and Edge Detection Techniques
H C Vijay Lakshmi and S. PatilKulakarni
552
201 Efficient Distribution of Conference Key for Dynamic Groups
D. V. Naga Raju, Dr. V. Valli Kumari and Dr. K. V.S.V.N. Raju
559
202 The Effect of Subcarrier-Based Channel Estimation on the BER Bound of Turbo Coded OFDM/SDMA System
Y. Taghinia and G. Dadashzadeh, E. Jedari and A. R. Enayati
564
203 A DOA Estimation Algorithm without Source Number Estimation for Nonplanar Array with Arbitrary Geometry
He Ke, Zhang Xiaomin, Han Peng, Yu Yang and Yan Shi
569
204 Automatic Book Placement and Searching Technique for Performance Enhancement of Library Management System
Umar Farooq, Muhammad Amar, K. M. Hasan, Muhammad Usman Asad and Asim Iqbal
574
205 A Dynamic Location Management Scheme for Wirless Networks Using Cascaded Correlation Neural Network
Amar Pratap Singh.J and Karnan.M
581
206 An Enhanced Implementation of Brain Tumor Detection Using Segmentation Based on Soft Computing
T.Logeswari and M.Karnan
586
207 An Improved Implementation of Brain Tumor Detection Using Segmentation Based on Hierarchical Self Organizing Map
T.Logeswari and M.Karnan
591
208 Extracting Prediction Rules for Loan Default Using Neural Networks through Attribute Relevance Analysis
M. V. Jagannatha Reddy and Dr. B.Kavitha
596
209 SASMS: Spectrum Allocation Scheme under Multi-transceiver Structure in CogMesh Network
Xiao-tian Xiang and Qi-hui Wu
602
210 CAD Design of Operational Amplifiers with Noise Power Balance for SoC Application
B. K. Mishra and Sandhya Save
608
211 SlimSS-tree: A New Tree Combined SS-tree With Slim-down Algorithm
Lifang Yang, Xianglin Huang, Rui Lv and Hui Lv
613
212 Analysis and Characterisation of Heart Rate Variability (hrv) Data of Different Sets of Subjects Using Nonlinear Measure (Approximate Entropy)
CH.RenuMadhavi and A.G.Ananth
619
213 Face Recognition Using Eigen Faces and Artificial Neural Network
Mayank Agarwal, Nikunj Jain, Mr. Manish Kumar and Himanshu Agrawal
624
214 Alerting Service for GEO Satellite System
Gao Qian, Li Guang-xia and Lv Jing
630
215 Face Recognition Using Wavelet Based Kernel Locally Discriminating Projection
Venkatrama Phani Kumar S, KVK Kishore and K Hemantha Kumar
636
216 Exploring the Discrete Wavelet Transform as a Tool for Hindi Speech Recognition
Shivesh Ranjan
642
217 A Comparative Study on Performance of Novel,Robust Spatial Domain Digital Image Watermarking with DCT Based Watermarking
Rajesh Kannan Megalingam, Mithun Muralidharan Nair, Rahul Srikumar, Venkat Krishnan Balasubramanian and Vineeth Sarma Venugopala Sarma
647
218 A Novel Approach for Enciphering Data of Smaller Bytes
R.Satheesh Kumar, E.Pradeep, K.Naveen and R.Gunasekaran
654
219 Efficient Computation of Phonocardiographic Signal Analysis in Digital Signal Processor Based System
D. Balasubramaniam and D. Nedumaran
660
220 Private Inputs to Tree Parity Machine
Pravin Revankar, W. Z. Gandhare and Dilip Rathod
665
221 Memory Reduced and Fast DDS Using FPGA
Dr. R. K. Sharma and Gargi Upadhyaya, ECE Department and NIT Kurukshetra
670
222 A Novel Interpolation Method Using Soft Data and Hard Data
Yi Du and Ting Zhang
673
223 The Research and Design of Asynchronous Communication Mode in Mobile Service Platform
Yonghua Qiao, Yuhui Tian, Shouning Qu and Tao Du
678

Article#

Article Title & Authors (Volume 2 Number 5 October 2010)

Page

224 Car Plate Recognition Using the Template Matching Method
M.I.Khalil
683
225 Human Face Recognition Using Superior Principal Component Analysis (SPCA)
Mohammed Aboud Kadhim and Widad Ismai
688
226 A Robust Method Applied to Human Detection
Seyyed Meysam Hosseini, Hasan Farsi
692
227 Image Retrieval using Texture Features extracted from GLCM, LBG and KPE
Dr. H.B.Kekre, Sudeep D. Thepade, Tanuja K. Sarode and Vashali Suryawanshi
695
228 A Transition from Traditional Checkpointing towards Multi-Agent based Approaches
Gerard McKee, Blesson Varghese and Vassil Alexandrov
701
229 Hole Healing Energy Aware Algorithm For Wireless Sensor Networks
Ifrah Farrukh Khan and Muhammad Younus Javed
706
230 Quality Metrics Tool for Object Oriented Programming
Mythili Thirugnanam and Swathi.J.N.
712
231 Mining Imperfectly Sporadic Rules with Two Thresholds
Cu Thu Thuy and Do Van Thanh
718
232 Image Restoration Using Cellular Neural Network With Contour Tracking Ideas
P.Elango and K.Murugesan
724
233 Sequential Pattern Mining from Multidimensional Sequence Data in Parallel
Mahdi Esmaieli and Mansour Tarafdar
730
234 An Approach of Line Scan Conversion Based on Multiple Segments
Aloke Kumar Saha and Kazi Shamsul Arefin
734
235 An Adaptive Energy Efficient and Reliable Gossip Routing Protocol For Mobile Adhoc Networks
S.Rajeswari and Dr.Y.Venkataramani
740
236 Mitigation of Web Based attacks using Mobile Agents in client side
E. Rajesh, R.Raju and R.Ezumalai
746
237 Empirical Study on Dynamic Warehousing
C K Bhensdadia and Yogeshwar P Kosta
751
238 Incrimination Immune Method (I2M) – A Novel Messaging Technique To Combat Sybil Attack In Ad Hoc Network
N. Sreenath, S. Vijayalakshmi and P.Annadurai
760
239 Process Grain Sized Based Scheduling of Parallel Jobs using Genetic Fuzzy Systems
S.V.Sudha and K.Thanushkodi
768
240 Effective Web Service Discovery Model Using Neural Network Approach
Ezhilarasi G and Dhavachelvan P
773
241 Cluster Based QoS Routing Protocol for MANET
Prof. P.K. Suri, Dr. M. K.Soni and Parul Tomar
783
242 Ant-based Clustering Algorithms: A Brief Survey
O.A. Mohamed Jafar and R. Sivakumar
787
243 Template based Mole Detection for Face Recognition
Ramesha K, K B Raja, Venugopal K R and L M Patnaik
797
244 A Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side
Dr. V. U. K. Sastry, Prof. D. S. R. Murthy and Dr. S. Durga Bhavani
805
245 Course planning of higher education to meet market demand by using data mining techniques – a case of a Technical University in India
C.Usharani and Rm.Chandrasekaran
809
246 A Highly Secured Approach against Attacks in MANETS
G.S. Mamatha and Dr. S. C. Sharma
815
247 Implementation of WIMAX IEEE 802.16e Baseband Transceiver on Multi-Core Software Defined Radio Platform
Mohammed Aboud Kadhim and Widad Ismail
820

Article#

Article Title & Authors (Volume 2 Number 6 December 2010)

Page

248 A Novel Video Object Segmentation Approach for Noisy Video Sequences towards Effective Video Retrieval
S.Padmakala and Dr.G.S.AnandhaMala
826
249 Stego-Based-Crypto Technique for High Security Applications
Adnan Mohsin Abdulazeez Brifcani and Wafaa Mustafa Abduallah Brifcani
835
250 Hybridization of ANN and GA with Adaptive Mutation: A Proficient Technique for Optimal Transmit Antenna Subset Selection for MIMO-OFDM Systems
Madan Lal and Dr Ashok De
842
251 On-line Image Compression based on Pipelined Architecture
Subarna Bhattacharjee, Dipak Kumar Kole and Amiya Halder
851
252 The Proposal of Step Stress Testing Automation
P. Tanuska, O. Vlkovic and L. Spendla
860
253 Association Rule Mining for Multiple Tables With Fuzzy Taxonomic Structures
Praveen Arora, R. K. Chauhan and Ashwani Kush
866
254 Study and Simulation of Fault Tolerant Quantum Cellular Automata Structures
Dr. E.N.Ganesh, R.Kaushik Ragavan, M.Krishna Kumar and V.Krishnan
871
255 Soft Decision Parallel Interference Cancellation for Scrambled/Unscrambled DS-CDMA System
Sasipriya S. and Ravichandran C.S.
877
256 Fuzzy Rule Based Expert System to Represent Uncertain Knowledge of E-commerce
Pankaj Dashore and Dr.Suresh Jain
882
257 Ontology Languages – A Review
V. Maniraj, Dr.R. Sivakumar
887
258 A Novel Genetic Algorithm for GTSP
Zaheed Ahmed, Irfan Younas and Muhammad Zahoor
892
259 A combination approach for Web Page Classification using Page Rank and Feature Selection Technique
Sini Shibu, Aishwarya Vishwakarma and Niket Bhargava
897
260 Intrusion Detection Tools and Techniques – A Survey
Karthikeyan .K.R and A. Indra
901
261 Re-Search & Re-Classification Algorithm – An Adaptive Algorithm for Search Engines
Vishwas J Raval, Amit R Thakkar, Amit P Ganatra and Yogesh P Kosta
907
262 A Hybrid model of Neural Network Approach for Speaker independent Word Recognition
N.Uma Maheswari, A.P.Kabilan and R.Venkatesh
912
263 Classification Algorithms in Achieving Partitioning Optimization for VLSI Applications
Dr .Sumithra devi K.A. and Vijayalakshmi.M.N
916
264 Realization of Threats and Countermeasure in Semantic Web Services
Mr. Suresh Kumar , Mr. Rakesh Kumar Prajapati, Dr. Manjeet Singh and Asok De
919
265 Trend Spotting Technological advancement, Issues, Challenges and Opportunities in Information Fusion Methods specific to Multiple Classifier Systems - A Survey Paper
Amit P Ganatra and Yogesh P Kosta
925
266 Comprehensive Evolution and Evaluation of Boosting
Amit P Ganatra and Yogesh P Kosta
931
267 E-Management Framework for Teaching Hospital Complexes in Developing Countries
Emmanuel Olajubu1, Anuoluwapo Ajayi, Deborah Ninan, Sururah Bello, Olofin Bodunde and Omodunbi Theresa
937
268 Design of High Performance Quaternary Adders
Vasundara Patel K S and K S Gurumurthy
944
269 Metrics for Test Case Design in Test Driven Development
Divya Prakash Shrivastava and R.C. Jain
952
270 State of the Art of Data Dissemination in VANETs
Pratibha Tomar, Brijesh Kumar Chaurasia and G. S. Tomar
957
271 Spiking Back Propagation Multilayer Neural Network Design for Predicting Unpredictable Stock Market Prices with Time Series Analysis
Amit Ganatr and Y. P. Kosta
963
272 iACO: A Bio-inspired Power Efficient Routing Scheme for Sensor Networks
Venkatesh Mahadevan and Frank Chiang
972
273 OpenPC : A Toolkit for Public Cluster with Full Ownership
Z. Akbar, I. Firmansyah, B. Hermanto and L.T. Handoko
978
274 A Hop by Hop Congestion Control Protocol to Mitigate Traffic Contention in Wireless Sensor Networks
Kamal Kumar Sharma, Dr. Harbhajan Singh and Dr. R.B Patel
986

 

Comments

6 + 3 =  Solve This To Prove You are a Real Person, not a SPAM script.

Site Map | Printable View | دانلود مقاله از پایگاه های علمی IEEE ScienceDirect Springer Wiley ASCE ACS ASME |© تهیه پسورد دانشگاه ها |

لینک دوستان